Analysis

  • max time kernel
    300s
  • max time network
    300s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-11-2024 18:35

General

  • Target

    https://gofile.io/d/k1GzSI

Malware Config

Extracted

Family

quasar

Version

1.3.0.0

Botnet

ender

C2

94.216.15.177:4782

Mutex

QSR_MUTEX_QEy8FRriBXQlVUy7m7

Attributes
  • encryption_key

    8aKtzhUinQn7QyudpHax

  • install_name

    ender.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    ender

Signatures

  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar family
  • Quasar payload 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 6 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 1 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 38 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://gofile.io/d/k1GzSI
    1⤵
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3108
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffc6cc9cc40,0x7ffc6cc9cc4c,0x7ffc6cc9cc58
      2⤵
        PID:2944
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1956,i,712309500638412969,7406300020375121796,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1944 /prefetch:2
        2⤵
          PID:1068
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2148,i,712309500638412969,7406300020375121796,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2160 /prefetch:3
          2⤵
            PID:4284
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2236,i,712309500638412969,7406300020375121796,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2200 /prefetch:8
            2⤵
              PID:4280
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3116,i,712309500638412969,7406300020375121796,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3152 /prefetch:1
              2⤵
                PID:1532
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3132,i,712309500638412969,7406300020375121796,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3188 /prefetch:1
                2⤵
                  PID:3428
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3760,i,712309500638412969,7406300020375121796,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4524 /prefetch:1
                  2⤵
                    PID:3520
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=3308,i,712309500638412969,7406300020375121796,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3408 /prefetch:1
                    2⤵
                      PID:3180
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4776,i,712309500638412969,7406300020375121796,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4876 /prefetch:8
                      2⤵
                        PID:1564
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4932,i,712309500638412969,7406300020375121796,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4944 /prefetch:8
                        2⤵
                          PID:5036
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=984,i,712309500638412969,7406300020375121796,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5440 /prefetch:8
                          2⤵
                          • Suspicious behavior: EnumeratesProcesses
                          PID:3304
                      • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                        "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                        1⤵
                          PID:1228
                        • C:\Windows\system32\svchost.exe
                          C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                          1⤵
                            PID:1672
                          • C:\Windows\System32\rundll32.exe
                            C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                            1⤵
                              PID:2276
                            • C:\Program Files\7-Zip\7zG.exe
                              "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\privat\" -ad -an -ai#7zMap25449:74:7zEvent28384
                              1⤵
                              • Suspicious behavior: GetForegroundWindowSpam
                              • Suspicious use of AdjustPrivilegeToken
                              • Suspicious use of FindShellTrayWindow
                              PID:1720
                            • C:\Program Files\7-Zip\7zG.exe
                              "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\privat\" -ad -an -ai#7zMap28797:74:7zEvent709
                              1⤵
                              • Suspicious behavior: GetForegroundWindowSpam
                              • Suspicious use of FindShellTrayWindow
                              PID:872
                            • C:\Program Files\7-Zip\7zG.exe
                              "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\privat\" -ad -an -ai#7zMap9662:74:7zEvent7282
                              1⤵
                              • Suspicious use of FindShellTrayWindow
                              PID:2696
                            • C:\Windows\System32\NOTEPAD.EXE
                              "C:\Windows\System32\NOTEPAD.EXE" C:\Users\Admin\Downloads\privat\ender_start.bat
                              1⤵
                              • Opens file in notepad (likely ransom note)
                              PID:4048
                            • C:\Windows\system32\cmd.exe
                              C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Downloads\privat\ender_start.bat" "
                              1⤵
                                PID:3952
                                • C:\Users\Admin\Downloads\privat\ender.sfx.exe
                                  ender.sfx.exe -p123 -dC:\Users\Admin\AppData\Roaming
                                  2⤵
                                  • Checks computer location settings
                                  • Executes dropped EXE
                                  PID:4588
                                  • C:\Users\Admin\AppData\Roaming\ender.exe
                                    "C:\Users\Admin\AppData\Roaming\ender.exe"
                                    3⤵
                                    • Executes dropped EXE
                                    • System Location Discovery: System Language Discovery
                                    • Suspicious use of SetWindowsHookEx
                                    PID:1944
                                    • C:\Windows\SysWOW64\schtasks.exe
                                      "schtasks" /create /tn "ender" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\ender.exe" /rl HIGHEST /f
                                      4⤵
                                      • System Location Discovery: System Language Discovery
                                      • Scheduled Task/Job: Scheduled Task
                                      PID:2088
                              • C:\Windows\system32\taskmgr.exe
                                "C:\Windows\system32\taskmgr.exe" /7
                                1⤵
                                • Checks SCSI registry key(s)
                                • Suspicious behavior: EnumeratesProcesses
                                • Suspicious use of FindShellTrayWindow
                                • Suspicious use of SendNotifyMessage
                                PID:5056
                              • C:\Windows\System32\cmd.exe
                                "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\Downloads\privat\ender_start.bat"
                                1⤵
                                  PID:2424
                                  • C:\Users\Admin\Downloads\privat\ender.sfx.exe
                                    ender.sfx.exe -p123 -dC:\Users\Admin\AppData\Roaming
                                    2⤵
                                    • Executes dropped EXE
                                    PID:3728
                                • C:\Users\Admin\Downloads\privat\ender.sfx.exe
                                  "C:\Users\Admin\Downloads\privat\ender.sfx.exe"
                                  1⤵
                                  • Executes dropped EXE
                                  • Suspicious use of SetWindowsHookEx
                                  PID:1340
                                • C:\Users\Admin\Downloads\privat\ender.sfx.exe
                                  "C:\Users\Admin\Downloads\privat\ender.sfx.exe"
                                  1⤵
                                  • Executes dropped EXE
                                  • Suspicious use of SetWindowsHookEx
                                  PID:1448
                                • C:\Windows\system32\taskmgr.exe
                                  "C:\Windows\system32\taskmgr.exe" /7
                                  1⤵
                                  • Checks SCSI registry key(s)
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious use of SendNotifyMessage
                                  PID:1720

                                Network

                                MITRE ATT&CK Enterprise v15

                                Replay Monitor

                                Loading Replay Monitor...

                                Downloads

                                • C:\Users\Admin\AppData\Local\D3DSCache\e8010882af4f153f\F4EB2D6C-ED2B-4BDD-AD9D-F913287E6768.idx

                                  Filesize

                                  64KB

                                  MD5

                                  d2fb266b97caff2086bf0fa74eddb6b2

                                  SHA1

                                  2f0061ce9c51b5b4fbab76b37fc6a540be7f805d

                                  SHA256

                                  b09f68b61d9ff5a7c7c8b10eee9447d4813ee0e866346e629e788cd4adecb66a

                                  SHA512

                                  c3ba95a538c1d266beb83334af755c34ce642a4178ab0f2e5f7822fd6821d3b68862a8b58f167a9294e6d913b08c1054a69b5d7aec2efdb3cf9796ed84de21a8

                                • C:\Users\Admin\AppData\Local\D3DSCache\e8010882af4f153f\F4EB2D6C-ED2B-4BDD-AD9D-F913287E6768.lock

                                  Filesize

                                  4B

                                  MD5

                                  f49655f856acb8884cc0ace29216f511

                                  SHA1

                                  cb0f1f87ec0455ec349aaa950c600475ac7b7b6b

                                  SHA256

                                  7852fce59c67ddf1d6b8b997eaa1adfac004a9f3a91c37295de9223674011fba

                                  SHA512

                                  599e93d25b174524495ed29653052b3590133096404873318f05fd68f4c9a5c9a3b30574551141fbb73d7329d6be342699a17f3ae84554bab784776dfda2d5f8

                                • C:\Users\Admin\AppData\Local\D3DSCache\e8010882af4f153f\F4EB2D6C-ED2B-4BDD-AD9D-F913287E6768.val

                                  Filesize

                                  944B

                                  MD5

                                  6bd369f7c74a28194c991ed1404da30f

                                  SHA1

                                  0f8e3f8ab822c9374409fe399b6bfe5d68cbd643

                                  SHA256

                                  878947d0ec814fe7c343cdebc05eebf00eb14f3023bdb3809a559e17f399fe5d

                                  SHA512

                                  8fc5f073dc9fa1e1ae47c60a5f06e0a48709fd6a4302dffaa721858409e7bde64bc6856d3fb28891090516d1a7afc542579de287778b5755eafe75cc67d45d93

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

                                  Filesize

                                  649B

                                  MD5

                                  34d063fc8f259f642b09ee9129b4f1f8

                                  SHA1

                                  613264d3145d30fc3d1b9551c12652a58c024463

                                  SHA256

                                  4440f30a0eb680b2b4b66fc3caac030b47955a97e5f62234ca20185c59c39865

                                  SHA512

                                  289ff385a4311aa7d16e91c0ea22e3feee5dd7301da47e65b905873d1a4ddde3efb47c70f811a8611cb2e15ff716ac5181f8151af1b78776592abf758b61da13

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\temp-index

                                  Filesize

                                  336B

                                  MD5

                                  f9174d5b5bbb9c631de87ea61df8574f

                                  SHA1

                                  ceeba9fa1a6c6cc9a2c78b1e734ffa3aa3a94c9f

                                  SHA256

                                  8a90655f11e9345a38389cd66d83224bd9e887a4428d68c590a14e5cd717a8b9

                                  SHA512

                                  f7396c9429be0d37a89d3498b75f271477c832ca11199d1186683434f8375080b540453557c66b1e6ad19047e68cc1429fd9924b91ec863ca7a82cc4a4497894

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                  Filesize

                                  2KB

                                  MD5

                                  6d41643f93e5ab389f99d7c105a0388b

                                  SHA1

                                  57eae38902b2b7c7cf53d56acb10d8f7c13364f5

                                  SHA256

                                  b7a319b03ac1360403d26732f2e1f5a2b76bbd8e76a99bf75a7c3334ed9b31bc

                                  SHA512

                                  fd7b1349148cb497b786fbcc6a1893899510ca3d38ee6261a980e39e54102352e9981aef82c0f3ae2c3357a3a2b120420d36950e61f1258a696b03181f20d874

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                  Filesize

                                  2B

                                  MD5

                                  d751713988987e9331980363e24189ce

                                  SHA1

                                  97d170e1550eee4afc0af065b78cda302a97674c

                                  SHA256

                                  4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                  SHA512

                                  b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                  Filesize

                                  690B

                                  MD5

                                  2a8d876c22160682b74f5d77ebdca4ec

                                  SHA1

                                  7084a0cf8f29162843b507f36ddccd25e7c0d726

                                  SHA256

                                  2c4a4a77317039bef7c205d78429ff488d5f588c0f34c37e498e77f72820d7f4

                                  SHA512

                                  0a089299fa34f9c05cc7c4dd873451ba1874f1328903d0acc55144cc16bb0c804a849515cac4bae6ad7e291b10e37066ec25716deeff729adc1f2c27212bcb9c

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                  Filesize

                                  9KB

                                  MD5

                                  0f53612fdd2b8375da1eba21a77dec72

                                  SHA1

                                  3aa770c84c52821748c55b1231bcaec3fc46a33b

                                  SHA256

                                  9da269a88e3a4fdf25f6cd39852f9948a6b4fa0e242832981f7b3a79d14ef1dc

                                  SHA512

                                  9df2e9d34742e88063ac31f23d13838cc8082c17a4b8fe7ea91f52328b915e6bd2423dd59586ad4fb0174a02cf8785f7e5c70539a3612afab5c790f459cfe308

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                  Filesize

                                  9KB

                                  MD5

                                  d25cc8059f725cb8202483c81ef35f31

                                  SHA1

                                  888056aa324e9d05f4739e11d9d453d6cee5714c

                                  SHA256

                                  9be438adee41f8c6558270109a8d760ea503a53eac2563937aa4b5b22c7d5829

                                  SHA512

                                  f1fcf10356b8ab13736e5b542415e6b8c4d12477338215f6de810847abc80475ad1f3a6b03ad3876e40bce3627eb984512165edf271acb30d899ad6d393f756a

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                  Filesize

                                  9KB

                                  MD5

                                  b1c2c0385772db5aa5ad22ad7d987046

                                  SHA1

                                  861cb34aadc4ebb51ec6c1f549edc7876816bc8c

                                  SHA256

                                  de24040d4f6481feb099604179b32f2ee1b52e7698333fe59487e8d39b0c7579

                                  SHA512

                                  f8b79ae8ced15af3ab047c1d130ac82eb2cd7366d274b26049602ed66fe6e6b633ab199aa21b1402eb715a6f9c6ff78cc659fdb34a03fe2744dcdb9269a84c6f

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                  Filesize

                                  9KB

                                  MD5

                                  dfe8ba04d3b93cae54e0808159acce20

                                  SHA1

                                  aa3ef676855f4292953a821fb3c60325ed41bfe3

                                  SHA256

                                  c2bee36c27784cedd962cf6a0e0c47815c9b06416e7317f3d51f5777f1e9ef2a

                                  SHA512

                                  1f15c375b19237e84845d6957c2521d71b00e358a5dfefe5b9c1f732e023975d58448843889d82cf57a6beb10f9d532d3852155a658fb10167ea362d48cd3b0c

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                  Filesize

                                  9KB

                                  MD5

                                  c78cb035ed7a03355d4626e2ad77add5

                                  SHA1

                                  6444373dc5daa11b8fae1641bcf23af50e2d35fe

                                  SHA256

                                  ec8a35c4dd41ef4db691e903458402001fa8c057db67244a304e410cc0496b06

                                  SHA512

                                  e4e9e6102c139d57f7497d90e3c3dfc64be97ccb2e6ce8c0de9b35254080ef2eeacaba15c10a9a6fbf10c67fd38a441de32727cf5bc2f7f784296d1a4bae18b8

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                  Filesize

                                  9KB

                                  MD5

                                  76fd67b529af99c2dd22f6e077c07f70

                                  SHA1

                                  1b4e70a5610159268f253f4e8a8f16694b362cfa

                                  SHA256

                                  f71986137a982b6eb6a061402bab93125cedcc4dc482df1af7676f062bd7fc67

                                  SHA512

                                  c354b967a7ea47e67f610a53656138b36e1b715caedbadea0ea23aba629916a7f9b4dea7954e7e922604c12a179087a480b42c663241f470e2b55779f37dbe8c

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                  Filesize

                                  9KB

                                  MD5

                                  470c8a906f631c812d42f6dbe2f39e9f

                                  SHA1

                                  9d61153ea1232acb69e30968f03f34cfec06ecf1

                                  SHA256

                                  323c4e735ec7a0f7ff65f2fae1c53f7d965981fbbc2360566ae3f46deb6c7f7e

                                  SHA512

                                  01d8f243d3485690d9dc4fe2416ed658f7a439a1a6fd45b335b0681e56858962a7286d7d381181aa28f0420aa2d01d5d7032477d66def594b4adb02aeae178b8

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                  Filesize

                                  9KB

                                  MD5

                                  c77bacfeede210a5caddc8ff61d13fd0

                                  SHA1

                                  2a352e21360042dd07d00c284f8a22a7158ae4e0

                                  SHA256

                                  b2ca241a1eac25468ba9793e79d6829691f00d8e26e72af8a82190161e482d44

                                  SHA512

                                  fd6fc11d8976ea0e9cbe27421aaecfec2d9f05365b8b7971c643b21ffdb9f4b192d5b4ce8ba015d4c5b7c29a80f787abc97a8e762f3e0a618b674d879a5abdc0

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                  Filesize

                                  9KB

                                  MD5

                                  d37a0e6e4db01977876d4944c914096c

                                  SHA1

                                  7b6b56fc201f92352851465dfe005378f06a074b

                                  SHA256

                                  3a1284eabf04b2a00bbc3f83608bc51523941d990df30e21403c95c5d0f7a50c

                                  SHA512

                                  618ea8c995034078889e2040bcafb5c47b8e9e263b59245ff3b9b9cf33265d78fe51183284e94768404951d53ec2bf370d7d277582e356c9a2dc8d586dc4fdfd

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                  Filesize

                                  9KB

                                  MD5

                                  e92d7e3cac34deed2a0a1afa7e15ae91

                                  SHA1

                                  9f4d5c5727d0cc3c4133a5774b6e44b21f2747b3

                                  SHA256

                                  c41962b4931ddfa3daa381a4d8fffceb0514e74821c18aee9341adb27da01db1

                                  SHA512

                                  d599b737b2b030adccfc0c32100db405f7c666e4f5f353821eef00c870416c843694b2e56753cb3e6186ef2b6da26b41f1471c6da0d0e5ca8a4c36f4a4d7aebd

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                  Filesize

                                  9KB

                                  MD5

                                  ac09cc04153b6112d6376f69f0845f5b

                                  SHA1

                                  2053d94b11619a8b5c9ef80033a2849b57d775d0

                                  SHA256

                                  1b84720ba7dd7456581e02bdc933e228704adedb7bac45bfc4b729527868520a

                                  SHA512

                                  cf03dd7766d2170ec028c2e45b1f1efa03c724742880064055b3b47d6bdb272a7a10bb9104bf690b543bdec83eda299de447fc2ff2ab314c14f6c04979b85237

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                  Filesize

                                  9KB

                                  MD5

                                  bd79fc3cc4347673f736e2525e259ee9

                                  SHA1

                                  0cc24930c006bbd56be7e581a11f098d41e8cb8c

                                  SHA256

                                  fa60c1062ece040eab27b0a01c82c11a5399f697336cbe5c37278a78a80cfa6e

                                  SHA512

                                  7e1c69e013e4b249483c90be2a9ce17e269ec1e4409cc0bc34efd18976b3de694a7ff3cadea3cee39f9f6a1475845c77a579e095d963b49e89bb3f71e563a248

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                  Filesize

                                  9KB

                                  MD5

                                  0465c23ac324b98836672ee9580b3aa2

                                  SHA1

                                  a9ebb764f3c35e1ce1d607073ba8c1d033329d61

                                  SHA256

                                  ff35e6cfa22f3c4697c64bda9bd86915af8bbeb3f148c184f2d2682cf4fc3913

                                  SHA512

                                  f971f11bb80bfc28aafe489e587d4cf626b51e04ddc80ea4d90b88938cd2c629783e20c2a5876dd5e5520b757d0adaec5342d2758f57c890039e02280684ef23

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                  Filesize

                                  9KB

                                  MD5

                                  862cccf2609567461b01b5d8a695681b

                                  SHA1

                                  f086d50c267bd1f456e9e77a111418743dd2c11a

                                  SHA256

                                  71b460eff9eb957665af4202b91c4412b7d2c6920d8c54c61baf231280d58ba6

                                  SHA512

                                  0da0389e80f4b533743ccb1d5f37aef08932160c186ed4272adea9b3cb7e37f9c494f39b3bf26877e8ee50da418d13e8901219f85d084d8dc1a58540777f26ed

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                  Filesize

                                  9KB

                                  MD5

                                  ff0a9c9ac7b35354c3e2925881b69cc2

                                  SHA1

                                  f83eda22bd4b92718c6248bbd7ba84a02a0d9813

                                  SHA256

                                  fdd1823d4a56add4062ece786788909f0a1ebfc7a536c55ec00e57d965b1d966

                                  SHA512

                                  d08334045a4c70b04a18f3c0c3dcfb2560b241eb584789d72bc720974c5655a9cf6f990e4f44e40a0f2511c51b3d7b1191c68c46e4871e58934f264f4811603a

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                  Filesize

                                  9KB

                                  MD5

                                  57193b11f252604a5307065b00321fa7

                                  SHA1

                                  639e6eb9f487c946cd1334329d441cabc9abc323

                                  SHA256

                                  9036dfb03f5a698ea1b7f190f8f7099a8fc07bfe2bde1851773b240a999b2370

                                  SHA512

                                  e8a03a9dd70cfce8f41252f5b1da9c63d094c801dc26dfb2e2a0b505e75c454a21b56f8bda29b9066aed64c19ef8b7eeafae951f65ab38af954b229d0ba8841e

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                  Filesize

                                  9KB

                                  MD5

                                  25f447972ef1e8c3e2f5ed8b7b501341

                                  SHA1

                                  70641862303984dfc44e64b5678d939a49624598

                                  SHA256

                                  2594082484a617b2d65fbab6405bf97c0c5522b44ed1bdbc7e5c197b50c7ee90

                                  SHA512

                                  aeed9f547c0ae698101ddd42ccb633809a162b8a634fcf035d0069af6335b42a9a07f1ad48a16e7fa4bc55c35ddaaafabcaf21c67107e6feb1114edc74e9bd16

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                  Filesize

                                  9KB

                                  MD5

                                  7a6be9946ee3e084b932a74cc9bb7f3b

                                  SHA1

                                  5fa06ec117b18629120b9c07ba67d2742ae3683d

                                  SHA256

                                  4a1ae7f305cac7323de72c38ff821e5c9ae50364e984710ed7c62d6634fd2073

                                  SHA512

                                  0a967ec2693aed70ede73255cd2cd69c939d6a750bbbfb2f9e0b44fa6e25386affd67d77b09c8c063bcdc5b71e6e59f89c4b1e1590d7f92bbd20d679187475b9

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                  Filesize

                                  9KB

                                  MD5

                                  14966993eafb7e5cd6fe3b1553c9ac11

                                  SHA1

                                  406ba0c7918a0216bd6ac567043c5e54307565f6

                                  SHA256

                                  873a68b85743151774e9d3089ea0df265f43cdb459b8ea1df1ed8555629b740b

                                  SHA512

                                  4eebdb189b2b779c4b49272286829d0069425a20a3153aa66bdadb85f473846192c583da8ff452c7b107f20382faf94486fdb4916d6dcd30afbfa9498c093038

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                  Filesize

                                  9KB

                                  MD5

                                  cbc12fa7e9dfa2a34b792fad3202b0e1

                                  SHA1

                                  938bd370a28855d75240d8c2b9c7c054c47acec2

                                  SHA256

                                  8ced5c8c5f70d1b97e41f7b23b933f8a33cc388cea74292786c8d55f27c458fc

                                  SHA512

                                  25d03b15f6691cd8496cabdde9995af533a3bed4a70b25f17c5a9ab78213005d16f44c3034f5fa2ac9b7f7d782dc38aab447e32be52c6063683ddf63dd14db0a

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                  Filesize

                                  116KB

                                  MD5

                                  5f504e8b83822900e3121d886150a0cf

                                  SHA1

                                  f67d5e13cbd110c4f330217432a9cf7de0f0f84b

                                  SHA256

                                  632ba739e978aee2b63ae8c1cea2828af5486b4c48fa34625932c4f3a42af099

                                  SHA512

                                  83f1abb02621070f36d91048b9bcf6573b201a2ff907eec02f5f857a4749021116466d262558f38d56a063f96eed38de21513441b5bd004b94931d641e3fb4e8

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                  Filesize

                                  116KB

                                  MD5

                                  fa48f50745f040f6b6440f0653e460e1

                                  SHA1

                                  cb7c7d999c90d68b4b487a983211b91b2bd27763

                                  SHA256

                                  4c77a963be1a51b86dc581aa715828b573b3ef9bc3c5f808240e61f515ec3e36

                                  SHA512

                                  858b3c711406f4bd2395974fd12c40e6e60ce7b8209e7c76f9df57f3c1e04d5c182035eb29f9ebd1ee53fffbc8c2a28e0ca3e0cd35b775beab0b37d2d25fdb2f

                                • C:\Users\Admin\AppData\Roaming\ender.exe

                                  Filesize

                                  348KB

                                  MD5

                                  c80b9473ee86eed3fe36f346187fa042

                                  SHA1

                                  4ffebf2695ebeaf63048024c4e3f334879303784

                                  SHA256

                                  1290f63d1c53813bdbff41426a1633c79e0248ae5d101da37f4c1b8169277560

                                  SHA512

                                  6fa217d6d5a7446bb0d8ac524460052229e76cec75d5054f4b87a1337baa8e3c7b8df0008716b5cdec5343e1e74843c20a3f8d0d3466c221e8faaa2040adbe04

                                • C:\Users\Admin\Downloads\privat.zip.crdownload

                                  Filesize

                                  370KB

                                  MD5

                                  32592c016dec5e7a0654b64412780714

                                  SHA1

                                  0ee5cc2dd0465da1e15cc0f785406b1dfd3c2127

                                  SHA256

                                  3e97124903da2c6f5497615549aa2b7c94a74451a5423c7027a8f8ff19fa0735

                                  SHA512

                                  8f20310c0bdaefde70972070d95a0140297d9427e509b2fe842a2928f0462b6767a640571102fea76f87ccbd79dbab2cac6f97fe4301cdca915eadb51457c3fe

                                • C:\Users\Admin\Downloads\privat\ender.sfx.exe

                                  Filesize

                                  615KB

                                  MD5

                                  1a1232db50a6d6259177e2d8c9548552

                                  SHA1

                                  bf4f10e43e3b4ad97058228b5aa6b3f1e1420819

                                  SHA256

                                  9d45423f552a9fbe121f209c97df8b01563f6c30c3fc907cd63721e6ab9eb97e

                                  SHA512

                                  7ce0ed0bcef1740e6793096e33b007805ceca4f419dc69759ac7f4fe4f004cb37657c6110948b949aebae2f5893a11c951b7967cf61ef609c30a45b84a95ef04

                                • C:\Users\Admin\Downloads\privat\ender_start.bat

                                  Filesize

                                  31B

                                  MD5

                                  8e934e1df7c7f247be9ce59ef7253599

                                  SHA1

                                  3a44a776b8b38390316fcb1d58dc3ed9bc79dc8c

                                  SHA256

                                  afcce17a6017980bead6c844a8a6936941154a4517dce2dfa5255c56b0ee6aa3

                                  SHA512

                                  86c0b7fb53977ba8e3a61b54330a45884d9069a32dd2c3e831600a118b9d30f2ef93ba7b0e424fab7b7e595f32b7567c34dd543fbe2577144eab0287c3379f40

                                • \??\pipe\crashpad_3108_AHFTDISFEEXDABZV

                                  MD5

                                  d41d8cd98f00b204e9800998ecf8427e

                                  SHA1

                                  da39a3ee5e6b4b0d3255bfef95601890afd80709

                                  SHA256

                                  e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                                  SHA512

                                  cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                                • memory/1944-252-0x00000000003C0000-0x000000000041E000-memory.dmp

                                  Filesize

                                  376KB

                                • memory/1944-259-0x00000000062C0000-0x00000000062CA000-memory.dmp

                                  Filesize

                                  40KB

                                • memory/1944-253-0x0000000005210000-0x00000000057B4000-memory.dmp

                                  Filesize

                                  5.6MB

                                • memory/1944-254-0x0000000004D70000-0x0000000004E02000-memory.dmp

                                  Filesize

                                  584KB

                                • memory/1944-255-0x0000000004E10000-0x0000000004E76000-memory.dmp

                                  Filesize

                                  408KB

                                • memory/1944-256-0x00000000059F0000-0x0000000005A02000-memory.dmp

                                  Filesize

                                  72KB

                                • memory/1944-257-0x0000000005F30000-0x0000000005F6C000-memory.dmp

                                  Filesize

                                  240KB

                                • memory/5056-288-0x000002615F430000-0x000002615F431000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/5056-285-0x000002615F430000-0x000002615F431000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/5056-284-0x000002615F430000-0x000002615F431000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/5056-278-0x000002615F430000-0x000002615F431000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/5056-286-0x000002615F430000-0x000002615F431000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/5056-287-0x000002615F430000-0x000002615F431000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/5056-280-0x000002615F430000-0x000002615F431000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/5056-289-0x000002615F430000-0x000002615F431000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/5056-290-0x000002615F430000-0x000002615F431000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/5056-279-0x000002615F430000-0x000002615F431000-memory.dmp

                                  Filesize

                                  4KB