Resubmissions

09-01-2025 19:49

250109-yjtbhs1nck 10

09-01-2025 19:48

250109-yjlaxa1nbq 3

09-01-2025 18:48

250109-xf75tszlcj 10

09-01-2025 18:45

250109-xeef5azkfp 10

09-01-2025 18:34

250109-w7sc1szjak 10

09-01-2025 18:31

250109-w54y2axkf1 10

03-01-2025 17:08

250103-vntw3atqdt 10

03-01-2025 15:27

250103-svv2latmgr 10

03-01-2025 15:23

250103-sslp5stlhk 10

Analysis

  • max time kernel
    138s
  • max time network
    139s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-01-2025 17:08

General

  • Target

    https://github.com/Intestio/XWorm-RAT/releases/tag/xworm

Malware Config

Extracted

Family

gurcu

C2

https://api.telegram.org/bot8077286634:AAG1XHb6leJVqlqfJbmVoJd2ysHqXSznNdQ/sendDocument?chat_id=-1002258988684&caption=%F0%9F%93%82%20-%20Browser%20data%0A%E2%94%9C%E2%94%80%E2%94%80%20%F0%9F%93%82%20-%20cookies(0.25%20kb)%0A%E2%94%9C%E2%94%80%E2%94%80%20%F0%9F%93%84%20-%20BrowserDownloads.txt%20(0.21%20kb

https://api.telegram.org/bot8077286634:AAG1XHb6leJVqlqfJbmVoJd2ysHqXSznNdQ/sendMessage?chat_id=-1002258988684

https://api.telegram.org/bot8077286634:AAG1XHb6leJVqlqfJbmVoJd2ysHqXSznNdQ/getUpdates?offset=-

https://api.telegram.org/bot8077286634:AAG1XHb6leJVqlqfJbmVoJd2ysHqXSznNdQ/sendDocument?chat_id=-1002258988684&caption=%F0%9F%93%B8Screenshot%20take

Signatures

  • Gurcu family
  • Gurcu, WhiteSnake

    Gurcu aka WhiteSnake is a malware stealer written in C#.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates processes with tasklist 1 TTPs 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • Modifies registry key 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 25 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://github.com/Intestio/XWorm-RAT/releases/tag/xworm
    1⤵
    • Enumerates system info in registry
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4680
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd1b3f46f8,0x7ffd1b3f4708,0x7ffd1b3f4718
      2⤵
        PID:2988
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,12977584804296276861,18301911713219940824,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2140 /prefetch:2
        2⤵
          PID:4504
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,12977584804296276861,18301911713219940824,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:3996
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,12977584804296276861,18301911713219940824,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2908 /prefetch:8
          2⤵
            PID:2556
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,12977584804296276861,18301911713219940824,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:1
            2⤵
              PID:1920
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,12977584804296276861,18301911713219940824,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3392 /prefetch:1
              2⤵
                PID:4404
              • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,12977584804296276861,18301911713219940824,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5660 /prefetch:8
                2⤵
                  PID:3920
                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,12977584804296276861,18301911713219940824,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5660 /prefetch:8
                  2⤵
                  • Suspicious behavior: EnumeratesProcesses
                  PID:3660
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2124,12977584804296276861,18301911713219940824,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5780 /prefetch:8
                  2⤵
                    PID:3496
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,12977584804296276861,18301911713219940824,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5924 /prefetch:1
                    2⤵
                      PID:4340
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,12977584804296276861,18301911713219940824,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6080 /prefetch:1
                      2⤵
                        PID:2364
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,12977584804296276861,18301911713219940824,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4704 /prefetch:1
                        2⤵
                          PID:2840
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,12977584804296276861,18301911713219940824,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5808 /prefetch:1
                          2⤵
                            PID:2012
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,12977584804296276861,18301911713219940824,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3412 /prefetch:1
                            2⤵
                              PID:3352
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,12977584804296276861,18301911713219940824,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6272 /prefetch:1
                              2⤵
                                PID:4340
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2124,12977584804296276861,18301911713219940824,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5960 /prefetch:8
                                2⤵
                                • Suspicious behavior: EnumeratesProcesses
                                PID:5064
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,12977584804296276861,18301911713219940824,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4844 /prefetch:2
                                2⤵
                                  PID:1492
                              • C:\Windows\System32\CompPkgSrv.exe
                                C:\Windows\System32\CompPkgSrv.exe -Embedding
                                1⤵
                                  PID:4112
                                • C:\Windows\System32\CompPkgSrv.exe
                                  C:\Windows\System32\CompPkgSrv.exe -Embedding
                                  1⤵
                                    PID:2000
                                  • C:\Windows\System32\rundll32.exe
                                    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                    1⤵
                                      PID:4556
                                    • C:\Users\Admin\Downloads\XWorm-RAT-main\XWorm-RAT-main\XWorm RAT V2.1\XWorm RAT V2.1.exe
                                      "C:\Users\Admin\Downloads\XWorm-RAT-main\XWorm-RAT-main\XWorm RAT V2.1\XWorm RAT V2.1.exe"
                                      1⤵
                                      • System Location Discovery: System Language Discovery
                                      PID:4920
                                      • C:\Users\Admin\Downloads\XWorm-RAT-main\XWorm-RAT-main\XWorm RAT V2.1\Command Reciever.exe
                                        "C:\Users\Admin\Downloads\XWorm-RAT-main\XWorm-RAT-main\XWorm RAT V2.1\Command Reciever.exe"
                                        2⤵
                                        • System Location Discovery: System Language Discovery
                                        • Checks processor information in registry
                                        • Suspicious behavior: EnumeratesProcesses
                                        • Suspicious use of SendNotifyMessage
                                        PID:2840
                                      • C:\Users\Admin\AppData\Local\Temp\Command Reciever.exe
                                        "C:\Users\Admin\AppData\Local\Temp\Command Reciever.exe"
                                        2⤵
                                        • Checks computer location settings
                                        • Executes dropped EXE
                                        • Loads dropped DLL
                                        • Suspicious behavior: EnumeratesProcesses
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:4084
                                        • C:\Windows\System32\cmd.exe
                                          "C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmp622B.tmp.bat & Del C:\Users\Admin\AppData\Local\Temp\tmp622B.tmp.bat
                                          3⤵
                                            PID:4796
                                            • C:\Windows\system32\chcp.com
                                              chcp 65001
                                              4⤵
                                                PID:4116
                                              • C:\Windows\system32\tasklist.exe
                                                Tasklist /fi "PID eq 4084"
                                                4⤵
                                                • Enumerates processes with tasklist
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:4780
                                              • C:\Windows\system32\find.exe
                                                find ":"
                                                4⤵
                                                  PID:3044
                                                • C:\Windows\system32\timeout.exe
                                                  Timeout /T 1 /Nobreak
                                                  4⤵
                                                  • Delays execution with timeout.exe
                                                  PID:4328
                                                • C:\Users\Admin\AppData\Roaming\AdobeUpdate\conhost.exe
                                                  "C:\Users\Admin\AppData\Roaming\AdobeUpdate\conhost.exe"
                                                  4⤵
                                                  • Checks computer location settings
                                                  • Executes dropped EXE
                                                  • Loads dropped DLL
                                                  • Checks processor information in registry
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  • Suspicious use of SetWindowsHookEx
                                                  PID:1736
                                                  • C:\Windows\System32\cmd.exe
                                                    "C:\Windows\System32\cmd.exe" /c reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v GoogleUpdate /t REG_SZ /d C:\Users\Admin\AppData\Roaming\AdobeUpdate\conhost.exe /f
                                                    5⤵
                                                      PID:3192
                                                      • C:\Windows\system32\reg.exe
                                                        reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v GoogleUpdate /t REG_SZ /d C:\Users\Admin\AppData\Roaming\AdobeUpdate\conhost.exe /f
                                                        6⤵
                                                        • Adds Run key to start application
                                                        • Modifies registry key
                                                        PID:4540
                                            • C:\Windows\system32\wbem\WmiApSrv.exe
                                              C:\Windows\system32\wbem\WmiApSrv.exe
                                              1⤵
                                                PID:5100

                                              Network

                                              MITRE ATT&CK Enterprise v15

                                              Replay Monitor

                                              Loading Replay Monitor...

                                              Downloads

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                Filesize

                                                152B

                                                MD5

                                                d7cb450b1315c63b1d5d89d98ba22da5

                                                SHA1

                                                694005cd9e1a4c54e0b83d0598a8a0c089df1556

                                                SHA256

                                                38355fd694faf1223518e40bac1996bdceaf44191214b0a23c4334d5fb07d031

                                                SHA512

                                                df04d4f4b77bae447a940b28aeac345b21b299d8d26e28ecbb3c1c9e9a0e07c551e412d545c7dbb147a92c12bad7ae49ac35af021c34b88e2c6c5f7a0b65f6a8

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                Filesize

                                                152B

                                                MD5

                                                37f660dd4b6ddf23bc37f5c823d1c33a

                                                SHA1

                                                1c35538aa307a3e09d15519df6ace99674ae428b

                                                SHA256

                                                4e2510a1d5a50a94fe4ce0f74932ab780758a8cbdc6d176a9ce8ab92309f26f8

                                                SHA512

                                                807b8b8dc9109b6f78fc63655450bf12b9a006ff63e8f29ade8899d45fdf4a6c068c5c46a3efbc4232b9e1e35d6494f00ded5cdb3e235c8a25023bfbd823992d

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                Filesize

                                                1KB

                                                MD5

                                                12b1b0e6e67006ac2890b6fece790fd6

                                                SHA1

                                                e181cc474462ae3682e26121031408fa1a11bf18

                                                SHA256

                                                6d3806fe795d496f653d4e2282c1c9a425d1fc796517828ea2938a0496f85388

                                                SHA512

                                                dd6ed70d3dfa05eef3439fb7a4d0d8909dcd2d36f68e4fb5f1df3786443b926a17222fb71e3a6659f7e117a026a79bddeb7f8912e129cbe93bbc241a40dec256

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\History

                                                Filesize

                                                124KB

                                                MD5

                                                6c1638c52aafa60a916064fe42406263

                                                SHA1

                                                eff3474affe77a3964a3978e0082e13ac4073d8c

                                                SHA256

                                                1d14203d0b5e5a2c7907f71f263f219b2f30f74d389f58913c6000aace277eef

                                                SHA512

                                                f532a261da329e08a8167a6ff0ae3a46f0847a7d559928000d24090b90be34c2e6628b8cc876a177208042891fd35093c31893e81a972294ead19e9dfc84296e

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                Filesize

                                                573B

                                                MD5

                                                0f10f06a81301fb5628cf7095431d223

                                                SHA1

                                                793e4d73149ed5ad1c272b223566b4a860585584

                                                SHA256

                                                4a82c65721bd568267f01cfbd6b3d29ddbc548514c8d8067e755bbbf243adf75

                                                SHA512

                                                b11e42a2671ee99b0efc2a0833508797727fda177a32d652366b550873ef31b18920c87abb9edf87f441a49c4f2591cd667e8482a3541a854ee9aba4805b5593

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                Filesize

                                                5KB

                                                MD5

                                                d38be4a745771c971984c7e3521ef484

                                                SHA1

                                                1e8336ed2a233a4a3e92b43ab38763dd07e0e3a4

                                                SHA256

                                                09e7f764a4455e92ea4782a73ada9a1dfd06241c4ab9061ec163e58570a090e4

                                                SHA512

                                                db5153ef3faefef7e35120cb8e542d23d2bb248b31d2db3575d1ac7e3a65073cd440ef3fe3087e9750163d70fc0347048133947cb1e107529897331b62e87a20

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                Filesize

                                                6KB

                                                MD5

                                                4a66687653613b4d439ac8d5e4373386

                                                SHA1

                                                03f6ac899557440ce5fa896ae194b0addb38b1ea

                                                SHA256

                                                fa142b7f00de52773842febfdb58874a001b0d1663fd4ab5dec89876b81bfccc

                                                SHA512

                                                2a6668a64da9a855159dbff51ad2864594fdb25bce71ee30d36bacc1189bf93547176c5f497b9c5edf29cc80f427243f97e6216d256b90a967c63f0d7d94eb8f

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                Filesize

                                                6KB

                                                MD5

                                                41a3ead36c001d88dc85b7ce74de7c49

                                                SHA1

                                                462125c2dea0798bf864a539358ebd7b76c44a2f

                                                SHA256

                                                5635e8420114561c83a2c63b911d8f967fd9d5fa8aafbacd057ec3af12259032

                                                SHA512

                                                c6ddd6133c5aa7f6c082988250606d691c855eaf8b88092840cf730a17c149dfb35ea907ee02e8bc79ec23069d3d47c0f1f662aa712814902ea5a586addcc2b1

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                Filesize

                                                1KB

                                                MD5

                                                10c61d083f70b358131f658f0eeb51e2

                                                SHA1

                                                6649855821c73b877e9505230594d2a0fce56a04

                                                SHA256

                                                a2a67f3ef1be9cd4f8a6f097c3f2c12a46ad97c055ede93b3dcc9c0b7b22e549

                                                SHA512

                                                765274f38b7de226ee76395b56e1f78cfada2a0b17abc5063cc5e881692b2fecec4261913098ba00527ccebcf5e496d32a166fd3f6ca09fa1cf491b05d707b24

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe582381.TMP

                                                Filesize

                                                866B

                                                MD5

                                                7650ac34fd52c172825f46fc7af909a0

                                                SHA1

                                                da08a4f1f980533420649c555423576a57a85085

                                                SHA256

                                                ec28127ac354a7fc66b9e4b5bbd931c56a30cc0b9a83e9454573598a39a676d2

                                                SHA512

                                                e4b1d9ccaf6efeb540a821323d91cfe4d8df841bc9300bbdd1166517b7efa9aa1eb26db30c044367a560b54386fa33c01935f506399a02073b20140940767c7d

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                Filesize

                                                16B

                                                MD5

                                                6752a1d65b201c13b62ea44016eb221f

                                                SHA1

                                                58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                                SHA256

                                                0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                                SHA512

                                                9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                Filesize

                                                11KB

                                                MD5

                                                669121731d318917af1fcbf800b76ef4

                                                SHA1

                                                bc9def88882f1b274599a0b8b4e24ca271a26417

                                                SHA256

                                                efb2f22be685747b2a7509b4aaac2440555955b14cc695a5506e29ab4f026dc3

                                                SHA512

                                                40a2fd97e5094523f03bb6117167f86d322bf0b1e749b5986b3a9c52152862b2b5d9569f8accc255b3a4a6f33e956f27ee8237fe4d0f5cbf82878fd4d77f6166

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                Filesize

                                                10KB

                                                MD5

                                                9522a604e72d8593104c345a55cac911

                                                SHA1

                                                d0b530ccdbbe2ff735170db76f18aedbfc913541

                                                SHA256

                                                307c0e6d953b65f890350b4c65e93362bd16ec2a757279479a64b3e72247397d

                                                SHA512

                                                495fea16ccc9192ccb293d2b877924fc94b0532866ea0905df3927a2d4a9f8715ef545c69469a21265955c9c43b68f7931bf17d0620c59c5714d2908c0a7138e

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                Filesize

                                                10KB

                                                MD5

                                                405d66c4876f2273d2cc55caf777022b

                                                SHA1

                                                7a0c441825b6238e2579b42797b06bea3cc7edad

                                                SHA256

                                                ee6d3a457ab75eee4f378c74e57dd0919a9d62a9bf1e2082ab06bb032ba2eeb6

                                                SHA512

                                                0a5dba9a8b915497c34978cb5fa1a0ef822899b13559e43fa0c3455ca0a0e536554357dc04710cdbcd06fafcde7f962c2a3d6ed9f2c1df0366d962d5d04476e2

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                Filesize

                                                10KB

                                                MD5

                                                39c2a9e49a0bba8f26baf85a1649dc5b

                                                SHA1

                                                a4e58bf6e735be985b7a98a81a4a52edf1decfaa

                                                SHA256

                                                42c4f6cfcb862b1e851911d8b409917b1050ece58d4ca474c95de7ef3dc9a5e3

                                                SHA512

                                                1969345832c2507bba495b68753ec4e09713b8ac8e60ab482bfc33128a586d46ade99abc78b1a67cebf1fcc365802decc1c134fa45c1d60d4ca60b4b30d6fd9e

                                              • C:\Users\Admin\AppData\Local\Temp\Command Reciever.exe

                                                Filesize

                                                5.6MB

                                                MD5

                                                eb01eece5f0887b24a1bd53183d801dc

                                                SHA1

                                                49e92aee8351e3a995d8ec95bc64d7f381dcee28

                                                SHA256

                                                a2b1012a39662b760415ee897388c862457f4f1672897db8dee67e125bf0ad5c

                                                SHA512

                                                83374fdc381d52b64682df5b96f02cb3d487ce12d9231ede8ee9a92ecf72fa4a0d6f91a04e5f6656cccd50f142dd44bbb08e7ecc94b647e0349064dc32a76839

                                              • C:\Users\Admin\AppData\Local\Temp\Costura\A54E036D2DCD19384E8EA53862E0DD8F\64\sqlite.interop.dll

                                                Filesize

                                                1.7MB

                                                MD5

                                                65ccd6ecb99899083d43f7c24eb8f869

                                                SHA1

                                                27037a9470cc5ed177c0b6688495f3a51996a023

                                                SHA256

                                                aba67c7e6c01856838b8bc6b0ba95e864e1fdcb3750aa7cdc1bc73511cea6fe4

                                                SHA512

                                                533900861fe36cf78b614d6a7ce741ff1172b41cbd5644b4a9542e6ca42702e6fbfb12f0fbaae8f5992320870a15e90b4f7bf180705fc9839db433413860be6d

                                              • C:\Users\Admin\AppData\Local\Temp\tmp622B.tmp.bat

                                                Filesize

                                                295B

                                                MD5

                                                9a5c9913ac53c77342c3499bec9adf3d

                                                SHA1

                                                a547eba9e586a9ab052af7487882d12d55b01519

                                                SHA256

                                                7417b6f7b60cceec14cc0801083996ecf9b721d105f8d0bcafeaf4069e52f896

                                                SHA512

                                                2ff2ff0c9319b5ba06c776561cd1f6c5a03e12da5bd0b0e488a4a062d61beadacc5af8a7f9aa05ff7f8d3e0c7d11861e9b096f868777ff6dc3a79eedbd9c3e73

                                              • memory/1736-379-0x000002299C7E0000-0x000002299C7F2000-memory.dmp

                                                Filesize

                                                72KB

                                              • memory/1736-357-0x000002299D4F0000-0x000002299D81E000-memory.dmp

                                                Filesize

                                                3.2MB

                                              • memory/1736-356-0x000002299C4B0000-0x000002299C4D6000-memory.dmp

                                                Filesize

                                                152KB

                                              • memory/1736-355-0x000002299C780000-0x000002299C7BA000-memory.dmp

                                                Filesize

                                                232KB

                                              • memory/1736-353-0x000002299C550000-0x000002299C572000-memory.dmp

                                                Filesize

                                                136KB

                                              • memory/1736-352-0x000002299C500000-0x000002299C550000-memory.dmp

                                                Filesize

                                                320KB

                                              • memory/1736-351-0x000002299C400000-0x000002299C4B2000-memory.dmp

                                                Filesize

                                                712KB

                                              • memory/1736-349-0x000002299C390000-0x000002299C3FA000-memory.dmp

                                                Filesize

                                                424KB

                                              • memory/2840-321-0x0000000005390000-0x000000000542C000-memory.dmp

                                                Filesize

                                                624KB

                                              • memory/2840-337-0x0000000009050000-0x00000000090B6000-memory.dmp

                                                Filesize

                                                408KB

                                              • memory/2840-328-0x0000000005330000-0x000000000533A000-memory.dmp

                                                Filesize

                                                40KB

                                              • memory/2840-329-0x0000000005620000-0x0000000005676000-memory.dmp

                                                Filesize

                                                344KB

                                              • memory/2840-326-0x0000000005430000-0x00000000054C2000-memory.dmp

                                                Filesize

                                                584KB

                                              • memory/2840-315-0x0000000000430000-0x0000000000AC2000-memory.dmp

                                                Filesize

                                                6.6MB

                                              • memory/4084-338-0x0000028CBBAE0000-0x0000028CBBAEA000-memory.dmp

                                                Filesize

                                                40KB

                                              • memory/4084-336-0x0000028CBBAC0000-0x0000028CBBADE000-memory.dmp

                                                Filesize

                                                120KB

                                              • memory/4084-335-0x0000028CD5B30000-0x0000028CD5BA6000-memory.dmp

                                                Filesize

                                                472KB

                                              • memory/4084-327-0x0000028CBB0E0000-0x0000028CBB682000-memory.dmp

                                                Filesize

                                                5.6MB

                                              • memory/4920-311-0x0000000005620000-0x0000000005BC4000-memory.dmp

                                                Filesize

                                                5.6MB

                                              • memory/4920-310-0x0000000000460000-0x00000000006A2000-memory.dmp

                                                Filesize

                                                2.3MB