Overview
overview
10Static
static
10BRUH WTF/S...OS.pdf
windows10-2004-x64
1BRUH WTF/SeroXen.exe
windows10-2004-x64
1BRUH WTF/b...to.dll
windows10-2004-x64
1BRUH WTF/b...re.dll
windows10-2004-x64
1BRUH WTF/b...ll.dll
windows10-2004-x64
1BRUH WTF/b...ok.dll
windows10-2004-x64
1BRUH WTF/b...ET.dll
windows10-2004-x64
1BRUH WTF/b...im.dll
windows10-2004-x64
1BRUH WTF/b...er.dll
windows10-2004-x64
1BRUH WTF/b...ce.dll
windows10-2004-x64
1BRUH WTF/b...es.dll
windows10-2004-x64
1BRUH WTF/b...ns.dll
windows10-2004-x64
1BRUH WTF/b...rk.dll
windows10-2004-x64
1BRUH WTF/b...db.dll
windows10-2004-x64
1BRUH WTF/b...db.dll
windows10-2004-x64
1BRUH WTF/b...ks.dll
windows10-2004-x64
1BRUH WTF/b...il.dll
windows10-2004-x64
1BRUH WTF/b...ts.dll
windows10-2004-x64
1BRUH WTF/b...rs.dll
windows10-2004-x64
1BRUH WTF/b...ls.dll
windows10-2004-x64
1BRUH WTF/b...on.dll
windows10-2004-x64
1BRUH WTF/b...at.dll
windows10-2004-x64
1BRUH WTF/b...ts.dll
windows10-2004-x64
1BRUH WTF/b...on.dll
windows10-2004-x64
1BRUH WTF/b...et.dll
windows10-2004-x64
1BRUH WTF/b...en.exe
windows10-2004-x64
1BRUH WTF/b...on.dll
windows10-2004-x64
1BRUH WTF/b...le.dll
windows10-2004-x64
1BRUH WTF/b...ib.dll
windows10-2004-x64
1BRUH WTF/b...ib.dll
windows10-2004-x64
1BRUH WTF/b...et.dll
windows10-2004-x64
1Resubmissions
24-12-2024 19:02
241224-xp5fastrdy 1016-07-2024 19:00
240716-xn2b9avhmm 1029-04-2024 18:50
240429-xhbjmsac4x 1029-04-2024 18:47
240429-xffetahh23 10Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
16-07-2024 19:00
Behavioral task
behavioral1
Sample
BRUH WTF/SeroXen Documentation and TOS.pdf
Resource
win10v2004-20240709-en
Behavioral task
behavioral2
Sample
BRUH WTF/SeroXen.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
BRUH WTF/bin/BouncyCastle.Crypto.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral4
Sample
BRUH WTF/bin/Cake.Core.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral5
Sample
BRUH WTF/bin/Cake.Powershell.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral6
Sample
BRUH WTF/bin/Gma.System.MouseKeyHook.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
BRUH WTF/bin/Logic.NET.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral8
Sample
BRUH WTF/bin/Microsoft.VisualStudio.CodeCoverage.Shim.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
BRUH WTF/bin/Microsoft.VisualStudio.TestPlatform.MSTest.TestAdapter.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral10
Sample
BRUH WTF/bin/Microsoft.VisualStudio.TestPlatform.MSTestAdapter.PlatformServices.Interface.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral11
Sample
BRUH WTF/bin/Microsoft.VisualStudio.TestPlatform.MSTestAdapter.PlatformServices.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral12
Sample
BRUH WTF/bin/Microsoft.VisualStudio.TestPlatform.TestFramework.Extensions.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral13
Sample
BRUH WTF/bin/Microsoft.VisualStudio.TestPlatform.TestFramework.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral14
Sample
BRUH WTF/bin/Mono.Cecil.Mdb.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral15
Sample
BRUH WTF/bin/Mono.Cecil.Pdb.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral16
Sample
BRUH WTF/bin/Mono.Cecil.Rocks.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral17
Sample
BRUH WTF/bin/Mono.Cecil.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral18
Sample
BRUH WTF/bin/MonoMod.Backports.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral19
Sample
BRUH WTF/bin/MonoMod.ILHelpers.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral20
Sample
BRUH WTF/bin/MonoMod.Utils.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral21
Sample
BRUH WTF/bin/Newtonsoft.Json.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral22
Sample
BRUH WTF/bin/Open.Nat.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral23
Sample
BRUH WTF/bin/Quasar.Common.Tests.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral24
Sample
BRUH WTF/bin/Quasar.Common.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral25
Sample
BRUH WTF/bin/Renci.SshNet.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral26
Sample
BRUH WTF/bin/SeroXen.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral27
Sample
BRUH WTF/bin/System.Management.Automation.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral28
Sample
BRUH WTF/bin/System.ValueTuple.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral29
Sample
BRUH WTF/bin/Vestris.ResourceLib.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral30
Sample
BRUH WTF/bin/dnlib.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral31
Sample
BRUH WTF/bin/protobuf-net.dll
Resource
win10v2004-20240709-en
General
-
Target
BRUH WTF/SeroXen Documentation and TOS.pdf
-
Size
389KB
-
MD5
268a35fc151093712fd931438266733b
-
SHA1
0cfe4de8b721ae00275f171874e975143ba4e5c3
-
SHA256
f3329fc8e298719361d0799fd3aa160ccc860fad1cdbf2d5b920370561079d24
-
SHA512
60f12acab903f4213b2e6f96e0e4ef4d19b4378d0cd18e86b736e1ef4daecbf18f926d298a60e156fce06d4af4121636133cc87d61ce7aed815e66240ed2cc03
-
SSDEEP
6144:gHN9PzWipJ6LIgy6WW9OyfnFTGndbcF7pVEtiOTwl/BdGqgZzu6cXmnV:saqcLIgySDYdbcJ/Etol2zu6dV
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4872 msedge.exe 4872 msedge.exe 4796 msedge.exe 4796 msedge.exe 3776 identity_helper.exe 3776 identity_helper.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2928 AcroRd32.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2928 AcroRd32.exe 2928 AcroRd32.exe 2928 AcroRd32.exe 2928 AcroRd32.exe 2928 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2928 wrote to memory of 224 2928 AcroRd32.exe 85 PID 2928 wrote to memory of 224 2928 AcroRd32.exe 85 PID 2928 wrote to memory of 224 2928 AcroRd32.exe 85 PID 224 wrote to memory of 4124 224 RdrCEF.exe 86 PID 224 wrote to memory of 4124 224 RdrCEF.exe 86 PID 224 wrote to memory of 4124 224 RdrCEF.exe 86 PID 224 wrote to memory of 4124 224 RdrCEF.exe 86 PID 224 wrote to memory of 4124 224 RdrCEF.exe 86 PID 224 wrote to memory of 4124 224 RdrCEF.exe 86 PID 224 wrote to memory of 4124 224 RdrCEF.exe 86 PID 224 wrote to memory of 4124 224 RdrCEF.exe 86 PID 224 wrote to memory of 4124 224 RdrCEF.exe 86 PID 224 wrote to memory of 4124 224 RdrCEF.exe 86 PID 224 wrote to memory of 4124 224 RdrCEF.exe 86 PID 224 wrote to memory of 4124 224 RdrCEF.exe 86 PID 224 wrote to memory of 4124 224 RdrCEF.exe 86 PID 224 wrote to memory of 4124 224 RdrCEF.exe 86 PID 224 wrote to memory of 4124 224 RdrCEF.exe 86 PID 224 wrote to memory of 4124 224 RdrCEF.exe 86 PID 224 wrote to memory of 4124 224 RdrCEF.exe 86 PID 224 wrote to memory of 4124 224 RdrCEF.exe 86 PID 224 wrote to memory of 4124 224 RdrCEF.exe 86 PID 224 wrote to memory of 4124 224 RdrCEF.exe 86 PID 224 wrote to memory of 4124 224 RdrCEF.exe 86 PID 224 wrote to memory of 4124 224 RdrCEF.exe 86 PID 224 wrote to memory of 4124 224 RdrCEF.exe 86 PID 224 wrote to memory of 4124 224 RdrCEF.exe 86 PID 224 wrote to memory of 4124 224 RdrCEF.exe 86 PID 224 wrote to memory of 4124 224 RdrCEF.exe 86 PID 224 wrote to memory of 4124 224 RdrCEF.exe 86 PID 224 wrote to memory of 4124 224 RdrCEF.exe 86 PID 224 wrote to memory of 4124 224 RdrCEF.exe 86 PID 224 wrote to memory of 4124 224 RdrCEF.exe 86 PID 224 wrote to memory of 4124 224 RdrCEF.exe 86 PID 224 wrote to memory of 4124 224 RdrCEF.exe 86 PID 224 wrote to memory of 4124 224 RdrCEF.exe 86 PID 224 wrote to memory of 4124 224 RdrCEF.exe 86 PID 224 wrote to memory of 4124 224 RdrCEF.exe 86 PID 224 wrote to memory of 4124 224 RdrCEF.exe 86 PID 224 wrote to memory of 4124 224 RdrCEF.exe 86 PID 224 wrote to memory of 4124 224 RdrCEF.exe 86 PID 224 wrote to memory of 4124 224 RdrCEF.exe 86 PID 224 wrote to memory of 4124 224 RdrCEF.exe 86 PID 224 wrote to memory of 4124 224 RdrCEF.exe 86 PID 224 wrote to memory of 3988 224 RdrCEF.exe 87 PID 224 wrote to memory of 3988 224 RdrCEF.exe 87 PID 224 wrote to memory of 3988 224 RdrCEF.exe 87 PID 224 wrote to memory of 3988 224 RdrCEF.exe 87 PID 224 wrote to memory of 3988 224 RdrCEF.exe 87 PID 224 wrote to memory of 3988 224 RdrCEF.exe 87 PID 224 wrote to memory of 3988 224 RdrCEF.exe 87 PID 224 wrote to memory of 3988 224 RdrCEF.exe 87 PID 224 wrote to memory of 3988 224 RdrCEF.exe 87 PID 224 wrote to memory of 3988 224 RdrCEF.exe 87 PID 224 wrote to memory of 3988 224 RdrCEF.exe 87 PID 224 wrote to memory of 3988 224 RdrCEF.exe 87 PID 224 wrote to memory of 3988 224 RdrCEF.exe 87 PID 224 wrote to memory of 3988 224 RdrCEF.exe 87 PID 224 wrote to memory of 3988 224 RdrCEF.exe 87 PID 224 wrote to memory of 3988 224 RdrCEF.exe 87 PID 224 wrote to memory of 3988 224 RdrCEF.exe 87 PID 224 wrote to memory of 3988 224 RdrCEF.exe 87 PID 224 wrote to memory of 3988 224 RdrCEF.exe 87 PID 224 wrote to memory of 3988 224 RdrCEF.exe 87
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\BRUH WTF\SeroXen Documentation and TOS.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- Suspicious use of WriteProcessMemory
PID:224 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=304E3EB88DC37E781D268754B577D7D8 --mojo-platform-channel-handle=1740 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:4124
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=7D8AA94C32723E71B42C24152D2D23A0 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=7D8AA94C32723E71B42C24152D2D23A0 --renderer-client-id=2 --mojo-platform-channel-handle=1748 --allow-no-sandbox-job /prefetch:13⤵PID:3988
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=CF3EB29A2CBFB7AB56D6CA726F29958B --mojo-platform-channel-handle=2328 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:1620
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=3BE58BFBA02203DD160BFD5C24632F0C --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=3BE58BFBA02203DD160BFD5C24632F0C --renderer-client-id=5 --mojo-platform-channel-handle=2320 --allow-no-sandbox-job /prefetch:13⤵PID:2884
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=BC324CA9F4C60932459E6636F7D8E0C6 --mojo-platform-channel-handle=2656 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:3532
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1716
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory=Default1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4796 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd29c146f8,0x7ffd29c14708,0x7ffd29c147182⤵PID:4476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,6317408838388253455,13578860768710990540,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:22⤵PID:3728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,6317408838388253455,13578860768710990540,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2176 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,6317408838388253455,13578860768710990540,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2876 /prefetch:82⤵PID:1144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,6317408838388253455,13578860768710990540,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:12⤵PID:4440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,6317408838388253455,13578860768710990540,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3388 /prefetch:12⤵PID:4576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,6317408838388253455,13578860768710990540,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4176 /prefetch:12⤵PID:2688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,6317408838388253455,13578860768710990540,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4216 /prefetch:12⤵PID:3548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,6317408838388253455,13578860768710990540,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3388 /prefetch:82⤵PID:848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,6317408838388253455,13578860768710990540,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3388 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,6317408838388253455,13578860768710990540,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5268 /prefetch:12⤵PID:4168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,6317408838388253455,13578860768710990540,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5236 /prefetch:12⤵PID:3944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,6317408838388253455,13578860768710990540,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4152 /prefetch:12⤵PID:3908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,6317408838388253455,13578860768710990540,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4000 /prefetch:12⤵PID:3948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,6317408838388253455,13578860768710990540,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5428 /prefetch:12⤵PID:4156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,6317408838388253455,13578860768710990540,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5372 /prefetch:12⤵PID:3964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,6317408838388253455,13578860768710990540,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4676 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1608
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5b28ef7d9f6d74f055cc49876767c886c
SHA1d6b3267f36c340979f8fc3e012fdd02c468740bf
SHA256fa6804456884789f4bdf9c3f5a4a8f29e0ededde149c4384072f3d8cc85bcc37
SHA512491f893c8f765e5d629bce8dd5067cef4e2ebc558d43bfb05e358bca43e1a66ee1285519bc266fd0ff5b5e09769a56077b62ac55fa8797c1edf6205843356e75
-
Filesize
152B
MD5584971c8ba88c824fd51a05dddb45a98
SHA1b7c9489b4427652a9cdd754d1c1b6ac4034be421
SHA256e2d8de6c2323bbb3863ec50843d9b58a22e911fd626d31430658b9ea942cd307
SHA5125dbf1a4631a04d1149d8fab2b8e0e43ccd97b7212de43b961b9128a8bf03329164fdeb480154a8ffea5835f28417a7d2b115b8bf8d578d00b13c3682aa5ca726
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize264B
MD5f70723954553bbeb7053bbda95320f98
SHA14609403bcee64596cf02d90f3d72c56a0a11ce93
SHA25612d157b00bbec585e1f3567fd44edf967e5c5546ae79fc08dc9ac7456ad42085
SHA51290dde07b80f79f46e1ad926643dc4023e74de50b5ffdaa54b7460db7d2f32137b1bb281478f374f8440363ecedd6d8ec8e959b6636e41be6874643b4fae24373
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize288B
MD56e49e34f2b82cc89d3edc0be7192d9b0
SHA1185c7c2e0e6f9f841fc5a65cee52c22c32d966fd
SHA256e0cf4d48a7c47a152ad86bd361c6debe1ab0636622db2664fcf2447a58c2923e
SHA512a23b0bcac8eb1f8709cc852155b1ce375782fec55bfa00c6c7334a46f18cf1e819c847d26ec8f2ebe7dcbef77045f41f767e07391fa35c301e2fb04fb5f14926
-
Filesize
1KB
MD521e1b86551e001f557094b72d2555bc2
SHA18387a21807d06a94201c383418b74f7f8a017f60
SHA256e4d0c00f77502aa3e7dcbc11c84f851618edff95524284ed344ee69746bc01ac
SHA5123912ec43eaf9dcb9575318e9d24fc6dbad3a171b13db5a5f9b58feb836993b068dc663f29bdc42e4b3038b606570c0501b6666093e7bb0ad16de0009edd5c809
-
Filesize
6KB
MD581df4019449fc8f46658934b5595a926
SHA19443c49969a12f7cf3483abf88f257682471e814
SHA2567032e3dfc49715e3ca9c4e7f487ddc77c32cf0925e245b434981c306f3b519d0
SHA512d72c6cbd4112f47e65e1d1980f1c19442a0092b6c9865ce29d6b5d9a7b54586314f80569ed91ffe71a96ee6847cbf6e43e6e1925537f808a2c83ea76126faa7b
-
Filesize
6KB
MD5888f87293d6dc7c1bd2b32250ea55a46
SHA1632a8f7278e3bd2065f3d54b5e464bd6174a57b9
SHA25692899f446a0faabb027aade46300268478995f85cacb978195f204fadc403866
SHA512914ccab22a55ef773ba9f8b1febfe696e23dec4b7441e4db247006eacd72b86f6c3460625aa766da150aba594e2287139fd5161ac65746e1905f76ecb7a4a3f1
-
Filesize
6KB
MD5d634b674137815d0677e3614aabb64cd
SHA1e42545278a2acb70429143b58536aef209fcdcd2
SHA25675acdc492eb9f771a6fc4e1e93d4e6cda460f703f8b0ccb7b1d38deb32a2a777
SHA5122c1ad855a0e417f89bf7b2e812057b54bf1d95b65b76f569c70653a90781c57f4e4cef0430b88033aba2ced322e611dafd4217fa974e241c511582c9892de578
-
Filesize
1KB
MD53fd5f21ad469d983496f1fec2a80b730
SHA101dac6bd36759806b1c4b030db410509fb7e9fb9
SHA256c54f9fbaeda117cc07208727747db030b68bb303b31d162c9b118d1eaf534671
SHA512393bb347e3f283aa72d679c8cbba3cd5c284a1c58c6f5b7d2b2a8c83294e2c78b7eaa6d526859a74db83653026d79ad37892718ec5623b86934185c57804a9e2
-
Filesize
1KB
MD52b9c3355ace06b2d82e79544eb45516a
SHA1540f2a5b04aa30cce0cbdbb895266d19d74eea38
SHA256347f8870895e5f4b93f8e3fb1fb500d7732dc5f5fd1789cb0fc6d517922acd60
SHA512f46222125fffb2bea67fede144d85bbebc3830f411348bdfd9122d8f31ca36e9c3346167b5d27445ab4ce532fe6ce30b5b170215ebdb070b6adafc136a1b37a1
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5da833a3c2d4ccfe668b34a35167eacfd
SHA1833a3a4e4018e3d0624838200d7f8bceac16607a
SHA256a405c3e3ef4dcbc41caad8bfd40da2027da61cb7650b6ca11d69279afe9744bb
SHA5121af4ec9fca9f182592f048136b246af86a3e2d4db8f6cbd9312314f0da6d0b5489a27217f59b57d75a7cddf2f6708b9b1892d3537d636d7e23d574cea0a089f4