Analysis

  • max time kernel
    149s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-01-2025 02:52

General

  • Target

    https://gofile.io/d/vDiamn

Malware Config

Extracted

Family

xred

C2

xred.mooo.com

Attributes
  • email

    [email protected]

  • payload_url

    http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download

    https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1

    http://xred.site50.net/syn/SUpdate.ini

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download

    https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1

    http://xred.site50.net/syn/Synaptics.rar

    https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download

    https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1

    http://xred.site50.net/syn/SSLLibrary.dll

Signatures

  • Xred

    Xred is backdoor written in Delphi.

  • Xred family
  • Downloads MZ/PE file 1 IoCs
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 3 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 9 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 6 IoCs
  • Modifies registry class 3 IoCs
  • NTFS ADS 4 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 30 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 37 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://gofile.io/d/vDiamn
    1⤵
    • Enumerates system info in registry
    • NTFS ADS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2616
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdcccc46f8,0x7ffdcccc4708,0x7ffdcccc4718
      2⤵
        PID:2720
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2180,11524299680527205719,1511972286013632244,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2188 /prefetch:2
        2⤵
          PID:1476
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2180,11524299680527205719,1511972286013632244,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2240 /prefetch:3
          2⤵
          • Downloads MZ/PE file
          • Suspicious behavior: EnumeratesProcesses
          PID:1176
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2180,11524299680527205719,1511972286013632244,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2664 /prefetch:8
          2⤵
            PID:1908
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,11524299680527205719,1511972286013632244,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:1
            2⤵
              PID:2088
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,11524299680527205719,1511972286013632244,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:1
              2⤵
                PID:2580
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,11524299680527205719,1511972286013632244,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4668 /prefetch:1
                2⤵
                  PID:4432
                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2180,11524299680527205719,1511972286013632244,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4964 /prefetch:8
                  2⤵
                    PID:3848
                  • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2180,11524299680527205719,1511972286013632244,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4964 /prefetch:8
                    2⤵
                    • Suspicious behavior: EnumeratesProcesses
                    PID:1568
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,11524299680527205719,1511972286013632244,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5004 /prefetch:1
                    2⤵
                      PID:1752
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2180,11524299680527205719,1511972286013632244,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5328 /prefetch:8
                      2⤵
                        PID:2244
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,11524299680527205719,1511972286013632244,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5476 /prefetch:1
                        2⤵
                          PID:920
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2180,11524299680527205719,1511972286013632244,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6032 /prefetch:8
                          2⤵
                            PID:2440
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,11524299680527205719,1511972286013632244,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5840 /prefetch:1
                            2⤵
                              PID:1900
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2180,11524299680527205719,1511972286013632244,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6128 /prefetch:8
                              2⤵
                              • Suspicious behavior: EnumeratesProcesses
                              PID:1604
                            • C:\Users\Admin\Downloads\Da2dalus.exe
                              "C:\Users\Admin\Downloads\Da2dalus.exe"
                              2⤵
                              • Checks computer location settings
                              • Executes dropped EXE
                              • Adds Run key to start application
                              • System Location Discovery: System Language Discovery
                              • Modifies registry class
                              • NTFS ADS
                              PID:4040
                              • C:\Users\Admin\Downloads\._cache_Da2dalus.exe
                                "C:\Users\Admin\Downloads\._cache_Da2dalus.exe"
                                3⤵
                                • Executes dropped EXE
                                • Adds Run key to start application
                                • Writes to the Master Boot Record (MBR)
                                • System Location Discovery: System Language Discovery
                                • Suspicious behavior: EnumeratesProcesses
                                • Suspicious use of AdjustPrivilegeToken
                                PID:3140
                                • C:\Windows\SysWOW64\schtasks.exe
                                  schtasks.exe /Create /TN wininit /ru SYSTEM /SC ONSTART /TR "C:\Users\Admin\Downloads\._cache_Da2dalus.exe"
                                  4⤵
                                  • System Location Discovery: System Language Discovery
                                  • Scheduled Task/Job: Scheduled Task
                                  PID:2324
                                • C:\Windows\SysWOW64\WerFault.exe
                                  C:\Windows\SysWOW64\WerFault.exe -u -p 3140 -s 512
                                  4⤵
                                  • Program crash
                                  PID:5328
                              • C:\ProgramData\Synaptics\Synaptics.exe
                                "C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate
                                3⤵
                                • Checks computer location settings
                                • Executes dropped EXE
                                • Loads dropped DLL
                                • System Location Discovery: System Language Discovery
                                • Modifies registry class
                                • NTFS ADS
                                PID:5208
                                • C:\Users\Admin\Downloads\._cache_Synaptics.exe
                                  "C:\Users\Admin\Downloads\._cache_Synaptics.exe" InjUpdate
                                  4⤵
                                  • Executes dropped EXE
                                  • Adds Run key to start application
                                  • Writes to the Master Boot Record (MBR)
                                  • System Location Discovery: System Language Discovery
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:5560
                                  • C:\Windows\SysWOW64\schtasks.exe
                                    schtasks.exe /Create /TN wininit /ru SYSTEM /SC ONSTART /TR "C:\Users\Admin\Downloads\._cache_Synaptics.exe"
                                    5⤵
                                    • System Location Discovery: System Language Discovery
                                    • Scheduled Task/Job: Scheduled Task
                                    PID:5604
                                  • C:\Windows\SysWOW64\WerFault.exe
                                    C:\Windows\SysWOW64\WerFault.exe -u -p 5560 -s 508
                                    5⤵
                                    • Program crash
                                    PID:5696
                            • C:\Users\Admin\Downloads\Da2dalus.exe
                              "C:\Users\Admin\Downloads\Da2dalus.exe"
                              2⤵
                              • Checks computer location settings
                              • Executes dropped EXE
                              • Loads dropped DLL
                              • System Location Discovery: System Language Discovery
                              • Modifies registry class
                              PID:5812
                              • C:\Users\Admin\Downloads\._cache_Da2dalus.exe
                                "C:\Users\Admin\Downloads\._cache_Da2dalus.exe"
                                3⤵
                                • Executes dropped EXE
                                • Adds Run key to start application
                                • Writes to the Master Boot Record (MBR)
                                • System Location Discovery: System Language Discovery
                                • Suspicious behavior: EnumeratesProcesses
                                • Suspicious use of AdjustPrivilegeToken
                                PID:5884
                                • C:\Windows\SysWOW64\schtasks.exe
                                  schtasks.exe /Create /TN wininit /ru SYSTEM /SC ONSTART /TR "C:\Users\Admin\Downloads\._cache_Da2dalus.exe"
                                  4⤵
                                  • System Location Discovery: System Language Discovery
                                  • Scheduled Task/Job: Scheduled Task
                                  PID:5904
                                • C:\Windows\SysWOW64\WerFault.exe
                                  C:\Windows\SysWOW64\WerFault.exe -u -p 5884 -s 480
                                  4⤵
                                  • Program crash
                                  PID:5992
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,11524299680527205719,1511972286013632244,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6316 /prefetch:1
                              2⤵
                                PID:1644
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,11524299680527205719,1511972286013632244,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4068 /prefetch:1
                                2⤵
                                  PID:5232
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,11524299680527205719,1511972286013632244,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4984 /prefetch:1
                                  2⤵
                                    PID:5716
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,11524299680527205719,1511972286013632244,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3616 /prefetch:1
                                    2⤵
                                      PID:5708
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2180,11524299680527205719,1511972286013632244,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3172 /prefetch:2
                                      2⤵
                                      • Suspicious behavior: EnumeratesProcesses
                                      PID:4032
                                  • C:\Windows\System32\CompPkgSrv.exe
                                    C:\Windows\System32\CompPkgSrv.exe -Embedding
                                    1⤵
                                      PID:744
                                    • C:\Windows\System32\CompPkgSrv.exe
                                      C:\Windows\System32\CompPkgSrv.exe -Embedding
                                      1⤵
                                        PID:1036
                                      • C:\Windows\SysWOW64\WerFault.exe
                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3140 -ip 3140
                                        1⤵
                                          PID:5232
                                        • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
                                          "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding
                                          1⤵
                                          • Checks processor information in registry
                                          • Enumerates system info in registry
                                          • Suspicious behavior: AddClipboardFormatListener
                                          • Suspicious use of SetWindowsHookEx
                                          PID:5596
                                        • C:\Windows\SysWOW64\WerFault.exe
                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 5560 -ip 5560
                                          1⤵
                                            PID:5644
                                          • C:\Windows\SysWOW64\WerFault.exe
                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 5884 -ip 5884
                                            1⤵
                                              PID:5948

                                            Network

                                            MITRE ATT&CK Enterprise v15

                                            Replay Monitor

                                            Loading Replay Monitor...

                                            Downloads

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                              Filesize

                                              152B

                                              MD5

                                              dc058ebc0f8181946a312f0be99ed79c

                                              SHA1

                                              0c6f376ed8f2d4c275336048c7c9ef9edf18bff0

                                              SHA256

                                              378701e87dcff90aa092702bc299859d6ae8f7e313f773bf594f81df6f40bf6a

                                              SHA512

                                              36e0de64a554762b28045baebf9f71930c59d608f8d05c5faf8906d62eaf83f6d856ef1d1b38110e512fbb1a85d3e2310be11a7f679c6b5b3c62313cc7af52aa

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                              Filesize

                                              152B

                                              MD5

                                              a0486d6f8406d852dd805b66ff467692

                                              SHA1

                                              77ba1f63142e86b21c951b808f4bc5d8ed89b571

                                              SHA256

                                              c0745fd195f3a51b27e4d35a626378a62935dccebefb94db404166befd68b2be

                                              SHA512

                                              065a62032eb799fade5fe75f390e7ab3c9442d74cb8b520d846662d144433f39b9186b3ef3db3480cd1d1d655d8f0630855ed5d6e85cf157a40c38a19375ed8a

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                              Filesize

                                              144B

                                              MD5

                                              7abc9dd583bcf3e0b84e7242b2285092

                                              SHA1

                                              3ca9f775424cc20271c2423af1836de4b8aa6f7b

                                              SHA256

                                              0968267af56c88277823edd3d415473890c1a4ab15dda735c5ae3c1743b418ed

                                              SHA512

                                              627c10d72c66d62d756211aa5427a77601d648e61e1c22d7e342d2a19d77cd7b75d51900f1362a9a684cbeb8a17cf580e5ae3f3006d622f3419ae9b37858eaca

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                              Filesize

                                              391B

                                              MD5

                                              8ecc404865b907d91f3fdbf72e52c2a1

                                              SHA1

                                              294a53863d70a0e7c21bd581dfa9585e34668028

                                              SHA256

                                              bd8180f4979fd1b24f943983ab73001e4e0ce9b58614b4feb90426a1ee13cae0

                                              SHA512

                                              5a14b813c3d916d4f08b3f77b04a8eef3d055e72557a8a0986dc34350803e60e5fb4afe6ce66d80acd51a5f65f9b0edfa0f2667736d431d3cde9580bd652ecdf

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                              Filesize

                                              5KB

                                              MD5

                                              1fcfd2bcc89dd2fd6e75cda20bbdba9f

                                              SHA1

                                              c4fe26a4630d93f0b2ec52c660757aa6cc05827c

                                              SHA256

                                              7906438a4751c0aeaa4602b12a154966b781ddf065baba71e218a687c11dbad9

                                              SHA512

                                              8c0b504d4bf3c48f79bd735ebd046956c56dcc33b8db83d62df34e27492522054bb06c772eac6895cafa0d939619ea94c042846b68af4d97086a2938a1144678

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                              Filesize

                                              6KB

                                              MD5

                                              33e26b979566bec28f5d539f3887ec84

                                              SHA1

                                              f5d6e4ed9f5e773dd6f58baab765c73f486d98b6

                                              SHA256

                                              8b11d0d7f564ecbc77f05010828396455ab7480276839d107178b3ae995205bb

                                              SHA512

                                              5cf791ac43ce08ce3a672732b2d76ebc2ef5d600dd1ba37c115c6663860a07402d8da78d9fc561b21270cc1cb25f8f699cba201bfd5b664868a998f5caee5b90

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                              Filesize

                                              16B

                                              MD5

                                              6752a1d65b201c13b62ea44016eb221f

                                              SHA1

                                              58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                              SHA256

                                              0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                              SHA512

                                              9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                              Filesize

                                              10KB

                                              MD5

                                              a7409ea0ee5049f37536585e28a23bdc

                                              SHA1

                                              669e9b416ec3fb4f1c0623dc58f264a9f112e3e7

                                              SHA256

                                              de7ccf0856bb56b115c2898ff2bb09100f1272d1ef6d9d59752736d648271b96

                                              SHA512

                                              a1d117561963abbd920ba8110e0d783d6e328281aa2529d87499436e3858d866977eccf16205ac30d3de09600e4ad28fe3e3313bd2c3b256f0b8680953a1a00b

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                              Filesize

                                              10KB

                                              MD5

                                              239d4bb96ebeef406ae6928f458621ed

                                              SHA1

                                              c57d3e75566a64f7fd7f862958c0ee1f8df908d0

                                              SHA256

                                              7ac017b81bdb051e5169c13072b1db459ab00a7ece55fb8a8128597f460b1339

                                              SHA512

                                              7067f041b79cb0daaf15707b24d2bfb621621b0e63fb714f843522b44cb426751e9270707c76f938eb886c30f38f4d1ace265b1b15de72138558aa3af068ce3d

                                            • C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\9cd93bc6dcf544bae69531052e64647ec02f2bb4.tbres

                                              Filesize

                                              4KB

                                              MD5

                                              f7cd996646533f0a12cc2e289d7a1d8b

                                              SHA1

                                              357bc7654bd9f19af866ae1c2edd56baf39cc38a

                                              SHA256

                                              d03dce9e9d8943c28231352d723b9957ba860b85af0fabac721a10c110b27f82

                                              SHA512

                                              38646cd12f328296d5eece1f3ac2068438734c6e22881019876649ea4a18909c18d91a4a081d0d1c4a692a5816d18984006eadebb8ed5dc811f56e96186ebc4e

                                            • C:\Users\Admin\AppData\Local\Temp\85C75E00

                                              Filesize

                                              23KB

                                              MD5

                                              c9681f56519a32691460c3d2c3f6a359

                                              SHA1

                                              f9027914f569a14ca4ed9039de397b18d7372e1b

                                              SHA256

                                              0dc2f584b6009bdd095f911b4ac99dbe2fbb96c6cb88dfa77503f23461dd5c72

                                              SHA512

                                              ca1533f027a45a973b59608f4a3d4df28e64d654a926029b6d4695bac9f2497b2bb6fcf684eb40aceae884ece2b4be647d40cbd62e1db19e7bcee6e4cd7b985d

                                            • C:\Users\Admin\AppData\Local\Temp\plw3ggyU.xlsm

                                              Filesize

                                              17KB

                                              MD5

                                              e566fc53051035e1e6fd0ed1823de0f9

                                              SHA1

                                              00bc96c48b98676ecd67e81a6f1d7754e4156044

                                              SHA256

                                              8e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15

                                              SHA512

                                              a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04

                                            • C:\Users\Admin\Downloads\._cache_Da2dalus.exe

                                              Filesize

                                              150KB

                                              MD5

                                              2b290f588594a23f5685f851edae21cf

                                              SHA1

                                              9f3703bc7c9be2a468cb9cea9c76b106871bbd0d

                                              SHA256

                                              01c572264dd4d49b68b480698ccf8694557e79356366656da4ce13cfb63e5d3a

                                              SHA512

                                              c21bec4d5f7d5473dafbda5ce0385e1584b456d331f49f18789c2899603a03164f0f41c93111eaa96bfce367970ed3b39516314917d90869f2cd26fea636b198

                                            • C:\Users\Admin\Downloads\Unconfirmed 30771.crdownload

                                              Filesize

                                              904KB

                                              MD5

                                              5a38adf9adbc76bc3372cb728fa0a1bd

                                              SHA1

                                              80019a609790bd67855590d719c283edd50c93a7

                                              SHA256

                                              72042a01e253fbaedeff3a532795574d496a99b787f35c0f1e30c5cc69a63d6b

                                              SHA512

                                              034ca1fe24b7cbdf8c5024fb2dc1e8a52392d1e278b7c54eb0db1ac6aa76b4577e60a0b9ce7573bfdfe452d3269f24ef5bed2df86e33eacb63ea2ea0f0996d22

                                            • memory/3140-325-0x0000000000400000-0x000000000043B000-memory.dmp

                                              Filesize

                                              236KB

                                            • memory/4040-195-0x0000000000400000-0x00000000004E8000-memory.dmp

                                              Filesize

                                              928KB

                                            • memory/5208-326-0x0000000000400000-0x00000000004E8000-memory.dmp

                                              Filesize

                                              928KB

                                            • memory/5208-426-0x0000000000400000-0x00000000004E8000-memory.dmp

                                              Filesize

                                              928KB

                                            • memory/5560-327-0x0000000000400000-0x000000000043B000-memory.dmp

                                              Filesize

                                              236KB

                                            • memory/5596-234-0x00007FFD9ADD0000-0x00007FFD9ADE0000-memory.dmp

                                              Filesize

                                              64KB

                                            • memory/5596-237-0x00007FFD98C50000-0x00007FFD98C60000-memory.dmp

                                              Filesize

                                              64KB

                                            • memory/5596-236-0x00007FFD98C50000-0x00007FFD98C60000-memory.dmp

                                              Filesize

                                              64KB

                                            • memory/5596-231-0x00007FFD9ADD0000-0x00007FFD9ADE0000-memory.dmp

                                              Filesize

                                              64KB

                                            • memory/5596-235-0x00007FFD9ADD0000-0x00007FFD9ADE0000-memory.dmp

                                              Filesize

                                              64KB

                                            • memory/5596-232-0x00007FFD9ADD0000-0x00007FFD9ADE0000-memory.dmp

                                              Filesize

                                              64KB

                                            • memory/5596-233-0x00007FFD9ADD0000-0x00007FFD9ADE0000-memory.dmp

                                              Filesize

                                              64KB

                                            • memory/5812-243-0x0000000000400000-0x00000000004E8000-memory.dmp

                                              Filesize

                                              928KB

                                            • memory/5884-331-0x0000000000400000-0x000000000043B000-memory.dmp

                                              Filesize

                                              236KB