Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/10/2024, 00:51

General

  • Target

    Engine Spoofer 2.0.5/Engine - Clean.exe

  • Size

    3.0MB

  • MD5

    007decaa4162946f4afae58675ea24f2

  • SHA1

    a86eb4dffba6fa651ffdc016dc8cab9f6b583f46

  • SHA256

    4d623323722623c396d129c980835c6c008c3fc10833e2e0220bfcd8969151aa

  • SHA512

    1d60d4e882eabbcdcf76689b9c330b23edad748e578fa5db26f7b2f39dd4e6217f99577868d4a30c78d8f68ecedcaf36516736894f0463a69084d799bd0e2cc6

  • SSDEEP

    49152:MeneANrcDamp/RMaBejg2CgEmweT0ibbFlx9SZUGZmCvZKHHkNKNNNpNNNmy:ze4rAa4/R7ejgISeThbFf9SZMqsc

Malware Config

Extracted

Family

xworm

C2

127.0.0.1:8080

51.89.201.41:8080

Attributes
  • Install_directory

    %ProgramData%

  • install_file

    ApplicationFrameHost.exe

Extracted

Family

redline

Botnet

Second

C2

51.89.201.41:29254

Signatures

  • Detect Xworm Payload 2 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Redline family
  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 2 IoCs
  • Sectoprat family
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 6 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 48 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 26 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\Engine Spoofer 2.0.5\Engine - Clean.exe
    "C:\Users\Admin\AppData\Local\Temp\Engine Spoofer 2.0.5\Engine - Clean.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3204
    • C:\ProgramData\unbinded.exe
      "C:\ProgramData\unbinded.exe"
      2⤵
      • Checks computer location settings
      • Drops startup file
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3932
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\unbinded.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4560
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'unbinded.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1444
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\ApplicationFrameHost.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2736
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'ApplicationFrameHost.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2020
      • C:\Windows\System32\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "ApplicationFrameHost" /tr "C:\ProgramData\ApplicationFrameHost.exe"
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:4868
    • C:\ProgramData\build.exe
      "C:\ProgramData\build.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:2788
    • C:\ProgramData\Engine - Clean.exe
      "C:\ProgramData\Engine - Clean.exe"
      2⤵
      • Executes dropped EXE
      PID:2932
  • C:\ProgramData\ApplicationFrameHost.exe
    C:\ProgramData\ApplicationFrameHost.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    PID:1860
  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe"
    1⤵
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4824
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x118,0x11c,0x120,0xf4,0x124,0x7ffbf7f1cc40,0x7ffbf7f1cc4c,0x7ffbf7f1cc58
      2⤵
        PID:5100
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2320,i,11372913833245362383,8514986147019612710,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2316 /prefetch:2
        2⤵
          PID:2724
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1932,i,11372913833245362383,8514986147019612710,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2536 /prefetch:3
          2⤵
            PID:4388
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=1996,i,11372913833245362383,8514986147019612710,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2696 /prefetch:8
            2⤵
              PID:3188
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3168,i,11372913833245362383,8514986147019612710,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3132 /prefetch:1
              2⤵
                PID:2056
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3124,i,11372913833245362383,8514986147019612710,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3360 /prefetch:1
                2⤵
                  PID:3676
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4568,i,11372913833245362383,8514986147019612710,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3680 /prefetch:1
                  2⤵
                    PID:2280
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4700,i,11372913833245362383,8514986147019612710,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4688 /prefetch:8
                    2⤵
                      PID:2364
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4696,i,11372913833245362383,8514986147019612710,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4828 /prefetch:8
                      2⤵
                        PID:5036
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4412,i,11372913833245362383,8514986147019612710,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4768 /prefetch:8
                        2⤵
                          PID:4836
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4788,i,11372913833245362383,8514986147019612710,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4772 /prefetch:8
                          2⤵
                            PID:5036
                          • C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe
                            "C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe" --reenable-autoupdates --system-level
                            2⤵
                            • Drops file in Program Files directory
                            PID:3180
                            • C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe
                              "C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x28c,0x290,0x294,0x268,0x298,0x7ff764454698,0x7ff7644546a4,0x7ff7644546b0
                              3⤵
                              • Drops file in Program Files directory
                              PID:2736
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --field-trial-handle=4712,i,11372913833245362383,8514986147019612710,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4836 /prefetch:1
                            2⤵
                              PID:212
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --field-trial-handle=3536,i,11372913833245362383,8514986147019612710,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3548 /prefetch:1
                              2⤵
                                PID:5540
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=5208,i,11372913833245362383,8514986147019612710,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5236 /prefetch:8
                                2⤵
                                • Suspicious behavior: EnumeratesProcesses
                                PID:6132
                            • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                              "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                              1⤵
                                PID:5052
                              • C:\Windows\system32\svchost.exe
                                C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                                1⤵
                                  PID:3416
                                • C:\ProgramData\ApplicationFrameHost.exe
                                  C:\ProgramData\ApplicationFrameHost.exe
                                  1⤵
                                  • Executes dropped EXE
                                  PID:6120
                                • C:\ProgramData\ApplicationFrameHost.exe
                                  C:\ProgramData\ApplicationFrameHost.exe
                                  1⤵
                                  • Executes dropped EXE
                                  PID:1536

                                Network

                                MITRE ATT&CK Enterprise v15

                                Replay Monitor

                                Loading Replay Monitor...

                                Downloads

                                • C:\ProgramData\Engine - Clean.exe

                                  Filesize

                                  1.7MB

                                  MD5

                                  a865bac6ef42d6c5b19ce21f0354a902

                                  SHA1

                                  06caff2aaa241849e46a2bab7680d565d61c6b84

                                  SHA256

                                  4102f51991d25c6e12e74d7029b3613010595aca6612d8a2919b3086b9152e61

                                  SHA512

                                  74f20cbac511c9647a7ced453eb110b78e8314cc0c774bb9609bbd6d1e293712478929bc5c027891dd2d1d9de452a305e27ed2f4ff93afb3612f703c98af2e3e

                                • C:\ProgramData\MetroFramework.Fonts.dll

                                  Filesize

                                  656KB

                                  MD5

                                  612080028164b12939751dcccbb68d4a

                                  SHA1

                                  db066593c63d2eff41a5af1b49a3e098b60e0013

                                  SHA256

                                  e96030fddaf7e78401567ee82480ad75ee48d3556199a3f85c0ec669edac2ef4

                                  SHA512

                                  1879c960e27e32941c0c992b84803e7a1f8d243bfc88d17d3d32baca772290b9ea60a6ea90d53170be3bf7f0a58fe71ec901dc66aa560b4bf68b1da56c09fe18

                                • C:\ProgramData\MetroFramework.dll

                                  Filesize

                                  149KB

                                  MD5

                                  44538b311e9ec2bcf0a6452702628d99

                                  SHA1

                                  da67301539903775708e9ec913654851e9e8eade

                                  SHA256

                                  baf326f52d39155d722465947f4cc67e6e90cfd0f89954eab959568e9bc342aa

                                  SHA512

                                  b65e3bc1c0f7b4c8f778cf52a36d628301d60aab53fdaf0355163e4865bc3d3adbf8870bb6cefc604708fdf2c0e72258eaf2fe301d524af2f77bc08014c9610a

                                • C:\ProgramData\build.exe

                                  Filesize

                                  95KB

                                  MD5

                                  ef6721cf0bd7437d8bca647ead8f0120

                                  SHA1

                                  7a2bd21a58d9a468380a47dfd81505b56cce613b

                                  SHA256

                                  0ed605c6122fa4b3d84e89dd3dde7e3fca0aef0687935c1201f55d31a594d56b

                                  SHA512

                                  70f28c80f7beebe6df040b07dcc782245d71a93102041c971c1cdfaeed2e8556fe3f641201486b7bbfbb30f6c511a678cf499328911a8c8d66ef2be16affb076

                                • C:\ProgramData\unbinded.exe

                                  Filesize

                                  244KB

                                  MD5

                                  58471a0ddd6dedc736742d6a3df2a316

                                  SHA1

                                  14af48beecc60cb181d72ba59ec2d6a075a9b9a1

                                  SHA256

                                  84c9a4dd34de4182ac6bb2296302c00b54d9f948ee9b2d70a882c16b308dd881

                                  SHA512

                                  2bc27010a11e97c96ea4b386e0691741c0a7daf22715abf2afd35b4c8d5ca419eb3cef373af175feaa3d6fdc89353ec48443aaff0fa59c2383e5d6340bccd850

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

                                  Filesize

                                  649B

                                  MD5

                                  27a175f34e1136632a418650a0f9ccfb

                                  SHA1

                                  efb2b9c45ba4980ffd3f4bca85847adb6474f6cb

                                  SHA256

                                  415f2f248f91ac162d51617120e908ae6563c6acd59a925c919ec8a1eccdbd8c

                                  SHA512

                                  9aa16dd1f1406c8aef803a90544511bb907f6054fc1fd9585a0907bc1cfa375c2cdd8f6ced24b7ce059e082bc979e0de9c6fc42a09076266940fbc446b8239dc

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                                  Filesize

                                  744B

                                  MD5

                                  f73b594089f70975d522707452f87968

                                  SHA1

                                  28e402062dc5847e69e184592b6c490bc0c1146e

                                  SHA256

                                  21610137004e1607b0efdd735a67e4490fc6e4273bd280c1ebbcb5ad1284f09a

                                  SHA512

                                  54ebc995321ba9eb8a34e7db3d3aa947436f99b0b6b91e6b3c9f60daa2ecbd9e46abfe885f64d41fbdb858151fd3c7107320a65a3bb05e26786bc1da8ce5064c

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                  Filesize

                                  7KB

                                  MD5

                                  9d19f6c7f53d120aaf21d77b6fa040c2

                                  SHA1

                                  5eb6fc5f873a48430e2907c6c84a957e506a6665

                                  SHA256

                                  f45e8e6f0a33c4a2e5d1781a0bcae14f99ff91a0c494162f11b0f47abb09ce66

                                  SHA512

                                  c034caa6c4514b95f5cf492ee573e0816744452666b06f2f3c8b69a53dd56353b9ce1802a7d78f7e57dba41bc0f0e0afa7e01a06b3c6f91459a0909fbebd479e

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                  Filesize

                                  2B

                                  MD5

                                  d751713988987e9331980363e24189ce

                                  SHA1

                                  97d170e1550eee4afc0af065b78cda302a97674c

                                  SHA256

                                  4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                  SHA512

                                  b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                  Filesize

                                  1KB

                                  MD5

                                  d001483bef48fec081cbea8e27f0fbfa

                                  SHA1

                                  5ad1b973d89df3ba5422818f0b0245fbd1cebc8e

                                  SHA256

                                  29538e3974d7f26022dca8eed5dec5982778ad91f32de07f8b4b0e24c1a49d1d

                                  SHA512

                                  ab8bed3f6edfa928e2a8e216d8f0c51fb84f75ba08fc8f924cd05b0c04ad6a61015683eed4ca5e10679b1644d2dfc0c0e0759e3a64223d6b3f625b49c3b88ddc

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                  Filesize

                                  356B

                                  MD5

                                  c7063ade259e726c8dda868524c893b2

                                  SHA1

                                  290848ae465df6b9e4301a3f4ea5915a20db0dc6

                                  SHA256

                                  68ce589115e23068e37a51cafe1b5dbaf86eaee7c5e6e0c3e31bc6976278fdbd

                                  SHA512

                                  074c1cc7893a7da43f9e71dae143c7340ed847311aae3ed93a31a21db116cdd1e4d5a6ddd9671e590b03ca28c47c42444249d08b594a4aa3e760114911e820ad

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                  Filesize

                                  9KB

                                  MD5

                                  12f10eafcbcbae2c4081cb179fd19f71

                                  SHA1

                                  4a4439832d53de54614497ebe846629de4e20cbd

                                  SHA256

                                  ba08d803a0196ab8137aea0e36f161cf8bc68b817b2dc9244115a24a8f2a9547

                                  SHA512

                                  f17919b08e39cbc033c8cc12aea4da6a679c083eb76152498a5123fea3a7209008ab58765af0a8f88643d29ab0b7bd374df9a2b5e521c0bfb3b822c2edc32396

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                  Filesize

                                  9KB

                                  MD5

                                  443d924009b49b14a5d6fee2ca4f2abd

                                  SHA1

                                  c8527a17219f683e16e664a810a47a541cd9cf98

                                  SHA256

                                  0e4284afa491ac3d4ca51f7e2659cac215616fbb4f889b448a69777b90226087

                                  SHA512

                                  c602267cd67b81b0653b7557441819e15019c94f543083ddb89dea63885fec43ad3973ddfa4df94b11e435917b815f146dd9e33c48a3b6c4a822cfac6374a6fd

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                  Filesize

                                  9KB

                                  MD5

                                  1105bf0ffd46f48ae039932fc442009a

                                  SHA1

                                  70587e8e4b6085e8d325d2d18b09e7eb659491b9

                                  SHA256

                                  abbdb1a8a21a4bc233cc05e627b6ab2e96a152d1f1d6b81b9e049f2e6f9ee51c

                                  SHA512

                                  21911b22e033c25a36ba9fee5ab7d7881186ec77bcefc04e387fd55bcbc353aa29a881adaf6cf300ee36bb325701a3c2ab6c37f69d3618e68ba64893b548544a

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                  Filesize

                                  10KB

                                  MD5

                                  b0c8841a405a31812c14d828726efe95

                                  SHA1

                                  873ff6867b1edc7c1e6ab8311aef6599e629f965

                                  SHA256

                                  8865fd4dd6a8c8d656aaa4c188cc3c8e555a02b1006f0b882e51d726da8dbfdf

                                  SHA512

                                  9bc5ed100aa7e0113680d97f21874475b38234817297d2af9ff680eeccf855bc63a7089865daa15e2f4c75699dc0a005888c96c063122a9c39004e1db061d0e9

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                  Filesize

                                  9KB

                                  MD5

                                  06540bd6cda65aa951d59a2b740026a7

                                  SHA1

                                  1f5a5014ebad35a1ca1a66ec7339239d868ec606

                                  SHA256

                                  c803419b58676302944d9a86b5028f302e6627b4de1af03ec877adeee8af137a

                                  SHA512

                                  7210a861094ba994c05a02ee02f4461ce314b2b24e448c04d17b91bedd9ec9ff7d4d47a7fff0da73e3c8ecef19072f08ae6fc32870f9d2bc4bbdd69295e4a68a

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                  Filesize

                                  10KB

                                  MD5

                                  4223547dd7395d6a8ed5162992f7836b

                                  SHA1

                                  3536164617a319843e21d57360eb44aa05b4feda

                                  SHA256

                                  8ea6b80eb87cd607055b02fc1041edb1c804df79215c536ed4d7e9d5e78e9ea1

                                  SHA512

                                  f7a5550d15e9d03904be6e6ece9ef7532a62b7dcdf224ebc2d4c62217a491af4b0a377b17fe8575a12844676db7d4aae6b81b8cec8e32cd463c8b95dcceefc05

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                  Filesize

                                  10KB

                                  MD5

                                  fde3c33e6ea7ba27e6afc9f8b82edba8

                                  SHA1

                                  9f2db5941d207c73938e91e0f1f8b4745d6f4089

                                  SHA256

                                  fa44c40952bdcd3bcb7e09f3aeff0ef40ce9fe795c232c4f07e836a4af3aa5bd

                                  SHA512

                                  4e87e5cc6833e375e190f6fc29040f57593931a5afec8bbc14270ed4591d50a7eefbbbebbac3208f3d06b5f093723e743d4422ba6212756ccc0ba0d1f565b03a

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                                  Filesize

                                  15KB

                                  MD5

                                  ef042fdae3d3f74c577e6ad5e21a04c3

                                  SHA1

                                  53c5a4c7175dfd53d9cbdca44a245bfdb2368a12

                                  SHA256

                                  b9db697ebc70dc862030a77579565f5cc7dd554f5a4e202058a1d8b62a8fa2ed

                                  SHA512

                                  e5f25858b47867b3cd035e833ad57944d10c9704e6bcef38547e29c843e863b8898ac8fc8af0255ddd5db502f22c8830d00efbec66d106999973c85dabe5cd5b

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                  Filesize

                                  231KB

                                  MD5

                                  0796a8363cd9e2770a159c666257c1f4

                                  SHA1

                                  97ab6ee54c610897f1f9eb646cbcb916c12c1670

                                  SHA256

                                  8ac893ce6b05c7bd1eb10f2094673b158c415e753256e095d67987ebe290431a

                                  SHA512

                                  529dddef53115f0bf68d259adcfa0aa41d33ee23b108b03247128e97e2f349a364690957fd479e8e7230b1f3541b75af79f0c56cf3d8cb347b3bcb1dc76ce1b6

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                  Filesize

                                  231KB

                                  MD5

                                  b0120b340bd87fe916070966a58aeac1

                                  SHA1

                                  e854c37046cf5be3719d2993264ec40a4b97d111

                                  SHA256

                                  00dfc73eee2112d384056fa610685eb94453ee421ac7f9b96f9befc052d0dd30

                                  SHA512

                                  9f20ff19c386eed8232907f73ca03dae3515b4fa8472aa42eabb2b60aa6db17f2b7130094782eb61842dc32f58bc5faff5765e5de82acb2e0fd5eca4167c74de

                                • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\Engine - Clean.exe.log

                                  Filesize

                                  654B

                                  MD5

                                  2ff39f6c7249774be85fd60a8f9a245e

                                  SHA1

                                  684ff36b31aedc1e587c8496c02722c6698c1c4e

                                  SHA256

                                  e1b91642d85d98124a6a31f710e137ab7fd90dec30e74a05ab7fcf3b7887dced

                                  SHA512

                                  1d7e8b92ef4afd463d62cfa7e8b9d1799db5bf2a263d3cd7840df2e0a1323d24eb595b5f8eb615c6cb15f9e3a7b4fc99f8dd6a3d34479222e966ec708998aed1

                                • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                  Filesize

                                  2KB

                                  MD5

                                  d85ba6ff808d9e5444a4b369f5bc2730

                                  SHA1

                                  31aa9d96590fff6981b315e0b391b575e4c0804a

                                  SHA256

                                  84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

                                  SHA512

                                  8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                  Filesize

                                  944B

                                  MD5

                                  6d42b6da621e8df5674e26b799c8e2aa

                                  SHA1

                                  ab3ce1327ea1eeedb987ec823d5e0cb146bafa48

                                  SHA256

                                  5ab6a1726f425c6d0158f55eb8d81754ddedd51e651aa0a899a29b7a58619c4c

                                  SHA512

                                  53faffbda8a835bc1143e894c118c15901a5fd09cfc2224dd2f754c06dc794897315049a579b9a8382d4564f071576045aaaf824019b7139d939152dca38ce29

                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                  Filesize

                                  944B

                                  MD5

                                  eb1ad317bd25b55b2bbdce8a28a74a94

                                  SHA1

                                  98a3978be4d10d62e7411946474579ee5bdc5ea6

                                  SHA256

                                  9e94e7c9ac6134ee30e79498558aa1a5a1ac79a643666c3f8922eed215dd3a98

                                  SHA512

                                  d011f266c0240d84470c0f9577cd9e4927309bd19bb38570ca9704ed8e1d159f9bea982a59d3eefef72ce7a10bd81208b82e88ef57c7af587f7437a89769adc0

                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                  Filesize

                                  944B

                                  MD5

                                  ba169f4dcbbf147fe78ef0061a95e83b

                                  SHA1

                                  92a571a6eef49fff666e0f62a3545bcd1cdcda67

                                  SHA256

                                  5ef1421e19fde4bc03cd825dd7d6c0e7863f85fd8f0aa4a4d4f8d555dc7606d1

                                  SHA512

                                  8d2e5e552210dcda684682538bc964fdd8a8ff5b24cc2cc8af813729f0202191f98eb42d38d2355df17ae620fe401aad6ceaedaed3b112fdacd32485a3a0c07c

                                • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_hbpbc1b3.x13.ps1

                                  Filesize

                                  60B

                                  MD5

                                  d17fe0a3f47be24a6453e9ef58c94641

                                  SHA1

                                  6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                  SHA256

                                  96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                  SHA512

                                  5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                • memory/2788-45-0x0000000000AD0000-0x0000000000AEE000-memory.dmp

                                  Filesize

                                  120KB

                                • memory/2788-46-0x0000000005BD0000-0x00000000061E8000-memory.dmp

                                  Filesize

                                  6.1MB

                                • memory/2788-47-0x0000000005490000-0x00000000054A2000-memory.dmp

                                  Filesize

                                  72KB

                                • memory/2788-48-0x00000000054F0000-0x000000000552C000-memory.dmp

                                  Filesize

                                  240KB

                                • memory/2788-49-0x0000000005530000-0x000000000557C000-memory.dmp

                                  Filesize

                                  304KB

                                • memory/2788-52-0x00000000057A0000-0x00000000058AA000-memory.dmp

                                  Filesize

                                  1.0MB

                                • memory/2932-51-0x000000001BDF0000-0x000000001BE9A000-memory.dmp

                                  Filesize

                                  680KB

                                • memory/2932-44-0x00000000033F0000-0x000000000341C000-memory.dmp

                                  Filesize

                                  176KB

                                • memory/2932-155-0x000000001C3A0000-0x000000001C549000-memory.dmp

                                  Filesize

                                  1.7MB

                                • memory/2932-108-0x00007FFBFB080000-0x00007FFBFBB41000-memory.dmp

                                  Filesize

                                  10.8MB

                                • memory/2932-107-0x000000001C3A0000-0x000000001C549000-memory.dmp

                                  Filesize

                                  1.7MB

                                • memory/2932-40-0x0000000000FF0000-0x00000000011A2000-memory.dmp

                                  Filesize

                                  1.7MB

                                • memory/2932-41-0x00007FFBFB080000-0x00007FFBFBB41000-memory.dmp

                                  Filesize

                                  10.8MB

                                • memory/3204-0-0x00007FFBFB083000-0x00007FFBFB085000-memory.dmp

                                  Filesize

                                  8KB

                                • memory/3204-1-0x0000000000FA0000-0x00000000012A0000-memory.dmp

                                  Filesize

                                  3.0MB

                                • memory/3932-110-0x00007FFBFB080000-0x00007FFBFBB41000-memory.dmp

                                  Filesize

                                  10.8MB

                                • memory/3932-103-0x00007FFBFB080000-0x00007FFBFBB41000-memory.dmp

                                  Filesize

                                  10.8MB

                                • memory/3932-104-0x00007FFBFB080000-0x00007FFBFBB41000-memory.dmp

                                  Filesize

                                  10.8MB

                                • memory/3932-39-0x00007FFBFB080000-0x00007FFBFBB41000-memory.dmp

                                  Filesize

                                  10.8MB

                                • memory/3932-33-0x0000000000120000-0x0000000000164000-memory.dmp

                                  Filesize

                                  272KB

                                • memory/4560-53-0x00000280ECA00000-0x00000280ECA22000-memory.dmp

                                  Filesize

                                  136KB