Analysis
-
max time kernel
145s -
max time network
148s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
18-10-2022 20:30
Behavioral task
behavioral1
Sample
PRIME-987234-APPS.pdf
Resource
win10-20220812-en
General
-
Target
PRIME-987234-APPS.pdf
-
Size
56KB
-
MD5
1cc25839b4fd5f6ab21a88bbb45d0e01
-
SHA1
1b956270f25cd60309f22d3d71ba8af89a0e9783
-
SHA256
f25930e87ce8dad422789f885d3aaceae455ae0fff790c20dcba0828926c0e12
-
SHA512
8ba727c05d50efa87248c1ade880f79e53bafde25ec3d4a5973e8c2e221ef2eafc38a09979485f0b9a0ff3d74830b020bbe39e9c3fe2b30bad1eeb4b9ac20054
-
SSDEEP
1536:LCFM9KlSKqj1z/b2tH1ZpuPox06DTyQHFek:LsCx96tEQ/DT7
Malware Config
Signatures
-
Drops file in Windows directory 5 IoCs
Processes:
MicrosoftEdge.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exedescription ioc process File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdge.exe File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
AcroRd32.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
Processes:
AcroRd32.exeMicrosoftEdge.exebrowser_broker.exeMicrosoftEdgeCP.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe Key created \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Internet Explorer\Main browser_broker.exe Key created \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdgeCP.exe -
Modifies registry class 64 IoCs
Processes:
MicrosoftEdge.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Content\CacheLimit = "256000" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\CIStatus\SignaturePolicy = 06000000 MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Content\CachePrefix MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\EnableNegotiate = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DummyPath\dummySetting = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modify. See aka.ms/browserpolicy\Extensions MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\Zones\3\{AEBA21FA-782A-4A90-978D-B7216 = 1a3761592352350c7a5f20172f1e1a190e2b017313371312141a152a MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = 89cc97ae41e3d801 MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\History\CachePrefix = "Visited:" MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modif = 01000000ef97da19f752bf8af9fdd32a2069bdc867e33a319b4005bbf4c40df6e0632d151703d3fa7cb1c425470278e2869c562d602c7835e6dfd123eecd MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\OnlineHistory MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\Internet Settings\Cache\History\CacheLimit = "1" MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = 17b79fc841e3d801 MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Main\LastClosedWidth = "800" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Content MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Main\DisallowDefaultBrowserPrompt = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\IECompatVersionHigh = "268435456" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Rating\Rating Prompt Shown = "0" MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TypedURLs\url4 = "https://login.live.com/" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-DeviceId = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\PendingRecovery\ReadingStorePending = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\Internet Settings\Cache MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = 6d9042b441e3d801 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Roaming\ChangeUnitGenerationNeeded = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\ACGStatus\ACGPolicyState = "8" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\Internet Settings\Cache\Content MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\ChromeMigration\AllComplete = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ReadingMode\FontSize = "3" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modif = 01000000e7a44eff0f0cbdd4a1324dddf8aa7a81df7d081233510c852cf328aa38b9cabb0e63aed19471980619224bbfa17c321dec28ed7f4ef1936566339ec6e5994a7a43e2cf661c9472aa67da802ccc94942e529ea70e3735bc10ce6f MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\AdapterInfo = "vendorId=\"0x1414\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.15063.0\"hypervisor=\"No Hypervisor (No SLAT)\"" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DataStore\OneTimeCleanup = "1" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = 28592fc241e3d801 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\Internet Settings\Cache\History MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus\ACGPolicyState = "8" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\CIStatus\CIPolicyState = "0" MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\ACGStatus\DynamicCodePolicy = 05000000 MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-Revision = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore\datastore\usage\dscc_inventory\Extension = "5" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Explorer\Main\OperationalData = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = d96930be41e3d801 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\CIStatus MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Rating MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\CIStatus\SignaturePolicy = 06000000 MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus\CIPolicyState = "0" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Privacy\InProgressFlags = "262144" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\History MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\LowMic MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DataStore\LastCleanup = 0000000000000000 MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = 296abfb341e3d801 MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Main\SharedCookie_MRACMigrationDone = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\PendingDelete MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ReadingMode\SettingsVersion = "2" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\CIStatus MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus\DynamicCodePolicy = 05000000 MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\HistoryJournalCertificate MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\SubSysId = "0" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\CIStatus\SignaturePolicy = 06000000 MicrosoftEdgeCP.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
Processes:
AcroRd32.exepid process 2628 AcroRd32.exe 2628 AcroRd32.exe 2628 AcroRd32.exe 2628 AcroRd32.exe 2628 AcroRd32.exe 2628 AcroRd32.exe 2628 AcroRd32.exe 2628 AcroRd32.exe 2628 AcroRd32.exe 2628 AcroRd32.exe 2628 AcroRd32.exe 2628 AcroRd32.exe 2628 AcroRd32.exe 2628 AcroRd32.exe 2628 AcroRd32.exe 2628 AcroRd32.exe 2628 AcroRd32.exe 2628 AcroRd32.exe -
Suspicious behavior: MapViewOfSection 8 IoCs
Processes:
MicrosoftEdgeCP.exepid process 2612 MicrosoftEdgeCP.exe 2612 MicrosoftEdgeCP.exe 2612 MicrosoftEdgeCP.exe 2612 MicrosoftEdgeCP.exe 2612 MicrosoftEdgeCP.exe 2612 MicrosoftEdgeCP.exe 2612 MicrosoftEdgeCP.exe 2612 MicrosoftEdgeCP.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
Processes:
MicrosoftEdge.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exedescription pid process Token: SeDebugPrivilege 1296 MicrosoftEdge.exe Token: SeDebugPrivilege 1296 MicrosoftEdge.exe Token: SeDebugPrivilege 1296 MicrosoftEdge.exe Token: SeDebugPrivilege 1296 MicrosoftEdge.exe Token: SeDebugPrivilege 2736 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 2736 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 2736 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 2736 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 1188 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 1188 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 1296 MicrosoftEdge.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
AcroRd32.exepid process 2628 AcroRd32.exe -
Suspicious use of SendNotifyMessage 4 IoCs
Processes:
AcroRd32.exepid process 2628 AcroRd32.exe 2628 AcroRd32.exe 2628 AcroRd32.exe 2628 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 9 IoCs
Processes:
AcroRd32.exeMicrosoftEdge.exeMicrosoftEdgeCP.exepid process 2628 AcroRd32.exe 2628 AcroRd32.exe 2628 AcroRd32.exe 2628 AcroRd32.exe 2628 AcroRd32.exe 2628 AcroRd32.exe 1296 MicrosoftEdge.exe 2612 MicrosoftEdgeCP.exe 2612 MicrosoftEdgeCP.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
AcroRd32.exeRdrCEF.exedescription pid process target process PID 2628 wrote to memory of 4736 2628 AcroRd32.exe RdrCEF.exe PID 2628 wrote to memory of 4736 2628 AcroRd32.exe RdrCEF.exe PID 2628 wrote to memory of 4736 2628 AcroRd32.exe RdrCEF.exe PID 2628 wrote to memory of 4668 2628 AcroRd32.exe RdrCEF.exe PID 2628 wrote to memory of 4668 2628 AcroRd32.exe RdrCEF.exe PID 2628 wrote to memory of 4668 2628 AcroRd32.exe RdrCEF.exe PID 4736 wrote to memory of 1324 4736 RdrCEF.exe RdrCEF.exe PID 4736 wrote to memory of 1324 4736 RdrCEF.exe RdrCEF.exe PID 4736 wrote to memory of 1324 4736 RdrCEF.exe RdrCEF.exe PID 4736 wrote to memory of 1324 4736 RdrCEF.exe RdrCEF.exe PID 4736 wrote to memory of 1324 4736 RdrCEF.exe RdrCEF.exe PID 4736 wrote to memory of 1324 4736 RdrCEF.exe RdrCEF.exe PID 4736 wrote to memory of 1324 4736 RdrCEF.exe RdrCEF.exe PID 4736 wrote to memory of 1324 4736 RdrCEF.exe RdrCEF.exe PID 4736 wrote to memory of 1324 4736 RdrCEF.exe RdrCEF.exe PID 4736 wrote to memory of 1324 4736 RdrCEF.exe RdrCEF.exe PID 4736 wrote to memory of 1324 4736 RdrCEF.exe RdrCEF.exe PID 4736 wrote to memory of 1324 4736 RdrCEF.exe RdrCEF.exe PID 4736 wrote to memory of 1324 4736 RdrCEF.exe RdrCEF.exe PID 4736 wrote to memory of 1324 4736 RdrCEF.exe RdrCEF.exe PID 4736 wrote to memory of 1324 4736 RdrCEF.exe RdrCEF.exe PID 4736 wrote to memory of 1324 4736 RdrCEF.exe RdrCEF.exe PID 4736 wrote to memory of 1324 4736 RdrCEF.exe RdrCEF.exe PID 4736 wrote to memory of 1324 4736 RdrCEF.exe RdrCEF.exe PID 4736 wrote to memory of 1324 4736 RdrCEF.exe RdrCEF.exe PID 4736 wrote to memory of 1324 4736 RdrCEF.exe RdrCEF.exe PID 4736 wrote to memory of 1324 4736 RdrCEF.exe RdrCEF.exe PID 4736 wrote to memory of 1324 4736 RdrCEF.exe RdrCEF.exe PID 4736 wrote to memory of 1324 4736 RdrCEF.exe RdrCEF.exe PID 4736 wrote to memory of 1324 4736 RdrCEF.exe RdrCEF.exe PID 4736 wrote to memory of 1324 4736 RdrCEF.exe RdrCEF.exe PID 4736 wrote to memory of 1324 4736 RdrCEF.exe RdrCEF.exe PID 4736 wrote to memory of 1324 4736 RdrCEF.exe RdrCEF.exe PID 4736 wrote to memory of 1324 4736 RdrCEF.exe RdrCEF.exe PID 4736 wrote to memory of 1324 4736 RdrCEF.exe RdrCEF.exe PID 4736 wrote to memory of 1324 4736 RdrCEF.exe RdrCEF.exe PID 4736 wrote to memory of 1324 4736 RdrCEF.exe RdrCEF.exe PID 4736 wrote to memory of 1324 4736 RdrCEF.exe RdrCEF.exe PID 4736 wrote to memory of 1324 4736 RdrCEF.exe RdrCEF.exe PID 4736 wrote to memory of 1324 4736 RdrCEF.exe RdrCEF.exe PID 4736 wrote to memory of 1324 4736 RdrCEF.exe RdrCEF.exe PID 4736 wrote to memory of 1324 4736 RdrCEF.exe RdrCEF.exe PID 4736 wrote to memory of 1324 4736 RdrCEF.exe RdrCEF.exe PID 4736 wrote to memory of 1324 4736 RdrCEF.exe RdrCEF.exe PID 4736 wrote to memory of 1324 4736 RdrCEF.exe RdrCEF.exe PID 4736 wrote to memory of 1324 4736 RdrCEF.exe RdrCEF.exe PID 4736 wrote to memory of 1324 4736 RdrCEF.exe RdrCEF.exe PID 4736 wrote to memory of 240 4736 RdrCEF.exe RdrCEF.exe PID 4736 wrote to memory of 240 4736 RdrCEF.exe RdrCEF.exe PID 4736 wrote to memory of 240 4736 RdrCEF.exe RdrCEF.exe PID 4736 wrote to memory of 240 4736 RdrCEF.exe RdrCEF.exe PID 4736 wrote to memory of 240 4736 RdrCEF.exe RdrCEF.exe PID 4736 wrote to memory of 240 4736 RdrCEF.exe RdrCEF.exe PID 4736 wrote to memory of 240 4736 RdrCEF.exe RdrCEF.exe PID 4736 wrote to memory of 240 4736 RdrCEF.exe RdrCEF.exe PID 4736 wrote to memory of 240 4736 RdrCEF.exe RdrCEF.exe PID 4736 wrote to memory of 240 4736 RdrCEF.exe RdrCEF.exe PID 4736 wrote to memory of 240 4736 RdrCEF.exe RdrCEF.exe PID 4736 wrote to memory of 240 4736 RdrCEF.exe RdrCEF.exe PID 4736 wrote to memory of 240 4736 RdrCEF.exe RdrCEF.exe PID 4736 wrote to memory of 240 4736 RdrCEF.exe RdrCEF.exe PID 4736 wrote to memory of 240 4736 RdrCEF.exe RdrCEF.exe PID 4736 wrote to memory of 240 4736 RdrCEF.exe RdrCEF.exe PID 4736 wrote to memory of 240 4736 RdrCEF.exe RdrCEF.exe
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\PRIME-987234-APPS.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- Suspicious use of WriteProcessMemory
PID:4736 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=BD3FF45333BDA107060E5659D4E7F1F3 --mojo-platform-channel-handle=1636 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:1324
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=30FCB7EC62CB4D1C8B8C7025601F73A1 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=1 --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=30FCB7EC62CB4D1C8B8C7025601F73A1 --renderer-client-id=2 --mojo-platform-channel-handle=1648 --allow-no-sandbox-job /prefetch:13⤵PID:240
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=1BC96D85A5211AE0A7A801073F4D9AEC --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=1 --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=1BC96D85A5211AE0A7A801073F4D9AEC --renderer-client-id=4 --mojo-platform-channel-handle=2068 --allow-no-sandbox-job /prefetch:13⤵PID:2360
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=CA0A52322136F8D8406E3B868B327644 --mojo-platform-channel-handle=2464 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:5016
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=2EDBB0C6A9AFFB7101BD277BDE4F58DE --mojo-platform-channel-handle=2580 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:2160
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=A8B20FB85A1D2ED25836808B365A27B3 --mojo-platform-channel-handle=2640 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:388
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵PID:4668
-
C:\Windows\SysWOW64\LaunchWinApp.exe"C:\Windows\system32\LaunchWinApp.exe" "https://docs.google.com/drawings/d/1vdBnyA2rlzyjTwDVtsS5-o0iqGpf2ArIffLmSjYKEso/preview"2⤵PID:4244
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1296
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
- Modifies Internet Explorer settings
PID:1648
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
PID:2612
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:2736
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:1188
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
PID:2260
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
PID:3720
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
PID:4168
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\BUFJK36E\KFOjCnqEu92Fr1Mu51S7ACc6CsQ[1].woff2Filesize
16KB
MD5510dec37fa69fba39593e01a469ee018
SHA19efcbbd5305bec6d86e949aaa55419f9c290098f
SHA256a44484ecc8b7aa5da1603d6a7256d3eea3c5c8e5c6f50bcdb220b303e4b2010a
SHA51273127b478c3087ff7af8ef3c46683789cf49f761515957055213c4399c8843f0a77aca93f6361d6761395a61e07ec495bf79fdc2a5f85701fa533656cfc16cee
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\BUFJK36E\KFOjCnqEu92Fr1Mu51TzBic6CsQ[1].woff2Filesize
16KB
MD5010c1aeee3c6d1cbb1d5761d80353823
SHA1c4b645dfdc162598783b9aecfb6b954563507a0f
SHA256756f65bc72ad18ac281e8ef320de3347f26d402701aeb8f659f33ffb8f036ccb
SHA5128df37538a8a8cdb151c1e079798eb88c605d53aba71ce9e3bc47fec208a1b95aa6f9ff93a3b11fc84ac13999884a43e0862fcabfae55e6f6acdf7cc4d854ad0d
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\BUFJK36E\KFOkCnqEu92Fr1Mu51xIIzI[1].woff2Filesize
16KB
MD5d8bcbe724fd6f4ba44d0ee6a2675890f
SHA1d276fd769bcb675f8efe42ebe3003c1d3255f985
SHA256aa4650a411dfe1c9beb794ffaf08c7909cdfbb05672d79b3a9976672cbba75ec
SHA51223f757ea3afe6febe1e8ea935f0ee8690e1b1b1da511788b529cc2fc38f7e454153cdba6f84a6a0e19b294e5311625a03617cf98aac150f17b88a53f3ed8b72a
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\BUFJK36E\KFOlCnqEu92Fr1MmEU9fBBc4[1].woff2Filesize
15KB
MD5285467176f7fe6bb6a9c6873b3dad2cc
SHA1ea04e4ff5142ddd69307c183def721a160e0a64e
SHA2565a8c1e7681318caa29e9f44e8a6e271f6a4067a2703e9916dfd4fe9099241db7
SHA5125f9bb763406ea8ce978ec675bd51a0263e9547021ea71188dbd62f0212eb00c1421b750d3b94550b50425bebff5f881c41299f6a33bbfa12fb1ff18c12bc7ff1
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\BUFJK36E\KFOlCnqEu92Fr1MmWUlfBBc4[1].woff2Filesize
15KB
MD5037d830416495def72b7881024c14b7b
SHA1619389190b3cafafb5db94113990350acc8a0278
SHA2561d5b7c64458f4af91dcfee0354be47adde1f739b5aded03a7ab6068a1bb6ca97
SHA512c8d2808945a9bf2e6ad36c7749313467ff390f195448c326c4d4d7a4a635a11e2ddf4d0779be2db274f1d1d9d022b1f837294f1e12c9f87e3eac8a95cfd8872f
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\BUFJK36E\KFOmCnqEu92Fr1Mu4mxK[1].woff2Filesize
14KB
MD55d4aeb4e5f5ef754e307d7ffaef688bd
SHA106db651cdf354c64a7383ea9c77024ef4fb4cef8
SHA2563e253b66056519aa065b00a453bac37ac5ed8f3e6fe7b542e93a9dcdcc11d0bc
SHA5127eb7c301df79d35a6a521fae9d3dccc0a695d3480b4d34c7d262dd0c67abec8437ed40e2920625e98aaeafba1d908dec69c3b07494ec7c29307de49e91c2ef48
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\J127GDPB\Untitled[1].gifFilesize
209KB
MD56a0bcf7d4a9dd54aff5710b57342e1ca
SHA1452d934f19bed80fdb9d9c070cbe0d6d57077cfe
SHA256b84eb51b5732b623a81c304515095d507ab4c64a3170803abdcbfe87086dc20c
SHA51266efeb035095f3ea2a949cac5787f77db0cb596accea4627e267929c9496a3f2f911a8878fb5b6f1d8f7497b5a8e05e652142e97f52686cd37ab723dc755af1b
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\RJQQ0NXI\219afb43ea12af3a9e0b91790b14ef19[1].jpegFilesize
36KB
MD5f65ba9bac29eb05391660fd4b9c6fa0d
SHA13fb60efd1b4dd2a59c3360c46d6b0b8806c27b4d
SHA2560d0bc707fe7b24d532927b3d14ac2af4c32b36602dfb57fdecceaad28ce61bf3
SHA5127daf51d109cb56cff876824ffaa4e483592d86588c81783c90b4c03a7bddeac54854662fb2d2f7ca49b8ccf748acbf045aa27ed03066161ece6bc7d3d0ab482a
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\S0L5RCQ8\3206418034-preview_css_ltr[1].cssFilesize
291KB
MD5ddcdbbc911b0030629902fe8e4d2ac5d
SHA1281711485650f674992898a0a0e22c1bb7437896
SHA2565c1927eb9178711d02217940e714f1473dc20fa7489bc8d163bbf101d2f59c27
SHA5120171d945d4d18a643b0c1504d6f23cd7e9a9190ec04d8ef0e6b4806b3b7a1b98b1a3645a62e6946649a90a8ba299f8c4dae51c75ee3832f0268ec1dba68f6332
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\S0L5RCQ8\googlelogo_color_68x28dp[1].pngFilesize
1KB
MD5c4a931d597decd2553aac6634b766cf2
SHA16ec84fb4a2745b4b71520241be77db1fd1013830
SHA256f56402b127698db4b4dc611a97a6f081d04c4691c60522c5912d189e37c94a9e
SHA5124932e0f7f38085a7c52539bdd5c7f470740e560a4471bea30d12ef9e3efe77f6bbfac28d26c62a245c43d98ebf74c824b2b414843080a27edf1563a5f874ac84
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EAFilesize
1KB
MD5f05801b60fdec4678e526ad81d8fb9e6
SHA1a5301a5b6f1e14469689ff88fbd1728489ffec3a
SHA2564aa1bb61716de4a6b4b0064865992ebcbb338f7e7a08ae9a0d1bb83017da4bc1
SHA512f89b9162eb607374e5db808fdcb57216a2ded472d6b99e00e13d2cf5ddc75bb7eaa2d248b9d897f4d2c80f59467294b858f3b7dd08f19329696ec4eb55c3523a
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\265C0DEB29181DD1891051371C5F863A_14F2E352CCFE495001982FFDAAC3BE84Filesize
471B
MD5c190204159a1cbcfa30e3b35639f47ef
SHA137f20a9f9e47377d8036d8cf8f2b5393d7e2a2d5
SHA25654acc7148382a5219d0c0d0ca5aa83c6fe65d6269415adc56a69d1c89373d9c8
SHA5126f7a6249f85fa75402a6788a658e5b903bfc116ef0ebbd06756b6f21cdf77cf7239aa38504390f97d818d7595ab7fb0b26d7bc23bbac97d3ba5d7902135e979b
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\265C0DEB29181DD1891051371C5F863A_1ACD2B4A039DF3260017F7BF28EE7323Filesize
471B
MD5cc71911d4c07bede48cfda542aba33f0
SHA16332e65663215375ab3a4fd4e02d9557ef739b0d
SHA256c9078ff8f478fa763f2521bc0d1db2c4d4d48aa21c6f249331e236b6b53a0ecb
SHA5124443ed3ebe54c8866fb3656d31a777f31c6615d148f9ad21ba75bd17641e90ff4f9c9fac4187a471d1f950790881ef811fb670f5917896e18b9a9c4f2cc4f02b
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\265C0DEB29181DD1891051371C5F863A_7D7374C3BD488A38BC34DD9B008EDC62Filesize
472B
MD5d2bec92a0c08d02af5e33f0884d030f4
SHA14ae8b8ba7883efd53103efa4590e11eb7785e1e2
SHA2560c155098912ae925aef3d6dc685123d5d4bd3bbbfb692b91eb872e6575de7a82
SHA51272405494c2d8407ee0a807831edaf8748b77beaf7d860986472bf0a0ecf50311e7d900f8518e82933be6aa4bdfd43b884e7e18062984becf8a0d6becbdc920c0
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\5080DC7A65DB6A5960ECD874088F3328_862BA1770B2FEE013603D2FF9ABEAFDAFilesize
2KB
MD5d96e814382c87da23d609fddc13b7a70
SHA1b39178d454eadfdc60c93ab83d7235803759225f
SHA256c12f8b9babad8a7b13d3a9dc023940624044ab89885a4a8d5a6660debfcebb5b
SHA51250639c85ac7efbb822139a0058517eaffcf4ef82d51514a75cbbc328434b9057f30c58a542c8a7930fb0cc6f58a96f20deec6601d64e68fe3230a8eb0606fa9b
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_2DBE917624E9880FE0C7C5570D56E691Filesize
1KB
MD5e5f322a07491b24be532d93b177c74a0
SHA1489eb34b62de6f3382e03a2f495ae544e22a107b
SHA2566951cb3131c4241f1a40bb0628d9726c822dc18d45439a364197e5c883e11039
SHA512ce3668a02746a8dfd3009bd7681e185548304c43e4e5f05c6713edfd8b35878dd1779b3487d793b5917c1378cab360a5af9250561937bbd1305abc136a3b6555
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\B398B80134F72209547439DB21AB308D_D14B79B440CDC26D7D21C81855E2C04DFilesize
471B
MD5dc0f4fc051a7f0a66e9dee10622f2c4a
SHA1d452fc8f5ca5d5f4bff736a6a9bb55923131df22
SHA256e1b24832a8c9df781b194c9b9eda42140372cd5ce335f84a716d65010c70cf25
SHA5129397208d93df8cf97e175c0e240978348ca73615eac19cdb7d560b6447fa084ebe77d1fd55be23e41945eba6b8fa19142634b63b34f2a2aee0da71e16c1152b2
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBAFilesize
724B
MD5f569e1d183b84e8078dc456192127536
SHA130c537463eed902925300dd07a87d820a713753f
SHA256287bc80237497eb8681dbf136a56cc3870dd5bd12d48051525a280ae62aab413
SHA51249553b65a8e3fc0bf98c1bc02bae5b22188618d8edf8e88e4e25932105796956ae8301c63c487e0afe368ea39a4a2af07935a808f5fb53287ef9287bc73e1012
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\E87CE99F124623F95572A696C80EFCAF_871E11B76822F93FE2DBF907A5A1D9A8Filesize
472B
MD542812d3f44ded0aff3f3bd6af584b333
SHA1f98e2681013fa424d076ce5fd4cf27c8f40c2ba8
SHA2569126685a5cdda4639796632366d3a2935317cf7a51d724d5bb56e315f5142262
SHA5122c38302d22f8ebd9fe6892b6b492ef753a5f0736cfa72782262612359012aea6dc608355353e0ca74391cb90cd420a399bc30e70ae8aeac8dd7d2bfd1ce07abd
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EAFilesize
410B
MD5d0d358c011343cc3ef739ead8994615c
SHA11386b696f378adb5b909fbc8a9f563f243743229
SHA25619555d37a14b9b1e45d8ca8847f4ab647245e12f87f19286f512e474968bc2b1
SHA51276301eb1068054fef7754f5130038748e3d2d5c4fda9ae5ae30c89e45473cb16ab147ece278d3488c659c25d3393a3786a6a793aba9f5017570d18ae55576c5e
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\265C0DEB29181DD1891051371C5F863A_14F2E352CCFE495001982FFDAAC3BE84Filesize
406B
MD5434da3e3270a9cd986008453c795d4cc
SHA129a80870732747a4abc32386dad0d5778be1a832
SHA256868d0af7b1da8c1d4fa23b7496caf2ba2cc07e8e847e68f7596251c3d92013ac
SHA512366a1d41f0726b3e18a3701f4fc82fa886f9a2a773e83ed543be4e8d6a7e7f1d6f56860635f7abe7a06a5eecc21877880c09537f44be7de8a1c6a72519030fbe
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\265C0DEB29181DD1891051371C5F863A_1ACD2B4A039DF3260017F7BF28EE7323Filesize
414B
MD51fbcbf669f0a44cb6a4ef9eb70f6abfa
SHA1746e36ea825ecadacc97cd4fc86498d068d22ad5
SHA256c3fc6d5e0bf62391be944bf4c5adf6bdf00a818963f50f0310ae2a3f8653fe96
SHA5120d502fd2537a177a44cf19cb975119f6ad318320588248ae3bfd29726fddcb811d99592798b3e479fcbce775319f439015df1c8a72562e891fb81b934ac3f013
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\265C0DEB29181DD1891051371C5F863A_7D7374C3BD488A38BC34DD9B008EDC62Filesize
402B
MD5d98ec9274786f61dc584fbd51dcceec8
SHA189461bfbfada68a383fe901ff363207f888f4d7d
SHA256e094cee78dc102037148ce1732fbce7666980359fee35321c23154b2e1ea0723
SHA5127d716787eb786cdb0708b0238d16b18939163ca3d9cfd5f1e206b8052b925d5a68bc3455261aa27ebf8ae1bb77fb997e72b946e8e01f53e7b3ffae596f5ec56f
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\5080DC7A65DB6A5960ECD874088F3328_862BA1770B2FEE013603D2FF9ABEAFDAFilesize
482B
MD5fec300decc6701d3b598ce981ea18a58
SHA174be4be5ee1d780ec2e7c373a387b7d5cfd3fe43
SHA2569354cf75cbaab4fa2b382efc08f7f4f8e193405221b75f8d7057fd18d9f7f18f
SHA5126aa39d7d8ddb8472edd18197a26bc80831a4f87a674b040a585df0da55a86340dfcdd3830f842c6bda70b0cf3bd756df62dac6ef7cb5a81b06fa69a007244f95
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_2DBE917624E9880FE0C7C5570D56E691Filesize
486B
MD52471b4401233fd9a675fd46b2811bcfd
SHA11e66ee627d1a6989cdcd2c33c82a9a88ef193a65
SHA256f07a311521580fca4b2799ae19705959bab58fd25624abb530e986a4146b86de
SHA512ee84a11c78fc3fc2c60ae19efb6787aa9c8171e9028ffd2cf676ee958c4aa179e2e914e6717599f903f53a7638cb93a94d7a161ca9d232c32f9398817670ff77
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\B398B80134F72209547439DB21AB308D_D14B79B440CDC26D7D21C81855E2C04DFilesize
434B
MD5a866a81b2d1380c8cd4560ba66e5a832
SHA1bd6d16febefe1b0d7eaccb7fbda8a4f7fbedef18
SHA2562d06853c4c58e1df62f7f6955c85a94921c284c84897ccf2308d0149186bda2f
SHA5127e06a159ffbf213e7f05ff8525fde13ff2edbb49f68900b6fde8ae214ccddfdba9b6d4432784a59cdce227f54d3a3ee2b7d8aeac07eaa41c94d2744dafbcf960
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBAFilesize
392B
MD5f0b43fe1eeaffdb053b83c7143cd2df2
SHA135bf55ae8c8b2d20ee6a03555f8e85284808596c
SHA256324c81500fa86e43c8e2e24c02d091847f1261e970cb1887482291c4eb0ebfb2
SHA5120190658cb31020f7849f396c1a54d1616478dc7c335e974d2b6f85081dd434bb6a838afe3ce7b486d587bcc227f884779a08b96baece962b133223694ff8b208
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\E87CE99F124623F95572A696C80EFCAF_871E11B76822F93FE2DBF907A5A1D9A8Filesize
402B
MD577102c833e8b32ce4c8a5a85beba22fb
SHA1d4d6a86f1a1dce777478c2b49502a2c69d1773c7
SHA256ce961a0ca651f3f254efe0ec5e21e013bd55f6871ff30b6507d56f7835f98be5
SHA512ba0dbaab5e105b418e12353ef5f3a7d4f4ee201d64638c5fbf2ac45506d8a29977e6b5be35d0f845b016d30d85c02eab61cd0b43ec8c443934a6be922ebec81b
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\Windows\3720402701\2219095117.priFilesize
207KB
MD5e2b88765ee31470114e866d939a8f2c6
SHA1e0a53b8511186ff308a0507b6304fb16cabd4e1f
SHA256523e419d2fa2e780239812d36caa37e92f8c3e6a5cd9f18f0d807c593effa45e
SHA512462e8e6b4e63fc6781b6a9935b332a1dc77bfb88e1de49134f86fd46bd1598d2e842902dd9415a328e325bd7cdee766bd9473f2695acdfa769ffe7ba9ae1953d
-
memory/240-415-0x0000000000000000-mapping.dmp
-
memory/388-792-0x0000000000000000-mapping.dmp
-
memory/1324-392-0x0000000000000000-mapping.dmp
-
memory/2160-789-0x0000000000000000-mapping.dmp
-
memory/2360-436-0x0000000000000000-mapping.dmp
-
memory/2628-145-0x0000000077C80000-0x0000000077E0E000-memory.dmpFilesize
1.6MB
-
memory/2628-153-0x0000000077C80000-0x0000000077E0E000-memory.dmpFilesize
1.6MB
-
memory/2628-156-0x0000000077C80000-0x0000000077E0E000-memory.dmpFilesize
1.6MB
-
memory/2628-157-0x0000000077C80000-0x0000000077E0E000-memory.dmpFilesize
1.6MB
-
memory/2628-158-0x0000000077C80000-0x0000000077E0E000-memory.dmpFilesize
1.6MB
-
memory/2628-159-0x0000000077C80000-0x0000000077E0E000-memory.dmpFilesize
1.6MB
-
memory/2628-160-0x0000000077C80000-0x0000000077E0E000-memory.dmpFilesize
1.6MB
-
memory/2628-161-0x0000000077C80000-0x0000000077E0E000-memory.dmpFilesize
1.6MB
-
memory/2628-162-0x0000000077C80000-0x0000000077E0E000-memory.dmpFilesize
1.6MB
-
memory/2628-163-0x0000000077C80000-0x0000000077E0E000-memory.dmpFilesize
1.6MB
-
memory/2628-164-0x0000000077C80000-0x0000000077E0E000-memory.dmpFilesize
1.6MB
-
memory/2628-165-0x0000000077C80000-0x0000000077E0E000-memory.dmpFilesize
1.6MB
-
memory/2628-166-0x0000000077C80000-0x0000000077E0E000-memory.dmpFilesize
1.6MB
-
memory/2628-167-0x0000000077C80000-0x0000000077E0E000-memory.dmpFilesize
1.6MB
-
memory/2628-168-0x0000000077C80000-0x0000000077E0E000-memory.dmpFilesize
1.6MB
-
memory/2628-169-0x0000000077C80000-0x0000000077E0E000-memory.dmpFilesize
1.6MB
-
memory/2628-170-0x0000000077C80000-0x0000000077E0E000-memory.dmpFilesize
1.6MB
-
memory/2628-171-0x0000000077C80000-0x0000000077E0E000-memory.dmpFilesize
1.6MB
-
memory/2628-172-0x0000000077C80000-0x0000000077E0E000-memory.dmpFilesize
1.6MB
-
memory/2628-173-0x0000000077C80000-0x0000000077E0E000-memory.dmpFilesize
1.6MB
-
memory/2628-174-0x0000000077C80000-0x0000000077E0E000-memory.dmpFilesize
1.6MB
-
memory/2628-176-0x0000000077C80000-0x0000000077E0E000-memory.dmpFilesize
1.6MB
-
memory/2628-175-0x0000000077C80000-0x0000000077E0E000-memory.dmpFilesize
1.6MB
-
memory/2628-178-0x0000000077C80000-0x0000000077E0E000-memory.dmpFilesize
1.6MB
-
memory/2628-177-0x0000000077C80000-0x0000000077E0E000-memory.dmpFilesize
1.6MB
-
memory/2628-179-0x0000000077C80000-0x0000000077E0E000-memory.dmpFilesize
1.6MB
-
memory/2628-180-0x0000000077C80000-0x0000000077E0E000-memory.dmpFilesize
1.6MB
-
memory/2628-181-0x0000000077C80000-0x0000000077E0E000-memory.dmpFilesize
1.6MB
-
memory/2628-182-0x0000000077C80000-0x0000000077E0E000-memory.dmpFilesize
1.6MB
-
memory/2628-183-0x0000000077C80000-0x0000000077E0E000-memory.dmpFilesize
1.6MB
-
memory/2628-121-0x0000000077C80000-0x0000000077E0E000-memory.dmpFilesize
1.6MB
-
memory/2628-122-0x0000000077C80000-0x0000000077E0E000-memory.dmpFilesize
1.6MB
-
memory/2628-154-0x0000000077C80000-0x0000000077E0E000-memory.dmpFilesize
1.6MB
-
memory/2628-155-0x0000000077C80000-0x0000000077E0E000-memory.dmpFilesize
1.6MB
-
memory/2628-152-0x0000000077C80000-0x0000000077E0E000-memory.dmpFilesize
1.6MB
-
memory/2628-123-0x0000000077C80000-0x0000000077E0E000-memory.dmpFilesize
1.6MB
-
memory/2628-151-0x0000000077C80000-0x0000000077E0E000-memory.dmpFilesize
1.6MB
-
memory/2628-150-0x0000000077C80000-0x0000000077E0E000-memory.dmpFilesize
1.6MB
-
memory/2628-124-0x0000000077C80000-0x0000000077E0E000-memory.dmpFilesize
1.6MB
-
memory/2628-149-0x0000000077C80000-0x0000000077E0E000-memory.dmpFilesize
1.6MB
-
memory/2628-148-0x0000000077C80000-0x0000000077E0E000-memory.dmpFilesize
1.6MB
-
memory/2628-147-0x0000000077C80000-0x0000000077E0E000-memory.dmpFilesize
1.6MB
-
memory/2628-146-0x0000000077C80000-0x0000000077E0E000-memory.dmpFilesize
1.6MB
-
memory/2628-120-0x0000000077C80000-0x0000000077E0E000-memory.dmpFilesize
1.6MB
-
memory/2628-144-0x0000000077C80000-0x0000000077E0E000-memory.dmpFilesize
1.6MB
-
memory/2628-143-0x0000000077C80000-0x0000000077E0E000-memory.dmpFilesize
1.6MB
-
memory/2628-142-0x0000000077C80000-0x0000000077E0E000-memory.dmpFilesize
1.6MB
-
memory/2628-141-0x0000000077C80000-0x0000000077E0E000-memory.dmpFilesize
1.6MB
-
memory/2628-140-0x0000000077C80000-0x0000000077E0E000-memory.dmpFilesize
1.6MB
-
memory/2628-139-0x0000000077C80000-0x0000000077E0E000-memory.dmpFilesize
1.6MB
-
memory/2628-138-0x0000000077C80000-0x0000000077E0E000-memory.dmpFilesize
1.6MB
-
memory/2628-137-0x0000000077C80000-0x0000000077E0E000-memory.dmpFilesize
1.6MB
-
memory/2628-136-0x0000000077C80000-0x0000000077E0E000-memory.dmpFilesize
1.6MB
-
memory/2628-135-0x0000000077C80000-0x0000000077E0E000-memory.dmpFilesize
1.6MB
-
memory/2628-134-0x0000000077C80000-0x0000000077E0E000-memory.dmpFilesize
1.6MB
-
memory/2628-133-0x0000000077C80000-0x0000000077E0E000-memory.dmpFilesize
1.6MB
-
memory/2628-132-0x0000000077C80000-0x0000000077E0E000-memory.dmpFilesize
1.6MB
-
memory/2628-131-0x0000000077C80000-0x0000000077E0E000-memory.dmpFilesize
1.6MB
-
memory/2628-130-0x0000000077C80000-0x0000000077E0E000-memory.dmpFilesize
1.6MB
-
memory/2628-129-0x0000000077C80000-0x0000000077E0E000-memory.dmpFilesize
1.6MB
-
memory/2628-128-0x0000000077C80000-0x0000000077E0E000-memory.dmpFilesize
1.6MB
-
memory/2628-127-0x0000000077C80000-0x0000000077E0E000-memory.dmpFilesize
1.6MB
-
memory/2628-126-0x0000000077C80000-0x0000000077E0E000-memory.dmpFilesize
1.6MB
-
memory/2628-125-0x0000000077C80000-0x0000000077E0E000-memory.dmpFilesize
1.6MB
-
memory/4244-883-0x0000000000000000-mapping.dmp
-
memory/4668-307-0x0000000000000000-mapping.dmp
-
memory/4736-208-0x0000000000000000-mapping.dmp
-
memory/5016-684-0x0000000000000000-mapping.dmp