Analysis

  • max time kernel
    481s
  • max time network
    593s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240802-en
  • resource tags

    arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    06-08-2024 04:53

General

  • Target

    https://gofile.io/d/DDro86

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 4 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 9 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 12 IoCs
  • Modifies registry class 5 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
  • Suspicious use of FindShellTrayWindow 33 IoCs
  • Suspicious use of SendNotifyMessage 12 IoCs
  • Suspicious use of SetWindowsHookEx 41 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://gofile.io/d/DDro86
    1⤵
    • Enumerates system info in registry
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1360
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7fff7c903cb8,0x7fff7c903cc8,0x7fff7c903cd8
      2⤵
        PID:3976
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2032,13048644260204825475,16263351775833845400,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=2044 /prefetch:2
        2⤵
          PID:4144
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2032,13048644260204825475,16263351775833845400,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2100 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:2576
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2032,13048644260204825475,16263351775833845400,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2732 /prefetch:8
          2⤵
            PID:396
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,13048644260204825475,16263351775833845400,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:1
            2⤵
              PID:1260
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,13048644260204825475,16263351775833845400,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:1
              2⤵
                PID:5008
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,13048644260204825475,16263351775833845400,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4884 /prefetch:1
                2⤵
                  PID:2556
                • C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2032,13048644260204825475,16263351775833845400,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5296 /prefetch:8
                  2⤵
                  • Suspicious behavior: EnumeratesProcesses
                  PID:4384
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,13048644260204825475,16263351775833845400,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5336 /prefetch:1
                  2⤵
                    PID:2532
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,13048644260204825475,16263351775833845400,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3520 /prefetch:1
                    2⤵
                      PID:4576
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2032,13048644260204825475,16263351775833845400,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5548 /prefetch:8
                      2⤵
                      • NTFS ADS
                      • Suspicious behavior: EnumeratesProcesses
                      PID:5100
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=2032,13048644260204825475,16263351775833845400,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5740 /prefetch:8
                      2⤵
                      • Suspicious behavior: EnumeratesProcesses
                      PID:4184
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,13048644260204825475,16263351775833845400,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3624 /prefetch:1
                      2⤵
                        PID:2272
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,13048644260204825475,16263351775833845400,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5000 /prefetch:1
                        2⤵
                          PID:3140
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,13048644260204825475,16263351775833845400,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5392 /prefetch:1
                          2⤵
                            PID:4112
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,13048644260204825475,16263351775833845400,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5504 /prefetch:1
                            2⤵
                              PID:2300
                            • C:\Program Files\Microsoft Office\root\Office16\Winword.exe
                              "C:\Program Files\Microsoft Office\root\Office16\Winword.exe" /n "C:\Users\Admin\Downloads\LLOVIO+EXECUTOR.rar"
                              2⤵
                              • Checks processor information in registry
                              • Enumerates system info in registry
                              • Suspicious behavior: AddClipboardFormatListener
                              • Suspicious use of SetWindowsHookEx
                              PID:4364
                            • C:\Program Files\Microsoft Office\root\Office16\Winword.exe
                              "C:\Program Files\Microsoft Office\root\Office16\Winword.exe" /n "C:\Users\Admin\Downloads\LLOVIO+EXECUTOR.rar"
                              2⤵
                                PID:2504
                              • C:\Program Files\Microsoft Office\root\Office16\Winword.exe
                                "C:\Program Files\Microsoft Office\root\Office16\Winword.exe" /n "C:\Users\Admin\Downloads\LLOVIO+EXECUTOR.rar"
                                2⤵
                                  PID:2780
                                • C:\Program Files\Microsoft Office\root\Office16\Winword.exe
                                  "C:\Program Files\Microsoft Office\root\Office16\Winword.exe" /n "C:\Users\Admin\Downloads\LLOVIO+EXECUTOR.rar"
                                  2⤵
                                    PID:2464
                                  • C:\Program Files\Microsoft Office\root\Office16\Winword.exe
                                    "C:\Program Files\Microsoft Office\root\Office16\Winword.exe" /n "C:\Users\Admin\Downloads\LLOVIO+EXECUTOR.rar"
                                    2⤵
                                      PID:2788
                                    • C:\Program Files\Microsoft Office\root\Office16\Winword.exe
                                      "C:\Program Files\Microsoft Office\root\Office16\Winword.exe" /n "C:\Users\Admin\Downloads\LLOVIO+EXECUTOR.rar"
                                      2⤵
                                      • Checks processor information in registry
                                      • Enumerates system info in registry
                                      • Suspicious behavior: AddClipboardFormatListener
                                      • Suspicious use of SetWindowsHookEx
                                      PID:6108
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2032,13048644260204825475,16263351775833845400,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=5960 /prefetch:2
                                      2⤵
                                      • Suspicious behavior: EnumeratesProcesses
                                      PID:1364
                                  • C:\Windows\System32\CompPkgSrv.exe
                                    C:\Windows\System32\CompPkgSrv.exe -Embedding
                                    1⤵
                                      PID:4676
                                    • C:\Windows\System32\CompPkgSrv.exe
                                      C:\Windows\System32\CompPkgSrv.exe -Embedding
                                      1⤵
                                        PID:4156
                                      • C:\Windows\system32\OpenWith.exe
                                        C:\Windows\system32\OpenWith.exe -Embedding
                                        1⤵
                                        • Modifies registry class
                                        • Suspicious use of SetWindowsHookEx
                                        PID:3312
                                      • C:\Windows\system32\OpenWith.exe
                                        C:\Windows\system32\OpenWith.exe -Embedding
                                        1⤵
                                        • Modifies registry class
                                        • Suspicious use of SetWindowsHookEx
                                        PID:1336
                                      • C:\Windows\system32\OpenWith.exe
                                        C:\Windows\system32\OpenWith.exe -Embedding
                                        1⤵
                                        • Modifies registry class
                                        • Suspicious behavior: GetForegroundWindowSpam
                                        • Suspicious use of SetWindowsHookEx
                                        PID:5116
                                        • C:\Program Files\Microsoft Office\root\Office16\Winword.exe
                                          "C:\Program Files\Microsoft Office\root\Office16\Winword.exe" /n "C:\Users\Admin\Downloads\LLOVIO+EXECUTOR.rar"
                                          2⤵
                                          • Checks processor information in registry
                                          • Enumerates system info in registry
                                          • Suspicious behavior: AddClipboardFormatListener
                                          • Suspicious use of SetWindowsHookEx
                                          PID:1472
                                      • C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe
                                        "C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca
                                        1⤵
                                        • Modifies registry class
                                        • Suspicious use of SetWindowsHookEx
                                        PID:4604
                                      • C:\Windows\system32\svchost.exe
                                        C:\Windows\system32\svchost.exe -k LocalService -p -s NPSMSvc
                                        1⤵
                                          PID:5276
                                        • C:\Windows\System32\oobe\UserOOBEBroker.exe
                                          C:\Windows\System32\oobe\UserOOBEBroker.exe -Embedding
                                          1⤵
                                          • Drops file in Windows directory
                                          PID:5508
                                        • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exe
                                          C:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exe -Embedding
                                          1⤵
                                          • System Location Discovery: System Language Discovery
                                          PID:5544

                                        Network

                                        MITRE ATT&CK Enterprise v15

                                        Replay Monitor

                                        Loading Replay Monitor...

                                        Downloads

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                          Filesize

                                          152B

                                          MD5

                                          9828ffacf3deee7f4c1300366ec22fab

                                          SHA1

                                          9aff54b57502b0fc2be1b0b4b3380256fb785602

                                          SHA256

                                          a3d21f0fb6563a5c9d0f7a6e9c125ec3faaa86ff43f37cb85a8778abc87950f7

                                          SHA512

                                          2e73ea4d2fcd7c8d52487816110f5f4a808ed636ae87dd119702d1cd1ae315cbb25c8094a9dddf18f07472b4deaed3e7e26c9b499334b26bdb70d4fa7f84168d

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                          Filesize

                                          152B

                                          MD5

                                          6fdbe80e9fe20761b59e8f32398f4b14

                                          SHA1

                                          049b1f0c6fc4e93a4ba6b3c992f1d6cecf3ada1f

                                          SHA256

                                          b7f0d9ece2307bdc4f05a2d814c947451b007067ff8af977f77f06c3d5706942

                                          SHA512

                                          cf25c7fd0d6eccc46e7b58949c16d17ebeefb7edd6c76aa62f7ab5da52d1c6fc88bde620be40396d336789bd0d62b2162209a947d7ab69389e8c03682e880234

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                          Filesize

                                          288B

                                          MD5

                                          24d0f93e0b08b7fb26d3439a53583bf1

                                          SHA1

                                          7bc6dfb018a57c4e825bdcb755c6ab013f98c111

                                          SHA256

                                          c6ef9ea514184d1ab7ad725f3b34578d85e00061ad9c0a9b943eaed18406004d

                                          SHA512

                                          cfb0d6d72d6992200ad02c87cf4dc0adc291618f5650cd6225929a303bbef605c72be2913cdf42ddd626e78b3916cac41dbd8e46b3247129cd68ec1ae1d4205d

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                          Filesize

                                          391B

                                          MD5

                                          5f05b26e0caccbee54089cb0044220cc

                                          SHA1

                                          e76ead734684a93a820d05c76824d5445f28f584

                                          SHA256

                                          256bcc760870f0a18774ed0999652be257776a2049eba989bda8f359b1507dcc

                                          SHA512

                                          29ecfa0586aaf62f2e6a90d2623fb01c7bb156993f2ed00085d8dcc97026b48aad69f27855cf3231d6f3d5c388a81367ec9e27ea47cefd50c530d08862292dd7

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                          Filesize

                                          5KB

                                          MD5

                                          e55b2399ed7970db767a8e05c0d62da6

                                          SHA1

                                          03de27eccc7b543654b973f56726acc5033b5c09

                                          SHA256

                                          11c5fdbecb754f5b90c12c9ebc941354e7d007527283afe6fc649315777143d9

                                          SHA512

                                          49be42e00d2b6e88eae553e03e0708e35498150cb974bb2081fba049750952b9c58232145d851f88609c417cd9cb4264f9ce622f7b8815de891d453cede1cf15

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                          Filesize

                                          6KB

                                          MD5

                                          aa6a21e2532b5e39684b852fbab4e9f1

                                          SHA1

                                          4dc05ef365cfe2d1c038dec3df8e4c4d01d20828

                                          SHA256

                                          030c3b519878fdb1a6887b6e8e9d3d179128559db84992937118b91480bcdcad

                                          SHA512

                                          3034fca84abe02dad2dc341364da466fc5f3a10d8191a346a625c02b5010d953b76d74ae2d90723dbcc0a6b34fbf6dbee876dff1169b3db337d167b6cc447345

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                          Filesize

                                          16B

                                          MD5

                                          46295cac801e5d4857d09837238a6394

                                          SHA1

                                          44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                          SHA256

                                          0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                          SHA512

                                          8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                          Filesize

                                          16B

                                          MD5

                                          206702161f94c5cd39fadd03f4014d98

                                          SHA1

                                          bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                                          SHA256

                                          1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                                          SHA512

                                          0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                          Filesize

                                          11KB

                                          MD5

                                          ae123cebe35862ce90d5b041b5fd3238

                                          SHA1

                                          276b799198b4dba933585becc547626c614b6af6

                                          SHA256

                                          22e01239c45db02e60f7f08431988b09532660ccfeccf5ef7a405b69c07ac09f

                                          SHA512

                                          2196980786887074cde3d892a0364b0e64cfc2cc4bd60beefbec6b612b9449e6ab69104105e31caa386918734f7cdc6ddbcd7211bde2e3897b96b7ead17193cd

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                          Filesize

                                          11KB

                                          MD5

                                          2dc413acf2ca3732d8ab789b800b5c4b

                                          SHA1

                                          c763642f61dde2d79d2351a2fae94af640da5a58

                                          SHA256

                                          f86d29eeebbee26c1cc6d99fad239f19a70bd496de47835aa98f88dc1d401f6f

                                          SHA512

                                          eeab5af4991dbf22fa79cb8e5503ed9121709686417cf7fd41128f0955e6777068d71c442ac4b548de002de2e2dd18d1cec095f35bcd151ef8e663640079c2ba

                                        • C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\Floodgate\Word.CampaignStates.json

                                          Filesize

                                          21B

                                          MD5

                                          f1b59332b953b3c99b3c95a44249c0d2

                                          SHA1

                                          1b16a2ca32bf8481e18ff8b7365229b598908991

                                          SHA256

                                          138e49660d259061d8152137abd8829acdfb78b69179890beb489fe3ffe23e0c

                                          SHA512

                                          3c1f99ecc394df3741be875fbe8d95e249d1d9ac220805794a22caf81620d5fdd3cce19260d94c0829b3160b28a2b4042e46b56398e60f72134e49254e9679a4

                                        • C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\Floodgate\Word.GovernedChannelStates.json

                                          Filesize

                                          417B

                                          MD5

                                          c56ff60fbd601e84edd5a0ff1010d584

                                          SHA1

                                          342abb130dabeacde1d8ced806d67a3aef00a749

                                          SHA256

                                          200e8cc8dd12e22c9720be73092eafb620435d4569dbdcdba9404ace2aa4343c

                                          SHA512

                                          acd2054fddb33b55b58b870edd4eb6a3cdd3131dfe6139cb3d27054ac2b2a460694c9be9c2a1da0f85606e95e7f393cf16868b6c654e78a664799bc3418da86e

                                        • C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\Floodgate\Word.Settings.json

                                          Filesize

                                          87B

                                          MD5

                                          e4e83f8123e9740b8aa3c3dfa77c1c04

                                          SHA1

                                          5281eae96efde7b0e16a1d977f005f0d3bd7aad0

                                          SHA256

                                          6034f27b0823b2a6a76fe296e851939fd05324d0af9d55f249c79af118b0eb31

                                          SHA512

                                          bd6b33fd2bbce4a46991bc0d877695d16f7e60b1959a0defc79b627e569e5c6cac7b4ad4e3e1d8389a08584602a51cf84d44cf247f03beb95f7d307fbba12bb9

                                        • C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\Floodgate\Word.SurveyEventActivityStats.json

                                          Filesize

                                          14B

                                          MD5

                                          6ca4960355e4951c72aa5f6364e459d5

                                          SHA1

                                          2fd90b4ec32804dff7a41b6e63c8b0a40b592113

                                          SHA256

                                          88301f0b7e96132a2699a8bce47d120855c7f0a37054540019e3204d6bcbaba3

                                          SHA512

                                          8544cd778717788b7484faf2001f463320a357db63cb72715c1395ef19d32eec4278bab07f15de3f4fed6af7e4f96c41908a0c45be94d5cdd8121877eccf310d

                                        • C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\WebServiceCache\AllUsers\officeclient.microsoft.com\C4098F2A-5035-46E8-951B-232FC1B72506

                                          Filesize

                                          169KB

                                          MD5

                                          82d5a0e3b804e5b94feb6a9ec24995af

                                          SHA1

                                          3f5b9f270626654a60cae22d1d58a21ae1aab4c3

                                          SHA256

                                          4d23cbab0ac86740d1393b91b68de17b6d37326e8581e2c78afda22800de2c4a

                                          SHA512

                                          e2dcb714794badc2e9ba655f1556206e21d84026f155ae7e03967517c98c7ae846317c5eb0a0a8ea0fd18c85b1cc13ea4b372ab9bd98f0c0aa804ba23271ddfa

                                        • C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\winword.exe_Rules.xml

                                          Filesize

                                          331KB

                                          MD5

                                          299790eb4da891c0cad926473bdea5f7

                                          SHA1

                                          dacbd07b42d91a20ba9bfcdee5cdd75ce15644da

                                          SHA256

                                          6fac6770bea97503592e79ac1d458450afd373eb2fa1accf4218d5ee447d52d9

                                          SHA512

                                          3ab4b0d6b5c1eecc6b3fb37ffdf061713906c92b6c2e15f7f869f7b6a8b45a6dd069743080f3fe57f9726770f49a8826b07f50987fa148b882593481bb3670be

                                        • C:\Users\Admin\AppData\Local\Microsoft\Office\OTele\winword.exe.db

                                          Filesize

                                          24KB

                                          MD5

                                          8665de22b67e46648a5a147c1ed296ca

                                          SHA1

                                          b289a96fee9fa77dd8e045ae8fd161debd376f48

                                          SHA256

                                          b5cbae5c48721295a51896f05abd4c9566be7941cda7b8c2aecb762e6e94425f

                                          SHA512

                                          bb03ea9347d302abf3b6fece055cdae0ad2d7c074e8517f230a90233f628e5803928b9ba7ba79c343e58dacb3e7a6fc16b94690a5ab0c71303959654a18bb5da

                                        • C:\Users\Admin\AppData\Local\Microsoft\Office\OTele\winword.exe.db

                                          Filesize

                                          24KB

                                          MD5

                                          085ebd119f5fc6b8f63720fac1166ff5

                                          SHA1

                                          af066018aadec31b8e70a124a158736aca897306

                                          SHA256

                                          b8411fe8ec499074fca9047f6983d920279e84ddf3b02b2dd5c08cf07ec44687

                                          SHA512

                                          adb0522830db26123347cb485c43b156f5c888510e52091ba0fafc22b650ad29630c027746c920321905c28259dce7ff63dded93a79efddd5567c68312117875

                                        • C:\Users\Admin\Downloads\LLOVIO+EXECUTOR.rar

                                          Filesize

                                          75KB

                                          MD5

                                          3a895d07aef9b82c5489200a238d671f

                                          SHA1

                                          2c5ffce8651675172d7717ca6ba568c67bed8d33

                                          SHA256

                                          540b521866b3cbc424423edcfcd3916ff0d7390d70378ba59b54901d19ffe604

                                          SHA512

                                          2e84461620ac606f4041215837ce161bd9efd93aa8fb19fc6baa8a9bfa61ee229b48762084976dc09d2e8b4ee47ac85d78e140b2c8a5be6b9bf8a60ead919202

                                        • C:\Users\Admin\Downloads\LLOVIO+EXECUTOR.rar:Zone.Identifier

                                          Filesize

                                          164B

                                          MD5

                                          b73ca87f84fc17d7d51155b50bf7538d

                                          SHA1

                                          c8d3466f788da7e1cce4e5393ded578d9f4aa68a

                                          SHA256

                                          7d7974cbd8d9058bdcc266398319c6bd4cd13582ec4b88d5c37d74e5d9dd5dcd

                                          SHA512

                                          699730b937d0f97a232cbc584fee3a04afa7d3058f04a237a3560197e8b730d2279d79ceeed72f8d4d307cb414a3650ba981e2a55e2912b1a633aa574a55e2fd

                                        • memory/1472-110-0x00007FFF4C1B0000-0x00007FFF4C1C0000-memory.dmp

                                          Filesize

                                          64KB

                                        • memory/1472-177-0x00007FFF4C1B0000-0x00007FFF4C1C0000-memory.dmp

                                          Filesize

                                          64KB

                                        • memory/1472-178-0x00007FFF4C1B0000-0x00007FFF4C1C0000-memory.dmp

                                          Filesize

                                          64KB

                                        • memory/1472-179-0x00007FFF4C1B0000-0x00007FFF4C1C0000-memory.dmp

                                          Filesize

                                          64KB

                                        • memory/1472-176-0x00007FFF4C1B0000-0x00007FFF4C1C0000-memory.dmp

                                          Filesize

                                          64KB

                                        • memory/1472-109-0x00007FFF4C1B0000-0x00007FFF4C1C0000-memory.dmp

                                          Filesize

                                          64KB

                                        • memory/1472-111-0x00007FFF4C1B0000-0x00007FFF4C1C0000-memory.dmp

                                          Filesize

                                          64KB

                                        • memory/1472-114-0x00007FFF49EA0000-0x00007FFF49EB0000-memory.dmp

                                          Filesize

                                          64KB

                                        • memory/1472-113-0x00007FFF49EA0000-0x00007FFF49EB0000-memory.dmp

                                          Filesize

                                          64KB

                                        • memory/1472-108-0x00007FFF4C1B0000-0x00007FFF4C1C0000-memory.dmp

                                          Filesize

                                          64KB

                                        • memory/1472-112-0x00007FFF4C1B0000-0x00007FFF4C1C0000-memory.dmp

                                          Filesize

                                          64KB