Analysis

  • max time kernel
    171s
  • max time network
    170s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/04/2024, 02:17

General

  • Target

    internationalprimopdf.exe

  • Size

    6.9MB

  • MD5

    f923ff5d2b1e5866f7306606a82d3abb

  • SHA1

    cd682fbb04a4fdcb96d23d946ccc2dc7e9d9937e

  • SHA256

    815eb0c2591ffa6d6de7e8ae52ebdcccfc0d88d45571b376c3d75425e1e719d5

  • SHA512

    b78a3e469e2558317e4eb630912547c1ca3e4a133c0b2b699ff0a68c66d858ad370c984b2dc5459d079ac27d3829af55a42fb5686a1995c9b675767aa257609d

  • SSDEEP

    196608:ITmMGl2Yx+GKK9OvDifW8KtVnQPVL2nIWU4Icz4uA/:ITt9NC9aifBKt1qMfU494uA/

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 21 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops desktop.ini file(s) 2 IoCs
  • Drops file in System32 directory 6 IoCs
  • Drops file in Program Files directory 40 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of FindShellTrayWindow 25 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\internationalprimopdf.exe
    "C:\Users\Admin\AppData\Local\Temp\internationalprimopdf.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:3904
    • C:\Program Files (x86)\Nitro PDF\PrimoPDF\PrimDel.exe
      "C:\Program Files (x86)\Nitro PDF\PrimoPDF\PrimDel.exe"
      2⤵
      • Executes dropped EXE
      PID:4908
    • C:\Program Files (x86)\Nitro PDF\PrimoPDF\PrimInst.exe
      "C:\Program Files (x86)\Nitro PDF\PrimoPDF\PrimInst.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • Drops file in Program Files directory
      PID:4560
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.nitropdf.com/services/LinkRedirector.aspx?lr_prod=Primo&lr_name=welcome&lr_loc=en-US&lr_src=primo&name=&email=&company=&language=1033
      2⤵
      • Enumerates system info in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:4996
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9eddb46f8,0x7ff9eddb4708,0x7ff9eddb4718
        3⤵
          PID:4580
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1980,4558561878009437477,7243674627851773261,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:2
          3⤵
            PID:3388
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1980,4558561878009437477,7243674627851773261,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 /prefetch:3
            3⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:2780
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1980,4558561878009437477,7243674627851773261,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2776 /prefetch:8
            3⤵
              PID:5028
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,4558561878009437477,7243674627851773261,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:1
              3⤵
                PID:436
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,4558561878009437477,7243674627851773261,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:1
                3⤵
                  PID:1868
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,4558561878009437477,7243674627851773261,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4640 /prefetch:1
                  3⤵
                    PID:1988
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,4558561878009437477,7243674627851773261,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4092 /prefetch:1
                    3⤵
                      PID:1252
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1980,4558561878009437477,7243674627851773261,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2024 /prefetch:2
                      3⤵
                      • Suspicious behavior: EnumeratesProcesses
                      PID:4608
                • C:\Windows\System32\CompPkgSrv.exe
                  C:\Windows\System32\CompPkgSrv.exe -Embedding
                  1⤵
                    PID:4220
                  • C:\Windows\System32\CompPkgSrv.exe
                    C:\Windows\System32\CompPkgSrv.exe -Embedding
                    1⤵
                      PID:1612
                    • C:\Program Files (x86)\Nitro PDF\PrimoPDF\PrimoPDF.exe
                      "C:\Program Files (x86)\Nitro PDF\PrimoPDF\PrimoPDF.exe"
                      1⤵
                      • Executes dropped EXE
                      • Loads dropped DLL
                      • Drops desktop.ini file(s)
                      • Drops file in Windows directory
                      • Modifies system certificate store
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of SetWindowsHookEx
                      PID:4528
                      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe
                        "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\4vrvn4ga.cmdline"
                        2⤵
                          PID:4428
                          • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
                            C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESF2EC.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCF2EB.tmp"
                            3⤵
                              PID:5040
                        • C:\Windows\SysWOW64\werfault.exe
                          werfault.exe /h /shared Global\e15840f2dae244af98d734fa3d4e2b8e /t 116 /p 4528
                          1⤵
                            PID:3412
                          • C:\Program Files (x86)\Nitro PDF\PrimoPDF\PrimoPDF.exe
                            "C:\Program Files (x86)\Nitro PDF\PrimoPDF\PrimoPDF.exe"
                            1⤵
                            • Executes dropped EXE
                            • Loads dropped DLL
                            • Suspicious use of AdjustPrivilegeToken
                            • Suspicious use of SetWindowsHookEx
                            PID:2756
                            • C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe
                              "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\e5ti-tuv.cmdline"
                              2⤵
                                PID:1020
                                • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
                                  C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESDA3A.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCDA39.tmp"
                                  3⤵
                                    PID:4756

                              Network

                              MITRE ATT&CK Enterprise v15

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads

                              • C:\Program Files (x86)\Nitro PDF\PrimoPDF\APDB.dll

                                Filesize

                                20KB

                                MD5

                                7d4ada00170b1b6be2484f84f5b7beab

                                SHA1

                                22ca2778f80870c9ae1616d7d401acfc5d29be77

                                SHA256

                                0c2210f3e68c5c90bad2fcaa9bb9e00483bc43a81e5f6be29bd7e3610e629cd1

                                SHA512

                                89f2d085e4d135f37546fc15debd99bf0f890d5a35520be69ea6e5409594b11b6381240338d7132688f5dd797ee59d141fc20ac0b3ec02a4a728fcaba8418dc0

                              • C:\Program Files (x86)\Nitro PDF\PrimoPDF\Drivers\primopdf.ppd

                                Filesize

                                19KB

                                MD5

                                f009ebf61b4bcb39756b190e30ed21c4

                                SHA1

                                4bac758e67f745cf7d1b021b5e636258a979f69d

                                SHA256

                                1b582c3ff9fb05477f61f5aeec2d7f3c02e2247a5693b787d6d4a7395727f660

                                SHA512

                                ac69fe06c70bf2a419583955136392a0dee4d00044bcfae090379117524c071c1382f2663a3d2256b14e8b8144ece6b5778a71756c8daefcfb425c3616d2d0b8

                              • C:\Program Files (x86)\Nitro PDF\PrimoPDF\Drivers\ps5ui.dll

                                Filesize

                                236KB

                                MD5

                                68208e1d38169337c165a95b828e9111

                                SHA1

                                af4cfe044b7a8cd5351186fef66e11c364b03c90

                                SHA256

                                f33d56a9b6d69b2ce34aad9359f91e08d22721a4657ccbe88b147543045603bf

                                SHA512

                                b18189f2d488eb6dcaaedbeb6b50ae9290475b3a41093f539511448decb1f0302fec63a09a2ae72f399b2a5ba0291754ec957c70e1fed6ad0bf36a00e412c5eb

                              • C:\Program Files (x86)\Nitro PDF\PrimoPDF\Drivers\pscript.ntf

                                Filesize

                                1.0MB

                                MD5

                                e45e03bdfbddcee4b6d62bc922ef24e7

                                SHA1

                                1873ec050afe6275e95df8b6a1a43098dccb9f25

                                SHA256

                                3eb48a31bb8bfb34534ff6e251e9b97e29e8b8e3a4eaf6c929b026caced3498c

                                SHA512

                                0dd54c060ca8b2fb676a14488dfeb30de9b0458a23aeb632c1bc4de54fc6b8066c86450a896726f04ca74bcecec03fac15c69a81ed17215b53501da57607f915

                              • C:\Program Files (x86)\Nitro PDF\PrimoPDF\Drivers\pscript5.dll

                                Filesize

                                720KB

                                MD5

                                b0fde6dd7fbed18eb3464a621ae8ee5c

                                SHA1

                                1821b681455826f8a501df1b5abedfc52f9b7e8f

                                SHA256

                                5e49e3cc7917abc25d6c8eb09e5ea8fd3e6809393e3ae2f35254f80253147876

                                SHA512

                                f97a62d66c6c04b4cf11ed62e5e3ace074bffcc71b64a273efa699c045045af63889c656f09f0b7878c9f98da6ffebed01675890f9c0c70e80ba0345b490257d

                              • C:\Program Files (x86)\Nitro PDF\PrimoPDF\PrimDel.exe

                                Filesize

                                46KB

                                MD5

                                ae056378506ca73f05c7672751a4a1a6

                                SHA1

                                6cd4e9178320ca3d224452e8999e8abca5cbc416

                                SHA256

                                f3f016084b73b841808f3b061a30f456c55e2fd473a19cda1b33df3083b82aaf

                                SHA512

                                32201ffcfd2ee9b0a117232b7ada2f57e570196752aa7a40b1f39926ccedbb03f9b1ba01345fa7ccd0a613b40dce7461d181b30abd38023d665289f1f369d80a

                              • C:\Program Files (x86)\Nitro PDF\PrimoPDF\PrimInst.exe

                                Filesize

                                177KB

                                MD5

                                7eb4f230aec0fbf5388b56357ac652ac

                                SHA1

                                12199515cbd88780ff1f47b690247a08eb23636a

                                SHA256

                                5c003c78ad1963f9eab28756f54a015aa6b25dc65c01046532d24c98b9b01dc3

                                SHA512

                                16597bd8acd9b1034970be8e712a49803682fa184aafb807d1344707cf6840d8281a8b60101386677931ada5e83b0172e9fb8bd22033b6e0d74f84618dc1e453

                              • C:\Program Files (x86)\Nitro PDF\PrimoPDF\PrimoMon\Primomonnt.dll

                                Filesize

                                92KB

                                MD5

                                962874341190719614fc9b37d5de71f8

                                SHA1

                                77ad30b59b8bcb079057d7d27a63f94eb0a27445

                                SHA256

                                0bc791b452509746f6948fe0819486692507accc5341e5f686e43c6a9332c76d

                                SHA512

                                d25e94f44727ea1c4597888953639af5802ee8c52560a3ca402e391f1fd571047315fd37fcec53bd96ef71b66baf348661f95c54548ea5ec7d72a235195e3434

                              • C:\Program Files (x86)\Nitro PDF\PrimoPDF\PrimoPDF.es.apdb

                                Filesize

                                32KB

                                MD5

                                41a1364c9f5737adcedaa58987a14696

                                SHA1

                                327b774b1768615936f29f80160f2383f49239eb

                                SHA256

                                420edc21ada1fd3e1f25bfe5df5216fa86c610bd24258127a68fc7dd212095e4

                                SHA512

                                e4c8b595e8a455055fd7991d1ec390ca749674ee3d1932c32fd8c5a650b0853d74e9d0e30110f2d59d1c5a3a2817ad9440455faf9180b50a4723b295bc14250c

                              • C:\Program Files (x86)\Nitro PDF\PrimoPDF\PrimoPDF.exe

                                Filesize

                                1.3MB

                                MD5

                                eaaf382fd0d1ba601909e5bd5a96f9b0

                                SHA1

                                7b9a2e41987ee4c7de1e510f062a8e5be8c3a6e1

                                SHA256

                                830692a373baaec1d5ee70131d10712357acfccdb6074879cb79b6bf67220783

                                SHA512

                                f3b9543175f3ff084d52ce9a514c38297b73e88a82f56726edc26d109216b1a5bc04554bcf0fa229b3ab4204f66f7febc4dca5ca76a038a5f070039e5378def8

                              • C:\Program Files (x86)\Nitro PDF\PrimoPDF\PrimoSet.dll

                                Filesize

                                63KB

                                MD5

                                6543569dd0510a4a668e0af04096adcd

                                SHA1

                                1997c1d7843599011f0f583a030a6cb9cde0960d

                                SHA256

                                c3c310f6e6a0e6369b0f9074d73f4beefe073dfaad4fe5c2c27f12701e3e3d6f

                                SHA512

                                563eb39b445713394f3a6d10e0818c1bc1cad7e563373e497e0c5b0dd29f1d8a749be649c3b89828a0366dcc6207ed04a3cab2de99ceb4b11fe864ad12b053e8

                              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

                                Filesize

                                1KB

                                MD5

                                ef458f8504ea98df116bf7e03b1df935

                                SHA1

                                76928678b0497b58436597ad4fc93e6156025902

                                SHA256

                                2cd9826dac3e0e98d18cff1f350be5a0bb0dc7be8d2165e7d2804a1dc9956ce3

                                SHA512

                                2a469c7bb1619a47dc122eb2043732c17f6ebea572337b2cb75bd7722da9b4ce2170c4af2511cd44f7eebad35fbc9826601b1cad7c1d85bb41683a3c1d4a6632

                              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27

                                Filesize

                                1KB

                                MD5

                                19ab588496e21aacdf239041f6d88b8c

                                SHA1

                                b3f25e07b4acb26b4caf0d7d1699aa5c6fbd8baa

                                SHA256

                                c306ab99d90364ec5fbd3a3f672eae5a73c450640c11680e5a4497b65b77f1e8

                                SHA512

                                b58a192198b0d29add759f411beacf04e7a2a59cd88732253367dbf38725d4ee8b6b38d7a61800029cb84800d64812e932a16abc9478d397bc5adb9f712557ca

                              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B69D763EB21649DA26F20618312DEE70

                                Filesize

                                74KB

                                MD5

                                c899c51d30fcdf872ba7e7c38416ea60

                                SHA1

                                dc8af47049a58672124557e751b4b81f82c145eb

                                SHA256

                                04291f18573b1cd8f10cc6d6ccea49b1deb83b9e7c0d54e6085b6bf0f950728d

                                SHA512

                                c95cf46629fa50d9c59b6d1992e49508c783f4a16d6a4ada39ecd21ed5dc42954b6fa318f6205521164cfa43868b7e90878e9cbab5aa89919de297e25d855834

                              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B90B117906B8A74C79D1BC450C2B94B1_EA3B1A308505FF38C7831F743238663E

                                Filesize

                                5B

                                MD5

                                5bfa51f3a417b98e7443eca90fc94703

                                SHA1

                                8c015d80b8a23f780bdd215dc842b0f5551f63bd

                                SHA256

                                bebe2853a3485d1c2e5c5be4249183e0ddaff9f87de71652371700a89d937128

                                SHA512

                                4cd03686254bb28754cbaa635ae1264723e2be80ce1dd0f78d1ab7aee72232f5b285f79e488e9c5c49ff343015bd07bb8433d6cee08ae3cea8c317303e3ac399

                              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA

                                Filesize

                                724B

                                MD5

                                ac89a852c2aaa3d389b2d2dd312ad367

                                SHA1

                                8f421dd6493c61dbda6b839e2debb7b50a20c930

                                SHA256

                                0b720e19270c672f9b6e0ec40b468ac49376807de08a814573fe038779534f45

                                SHA512

                                c6a88f33688cc0c287f04005e07d5b5e4a8721d204aa429f93ade2a56aeb86e05d89a8f7a44c1e93359a185a4c5f418240c6cdbc5a21314226681c744cf37f36

                              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F07644E38ED7C9F37D11EEC6D4335E02_22265154E37786E06D33C3F357FE6306

                                Filesize

                                472B

                                MD5

                                19dd93e22d10ba9e93b2fdaf01cd57c3

                                SHA1

                                8fdd52d0a390b143d309f860f7e357e868641d3d

                                SHA256

                                21c3d566e2bd342dfc2063beaad9e69ab951bcb0c3f5a4eaccfd7dbcf21fc315

                                SHA512

                                309aa85a694a3aa9bdea9d567f205d9dbd7cdf40a0c945ee41435d907cf13c37ceca5209ac132d798e0886898d41351d396179266e5e74550ef087cf7a053cb0

                              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

                                Filesize

                                410B

                                MD5

                                9f78c87cd49363199ea4abdb6c55e7f9

                                SHA1

                                79287c1fd89c240a58155f1df3c96fbaa29d47b9

                                SHA256

                                d7c8cd107bd6d6ea6fe5dc48e804fdacd37ce92600092d643808b507774844fb

                                SHA512

                                65a3ad50e827e8737853238ff8f9611ff0d2403319dcd4e53e3e782feafe2ed6f16d1e1733e5d7a06e5a4b80565188bee7abe2c1384c58254cd47c3c43a3f768

                              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27

                                Filesize

                                408B

                                MD5

                                fcbb23556227e933842af3648bf40805

                                SHA1

                                6503b22e2f87de47230a1ccba676319d6f0ca369

                                SHA256

                                80e343d6defac229ded7e43c31c43536fd7682fd84088c591e02e1d7c65aefe3

                                SHA512

                                a66897b4c883ec1c49dadb38837e3af402237c7c6e3a0db58e2c45fdc3545da94bb504824bb82f2c9cec7b4117166a45ae942d08a30fb5d13125c12dbfbb8add

                              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B69D763EB21649DA26F20618312DEE70

                                Filesize

                                302B

                                MD5

                                0d4fbed8048a545ad0dd49d6c07e0db8

                                SHA1

                                3bfe1fdec63794d7a8d9483197014edc007221f7

                                SHA256

                                87fdf0818bae4fbc3dc29c196be37968854abe1b15482b659e929a3c33a23d06

                                SHA512

                                dbf1a49e1c85e95ac1c117fcbcbdcbdef0ccd6a1067de4d748167be135ea5e9499063fbdba1331134d6fc33d2e07f4981c9fc347d34a28482304ead930e60011

                              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B90B117906B8A74C79D1BC450C2B94B1_EA3B1A308505FF38C7831F743238663E

                                Filesize

                                404B

                                MD5

                                75860b4a09175b84a3fe24fee772ac60

                                SHA1

                                a06cf9f793902cb2f1aa394bd36c90971fbaa4b0

                                SHA256

                                f2f8bb3b40a91daa8385655f37f0771b909fe905cbf5320185812bd020a0353b

                                SHA512

                                433793c08e246c89dff4c21f34f1b13ba0142996c865d5af5edba273ab7b5a2290d0b763030dec56caf3c9c0d7bc17038934cddda766e9fea3e4bfa0fa46e382

                              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA

                                Filesize

                                392B

                                MD5

                                43e32da7c4eec21c1765eff2bdcf5d8c

                                SHA1

                                5d3beddf61c38d92e7b4e17171f441681918dcae

                                SHA256

                                77e9affea024faa54972eab63054e0449f25d1031aceeede1bcfc3586b273cc1

                                SHA512

                                d63c1db3db91a0ecff46f76b784849ebf3e8b9e0be75c59b3a1f6b19f991f38b0ef4a228c878a89f652b7251a0c0edf50e2e06772bf4ad5dc81bb61faf042ae0

                              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F07644E38ED7C9F37D11EEC6D4335E02_22265154E37786E06D33C3F357FE6306

                                Filesize

                                406B

                                MD5

                                a78214192b5f9cbca7ac6ba8040b1fa5

                                SHA1

                                8cfbe91b5d3ebbad88ccb5faec495b6c596cf4e5

                                SHA256

                                e7a595ecaf012c606bd283d4ce7d28a19f1e26453743743ca3825046c83505e2

                                SHA512

                                81954bf4df1baf110732b79a58054d7a9259a22633d3d443f301e1fd4bde4878f4ae1ac3e75aca41d4c2dbefeaff874c5ae8de5905146e88c174770b67cffdbc

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                Filesize

                                152B

                                MD5

                                9f44d6f922f830d04d7463189045a5a3

                                SHA1

                                2e9ae7188ab8f88078e83ba7f42a11a2c421cb1c

                                SHA256

                                0ae5cf8b49bc34fafe9f86734c8121b631bad52a1424c1dd2caa05781032334a

                                SHA512

                                7c1825eaefcc7b97bae31eeff031899300b175222de14000283e296e9b44680c8b3885a4ed5d78fd8dfee93333cd7289347b95a62bf11f751c4ca47772cf987d

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                Filesize

                                152B

                                MD5

                                7740a919423ddc469647f8fdd981324d

                                SHA1

                                c1bc3f834507e4940a0b7594e34c4b83bbea7cda

                                SHA256

                                bdd4adaa418d40558ab033ac0005fd6c2312d5f1f7fdf8b0e186fe1d65d78221

                                SHA512

                                7ad98d5d089808d9a707d577e76e809a223d3007778a672734d0a607c2c3ac5f93bc72adb6e6c7f878a577d3a1e69a16d0cd871eb6f58b8d88e2ea25f77d87b7

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                Filesize

                                408B

                                MD5

                                a132ce0810dc9915406250a051247bec

                                SHA1

                                195c458013e084eb1dd3c434cb28438313b09f46

                                SHA256

                                bc4bea2c3d74aa29e28157bca53733cf4efec1bd28110ff3c7b35835f98413d8

                                SHA512

                                72fc034bcafa4b102130926add494ed1af0ba2c32be7539491bf953428ce81e05ef88f2fab72b5accfd63deef06ff0d2f9b2b7275366a718e2f795a143c01455

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                Filesize

                                1KB

                                MD5

                                9528928c3691aa25c71eb1d04e445366

                                SHA1

                                efabba17534a1ade7391b181cac21be5ae8b6632

                                SHA256

                                036c0f9363902ca017103d2d1752373b66fb17187fa68152e308c436b093f104

                                SHA512

                                77681f71a93a27da09092cc894e43a8a18a0b6119daca85a0794ddea95a684dd90a70010009a5463deb2e2ed2448bccff939344baa5f1fee441b56c99bfb7188

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                Filesize

                                6KB

                                MD5

                                cb0c49dc73f3b7d066a2a9f98ed4cd44

                                SHA1

                                57bb2df295ce313f6835fdfbd487b7e327a1b28b

                                SHA256

                                dc8bfb4abd3551fb51cef707566da47073eb6f97d6cc939bbcd1a4c1868d5d20

                                SHA512

                                bdc0cea7a49f83c884b763d9d2236f99391b0c0bc2a79b789c176c30a124c9b1fab49497de9763ffc11c6dac8694d5cac763ffb62039474ba890d08dcb97ad01

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                Filesize

                                6KB

                                MD5

                                dcbbe74eaef8d25d9ed4a869b098945e

                                SHA1

                                5dddeb980a98b6344a805e84f8271904a2e44de7

                                SHA256

                                5a17d20d5e3dfef7c3613671770ab3082b632a466cf61b70bfdd87c549d1d509

                                SHA512

                                1f896a309d70c0c98db794130a23e42dfa39fbafeee4698fcc5c7e289222c4031a3a3ad5804196b759f71c48562d62308e8680c246caae7bba8abf5eb2350225

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                Filesize

                                1KB

                                MD5

                                8472ff492df224c4ae9af1ad2d82c435

                                SHA1

                                9e99d30b74df57ff5d610933d989edd35fa658cc

                                SHA256

                                db4e240cc3df419d3133da745b9f4119b0995c9eeafecf8c8899f49bc9b90a7b

                                SHA512

                                17c4330b8b3752693865e460e0965b8dc746bff599040acb0bea34a76067576a0ce5b87728e8f902b97174eccfb66125084052869408da315c2dec1253c7673f

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                Filesize

                                1KB

                                MD5

                                a39a69b627fe1a6b415fac89f8b15851

                                SHA1

                                9c708bd65682e4ae6d19802b91d70779869cadcc

                                SHA256

                                90fcb2307b1c81c2f0a6134fb77fda55db9c1f9da010a929691f222741044132

                                SHA512

                                cbfefe86ce2f42847b53d7dfbbd1a13d2bdc90953db4af3ddb20976e58e90534bf49747b494df692ba8e572c678333f13a44aedc804ca80fe4b83312d59fbdba

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                Filesize

                                1KB

                                MD5

                                5b92980d3c664fbf678fccc8517ebee6

                                SHA1

                                55c836b944c1470ea5709e82dad0f3a33e63a9f7

                                SHA256

                                1978d70bafa9515a25fc2c90c3fdd87386928862aa9af0c5417d761063038cfa

                                SHA512

                                0aa84a31f9dfb0d3abef0ae4a7a94b6e237ae931fe6496344fc934f9de759bf6c276a61ef0d3c7f0a447883897760b0e55978d46359213bf995f9d6e9a8cbff3

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe581037.TMP

                                Filesize

                                1KB

                                MD5

                                f82891341af204bd6ca02ab489560bde

                                SHA1

                                7207ea1ff4305f8bbb3f1eb23e3a47c00d9168fb

                                SHA256

                                447f61d28fd5c04107eca79c613f2c1ac574e459ff28669ad2ba942e0deb52b6

                                SHA512

                                7f16e84e3333d3bdbb5ee54d1ed0fd2c7e95e43c617ca5cb94a845e341bdda2784fe3773724456f9a39a54c187fbae1d5d16e67d1812a6c461b16c11405c67ba

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                Filesize

                                11KB

                                MD5

                                446e6fdecc4cfd9c3f3675281c85a20e

                                SHA1

                                6d4c4e55f188c403b8ee861f7b4de1dfe2b80ba3

                                SHA256

                                af23910b45e73524c7d11d50acc8c19ca538cfcde2f4dfd50634ec7a316b7a39

                                SHA512

                                bf512518b129cf26227ba0721256b573706f89a89078673297dcc0e6dbeea81dce0349f174a313af4613cf98513e998177b3e9fcfb21cb8913fe3318999abe96

                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\N1D00922\css2[1].css

                                Filesize

                                434B

                                MD5

                                ff4be5a0e3ff6c2b68bd5fcfff902f88

                                SHA1

                                ffe6f6ca0976ca0aa3741bf2e9b581eb3abe7fad

                                SHA256

                                27ce52ecba1a8b8293545acd0401f12ff8daa6e381c8b4726f1089316fe93616

                                SHA512

                                7830035ca04a47de61b21f563894317770b553e1dc1876ea9aaaf4acc3b3ecd92881e341d4edf829bae61aec67bc3f66e5aeb3485ae22889a580b1125bdd2dfc

                              • C:\Users\Admin\AppData\Local\Temp\4vrvn4ga.dll

                                Filesize

                                32KB

                                MD5

                                03b4597df4ef071c169d28a56f392a09

                                SHA1

                                7249b56a3735c7008dd12ed3d4ceb1c2aeff3c42

                                SHA256

                                bcc6bbc394b55c61d185ad170fed8393a351ed960899d9713130b9f6bde947bc

                                SHA512

                                5ecbb6321c6c2f459118a928d4b43073524e5257654c6454b8e650132098b5f3bfbd6bc994b66a0d2e11fa9bcd1be4551bb8559c1cb27168dd6b23883b7c35bd

                              • C:\Users\Admin\AppData\Local\Temp\RESF2EC.tmp

                                Filesize

                                1KB

                                MD5

                                45cc2794b5db9fdb69fc985e146424d4

                                SHA1

                                19479ec3deb3950b4d234c3d31c679db4fb9657c

                                SHA256

                                cb15dec92833abdacfa4f36a25e5f2935ebf4d556a135f74f0f894e431b9ac58

                                SHA512

                                c37f259e562e9f580f9ddc6f60eb6706e7722ea8a9601e6ae14bcd39989dc9b03cfd222cfdd9eeca82c18562a33a8e41231149e261a02d736b0daf02014d52b2

                              • C:\Users\Admin\AppData\Local\Temp\nsb4AA7.tmp\LangDLL.dll

                                Filesize

                                5KB

                                MD5

                                9384f4007c492d4fa040924f31c00166

                                SHA1

                                aba37faef30d7c445584c688a0b5638f5db31c7b

                                SHA256

                                60a964095af1be79f6a99b22212fefe2d16f5a0afd7e707d14394e4143e3f4f5

                                SHA512

                                68f158887e24302673227adffc688fd3edabf097d7f5410f983e06c6b9c7344ca1d8a45c7fa05553adcc5987993df3a298763477168d4842e554c4eb93b9aaaf

                              • C:\Users\Admin\AppData\Local\Temp\nsb4AA7.tmp\System.dll

                                Filesize

                                11KB

                                MD5

                                c17103ae9072a06da581dec998343fc1

                                SHA1

                                b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d

                                SHA256

                                dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f

                                SHA512

                                d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f

                              • C:\Users\Admin\AppData\Local\Temp\nsb4AA7.tmp\modern-wizard.bmp

                                Filesize

                                150KB

                                MD5

                                58181a0f0411f37429fdd3ae3199d681

                                SHA1

                                500d9eb07337e76228ab5564b1073d68c6c0cbe6

                                SHA256

                                bcca0774fc648a9a9b1d5361322450725eb580e892026f0d7322e755ef653051

                                SHA512

                                4c48ab261c48535eb6997cf3de7849d583bf1bae54c86f3fa1918c53feb60ad9b1a5feaf696c0adb9ec663071456cdb1e4ec38c0a8fbff7e6b22a086a49c9429

                              • C:\Users\Admin\AppData\Local\Temp\nsb4AA7.tmp\nsDialogs.dll

                                Filesize

                                9KB

                                MD5

                                c10e04dd4ad4277d5adc951bb331c777

                                SHA1

                                b1e30808198a3ae6d6d1cca62df8893dc2a7ad43

                                SHA256

                                e31ad6c6e82e603378cb6b80e67d0e0dcd9cf384e1199ac5a65cb4935680021a

                                SHA512

                                853a5564bf751d40484ea482444c6958457cb4a17fb973cf870f03f201b8b2643be41bccde00f6b2026dc0c3d113e6481b0dc4c7b0f3ae7966d38c92c6b5862e

                              • C:\Users\Admin\AppData\Roaming\PrimoPDF\PrimoSet.xml

                                Filesize

                                300B

                                MD5

                                6ed0b16ddf27470d5cb7624f7556b8c6

                                SHA1

                                85ad60225cf5779d558bdf94fb2fbc0e5eaada61

                                SHA256

                                96555b32ff6fb7fd90b5e6c857333db1b4cd1cfe21435bec257b8f18001f21f0

                                SHA512

                                6b82f9a863303ab82f3a720a8db67bb58c92d88d8b60bdd94ffb18b1d3855eb7bcf9cad737023466f4dc3a73360bce63ccc5135e4e8584804611a4e390549859

                              • \??\c:\Users\Admin\AppData\Local\Temp\4vrvn4ga.0.cs

                                Filesize

                                43KB

                                MD5

                                0d8398095a57e4c9baddd92ad80d533b

                                SHA1

                                21293fa146a8c0c5676fb6304186a58df69dbd1e

                                SHA256

                                e3e85f8c88756397b10f030cdfa343d98e833847e2682fe8170de3d70dffc4e9

                                SHA512

                                ef5d1a6eff5cab2a6e107fb4cee1ce34a77af42a38d75d391771ab6fd33a565a5dbe27ef046b55565403fd5d9c696ba6afea8dd4eea5e13c4c1a7d5a1d9b322d

                              • \??\c:\Users\Admin\AppData\Local\Temp\4vrvn4ga.cmdline

                                Filesize

                                589B

                                MD5

                                b14b10c44b526f72b9382d11aaad4ad8

                                SHA1

                                0284a85e098ddf0ef73173a86ed48d0a74ecca27

                                SHA256

                                7e50a9baa975176c63e6e32662ea6dc628cbba5a70e3164b4be44b2dfc33ebd8

                                SHA512

                                eb74de2e6e4e105f56c059415ab3c8a9ec0678dfbcef60a4fee81652aaf496fff1e9fcc234626479157ecb30f77f4d03e9c5031dc568518d0904c5298533c6b4

                              • \??\c:\Users\Admin\AppData\Local\Temp\CSCF2EB.tmp

                                Filesize

                                652B

                                MD5

                                69c6a776d6aea49642b9163c9ed5155e

                                SHA1

                                866a4e941a819159b8711817f402aa9a8f73d186

                                SHA256

                                8aff98c00c339f1c6c7ddb17cf8a8738a459adeb1acc0a72c0e4575b69249b5e

                                SHA512

                                1c855247330f1b35707399d48c814492ac0125eda43e4c08f901d6ce3897d6040b5b835b8cdfe5808bc5d511900f7b97af12b6d9a94d858dc514cc61418b99a9

                              • \??\c:\Users\Admin\AppData\Local\Temp\e5ti-tuv.cmdline

                                Filesize

                                589B

                                MD5

                                ff3483b045ead84ead3c004088db4dc7

                                SHA1

                                a3b848cb79af8d70521edef2f97c2842ba83f6b8

                                SHA256

                                888135f6b13865d79a3e701ae25d24698b51fc90b0d585d83038c3dc8eca4cf2

                                SHA512

                                b669af8c5adbd3229309f49485ffb7519a930f3ecc3ae778cf468fd03668c33aba626a5d752744391208138b899ba810595ae8ac9666da6535984bc004572e11

                              • memory/1020-365-0x0000000000A40000-0x0000000000A50000-memory.dmp

                                Filesize

                                64KB

                              • memory/2756-349-0x0000000000D10000-0x0000000000D20000-memory.dmp

                                Filesize

                                64KB

                              • memory/2756-335-0x0000000000D10000-0x0000000000D20000-memory.dmp

                                Filesize

                                64KB

                              • memory/2756-330-0x0000000074F20000-0x00000000754D1000-memory.dmp

                                Filesize

                                5.7MB

                              • memory/2756-346-0x0000000000D10000-0x0000000000D20000-memory.dmp

                                Filesize

                                64KB

                              • memory/2756-340-0x0000000074F20000-0x00000000754D1000-memory.dmp

                                Filesize

                                5.7MB

                              • memory/2756-347-0x0000000000D10000-0x0000000000D20000-memory.dmp

                                Filesize

                                64KB

                              • memory/2756-348-0x0000000000D10000-0x0000000000D20000-memory.dmp

                                Filesize

                                64KB

                              • memory/4428-240-0x0000000000A10000-0x0000000000A20000-memory.dmp

                                Filesize

                                64KB

                              • memory/4528-191-0x0000000074E80000-0x0000000075431000-memory.dmp

                                Filesize

                                5.7MB

                              • memory/4528-328-0x0000000074E80000-0x0000000075431000-memory.dmp

                                Filesize

                                5.7MB

                              • memory/4528-292-0x0000000001270000-0x0000000001280000-memory.dmp

                                Filesize

                                64KB

                              • memory/4528-291-0x0000000001270000-0x0000000001280000-memory.dmp

                                Filesize

                                64KB

                              • memory/4528-267-0x0000000001270000-0x0000000001280000-memory.dmp

                                Filesize

                                64KB

                              • memory/4528-266-0x0000000001270000-0x0000000001280000-memory.dmp

                                Filesize

                                64KB

                              • memory/4528-265-0x0000000074E80000-0x0000000075431000-memory.dmp

                                Filesize

                                5.7MB

                              • memory/4528-239-0x0000000074E80000-0x0000000075431000-memory.dmp

                                Filesize

                                5.7MB

                              • memory/4528-230-0x0000000001270000-0x0000000001280000-memory.dmp

                                Filesize

                                64KB

                              • memory/4528-229-0x0000000001270000-0x0000000001280000-memory.dmp

                                Filesize

                                64KB

                              • memory/4528-225-0x0000000001270000-0x0000000001280000-memory.dmp

                                Filesize

                                64KB

                              • memory/4528-192-0x0000000001270000-0x0000000001280000-memory.dmp

                                Filesize

                                64KB

                              • memory/4528-190-0x0000000074E80000-0x0000000075431000-memory.dmp

                                Filesize

                                5.7MB