Resubmissions

22-12-2024 13:20

241222-qk7ljazjf1 10

22-12-2024 13:18

241222-qj4hgszndj 10

Analysis

  • max time kernel
    85s
  • max time network
    77s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20241211-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20241211-enlocale:en-usos:windows10-ltsc 2021-x64system
  • submitted
    22-12-2024 13:18

General

  • Target

    https://github.com/moom825/xeno-rat/releases/tag/1.8.7

Malware Config

Signatures

  • Detect XenoRat Payload 2 IoCs
  • XenorRat

    XenorRat is a remote access trojan written in C#.

  • Xenorat family
  • Drops file in Program Files directory 2 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 60 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
  • Suspicious use of FindShellTrayWindow 35 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://github.com/moom825/xeno-rat/releases/tag/1.8.7
    1⤵
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1036
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x124,0x128,0x12c,0x100,0x130,0x7ffb8a0246f8,0x7ffb8a024708,0x7ffb8a024718
      2⤵
        PID:4856
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,12421168140951394098,577804361002509197,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2172 /prefetch:2
        2⤵
          PID:1460
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,12421168140951394098,577804361002509197,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2232 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:3384
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,12421168140951394098,577804361002509197,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2796 /prefetch:8
          2⤵
            PID:216
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,12421168140951394098,577804361002509197,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3468 /prefetch:1
            2⤵
              PID:2948
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,12421168140951394098,577804361002509197,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3476 /prefetch:1
              2⤵
                PID:1536
              • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,12421168140951394098,577804361002509197,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5968 /prefetch:8
                2⤵
                  PID:3712
                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings
                  2⤵
                  • Drops file in Program Files directory
                  PID:1016
                  • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x148,0x114,0x158,0x248,0x254,0x7ff739a25460,0x7ff739a25470,0x7ff739a25480
                    3⤵
                      PID:4576
                  • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,12421168140951394098,577804361002509197,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5968 /prefetch:8
                    2⤵
                    • Suspicious behavior: EnumeratesProcesses
                    PID:2184
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2124,12421168140951394098,577804361002509197,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=6192 /prefetch:8
                    2⤵
                      PID:4812
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,12421168140951394098,577804361002509197,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6136 /prefetch:1
                      2⤵
                        PID:1492
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2124,12421168140951394098,577804361002509197,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6528 /prefetch:8
                        2⤵
                        • Suspicious behavior: EnumeratesProcesses
                        PID:3360
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,12421168140951394098,577804361002509197,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5988 /prefetch:1
                        2⤵
                          PID:6056
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,12421168140951394098,577804361002509197,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6720 /prefetch:1
                          2⤵
                            PID:6064
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,12421168140951394098,577804361002509197,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6400 /prefetch:1
                            2⤵
                              PID:3904
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,12421168140951394098,577804361002509197,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6044 /prefetch:1
                              2⤵
                                PID:5220
                            • C:\Windows\System32\CompPkgSrv.exe
                              C:\Windows\System32\CompPkgSrv.exe -Embedding
                              1⤵
                                PID:4896
                              • C:\Windows\System32\CompPkgSrv.exe
                                C:\Windows\System32\CompPkgSrv.exe -Embedding
                                1⤵
                                  PID:2704
                                • C:\Windows\System32\rundll32.exe
                                  C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                  1⤵
                                    PID:5620
                                  • C:\Users\Admin\Downloads\Release\xeno rat server.exe
                                    "C:\Users\Admin\Downloads\Release\xeno rat server.exe"
                                    1⤵
                                    • System Location Discovery: System Language Discovery
                                    • Modifies registry class
                                    • Suspicious behavior: GetForegroundWindowSpam
                                    • Suspicious use of FindShellTrayWindow
                                    • Suspicious use of SetWindowsHookEx
                                    PID:2052

                                  Network

                                  MITRE ATT&CK Enterprise v15

                                  Replay Monitor

                                  Loading Replay Monitor...

                                  Downloads

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                    Filesize

                                    152B

                                    MD5

                                    e8978379b8b4dac705f196c82cddb401

                                    SHA1

                                    873169c69e4aaa8c3e1da1c95f3fc6b005f63112

                                    SHA256

                                    83528bc9af5e037e40f14bece26788301e4555a6164b31e6010d93d7d18f0afa

                                    SHA512

                                    2d73194d03ea51d4154ee9556950dee1e666720c4b53fe671cf2e7647889d480c2941757d6b9b4c60a29a6799478450136f4847b0bec5d4b6aa630d9ca856308

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                    Filesize

                                    152B

                                    MD5

                                    c8c74ab5c035388c9f8ca42d04225ed8

                                    SHA1

                                    1bb47394d88b472e3f163c39261a20b7a4aa3dc0

                                    SHA256

                                    ea821d15371cdfef9f4c01c71fbe39f9db7bfd61e6a83e09b14886c5756cd9d9

                                    SHA512

                                    88922af80d561b3cf10963160d245044554f9011e4aec4fd40c740b06e5e87e9bc16ed309e296f549d9244b6cc93f627d6dd010eb2d325b38cbb1d43d8b95157

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                    Filesize

                                    48B

                                    MD5

                                    c34203b608ab18192ed778e6aba53fc8

                                    SHA1

                                    2ec8d3cdf37b7ddb2e54b9282553cb33a8ef1670

                                    SHA256

                                    ae7ee639c3a4696a38581cbdbe3782920edfbab17d84870801f6eb08d63287b2

                                    SHA512

                                    f14badf3c943d8de466849acebbb8404879cb6400f5ae423d719d02249b9081dcf30d6244ea0bb7a512b1e20a8bfecb21003aafb677532552a28955b670857b2

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                    Filesize

                                    1KB

                                    MD5

                                    fb3603c866a230484d887395e57a006b

                                    SHA1

                                    128c326f62f560cd835542d3637abc67cbbc0983

                                    SHA256

                                    4aa3f915d502e2f6c7f20ffcb17c126d516f1b27d6d585900453b856b96d6178

                                    SHA512

                                    5ccc7c0eb8cd8000206a2b850a5e3de10be88b425c48e6826ddf7b33c0dad0ad07d630dd220926bdd94ab0dd1a27f72d9b1c478452f7ce192cf953c3ed6b54bb

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Edge Profile.ico

                                    Filesize

                                    70KB

                                    MD5

                                    e5e3377341056643b0494b6842c0b544

                                    SHA1

                                    d53fd8e256ec9d5cef8ef5387872e544a2df9108

                                    SHA256

                                    e23040951e464b53b84b11c3466bbd4707a009018819f9ad2a79d1b0b309bc25

                                    SHA512

                                    83f09e48d009a5cf83fa9aa8f28187f7f4202c84e2d0d6e5806c468f4a24b2478b73077381d2a21c89aa64884df3c56e8dc94eb4ad2d6a8085ac2feb1e26c2ef

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                    Filesize

                                    496B

                                    MD5

                                    5022b10efc3c6d669ded7960cc594a19

                                    SHA1

                                    a79ad985b345f09f5f4f265ba1867800ab4d3be1

                                    SHA256

                                    a6c395932ed70d3a45247d91c6593b48d6d389a52aa806ad484aef62b63c8e53

                                    SHA512

                                    a496101a7c30b7205f91698eec23c53b52d80a24a2208f3184733b905fd34066163df9688e00856278fc536fd955bcb0d2c62f3561f28718e378a08754c53c00

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State~RFe58bd02.TMP

                                    Filesize

                                    59B

                                    MD5

                                    2800881c775077e1c4b6e06bf4676de4

                                    SHA1

                                    2873631068c8b3b9495638c865915be822442c8b

                                    SHA256

                                    226eec4486509917aa336afebd6ff65777b75b65f1fb06891d2a857a9421a974

                                    SHA512

                                    e342407ab65cc68f1b3fd706cd0a37680a0864ffd30a6539730180ede2cdcd732cc97ae0b9ef7db12da5c0f83e429df0840dbf7596aca859a0301665e517377b

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                    Filesize

                                    5KB

                                    MD5

                                    fc94b3456cfaea3679c263bc20d716bb

                                    SHA1

                                    ae6a8c7ccb6aaf4a27663fd446ff21e0d15bbe54

                                    SHA256

                                    5458265e0d7ad810420c3459fade4152ef8b111452a689a3d16895767c2f70c6

                                    SHA512

                                    22c3ffa766e2bf1cb069ef26243e13421dd1ef9493535d964c2d8583fb1af3ebbb38848feee78c6203fcdf9277bdcd146e3d18a448a0d94af7942bac5b51f3e1

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                    Filesize

                                    5KB

                                    MD5

                                    2f1dd71d153f34c74df6f7f40d23e29c

                                    SHA1

                                    daf8a9cbf6874d3cac11d3aeaebd25a4946ff0f2

                                    SHA256

                                    e1e301cedf62c5480a5f9c46d1f776cb674074fcc23e4a26960fc628feac4f25

                                    SHA512

                                    887b021bd4fc3270b2cfd56ce6c2e2f07135f6f4b51a0ad8d15d37278704033ae41237ee7d62e44ce40e0ce65b7596088e44755de60c9eaecb7c7e51efed8db7

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                    Filesize

                                    5KB

                                    MD5

                                    f38d3191a364da6be6ba1ed74a55a66b

                                    SHA1

                                    70183a7c80949a9227da9cadca7a69e9c98e1653

                                    SHA256

                                    6697818ca67af5d953a44140588d3d987a179cd6750e6cffa51418e459ee9d2a

                                    SHA512

                                    ffc58965526ae6d7731f363473aced324f5e7a5d859780efd9c104e8f65bd7e9deeb094f6930ed573f263375e9567c619608b8897867b165a60092e8889fe400

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences

                                    Filesize

                                    24KB

                                    MD5

                                    671cfbd0275770e681ef4ede37140969

                                    SHA1

                                    ac145dd046e86ab6aff6340664c509c4fd5f1746

                                    SHA256

                                    dfafdb318c177ff96d9b85ed518f229398c3f5161f0ca48ff427516292b9d823

                                    SHA512

                                    d76a8d3a91d1e5e84b35cfa815736c1d0bd7252381f4e540a8d7102385224167b995f698559c95fa18ed3a50e14a58fb0a96bcedb57d4770df50f98c6d331faf

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences

                                    Filesize

                                    24KB

                                    MD5

                                    55182d891d98ec9d988cec04bac8752d

                                    SHA1

                                    e18a06e1498ff69c1c2697df7e195cf922a92e01

                                    SHA256

                                    08dc082566b36f693f93e341a5eb4e93a95d5bfed35b952f5ddcf4a5d51e963d

                                    SHA512

                                    35b9bf0c05da26bcebb4e259deca27c84e28521aff5a27af8205624581d1b0a7da6350ee7de0a2329c9cbc1d8cf205c1487638196232cbe794aaa91b0d86d0f7

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                    Filesize

                                    16B

                                    MD5

                                    206702161f94c5cd39fadd03f4014d98

                                    SHA1

                                    bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                                    SHA256

                                    1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                                    SHA512

                                    0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\metadata\CURRENT

                                    Filesize

                                    16B

                                    MD5

                                    46295cac801e5d4857d09837238a6394

                                    SHA1

                                    44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                    SHA256

                                    0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                    SHA512

                                    8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\metadata\MANIFEST-000001

                                    Filesize

                                    41B

                                    MD5

                                    5af87dfd673ba2115e2fcf5cfdb727ab

                                    SHA1

                                    d5b5bbf396dc291274584ef71f444f420b6056f1

                                    SHA256

                                    f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4

                                    SHA512

                                    de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                    Filesize

                                    8KB

                                    MD5

                                    09608783b77b2dfd08096c0ad19d9ecc

                                    SHA1

                                    84b6c803de148cfccabd12e0427600e2e8f4503f

                                    SHA256

                                    5d9d74338b19c5603549edee80955115a6256ba816d3165616419b1b64da1aaa

                                    SHA512

                                    8fa505904cb18b7ffa06675dae6959534d695c16425ad27f921fbeb391c662efe71248b8488f14fff1a44f5914f71f4615379567b8f28cd39a5a2bb7257ce1d2

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                    Filesize

                                    10KB

                                    MD5

                                    ccfee1a6cbc600cbfc9d1d131222cfc3

                                    SHA1

                                    5d837a411cc1fc99198e36932b1aa304f7cf1d18

                                    SHA256

                                    dee3f5217f0c57c0837b0e5ec0657c26d666dcd2f601daab465bfbf99261f0c0

                                    SHA512

                                    1565db336688917367153d3f194f836a3ee3d543e9f656148c9e4a4ba754442505444ccafc567aed314459c36c6f800d94b27e6553c2e3f78d174975b525f8f9

                                  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccba5a5986c77e43.customDestinations-ms

                                    Filesize

                                    3KB

                                    MD5

                                    2953d2fab8619014358bbefdce2d24a3

                                    SHA1

                                    adf2e1822622fbe83adb851661bc56f57c3ad366

                                    SHA256

                                    fd5e01b36420d8afaaadaf170c2d2f0134b8ca36569a029151003a99f1947ce1

                                    SHA512

                                    5cb5c18edf752c74f323dc9e261b805b9f71b80d2f4c68b4747083c245650e7533cf195a2526912d59ac8634af93e4cb6cf0bec2bd3b73f8e9c7b52339698715

                                  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccba5a5986c77e43.customDestinations-ms

                                    Filesize

                                    3KB

                                    MD5

                                    305126f98b4f4fa64b61c689750ffb52

                                    SHA1

                                    6adc0f9df6364cf4d80235b41c20e2327a2f0704

                                    SHA256

                                    8902714564b9d699f545a112e6a8466c84042fa0aa48d05aa801d079581bd4a6

                                    SHA512

                                    3d362866e05ae8cb437158d86be0ed53b7b4491e47ce25ba3067ef54913f9546b2bbe94937bd3dc3d88f2ba6c15ca6ee20cfa45a44dadddbc9ad802bf66bc71a

                                  • C:\Users\Admin\Desktop\d.exe

                                    Filesize

                                    45KB

                                    MD5

                                    42faf67435979c1245010683d8e916b5

                                    SHA1

                                    b93b780736398c6e4001c150276ccb24982ed67f

                                    SHA256

                                    eef18c81faeee1877aa9cd8d8aef18b643a434fd3da221cc724070ec863e5fcd

                                    SHA512

                                    ff0fd19b423da9c89a6729790f5f39bac4e2dd03d62ad8c8fcf9628afb7e57a58b0a4700ee8811ba6c6191390c7cf3816342852fb90fc583ba261fd4637fcd86

                                  • C:\Users\Admin\Downloads\Unconfirmed 227636.crdownload

                                    Filesize

                                    6.4MB

                                    MD5

                                    89661a9ff6de529497fec56a112bf75e

                                    SHA1

                                    2dd31a19489f4d7c562b647f69117e31b894b5c3

                                    SHA256

                                    e7b275d70655db9cb43fa606bbe2e4f22478ca4962bbf9f299d66eda567d63cd

                                    SHA512

                                    33c765bf85fbec0e58924ece948b80a7d73b7577557eaac8865e481c61ad6b71f8b5b846026103239b3bd21f438ff0d7c1430a51a4a149f16a215faad6dab68f

                                  • C:\Users\Admin\Downloads\ff.exe

                                    Filesize

                                    45KB

                                    MD5

                                    e069304f72f1993e3a4227b5fb5337a1

                                    SHA1

                                    131c2b3eb9afb6a806610567fe846a09d60b5115

                                    SHA256

                                    5d00cfc66ae11f68bae4ac8e5a0f07158dae6bfd4ea34035b8c7c4e3be70f2c5

                                    SHA512

                                    26f18e40b1d4d97d997815fe3921af11f8e75e99a9386bbe39fb8820af1cbe4e9f41d3328b6a051f1d63a4dfff5b674a0abafae975f848df4272aa036771e2e9

                                  • memory/2052-327-0x0000000005480000-0x0000000005494000-memory.dmp

                                    Filesize

                                    80KB

                                  • memory/2052-328-0x00000000083A0000-0x00000000083BA000-memory.dmp

                                    Filesize

                                    104KB

                                  • memory/2052-329-0x00000000083C0000-0x00000000083D2000-memory.dmp

                                    Filesize

                                    72KB

                                  • memory/2052-330-0x000000000A2C0000-0x000000000A2E2000-memory.dmp

                                    Filesize

                                    136KB

                                  • memory/2052-342-0x0000000008410000-0x00000000084C2000-memory.dmp

                                    Filesize

                                    712KB

                                  • memory/2052-343-0x0000000008500000-0x0000000008857000-memory.dmp

                                    Filesize

                                    3.3MB

                                  • memory/2052-345-0x0000000006AA0000-0x0000000006BC4000-memory.dmp

                                    Filesize

                                    1.1MB

                                  • memory/2052-346-0x0000000006BE0000-0x0000000006BFA000-memory.dmp

                                    Filesize

                                    104KB

                                  • memory/2052-326-0x0000000004E90000-0x0000000004E9A000-memory.dmp

                                    Filesize

                                    40KB

                                  • memory/2052-321-0x0000000004EF0000-0x0000000004F82000-memory.dmp

                                    Filesize

                                    584KB

                                  • memory/2052-320-0x00000000054A0000-0x0000000005A46000-memory.dmp

                                    Filesize

                                    5.6MB

                                  • memory/2052-319-0x0000000000280000-0x0000000000482000-memory.dmp

                                    Filesize

                                    2.0MB