Resubmissions

09-01-2025 19:49

250109-yjtbhs1nck 10

09-01-2025 19:48

250109-yjlaxa1nbq 3

09-01-2025 18:48

250109-xf75tszlcj 10

09-01-2025 18:45

250109-xeef5azkfp 10

09-01-2025 18:34

250109-w7sc1szjak 10

09-01-2025 18:31

250109-w54y2axkf1 10

03-01-2025 17:08

250103-vntw3atqdt 10

03-01-2025 15:27

250103-svv2latmgr 10

03-01-2025 15:23

250103-sslp5stlhk 10

Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-01-2025 18:34

General

  • Target

    https://github.com/Intestio/XWorm-RAT/releases/tag/xworm

Malware Config

Extracted

Family

gurcu

C2

https://api.telegram.org/bot8077286634:AAG1XHb6leJVqlqfJbmVoJd2ysHqXSznNdQ/sendDocument?chat_id=-1002258988684&caption=%F0%9F%93%82%20-%20Browser%20data%0A%E2%94%9C%E2%94%80%E2%94%80%20%F0%9F%93%82%20-%20cookies(0.25%20kb)%0A%E2%94%9C%E2%94%80%E2%94%80%20%F0%9F%93%84%20-%20BrowserDownloads.txt%20(0.21%20kb

https://api.telegram.org/bot8077286634:AAG1XHb6leJVqlqfJbmVoJd2ysHqXSznNdQ/sendMessage?chat_id=-1002258988684

https://api.telegram.org/bot8077286634:AAG1XHb6leJVqlqfJbmVoJd2ysHqXSznNdQ/getUpdates?offset=-

https://api.telegram.org/bot8077286634:AAG1XHb6leJVqlqfJbmVoJd2ysHqXSznNdQ/sendDocument?chat_id=-1002258988684&caption=%F0%9F%93%B8Screenshot%20take

Signatures

  • Gurcu family
  • Gurcu, WhiteSnake

    Gurcu aka WhiteSnake is a malware stealer written in C#.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates processes with tasklist 1 TTPs 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 31 IoCs
  • Modifies registry key 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 53 IoCs
  • Suspicious use of SendNotifyMessage 25 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://github.com/Intestio/XWorm-RAT/releases/tag/xworm
    1⤵
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4876
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffed61946f8,0x7ffed6194708,0x7ffed6194718
      2⤵
        PID:1936
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2236,10847997208899285934,1064006154503699535,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2244 /prefetch:2
        2⤵
          PID:1380
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2236,10847997208899285934,1064006154503699535,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2280 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:4560
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2236,10847997208899285934,1064006154503699535,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2692 /prefetch:8
          2⤵
            PID:3028
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,10847997208899285934,1064006154503699535,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:1
            2⤵
              PID:1540
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,10847997208899285934,1064006154503699535,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:1
              2⤵
                PID:3016
              • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2236,10847997208899285934,1064006154503699535,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5200 /prefetch:8
                2⤵
                  PID:1112
                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2236,10847997208899285934,1064006154503699535,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5200 /prefetch:8
                  2⤵
                  • Suspicious behavior: EnumeratesProcesses
                  PID:336
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,10847997208899285934,1064006154503699535,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5700 /prefetch:1
                  2⤵
                    PID:940
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,10847997208899285934,1064006154503699535,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5716 /prefetch:1
                    2⤵
                      PID:3284
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2236,10847997208899285934,1064006154503699535,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5332 /prefetch:8
                      2⤵
                        PID:4132
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,10847997208899285934,1064006154503699535,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5364 /prefetch:1
                        2⤵
                          PID:1100
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,10847997208899285934,1064006154503699535,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6096 /prefetch:1
                          2⤵
                            PID:2444
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,10847997208899285934,1064006154503699535,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6156 /prefetch:1
                            2⤵
                              PID:1328
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2236,10847997208899285934,1064006154503699535,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6136 /prefetch:8
                              2⤵
                              • Suspicious behavior: EnumeratesProcesses
                              PID:864
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2236,10847997208899285934,1064006154503699535,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4844 /prefetch:2
                              2⤵
                                PID:5676
                            • C:\Windows\System32\CompPkgSrv.exe
                              C:\Windows\System32\CompPkgSrv.exe -Embedding
                              1⤵
                                PID:3232
                              • C:\Windows\System32\CompPkgSrv.exe
                                C:\Windows\System32\CompPkgSrv.exe -Embedding
                                1⤵
                                  PID:748
                                • C:\Windows\System32\rundll32.exe
                                  C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                  1⤵
                                    PID:1820
                                  • C:\Users\Admin\Downloads\XWorm-RAT-main\XWorm-RAT-main\XWorm RAT V2.1\XWorm RAT V2.1.exe
                                    "C:\Users\Admin\Downloads\XWorm-RAT-main\XWorm-RAT-main\XWorm RAT V2.1\XWorm RAT V2.1.exe"
                                    1⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:436
                                    • C:\Users\Admin\Downloads\XWorm-RAT-main\XWorm-RAT-main\XWorm RAT V2.1\Command Reciever.exe
                                      "C:\Users\Admin\Downloads\XWorm-RAT-main\XWorm-RAT-main\XWorm RAT V2.1\Command Reciever.exe"
                                      2⤵
                                      • System Location Discovery: System Language Discovery
                                      • Checks processor information in registry
                                      • Modifies registry class
                                      • Suspicious behavior: EnumeratesProcesses
                                      • Suspicious behavior: GetForegroundWindowSpam
                                      • Suspicious use of FindShellTrayWindow
                                      • Suspicious use of SendNotifyMessage
                                      • Suspicious use of SetWindowsHookEx
                                      PID:620
                                    • C:\Users\Admin\AppData\Local\Temp\Command Reciever.exe
                                      "C:\Users\Admin\AppData\Local\Temp\Command Reciever.exe"
                                      2⤵
                                      • Checks computer location settings
                                      • Executes dropped EXE
                                      • Loads dropped DLL
                                      • Suspicious behavior: EnumeratesProcesses
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:4472
                                      • C:\Windows\System32\cmd.exe
                                        "C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmp6387.tmp.bat & Del C:\Users\Admin\AppData\Local\Temp\tmp6387.tmp.bat
                                        3⤵
                                          PID:1900
                                          • C:\Windows\system32\chcp.com
                                            chcp 65001
                                            4⤵
                                              PID:4936
                                            • C:\Windows\system32\tasklist.exe
                                              Tasklist /fi "PID eq 4472"
                                              4⤵
                                              • Enumerates processes with tasklist
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:868
                                            • C:\Windows\system32\find.exe
                                              find ":"
                                              4⤵
                                                PID:2404
                                              • C:\Windows\system32\timeout.exe
                                                Timeout /T 1 /Nobreak
                                                4⤵
                                                • Delays execution with timeout.exe
                                                PID:2528
                                              • C:\Users\Admin\AppData\Roaming\AdobeUpdate\conhost.exe
                                                "C:\Users\Admin\AppData\Roaming\AdobeUpdate\conhost.exe"
                                                4⤵
                                                • Checks computer location settings
                                                • Executes dropped EXE
                                                • Loads dropped DLL
                                                • Checks processor information in registry
                                                • Suspicious behavior: EnumeratesProcesses
                                                • Suspicious use of AdjustPrivilegeToken
                                                • Suspicious use of SetWindowsHookEx
                                                PID:4072
                                                • C:\Windows\System32\cmd.exe
                                                  "C:\Windows\System32\cmd.exe" /c reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v GoogleUpdate /t REG_SZ /d C:\Users\Admin\AppData\Roaming\AdobeUpdate\conhost.exe /f
                                                  5⤵
                                                    PID:2180
                                                    • C:\Windows\system32\reg.exe
                                                      reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v GoogleUpdate /t REG_SZ /d C:\Users\Admin\AppData\Roaming\AdobeUpdate\conhost.exe /f
                                                      6⤵
                                                      • Adds Run key to start application
                                                      • Modifies registry key
                                                      PID:5140
                                          • C:\Windows\system32\wbem\WmiApSrv.exe
                                            C:\Windows\system32\wbem\WmiApSrv.exe
                                            1⤵
                                              PID:3224

                                            Network

                                            MITRE ATT&CK Enterprise v15

                                            Replay Monitor

                                            Loading Replay Monitor...

                                            Downloads

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                              Filesize

                                              152B

                                              MD5

                                              fab8d8d865e33fe195732aa7dcb91c30

                                              SHA1

                                              2637e832f38acc70af3e511f5eba80fbd7461f2c

                                              SHA256

                                              1b034ffe38e534e2b7a21be7c1f207ff84a1d5f3893207d0b4bb1a509b4185ea

                                              SHA512

                                              39a3d43ef7e28fea2cb247a5d09576a4904a43680db8c32139f22a03d80f6ede98708a2452f3f82232b868501340f79c0b3f810f597bcaf5267c3ccfb1704b43

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                              Filesize

                                              152B

                                              MD5

                                              36988ca14952e1848e81a959880ea217

                                              SHA1

                                              a0482ef725657760502c2d1a5abe0bb37aebaadb

                                              SHA256

                                              d7e96088b37cec1bde202ae8ec2d2f3c3aafc368b6ebd91b3e2985846facf2e6

                                              SHA512

                                              d04b2f5afec92eb3d9f9cdc148a3eddd1b615e0dfb270566a7969576f50881d1f8572bccb8b9fd7993724bdfe36fc7633a33381d43e0b96c4e9bbd53fc010173

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                              Filesize

                                              1KB

                                              MD5

                                              76ebc9748b50d4a62b30b3618bc87c63

                                              SHA1

                                              0fc6acff0432f57c6731bcff95a1bb83681d85cb

                                              SHA256

                                              4a339942bd3664d2acb154b55b1632b46122376c71a8ee09c9e6a3794db4cc4d

                                              SHA512

                                              44ab2729b2d351f428001c86b9eb8eb8db273ea092c111a8a304a9ff577dc99787d40db6c34eb1d816efa946752ca5d422a55ffb002a12eea934799af24c1389

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\History

                                              Filesize

                                              124KB

                                              MD5

                                              c6fb6db2e5103610c425cfcd8a50e74b

                                              SHA1

                                              18081c2415801c320c120e037f8f83ec34701bd9

                                              SHA256

                                              b24580a3c1166deb01c2e92e4d9503cc1531cc979337aa717c640a882b2f3cc0

                                              SHA512

                                              becb594b1b0ea7e920d79e5f8a9b3cf3aec18470644ef47dedf358ba1149a9352543a26b786649453a82e349131884a4a6d9bf1d44cb060142ca3cc529205f41

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                              Filesize

                                              573B

                                              MD5

                                              2e6e73e80e60a9a61925cba10636e275

                                              SHA1

                                              eca781f9e0637616ba50e634ebef795e6d63c054

                                              SHA256

                                              a361999a859cb53b7a91663ac16c05ee90f570d8b8bef391aee55471226d5401

                                              SHA512

                                              44c7e45cbf391a13ae2ac1b2c5360d1097eb8d2d7218d6027e48f5b6b6ab6b68da46fe278bb3ff29fd3696f308450fe706e3335ddbbc61f16fc79a66b7d9dfc1

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                              Filesize

                                              6KB

                                              MD5

                                              9538b8699059398b1205db4ed811feb9

                                              SHA1

                                              db770fc63a43bca0481c783f09629b7ba53589f1

                                              SHA256

                                              e8e4a16cee1912bd8e5008e1b5af540d5471291727347b8342b20345d8ccac0d

                                              SHA512

                                              5b4ece6820f34c37217de56e1d844917e136e9cf7227bcfd8002f37938fccdaa7491bd00daaee4646258f392829a12ebb3809a08c688a8ea03bc55fc1a00472b

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                              Filesize

                                              6KB

                                              MD5

                                              038f1ec95049c269763082193c35556f

                                              SHA1

                                              4ea98d6ad2cdeee3433d2f2b409cf42ef4709028

                                              SHA256

                                              c22aef238b4cd467b2ce821a2fe42997da9d6feadfb445fd04b95cddf631ad98

                                              SHA512

                                              4f7574fdae9f2cc39812fa2227231b96f9f10cc897c01a8495e4159a4815822002850b393cc0ab94e872f03e43284ea477fb8e6c53d07c0daf23e5ab24713732

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                              Filesize

                                              5KB

                                              MD5

                                              efee099358a930264d778f5a8e882306

                                              SHA1

                                              6613105fcf28eb1d171b6b57d2ac6ef28b841a41

                                              SHA256

                                              d9486ee3fcfa4059a37c76d5cbd3d4216807aad396954a828504462b263ce82e

                                              SHA512

                                              e4a9c4e84001a304c4c210d6eb9a880f9cd1385f672a381a7be46e1405cf449abf9f52f90cc574800019cd8093f5dde441801df28dfb6d37c2983f47628a9240

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                              Filesize

                                              1KB

                                              MD5

                                              97684a721a22fe8f9de83a67fc4d9cfc

                                              SHA1

                                              e1aeed0f72d30127aba960da49aca4284bb8b2f5

                                              SHA256

                                              772285ab4eb337222300a80285ef1775ec699593954594a8cb2fbece562e8aee

                                              SHA512

                                              c90ec253f4138027849dc9c67a80b1f809f07d0d83d378cf1c2f8abdac87219fe5d8b7fa778e78d7a77b9187f2ed4a8969c83be2d329d6564074cf78038df2fa

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                              Filesize

                                              1KB

                                              MD5

                                              27dfef6a04f3e9d7af42ce6902217e4c

                                              SHA1

                                              937ca7b33420acbbf051f415d0a6f2284cd19bd0

                                              SHA256

                                              4dad0534ca781204fe73130df876fe011a496408db13525a321b42640131f19c

                                              SHA512

                                              4cc99871a43f2c0686fdd4bc569b1b0ee5f75cfd20afed6e384300c92358069d10931bcd1c93f145ec38efdf97b9758b77b1913b237f3ef64c10ac5a8ba22c8b

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                              Filesize

                                              16B

                                              MD5

                                              206702161f94c5cd39fadd03f4014d98

                                              SHA1

                                              bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                                              SHA256

                                              1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                                              SHA512

                                              0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                              Filesize

                                              16B

                                              MD5

                                              46295cac801e5d4857d09837238a6394

                                              SHA1

                                              44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                              SHA256

                                              0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                              SHA512

                                              8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                              Filesize

                                              10KB

                                              MD5

                                              fd45cbda30267fcd5186673518a393a8

                                              SHA1

                                              742a8d34dd10e050ecd929ba0ea257f8a0d5ac23

                                              SHA256

                                              e66f4c2d3851bf9b17276393a9b44677df75a9e857690af8e3bfd1cd2e558c14

                                              SHA512

                                              1b4ff202ed068f9670f3cc03157b4c95538728953c2665f87485f1410ae7fc96ba3c38acc66dca8494d59b14c1f5b3bcee28fbd5ff283cf1e64ca5c13fe56a86

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                              Filesize

                                              10KB

                                              MD5

                                              a251f7d19aaf4885c3f24c677d42671e

                                              SHA1

                                              bdbf6abf18875fff13e93cc364cd1298456c1adf

                                              SHA256

                                              1953097c25ff5903a6cbbac9d1d0251f8624f65feca19c2dab8c17b6f89364c9

                                              SHA512

                                              be16164e93ad693c26fdf43112fc0fcfa7b43fd23d1faea075b8639f40ee3d94c187926896cc17ccbb293c474fad1dff70b151fc88c16cd38fe05269590ae512

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                              Filesize

                                              10KB

                                              MD5

                                              c0b2c30ce685ee05065902fef827afdc

                                              SHA1

                                              675bd398f23c0298c207b7286f1c49024c782b64

                                              SHA256

                                              54fdd58a7ad02944ff2dcd7785a0f8a0a7260f7d9c4b9f96d857e086e74a3b31

                                              SHA512

                                              4085f815394cda2947c36f4fd1de56ba1786a3a963a937ad5334a01a1494ae7f3afaafbda289cd3dfd1f54f3cc4cb9536f7683704f6260e08a48c8502467dd6d

                                            • C:\Users\Admin\AppData\Local\Temp\Command Reciever.exe

                                              Filesize

                                              5.6MB

                                              MD5

                                              eb01eece5f0887b24a1bd53183d801dc

                                              SHA1

                                              49e92aee8351e3a995d8ec95bc64d7f381dcee28

                                              SHA256

                                              a2b1012a39662b760415ee897388c862457f4f1672897db8dee67e125bf0ad5c

                                              SHA512

                                              83374fdc381d52b64682df5b96f02cb3d487ce12d9231ede8ee9a92ecf72fa4a0d6f91a04e5f6656cccd50f142dd44bbb08e7ecc94b647e0349064dc32a76839

                                            • C:\Users\Admin\AppData\Local\Temp\Costura\A54E036D2DCD19384E8EA53862E0DD8F\64\sqlite.interop.dll

                                              Filesize

                                              1.7MB

                                              MD5

                                              65ccd6ecb99899083d43f7c24eb8f869

                                              SHA1

                                              27037a9470cc5ed177c0b6688495f3a51996a023

                                              SHA256

                                              aba67c7e6c01856838b8bc6b0ba95e864e1fdcb3750aa7cdc1bc73511cea6fe4

                                              SHA512

                                              533900861fe36cf78b614d6a7ce741ff1172b41cbd5644b4a9542e6ca42702e6fbfb12f0fbaae8f5992320870a15e90b4f7bf180705fc9839db433413860be6d

                                            • C:\Users\Admin\AppData\Local\Temp\tmp6387.tmp.bat

                                              Filesize

                                              295B

                                              MD5

                                              dc1183ba6ab974968e5a4b9b2fdf8ddb

                                              SHA1

                                              011c3f5f4159abcb63677658ee1327d7051e766e

                                              SHA256

                                              ac4ae21e1df99b2eaa3f19ef27d521b40768c617f1376b92b331d729740b3c2c

                                              SHA512

                                              acec74ff41c904136a1d0e5b101cc5a2bd691c72a48038526c39c6c329a7436fd9f9628c8b44a9a05330f468a8864e497dc250cd0ed1e12e960c3259c0ae2e28

                                            • memory/436-257-0x0000000000AA0000-0x0000000000CE2000-memory.dmp

                                              Filesize

                                              2.3MB

                                            • memory/436-258-0x0000000005C50000-0x00000000061F4000-memory.dmp

                                              Filesize

                                              5.6MB

                                            • memory/620-267-0x0000000000C10000-0x00000000012A2000-memory.dmp

                                              Filesize

                                              6.6MB

                                            • memory/620-274-0x0000000005B10000-0x0000000005B1A000-memory.dmp

                                              Filesize

                                              40KB

                                            • memory/620-275-0x0000000005E10000-0x0000000005E66000-memory.dmp

                                              Filesize

                                              344KB

                                            • memory/620-272-0x0000000005B20000-0x0000000005BBC000-memory.dmp

                                              Filesize

                                              624KB

                                            • memory/620-284-0x0000000009820000-0x0000000009886000-memory.dmp

                                              Filesize

                                              408KB

                                            • memory/620-273-0x0000000005C80000-0x0000000005D12000-memory.dmp

                                              Filesize

                                              584KB

                                            • memory/4072-310-0x0000021B1CAA0000-0x0000021B1CAC6000-memory.dmp

                                              Filesize

                                              152KB

                                            • memory/4072-303-0x0000021B1C980000-0x0000021B1C9EA000-memory.dmp

                                              Filesize

                                              424KB

                                            • memory/4072-305-0x0000021B1C9F0000-0x0000021B1CAA2000-memory.dmp

                                              Filesize

                                              712KB

                                            • memory/4072-306-0x0000021B1CAF0000-0x0000021B1CB40000-memory.dmp

                                              Filesize

                                              320KB

                                            • memory/4072-307-0x0000021B1CB40000-0x0000021B1CB62000-memory.dmp

                                              Filesize

                                              136KB

                                            • memory/4072-309-0x0000021B1CB70000-0x0000021B1CBAA000-memory.dmp

                                              Filesize

                                              232KB

                                            • memory/4072-311-0x0000021B1D910000-0x0000021B1DC3E000-memory.dmp

                                              Filesize

                                              3.2MB

                                            • memory/4072-333-0x0000021B1CBD0000-0x0000021B1CBE2000-memory.dmp

                                              Filesize

                                              72KB

                                            • memory/4472-285-0x00000188743B0000-0x00000188743BA000-memory.dmp

                                              Filesize

                                              40KB

                                            • memory/4472-283-0x0000018874390000-0x00000188743AE000-memory.dmp

                                              Filesize

                                              120KB

                                            • memory/4472-282-0x00000188743E0000-0x0000018874456000-memory.dmp

                                              Filesize

                                              472KB

                                            • memory/4472-276-0x0000018871A10000-0x0000018871FB2000-memory.dmp

                                              Filesize

                                              5.6MB