Resubmissions

05-08-2024 04:40

240805-favtwa1djh 8

05-08-2024 04:25

240805-e118xaxajr 10

05-08-2024 04:22

240805-ezk6aswhpl 6

05-08-2024 04:04

240805-emywmazgqb 6

05-08-2024 04:01

240805-elmrzazgmf 6

Analysis

  • max time kernel
    299s
  • max time network
    299s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-08-2024 04:25

General

Malware Config

Extracted

Family

warzonerat

C2

168.61.222.215:5400

Signatures

  • Dharma

    Dharma is a ransomware that uses security software installation to hide malicious activities.

  • WarzoneRat, AveMaria

    WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • ReZer0 packer 1 IoCs

    Detects ReZer0, a packer with multiple versions used in various campaigns.

  • Renames multiple (511) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Warzone RAT payload 2 IoCs
  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 10 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Credentials from Password Stores: Windows Credential Manager 1 TTPs

    Suspicious access to Credentials History.

  • Drops startup file 5 IoCs
  • Executes dropped EXE 21 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 3 IoCs
  • Drops desktop.ini file(s) 64 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory 2 IoCs
  • Suspicious use of SetThreadContext 9 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 39 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Interacts with shadow copies 3 TTPs 2 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Modifies registry class 2 IoCs
  • NTFS ADS 3 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 9 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 17 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of FindShellTrayWindow 45 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://linkvertise.com/1169231/solara-download?o=sharing
    1⤵
    • Enumerates system info in registry
    • Modifies registry class
    • NTFS ADS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:808
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff85f5346f8,0x7ff85f534708,0x7ff85f534718
      2⤵
        PID:2544
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,15608187264426585473,7032125286044259379,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2156 /prefetch:2
        2⤵
          PID:1676
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2144,15608187264426585473,7032125286044259379,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2208 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:4164
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2144,15608187264426585473,7032125286044259379,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2780 /prefetch:8
          2⤵
            PID:2160
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,15608187264426585473,7032125286044259379,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:1
            2⤵
              PID:3836
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,15608187264426585473,7032125286044259379,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:1
              2⤵
                PID:4868
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,15608187264426585473,7032125286044259379,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4728 /prefetch:1
                2⤵
                  PID:2268
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,15608187264426585473,7032125286044259379,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5344 /prefetch:1
                  2⤵
                    PID:5060
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2144,15608187264426585473,7032125286044259379,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5804 /prefetch:8
                    2⤵
                      PID:1344
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=2144,15608187264426585473,7032125286044259379,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=5792 /prefetch:8
                      2⤵
                      • Modifies registry class
                      • Suspicious behavior: EnumeratesProcesses
                      PID:1464
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,15608187264426585473,7032125286044259379,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5104 /prefetch:1
                      2⤵
                        PID:2656
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,15608187264426585473,7032125286044259379,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5736 /prefetch:1
                        2⤵
                          PID:3608
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,15608187264426585473,7032125286044259379,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6064 /prefetch:1
                          2⤵
                            PID:1580
                          • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,15608187264426585473,7032125286044259379,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5768 /prefetch:8
                            2⤵
                              PID:3552
                            • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,15608187264426585473,7032125286044259379,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5768 /prefetch:8
                              2⤵
                              • Suspicious behavior: EnumeratesProcesses
                              PID:2308
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,15608187264426585473,7032125286044259379,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5140 /prefetch:1
                              2⤵
                                PID:968
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,15608187264426585473,7032125286044259379,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5564 /prefetch:1
                                2⤵
                                  PID:4324
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,15608187264426585473,7032125286044259379,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6240 /prefetch:1
                                  2⤵
                                    PID:4532
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,15608187264426585473,7032125286044259379,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6368 /prefetch:1
                                    2⤵
                                      PID:1576
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,15608187264426585473,7032125286044259379,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6256 /prefetch:1
                                      2⤵
                                        PID:1792
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,15608187264426585473,7032125286044259379,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2632 /prefetch:1
                                        2⤵
                                          PID:2012
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,15608187264426585473,7032125286044259379,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5168 /prefetch:1
                                          2⤵
                                            PID:2560
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,15608187264426585473,7032125286044259379,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5396 /prefetch:1
                                            2⤵
                                              PID:3652
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2144,15608187264426585473,7032125286044259379,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5148 /prefetch:8
                                              2⤵
                                                PID:2132
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,15608187264426585473,7032125286044259379,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1820 /prefetch:1
                                                2⤵
                                                  PID:3564
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2144,15608187264426585473,7032125286044259379,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=7100 /prefetch:8
                                                  2⤵
                                                    PID:4744
                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2144,15608187264426585473,7032125286044259379,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7116 /prefetch:8
                                                    2⤵
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    PID:3036
                                                  • C:\Users\Admin\Downloads\WarzoneRAT.exe
                                                    "C:\Users\Admin\Downloads\WarzoneRAT.exe"
                                                    2⤵
                                                    • Checks computer location settings
                                                    • Executes dropped EXE
                                                    • Suspicious use of SetThreadContext
                                                    • System Location Discovery: System Language Discovery
                                                    • NTFS ADS
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:3372
                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jFvfxe" /XML "C:\Users\Admin\AppData\Local\Temp\tmp2F15.tmp"
                                                      3⤵
                                                      • System Location Discovery: System Language Discovery
                                                      • Scheduled Task/Job: Scheduled Task
                                                      PID:3676
                                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                      3⤵
                                                      • System Location Discovery: System Language Discovery
                                                      PID:1512
                                                  • C:\Users\Admin\Downloads\WarzoneRAT.exe
                                                    "C:\Users\Admin\Downloads\WarzoneRAT.exe"
                                                    2⤵
                                                    • Checks computer location settings
                                                    • Executes dropped EXE
                                                    • Suspicious use of SetThreadContext
                                                    • System Location Discovery: System Language Discovery
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:228
                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jFvfxe" /XML "C:\Users\Admin\AppData\Local\Temp\tmp32CE.tmp"
                                                      3⤵
                                                      • System Location Discovery: System Language Discovery
                                                      • Scheduled Task/Job: Scheduled Task
                                                      PID:452
                                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                      3⤵
                                                      • System Location Discovery: System Language Discovery
                                                      PID:4756
                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,15608187264426585473,7032125286044259379,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6652 /prefetch:2
                                                    2⤵
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    PID:680
                                                  • C:\Users\Admin\Downloads\WarzoneRAT.exe
                                                    "C:\Users\Admin\Downloads\WarzoneRAT.exe"
                                                    2⤵
                                                    • Checks computer location settings
                                                    • Executes dropped EXE
                                                    • Suspicious use of SetThreadContext
                                                    • System Location Discovery: System Language Discovery
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:3876
                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jFvfxe" /XML "C:\Users\Admin\AppData\Local\Temp\tmp6836.tmp"
                                                      3⤵
                                                      • System Location Discovery: System Language Discovery
                                                      • Scheduled Task/Job: Scheduled Task
                                                      PID:1192
                                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                      3⤵
                                                      • System Location Discovery: System Language Discovery
                                                      PID:3216
                                                  • C:\Users\Admin\Downloads\WarzoneRAT.exe
                                                    "C:\Users\Admin\Downloads\WarzoneRAT.exe"
                                                    2⤵
                                                    • Checks computer location settings
                                                    • Executes dropped EXE
                                                    • Suspicious use of SetThreadContext
                                                    • System Location Discovery: System Language Discovery
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:2012
                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jFvfxe" /XML "C:\Users\Admin\AppData\Local\Temp\tmp6D27.tmp"
                                                      3⤵
                                                      • System Location Discovery: System Language Discovery
                                                      • Scheduled Task/Job: Scheduled Task
                                                      PID:1388
                                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                      3⤵
                                                      • System Location Discovery: System Language Discovery
                                                      PID:4920
                                                  • C:\Users\Admin\Downloads\WarzoneRAT.exe
                                                    "C:\Users\Admin\Downloads\WarzoneRAT.exe"
                                                    2⤵
                                                    • Checks computer location settings
                                                    • Executes dropped EXE
                                                    • Suspicious use of SetThreadContext
                                                    • System Location Discovery: System Language Discovery
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:3852
                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jFvfxe" /XML "C:\Users\Admin\AppData\Local\Temp\tmp6D95.tmp"
                                                      3⤵
                                                      • System Location Discovery: System Language Discovery
                                                      • Scheduled Task/Job: Scheduled Task
                                                      PID:3932
                                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                      3⤵
                                                        PID:2228
                                                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                        3⤵
                                                        • System Location Discovery: System Language Discovery
                                                        PID:788
                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,15608187264426585473,7032125286044259379,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=30 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4800 /prefetch:1
                                                      2⤵
                                                        PID:1980
                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2144,15608187264426585473,7032125286044259379,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=7336 /prefetch:8
                                                        2⤵
                                                          PID:3596
                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2144,15608187264426585473,7032125286044259379,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6284 /prefetch:8
                                                          2⤵
                                                          • Suspicious behavior: EnumeratesProcesses
                                                          PID:2704
                                                        • C:\Users\Admin\Downloads\CoronaVirus.exe
                                                          "C:\Users\Admin\Downloads\CoronaVirus.exe"
                                                          2⤵
                                                          • Checks computer location settings
                                                          • Drops startup file
                                                          • Executes dropped EXE
                                                          • Adds Run key to start application
                                                          • Drops desktop.ini file(s)
                                                          • Drops file in System32 directory
                                                          • Drops file in Program Files directory
                                                          • System Location Discovery: System Language Discovery
                                                          • Suspicious behavior: EnumeratesProcesses
                                                          PID:3852
                                                          • C:\Windows\system32\cmd.exe
                                                            "C:\Windows\system32\cmd.exe"
                                                            3⤵
                                                              PID:4304
                                                              • C:\Windows\system32\mode.com
                                                                mode con cp select=1251
                                                                4⤵
                                                                  PID:5820
                                                                • C:\Windows\system32\vssadmin.exe
                                                                  vssadmin delete shadows /all /quiet
                                                                  4⤵
                                                                  • Interacts with shadow copies
                                                                  PID:9716
                                                              • C:\Windows\system32\cmd.exe
                                                                "C:\Windows\system32\cmd.exe"
                                                                3⤵
                                                                  PID:35700
                                                                  • C:\Windows\system32\mode.com
                                                                    mode con cp select=1251
                                                                    4⤵
                                                                      PID:32160
                                                                    • C:\Windows\system32\vssadmin.exe
                                                                      vssadmin delete shadows /all /quiet
                                                                      4⤵
                                                                      • Interacts with shadow copies
                                                                      PID:35880
                                                                  • C:\Windows\System32\mshta.exe
                                                                    "C:\Windows\System32\mshta.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta"
                                                                    3⤵
                                                                      PID:35784
                                                                    • C:\Windows\System32\mshta.exe
                                                                      "C:\Windows\System32\mshta.exe" "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta"
                                                                      3⤵
                                                                        PID:35808
                                                                    • C:\Users\Admin\Downloads\CoronaVirus.exe
                                                                      "C:\Users\Admin\Downloads\CoronaVirus.exe"
                                                                      2⤵
                                                                      • Executes dropped EXE
                                                                      • System Location Discovery: System Language Discovery
                                                                      PID:12148
                                                                    • C:\Users\Admin\Downloads\CoronaVirus.exe
                                                                      "C:\Users\Admin\Downloads\CoronaVirus.exe"
                                                                      2⤵
                                                                      • Executes dropped EXE
                                                                      • System Location Discovery: System Language Discovery
                                                                      PID:12924
                                                                    • C:\Users\Admin\Downloads\CoronaVirus.exe
                                                                      "C:\Users\Admin\Downloads\CoronaVirus.exe"
                                                                      2⤵
                                                                      • Executes dropped EXE
                                                                      • System Location Discovery: System Language Discovery
                                                                      PID:36424
                                                                    • C:\Users\Admin\Downloads\CoronaVirus.exe
                                                                      "C:\Users\Admin\Downloads\CoronaVirus.exe"
                                                                      2⤵
                                                                      • Executes dropped EXE
                                                                      • System Location Discovery: System Language Discovery
                                                                      PID:36668
                                                                    • C:\Users\Admin\Downloads\CoronaVirus.exe
                                                                      "C:\Users\Admin\Downloads\CoronaVirus.exe"
                                                                      2⤵
                                                                      • Executes dropped EXE
                                                                      • System Location Discovery: System Language Discovery
                                                                      PID:36692
                                                                    • C:\Users\Admin\Downloads\CoronaVirus.exe
                                                                      "C:\Users\Admin\Downloads\CoronaVirus.exe"
                                                                      2⤵
                                                                      • Executes dropped EXE
                                                                      • System Location Discovery: System Language Discovery
                                                                      PID:9868
                                                                    • C:\Users\Admin\Downloads\CoronaVirus.exe
                                                                      "C:\Users\Admin\Downloads\CoronaVirus.exe"
                                                                      2⤵
                                                                      • Executes dropped EXE
                                                                      • System Location Discovery: System Language Discovery
                                                                      PID:36848
                                                                    • C:\Users\Admin\Downloads\CoronaVirus.exe
                                                                      "C:\Users\Admin\Downloads\CoronaVirus.exe"
                                                                      2⤵
                                                                      • Executes dropped EXE
                                                                      • System Location Discovery: System Language Discovery
                                                                      PID:36820
                                                                    • C:\Users\Admin\Downloads\CoronaVirus.exe
                                                                      "C:\Users\Admin\Downloads\CoronaVirus.exe"
                                                                      2⤵
                                                                      • Executes dropped EXE
                                                                      • System Location Discovery: System Language Discovery
                                                                      PID:36800
                                                                  • C:\Windows\System32\CompPkgSrv.exe
                                                                    C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                    1⤵
                                                                      PID:4604
                                                                    • C:\Windows\System32\CompPkgSrv.exe
                                                                      C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                      1⤵
                                                                        PID:3460
                                                                      • C:\Windows\System32\rundll32.exe
                                                                        C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                                                        1⤵
                                                                          PID:828
                                                                        • C:\Users\Admin\Downloads\WarzoneRAT.exe
                                                                          "C:\Users\Admin\Downloads\WarzoneRAT.exe"
                                                                          1⤵
                                                                          • Checks computer location settings
                                                                          • Executes dropped EXE
                                                                          • Suspicious use of SetThreadContext
                                                                          • System Location Discovery: System Language Discovery
                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                          PID:3376
                                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                                            "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jFvfxe" /XML "C:\Users\Admin\AppData\Local\Temp\tmp9BE8.tmp"
                                                                            2⤵
                                                                            • System Location Discovery: System Language Discovery
                                                                            • Scheduled Task/Job: Scheduled Task
                                                                            PID:1104
                                                                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                            2⤵
                                                                            • System Location Discovery: System Language Discovery
                                                                            PID:2276
                                                                        • C:\Users\Admin\Downloads\WarzoneRAT.exe
                                                                          "C:\Users\Admin\Downloads\WarzoneRAT.exe"
                                                                          1⤵
                                                                          • Checks computer location settings
                                                                          • Executes dropped EXE
                                                                          • Suspicious use of SetThreadContext
                                                                          • System Location Discovery: System Language Discovery
                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                          PID:2076
                                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                                            "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jFvfxe" /XML "C:\Users\Admin\AppData\Local\Temp\tmpABD6.tmp"
                                                                            2⤵
                                                                            • System Location Discovery: System Language Discovery
                                                                            • Scheduled Task/Job: Scheduled Task
                                                                            PID:3672
                                                                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                            2⤵
                                                                            • System Location Discovery: System Language Discovery
                                                                            PID:4280
                                                                        • C:\Users\Admin\Downloads\WarzoneRAT.exe
                                                                          "C:\Users\Admin\Downloads\WarzoneRAT.exe"
                                                                          1⤵
                                                                          • Checks computer location settings
                                                                          • Executes dropped EXE
                                                                          • Suspicious use of SetThreadContext
                                                                          • System Location Discovery: System Language Discovery
                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                          PID:2552
                                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                                            "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jFvfxe" /XML "C:\Users\Admin\AppData\Local\Temp\tmpC1CF.tmp"
                                                                            2⤵
                                                                            • System Location Discovery: System Language Discovery
                                                                            • Scheduled Task/Job: Scheduled Task
                                                                            PID:3644
                                                                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                            2⤵
                                                                              PID:5068
                                                                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                              2⤵
                                                                                PID:4340
                                                                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                                2⤵
                                                                                • System Location Discovery: System Language Discovery
                                                                                PID:5004
                                                                            • C:\Users\Admin\Downloads\WarzoneRAT.exe
                                                                              "C:\Users\Admin\Downloads\WarzoneRAT.exe"
                                                                              1⤵
                                                                              • Checks computer location settings
                                                                              • Executes dropped EXE
                                                                              • Suspicious use of SetThreadContext
                                                                              • System Location Discovery: System Language Discovery
                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                              PID:2284
                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jFvfxe" /XML "C:\Users\Admin\AppData\Local\Temp\tmpC50B.tmp"
                                                                                2⤵
                                                                                • System Location Discovery: System Language Discovery
                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                PID:3524
                                                                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                                2⤵
                                                                                • System Location Discovery: System Language Discovery
                                                                                PID:1796
                                                                            • C:\Windows\system32\vssvc.exe
                                                                              C:\Windows\system32\vssvc.exe
                                                                              1⤵
                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                              PID:19508
                                                                            • C:\Windows\system32\werfault.exe
                                                                              werfault.exe /h /shared Global\9568195f753d47758e1dcb5f82759bf4 /t 35788 /p 35784
                                                                              1⤵
                                                                                PID:36156
                                                                              • C:\Windows\system32\werfault.exe
                                                                                werfault.exe /h /shared Global\a8b720c9ff0e416a8b3ffcfc1996507a /t 35812 /p 35808
                                                                                1⤵
                                                                                  PID:36236
                                                                                • C:\Users\Admin\Downloads\CoronaVirus.exe
                                                                                  "C:\Users\Admin\Downloads\CoronaVirus.exe"
                                                                                  1⤵
                                                                                  • Executes dropped EXE
                                                                                  • System Location Discovery: System Language Discovery
                                                                                  PID:10248
                                                                                • C:\Users\Admin\Downloads\CoronaVirus.exe
                                                                                  "C:\Users\Admin\Downloads\CoronaVirus.exe"
                                                                                  1⤵
                                                                                  • Executes dropped EXE
                                                                                  • System Location Discovery: System Language Discovery
                                                                                  PID:9828

                                                                                Network

                                                                                MITRE ATT&CK Enterprise v15

                                                                                Replay Monitor

                                                                                Loading Replay Monitor...

                                                                                Downloads

                                                                                • C:\Program Files\Common Files\microsoft shared\ClickToRun\AppvIsvSubsystems32.dll.id-64355D5E.[[email protected]].ncov

                                                                                  Filesize

                                                                                  2.7MB

                                                                                  MD5

                                                                                  12776447e07745b17d080c7ab1e9788d

                                                                                  SHA1

                                                                                  78024ebd0b167769fe0e2a62083cd7792daa330a

                                                                                  SHA256

                                                                                  daa9373ff7a7c84099fe6a7c1f0b71e06d320fa057935b6182e1e761ba8d6654

                                                                                  SHA512

                                                                                  c06348a937fa61cbbc59b9e995e51dff3546eaa1bca8aa707b8cde48f4e302da28f9feac1f8dc6902323f13fa92bbf4ccb360f47930083566828ebd3de498680

                                                                                • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\WarzoneRAT.exe.log

                                                                                  Filesize

                                                                                  507B

                                                                                  MD5

                                                                                  8cf94b5356be60247d331660005941ec

                                                                                  SHA1

                                                                                  fdedb361f40f22cb6a086c808fc0056d4e421131

                                                                                  SHA256

                                                                                  52a5b2d36f2b72cb02c695cf7ef46444dda73d4ea82a73e0894c805fa9987bc0

                                                                                  SHA512

                                                                                  b886dfc8bf03f8627f051fb6e2ac40ae2e7713584695a365728eb2e2c87217830029aa35bd129c642fa03dde3f7a7dd5690b16248676be60a6bb5f497fb23651

                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                  Filesize

                                                                                  152B

                                                                                  MD5

                                                                                  9b008261dda31857d68792b46af6dd6d

                                                                                  SHA1

                                                                                  e82dc88e2d1da2df7cb19d79a0346b9bb90d52b3

                                                                                  SHA256

                                                                                  9ac598d4f8170f7e475d84103aead9e3c23d5f2d292741a7f56a17bde8b6f7da

                                                                                  SHA512

                                                                                  78853091403a06beeec4998e2e3a4342111895ffd485f7f7cd367741a4883f7a25864cba00a6c86f27dc0c9ce9d04f08011ecc40c8ae9383d33274739ac39f10

                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                  Filesize

                                                                                  152B

                                                                                  MD5

                                                                                  0446fcdd21b016db1f468971fb82a488

                                                                                  SHA1

                                                                                  726b91562bb75f80981f381e3c69d7d832c87c9d

                                                                                  SHA256

                                                                                  62c5dc18b25e758f3508582a7c58bb46b734a774d97fc0e8a20614235caa8222

                                                                                  SHA512

                                                                                  1df7c085042266959f1fe0aedc5f6d40ceba485b54159f51f0c38f17bb250b79ea941b735e1b6faf219f23fe8ab65ac4557f545519d52d5416b89ad0f9047a31

                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                                  Filesize

                                                                                  4KB

                                                                                  MD5

                                                                                  89166c4aa2741e55115e715fcb83e61e

                                                                                  SHA1

                                                                                  afa2b24f68c9941a26d84d9fceefe3de8bd6acf9

                                                                                  SHA256

                                                                                  abb442cf20af72802dd3e67c38f40ba5bab3534a82757292e8afb4104c8f64f5

                                                                                  SHA512

                                                                                  9daa0cd87165349b986449405320ec2ed1a7c896faab2ef3fd696632da53b5887983f299c99706a71bd4a86f7aad9d95d6a2eb0ac76cbc7c6b1bcc30ad5d6e3c

                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                                  Filesize

                                                                                  744B

                                                                                  MD5

                                                                                  62ba10e51c6c44b12c4fc914b0ace7ee

                                                                                  SHA1

                                                                                  f87673bc607f618adc22d65ee020fe52530c9229

                                                                                  SHA256

                                                                                  4e4656ce58aad38d0833664e431930879f30682fe71bf041f54d829551c0ea69

                                                                                  SHA512

                                                                                  85848e972e0779fe760e12da1fa6ba8d4175b85625e751e1a965e981b1bf734e0159832b9b27179bdc1152351864631af3fd6d458ce433e75b14ec2536d46fb7

                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                                  Filesize

                                                                                  4KB

                                                                                  MD5

                                                                                  53ad5793f34712657aefc9039a498879

                                                                                  SHA1

                                                                                  f8a4412480e60af04d2cde9c1336c0d30ca0ea76

                                                                                  SHA256

                                                                                  e24a8cf66e9d107e42ef3ff0ba8943e93ca1a5d4e9be99d4e26bfaba091bfa7a

                                                                                  SHA512

                                                                                  256e9c4883ff9be0ca8bedf7416bacfb63e9d65c812c1fda19914019dc68deaf8dbbd852a5cd7b9908c242709b8c02c6e35780b5ec98577320840d173260be9a

                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                                  Filesize

                                                                                  3KB

                                                                                  MD5

                                                                                  5f16137fad11b304421866da613fcbff

                                                                                  SHA1

                                                                                  6c3533c2fa1b9b8bda9b3cbf355807f98ad0aca2

                                                                                  SHA256

                                                                                  e79eef6ca01e47d21f00d2900b2e323d1b0406e3093892d5728a6e01c2b3a7ae

                                                                                  SHA512

                                                                                  1b49576a163f7a90084c66745bcff438098c31a7ea5162a440fc3036b58c9ab8a1f7ec5566112f924eb6deeae875a467ec406791876580197793752265053fe3

                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                                  Filesize

                                                                                  3KB

                                                                                  MD5

                                                                                  164f64655c19aee4ea3e2570849f0ee6

                                                                                  SHA1

                                                                                  7adb5ffa1750cfc1ee799889ceb3b984238f3a49

                                                                                  SHA256

                                                                                  f7a3e2638ff2aed011e7fe497886fb4b7054a8422dec4bac1ebd2b334d854e43

                                                                                  SHA512

                                                                                  f3fbd507ee17f8b69cc878fb8d65b6e8283fe82046e79c3888620782a0204c89e72d217a80f501ecb81a59613042c8635eacf84f129f06badfb7c041d86eed64

                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                  Filesize

                                                                                  6KB

                                                                                  MD5

                                                                                  308af6c22b6a6933aa02769175c79282

                                                                                  SHA1

                                                                                  d03c9a45129eda86d2821cbca96050cad2326a14

                                                                                  SHA256

                                                                                  8155bbb2291649a7a1dfde9f6a20aba43b20d52fbcb52a020d338c1655b92613

                                                                                  SHA512

                                                                                  92141091433f2c104067498b0485007adfa2bfb52f8c9b42da310f3d9c3dd4126ec63490e6a853c82e84ebe3f42abaf853f1e1c1a11abbd64ac984196160774b

                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                  Filesize

                                                                                  8KB

                                                                                  MD5

                                                                                  859c577cd85ae15af081d58913f67332

                                                                                  SHA1

                                                                                  e0da090c7c62998d6f1a8f8486efbe8b41d16f42

                                                                                  SHA256

                                                                                  a546d92edab0a3239e48a293afe6ac572e5be1ed420bbb41f7648dec36b14ad4

                                                                                  SHA512

                                                                                  287f16fc33ec0ddb997861543c8162895e19d53d15ed8bb05f66196d4fe6a226ec39ac4769d038b106c84886ec7175c808351e3ef16ce379c6aa1aea3addd6a4

                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                  Filesize

                                                                                  7KB

                                                                                  MD5

                                                                                  59ae2dc3a64e89b2b73d375003dfd82d

                                                                                  SHA1

                                                                                  e3ed88cc64c3087fd52ff0261c00df7e60c2e2b2

                                                                                  SHA256

                                                                                  fd4b227dd23bb187e5dfb52d861b7e2aec36f291947fc1560868aecee25a50c4

                                                                                  SHA512

                                                                                  7456d17f8d86ae702a9161c7e322c57647f2a9f7486d6a0ef520028348596f1f030621825f742dcb437dbf5475d89ef8c39a90b58985361d8b4e61d4e0e0418b

                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                  Filesize

                                                                                  8KB

                                                                                  MD5

                                                                                  e23cf8d9558192eaff2ba0fb469f00d3

                                                                                  SHA1

                                                                                  077ce478e0d945d8f642a5cf49a194ee0c895cfe

                                                                                  SHA256

                                                                                  2051c07a0de2d6232a70ac631b49a2872cf09b511c4716352cd9977905208c1c

                                                                                  SHA512

                                                                                  44129d89d36dbcf67d065177c80e1abde7a2fc3d35458e1ac1354ac07a9c492faa82a416ee8c1216aa0651186df38603ff5e32fcf9ac61eb50d19d34360784a5

                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                  Filesize

                                                                                  7KB

                                                                                  MD5

                                                                                  046f18057a160efa927e84439f0f223e

                                                                                  SHA1

                                                                                  0ed29574bf369863c3ed21e029a2108c664991b9

                                                                                  SHA256

                                                                                  6facdc17fb0e1a12bc4a16bd6069bce2c2fa1e28af3438455ed5222427cbd850

                                                                                  SHA512

                                                                                  f3694571762fa7d73f809f9eeb37943ded9ba853580a2fbd42295929a215ae6c016b01b667ed0da88fe14bb83441052e1399e65644b3f8f5a7218fe90bb25f0c

                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                  Filesize

                                                                                  8KB

                                                                                  MD5

                                                                                  0f06a1a0d21c13bc62282c0ba1df03fa

                                                                                  SHA1

                                                                                  3af3ff822ee9eed978cc7e1b23ec5ae668d9f0d5

                                                                                  SHA256

                                                                                  ff53d566b00d0a17299fa291269a2b33c7ff5272068ea176572fda193a087827

                                                                                  SHA512

                                                                                  41a0a4140d9afbf99771f3ae42ee65de5bcdfb0e9a21771da24f4412ab02ae9c9dec57dff6f73c2b58a87ce2d76e85723a6f9380d164f3a44bb314fa46564952

                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                  Filesize

                                                                                  2KB

                                                                                  MD5

                                                                                  e2e708dd93fcd19bae5d958e699d221e

                                                                                  SHA1

                                                                                  cce8c54b3ba6b64e69aa38db7aa0e14163e6c131

                                                                                  SHA256

                                                                                  17550eb2103e09f855d6bf91c02d6b01297fa4e23558bcb27e7ef11e1b70a2e0

                                                                                  SHA512

                                                                                  9fb21dcfab9cf5bb1953d1062004e2cbefdbe85aa150979b1689dc891da2ca30bd88a7f352d99e9eb9889945e1cdd78e87cf780696a62615f8176b8ce90be76d

                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                  Filesize

                                                                                  2KB

                                                                                  MD5

                                                                                  dc7a349a94eabb011bc44a54dfb83d1e

                                                                                  SHA1

                                                                                  1db63412c5c9d66aa588c572ba634feb1227ed5f

                                                                                  SHA256

                                                                                  091e37b32e8df33df11ffdf8179308bc1dc6cd95a8e3b0753e751c569a00e31e

                                                                                  SHA512

                                                                                  37e6df61324cce1422f7cb7ce922caac61f094cdf42a0078c87709d631bcd829752461826cc0ba6b8f20907d82dc8430010de06c000cf0dc66de6c60a48b312c

                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                  Filesize

                                                                                  2KB

                                                                                  MD5

                                                                                  b4477cddbd01c7669365cf7edd4ecd48

                                                                                  SHA1

                                                                                  1649261e686675c596dc3302883cb8e15ff19c34

                                                                                  SHA256

                                                                                  52324877d5c5b98ad301941bb7c77ee2cea1dfb77692523341890f6feff420d3

                                                                                  SHA512

                                                                                  58a8bda856527afed71638a5ee92c9130df3a40c13f55b0dcbc8c113b1fa60f04c7bae07f7d322617b1b18def86731dd1da3af7f7abcc07c627442a5c594aeca

                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                  Filesize

                                                                                  2KB

                                                                                  MD5

                                                                                  5901f5117e6f4fbe22135fa35b61feaa

                                                                                  SHA1

                                                                                  71def969f39f6668f30d062f70cef8bbe97636aa

                                                                                  SHA256

                                                                                  c3b1b15a756840e3189264d7c614929c2448ecf27d60d2397e3e784974e65ee6

                                                                                  SHA512

                                                                                  9801d17c0a4060dc61671617c8b2757dd27ecf1285f57f0d22fb3cc5d687c8614cdcd7cd54dc976b46675324b45c6ff4c07ba9ac0a0b8f8903e49b0b1d05ea09

                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                  Filesize

                                                                                  2KB

                                                                                  MD5

                                                                                  d5f5dc148d1d27c0c4c7ca13e7a3ce48

                                                                                  SHA1

                                                                                  f92a84a23ddc12493f4a4ff7c846cb8673fa8b99

                                                                                  SHA256

                                                                                  000725975b4c48426642f4859c34ba0499c614c908ea1f777faab6cc3413e901

                                                                                  SHA512

                                                                                  e26b9d923557419d5859fd724817acb9796e47efd799bc0da08f72643cf63fdd72190ecc738d3b1fb5808cd0327b06069b37c772d2a11bc65742bd2cfd15cd6d

                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                  Filesize

                                                                                  1KB

                                                                                  MD5

                                                                                  dc67dab6772d544866477a9ec9364b09

                                                                                  SHA1

                                                                                  884caf2b048fe0a1ee7d1f4fcf3b877d7565232a

                                                                                  SHA256

                                                                                  084a9dec664b90a04c291501995feb7591db4a7da5afdbbc0dc021f29c0fc678

                                                                                  SHA512

                                                                                  57b14453a2b6d411516a391b46a4d577dc124f8fef0b20e515f0719439c30ef1f53f1cd115cf7f9dbeb10627cac88b104cd6b340fcf9069799516e568fce9949

                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                  Filesize

                                                                                  2KB

                                                                                  MD5

                                                                                  56115f08952d127b45eaa607aec164c8

                                                                                  SHA1

                                                                                  d4dd58628913cfda942a9caadaa30061984ed2ea

                                                                                  SHA256

                                                                                  6223a7aa1a1c76329af3b7ec2c12ae21f48abcdccf32f2ecce5ebd1f4478bc2a

                                                                                  SHA512

                                                                                  9a59280b2087ad1ebf1a7861f1992d48a14a72d17a8dfb4b8e94bd048a404ffe6df31a008a7fb02b57e49d475533a201b6ec7a59d6f920d77ab7bd2e3e2e74be

                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe58558d.TMP

                                                                                  Filesize

                                                                                  1KB

                                                                                  MD5

                                                                                  8c1c90bee68406d6699b9952b3daa185

                                                                                  SHA1

                                                                                  fdc3a5e6c2d7443a13be0fee7e383951c3d73d52

                                                                                  SHA256

                                                                                  d116d2101109d88677eeaeaecfad1d424af8d77b2d99473620a5de728d043b1b

                                                                                  SHA512

                                                                                  652c030a0e1d46e007b48279ebabf4e23935bd74c45d5629557c42e5796841d0ee34dc870f7a6a3fc358dbdcb39aafbc3f521730508c3e10acc36953ba41dd40

                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                                                  Filesize

                                                                                  16B

                                                                                  MD5

                                                                                  6752a1d65b201c13b62ea44016eb221f

                                                                                  SHA1

                                                                                  58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                                                                  SHA256

                                                                                  0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                                                                  SHA512

                                                                                  9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                  Filesize

                                                                                  10KB

                                                                                  MD5

                                                                                  f0697f4da1feb205d491041056c5d059

                                                                                  SHA1

                                                                                  0a63e7d581259a8e13dad51a445493b9df368f91

                                                                                  SHA256

                                                                                  de904a043a8fb546f0740aed24de48f55f01f134eb18e7a799ff189fdf972f54

                                                                                  SHA512

                                                                                  90c2fd7e805a08aa97cf0cc8281e8f3953a8c383c5d8a2362fc0a7c8aa0a0b3ca3675e1a9039a39a329410143eb4a7f0654b4d8be811a779eef7a9d7956c0ecd

                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                  Filesize

                                                                                  11KB

                                                                                  MD5

                                                                                  2a6d871dcaf02b5b44bdd058d6da3db4

                                                                                  SHA1

                                                                                  5bf64e686f79dabd634ec2a4a92259f06540e5f2

                                                                                  SHA256

                                                                                  d6ec85460bb9acf8e19627b091d4a96c3db6d526c45aa1e9d34a962ea6b7e26f

                                                                                  SHA512

                                                                                  df68d02b520b0c325952fc67b76ab7f315f62c785534848b9f3ecc8dd150a7407342fad4fe0806954a289fb852b2a816139602a0bd9123f74ab5ad8914d7217e

                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                  Filesize

                                                                                  11KB

                                                                                  MD5

                                                                                  efe1b454c9480fb0416d58d6881501f0

                                                                                  SHA1

                                                                                  25f5e129e0a94ee55317d458db268ae5f6145550

                                                                                  SHA256

                                                                                  c8aee3e4ba6279e901ee0b5d149b19aa99d07862a306f691d4b3aff33d3ba3fd

                                                                                  SHA512

                                                                                  1672297ab924069a417bc9921ff1f0de3734fdb5831026383735727112f691369e8efe38f27536a860276d7ef23e06e3c404519052a81fb8db726cf3190a7bb8

                                                                                • C:\Users\Admin\AppData\Local\Temp\tmp2F15.tmp

                                                                                  Filesize

                                                                                  1KB

                                                                                  MD5

                                                                                  5493642e7b296d64631f01d8e009ed86

                                                                                  SHA1

                                                                                  c94e0ffa8d8197fc46e1832a656e58a94ff87a7f

                                                                                  SHA256

                                                                                  f595aa56975ecc91a910d7f29418713c1d4f24f7132a3e93d41576e357d15e85

                                                                                  SHA512

                                                                                  d2bfe7731995a983f1701ae8e675ebcc5b2436d642e5a7fa53e08ae5cb585f26860106796365713311453d4d2b08c5c82bd89bf3f50dc2691f7ea75703c54fd8

                                                                                • C:\Users\Admin\Downloads\Unconfirmed 103705.crdownload

                                                                                  Filesize

                                                                                  1.0MB

                                                                                  MD5

                                                                                  055d1462f66a350d9886542d4d79bc2b

                                                                                  SHA1

                                                                                  f1086d2f667d807dbb1aa362a7a809ea119f2565

                                                                                  SHA256

                                                                                  dddf7894b2e6aafa1903384759d68455c3a4a8348a7e2da3bd272555eba9bec0

                                                                                  SHA512

                                                                                  2c5e570226252bdb2104c90d5b75f11493af8ed1be8cb0fd14e3f324311a82138753064731b80ce8e8b120b3fe7009b21a50e9f4583d534080e28ab84b83fee1

                                                                                • C:\Users\Admin\Downloads\Unconfirmed 332337.crdownload

                                                                                  Filesize

                                                                                  321KB

                                                                                  MD5

                                                                                  600e0dbaefc03f7bf50abb0def3fb465

                                                                                  SHA1

                                                                                  1b5f0ac48e06edc4ed8243be61d71077f770f2b4

                                                                                  SHA256

                                                                                  61e6a93f43049712b5f2d949fd233fa8015fe4bef01b9e1285d3d87b12f894f2

                                                                                  SHA512

                                                                                  151eebac8f8f6e72d130114f030f048dff5bce0f99ff8d3a22e8fed7616155b3e87d29acf79f488d6b53ed2c5c9b05b57f76f1f91a568c21fe9bca228efb23d9

                                                                                • memory/1512-671-0x0000000000400000-0x0000000000553000-memory.dmp

                                                                                  Filesize

                                                                                  1.3MB

                                                                                • memory/1512-669-0x0000000000400000-0x0000000000553000-memory.dmp

                                                                                  Filesize

                                                                                  1.3MB

                                                                                • memory/3372-642-0x0000000005070000-0x0000000005078000-memory.dmp

                                                                                  Filesize

                                                                                  32KB

                                                                                • memory/3372-644-0x00000000056A0000-0x00000000056C8000-memory.dmp

                                                                                  Filesize

                                                                                  160KB

                                                                                • memory/3372-643-0x0000000005D10000-0x0000000005DAC000-memory.dmp

                                                                                  Filesize

                                                                                  624KB

                                                                                • memory/3372-641-0x0000000005350000-0x00000000053E2000-memory.dmp

                                                                                  Filesize

                                                                                  584KB

                                                                                • memory/3372-638-0x0000000005760000-0x0000000005D04000-memory.dmp

                                                                                  Filesize

                                                                                  5.6MB

                                                                                • memory/3372-630-0x0000000000520000-0x0000000000576000-memory.dmp

                                                                                  Filesize

                                                                                  344KB

                                                                                • memory/3852-827-0x0000000000400000-0x000000000056F000-memory.dmp

                                                                                  Filesize

                                                                                  1.4MB

                                                                                • memory/3852-6236-0x0000000000400000-0x000000000056F000-memory.dmp

                                                                                  Filesize

                                                                                  1.4MB

                                                                                • memory/3852-799-0x0000000000400000-0x000000000056F000-memory.dmp

                                                                                  Filesize

                                                                                  1.4MB

                                                                                • memory/9828-26293-0x0000000000400000-0x000000000056F000-memory.dmp

                                                                                  Filesize

                                                                                  1.4MB

                                                                                • memory/9828-26294-0x0000000000400000-0x000000000056F000-memory.dmp

                                                                                  Filesize

                                                                                  1.4MB

                                                                                • memory/9828-26296-0x0000000000400000-0x000000000056F000-memory.dmp

                                                                                  Filesize

                                                                                  1.4MB

                                                                                • memory/9868-26274-0x0000000000400000-0x000000000056F000-memory.dmp

                                                                                  Filesize

                                                                                  1.4MB

                                                                                • memory/9868-26283-0x0000000000400000-0x000000000056F000-memory.dmp

                                                                                  Filesize

                                                                                  1.4MB

                                                                                • memory/9868-26264-0x0000000000400000-0x000000000056F000-memory.dmp

                                                                                  Filesize

                                                                                  1.4MB

                                                                                • memory/10248-26288-0x0000000000400000-0x000000000056F000-memory.dmp

                                                                                  Filesize

                                                                                  1.4MB

                                                                                • memory/10248-26289-0x0000000000400000-0x000000000056F000-memory.dmp

                                                                                  Filesize

                                                                                  1.4MB

                                                                                • memory/10248-26292-0x0000000000400000-0x000000000056F000-memory.dmp

                                                                                  Filesize

                                                                                  1.4MB

                                                                                • memory/12148-26255-0x0000000000400000-0x000000000056F000-memory.dmp

                                                                                  Filesize

                                                                                  1.4MB

                                                                                • memory/12148-26250-0x0000000000400000-0x000000000056F000-memory.dmp

                                                                                  Filesize

                                                                                  1.4MB

                                                                                • memory/12148-19139-0x0000000000400000-0x000000000056F000-memory.dmp

                                                                                  Filesize

                                                                                  1.4MB

                                                                                • memory/12924-26254-0x0000000000400000-0x000000000056F000-memory.dmp

                                                                                  Filesize

                                                                                  1.4MB

                                                                                • memory/12924-26251-0x0000000000400000-0x000000000056F000-memory.dmp

                                                                                  Filesize

                                                                                  1.4MB

                                                                                • memory/12924-19143-0x0000000000400000-0x000000000056F000-memory.dmp

                                                                                  Filesize

                                                                                  1.4MB

                                                                                • memory/36424-26260-0x0000000000400000-0x000000000056F000-memory.dmp

                                                                                  Filesize

                                                                                  1.4MB

                                                                                • memory/36424-26269-0x0000000000400000-0x000000000056F000-memory.dmp

                                                                                  Filesize

                                                                                  1.4MB

                                                                                • memory/36424-26268-0x0000000000400000-0x000000000056F000-memory.dmp

                                                                                  Filesize

                                                                                  1.4MB

                                                                                • memory/36668-26275-0x0000000000400000-0x000000000056F000-memory.dmp

                                                                                  Filesize

                                                                                  1.4MB

                                                                                • memory/36668-26270-0x0000000000400000-0x000000000056F000-memory.dmp

                                                                                  Filesize

                                                                                  1.4MB

                                                                                • memory/36668-26261-0x0000000000400000-0x000000000056F000-memory.dmp

                                                                                  Filesize

                                                                                  1.4MB

                                                                                • memory/36692-26271-0x0000000000400000-0x000000000056F000-memory.dmp

                                                                                  Filesize

                                                                                  1.4MB

                                                                                • memory/36692-26278-0x0000000000400000-0x000000000056F000-memory.dmp

                                                                                  Filesize

                                                                                  1.4MB

                                                                                • memory/36692-26263-0x0000000000400000-0x000000000056F000-memory.dmp

                                                                                  Filesize

                                                                                  1.4MB

                                                                                • memory/36800-26279-0x0000000000400000-0x000000000056F000-memory.dmp

                                                                                  Filesize

                                                                                  1.4MB

                                                                                • memory/36800-26267-0x0000000000400000-0x000000000056F000-memory.dmp

                                                                                  Filesize

                                                                                  1.4MB

                                                                                • memory/36800-26285-0x0000000000400000-0x000000000056F000-memory.dmp

                                                                                  Filesize

                                                                                  1.4MB

                                                                                • memory/36820-26276-0x0000000000400000-0x000000000056F000-memory.dmp

                                                                                  Filesize

                                                                                  1.4MB

                                                                                • memory/36820-26284-0x0000000000400000-0x000000000056F000-memory.dmp

                                                                                  Filesize

                                                                                  1.4MB

                                                                                • memory/36820-26266-0x0000000000400000-0x000000000056F000-memory.dmp

                                                                                  Filesize

                                                                                  1.4MB

                                                                                • memory/36848-26282-0x0000000000400000-0x000000000056F000-memory.dmp

                                                                                  Filesize

                                                                                  1.4MB

                                                                                • memory/36848-26272-0x0000000000400000-0x000000000056F000-memory.dmp

                                                                                  Filesize

                                                                                  1.4MB

                                                                                • memory/36848-26265-0x0000000000400000-0x000000000056F000-memory.dmp

                                                                                  Filesize

                                                                                  1.4MB