Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-11-2024 12:37

General

  • Target

    Dearquiz.exe

  • Size

    2.7MB

  • MD5

    ecd6e35111d8553e8c8b9a6d49120642

  • SHA1

    f9e19739a6ec2be180eb56c95fc422d49d0d36de

  • SHA256

    4badc43e761b7a46c9aed5a91a47605ce590b21f2a2126203cd1f264ea6eb81f

  • SHA512

    50662478344f2079ee343499b69ba18062ba56816715baefc9f3f6a4976b26c32ea142b6b17657b03fc4b91babafa5f55fa0768309d5f8db350fca125bee3473

  • SSDEEP

    49152:GjwzUTCh+Ha4I0ld3Ivjs+8I2m4V6PSBM3tmnWFUy1oGQhsKtAHkew6aO68:JlSaB0levem4EaBqYWfQzake

Malware Config

Extracted

Family

xworm

C2

85.203.4.77:7000

Attributes
  • Install_directory

    %ProgramData%

  • install_file

    XClient.exe

Signatures

  • Detect Xworm Payload 2 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Dearquiz.exe
    "C:\Users\Admin\AppData\Local\Temp\Dearquiz.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1956
    • C:\Users\Admin\svchost.exe
      "C:\Users\Admin\svchost.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:2404
    • C:\Users\Admin\Dearquiz.exe
      "C:\Users\Admin\Dearquiz.exe"
      2⤵
      • Executes dropped EXE
      PID:632
  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe"
    1⤵
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4440
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x118,0x11c,0x120,0xf4,0x124,0x7ffaabe9cc40,0x7ffaabe9cc4c,0x7ffaabe9cc58
      2⤵
        PID:240
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1920,i,13736536324010348519,11797410809082280007,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1916 /prefetch:2
        2⤵
          PID:4204
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2188,i,13736536324010348519,11797410809082280007,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2212 /prefetch:3
          2⤵
            PID:4528
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2272,i,13736536324010348519,11797410809082280007,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2480 /prefetch:8
            2⤵
              PID:2648
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3180,i,13736536324010348519,11797410809082280007,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3192 /prefetch:1
              2⤵
                PID:3196
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3284,i,13736536324010348519,11797410809082280007,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3260 /prefetch:1
                2⤵
                  PID:2684
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4580,i,13736536324010348519,11797410809082280007,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4624 /prefetch:1
                  2⤵
                    PID:3296
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4780,i,13736536324010348519,11797410809082280007,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4792 /prefetch:8
                    2⤵
                      PID:2060
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=3760,i,13736536324010348519,11797410809082280007,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3752 /prefetch:8
                      2⤵
                        PID:3240
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5104,i,13736536324010348519,11797410809082280007,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4544 /prefetch:8
                        2⤵
                          PID:4552
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4776,i,13736536324010348519,11797410809082280007,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4772 /prefetch:8
                          2⤵
                            PID:1428
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4992,i,13736536324010348519,11797410809082280007,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4816 /prefetch:8
                            2⤵
                              PID:5056
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4588,i,13736536324010348519,11797410809082280007,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5204 /prefetch:8
                              2⤵
                                PID:3936
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4936,i,13736536324010348519,11797410809082280007,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5272 /prefetch:8
                                2⤵
                                  PID:4228
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4924,i,13736536324010348519,11797410809082280007,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5248 /prefetch:8
                                  2⤵
                                    PID:1688
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --field-trial-handle=5292,i,13736536324010348519,11797410809082280007,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5216 /prefetch:2
                                    2⤵
                                      PID:5648
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=5160,i,13736536324010348519,11797410809082280007,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5348 /prefetch:8
                                      2⤵
                                        PID:6084
                                    • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                                      "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                                      1⤵
                                        PID:2108
                                      • C:\Windows\system32\taskmgr.exe
                                        "C:\Windows\system32\taskmgr.exe" /4
                                        1⤵
                                        • Checks SCSI registry key(s)
                                        • Checks processor information in registry
                                        • Modifies registry class
                                        • Suspicious behavior: EnumeratesProcesses
                                        • Suspicious behavior: GetForegroundWindowSpam
                                        • Suspicious use of AdjustPrivilegeToken
                                        • Suspicious use of FindShellTrayWindow
                                        • Suspicious use of SendNotifyMessage
                                        PID:4904
                                      • C:\Windows\system32\svchost.exe
                                        C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                                        1⤵
                                          PID:208
                                        • C:\Windows\System32\rundll32.exe
                                          C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                          1⤵
                                            PID:5148

                                          Network

                                          MITRE ATT&CK Enterprise v15

                                          Replay Monitor

                                          Loading Replay Monitor...

                                          Downloads

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

                                            Filesize

                                            649B

                                            MD5

                                            ea551c7ff107516a46903ed49eb2a5e1

                                            SHA1

                                            dbd096e4fb523a13c18f3776a69d643056adf0ca

                                            SHA256

                                            ce79435d9869760287df1071834ac144de5c0bd6ea36b3131932e565f87d2714

                                            SHA512

                                            4578daee58217a043e098e6c8c892e2b047d01add2d0cde9f4bb3ba87bc4717a95a41725e09096d400045a408ba593b2d2b7a97b23a62ec4d0a1f70988537091

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.83.1_0\_locales\en_CA\messages.json

                                            Filesize

                                            851B

                                            MD5

                                            07ffbe5f24ca348723ff8c6c488abfb8

                                            SHA1

                                            6dc2851e39b2ee38f88cf5c35a90171dbea5b690

                                            SHA256

                                            6895648577286002f1dc9c3366f558484eb7020d52bbf64a296406e61d09599c

                                            SHA512

                                            7ed2c8db851a84f614d5daf1d5fe633bd70301fd7ff8a6723430f05f642ceb3b1ad0a40de65b224661c782ffcec69d996ebe3e5bb6b2f478181e9a07d8cd41f6

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.83.1_0\dasherSettingSchema.json

                                            Filesize

                                            854B

                                            MD5

                                            4ec1df2da46182103d2ffc3b92d20ca5

                                            SHA1

                                            fb9d1ba3710cf31a87165317c6edc110e98994ce

                                            SHA256

                                            6c69ce0fe6fab14f1990a320d704fee362c175c00eb6c9224aa6f41108918ca6

                                            SHA512

                                            939d81e6a82b10ff73a35c931052d8d53d42d915e526665079eeb4820df4d70f1c6aebab70b59519a0014a48514833fefd687d5a3ed1b06482223a168292105d

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                            Filesize

                                            2KB

                                            MD5

                                            4d4607d750df1ff7e2808fd0b450a4ac

                                            SHA1

                                            952b8e97d82415cbc8a8f06397fffc76e13c8780

                                            SHA256

                                            228d02a55c335f428d7dcc3d97205b105abb379437a7885bb2b617388da32ea8

                                            SHA512

                                            312796b0bd994e153385f0ded2772b58d9d4452ba5617d0a4968418eab8d1b7f2ed7f7a354c0c6f5a71271c29e4cf236f560a8705ee1bc64586e5469c9f93327

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                            Filesize

                                            2B

                                            MD5

                                            d751713988987e9331980363e24189ce

                                            SHA1

                                            97d170e1550eee4afc0af065b78cda302a97674c

                                            SHA256

                                            4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                            SHA512

                                            b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                            Filesize

                                            356B

                                            MD5

                                            8ce76c04ea636143eeed301ffc22186a

                                            SHA1

                                            8fad34160a7a44c99c7fd80997940f25c7468d33

                                            SHA256

                                            a4b19ae238748bedfb9f3e1b3e793cc6720f3dd68b54e30ff6636c3d7c731a1a

                                            SHA512

                                            9e9a756d3b9e38804e0efbe22b2fbd34f9c5278d18641a8af93b6c410666db77dc4b6bb5cfd7c5d9a7c27ca57a372893b77349dbfdf53febccaee7df90b6dc93

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                            Filesize

                                            9KB

                                            MD5

                                            8e8417125affa780356abcd23775f38f

                                            SHA1

                                            d77e4d3346292230a20ababdb3139a78aeca0df7

                                            SHA256

                                            a150b7959420493941ce957ecc28c55ef98be773d8db122c63fc2d1022b582a3

                                            SHA512

                                            da26830e66b4b122be9d5482bdaec8bb94c4eae22ba2ce56950106e37c73e3527b0b89414521787531f859a77ec6d6c6cab7c3e8730f8be736947ad4b0a0c6bb

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                            Filesize

                                            9KB

                                            MD5

                                            123ae1dc85e1a98bb3ae9bf6a99acdcb

                                            SHA1

                                            b872372f9e3701cc43a28b90933ed4b8f4e44178

                                            SHA256

                                            af787a0dbf40ceaf574b9ace12c72a2165142a9113b69b906a3fb4fbe62373ad

                                            SHA512

                                            b4f0ddd6845b6371679cb540d7475f5d7d83ce2ee4b92fe9a5f24db0d5cb858c09392e45d3db91579c48267c6d90eb0ac5128e2912ce36583a7225454c7894bf

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                            Filesize

                                            9KB

                                            MD5

                                            aed764220dce5177405e18f4768ce15c

                                            SHA1

                                            fe5d65449866bd5c1e8af0ab875eed27d26f9244

                                            SHA256

                                            a66851154f811fd45203e0675b4f8f239063bedc823dd68a5f9750c52d92a664

                                            SHA512

                                            424361d7312f03ecc6fcad10cf3eba31d2ed2c23f49ae936b72ee5fe6e2a63004dac4b21d33d7f85a06ed903d642a6c903b95acfc9dd6b38ee4ef0817293baad

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                            Filesize

                                            9KB

                                            MD5

                                            7d128253e788ff3bbc36c4df99c13d0d

                                            SHA1

                                            7c30b83a65a3ff8ff2d94f91c00a1919f325a6a0

                                            SHA256

                                            e2bf223f659923aeaa030a02652ea22bc106bc700ee00bb26b329be51963d1e5

                                            SHA512

                                            c1d532f44c9ff948086270fba0ba633d677664852899a023c5340f6aa82887485af66869da113a5aaf42668769f4e5eb638e37b50984062e0ef5947ebde32037

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                            Filesize

                                            9KB

                                            MD5

                                            09fd0ef398951a02234dd49a4ec14c41

                                            SHA1

                                            9cf0f205dc4052f61811797d74c73eef0d775009

                                            SHA256

                                            c201cb6f6f23fab0ae6aec56bb2f3383a1bf56029f0afc0caf7b53660adc4add

                                            SHA512

                                            cfdd927c59a5075c2f0c306bd210ac4e85484f4af6322ba27d1edc0dcaae1fd32d5f359249e39eab171187021541314da84886cf380d62abc4236e4b75a7f582

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                            Filesize

                                            9KB

                                            MD5

                                            c7559bd69a11bc89976d140fbf856c21

                                            SHA1

                                            195cca1655864a8923199b4d400e414e88843046

                                            SHA256

                                            271d6054e90f5cdcd114922b24b378aa097d339df0754cf37d1f11bfb870bcaa

                                            SHA512

                                            920827d4f3d927393b14beda52d525093493e96c27194086ccfdf4f1881dd442268ec265879ab0f15de0b691da95fbcf357e1f63aa29505df41afb21b9034974

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                            Filesize

                                            9KB

                                            MD5

                                            ad172f8ee5727df0993b1c68829772ab

                                            SHA1

                                            164af6d060ca5c102a27de34d8f8f1ad44af1d1b

                                            SHA256

                                            d0a6acc0bd414ee7de4dbff1f219ba8469b73c8884e067dd076662132f61c93d

                                            SHA512

                                            f456370460d7f552e36f816247d2b42ac17df8572bafed8324b1d55c66fdab959efcb15b717c7238dd65aa9c7d55df8bc71a93253762f2719a7f9f89e47c0a7e

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                            Filesize

                                            9KB

                                            MD5

                                            9b86f4bea778a28becae7955d7c8baa7

                                            SHA1

                                            5c2d1f2aa7f27db08deac15e6fe55e40d4b35110

                                            SHA256

                                            6522a5e46d191584a4702bdc66b250dbb06851495b4ded00ed476a7a3c1410d9

                                            SHA512

                                            32617e826fa8e9eb112b3e8f9b1bbe4407b421d0593d0da9d1e1df6b3ea663a8efa26772c00a0a136325b8fa04b446c7e7f33c5c0f682cdcf8b371367821a2bb

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                                            Filesize

                                            15KB

                                            MD5

                                            08c0290ad5985e8168d813497389356c

                                            SHA1

                                            464f1b10a4932ea1b472bfa5d27b5ffebee7ecf9

                                            SHA256

                                            0d0cf6f5721edfc1852237c23e6431ab6e9e89ba53ccbc9e3ff2cdbccb53fcca

                                            SHA512

                                            5e34519a568e4ca4f9d3ae1e9ce30a26057ab7eced3c9c81dae8d43d34238e7490534cfe37c0df2c68cfb20e672c29e5a783ed915591bd08ca5ae7e980e4aa18

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index

                                            Filesize

                                            72B

                                            MD5

                                            ed1a7efd6a2194b1d6829e25a462159d

                                            SHA1

                                            3816f7e11651300f21cede34d591f8aa8beeacbc

                                            SHA256

                                            bf4a1a27d2ea0c8a228413a92064bc8ebf24b5a16bed094470b7f6f412d244ef

                                            SHA512

                                            c1fc36867eb3e09dc755edb3d39f233f64aed69e8704a5d8932ea1e4b10a0eee2adeeff04e16506dcea17fd7c740e180051ffd908875c31eebfba2de03c7f47d

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                            Filesize

                                            233KB

                                            MD5

                                            e5f3861e3b037545dec6fccee1f39dd9

                                            SHA1

                                            3bf9dd0ffd4865963211eee8f9c3ce7e7d88a84a

                                            SHA256

                                            0c3a602658d946da7a409224c5bb96b4de858ebce625ff864c9f12bbb0e9904d

                                            SHA512

                                            9ae87a7404565b91d7d7141b875ab3ebe25150fad61efd72c5daad8986423f66e473d116daa015a477faf15451528dace11c7a28a673c0c4060e7433a8149310

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                            Filesize

                                            233KB

                                            MD5

                                            8731155342c24873d7fc0add826aff29

                                            SHA1

                                            398b3b52c285bf3981b52a7ef2ebe1935e2d20e7

                                            SHA256

                                            67e31f55d27349b196e8e3509c1df6ab43815c67d3c18368eaffaa77bc287fca

                                            SHA512

                                            b351412480c9906443428ff3a7ef46b8be640b14d4aea30ae64337b1bd9128bcd4ae9cba92d55a0760c991fbde03ac934ab20fd81fd57a88dfaab3540c59e2a5

                                          • C:\Users\Admin\AppData\Local\Temp\scoped_dir4440_1235845879\39607af5-6095-441c-9b1c-baedfe76c6a3.tmp

                                            Filesize

                                            132KB

                                            MD5

                                            da75bb05d10acc967eecaac040d3d733

                                            SHA1

                                            95c08e067df713af8992db113f7e9aec84f17181

                                            SHA256

                                            33ae9b8f06dc777bb1a65a6ba6c3f2a01b25cd1afc291426b46d1df27ea6e7e2

                                            SHA512

                                            56533de53872f023809a20d1ea8532cdc2260d40b05c5a7012c8e61576ff092f006a197f759c92c6b8c429eeec4bb542073b491ddcfd5b22cd4ecbe1a8a7c6ef

                                          • C:\Users\Admin\AppData\Local\Temp\scoped_dir4440_1235845879\CRX_INSTALL\_locales\en_CA\messages.json

                                            Filesize

                                            711B

                                            MD5

                                            558659936250e03cc14b60ebf648aa09

                                            SHA1

                                            32f1ce0361bbfdff11e2ffd53d3ae88a8b81a825

                                            SHA256

                                            2445cad863be47bb1c15b57a4960b7b0d01864e63cdfde6395f3b2689dc1444b

                                            SHA512

                                            1632f5a3cd71887774bf3cb8a4d8b787ea6278271657b0f1d113dbe1a7fd42c4daa717cc449f157ce8972037572b882dc946a7dc2c0e549d71982dcdee89f727

                                          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk

                                            Filesize

                                            670B

                                            MD5

                                            314fc75e54731832881db84d7d2015e8

                                            SHA1

                                            d77ea1f37dd32d1a69156917c2123aa4b268d411

                                            SHA256

                                            cd67b9597036881dc0853fc18ef4739aa2f99acda1922b48153607cd5f30c464

                                            SHA512

                                            ddca8a2a94205a0ade44edff86f483ecb99ed7956734b2921c8234206a4f136d1587f93a49ae833375b50bdc82934895c0156961fa15753e92b9f4c466fdafb9

                                          • C:\Users\Admin\Dearquiz.exe

                                            Filesize

                                            2.5MB

                                            MD5

                                            68268f230cf98d8c9494a955384e9448

                                            SHA1

                                            3c4c1dd67819c62f81aff206ff080084cc086196

                                            SHA256

                                            bbc1310c8b98f4b052e78f695abdf15113911d10d8e1db4a7a351b2957d8570e

                                            SHA512

                                            cf4508b363a6f3ed4caeea0a3af2719f997aab765d17389103315cdba842d852f93f6bef18bb6c9a6d15675fc2c54d485bfa6007170c5d5fff6bd9705688db41

                                          • C:\Users\Admin\svchost.exe

                                            Filesize

                                            69KB

                                            MD5

                                            5b77ac5d1b88f4e69b3485b65048810c

                                            SHA1

                                            5159298eba8bb888806d43381c2afe91574a13ff

                                            SHA256

                                            031264d45baafa3302be48ffcecc8c27261f1f34b21556889d76dbb34c1f7f78

                                            SHA512

                                            1bc510af0b94557e9b7e217178d4028320a2cf793bc61d643410572875a4d604268fd24937a5e04399b58430de3078d014ecd9acdd4aee48a27a0476cafdb024

                                          • memory/1956-0-0x00007FFAB0183000-0x00007FFAB0185000-memory.dmp

                                            Filesize

                                            8KB

                                          • memory/1956-1-0x0000000000A00000-0x0000000000CB0000-memory.dmp

                                            Filesize

                                            2.7MB

                                          • memory/2404-36-0x0000000000B70000-0x0000000000B88000-memory.dmp

                                            Filesize

                                            96KB

                                          • memory/2404-50-0x00007FFAB0180000-0x00007FFAB0C41000-memory.dmp

                                            Filesize

                                            10.8MB

                                          • memory/2404-55-0x00007FFAB0180000-0x00007FFAB0C41000-memory.dmp

                                            Filesize

                                            10.8MB

                                          • memory/4904-90-0x00000206E1130000-0x00000206E1131000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/4904-98-0x00000206E1130000-0x00000206E1131000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/4904-99-0x00000206E1130000-0x00000206E1131000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/4904-100-0x00000206E1130000-0x00000206E1131000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/4904-101-0x00000206E1130000-0x00000206E1131000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/4904-102-0x00000206E1130000-0x00000206E1131000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/4904-97-0x00000206E1130000-0x00000206E1131000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/4904-96-0x00000206E1130000-0x00000206E1131000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/4904-92-0x00000206E1130000-0x00000206E1131000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/4904-91-0x00000206E1130000-0x00000206E1131000-memory.dmp

                                            Filesize

                                            4KB