Analysis

  • max time kernel
    58s
  • max time network
    59s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20250113-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20250113-enlocale:en-usos:windows10-ltsc 2021-x64system
  • submitted
    25-01-2025 18:45

General

  • Target

    https://gofile.io/d/2y9gR8

Malware Config

Extracted

Family

xenorat

C2

127.0.0.1

Mutex

Xeno_rat_nd8912d

Attributes
  • delay

    5000

  • install_path

    appdata

  • port

    4444

  • startup_name

    Security HELP

Signatures

  • Detect XenoRat Payload 2 IoCs
  • XenorRat

    XenorRat is a remote access trojan written in C#.

  • Xenorat family
  • Downloads MZ/PE file 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • NTFS ADS 2 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
  • Suspicious use of FindShellTrayWindow 37 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://gofile.io/d/2y9gR8
    1⤵
    • Enumerates system info in registry
    • Modifies registry class
    • NTFS ADS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1340
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x124,0x128,0x12c,0x100,0x130,0x7fffd8b946f8,0x7fffd8b94708,0x7fffd8b94718
      2⤵
        PID:2040
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,5395982568952179144,13966733324369106613,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2140 /prefetch:2
        2⤵
          PID:3692
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,5395982568952179144,13966733324369106613,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2204 /prefetch:3
          2⤵
          • Downloads MZ/PE file
          • Suspicious behavior: EnumeratesProcesses
          PID:4772
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,5395982568952179144,13966733324369106613,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2808 /prefetch:8
          2⤵
            PID:1208
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,5395982568952179144,13966733324369106613,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3428 /prefetch:1
            2⤵
              PID:4420
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,5395982568952179144,13966733324369106613,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3444 /prefetch:1
              2⤵
                PID:2800
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,5395982568952179144,13966733324369106613,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4812 /prefetch:1
                2⤵
                  PID:3260
                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,5395982568952179144,13966733324369106613,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5828 /prefetch:8
                  2⤵
                    PID:4292
                  • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings
                    2⤵
                    • Drops file in Program Files directory
                    PID:4828
                    • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x294,0x298,0x29c,0x138,0x2a0,0x7ff6d65a5460,0x7ff6d65a5470,0x7ff6d65a5480
                      3⤵
                        PID:4936
                    • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,5395982568952179144,13966733324369106613,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5828 /prefetch:8
                      2⤵
                      • Suspicious behavior: EnumeratesProcesses
                      PID:4672
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,5395982568952179144,13966733324369106613,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4212 /prefetch:1
                      2⤵
                        PID:4588
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2128,5395982568952179144,13966733324369106613,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=4944 /prefetch:8
                        2⤵
                          PID:4108
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,5395982568952179144,13966733324369106613,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4936 /prefetch:1
                          2⤵
                            PID:952
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2128,5395982568952179144,13966733324369106613,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6456 /prefetch:8
                            2⤵
                            • Suspicious behavior: EnumeratesProcesses
                            PID:520
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2128,5395982568952179144,13966733324369106613,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6504 /prefetch:8
                            2⤵
                              PID:2816
                            • C:\Users\Admin\Downloads\client.exe
                              "C:\Users\Admin\Downloads\client.exe"
                              2⤵
                              • Checks computer location settings
                              • Executes dropped EXE
                              • System Location Discovery: System Language Discovery
                              • NTFS ADS
                              PID:4688
                              • C:\Users\Admin\AppData\Roaming\XenoManager\client.exe
                                "C:\Users\Admin\AppData\Roaming\XenoManager\client.exe"
                                3⤵
                                • Executes dropped EXE
                                • System Location Discovery: System Language Discovery
                                PID:4832
                                • C:\Windows\SysWOW64\schtasks.exe
                                  "schtasks.exe" /Create /TN "Security HELP" /XML "C:\Users\Admin\AppData\Local\Temp\tmpBEBC.tmp" /F
                                  4⤵
                                  • System Location Discovery: System Language Discovery
                                  • Scheduled Task/Job: Scheduled Task
                                  PID:5348
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,5395982568952179144,13966733324369106613,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5428 /prefetch:1
                              2⤵
                                PID:5472
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,5395982568952179144,13966733324369106613,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6344 /prefetch:1
                                2⤵
                                  PID:5480
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,5395982568952179144,13966733324369106613,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6868 /prefetch:1
                                  2⤵
                                    PID:5688
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,5395982568952179144,13966733324369106613,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6320 /prefetch:1
                                    2⤵
                                      PID:5696
                                  • C:\Windows\System32\CompPkgSrv.exe
                                    C:\Windows\System32\CompPkgSrv.exe -Embedding
                                    1⤵
                                      PID:1488
                                    • C:\Windows\System32\CompPkgSrv.exe
                                      C:\Windows\System32\CompPkgSrv.exe -Embedding
                                      1⤵
                                        PID:1872
                                      • C:\Windows\System32\rundll32.exe
                                        C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                        1⤵
                                          PID:5296
                                        • C:\Users\Admin\Downloads\client.exe
                                          "C:\Users\Admin\Downloads\client.exe"
                                          1⤵
                                          • Executes dropped EXE
                                          • System Location Discovery: System Language Discovery
                                          PID:6064
                                          • C:\Windows\SysWOW64\schtasks.exe
                                            "schtasks.exe" /Create /TN "Security HELP" /XML "C:\Users\Admin\AppData\Local\Temp\tmp12F6.tmp" /F
                                            2⤵
                                            • System Location Discovery: System Language Discovery
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:4860

                                        Network

                                        MITRE ATT&CK Enterprise v15

                                        Replay Monitor

                                        Loading Replay Monitor...

                                        Downloads

                                        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\client.exe.log

                                          Filesize

                                          226B

                                          MD5

                                          66aea5e724c4a224d092067c3381783b

                                          SHA1

                                          ee3cc64c4370a255391bdfeef2883d5b7a6e6230

                                          SHA256

                                          04b17cab961f973464bba8924f764edef6451d1774f2405d27ef33d164296923

                                          SHA512

                                          5d719e303f491d1443cb7c7e8946481e90532522a422c98f82466e1eddcd1ef24a4505dcbf75f2191fbb66825d3550566d7f408a3854edeb4c1a192c8c9a6d06

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                          Filesize

                                          152B

                                          MD5

                                          254fc2a9d1a15f391d493bff79f66f08

                                          SHA1

                                          6165d5a9de512bb33a82d99d141a2562aa1aabfb

                                          SHA256

                                          2bf9282b87bdef746d298cff0734b9a82cd9c24656cb167b24a84c30fb6a1fd0

                                          SHA512

                                          484a1c99ee3c3d1ebf0af5ec9e73c9a2ca3cf8918f0ba2a4b543b75fa587ec6b432866b74bcd6b5cdd9372532c882da438d44653bd5bccdbc94ebc27852ff9e2

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                          Filesize

                                          152B

                                          MD5

                                          5408de1548eb3231accfb9f086f2b9db

                                          SHA1

                                          f2d8c7e9f3e26cd49ee0a7a4fecd70b2bf2b7e8a

                                          SHA256

                                          3052d0885e0ef0d71562958b851db519cfed36fd8e667b57a65374ee1a13a670

                                          SHA512

                                          783254d067de3ac40df618665be7f76a6a8acb7e63b875bffc3c0c73b68d138c8a98c437e6267a1eb33f04be976a14b081a528598b1e517cdd9ad2293501acc8

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                          Filesize

                                          48B

                                          MD5

                                          15c82e7a6521c5a073aad716d3f8987e

                                          SHA1

                                          58f99cd74b18f638130ca6b98cf3e2a487f51329

                                          SHA256

                                          42a437476cc3a6ef37e20811f74352330d2c3f94b4479a02be269efb5d79cd25

                                          SHA512

                                          07a1675ab84efe89a2aa8b19de1e96a6860efe69f507fa4a576d02046d3ca75f76c70bb7151015f8f242982b1192aff69dae4c495097c81967ff45dd9d5c5c11

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                          Filesize

                                          144B

                                          MD5

                                          75d260d6119d8d4f418a34fa2c21ab63

                                          SHA1

                                          f28f3a1435c7b942becb5cf9fb993f465c4add8e

                                          SHA256

                                          365ffbb84e47d5f8b6850955698f1d3f198b31ea7f8c5c82618cf410ff86837e

                                          SHA512

                                          87df6ed1b6ed79be1a7483b36a0ac156245b36f4964bf7746767ded3055c3eb8b343a054db0651c001caca08c27f08bfb040a06816cf6bb60d3372cda05f2d8b

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Edge Profile.ico

                                          Filesize

                                          70KB

                                          MD5

                                          e5e3377341056643b0494b6842c0b544

                                          SHA1

                                          d53fd8e256ec9d5cef8ef5387872e544a2df9108

                                          SHA256

                                          e23040951e464b53b84b11c3466bbd4707a009018819f9ad2a79d1b0b309bc25

                                          SHA512

                                          83f09e48d009a5cf83fa9aa8f28187f7f4202c84e2d0d6e5806c468f4a24b2478b73077381d2a21c89aa64884df3c56e8dc94eb4ad2d6a8085ac2feb1e26c2ef

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                          Filesize

                                          5KB

                                          MD5

                                          8810243e94233b896d5af8b29c58ffab

                                          SHA1

                                          00f48adbd2ba1d186145634f11a7737724b513ec

                                          SHA256

                                          23900ae699c154a7162907ec2b6e86f98e56766ebb7a513034fd643e2fe2d3a4

                                          SHA512

                                          9c23a501ad103c24a027c173fd982df934c9151f82354e4084ab4a7a633ea46641f2d48cf5d7ef8179bfc14bb255c3f69ded6408dcea92fca9d9c317066c4eec

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                          Filesize

                                          5KB

                                          MD5

                                          2360c04661cc1ded3e0756e671634eb3

                                          SHA1

                                          78937f3d13482cd152232214be9d0596b22b75bf

                                          SHA256

                                          7de728bf67b7ae3597e281d4533b8bc8f0fc189c5f1e8bdac73111f94ce22caf

                                          SHA512

                                          aaef17435c17b84da1e95956858b9e8e3cc742b859279d4e6f51dca9e41950f96307bfe070612ac00cacd3c9ffa1c04ab6ada2caac4db2318b3911993def576b

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                          Filesize

                                          5KB

                                          MD5

                                          5162200039fcb775161594c31b8fa24b

                                          SHA1

                                          7aad329b7f4a2019d834c8f75264d8b8afde9542

                                          SHA256

                                          79a0abd393cedf22974f179c5364bd4c9f8f854c95e3d26b3d8c6387a5d28482

                                          SHA512

                                          17e0cc2b126b0b8142b6b46e99f4d4fc92fcb3faa1c63db0377a07a30167781e5d45cda2ad0d94ab9de9317cbd18b7d49d4b1bf7f62a1c82100c2009ac6b29f9

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences

                                          Filesize

                                          24KB

                                          MD5

                                          48febe0b0625901956573dfb2378e7ed

                                          SHA1

                                          c324173a8f8fd7a6a7398f6bb24dd2ee11d3cf24

                                          SHA256

                                          f0fae7ad33efdd05845d0d631ce8341ea4b6dfd4c45be844f0c117738df9c0d0

                                          SHA512

                                          fc38a0c64e67e3b5d43f787fe86f700e6f753d8e90bcebc446d4a8c631b9e4362a74fa862a5b2ffc74f3f5236d3ecf006b341042b5469d1cc24f2c325a607a91

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences

                                          Filesize

                                          24KB

                                          MD5

                                          bc3a0ca62cfef580ff9ebbb7afc92b9b

                                          SHA1

                                          fde9832ce521fcd53850d0701a543ef75b772e3b

                                          SHA256

                                          b0203fb7c3812937e92ac04ad6065a2129bc165a36a60a4d2fdb0accc4499464

                                          SHA512

                                          fc1f3a5bd2106d9b6ed5a678c2f4978550a0d7414172b0ce6954a835b0da01ac28c177955a48c2ef56ea3d517a6672474a9cab873aeccae3f22a45ccf2d070de

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Session Storage\MANIFEST-000001

                                          Filesize

                                          41B

                                          MD5

                                          5af87dfd673ba2115e2fcf5cfdb727ab

                                          SHA1

                                          d5b5bbf396dc291274584ef71f444f420b6056f1

                                          SHA256

                                          f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4

                                          SHA512

                                          de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                          Filesize

                                          16B

                                          MD5

                                          206702161f94c5cd39fadd03f4014d98

                                          SHA1

                                          bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                                          SHA256

                                          1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                                          SHA512

                                          0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\metadata\CURRENT

                                          Filesize

                                          16B

                                          MD5

                                          46295cac801e5d4857d09837238a6394

                                          SHA1

                                          44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                          SHA256

                                          0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                          SHA512

                                          8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                          Filesize

                                          8KB

                                          MD5

                                          0bb0f60ff11c7758c6c7831ec1be0717

                                          SHA1

                                          0167c8834881eff72fe5eceace283a3068628be9

                                          SHA256

                                          283c31ab84d3f35b860d6a13a55faf2c4ae821557f8d320a1396fa11fbeea147

                                          SHA512

                                          9e96bb6b760a6aec497faf75ea25bd0d82db556f6b2cb0c1c24f304c38ed4206c6ad3f217a4f0aa9ea3c12cbeb48749edfe12fc18f54a70bbb6a85388798a275

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                          Filesize

                                          10KB

                                          MD5

                                          3462d301fc301861dd0f3b67d5db6210

                                          SHA1

                                          c67041cee3b044d63d10615ead3659548a109b56

                                          SHA256

                                          80901452a13f7e1b0da2ec2bc7379b4be579b2f6d2ccd85373442d9b1d6b5605

                                          SHA512

                                          49eedfadbbc81ae1a7d91d1ddb4b8357a00e03a4016b54d063301051b3ec9d9a911a782c79e00bfb1c418000f3f65f6286e0c445ed80d6ea16f7fb6fd5877076

                                        • C:\Users\Admin\AppData\Local\Temp\tmp12F6.tmp

                                          Filesize

                                          1KB

                                          MD5

                                          e0f435bc7f56b496d5614b7c4160d236

                                          SHA1

                                          e6e8771c2dfe521b9e74133d06683b43ac57d163

                                          SHA256

                                          004e35bfca8e091453545b6d4ce19314b00fba5fc6f9771d9d76217df0ef6684

                                          SHA512

                                          20b37e407aa1d8d4615817da8568113b750fdf46db79c59b2a1bf5c5b65fa919622c60ca6fca332c38af1af0e8ff105f4e1e481e9d93e0964111bfb2b13f284f

                                        • C:\Users\Admin\AppData\Local\Temp\tmpBEBC.tmp

                                          Filesize

                                          1KB

                                          MD5

                                          fdd36139980f5cbfef3360123665b96c

                                          SHA1

                                          faf5353ca339065426642578c3913906e892becf

                                          SHA256

                                          ff95b1308fc4294f5d6dcb0c171633387d81b4f2efda617292eb784615b17bed

                                          SHA512

                                          2ab91e7733c16300feda4efa61cc11baf21245f85c4cccd08e92c5fd61cfa03d206ba04939362733ce26385dfd66ab4524cd1a0da2c779a7e0ce9d00b4e5e31b

                                        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccba5a5986c77e43.customDestinations-ms

                                          Filesize

                                          3KB

                                          MD5

                                          3836063f7910c03cbecc5007d6026c2a

                                          SHA1

                                          815d63c6e615b8d164490ddc8b7d16268c20b258

                                          SHA256

                                          eb2842635411d73541ce3d3ee04fdc4368adb0792a767e0e04c727d67b8e061a

                                          SHA512

                                          61a64d0499995320a1ca4d0bb9aa56976e0ded813907a99f38339a5682c01f62ce24285dbb4adb9d2d4b4a214bb9ef2d1a5679458fc61fcf4ffce6f07af5ff7c

                                        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccba5a5986c77e43.customDestinations-ms

                                          Filesize

                                          3KB

                                          MD5

                                          b3114d5de97ae5cad99d1f5496e281dc

                                          SHA1

                                          22d6b2c08441991fda527be8f30c81cb00301055

                                          SHA256

                                          08db76864bb59fd2846d17c1c2d73909f892a43fc8ccb934593a71f04728685e

                                          SHA512

                                          0b35e937f3ee4141da8f184693490c603cc59330aa8dbb6714b1a5c4882784d42d518b492ac2bcb90125f8be66071259faa8626629ac53f676216a1663ddf64c

                                        • C:\Users\Admin\Downloads\Unconfirmed 527664.crdownload

                                          Filesize

                                          45KB

                                          MD5

                                          d4731e30c74730a52c53317e723d1f8f

                                          SHA1

                                          78abe02baab00478135fbb980cbb6c19d7d7120f

                                          SHA256

                                          4e8445b92a76947f6dc52dfbe6dd77c2fe4cb32761de7c9b8e292a8c83930312

                                          SHA512

                                          474bb63e8ccf353c68ca703630ab721899c6363b57cef296e1b3447f5761d85efc66886dbf79a050b40a8d0c57f4b880dc909fee73bcd3b2762c7066fb83eb60

                                        • memory/4688-221-0x0000000000AE0000-0x0000000000AF2000-memory.dmp

                                          Filesize

                                          72KB