Analysis

  • max time kernel
    220s
  • max time network
    210s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241007-en
  • resource tags

    arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    20-12-2024 18:48

General

  • Target

    sample.html

  • Size

    561B

  • MD5

    e87f5790521ef2b684ebcdb747c62b26

  • SHA1

    92152a2203786684b0e3e07b92939b6bc2f24630

  • SHA256

    aed5753c6a243f6d6fe9090cfd089156ed8be67b6f29aac7b6fbf58bfec14623

  • SHA512

    d5d579f0ab13c93d04e80b9720241c4c6e7589f047f9ee7cfc1effd54fdb27b7d85372df2a88b35830b70e395ef2f6db88fc6f85a1b739f50d78acb9797ae8e4

Malware Config

Extracted

Family

xenorat

C2

127.0.0.1

Mutex

Xeno_rat_nd8912d

Attributes
  • delay

    5000

  • install_path

    nothingset

  • port

    4444

  • startup_name

    nothingset

Signatures

  • Detect XenoRat Payload 5 IoCs
  • XenorRat

    XenorRat is a remote access trojan written in C#.

  • Xenorat family
  • Executes dropped EXE 3 IoCs
  • Enumerates connected drives 3 TTPs 1 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 64 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of FindShellTrayWindow 34 IoCs
  • Suspicious use of SendNotifyMessage 12 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\sample.html
    1⤵
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:5012
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffb50f93cb8,0x7ffb50f93cc8,0x7ffb50f93cd8
      2⤵
        PID:4128
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1932,15754686930221667073,14376647114176546881,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1912 /prefetch:2
        2⤵
          PID:3632
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1932,15754686930221667073,14376647114176546881,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2316 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:680
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1932,15754686930221667073,14376647114176546881,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2640 /prefetch:8
          2⤵
            PID:4308
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1932,15754686930221667073,14376647114176546881,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3152 /prefetch:1
            2⤵
              PID:4908
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1932,15754686930221667073,14376647114176546881,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3172 /prefetch:1
              2⤵
                PID:3160
              • C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1932,15754686930221667073,14376647114176546881,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4884 /prefetch:8
                2⤵
                • Suspicious behavior: EnumeratesProcesses
                PID:2868
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1932,15754686930221667073,14376647114176546881,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5004 /prefetch:8
                2⤵
                • Suspicious behavior: EnumeratesProcesses
                PID:3696
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1932,15754686930221667073,14376647114176546881,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5024 /prefetch:1
                2⤵
                  PID:2308
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1932,15754686930221667073,14376647114176546881,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2004 /prefetch:1
                  2⤵
                    PID:4776
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1932,15754686930221667073,14376647114176546881,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4976 /prefetch:1
                    2⤵
                      PID:1992
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1932,15754686930221667073,14376647114176546881,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3948 /prefetch:1
                      2⤵
                        PID:1312
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1932,15754686930221667073,14376647114176546881,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3476 /prefetch:1
                        2⤵
                          PID:1028
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1932,15754686930221667073,14376647114176546881,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5508 /prefetch:1
                          2⤵
                            PID:1104
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1932,15754686930221667073,14376647114176546881,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3868 /prefetch:1
                            2⤵
                              PID:904
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1932,15754686930221667073,14376647114176546881,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3380 /prefetch:1
                              2⤵
                                PID:4276
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1932,15754686930221667073,14376647114176546881,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5936 /prefetch:1
                                2⤵
                                  PID:3860
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1932,15754686930221667073,14376647114176546881,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6052 /prefetch:1
                                  2⤵
                                    PID:3128
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1932,15754686930221667073,14376647114176546881,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5860 /prefetch:8
                                    2⤵
                                    • NTFS ADS
                                    • Suspicious behavior: EnumeratesProcesses
                                    PID:2044
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1932,15754686930221667073,14376647114176546881,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=5136 /prefetch:2
                                    2⤵
                                    • Suspicious behavior: EnumeratesProcesses
                                    PID:1216
                                • C:\Windows\System32\CompPkgSrv.exe
                                  C:\Windows\System32\CompPkgSrv.exe -Embedding
                                  1⤵
                                    PID:2792
                                  • C:\Windows\System32\CompPkgSrv.exe
                                    C:\Windows\System32\CompPkgSrv.exe -Embedding
                                    1⤵
                                      PID:4040
                                    • C:\Windows\System32\rundll32.exe
                                      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                      1⤵
                                        PID:432
                                      • C:\Users\Admin\Downloads\Release\xeno rat server.exe
                                        "C:\Users\Admin\Downloads\Release\xeno rat server.exe"
                                        1⤵
                                        • System Location Discovery: System Language Discovery
                                        • Modifies registry class
                                        • Suspicious behavior: GetForegroundWindowSpam
                                        • Suspicious use of SetWindowsHookEx
                                        PID:4088
                                      • C:\Users\Admin\Downloads\rat.exe
                                        "C:\Users\Admin\Downloads\rat.exe"
                                        1⤵
                                        • Executes dropped EXE
                                        • Enumerates connected drives
                                        • Drops file in Program Files directory
                                        • System Location Discovery: System Language Discovery
                                        • Suspicious behavior: EnumeratesProcesses
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:1524
                                        • C:\Windows\SysWOW64\schtasks.exe
                                          "schtasks.exe" /query /v /fo csv
                                          2⤵
                                          • System Location Discovery: System Language Discovery
                                          PID:876
                                        • C:\Windows\SysWOW64\cmd.exe
                                          "C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\Downloads\rat.exe"
                                          2⤵
                                          • System Location Discovery: System Language Discovery
                                          PID:3868
                                          • C:\Windows\SysWOW64\choice.exe
                                            choice /C Y /N /D Y /T 3
                                            3⤵
                                            • System Location Discovery: System Language Discovery
                                            PID:4504
                                      • C:\Users\Admin\Downloads\rat.exe
                                        "C:\Users\Admin\Downloads\rat.exe"
                                        1⤵
                                        • Executes dropped EXE
                                        • System Location Discovery: System Language Discovery
                                        • Suspicious behavior: EnumeratesProcesses
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:2200
                                      • C:\Users\Admin\Downloads\rat.exe
                                        "C:\Users\Admin\Downloads\rat.exe"
                                        1⤵
                                        • Executes dropped EXE
                                        • System Location Discovery: System Language Discovery
                                        PID:1096
                                      • C:\Windows\system32\AUDIODG.EXE
                                        C:\Windows\system32\AUDIODG.EXE 0x00000000000004D4 0x00000000000004C8
                                        1⤵
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:2612

                                      Network

                                      MITRE ATT&CK Enterprise v15

                                      Replay Monitor

                                      Loading Replay Monitor...

                                      Downloads

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                        Filesize

                                        152B

                                        MD5

                                        d7145ec3fa29a4f2df900d1418974538

                                        SHA1

                                        1368d579635ba1a53d7af0ed89bf0b001f149f9d

                                        SHA256

                                        efc56eb46cf3352bf706c0309d5d740bca6ac06142f9bdc5e8344b81d4d83d59

                                        SHA512

                                        5bb663ede88f8b7c96b09c1214aac68eda99bc09525ac383baa96914ff7d553ea1aed09e3c9d16893d791c81ddb164c682dfbb4759ac0bc751221f3e36558a91

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                        Filesize

                                        152B

                                        MD5

                                        d91478312beae099b8ed57e547611ba2

                                        SHA1

                                        4b927559aedbde267a6193e3e480fb18e75c43d7

                                        SHA256

                                        df43cd7779d9fc91fd0416155d6771bc81565e98be38689cb17caece256bf043

                                        SHA512

                                        4086c4ebe410a37d0124fc8bd00c58775e70ab2b7b5a39b4e49b332ce5b4866c6775707436395467aff9596507c96fb4896f3bf0249c5b9c99a927f31dcc1a96

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                        Filesize

                                        3KB

                                        MD5

                                        9d596d7bc59603376e0884d0a1125705

                                        SHA1

                                        789c1fa22124c90886c79bb6d546b391a459ba8b

                                        SHA256

                                        0b79f102a950d33757652791a5077f2d884c320fe264ae4495b42b0c3629704f

                                        SHA512

                                        8ae470b4d25797f7c408bfebb6b8318b6e0259ae747823e72a3bc9a4e446327b55ce6bf7d59bd0450704cccedd46b4f74acd2bc1c320188b24b1fae7a6f57ce6

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                        Filesize

                                        871B

                                        MD5

                                        b30585b04049d9c0ccc1b7fdf401fe09

                                        SHA1

                                        55133ff20424e20627b4f8bdf3f3793567b0c12e

                                        SHA256

                                        a8db162b4cfc66b79fefff604c69d99211c416f971704fdf987d387bb1bd56f2

                                        SHA512

                                        db3cf910d40a7fa765f06ede38524e1835a4baaec9030a9a402cbb18c67f72547218c983dfca5efba0d33e161ceecf73ea503878abcf2ff01e6059900b9e263f

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                        Filesize

                                        5KB

                                        MD5

                                        493fd162e382352e17ac52649ae32cc6

                                        SHA1

                                        90ac9976355b5eda777d4232f11ccd38372798a5

                                        SHA256

                                        76c775581dcad3e3cb72b24acf0be4fd61fda85468821aaaf6b108b6aac572d9

                                        SHA512

                                        8058283d524ddd7f7e87a46527fa809f241be1c0d7705d616ddf625c5e37d4d355bda2ae83139ad6c7c4921ce7fdc70bae2cfc57b2186f0906325925ab882e6b

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                        Filesize

                                        5KB

                                        MD5

                                        1d8c402cd715cda6ebabde2214201fb4

                                        SHA1

                                        ff7eabe4a04bf0eaadf7b492cc977e958604d41f

                                        SHA256

                                        693df3e32ac694457035b7c49cfee4ce0c0d6b066ead4712b60757efbb666a7a

                                        SHA512

                                        eb45caf6721833303a7ae5c2759e611d1b7b4a221e3994a942e3be77bd793cdd82524789f3d8c346d3e9eccccfe64af4bc48ff01e9c5f94cfcdf97edab1320ea

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                        Filesize

                                        6KB

                                        MD5

                                        e1a773bdfb468f06af21f435811b6e4b

                                        SHA1

                                        7d0f5f3673698c5a5390f537fbdd485d45b6a6ec

                                        SHA256

                                        fb14da542e83e0ee6c3f109bbb98a22231a0617a576e638ca07d3907625324b1

                                        SHA512

                                        2037bc34f5ea89509c73a63087b76e25fe2a3c177be87529e0caa275501e4d012a1b7ecc4a49600584b1b9cfd4f6d4e3577b55c5c7c8bd6034cdae3573834eea

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                        Filesize

                                        1KB

                                        MD5

                                        521f2baf3d2744a7b1700a018486a929

                                        SHA1

                                        94ea306ec3f84f917ab3bd8799f28d984121a02d

                                        SHA256

                                        c666d7bfce03994620f22385ad63ebe27463c0e6f26260bfa9055f50acc70e07

                                        SHA512

                                        de48201526dc05b32dd65139f215c5c4e7d86fc1420e2a70ea1e5b92cad630db707a31d2ff09f01def7081b5a0fcb152b970bd071d838b2d85d23836f02e4dda

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe585dbb.TMP

                                        Filesize

                                        1KB

                                        MD5

                                        f080c095c7727464f29e920b585d311a

                                        SHA1

                                        eec5d877c77fd24141017d48803dc6fd00fe154e

                                        SHA256

                                        7ed46f6aa21d0a33673e56bf4625f2b4a3f4262421651ecd5ce901518882e409

                                        SHA512

                                        ec47e795ed0c6ec92636f9241e07362e6c86332ce87c7ba184872796185300c982f2a6d2a5b5fdc67d01789c2951b77ee78b0b5b4f47b88a9d33368e69683a0a

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                        Filesize

                                        16B

                                        MD5

                                        6752a1d65b201c13b62ea44016eb221f

                                        SHA1

                                        58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                        SHA256

                                        0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                        SHA512

                                        9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                        Filesize

                                        11KB

                                        MD5

                                        e9b54a5b830275b92edf7ac3f57551dc

                                        SHA1

                                        f23c36be24e4593dfda1a81bb8e2047fe3b21bb7

                                        SHA256

                                        11ffd5c022361bac6aea04dd52746139cc83d0e26dd9dd8b4301c2253ad761d4

                                        SHA512

                                        6ab528df8c995b6b3f7d2f90a2edc2b4c67c4e3795bd134bc9309358ce21273a04fabf7ab8f5233bd7f9b491993a9877e8bbdde76a39010e3f5ea537e638265e

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                        Filesize

                                        10KB

                                        MD5

                                        dc0590bbf0675839b4d2c987d5eadbf3

                                        SHA1

                                        9b160798146017b69701cc5c3a68b98c5dbdce86

                                        SHA256

                                        7ac6ef9597af9c54d1a1624004af646475c14dd6f93bbe49dcf2a3a5c7905efc

                                        SHA512

                                        0854bd51abf6000cdb837525d4403c06aa2f2418043a009763ca63895efc533f646f27f04d61b00bd96ebe15327492c53d86bf7a80e1c345982f23180624932a

                                      • C:\Users\Admin\Downloads\Release.zip

                                        Filesize

                                        6.4MB

                                        MD5

                                        89661a9ff6de529497fec56a112bf75e

                                        SHA1

                                        2dd31a19489f4d7c562b647f69117e31b894b5c3

                                        SHA256

                                        e7b275d70655db9cb43fa606bbe2e4f22478ca4962bbf9f299d66eda567d63cd

                                        SHA512

                                        33c765bf85fbec0e58924ece948b80a7d73b7577557eaac8865e481c61ad6b71f8b5b846026103239b3bd21f438ff0d7c1430a51a4a149f16a215faad6dab68f

                                      • C:\Users\Admin\Downloads\Release.zip:Zone.Identifier

                                        Filesize

                                        94B

                                        MD5

                                        cced52b34bfd2387c302c3d496259fb2

                                        SHA1

                                        a79d213261354f108441ff54499b139e3bf08f58

                                        SHA256

                                        0c5027dc525ff889968304a5303a2b4ff978be996cf7df2b02df1a01cecf47bf

                                        SHA512

                                        04080f3321d80560d749238073dce291ca35f2a8e61176dbd76ac4fa368f3436b848568ea746be85cd4c9acda145d8cb9b423ba44b7e624944b4de4024a5024b

                                      • C:\Users\Admin\Downloads\rat.exe

                                        Filesize

                                        45KB

                                        MD5

                                        e069304f72f1993e3a4227b5fb5337a1

                                        SHA1

                                        131c2b3eb9afb6a806610567fe846a09d60b5115

                                        SHA256

                                        5d00cfc66ae11f68bae4ac8e5a0f07158dae6bfd4ea34035b8c7c4e3be70f2c5

                                        SHA512

                                        26f18e40b1d4d97d997815fe3921af11f8e75e99a9386bbe39fb8820af1cbe4e9f41d3328b6a051f1d63a4dfff5b674a0abafae975f848df4272aa036771e2e9

                                      • memory/1524-439-0x0000000006730000-0x000000000673A000-memory.dmp

                                        Filesize

                                        40KB

                                      • memory/1524-438-0x0000000001420000-0x000000000142A000-memory.dmp

                                        Filesize

                                        40KB

                                      • memory/1524-423-0x0000000006040000-0x000000000604A000-memory.dmp

                                        Filesize

                                        40KB

                                      • memory/1524-415-0x0000000000BF0000-0x0000000000C02000-memory.dmp

                                        Filesize

                                        72KB

                                      • memory/2200-440-0x00000000757F0000-0x0000000075854000-memory.dmp

                                        Filesize

                                        400KB

                                      • memory/2200-419-0x0000000006390000-0x00000000063F6000-memory.dmp

                                        Filesize

                                        408KB

                                      • memory/4088-356-0x00000000053F0000-0x0000000005482000-memory.dmp

                                        Filesize

                                        584KB

                                      • memory/4088-372-0x0000000007E40000-0x0000000007E5A000-memory.dmp

                                        Filesize

                                        104KB

                                      • memory/4088-373-0x000000000C950000-0x000000000CA02000-memory.dmp

                                        Filesize

                                        712KB

                                      • memory/4088-375-0x000000000CA30000-0x000000000CD87000-memory.dmp

                                        Filesize

                                        3.3MB

                                      • memory/4088-371-0x0000000007EB0000-0x0000000007FD4000-memory.dmp

                                        Filesize

                                        1.1MB

                                      • memory/4088-361-0x0000000009CC0000-0x0000000009CE2000-memory.dmp

                                        Filesize

                                        136KB

                                      • memory/4088-360-0x0000000007DC0000-0x0000000007DD2000-memory.dmp

                                        Filesize

                                        72KB

                                      • memory/4088-359-0x0000000007DA0000-0x0000000007DBA000-memory.dmp

                                        Filesize

                                        104KB

                                      • memory/4088-420-0x000000000C900000-0x000000000C912000-memory.dmp

                                        Filesize

                                        72KB

                                      • memory/4088-358-0x00000000058F0000-0x0000000005904000-memory.dmp

                                        Filesize

                                        80KB

                                      • memory/4088-357-0x00000000053A0000-0x00000000053AA000-memory.dmp

                                        Filesize

                                        40KB

                                      • memory/4088-355-0x0000000005900000-0x0000000005EA6000-memory.dmp

                                        Filesize

                                        5.6MB

                                      • memory/4088-354-0x00000000006C0000-0x00000000008C2000-memory.dmp

                                        Filesize

                                        2.0MB