Analysis

  • max time kernel
    149s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-12-2024 16:30

General

  • Target

    https://gofile.io/d/tA2w62

Malware Config

Extracted

Family

asyncrat

Version

1.0.7

Botnet

Default

C2

95.216.52.21:7575

Mutex

xdnqiaxygefjfoolgo

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Extracted

Family

skuld

C2

https://discord.com/api/webhooks/1314414095461777419/8hYVVlssdJOsLuwWhq5QQqRTlg-3pzMhiKB5tYVl8wS1FN6rDNu-iZ34u_-J5bahL4e7

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Asyncrat family
  • Skuld family
  • Skuld stealer

    An info stealer written in Go lang.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://gofile.io/d/tA2w62
    1⤵
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4448
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffe16a46f8,0x7fffe16a4708,0x7fffe16a4718
      2⤵
        PID:5084
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,14086781124833123543,10323183460691727953,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2152 /prefetch:2
        2⤵
          PID:3332
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,14086781124833123543,10323183460691727953,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2124 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:1800
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,14086781124833123543,10323183460691727953,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3024 /prefetch:8
          2⤵
            PID:5092
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,14086781124833123543,10323183460691727953,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:1
            2⤵
              PID:4248
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,14086781124833123543,10323183460691727953,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3364 /prefetch:1
              2⤵
                PID:4412
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,14086781124833123543,10323183460691727953,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4688 /prefetch:1
                2⤵
                  PID:732
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,14086781124833123543,10323183460691727953,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4252 /prefetch:1
                  2⤵
                    PID:2388
                  • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,14086781124833123543,10323183460691727953,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5428 /prefetch:8
                    2⤵
                      PID:4292
                    • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,14086781124833123543,10323183460691727953,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5428 /prefetch:8
                      2⤵
                      • Suspicious behavior: EnumeratesProcesses
                      PID:3340
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,14086781124833123543,10323183460691727953,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4984 /prefetch:1
                      2⤵
                        PID:552
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,14086781124833123543,10323183460691727953,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2620 /prefetch:1
                        2⤵
                          PID:1432
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,14086781124833123543,10323183460691727953,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4244 /prefetch:1
                          2⤵
                            PID:2080
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2128,14086781124833123543,10323183460691727953,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5560 /prefetch:8
                            2⤵
                              PID:3540
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,14086781124833123543,10323183460691727953,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5636 /prefetch:1
                              2⤵
                                PID:2720
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,14086781124833123543,10323183460691727953,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6456 /prefetch:1
                                2⤵
                                  PID:380
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,14086781124833123543,10323183460691727953,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6484 /prefetch:1
                                  2⤵
                                    PID:2556
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2128,14086781124833123543,10323183460691727953,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6720 /prefetch:8
                                    2⤵
                                    • Suspicious behavior: EnumeratesProcesses
                                    PID:5372
                                • C:\Windows\System32\CompPkgSrv.exe
                                  C:\Windows\System32\CompPkgSrv.exe -Embedding
                                  1⤵
                                    PID:940
                                  • C:\Windows\System32\CompPkgSrv.exe
                                    C:\Windows\System32\CompPkgSrv.exe -Embedding
                                    1⤵
                                      PID:1960
                                    • C:\Windows\System32\rundll32.exe
                                      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                      1⤵
                                        PID:5180
                                      • C:\Users\Admin\Downloads\VenomRAT v6.0.3 (+SOURCE)\VenomRAT v6.0.3 (+SOURCE)\VenomRAT v6.0.3 (SOURCE)\Client.exe
                                        "C:\Users\Admin\Downloads\VenomRAT v6.0.3 (+SOURCE)\VenomRAT v6.0.3 (+SOURCE)\VenomRAT v6.0.3 (SOURCE)\Client.exe"
                                        1⤵
                                        • Suspicious behavior: EnumeratesProcesses
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:5396
                                      • C:\Users\Admin\Downloads\VenomRAT v6.0.3 (+SOURCE)\VenomRAT v6.0.3 (+SOURCE)\VenomRAT v6.0.3 (SOURCE)\DevExpress.WinRTPresenter.Launcher.exe
                                        "C:\Users\Admin\Downloads\VenomRAT v6.0.3 (+SOURCE)\VenomRAT v6.0.3 (+SOURCE)\VenomRAT v6.0.3 (SOURCE)\DevExpress.WinRTPresenter.Launcher.exe"
                                        1⤵
                                          PID:5460
                                        • C:\Users\Admin\Downloads\VenomRAT v6.0.3 (+SOURCE)\VenomRAT v6.0.3 (+SOURCE)\VenomRAT v6.0.3 (SOURCE)\Keylogger.exe
                                          "C:\Users\Admin\Downloads\VenomRAT v6.0.3 (+SOURCE)\VenomRAT v6.0.3 (+SOURCE)\VenomRAT v6.0.3 (SOURCE)\Keylogger.exe"
                                          1⤵
                                          • Suspicious behavior: EnumeratesProcesses
                                          • Suspicious use of AdjustPrivilegeToken
                                          • Suspicious use of SetWindowsHookEx
                                          PID:3032
                                        • C:\Users\Admin\Downloads\VenomRAT v6.0.3 (+SOURCE)\VenomRAT v6.0.3 (+SOURCE)\VenomRAT v6.0.3 (SOURCE)\Venom RAT + HVNC + Stealer + Grabber.exe
                                          "C:\Users\Admin\Downloads\VenomRAT v6.0.3 (+SOURCE)\VenomRAT v6.0.3 (+SOURCE)\VenomRAT v6.0.3 (SOURCE)\Venom RAT + HVNC + Stealer + Grabber.exe"
                                          1⤵
                                          • Modifies registry class
                                          • Suspicious behavior: EnumeratesProcesses
                                          • Suspicious behavior: GetForegroundWindowSpam
                                          • Suspicious use of AdjustPrivilegeToken
                                          • Suspicious use of SetWindowsHookEx
                                          PID:5652
                                        • C:\Users\Admin\Downloads\VenomRAT v6.0.3 (+SOURCE)\VenomRAT v6.0.3 (+SOURCE)\VenomRAT v6.0.3 (SOURCE)\start.exe
                                          "C:\Users\Admin\Downloads\VenomRAT v6.0.3 (+SOURCE)\VenomRAT v6.0.3 (+SOURCE)\VenomRAT v6.0.3 (SOURCE)\start.exe"
                                          1⤵
                                          • Adds Run key to start application
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:5752
                                          • C:\Windows\system32\attrib.exe
                                            attrib +h +s "C:\Users\Admin\Downloads\VenomRAT v6.0.3 (+SOURCE)\VenomRAT v6.0.3 (+SOURCE)\VenomRAT v6.0.3 (SOURCE)\start.exe"
                                            2⤵
                                            • Views/modifies file attributes
                                            PID:4532
                                        • C:\Windows\system32\wbem\WmiApSrv.exe
                                          C:\Windows\system32\wbem\WmiApSrv.exe
                                          1⤵
                                            PID:3540

                                          Network

                                          MITRE ATT&CK Enterprise v15

                                          Replay Monitor

                                          Loading Replay Monitor...

                                          Downloads

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                            Filesize

                                            152B

                                            MD5

                                            b8880802fc2bb880a7a869faa01315b0

                                            SHA1

                                            51d1a3fa2c272f094515675d82150bfce08ee8d3

                                            SHA256

                                            467b8cd4aacac66557712f9843023dcedefcc26efc746f3e44157bc8dac73812

                                            SHA512

                                            e1c6dba2579357ba70de58968b167d2c529534d24bff70568144270c48ac18a48ee2af2d58d78ae741e5a36958fa78a57955bd2456f1df00b781fc1002e123d2

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                            Filesize

                                            152B

                                            MD5

                                            ba6ef346187b40694d493da98d5da979

                                            SHA1

                                            643c15bec043f8673943885199bb06cd1652ee37

                                            SHA256

                                            d86eec91f295dfda8ed1c5fa99de426f2fe359282c7ebf67e3a40be739475d73

                                            SHA512

                                            2e6cc97330be8868d4b9c53be7e12c558f6eb1ac2c4080a611ba6c43561d0c5bb4791b8a11a8c2371599f0ba73ed1d9a7a2ea6dee2ae6a080f1912e0cb1f656c

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\57967e5e-1a81-4d71-ba26-318f6df8efe9.tmp

                                            Filesize

                                            6KB

                                            MD5

                                            695157e505de4d0549cf7af829dcf218

                                            SHA1

                                            ae591382cd0ffe0d5029efe320c1fa8b3354dd9a

                                            SHA256

                                            d2751a282dab6794a06b94b5c588406e09fe3d9d74b4c6b68845072aee9b4152

                                            SHA512

                                            92a3cadbe9e6bfb1eed6e74bcdd41886e5b1af5bc9006e49b436a101dc7f26429bca28146e9ae479c281c1d6dc653b1fece1b9d8abca011fcf4aa8d7c7c09efe

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                            Filesize

                                            144B

                                            MD5

                                            230fd3aef494e07108b1a5ba3aa65cdc

                                            SHA1

                                            7bccbcd6c649a99d46f4d5d62892f496371b36ff

                                            SHA256

                                            bcd38b811147443e07a94355b1de4f24c6a0d8ee8218ef7871c2cca3509b1c36

                                            SHA512

                                            515dfbcd9ee6efddea4d15241b559132dd0cf2b9101477997af592637eb23e4e54a44d2a8de04f32d53cdef799e33d565c6348eb171b6f5ff555fe7b3ae147a6

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                            Filesize

                                            937B

                                            MD5

                                            920a3f5dd6ebba59d933677511008ca7

                                            SHA1

                                            fa198a6abe556f87f83bbedb236cfb67752dc3ce

                                            SHA256

                                            a368d84de6a161aecf4be45bddf4af68e1b60d6706e00f008ae3e0425c8f0a1b

                                            SHA512

                                            f2a5c4730d59b0d5bc6b7d0e606127e4a9c9f95ab84df058f22d9718f359482d46a65a6630232826696595249138d2b5853a356d603be62b4aca166cb7fefd54

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                            Filesize

                                            5KB

                                            MD5

                                            38640f2cda81d75753429aa2542bd6e1

                                            SHA1

                                            e1aaf984620b53c7cefdb1732a682c862c63b4c0

                                            SHA256

                                            6c77a93bb77541bf2e074f541c842a2c2c3d02bbe18419918206030477978e6c

                                            SHA512

                                            be02d016173021e35cf9ddfec0683868363fb6bba2ddf4b0dd898cc13a3b04d9d8222a9040c1098aa3307f78ac4fa68233714e3b4fbc4be6dc1ffed3ef7a854d

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                            Filesize

                                            6KB

                                            MD5

                                            13cc2442255df686b135293c991db558

                                            SHA1

                                            d994c54302c067ce1abc9a8950263626facba5cd

                                            SHA256

                                            a308d6e3db0b2dfe8294e03832bc2f5189a9e062a40d1b556a191f822bc3fe0c

                                            SHA512

                                            376c94d273646b9d1fdb5ec96ecfbb9135f4b827711c1a7fe5aaf8ee8e1024f3eeb4f1a2842472b1a1e72c12f8b96b04867968fb53d9065c52d56100cf1563a8

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                            Filesize

                                            16B

                                            MD5

                                            46295cac801e5d4857d09837238a6394

                                            SHA1

                                            44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                            SHA256

                                            0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                            SHA512

                                            8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                            Filesize

                                            16B

                                            MD5

                                            206702161f94c5cd39fadd03f4014d98

                                            SHA1

                                            bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                                            SHA256

                                            1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                                            SHA512

                                            0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                            Filesize

                                            10KB

                                            MD5

                                            0477a73449096af1194e0b4afe8dc21e

                                            SHA1

                                            8fab60d97885b5027f59f4f78f91024a44d01bbc

                                            SHA256

                                            d6c4e2a60cd47c0026aec5dce37f09ada47b79875a2b5aade860a591cb820de3

                                            SHA512

                                            1461da60f2928cff69ae5180db653ff0ec1068f1a04de1a38d3872501add9e8b7fdb7656f4b606687dc6100545498f07e4ff0131c8698b5e11d771ad3a0f03d5

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                            Filesize

                                            10KB

                                            MD5

                                            c7ae28132715c320c47db4f0989dea32

                                            SHA1

                                            adca322a91c7f65ec5254eb8103b236e1068311e

                                            SHA256

                                            2dcfc1e5409f766004f0ff241430487b9f765ecddc6e40c9ab7126e437c63d20

                                            SHA512

                                            426df743ff9c6e0096a6cc9150aa894fcf7ded1b2d9368c721a68a782b0d8ffb2cadd7764c8e275c1742b882b4ed0a40818835db3ef09c2aa171cbe60a0ab2c0

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                            Filesize

                                            10KB

                                            MD5

                                            a50872725bc7e70187e80ef530b39b44

                                            SHA1

                                            4d2205f0e504ef83242615759c8c04ea4db221ce

                                            SHA256

                                            1691225fe6a4bd323eec6ebf75d9c39717ba56208bd05e5be1049e25885409d5

                                            SHA512

                                            8730f08c874a8956c3d8a4ec4851e81a4837daaaaa56573e3cb1d14fe027201481072fdd56fc57658cf65ff945d6a96f6b0dee820401543418177c71cedc031a

                                          • C:\Users\Admin\AppData\Local\Server\Venom_RAT_+_HVNC_+_Steale_Url_qkamrgd2yxc3i0qepbewoqwa2m5juegt\6.0.3.1\user.config

                                            Filesize

                                            1KB

                                            MD5

                                            c5d000ad767554ef7a2134490e65deb8

                                            SHA1

                                            8f0afdfcc2a66329dbc93b106edc2a5b5c50e796

                                            SHA256

                                            1063a42e16a038f4d4d125b9065904fb8097e3d0e23b78632434ebf31e780f03

                                            SHA512

                                            3b517cdef44572f3d23cc07159a4e4ad5c9f291351ef6a242f0c35b317b3a9bfc2a8b3c8d447f87142e01094c19e2c3ba17150676cacf00eb7756cb15182e568

                                          • C:\Users\Admin\AppData\Local\Server\Venom_RAT_+_HVNC_+_Steale_Url_qkamrgd2yxc3i0qepbewoqwa2m5juegt\6.0.3.1\user.config

                                            Filesize

                                            1KB

                                            MD5

                                            fcb0d0c9de0a00e93be6402dae96217b

                                            SHA1

                                            204d0e0c5ae2f1fe18d17b6dbd544010002f20bf

                                            SHA256

                                            08f3b0c207a1e05ff754f9215b9d7a1401cfd8ec3f4a4feab9f1b1804e14aa06

                                            SHA512

                                            5eaa00a0b84c13b1dcc9e92ac0a39e024d7c69e535e006437d8020441cbaa1918d8491942638a7e8f360f7e4b48bb47f5ba5d51b28c6867a037a07eb00613f5d

                                          • memory/3032-247-0x0000000000890000-0x0000000000898000-memory.dmp

                                            Filesize

                                            32KB

                                          • memory/5396-244-0x0000000000060000-0x0000000000076000-memory.dmp

                                            Filesize

                                            88KB

                                          • memory/5460-245-0x00000000001B0000-0x00000000001BA000-memory.dmp

                                            Filesize

                                            40KB

                                          • memory/5652-248-0x0000015B416C0000-0x0000015B424F4000-memory.dmp

                                            Filesize

                                            14.2MB

                                          • memory/5652-259-0x0000015B616F0000-0x0000015B61902000-memory.dmp

                                            Filesize

                                            2.1MB

                                          • memory/5652-252-0x0000015B5D6B0000-0x0000015B5D788000-memory.dmp

                                            Filesize

                                            864KB

                                          • memory/5652-253-0x0000015B5CDB0000-0x0000015B5CE00000-memory.dmp

                                            Filesize

                                            320KB

                                          • memory/5652-254-0x0000015B60B90000-0x0000015B6134E000-memory.dmp

                                            Filesize

                                            7.7MB

                                          • memory/5652-255-0x0000015B619F0000-0x0000015B62082000-memory.dmp

                                            Filesize

                                            6.6MB

                                          • memory/5652-256-0x0000015B61350000-0x0000015B616EC000-memory.dmp

                                            Filesize

                                            3.6MB

                                          • memory/5652-257-0x0000015B62090000-0x0000015B62514000-memory.dmp

                                            Filesize

                                            4.5MB

                                          • memory/5652-258-0x0000015B443F0000-0x0000015B44410000-memory.dmp

                                            Filesize

                                            128KB

                                          • memory/5652-251-0x0000015B5CED0000-0x0000015B5D122000-memory.dmp

                                            Filesize

                                            2.3MB

                                          • memory/5652-249-0x0000015B5E080000-0x0000015B5F484000-memory.dmp

                                            Filesize

                                            20.0MB

                                          • memory/5652-250-0x0000015B5D190000-0x0000015B5D6A2000-memory.dmp

                                            Filesize

                                            5.1MB

                                          • memory/5652-262-0x0000015B5F640000-0x0000015B5F6EA000-memory.dmp

                                            Filesize

                                            680KB

                                          • memory/5652-265-0x0000015B5E030000-0x0000015B5E03A000-memory.dmp

                                            Filesize

                                            40KB

                                          • memory/5652-283-0x00000163673A0000-0x00000163674C4000-memory.dmp

                                            Filesize

                                            1.1MB

                                          • memory/5752-261-0x0000000000C40000-0x0000000001B7C000-memory.dmp

                                            Filesize

                                            15.2MB

                                          • memory/5752-260-0x0000000000C40000-0x0000000001B7C000-memory.dmp

                                            Filesize

                                            15.2MB