Analysis

  • max time kernel
    209s
  • max time network
    210s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241023-en
  • resource tags

    arch:x64arch:x86image:win11-20241023-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    04-01-2025 21:13

General

  • Target

    a.html

  • Size

    1KB

  • MD5

    177aba1e5662a7962dd89c81d9544308

  • SHA1

    685f8e7bf4b0849ea0546d1616bd351a47e3b31a

  • SHA256

    99db4a991bf7ea42e196b4c3f7374e132c07a7f46cf5ae2917559f5e36ee8cc6

  • SHA512

    35b9a0e8ec9570f844e959fdbd802b2c370006514fd245a25951b865b8627a41963d608242cdce6e20edd633f7b1982e16bf508c7f4b61a481f1a98162b5a2ac

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

ROBLOX EXECUTOR

C2

192.168.50.1:4782

10.0.0.113:4782

LETSQOOO-62766.portmap.host:62766

89.10.178.51:4782

Mutex

90faf922-159d-4166-b661-4ba16af8650e

Attributes
  • encryption_key

    FFEE70B90F5EBED6085600C989F1D6D56E2DEC26

  • install_name

    windows 3543.exe

  • log_directory

    roblox executor

  • reconnect_delay

    3000

  • startup_key

    windows background updater

  • subdirectory

    windows updater

Signatures

  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar family
  • Quasar payload 2 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 6 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 1 IoCs
  • Subvert Trust Controls: Mark-of-the-Web Bypass 1 TTPs 1 IoCs

    When files are downloaded from the Internet, they are tagged with a hidden NTFS Alternate Data Stream (ADS) named Zone.Identifier with a specific value known as the MOTW.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies registry class 58 IoCs
  • NTFS ADS 2 IoCs
  • Runs ping.exe 1 TTPs 2 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 4 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 36 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 12 IoCs
  • Suspicious use of SetWindowsHookEx 34 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\a.html
    1⤵
    • Enumerates system info in registry
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3144
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff846df3cb8,0x7ff846df3cc8,0x7ff846df3cd8
      2⤵
        PID:1868
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1912,1069479955248891806,16131867924077937831,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1920 /prefetch:2
        2⤵
          PID:4548
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1912,1069479955248891806,16131867924077937831,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2360 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:1352
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1912,1069479955248891806,16131867924077937831,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2636 /prefetch:8
          2⤵
            PID:5064
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,1069479955248891806,16131867924077937831,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3112 /prefetch:1
            2⤵
              PID:2948
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,1069479955248891806,16131867924077937831,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3136 /prefetch:1
              2⤵
                PID:3116
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1912,1069479955248891806,16131867924077937831,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4016 /prefetch:8
                2⤵
                • Suspicious behavior: EnumeratesProcesses
                PID:4268
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,1069479955248891806,16131867924077937831,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1856 /prefetch:1
                2⤵
                  PID:3496
                • C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1912,1069479955248891806,16131867924077937831,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5140 /prefetch:8
                  2⤵
                  • Suspicious behavior: EnumeratesProcesses
                  PID:2616
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,1069479955248891806,16131867924077937831,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5124 /prefetch:1
                  2⤵
                    PID:748
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,1069479955248891806,16131867924077937831,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3912 /prefetch:1
                    2⤵
                      PID:5048
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,1069479955248891806,16131867924077937831,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1968 /prefetch:1
                      2⤵
                        PID:3172
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,1069479955248891806,16131867924077937831,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4180 /prefetch:1
                        2⤵
                          PID:1496
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,1069479955248891806,16131867924077937831,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5180 /prefetch:1
                          2⤵
                            PID:1648
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1912,1069479955248891806,16131867924077937831,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5820 /prefetch:8
                            2⤵
                              PID:3856
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1912,1069479955248891806,16131867924077937831,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4092 /prefetch:8
                              2⤵
                              • Subvert Trust Controls: Mark-of-the-Web Bypass
                              • NTFS ADS
                              • Suspicious behavior: EnumeratesProcesses
                              PID:1508
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,1069479955248891806,16131867924077937831,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6540 /prefetch:1
                              2⤵
                                PID:1408
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1912,1069479955248891806,16131867924077937831,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5308 /prefetch:8
                                2⤵
                                • NTFS ADS
                                • Suspicious behavior: EnumeratesProcesses
                                PID:3832
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1912,1069479955248891806,16131867924077937831,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=6232 /prefetch:2
                                2⤵
                                • Suspicious behavior: EnumeratesProcesses
                                PID:224
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,1069479955248891806,16131867924077937831,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3612 /prefetch:1
                                2⤵
                                  PID:2436
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,1069479955248891806,16131867924077937831,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6764 /prefetch:1
                                  2⤵
                                    PID:2288
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,1069479955248891806,16131867924077937831,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4652 /prefetch:1
                                    2⤵
                                      PID:3328
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,1069479955248891806,16131867924077937831,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6788 /prefetch:1
                                      2⤵
                                        PID:4052
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,1069479955248891806,16131867924077937831,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5628 /prefetch:1
                                        2⤵
                                          PID:1120
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,1069479955248891806,16131867924077937831,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1652 /prefetch:1
                                          2⤵
                                            PID:860
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,1069479955248891806,16131867924077937831,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7052 /prefetch:1
                                            2⤵
                                              PID:4344
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,1069479955248891806,16131867924077937831,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=29 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6808 /prefetch:1
                                              2⤵
                                                PID:2612
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,1069479955248891806,16131867924077937831,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=30 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6836 /prefetch:1
                                                2⤵
                                                  PID:4864
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,1069479955248891806,16131867924077937831,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=31 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6124 /prefetch:1
                                                  2⤵
                                                    PID:200
                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,1069479955248891806,16131867924077937831,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=32 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2512 /prefetch:1
                                                    2⤵
                                                      PID:4208
                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,1069479955248891806,16131867924077937831,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=33 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3704 /prefetch:1
                                                      2⤵
                                                        PID:4484
                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,1069479955248891806,16131867924077937831,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=34 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7024 /prefetch:1
                                                        2⤵
                                                          PID:4072
                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,1069479955248891806,16131867924077937831,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=35 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5868 /prefetch:1
                                                          2⤵
                                                            PID:424
                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,1069479955248891806,16131867924077937831,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=36 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6740 /prefetch:1
                                                            2⤵
                                                              PID:4276
                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,1069479955248891806,16131867924077937831,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=37 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6900 /prefetch:1
                                                              2⤵
                                                                PID:1532
                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,1069479955248891806,16131867924077937831,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=38 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5996 /prefetch:1
                                                                2⤵
                                                                  PID:2840
                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,1069479955248891806,16131867924077937831,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=39 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5924 /prefetch:1
                                                                  2⤵
                                                                    PID:2940
                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,1069479955248891806,16131867924077937831,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=40 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4088 /prefetch:1
                                                                    2⤵
                                                                      PID:2400
                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,1069479955248891806,16131867924077937831,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=41 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4828 /prefetch:1
                                                                      2⤵
                                                                        PID:2744
                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,1069479955248891806,16131867924077937831,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=42 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7008 /prefetch:1
                                                                        2⤵
                                                                          PID:4760
                                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,1069479955248891806,16131867924077937831,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=43 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6868 /prefetch:1
                                                                          2⤵
                                                                            PID:2412
                                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,1069479955248891806,16131867924077937831,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=44 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5984 /prefetch:1
                                                                            2⤵
                                                                              PID:4224
                                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,1069479955248891806,16131867924077937831,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=46 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5156 /prefetch:1
                                                                              2⤵
                                                                                PID:4828
                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,1069479955248891806,16131867924077937831,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=47 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7520 /prefetch:1
                                                                                2⤵
                                                                                  PID:1380
                                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=1912,1069479955248891806,16131867924077937831,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=7764 /prefetch:8
                                                                                  2⤵
                                                                                    PID:4656
                                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,1069479955248891806,16131867924077937831,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=49 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6720 /prefetch:1
                                                                                    2⤵
                                                                                      PID:2376
                                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,1069479955248891806,16131867924077937831,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=50 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7460 /prefetch:1
                                                                                      2⤵
                                                                                        PID:5016
                                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=1912,1069479955248891806,16131867924077937831,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5688 /prefetch:8
                                                                                        2⤵
                                                                                          PID:2428
                                                                                      • C:\Windows\System32\CompPkgSrv.exe
                                                                                        C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                                        1⤵
                                                                                          PID:2480
                                                                                        • C:\Windows\System32\CompPkgSrv.exe
                                                                                          C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                                          1⤵
                                                                                            PID:380
                                                                                          • C:\Windows\System32\rundll32.exe
                                                                                            C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                                                                            1⤵
                                                                                              PID:3340
                                                                                            • C:\Users\Admin\Downloads\JJSPLOIT.V2.exe
                                                                                              "C:\Users\Admin\Downloads\JJSPLOIT.V2.exe"
                                                                                              1⤵
                                                                                              • Executes dropped EXE
                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                              PID:2220
                                                                                            • C:\Users\Admin\Downloads\JJSPLOIT.V2.exe
                                                                                              "C:\Users\Admin\Downloads\JJSPLOIT.V2.exe"
                                                                                              1⤵
                                                                                              • Executes dropped EXE
                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                              PID:1348
                                                                                            • C:\Users\Admin\Downloads\JJSPLOIT.V2.exe
                                                                                              "C:\Users\Admin\Downloads\JJSPLOIT.V2.exe"
                                                                                              1⤵
                                                                                              • Executes dropped EXE
                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                              PID:2324
                                                                                            • C:\Users\Admin\Downloads\JJsploit-2.1.0\JJsploit-2.1.0\JJSPLOIT.V2.exe
                                                                                              "C:\Users\Admin\Downloads\JJsploit-2.1.0\JJsploit-2.1.0\JJSPLOIT.V2.exe"
                                                                                              1⤵
                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                              PID:3504
                                                                                              • C:\Windows\SYSTEM32\schtasks.exe
                                                                                                "schtasks" /create /tn "windows background updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\windows updater\windows 3543.exe" /rl HIGHEST /f
                                                                                                2⤵
                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                PID:5052
                                                                                              • C:\Users\Admin\AppData\Roaming\windows updater\windows 3543.exe
                                                                                                "C:\Users\Admin\AppData\Roaming\windows updater\windows 3543.exe"
                                                                                                2⤵
                                                                                                • Executes dropped EXE
                                                                                                PID:4504
                                                                                                • C:\Windows\SYSTEM32\schtasks.exe
                                                                                                  "schtasks" /create /tn "windows background updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\windows updater\windows 3543.exe" /rl HIGHEST /f
                                                                                                  3⤵
                                                                                                  • Scheduled Task/Job: Scheduled Task
                                                                                                  PID:244
                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                  C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\3lhcv5Yx0m0C.bat" "
                                                                                                  3⤵
                                                                                                    PID:1900
                                                                                                    • C:\Windows\system32\chcp.com
                                                                                                      chcp 65001
                                                                                                      4⤵
                                                                                                        PID:3088
                                                                                                      • C:\Windows\system32\PING.EXE
                                                                                                        ping -n 10 localhost
                                                                                                        4⤵
                                                                                                        • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                        • Runs ping.exe
                                                                                                        PID:3048
                                                                                                      • C:\Users\Admin\AppData\Roaming\windows updater\windows 3543.exe
                                                                                                        "C:\Users\Admin\AppData\Roaming\windows updater\windows 3543.exe"
                                                                                                        4⤵
                                                                                                        • Executes dropped EXE
                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                        • Suspicious use of SetWindowsHookEx
                                                                                                        PID:3368
                                                                                                        • C:\Windows\SYSTEM32\schtasks.exe
                                                                                                          "schtasks" /create /tn "windows background updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\windows updater\windows 3543.exe" /rl HIGHEST /f
                                                                                                          5⤵
                                                                                                          • Scheduled Task/Job: Scheduled Task
                                                                                                          PID:1420
                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                          C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\dmIXD6z6Aqtg.bat" "
                                                                                                          5⤵
                                                                                                            PID:4916
                                                                                                            • C:\Windows\system32\chcp.com
                                                                                                              chcp 65001
                                                                                                              6⤵
                                                                                                                PID:5076
                                                                                                              • C:\Windows\system32\PING.EXE
                                                                                                                ping -n 10 localhost
                                                                                                                6⤵
                                                                                                                • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                • Runs ping.exe
                                                                                                                PID:1140
                                                                                                              • C:\Users\Admin\AppData\Roaming\windows updater\windows 3543.exe
                                                                                                                "C:\Users\Admin\AppData\Roaming\windows updater\windows 3543.exe"
                                                                                                                6⤵
                                                                                                                • Executes dropped EXE
                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                • Suspicious use of SetWindowsHookEx
                                                                                                                PID:1728
                                                                                                                • C:\Windows\SYSTEM32\schtasks.exe
                                                                                                                  "schtasks" /create /tn "windows background updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\windows updater\windows 3543.exe" /rl HIGHEST /f
                                                                                                                  7⤵
                                                                                                                  • Scheduled Task/Job: Scheduled Task
                                                                                                                  PID:3812
                                                                                                    • C:\Windows\system32\OpenWith.exe
                                                                                                      C:\Windows\system32\OpenWith.exe -Embedding
                                                                                                      1⤵
                                                                                                      • Modifies registry class
                                                                                                      • Suspicious use of SetWindowsHookEx
                                                                                                      PID:2896
                                                                                                    • C:\Windows\system32\OpenWith.exe
                                                                                                      C:\Windows\system32\OpenWith.exe -Embedding
                                                                                                      1⤵
                                                                                                      • Modifies registry class
                                                                                                      • Suspicious behavior: GetForegroundWindowSpam
                                                                                                      • Suspicious use of SetWindowsHookEx
                                                                                                      PID:760
                                                                                                    • C:\Windows\system32\OpenWith.exe
                                                                                                      C:\Windows\system32\OpenWith.exe -Embedding
                                                                                                      1⤵
                                                                                                      • Modifies registry class
                                                                                                      • Suspicious use of SetWindowsHookEx
                                                                                                      PID:2884
                                                                                                      • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe
                                                                                                        "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\Downloads\JJsploit-2.1.0\JJsploit-2.1.0\README.md"
                                                                                                        2⤵
                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                        • Checks processor information in registry
                                                                                                        • Modifies Internet Explorer settings
                                                                                                        • Suspicious use of SetWindowsHookEx
                                                                                                        PID:4460
                                                                                                        • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                                                                                                          "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=16514043
                                                                                                          3⤵
                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                          PID:4448
                                                                                                          • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                                                                                                            "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=6BAD1054A547EB3FA6418BCE32AEE850 --mojo-platform-channel-handle=1768 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:2
                                                                                                            4⤵
                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                            PID:2016
                                                                                                          • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                                                                                                            "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=56F63FCA77B30E16DD5D79507532B23F --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=56F63FCA77B30E16DD5D79507532B23F --renderer-client-id=2 --mojo-platform-channel-handle=1776 --allow-no-sandbox-job /prefetch:1
                                                                                                            4⤵
                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                            PID:836
                                                                                                          • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                                                                                                            "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=41D57C8215C4E8B115E943F52A6716D6 --mojo-platform-channel-handle=2340 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:2
                                                                                                            4⤵
                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                            PID:1928
                                                                                                          • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                                                                                                            "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=37F8E02EEE4D5CA2D97CF17B5DAAE6C6 --mojo-platform-channel-handle=1984 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:2
                                                                                                            4⤵
                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                            PID:752
                                                                                                          • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                                                                                                            "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=8D7E4F333D504835E1D913974A180A5F --mojo-platform-channel-handle=2392 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:2
                                                                                                            4⤵
                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                            PID:720
                                                                                                    • C:\Windows\System32\CompPkgSrv.exe
                                                                                                      C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                                                      1⤵
                                                                                                        PID:3932
                                                                                                      • C:\Users\Admin\Downloads\JJsploit-2.1.0\JJsploit-2.1.0\JJSPLOIT.V2.exe
                                                                                                        "C:\Users\Admin\Downloads\JJsploit-2.1.0\JJsploit-2.1.0\JJSPLOIT.V2.exe"
                                                                                                        1⤵
                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                        PID:2564
                                                                                                      • C:\Users\Admin\Downloads\JJsploit-2.1.0\JJsploit-2.1.0\JJSPLOIT.V2.exe
                                                                                                        "C:\Users\Admin\Downloads\JJsploit-2.1.0\JJsploit-2.1.0\JJSPLOIT.V2.exe"
                                                                                                        1⤵
                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                        PID:2940
                                                                                                      • C:\Windows\system32\AUDIODG.EXE
                                                                                                        C:\Windows\system32\AUDIODG.EXE 0x00000000000004D4 0x00000000000004BC
                                                                                                        1⤵
                                                                                                          PID:1992

                                                                                                        Network

                                                                                                        MITRE ATT&CK Enterprise v15

                                                                                                        Replay Monitor

                                                                                                        Loading Replay Monitor...

                                                                                                        Downloads

                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\JJSPLOIT.V2.exe.log

                                                                                                          Filesize

                                                                                                          1KB

                                                                                                          MD5

                                                                                                          b4e91d2e5f40d5e2586a86cf3bb4df24

                                                                                                          SHA1

                                                                                                          31920b3a41aa4400d4a0230a7622848789b38672

                                                                                                          SHA256

                                                                                                          5d8af3c7519874ed42a0d74ee559ae30d9cc6930aef213079347e2b47092c210

                                                                                                          SHA512

                                                                                                          968751b79a98961f145de48d425ea820fd1875bae79a725adf35fc8f4706c103ee0c7babd4838166d8a0dda9fbce3728c0265a04c4b37f335ec4eaa110a2b319

                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                          Filesize

                                                                                                          152B

                                                                                                          MD5

                                                                                                          5431d6602455a6db6e087223dd47f600

                                                                                                          SHA1

                                                                                                          27255756dfecd4e0afe4f1185e7708a3d07dea6e

                                                                                                          SHA256

                                                                                                          7502d9453168c86631fb40ec90567bf80404615d387afc7ec2beb7a075bcc763

                                                                                                          SHA512

                                                                                                          868f6dcf32ef80459f3ea122b0d2c79191193b5885c86934a97bfec7e64250e10c23e4d00f34c6c2387a04a15f3f266af96e571bbe37077fb374d6d30f35b829

                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                          Filesize

                                                                                                          152B

                                                                                                          MD5

                                                                                                          7bed1eca5620a49f52232fd55246d09a

                                                                                                          SHA1

                                                                                                          e429d9d401099a1917a6fb31ab2cf65fcee22030

                                                                                                          SHA256

                                                                                                          49c484f08c5e22ee6bec6d23681b26b0426ee37b54020f823a2908ab7d0d805e

                                                                                                          SHA512

                                                                                                          afc8f0b5b95d593f863ad32186d1af4ca333710bcfba86416800e79528616e7b15f8813a20c2cfa9d13688c151bf8c85db454a9eb5c956d6e49db84b4b222ee8

                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000012

                                                                                                          Filesize

                                                                                                          62KB

                                                                                                          MD5

                                                                                                          c813a1b87f1651d642cdcad5fca7a7d8

                                                                                                          SHA1

                                                                                                          0e6628997674a7dfbeb321b59a6e829d0c2f4478

                                                                                                          SHA256

                                                                                                          df670e09f278fea1d0684afdcd0392a83d7041585ba5996f7b527974d7d98ec3

                                                                                                          SHA512

                                                                                                          af0d024ba1faafbd6f950c67977ed126827180a47cea9758ee51a95d13436f753eb5a7aa12a9090048a70328f6e779634c612aebde89b06740ffd770751e1c5b

                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000013

                                                                                                          Filesize

                                                                                                          67KB

                                                                                                          MD5

                                                                                                          69df804d05f8b29a88278b7d582dd279

                                                                                                          SHA1

                                                                                                          d9560905612cf656d5dd0e741172fb4cd9c60688

                                                                                                          SHA256

                                                                                                          b885987a52236f56ce7a5ca18b18533e64f62ab64eb14050ede93c93b5bd5608

                                                                                                          SHA512

                                                                                                          0ef49eeeeb463da832f7d5b11f6418baa65963de62c00e71d847183e0035be03e63c097103d30329582fe806d246e3c0e3ecab8b2498799abbb21d8b7febdc0e

                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000015

                                                                                                          Filesize

                                                                                                          63KB

                                                                                                          MD5

                                                                                                          226541550a51911c375216f718493f65

                                                                                                          SHA1

                                                                                                          f6e608468401f9384cabdef45ca19e2afacc84bd

                                                                                                          SHA256

                                                                                                          caecff4179910ce0ff470f9fa9eb4349e8fb717fa1432cf19987450a4e1ef4a5

                                                                                                          SHA512

                                                                                                          2947b309f15e0e321beb9506861883fde8391c6f6140178c7e6ee7750d6418266360c335477cae0b067a6a6d86935ec5f7acdfdacc9edffa8b04ec71be210516

                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000016

                                                                                                          Filesize

                                                                                                          19KB

                                                                                                          MD5

                                                                                                          1bd4ae71ef8e69ad4b5ffd8dc7d2dcb5

                                                                                                          SHA1

                                                                                                          6dd8803e59949c985d6a9df2f26c833041a5178c

                                                                                                          SHA256

                                                                                                          af18b3681e8e2a1e8dc34c2aa60530dc8d8a9258c4d562cbe20c898d5de98725

                                                                                                          SHA512

                                                                                                          b3ff083b669aca75549396250e05344ba2f1c021468589f2bd6f1b977b7f11df00f958bbbd22f07708b5d30d0260f39d8de57e75382b3ab8e78a2c41ef428863

                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000027

                                                                                                          Filesize

                                                                                                          67KB

                                                                                                          MD5

                                                                                                          bcfda9afc202574572f0247968812014

                                                                                                          SHA1

                                                                                                          80f8af2d5d2f978a3969a56256aace20e893fb3f

                                                                                                          SHA256

                                                                                                          7c970cd163690addf4a69faf5aea65e7f083ca549f75a66d04a73cb793a00f91

                                                                                                          SHA512

                                                                                                          508ca6011abb2ec4345c3b80bd89979151fee0a0de851f69b7aa06e69c89f6d8c3b6144f2f4715112c896c5b8a3e3e9cd49b05c9b507602d7f0d6b10061b17bd

                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                                                          Filesize

                                                                                                          1KB

                                                                                                          MD5

                                                                                                          10717e864497edd81949b490019b4a9f

                                                                                                          SHA1

                                                                                                          afd39871ed65f40a82d74ef29d75340d9cea7123

                                                                                                          SHA256

                                                                                                          cbd29288d8bdbff930a64a86005400082837ad8695bfeac17fcd6bd7b546e587

                                                                                                          SHA512

                                                                                                          1c8129db2629678fa614998f59552238fe4409c4c1510dfe1d80730742d0f916df9ad8b3c183513ab36c9c6c75d9ec863fee892166165cd8667dc63241bc43d1

                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                                                          Filesize

                                                                                                          3KB

                                                                                                          MD5

                                                                                                          09d5e8f57dcbf866e6fd4011b0f62941

                                                                                                          SHA1

                                                                                                          8d638b9ff8599f327d38ee0a6e71c0e15fba8383

                                                                                                          SHA256

                                                                                                          00ac93989c5fc74c043635da27d70cd36f0dffb87b2ba5525f358d01ea55b45f

                                                                                                          SHA512

                                                                                                          cfae098d6cf452b7f4ecb2834530c3538fa7f4751276293f41ea8ab851790acd746a0d9d80a1fd8ffc9376d34ac364eda55af68bd987cba36b6dacef39c54dbf

                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                                                          Filesize

                                                                                                          496B

                                                                                                          MD5

                                                                                                          30322550d9f9c54f345ea1c71f3b2e8f

                                                                                                          SHA1

                                                                                                          b5a3cff2995147279c2bbed7c03b2280ecb286e5

                                                                                                          SHA256

                                                                                                          4e7798d8476361378f8fbfb0442db63c7f6bf7e1830d50808bfdb8a58700d8f9

                                                                                                          SHA512

                                                                                                          261d1f5bc9c8a369f815eb846c252f54681f70862153bd49959411450870207b3ee240cc9016533c27401922527d561cc1ea7bb23708e4a257f071d010cf55ef

                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                                                          Filesize

                                                                                                          573B

                                                                                                          MD5

                                                                                                          ae032e5a8d0088761a5b1131e6d7adb7

                                                                                                          SHA1

                                                                                                          d495300e297e5392d0ad7512461b3f1b6f8f367e

                                                                                                          SHA256

                                                                                                          578b48d86653d004d76e5f3f0e3ca52ad7e39b3ce2ad9a4b069a3a55083b0b4d

                                                                                                          SHA512

                                                                                                          a3acb9599dc64d93e17dffdf65e8df2f3c4a6e349645cfe054de79a60ba9f8876d5fa88715f733529c21c803db429270a024375bf10d50bd38356e516febfe12

                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                                                          Filesize

                                                                                                          573B

                                                                                                          MD5

                                                                                                          68255df6947e1f33d971450f4e9a82b9

                                                                                                          SHA1

                                                                                                          19b4b832043ab2f62fa67462c558de257c004a51

                                                                                                          SHA256

                                                                                                          fbd3174171715d68ed17fad0114979ccaa795697f22b7ce84f9dc6296620d4e5

                                                                                                          SHA512

                                                                                                          eb7a1989ddf8286d1b3ec6d12aab7e9729c1e5d0e92c049f30379cb5c38f41799d3cdcd90de006d521ae84de71360884b13f330bd6902ee7d2f9e0a3a8bf307b

                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                                                          Filesize

                                                                                                          5KB

                                                                                                          MD5

                                                                                                          7b9be63f73f245650d2498a556c1df29

                                                                                                          SHA1

                                                                                                          db693ef5d311f3b1322636e20ac5fe4bdf3113de

                                                                                                          SHA256

                                                                                                          498bbeb55f05f09873ca55fe539f1d4ff452bb46f6d71787e11feb622c124fae

                                                                                                          SHA512

                                                                                                          4e3363120f77d8b494c24c42bfeb04f20fd60b5587672df18842c33ee03d5bdca4915eb81afc07917da5a2ba150162351f0912ca6509798357f9d162c21868fd

                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                          Filesize

                                                                                                          8KB

                                                                                                          MD5

                                                                                                          4da6957413541f1fa2e03c00c70a456e

                                                                                                          SHA1

                                                                                                          f2a429fd9c3917dbc5fdc41fbca5d3f1a2e4ad3a

                                                                                                          SHA256

                                                                                                          c808269821e655ca253a506a460874d27327dc850d4f6a4b03684e7f59e362b5

                                                                                                          SHA512

                                                                                                          70dbe3f00b2ae86cfa3bce78b3cf0751a1262fd7b29b5bd73b9c351f2251a1046f3b025c203bacc7b9d860df60a5ad497fe7bf16bbcfe0e7ea01563c2b8c5592

                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                          Filesize

                                                                                                          5KB

                                                                                                          MD5

                                                                                                          760890bac3a7e449ef2ee004179290ae

                                                                                                          SHA1

                                                                                                          d9cdb57961e01c0b1676fe99c6c613a5dde7d559

                                                                                                          SHA256

                                                                                                          cfe52e0d683d2b512e3bc79e7fa2b204203e2a714d5794ed904231e45e1d2821

                                                                                                          SHA512

                                                                                                          1afc7bdec9f2fa31d1f9e3cad4439870afd092d5416c87d9ca25bad9fc8af188062d2fee91c94df8204f7d16ba5ba4133c18f1f8efa31b8b8e04fd74d8110264

                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                          Filesize

                                                                                                          6KB

                                                                                                          MD5

                                                                                                          8af3e27de9389ebfbf5007ce9234fc9e

                                                                                                          SHA1

                                                                                                          c8053cbc0623279d58466191a0f9d18a633bf021

                                                                                                          SHA256

                                                                                                          ec24d4285a4e2c2db17f3d54370d9884a1a7c29989a39a0982f14e6bb8770562

                                                                                                          SHA512

                                                                                                          98c78524c0bf1f3a3bbf7bccd2b255e3356217c29962f18df3fd7452971f7070e0e1d3f9167574c7811b39dbc754b02eafe8b7f2038aba1123d904286f959207

                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                          Filesize

                                                                                                          6KB

                                                                                                          MD5

                                                                                                          e844cd1446f263fc86d71bab6020f469

                                                                                                          SHA1

                                                                                                          97904d10a610f2daacd8fb69a9576d42f91daeeb

                                                                                                          SHA256

                                                                                                          72d9ee45b8c9a53f7744ef248a4ac8446100d0507833dae88fedda157ffb7295

                                                                                                          SHA512

                                                                                                          099b7befd6b3bfb5904bc97e5f6c4f7ee27765394bcc5239262fd8bfd5d0d27282b0168a29bd875fd432eafc77528ef16540a5cf2a8a62ab1a87f71a93505abd

                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                          Filesize

                                                                                                          5KB

                                                                                                          MD5

                                                                                                          871a764b3c005a19c8f4343e8131720b

                                                                                                          SHA1

                                                                                                          08fe682b116afb4eac21ce857834f1df4feca0fa

                                                                                                          SHA256

                                                                                                          a7cdacaa0826f63e1b0feed15301b12b052b8ae54da1ca50a8536a031fbf8c4b

                                                                                                          SHA512

                                                                                                          d7b6779082e14ca34f36cb1fc889b72061f84e2cdee041b2c6c5aa695d52dd238b93cf802a9f7291adc87b3ecad0e51a778da0b6e0489a1b9fbd1e4d393b1d2d

                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                          Filesize

                                                                                                          6KB

                                                                                                          MD5

                                                                                                          daa6c1ffab5b2914376a43e819b70404

                                                                                                          SHA1

                                                                                                          e717dfd6ca9e1776513233dc186599e09ddd6941

                                                                                                          SHA256

                                                                                                          1ea879bd8641d6d4c3c4e42414801323521ee86e579370d59447b5759a5659a4

                                                                                                          SHA512

                                                                                                          ef619d5bb7897815511325d1d8379d38c5272562ee496b256d4cb17aad1863ec714f380515be061dcfcb302633f708ca398465c3a0fe7115568f3a6538ab6f85

                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                          Filesize

                                                                                                          9KB

                                                                                                          MD5

                                                                                                          90ecd189468f4eeab33cdcefb766397f

                                                                                                          SHA1

                                                                                                          ab84375c865eeac52c3840880fbf32ada4f5ff28

                                                                                                          SHA256

                                                                                                          a0f4ced7f88f95aacc5a6ce632f35297044df1b74b54d68f9fb129b21c7c9c2b

                                                                                                          SHA512

                                                                                                          ba1a790e019159c6850f220455dfa2c4d2299b77a1d52cd54f7d93e272e0767efe0ff7801f665ccf26256ec8d53af64557f034d6b293866bc2e58a4da4dd46f8

                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                          Filesize

                                                                                                          9KB

                                                                                                          MD5

                                                                                                          84175a2d79d765d79d98ebcd5da61556

                                                                                                          SHA1

                                                                                                          64f614fee9767024979585b76d3d63a2e520bbb7

                                                                                                          SHA256

                                                                                                          27fbeca790f6ca01c8b2d46d7ac0d6789797c59522bb037c3f5a2d8ebe005cfe

                                                                                                          SHA512

                                                                                                          ae3c406106a25fc86cd02a98265ec5776aca5461277b2c4dfd9b8a35a75797e65ed3dcdbb68d9fbf93017b9b57693560c331a0227a85884eeb40fa0efd4c82ea

                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index

                                                                                                          Filesize

                                                                                                          72B

                                                                                                          MD5

                                                                                                          01e547ecc89485a91ea43f814b9a6c1e

                                                                                                          SHA1

                                                                                                          5d22d693441e80adb55f15772b8e5ce0c9bc4919

                                                                                                          SHA256

                                                                                                          1ee4e453d8278ab6411e449c0d50f38b2b61540f71b5275d5eec1df5167e3517

                                                                                                          SHA512

                                                                                                          26c61a086b795544c392dc8e1ad07ec1c5efd941790e5661964973a9f85962c576142f583cdbe001df417531faebe7b5e098e6dc38c1699fe14bbbff3b50a180

                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe5a76c7.TMP

                                                                                                          Filesize

                                                                                                          48B

                                                                                                          MD5

                                                                                                          d754ed453b4956bfa863a11554d29598

                                                                                                          SHA1

                                                                                                          8cf825894f3b8e84576df3f370921ea49c5a2c8f

                                                                                                          SHA256

                                                                                                          65144416d18375c0ee842ac50e8c523157458b56aaee89241ef15da0c3ef4487

                                                                                                          SHA512

                                                                                                          3cedad5aa513c7806a22b97978767e0ee75aa8fb9c8b9bc2416d06164200ed08d197654e86cffdd6156640299d4b1c9f4545bd70086626ad53367a6f7351db47

                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                          Filesize

                                                                                                          1KB

                                                                                                          MD5

                                                                                                          cb3dbeda644ce32568fa9927277a274e

                                                                                                          SHA1

                                                                                                          81c1223e7f4812061d25455e2b4b4d158c03257c

                                                                                                          SHA256

                                                                                                          cf51692119865c8398bcad772801d836785608ff68c864f78504907112652cd8

                                                                                                          SHA512

                                                                                                          0596ee9807c230cbb8a5a11ec6911aaa5767a1669d57bfa80ab7b3e982c3184b02895aebb8d52280bb6b868993836ded177fdc1401118ce4f184db8366a405a5

                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                          Filesize

                                                                                                          1KB

                                                                                                          MD5

                                                                                                          3c8d7ebbd81381c400950b29bb115bfb

                                                                                                          SHA1

                                                                                                          abf13480e706819cc483f3c761d8409875573df0

                                                                                                          SHA256

                                                                                                          b435500fd4f6aad5b8b08b0be53a29ba441b9088af8a2ddac2e99e847608680d

                                                                                                          SHA512

                                                                                                          3cd05f3d00b6dc77251c2f3f6fd9bd7d581511355ac8ca085ad30ca56c712bbdb0d07f6279eafd315bb7e0c12453e3deb37a627ba68a30ed25f21e25d3c567d1

                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                          Filesize

                                                                                                          1KB

                                                                                                          MD5

                                                                                                          6efa1bc8c649f505ca15c22098072fe2

                                                                                                          SHA1

                                                                                                          d35bcb477e15f040ba8f00dfc3f2392603bde1e8

                                                                                                          SHA256

                                                                                                          462594d6f03d4b3ba9bea95df8a265d5d82c6c77016066d1656436997794cbb7

                                                                                                          SHA512

                                                                                                          08a75d7b0e7e283886248f314c4a3965fe90aa65a9664c088ecdc5a39ea5f4fe642b024b6b69d0fb29662a5ecdb538b614c7feaff06bff3178800eef2932b239

                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                          Filesize

                                                                                                          1KB

                                                                                                          MD5

                                                                                                          2ef19344f70e121e052d4a55d0b5eab1

                                                                                                          SHA1

                                                                                                          fe2a9f6821dc9d4350d68011db837884668cbdf2

                                                                                                          SHA256

                                                                                                          af6e55a7266f5b9a0832fb62611710d523f36e680186f8714e68b287c29b16cc

                                                                                                          SHA512

                                                                                                          2e602a54011d2eed7d56d0ad89341a84f8c734b383357dd2a76863e518531110a2e7eef44fe9d226f8891f72fcadd317b1234c82834bdd4884278408fde42f1e

                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                          Filesize

                                                                                                          2KB

                                                                                                          MD5

                                                                                                          9f7d74950f2c4298edbdc85d6594f120

                                                                                                          SHA1

                                                                                                          50aca9b9c95bc978946c00c63f2b4d763afdaff9

                                                                                                          SHA256

                                                                                                          bb6ee2ab54e6015e4d6e880b492e87b3e2830fb743eb2e35fe635228ddca8e2e

                                                                                                          SHA512

                                                                                                          2354249171b104ac78f4b9f975af45c1867a5d4c4700b3ca1ef1136cc24fe656fba13b78ca9fe72fae54f360219b29963e7490669f74a384a16e5e7c4d85a734

                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                          Filesize

                                                                                                          2KB

                                                                                                          MD5

                                                                                                          0b46f284e78c612a00efcc4f2b8a4d69

                                                                                                          SHA1

                                                                                                          b942616b2b84c1c1fdda23574ea34b360cad1022

                                                                                                          SHA256

                                                                                                          ee693c27a790ed356ead572ec5d930fda4bc83282a2ce41febfe502932f1f32c

                                                                                                          SHA512

                                                                                                          2243fb188c0e4f648e44cd46508eb111a6903ff99050c2eeec2de5f2ec3100885ce098801025a14a34af4412fcbc28448110441597efbfd39cdb142a63070435

                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                          Filesize

                                                                                                          874B

                                                                                                          MD5

                                                                                                          0ea2205b1a8b377163d68d50aae3254d

                                                                                                          SHA1

                                                                                                          5cbd25a19d2218feedb684aeb1b25fbb89b8813e

                                                                                                          SHA256

                                                                                                          3a8f162ce58c7c3d65e920132f6e0811cd4bd3001f205e4622cc4de7d5547b4a

                                                                                                          SHA512

                                                                                                          1c13441af482d3cff489057ec37326ccd55082055db6996a021cf3c3d2a897a2db9ef28f6d907482a504801b29fef5f4fc1a2cb40776c6e0576248ddeb408531

                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe582c0c.TMP

                                                                                                          Filesize

                                                                                                          874B

                                                                                                          MD5

                                                                                                          2c7e0aa82678387ca8425504c70ec773

                                                                                                          SHA1

                                                                                                          a0c51d6571002fcda9003e83f46dcb5945bdd735

                                                                                                          SHA256

                                                                                                          98d56d1b64b71a4768f90798110b99cc407e5350d2831b82809a94fab210f89d

                                                                                                          SHA512

                                                                                                          5eff3576cf1b0d8a19cdf20930484653e86094c57ad53f0fabfcab4d3deaab7683463eb3a821a3a7096a6fab6d52336eb5dce5b441c8627c2f8ebddb5c430ffe

                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                                                                          Filesize

                                                                                                          16B

                                                                                                          MD5

                                                                                                          46295cac801e5d4857d09837238a6394

                                                                                                          SHA1

                                                                                                          44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                                                                                          SHA256

                                                                                                          0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                                                                                          SHA512

                                                                                                          8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                                                                          Filesize

                                                                                                          16B

                                                                                                          MD5

                                                                                                          206702161f94c5cd39fadd03f4014d98

                                                                                                          SHA1

                                                                                                          bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                                                                                                          SHA256

                                                                                                          1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                                                                                                          SHA512

                                                                                                          0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                          Filesize

                                                                                                          10KB

                                                                                                          MD5

                                                                                                          19ca1e42c9d081b1e1208e6229b7e93a

                                                                                                          SHA1

                                                                                                          2602af0a68a50dc1016781a4ed00a273accde506

                                                                                                          SHA256

                                                                                                          e6d1f1dffd94c54a4e32487b81e400c78285e5678cf0f6f39930567a749d4e06

                                                                                                          SHA512

                                                                                                          27ece1f39893008cc9dd26f733c18b1a4ba00dbbe412bdbca191ebb2fc2fff2fb6ecaddc9bd1716341b8791ff02a9695ab09f6c38a9f854534e82d01ff2cfa96

                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                          Filesize

                                                                                                          11KB

                                                                                                          MD5

                                                                                                          12cb5f23deb34baffad4dae76d47ed29

                                                                                                          SHA1

                                                                                                          ac69b52315aadd1ca76e8489c6c150d460f079eb

                                                                                                          SHA256

                                                                                                          97a1c1701c24ad304057451f7df6ad4fb0ac3e2473bc4d4f406c949d417b9458

                                                                                                          SHA512

                                                                                                          f5a0ee90d805bb31398567d8956ead77bd92a8b4aac67b6d8edd539b7f0ee61785d2cfcef53f6f3313f7180bee036c4143a1b9c114aedec30ac5d96bb7decbae

                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                          Filesize

                                                                                                          10KB

                                                                                                          MD5

                                                                                                          59aecc73954a488f7d17a61fafac876a

                                                                                                          SHA1

                                                                                                          b6e6ca6244e928889db447ace0912d30fe871e34

                                                                                                          SHA256

                                                                                                          2d8127aae9b470993aa676bd9ab8ce8be8d4bb829c51a98861708945063b0c42

                                                                                                          SHA512

                                                                                                          88c2425be751216f8aaefb7c4a9f0617ef69046132812b7b2da3d69ddc4552228f164e7cfe8350b930b6892344573387cd6d1294ecdb339e7866fb2e6e8f91d3

                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Explorer\iconcache_idx.db

                                                                                                          Filesize

                                                                                                          14KB

                                                                                                          MD5

                                                                                                          cd391b4c46b67abdb1f39b1849dfd822

                                                                                                          SHA1

                                                                                                          84fc7646687458e29d8da08a839871d47e152a15

                                                                                                          SHA256

                                                                                                          4ea0589d177407c245a2b77042af3813cd320a200e455593746da8667845015c

                                                                                                          SHA512

                                                                                                          66d7212f11e0e8f68e5f4a786cd05f553a63ce0b008dfc36156b61d08047038cc3849d774e7fb40540d77512e8efbb66ddba4a4afe7d15de75f7f459810492ce

                                                                                                        • C:\Users\Admin\AppData\Local\Temp\dmIXD6z6Aqtg.bat

                                                                                                          Filesize

                                                                                                          222B

                                                                                                          MD5

                                                                                                          0f8c09c0c5f1fa0aa80676bea152f695

                                                                                                          SHA1

                                                                                                          b863c89e56c38149c381e88189bbbb258e3df8e9

                                                                                                          SHA256

                                                                                                          062f26d0f81ea97a97625d34c0a59ce2d962d6223785ceb6b548e7f9dc604cd6

                                                                                                          SHA512

                                                                                                          fc718220dfbcbd352f3ec4bbf6b5e3c70ec2eaccb666ac6ddf8ee6a77fb3dccd979a846d0aaa3383704aae2ee44c97f730ebd949430d5ba89d61152e5b30ea40

                                                                                                        • C:\Users\Admin\Downloads\JJSPLOIT.V2.exe:Zone.Identifier

                                                                                                          Filesize

                                                                                                          26B

                                                                                                          MD5

                                                                                                          fbccf14d504b7b2dbcb5a5bda75bd93b

                                                                                                          SHA1

                                                                                                          d59fc84cdd5217c6cf74785703655f78da6b582b

                                                                                                          SHA256

                                                                                                          eacd09517ce90d34ba562171d15ac40d302f0e691b439f91be1b6406e25f5913

                                                                                                          SHA512

                                                                                                          aa1d2b1ea3c9de3ccadb319d4e3e3276a2f27dd1a5244fe72de2b6f94083dddc762480482c5c2e53f803cd9e3973ddefc68966f974e124307b5043e654443b98

                                                                                                        • C:\Users\Admin\Downloads\Unconfirmed 367374.crdownload

                                                                                                          Filesize

                                                                                                          1.2MB

                                                                                                          MD5

                                                                                                          27c7ecce8b355249bcc2457e2cdc9625

                                                                                                          SHA1

                                                                                                          3aa7b1e295565016a1f50203391da4796e55036b

                                                                                                          SHA256

                                                                                                          62be94b89bc9b669901640972ef2744db5c5fdbc2ffa6ee809507a16577695d4

                                                                                                          SHA512

                                                                                                          63f8017c5991619ef0f81a62ed5263745366b93f3dc15146707c5c376fb446f999e4a30cd6613106a20c5dc7155df2b6b63ed9fd715e461f016b9f7864a5f0c9

                                                                                                        • C:\Users\Admin\Downloads\Unconfirmed 66597.crdownload

                                                                                                          Filesize

                                                                                                          3.1MB

                                                                                                          MD5

                                                                                                          d4a776ea55e24d3124a6e0759fb0ac44

                                                                                                          SHA1

                                                                                                          f5932d234baccc992ca910ff12044e8965229852

                                                                                                          SHA256

                                                                                                          7ef4d0236c81894178a6cfc6c27920217bea42a3602ad7a6002834718ba7b93c

                                                                                                          SHA512

                                                                                                          ba9127f7f84e55a37e4eb1dc1a50d10ef044f0b24a23d451187c8d1dedec26d3a37cf78e8763b351ef1e492e26b1ef9b28fc2331591ce1b53c3d76369d100f4b

                                                                                                        • memory/2220-237-0x0000000000A80000-0x0000000000DA4000-memory.dmp

                                                                                                          Filesize

                                                                                                          3.1MB

                                                                                                        • memory/3368-658-0x000000001C430000-0x000000001C958000-memory.dmp

                                                                                                          Filesize

                                                                                                          5.2MB

                                                                                                        • memory/3368-621-0x000000001BD40000-0x000000001BDF2000-memory.dmp

                                                                                                          Filesize

                                                                                                          712KB

                                                                                                        • memory/3368-620-0x00000000028E0000-0x0000000002930000-memory.dmp

                                                                                                          Filesize

                                                                                                          320KB