Analysis

  • max time kernel
    356s
  • max time network
    356s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-01-2025 21:46

General

  • Target

    https://github.com/Intestio/XWorm-RAT

Malware Config

Extracted

Family

gurcu

C2

https://api.telegram.org/bot8077286634:AAG1XHb6leJVqlqfJbmVoJd2ysHqXSznNdQ/sendDocument?chat_id=-1002258988684&caption=%F0%9F%93%82%20-%20Browser%20data%0A%E2%94%9C%E2%94%80%E2%94%80%20%F0%9F%93%82%20-%20cookies(0.25%20kb)%0A%E2%94%9C%E2%94%80%E2%94%80%20%F0%9F%93%84%20-%20BrowserDownloads.txt%20(0.21%20kb

https://api.telegram.org/bot8077286634:AAG1XHb6leJVqlqfJbmVoJd2ysHqXSznNdQ/sendMessage?chat_id=-1002258988684

https://api.telegram.org/bot8077286634:AAG1XHb6leJVqlqfJbmVoJd2ysHqXSznNdQ/getUpdates?offset=-

https://api.telegram.org/bot8077286634:AAG1XHb6leJVqlqfJbmVoJd2ysHqXSznNdQ/sendDocument?chat_id=-1002258988684&caption=%F0%9F%93%B8Screenshot%20take

Signatures

  • Gurcu family
  • Gurcu, WhiteSnake

    Gurcu aka WhiteSnake is a malware stealer written in C#.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates processes with tasklist 1 TTPs 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry key 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 25 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://github.com/Intestio/XWorm-RAT
    1⤵
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:908
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe5a4546f8,0x7ffe5a454708,0x7ffe5a454718
      2⤵
        PID:1488
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,3376301118469354525,13302886201720319900,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2140 /prefetch:2
        2⤵
          PID:536
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2132,3376301118469354525,13302886201720319900,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2208 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:1028
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2132,3376301118469354525,13302886201720319900,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2844 /prefetch:8
          2⤵
            PID:4488
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,3376301118469354525,13302886201720319900,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:1
            2⤵
              PID:3228
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,3376301118469354525,13302886201720319900,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:1
              2⤵
                PID:2816
              • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,3376301118469354525,13302886201720319900,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5608 /prefetch:8
                2⤵
                  PID:3464
                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,3376301118469354525,13302886201720319900,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5608 /prefetch:8
                  2⤵
                  • Suspicious behavior: EnumeratesProcesses
                  PID:1044
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,3376301118469354525,13302886201720319900,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5252 /prefetch:1
                  2⤵
                    PID:1748
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,3376301118469354525,13302886201720319900,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5272 /prefetch:1
                    2⤵
                      PID:4844
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,3376301118469354525,13302886201720319900,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5192 /prefetch:1
                      2⤵
                        PID:1760
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,3376301118469354525,13302886201720319900,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4960 /prefetch:1
                        2⤵
                          PID:556
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2132,3376301118469354525,13302886201720319900,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5280 /prefetch:8
                          2⤵
                            PID:4012
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,3376301118469354525,13302886201720319900,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3408 /prefetch:1
                            2⤵
                              PID:4180
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2132,3376301118469354525,13302886201720319900,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4644 /prefetch:8
                              2⤵
                              • Suspicious behavior: EnumeratesProcesses
                              PID:788
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,3376301118469354525,13302886201720319900,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4824 /prefetch:2
                              2⤵
                                PID:4980
                            • C:\Windows\System32\CompPkgSrv.exe
                              C:\Windows\System32\CompPkgSrv.exe -Embedding
                              1⤵
                                PID:836
                              • C:\Windows\System32\CompPkgSrv.exe
                                C:\Windows\System32\CompPkgSrv.exe -Embedding
                                1⤵
                                  PID:544
                                • C:\Windows\System32\rundll32.exe
                                  C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                  1⤵
                                    PID:4112
                                  • C:\Users\Admin\Downloads\XWorm-RAT-main\XWorm-RAT-main\XWorm RAT V2.1\XWorm RAT V2.1.exe
                                    "C:\Users\Admin\Downloads\XWorm-RAT-main\XWorm-RAT-main\XWorm RAT V2.1\XWorm RAT V2.1.exe"
                                    1⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:4952
                                    • C:\Users\Admin\Downloads\XWorm-RAT-main\XWorm-RAT-main\XWorm RAT V2.1\Command Reciever.exe
                                      "C:\Users\Admin\Downloads\XWorm-RAT-main\XWorm-RAT-main\XWorm RAT V2.1\Command Reciever.exe"
                                      2⤵
                                      • System Location Discovery: System Language Discovery
                                      • Checks processor information in registry
                                      • Suspicious behavior: EnumeratesProcesses
                                      • Suspicious use of SendNotifyMessage
                                      PID:3476
                                    • C:\Users\Admin\AppData\Local\Temp\Command Reciever.exe
                                      "C:\Users\Admin\AppData\Local\Temp\Command Reciever.exe"
                                      2⤵
                                      • Checks computer location settings
                                      • Executes dropped EXE
                                      • Loads dropped DLL
                                      • Suspicious behavior: EnumeratesProcesses
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:2236
                                      • C:\Windows\System32\cmd.exe
                                        "C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmpD618.tmp.bat & Del C:\Users\Admin\AppData\Local\Temp\tmpD618.tmp.bat
                                        3⤵
                                          PID:2228
                                          • C:\Windows\system32\chcp.com
                                            chcp 65001
                                            4⤵
                                              PID:4296
                                            • C:\Windows\system32\tasklist.exe
                                              Tasklist /fi "PID eq 2236"
                                              4⤵
                                              • Enumerates processes with tasklist
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:1476
                                            • C:\Windows\system32\find.exe
                                              find ":"
                                              4⤵
                                                PID:1240
                                              • C:\Windows\system32\timeout.exe
                                                Timeout /T 1 /Nobreak
                                                4⤵
                                                • Delays execution with timeout.exe
                                                PID:1500
                                              • C:\Users\Admin\AppData\Roaming\AdobeUpdate\conhost.exe
                                                "C:\Users\Admin\AppData\Roaming\AdobeUpdate\conhost.exe"
                                                4⤵
                                                • Checks computer location settings
                                                • Executes dropped EXE
                                                • Loads dropped DLL
                                                • Checks processor information in registry
                                                • Suspicious behavior: EnumeratesProcesses
                                                • Suspicious use of AdjustPrivilegeToken
                                                • Suspicious use of SetWindowsHookEx
                                                PID:3276
                                                • C:\Windows\System32\cmd.exe
                                                  "C:\Windows\System32\cmd.exe" /c reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v GoogleUpdate /t REG_SZ /d C:\Users\Admin\AppData\Roaming\AdobeUpdate\conhost.exe /f
                                                  5⤵
                                                    PID:436
                                                    • C:\Windows\system32\reg.exe
                                                      reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v GoogleUpdate /t REG_SZ /d C:\Users\Admin\AppData\Roaming\AdobeUpdate\conhost.exe /f
                                                      6⤵
                                                      • Adds Run key to start application
                                                      • Modifies registry key
                                                      PID:3280
                                          • C:\Windows\system32\wbem\WmiApSrv.exe
                                            C:\Windows\system32\wbem\WmiApSrv.exe
                                            1⤵
                                              PID:2228

                                            Network

                                            MITRE ATT&CK Enterprise v15

                                            Replay Monitor

                                            Loading Replay Monitor...

                                            Downloads

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                              Filesize

                                              152B

                                              MD5

                                              0a9dc42e4013fc47438e96d24beb8eff

                                              SHA1

                                              806ab26d7eae031a58484188a7eb1adab06457fc

                                              SHA256

                                              58d66151799526b3fa372552cd99b385415d9e9a119302b99aadc34dd51dd151

                                              SHA512

                                              868d6b421ae2501a519595d0c34ddef25b2a98b082c5203da8349035f1f6764ddf183197f1054e7e86a752c71eccbc0649e515b63c55bc18cf5f0592397e258f

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                              Filesize

                                              152B

                                              MD5

                                              61cef8e38cd95bf003f5fdd1dc37dae1

                                              SHA1

                                              11f2f79ecb349344c143eea9a0fed41891a3467f

                                              SHA256

                                              ae671613623b4477fbd5daf1fd2d148ae2a09ddcc3804b2b6d4ffcb60b317e3e

                                              SHA512

                                              6fb9b333fe0e8fde19fdd0bd01a1990a4e60a87c0a02bc8297da1206e42f8690d06b030308e58c862e9e77714a585eed7cc1627590d99a10aeb77fc0dd3d864d

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                              Filesize

                                              1KB

                                              MD5

                                              30acfefb009ac584aa7cdde331c10de9

                                              SHA1

                                              79c084007a32cd53f02025be88e16aaf726b33b3

                                              SHA256

                                              cd2865071a9579f2b02a117e3e595e85506e10efcfefb0f68fc92eb999f4e2ea

                                              SHA512

                                              f3e8ddea4da327b9ed4c0f95b910f8244716eaad6cfdb1c85e4c3bbf0cd692427c933fbc21e3f3a4a3efe5a5facee979fd068e7a1c4e6b15129fd2375b49c457

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\History

                                              Filesize

                                              124KB

                                              MD5

                                              138143107d4feef0ef8ddc30076c4f48

                                              SHA1

                                              419e80086888e398b7362adf7dd58c1ccf640afa

                                              SHA256

                                              3cb132d25c616075ef7b1737798aaebddfef59b2817ad9f1c68cff5fa9b8f8df

                                              SHA512

                                              c9432114b3febf61842e12c04792b2e6e7b4a3be70707b83d881de774698a692c681b9ed28681e909c02b76f94d8e70a051c299a7485523824969a9d1c76f82e

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                              Filesize

                                              672B

                                              MD5

                                              5845c97a62b7e8ae95ee8329cd599bcc

                                              SHA1

                                              b3105e396cdb3cc204faa0ab6345247eaccfea13

                                              SHA256

                                              4fb1f79268b5dfea27b50aec4d14530488b16e8bbf374c5074e577bc17154731

                                              SHA512

                                              0da8fbbe60c2247d208d09bd023386cfbb08e39a6038f613d7edb982692623b1096510d5d74c7708a0abd2553583358c08d877c1bc8310247c56dc59d086665d

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                              Filesize

                                              6KB

                                              MD5

                                              27faefcb1030ca5b46a4e44deb0bacf0

                                              SHA1

                                              7f5e4bee95cc71143e05330ef172fa717ea3b38a

                                              SHA256

                                              787687b5770813543656636d3d110a584f04cc6997a6c0dc2b3afbfe98c35f14

                                              SHA512

                                              a2af9213aa5775569dcd2b0e04dda4f5a6df48fbb8b39e7e473212d931aeba7c5d3a3b06537ab1e0f150221048bdd201f84c50c56142786b6269ec0baa765d38

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                              Filesize

                                              5KB

                                              MD5

                                              9339e2b4a3d938c977cc853a52755ec2

                                              SHA1

                                              ac1cfac77682c2627753490819ac866ebb04daeb

                                              SHA256

                                              05188cdbbe4bd141192701c33a88a445819c26e4aab9a57159a0728f3f10c0d8

                                              SHA512

                                              fb216178147b7660eaa98f566c4605985402a08988b4230d309295793c9cd9af5dfbfa94415af67da951a00eee17c09fbe800629680f68d0b62f640f6678a940

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                              Filesize

                                              6KB

                                              MD5

                                              f4e70723e35e810d56d0abaae0cf04ed

                                              SHA1

                                              bef430791e563330da5049d84950e968afec9bde

                                              SHA256

                                              18c2691fa3b9fc8446b73cc65453e7c68b9a2b1e2cf56a9ccf05b3c79ac32fb4

                                              SHA512

                                              a02a1317d50fa6c20b40080cdd4debc444b0d20e541bb59ee2e9f301bfe0c2ce00a10e8c443f409f4228a8560121cbbea5f49abd0b928c328dc8cdcce82a39e7

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                              Filesize

                                              1KB

                                              MD5

                                              35d7fa845662c9de2cd5b0b3fde84f7b

                                              SHA1

                                              ab8523802efb26cf141ce1067e176b2ae4979311

                                              SHA256

                                              382a804ec0be5994c7fb16e80f0da837dd43601a5584c4154b2228b567d02558

                                              SHA512

                                              9863788d7994aba8aa90b3065795a4789c45d1e66334167890ec7b7111bd6cceebe91c9bcfb53a6e3bc827b0ad85d750327fce3768921636f684dfcb78b871f1

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe5808e4.TMP

                                              Filesize

                                              1KB

                                              MD5

                                              9143e0e91e4a50a5402c4f0e58af12d7

                                              SHA1

                                              a079686a34cd6b87540b97caebb1f3675c5241ed

                                              SHA256

                                              f2acc282f3caf21609d370da884e2592d5ed632521f1773bc7e053e8d957f4dc

                                              SHA512

                                              70b495344633f307f056100fae31246cee11f90bd9ad80212f95241287ba381cdf4d936a75dd5fb269847cb11bdf6fbf3f94e6504dd901678808d3186d01df2a

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                              Filesize

                                              16B

                                              MD5

                                              6752a1d65b201c13b62ea44016eb221f

                                              SHA1

                                              58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                              SHA256

                                              0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                              SHA512

                                              9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                              Filesize

                                              11KB

                                              MD5

                                              0ac467a2402d216ed3a1234660c2e6cf

                                              SHA1

                                              c2b013fdf5dd4aca24c1cf4c27b35255772498e9

                                              SHA256

                                              81544c306164141921fa6db8ff0b66080c23e4d5dd7d1869f5603d3053c61cd2

                                              SHA512

                                              c9915b7f555e2563153566868ac7bd27348d2f01753a8d646835c9dc10ebdf326191c722f5f1f5e68cf9c6befd3edfdc9b625dd5c23f7d641fd2d3c203272892

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                              Filesize

                                              10KB

                                              MD5

                                              99a211f854c10477068f6467ebc24b7e

                                              SHA1

                                              785cb42baae573dff7e3434a72974cbfd255c781

                                              SHA256

                                              4bb7ef509358ac2cbc2cac2cc0b0b6189b8cbcd11759c30a75fb43a2bab66127

                                              SHA512

                                              d1835407178f09c4e662c2d1eb3cef5c3ca6bd495c9fe7e3ec5aaee76191a48dec3b770ee4336f2f7d5492995638f058292698a92286db573464451d662c06b6

                                            • C:\Users\Admin\AppData\Local\Temp\Command Reciever.exe

                                              Filesize

                                              5.6MB

                                              MD5

                                              eb01eece5f0887b24a1bd53183d801dc

                                              SHA1

                                              49e92aee8351e3a995d8ec95bc64d7f381dcee28

                                              SHA256

                                              a2b1012a39662b760415ee897388c862457f4f1672897db8dee67e125bf0ad5c

                                              SHA512

                                              83374fdc381d52b64682df5b96f02cb3d487ce12d9231ede8ee9a92ecf72fa4a0d6f91a04e5f6656cccd50f142dd44bbb08e7ecc94b647e0349064dc32a76839

                                            • C:\Users\Admin\AppData\Local\Temp\Costura\A54E036D2DCD19384E8EA53862E0DD8F\64\sqlite.interop.dll

                                              Filesize

                                              1.7MB

                                              MD5

                                              65ccd6ecb99899083d43f7c24eb8f869

                                              SHA1

                                              27037a9470cc5ed177c0b6688495f3a51996a023

                                              SHA256

                                              aba67c7e6c01856838b8bc6b0ba95e864e1fdcb3750aa7cdc1bc73511cea6fe4

                                              SHA512

                                              533900861fe36cf78b614d6a7ce741ff1172b41cbd5644b4a9542e6ca42702e6fbfb12f0fbaae8f5992320870a15e90b4f7bf180705fc9839db433413860be6d

                                            • C:\Users\Admin\AppData\Local\Temp\tmpD618.tmp.bat

                                              Filesize

                                              295B

                                              MD5

                                              bd35530e9ef5dbb374d66e224c1183eb

                                              SHA1

                                              2979253192fe453fe3ca67b9d526d08d1d6bf411

                                              SHA256

                                              c7052e936bbae989aa6ffde593ed07ca7bab754b664b236115c6c05d9a1adb40

                                              SHA512

                                              130bad3f050bc78f76e63a28ce72c3632d6a9dff9c610bfa928d7dddf5df82e624c2b6332cadfe875cd7ec7c65f7bd34e89d4e324b061dff5b7028c3a4fded00

                                            • memory/2236-291-0x0000029FE85C0000-0x0000029FE8636000-memory.dmp

                                              Filesize

                                              472KB

                                            • memory/2236-295-0x0000029FCFE30000-0x0000029FCFE3A000-memory.dmp

                                              Filesize

                                              40KB

                                            • memory/2236-285-0x0000029FCDB60000-0x0000029FCE102000-memory.dmp

                                              Filesize

                                              5.6MB

                                            • memory/2236-294-0x0000029FCE550000-0x0000029FCE56E000-memory.dmp

                                              Filesize

                                              120KB

                                            • memory/3276-310-0x000001EA3BA70000-0x000001EA3BA92000-memory.dmp

                                              Filesize

                                              136KB

                                            • memory/3276-308-0x000001EA3B920000-0x000001EA3B9D2000-memory.dmp

                                              Filesize

                                              712KB

                                            • memory/3276-336-0x000001EA3BB60000-0x000001EA3BB72000-memory.dmp

                                              Filesize

                                              72KB

                                            • memory/3276-314-0x000001EA3C830000-0x000001EA3CB5E000-memory.dmp

                                              Filesize

                                              3.2MB

                                            • memory/3276-313-0x000001EA3BAA0000-0x000001EA3BAC6000-memory.dmp

                                              Filesize

                                              152KB

                                            • memory/3276-312-0x000001EA3BAE0000-0x000001EA3BB1A000-memory.dmp

                                              Filesize

                                              232KB

                                            • memory/3276-309-0x000001EA3BA20000-0x000001EA3BA70000-memory.dmp

                                              Filesize

                                              320KB

                                            • memory/3276-306-0x000001EA3B8B0000-0x000001EA3B91A000-memory.dmp

                                              Filesize

                                              424KB

                                            • memory/3476-284-0x0000000005D70000-0x0000000005E02000-memory.dmp

                                              Filesize

                                              584KB

                                            • memory/3476-278-0x0000000000C70000-0x0000000001302000-memory.dmp

                                              Filesize

                                              6.6MB

                                            • memory/3476-296-0x00000000099D0000-0x0000000009A36000-memory.dmp

                                              Filesize

                                              408KB

                                            • memory/3476-292-0x0000000005B70000-0x0000000005B7A000-memory.dmp

                                              Filesize

                                              40KB

                                            • memory/3476-282-0x0000000005BA0000-0x0000000005C3C000-memory.dmp

                                              Filesize

                                              624KB

                                            • memory/3476-293-0x0000000005CD0000-0x0000000005D26000-memory.dmp

                                              Filesize

                                              344KB

                                            • memory/4952-268-0x00000000008B0000-0x0000000000AF2000-memory.dmp

                                              Filesize

                                              2.3MB

                                            • memory/4952-269-0x0000000005B40000-0x00000000060E4000-memory.dmp

                                              Filesize

                                              5.6MB