Analysis

  • max time kernel
    116s
  • max time network
    112s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-02-2025 11:18

General

  • Target

    https://gofile.io/d/3XgttD

Malware Config

Extracted

Family

xenorat

C2

127.0.0.1

Mutex

release_yeah

Attributes
  • delay

    5000

  • install_path

    temp

  • port

    4444

  • startup_name

    release

Signatures

  • Detect XenoRat Payload 2 IoCs
  • XenorRat

    XenorRat is a remote access trojan written in C#.

  • Xenorat family
  • Downloads MZ/PE file 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 15 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 19 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • NTFS ADS 2 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 4 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
  • Suspicious use of FindShellTrayWindow 35 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://gofile.io/d/3XgttD
    1⤵
    • Enumerates system info in registry
    • Modifies registry class
    • NTFS ADS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:372
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd0c6c46f8,0x7ffd0c6c4708,0x7ffd0c6c4718
      2⤵
        PID:2364
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,17861488991637029105,12162442994028546040,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2144 /prefetch:2
        2⤵
          PID:3064
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2084,17861488991637029105,12162442994028546040,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2488 /prefetch:3
          2⤵
          • Downloads MZ/PE file
          • Suspicious behavior: EnumeratesProcesses
          PID:2468
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2084,17861488991637029105,12162442994028546040,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2808 /prefetch:8
          2⤵
            PID:1152
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,17861488991637029105,12162442994028546040,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:1
            2⤵
              PID:4432
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,17861488991637029105,12162442994028546040,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:1
              2⤵
                PID:4772
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,17861488991637029105,12162442994028546040,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4764 /prefetch:1
                2⤵
                  PID:1588
                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,17861488991637029105,12162442994028546040,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3596 /prefetch:8
                  2⤵
                    PID:5096
                  • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,17861488991637029105,12162442994028546040,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3596 /prefetch:8
                    2⤵
                    • Suspicious behavior: EnumeratesProcesses
                    PID:4896
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,17861488991637029105,12162442994028546040,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4148 /prefetch:1
                    2⤵
                      PID:3608
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2084,17861488991637029105,12162442994028546040,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=4296 /prefetch:8
                      2⤵
                        PID:4668
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,17861488991637029105,12162442994028546040,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5600 /prefetch:1
                        2⤵
                          PID:3700
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2084,17861488991637029105,12162442994028546040,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6028 /prefetch:8
                          2⤵
                            PID:1792
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,17861488991637029105,12162442994028546040,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6044 /prefetch:1
                            2⤵
                              PID:644
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,17861488991637029105,12162442994028546040,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6148 /prefetch:1
                              2⤵
                                PID:4832
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,17861488991637029105,12162442994028546040,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5632 /prefetch:1
                                2⤵
                                  PID:560
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,17861488991637029105,12162442994028546040,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6416 /prefetch:1
                                  2⤵
                                    PID:1852
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2084,17861488991637029105,12162442994028546040,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5920 /prefetch:8
                                    2⤵
                                    • Suspicious behavior: EnumeratesProcesses
                                    PID:4868
                                  • C:\Users\Admin\Downloads\release.exe
                                    "C:\Users\Admin\Downloads\release.exe"
                                    2⤵
                                    • Checks computer location settings
                                    • Executes dropped EXE
                                    • System Location Discovery: System Language Discovery
                                    • NTFS ADS
                                    PID:1416
                                    • C:\Users\Admin\AppData\Local\Temp\XenoManager\release.exe
                                      "C:\Users\Admin\AppData\Local\Temp\XenoManager\release.exe"
                                      3⤵
                                      • Executes dropped EXE
                                      • System Location Discovery: System Language Discovery
                                      PID:2276
                                      • C:\Windows\SysWOW64\schtasks.exe
                                        "schtasks.exe" /Create /TN "release" /XML "C:\Users\Admin\AppData\Local\Temp\tmpFFAD.tmp" /F
                                        4⤵
                                        • System Location Discovery: System Language Discovery
                                        • Scheduled Task/Job: Scheduled Task
                                        PID:3944
                                  • C:\Users\Admin\Downloads\release.exe
                                    "C:\Users\Admin\Downloads\release.exe"
                                    2⤵
                                    • Executes dropped EXE
                                    • System Location Discovery: System Language Discovery
                                    PID:4696
                                    • C:\Windows\SysWOW64\schtasks.exe
                                      "schtasks.exe" /Create /TN "release" /XML "C:\Users\Admin\AppData\Local\Temp\tmpD3E5.tmp" /F
                                      3⤵
                                      • System Location Discovery: System Language Discovery
                                      • Scheduled Task/Job: Scheduled Task
                                      PID:2780
                                  • C:\Users\Admin\Downloads\release.exe
                                    "C:\Users\Admin\Downloads\release.exe"
                                    2⤵
                                    • Executes dropped EXE
                                    • System Location Discovery: System Language Discovery
                                    PID:2832
                                  • C:\Users\Admin\Downloads\release.exe
                                    "C:\Users\Admin\Downloads\release.exe"
                                    2⤵
                                    • Executes dropped EXE
                                    • System Location Discovery: System Language Discovery
                                    PID:1252
                                  • C:\Users\Admin\Downloads\release.exe
                                    "C:\Users\Admin\Downloads\release.exe"
                                    2⤵
                                    • Executes dropped EXE
                                    • System Location Discovery: System Language Discovery
                                    PID:3868
                                  • C:\Users\Admin\Downloads\release.exe
                                    "C:\Users\Admin\Downloads\release.exe"
                                    2⤵
                                    • Executes dropped EXE
                                    • System Location Discovery: System Language Discovery
                                    PID:4388
                                  • C:\Users\Admin\Downloads\release.exe
                                    "C:\Users\Admin\Downloads\release.exe"
                                    2⤵
                                    • Executes dropped EXE
                                    • System Location Discovery: System Language Discovery
                                    PID:2304
                                  • C:\Users\Admin\Downloads\release.exe
                                    "C:\Users\Admin\Downloads\release.exe"
                                    2⤵
                                    • Executes dropped EXE
                                    • System Location Discovery: System Language Discovery
                                    PID:2896
                                  • C:\Users\Admin\Downloads\release.exe
                                    "C:\Users\Admin\Downloads\release.exe"
                                    2⤵
                                    • Executes dropped EXE
                                    • System Location Discovery: System Language Discovery
                                    PID:1308
                                  • C:\Users\Admin\Downloads\release.exe
                                    "C:\Users\Admin\Downloads\release.exe"
                                    2⤵
                                    • Executes dropped EXE
                                    • System Location Discovery: System Language Discovery
                                    PID:3160
                                • C:\Windows\System32\CompPkgSrv.exe
                                  C:\Windows\System32\CompPkgSrv.exe -Embedding
                                  1⤵
                                    PID:388
                                  • C:\Windows\System32\CompPkgSrv.exe
                                    C:\Windows\System32\CompPkgSrv.exe -Embedding
                                    1⤵
                                      PID:3144
                                    • C:\Windows\System32\rundll32.exe
                                      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                      1⤵
                                        PID:1860
                                      • C:\Users\Admin\Downloads\release.exe
                                        "C:\Users\Admin\Downloads\release.exe"
                                        1⤵
                                        • Executes dropped EXE
                                        • System Location Discovery: System Language Discovery
                                        PID:4952
                                        • C:\Windows\SysWOW64\schtasks.exe
                                          "schtasks.exe" /Create /TN "release" /XML "C:\Users\Admin\AppData\Local\Temp\tmpF48C.tmp" /F
                                          2⤵
                                          • System Location Discovery: System Language Discovery
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:4960
                                      • C:\Users\Admin\Downloads\release.exe
                                        "C:\Users\Admin\Downloads\release.exe"
                                        1⤵
                                        • Executes dropped EXE
                                        • System Location Discovery: System Language Discovery
                                        PID:4840
                                      • C:\Users\Admin\Downloads\release.exe
                                        "C:\Users\Admin\Downloads\release.exe"
                                        1⤵
                                        • Executes dropped EXE
                                        • System Location Discovery: System Language Discovery
                                        PID:4760
                                      • C:\Users\Admin\Downloads\release.exe
                                        "C:\Users\Admin\Downloads\release.exe"
                                        1⤵
                                        • Executes dropped EXE
                                        • System Location Discovery: System Language Discovery
                                        PID:4180
                                        • C:\Windows\SysWOW64\schtasks.exe
                                          "schtasks.exe" /Create /TN "release" /XML "C:\Users\Admin\AppData\Local\Temp\tmp33E7.tmp" /F
                                          2⤵
                                          • System Location Discovery: System Language Discovery
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:4812

                                      Network

                                      MITRE ATT&CK Enterprise v15

                                      Replay Monitor

                                      Loading Replay Monitor...

                                      Downloads

                                      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\release.exe.log

                                        Filesize

                                        226B

                                        MD5

                                        916851e072fbabc4796d8916c5131092

                                        SHA1

                                        d48a602229a690c512d5fdaf4c8d77547a88e7a2

                                        SHA256

                                        7e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d

                                        SHA512

                                        07ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                        Filesize

                                        152B

                                        MD5

                                        dc058ebc0f8181946a312f0be99ed79c

                                        SHA1

                                        0c6f376ed8f2d4c275336048c7c9ef9edf18bff0

                                        SHA256

                                        378701e87dcff90aa092702bc299859d6ae8f7e313f773bf594f81df6f40bf6a

                                        SHA512

                                        36e0de64a554762b28045baebf9f71930c59d608f8d05c5faf8906d62eaf83f6d856ef1d1b38110e512fbb1a85d3e2310be11a7f679c6b5b3c62313cc7af52aa

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                        Filesize

                                        152B

                                        MD5

                                        a0486d6f8406d852dd805b66ff467692

                                        SHA1

                                        77ba1f63142e86b21c951b808f4bc5d8ed89b571

                                        SHA256

                                        c0745fd195f3a51b27e4d35a626378a62935dccebefb94db404166befd68b2be

                                        SHA512

                                        065a62032eb799fade5fe75f390e7ab3c9442d74cb8b520d846662d144433f39b9186b3ef3db3480cd1d1d655d8f0630855ed5d6e85cf157a40c38a19375ed8a

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                        Filesize

                                        144B

                                        MD5

                                        89073260996fc58c4bf1fb87638eb172

                                        SHA1

                                        ff91f3892bc0eb3169aabba7bb03194eea9e0a1b

                                        SHA256

                                        1cd4028738dd3c3b54d455c518c6ef16043bd3c8180e5adcd594c5b5f0d70019

                                        SHA512

                                        d7b7c6fc700baddd426c0d882423224ea676b40b29a99d3b9c641ebb2cb767732acc34826795aff9e353926b905a49f7e0382a0ecd1f843ffa4e10393fc76ca4

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                        Filesize

                                        391B

                                        MD5

                                        4d92cd9b6cce57bcc02f7250cbfa431d

                                        SHA1

                                        c63187cb723e7325d70adb1a38ae3b72f5f49708

                                        SHA256

                                        22878d854e100f121dcc0c932d1bb1dbfb880e34093fa99e97561a368af5bc16

                                        SHA512

                                        d051d9f2c8e2d96533960a1f6d0a762bf879d976771490835e080572c27b04353f3c88cbe88a7230306fe2907793ca092a4441d875d0a00505c142d3c60ffa04

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                        Filesize

                                        6KB

                                        MD5

                                        648ff440a233739fc29270b2f899a99f

                                        SHA1

                                        9ab40b9f1857b35fcc05207dbcb11d7425f7d0ba

                                        SHA256

                                        08e5d30e5f70767d65b893da175cacff2910fe883ac58123c0dd6419d72a9c50

                                        SHA512

                                        7e61f1c4536eb338082d833f55f9d56b3d45cdbd73cbe07deccd9a25ff075a2bc9230fc4604de6e1b0cd00cb0491aec7df6378f5f92164c2a01840da97bbaafe

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                        Filesize

                                        6KB

                                        MD5

                                        c33345b9a8c58ed28cea8f720ac164e7

                                        SHA1

                                        69197da4747ac2f8237eeede254eb02a281faae7

                                        SHA256

                                        97b2e83eaa098abd8b030aa8c2b48f9f17ffbefba574bc888500f98cd4ac741c

                                        SHA512

                                        057852bbf020ed27dbdd3876e7296a1fea2b7e51d68f59cb138035d3277e67824f47db5a1095bd90eb22997ee31704f846d637bf63beedf08390fae2d2a5093c

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                        Filesize

                                        5KB

                                        MD5

                                        432ab3f6e41f31ee4d2f807a24523406

                                        SHA1

                                        ebfcd5046ef9efb59ef19f69496f636d680a4e8e

                                        SHA256

                                        4f13a10981455a22501908bb7323d79ebb5c64b05a5175ee578ed8c3d7c1222a

                                        SHA512

                                        f87abfe5d0db5a7a524e27ea8cb10877bb2eda62dd0833cf7063040e8ec8bfc13ce2641243194e5ef59ad973177a02f0289051bbd7e0094857fc73b46b191b14

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                        Filesize

                                        16B

                                        MD5

                                        6752a1d65b201c13b62ea44016eb221f

                                        SHA1

                                        58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                        SHA256

                                        0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                        SHA512

                                        9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                        Filesize

                                        10KB

                                        MD5

                                        e540dc9c0a9e3dd0c82a96e95b6ad050

                                        SHA1

                                        cf13a6e6fa006d6a114e3ccbd7dcd0b493be0543

                                        SHA256

                                        d61e82b0e4c98e68e9da2d441cbfc24603e9b90fcdfbe72fc0304334efe175f8

                                        SHA512

                                        f8b05656396c54fab017d8c2318fa8e11fde81e12818a94c5e3ea0b3153cb91cec0e83157993a1be9e181949b67d8cd3c3ff48849b6d29e5d965bb6f3c520254

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                        Filesize

                                        10KB

                                        MD5

                                        de83f116e8a7e2eb094a7105aaadc60c

                                        SHA1

                                        9ce2afe2b8bf0c276d1d1cd05111543528268b3b

                                        SHA256

                                        85e4edaf0b2017e35069b7a38b5e5991bf705692b6708f4cb17582292df5eb2a

                                        SHA512

                                        346d949d095a546460146a481e66afcb8d0142b971fe8634ad56967c5b917712dbb832815324c6f8796ced021fe02aa03a9e8124905a220ee0d2f1816677d308

                                      • C:\Users\Admin\AppData\Local\Temp\tmpD3E5.tmp

                                        Filesize

                                        1KB

                                        MD5

                                        465cb44b3bb5f0cab1efd33b4df70e77

                                        SHA1

                                        08c07fdda793563fbcf2c8cb4678ec07d17ffd8b

                                        SHA256

                                        a47a32a064d634d72030645475dabd6d8717400f91d915a1505bafb459042dde

                                        SHA512

                                        fb69e067c5ee92a418c1fc19828005209e13759020e5149657d8566a6763b3fb5c9d589dfdc0210a0fb4a3e48f3699a6c67d53cf8e17c5bc7cc33d8f13e66c4f

                                      • C:\Users\Admin\AppData\Local\Temp\tmpFFAD.tmp

                                        Filesize

                                        1KB

                                        MD5

                                        46464b26588d6e646fdd347cd96bac8a

                                        SHA1

                                        c842f6ee5cc8af1f0fbd2f5c2b055ab50f922afb

                                        SHA256

                                        b202ebb06a5b9ebcb016aaaf5eae5fc26a194f6e35622d554baed8d522df0b00

                                        SHA512

                                        6152aa413295dd7710ee314ef1cfa6d7a69ea1d76c1389c469445e1838ac6155ddae5b9ccea3390a48efd46dfa31bddd8165bee50f41de53e0a3ff394f72c4b6

                                      • C:\Users\Admin\Downloads\Unconfirmed 127605.crdownload

                                        Filesize

                                        45KB

                                        MD5

                                        47bd0d3a795f36648983430b59f96eed

                                        SHA1

                                        eaa0a5a2718750d9dcafceb6f6384e8e957a61eb

                                        SHA256

                                        ae228c049c2bd09df8add7f8b2ccdfbe10e1b672850f534990451b1beb278c42

                                        SHA512

                                        de7114831e478f205a04e5015fa8323951fd63a2b7701127e366cbb2e4ceaafad830b0f2ce92d3c35e7f76cfa94f785407837b4eadc13dce05c88ac83c90af2b

                                      • memory/1416-115-0x0000000000D70000-0x0000000000D82000-memory.dmp

                                        Filesize

                                        72KB