Analysis

  • max time kernel
    317s
  • max time network
    329s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250211-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250211-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-02-2025 10:37

General

  • Target

    ПЛАТЕЖНА ІНСТРУКЦІЯ_00000818.pdf

  • Size

    194KB

  • MD5

    cae56642c9652218a90cb9393ef4b1e5

  • SHA1

    e9644616a09e1d53ab5fcb1335459c270044890c

  • SHA256

    864c79228c2f3d6b15980dcb180585f7dbd7b4fe457c779e198cbf9164c25a6e

  • SHA512

    21e108daeae1df8ff0ccd0d28da179ec40605b848348774ab9cf93bfec0a52e62d8dbbfa9a48cdda431e31f4827fc628725d32d9b040453396bebd96581c6d7d

  • SSDEEP

    6144:rhzzkdi1pv2BdYgZ1VzkR9YYPfslTdCbBW:rZkdi1RkSk1VzkR9YYsqBW

Malware Config

Signatures

  • NetSupport

    NetSupport is a remote access tool sold as a legitimate system administration software.

  • Netsupport family
  • Blocklisted process makes network request 4 IoCs
  • Downloads MZ/PE file 1 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 11 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Command and Scripting Interpreter: JavaScript 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 11 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies registry class 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 32 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of FindShellTrayWindow 36 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of SetWindowsHookEx 11 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\ПЛАТЕЖНА ІНСТРУКЦІЯ_00000818.pdf"
    1⤵
    • System Location Discovery: System Language Discovery
    • Checks processor information in registry
    • Modifies Internet Explorer settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4428
    • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
      "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=16514043
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4652
      • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
        "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=6DF9447E242D1920535F516E238F01A8 --mojo-platform-channel-handle=1748 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2832
      • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
        "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=FF41C60D8981AF1C5B5BA4F268D18DC9 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=FF41C60D8981AF1C5B5BA4F268D18DC9 --renderer-client-id=2 --mojo-platform-channel-handle=1740 --allow-no-sandbox-job /prefetch:1
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2372
      • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
        "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=C1E5F6351D505E9BCB2066598571B6E8 --mojo-platform-channel-handle=2312 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2676
      • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
        "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=7EF79317BD8223E027D966FC1DDE858C --mojo-platform-channel-handle=1764 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        PID:4208
      • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
        "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=715749D6BA34BDAE54EED0A105E2A8EB --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=715749D6BA34BDAE54EED0A105E2A8EB --renderer-client-id=6 --mojo-platform-channel-handle=1728 --allow-no-sandbox-job /prefetch:1
        3⤵
        • System Location Discovery: System Language Discovery
        PID:3200
      • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
        "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=DCFFCFB275A927F35EBB027444832813 --mojo-platform-channel-handle=2596 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        PID:4548
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.dropbox.com/scl/fi/ozp7v9qabsn133u7lezdz/scan_doc_000_132.rar?rlkey=i0taejzknelwz7e3jnkdrctm7&st=mznr1hc4&dl=1
      2⤵
      • Enumerates system info in registry
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:408
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff7afd46f8,0x7fff7afd4708,0x7fff7afd4718
        3⤵
          PID:960
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1792,5223798684715061035,10962905620738138069,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2004 /prefetch:2
          3⤵
            PID:2300
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1792,5223798684715061035,10962905620738138069,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2472 /prefetch:3
            3⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:1076
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1792,5223798684715061035,10962905620738138069,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2844 /prefetch:8
            3⤵
              PID:1112
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1792,5223798684715061035,10962905620738138069,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3380 /prefetch:1
              3⤵
                PID:4084
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1792,5223798684715061035,10962905620738138069,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3396 /prefetch:1
                3⤵
                  PID:3992
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1792,5223798684715061035,10962905620738138069,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5276 /prefetch:1
                  3⤵
                    PID:2740
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1792,5223798684715061035,10962905620738138069,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5292 /prefetch:1
                    3⤵
                      PID:4536
                    • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1792,5223798684715061035,10962905620738138069,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5620 /prefetch:8
                      3⤵
                        PID:4968
                      • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1792,5223798684715061035,10962905620738138069,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5620 /prefetch:8
                        3⤵
                        • Suspicious behavior: EnumeratesProcesses
                        PID:856
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1792,5223798684715061035,10962905620738138069,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5676 /prefetch:1
                        3⤵
                          PID:2892
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1792,5223798684715061035,10962905620738138069,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5740 /prefetch:1
                          3⤵
                            PID:1928
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=1792,5223798684715061035,10962905620738138069,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5312 /prefetch:8
                            3⤵
                              PID:4360
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1792,5223798684715061035,10962905620738138069,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5728 /prefetch:1
                              3⤵
                                PID:1052
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1792,5223798684715061035,10962905620738138069,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6160 /prefetch:8
                                3⤵
                                • Suspicious behavior: EnumeratesProcesses
                                PID:4760
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1792,5223798684715061035,10962905620738138069,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2204 /prefetch:2
                                3⤵
                                • Suspicious behavior: EnumeratesProcesses
                                PID:812
                          • C:\Windows\System32\CompPkgSrv.exe
                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                            1⤵
                              PID:3796
                            • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
                              "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSIwIiBpbnN0YWxsZGF0ZXRpbWU9IjE3MzkyODMyMzYiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM4Mzc1NDI1MTE0ODAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTc5ODYyIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI1MjYyNTQxMTg0Ii8-PC9hcHA-PC9yZXF1ZXN0Pg
                              1⤵
                              • System Location Discovery: System Language Discovery
                              • System Network Configuration Discovery: Internet Connection Discovery
                              PID:3788
                            • C:\Windows\system32\OpenWith.exe
                              C:\Windows\system32\OpenWith.exe -Embedding
                              1⤵
                              • Modifies registry class
                              • Suspicious use of SetWindowsHookEx
                              PID:5772
                            • C:\Windows\System32\rundll32.exe
                              C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                              1⤵
                                PID:1456
                              • C:\Program Files\7-Zip\7zG.exe
                                "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\scan_doc_000_132\" -spe -an -ai#7zMap26930:94:7zEvent27119
                                1⤵
                                • Suspicious use of AdjustPrivilegeToken
                                • Suspicious use of FindShellTrayWindow
                                PID:6080
                              • C:\Windows\System32\WScript.exe
                                "C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\scan_doc_000_132\scan_doc_000_132.js"
                                1⤵
                                • Blocklisted process makes network request
                                • Checks computer location settings
                                • Adds Run key to start application
                                PID:6140
                                • C:\ProgramData\obkprrq\client32.exe
                                  "C:\ProgramData\obkprrq\client32.exe"
                                  2⤵
                                  • Executes dropped EXE
                                  • Loads dropped DLL
                                  • System Location Discovery: System Language Discovery
                                  PID:2676
                              • C:\Windows\System32\WScript.exe
                                "C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\scan_doc_000_132\scan_doc_000_132.js"
                                1⤵
                                • Blocklisted process makes network request
                                • Checks computer location settings
                                • Adds Run key to start application
                                PID:2488
                                • C:\ProgramData\ynuhs6u\client32.exe
                                  "C:\ProgramData\ynuhs6u\client32.exe"
                                  2⤵
                                  • Executes dropped EXE
                                  • Loads dropped DLL
                                  • System Location Discovery: System Language Discovery
                                  • Suspicious use of AdjustPrivilegeToken
                                  • Suspicious use of FindShellTrayWindow
                                  PID:5580

                              Network

                              MITRE ATT&CK Enterprise v15

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads

                              • C:\ProgramData\obkprrq\AudioCapture.dll

                                Filesize

                                76KB

                                MD5

                                2a82792f7b45d537edfe58eb758c1197

                                SHA1

                                a039182d4d1ef29c6d8c238f20f7b8218c28f90c

                                SHA256

                                05aa13a6c1d18f691e552f04a996960917202a322d0dacfd330e553ad56978ed

                                SHA512

                                c6c6799b386e0d6489d9346f1d403b03b9425572e7418a93a72c413a4b9413945aaf4ea97a7d7b65772e5e3f00cff65f180f6fef51a26d4fdc2ff063816b5386

                              • C:\ProgramData\obkprrq\KBDTAM99.DLL

                                Filesize

                                7KB

                                MD5

                                ccc736781cf4a49f42cd07c703b3a18b

                                SHA1

                                6ad817d7e8b7e9dc978763305a4cd4f1ab9abb66

                                SHA256

                                000c4b5b50966634df58078511794f83690d693fccf2aca5c970c20981b29556

                                SHA512

                                39245c4ba554a5a178310af2b8578401360bf60efda427332249eca02d6d65e4b419270ba648e4ad36aacca810133f8e4404372dee98a3648c1e4a9b85dedccb

                              • C:\ProgramData\obkprrq\NSM.ini

                                Filesize

                                5KB

                                MD5

                                99f493dce7fab330dc47f0cab8fe6172

                                SHA1

                                16906fb5988303bb462b65ff4ece23539a12f4b5

                                SHA256

                                e0ed36c897eaa5352fab181c20020b60df4c58986193d6aaf5bf3e3ecdc4c05d

                                SHA512

                                2c58171c30aec8ae131a7c32162856fce551b55f861d0d9fb0e27a91bd7084388df5860392f80cdbc6df6e64e97d8bf2cae587c3d6b7c142ce711ae8e240bb01

                              • C:\ProgramData\obkprrq\TsUsbRedirectionGroupPolicyExtension.dll

                                Filesize

                                13KB

                                MD5

                                d89cda3ff8427da82de6cce39008c5bc

                                SHA1

                                33889517517b8953707796d12d6907b039c715d1

                                SHA256

                                f44cc1e23d0d192dcfd84069b27704cd0b2a8e7720eee43656f57cb474433762

                                SHA512

                                4a73be7228960719236f39abc6dba7741498d3a3539f7bcc31b6d28a2574e41e4f85e6c2e0fbcffe9ba3b6a646fa3fa078adc0a53c46a4676b871fb92e11fe4f

                              • C:\ProgramData\obkprrq\WiaExtensionHost64.dll

                                Filesize

                                11KB

                                MD5

                                5d084613c0e5c8c3022d9e0f316b0e23

                                SHA1

                                784dd38d9e553eb4b8955320fb596ae4e6854f23

                                SHA256

                                07bc4dc48d5d9bcc2ce52ca8a0f925ca021092dc34cb811e183cbc0d32e576ba

                                SHA512

                                263d3de392b5a4e40e9fbd791062b2731f27410e977dbdacb61810d1a1c2cf24658d8abf5d09a99a18ff7a87c122d9b6744d40723c1637621c5feb327fad752a

                              • C:\ProgramData\obkprrq\client32u.ini

                                Filesize

                                600B

                                MD5

                                e43670cb29271c8105c8580ec0b00a68

                                SHA1

                                472e6630e2052ac643f8b93aa09ba1c8f43664e3

                                SHA256

                                4c6e14c815224bb1edd8b9bd9c3200dd011c1b8283ef0e388f7d6fa947dc3f4c

                                SHA512

                                aaa81e170d15c936bd07c5aba35ee6cb4019e7f89d47b61092a4dbcd56fb31f9e0a4f16a45febdb2b0d919d1ef41c02faae03f77a08dec1dd94e5db6ffcf191a

                              • C:\ProgramData\obkprrq\comcat.dll

                                Filesize

                                10KB

                                MD5

                                835ff05a3f5e16e0fe41e515ea398bd4

                                SHA1

                                e025cb17bbb01a1b5715ebbc745272a8611dae6c

                                SHA256

                                8dcfb1e6aa965df4bd4c0551d03bdfd6472c80219ada4671910958688fbb4ab6

                                SHA512

                                e6a7002316b05759c433b3e0516843a14199ee4b23315d799b533a52f9932f4715fc8aa5fae96892901ac67f0dae6d239eb37fc722558cb7c9dd906564719cd1

                              • C:\ProgramData\obkprrq\getuname.dll

                                Filesize

                                11KB

                                MD5

                                91c68038bfc064ea8fb6d432acd38ee0

                                SHA1

                                4df7e33b6e325f31231eaaab366e2e710955babb

                                SHA256

                                68de057c4175d4c94afa2acb2abc1a9ccac04a3ceb8e84c33f7f414bb8b0eeb6

                                SHA512

                                002aef67593058c88b980a4107f1ca4ddfec5268456f76d1d358179e00ea2a0cd64c93fb31a7e78055885cfd508c90a7b19c6c6fa7a5a3c3ffa305677a0955d2

                              • C:\ProgramData\obkprrq\ifsutilx.dll

                                Filesize

                                16KB

                                MD5

                                27a7213091cda31e84967bead4d29bd1

                                SHA1

                                e705e0fd25167c8cdaf984f067e3bdf4be8558d3

                                SHA256

                                42214053995b6188b2e20935ca8c92af77639f0d5541a132920a5cba2cfcbde6

                                SHA512

                                a16ee540cad2661f3d31071aed3b2f30ea5c0f068f51a350ef693fb83df30ce97ea4701714091ed0ef4a0806d908d93691beb0d8060b5ec73f62422477c8f3ce

                              • C:\ProgramData\obkprrq\logos\8ball1.bmp

                                Filesize

                                5KB

                                MD5

                                0803944194a71bd255dbdcc0d0cee39e

                                SHA1

                                1c47a4dc9fe8e99f2849b91313ff30313d4dee86

                                SHA256

                                9f5a3aa0b49609b6461593f2d1af0e7deb6e2c6883a114487a96c7b61b0fced8

                                SHA512

                                6030b0bf008e7e2b595c0c8b8f7f0dcefa9ba1e9c166e746c3c41b777053db710b0e1ad277bcc96e56ae1fbfacf0e67c3d9be232fca93c08fe6a1dfb792c03f7

                              • C:\ProgramData\obkprrq\logos\andre.bmp

                                Filesize

                                5KB

                                MD5

                                020dbb02eb629861340785a80a9a02df

                                SHA1

                                292fc7bb635c1b73151ba041a9d65b8a402d9545

                                SHA256

                                f35918394959002e44919b9b4c090630e0dd807154a8dd8b28896f13c88faf4a

                                SHA512

                                16c691f111e1970f5981e09cb873bf7f2db25a3a4c8761593c1421369169459cd570be8c4b078c73b4709a72cd40769e9d3dfd660183452e2778529cba64bc03

                              • C:\ProgramData\obkprrq\logos\camp1.bmp

                                Filesize

                                5KB

                                MD5

                                ed352fdd80be916f1eeeedd282202487

                                SHA1

                                7c33ffbd4c4d9287579b19e1ec3c4629a942c4ea

                                SHA256

                                49a9549f6ef5b5c578609a5f291119b97571e669db4fb2b7d22b6a8a23ec1143

                                SHA512

                                637c927513052e6cd1a5fce61f64ec3880e636d913f09591e9349fae64624b1e77d242e9458b02e4f36ee2fa632d9cf321e50d620676a4336344ad822627ade9

                              • C:\ProgramData\obkprrq\logos\chick1.bmp

                                Filesize

                                5KB

                                MD5

                                cd22448b3f9214fe2a6a009b5f65668e

                                SHA1

                                093c3dce1f368fad181c2a333a49ab83ee4f4796

                                SHA256

                                30540cce8c36b0cd8b2f5d0790288c82175096d0236d24f47c8b6a591385cf41

                                SHA512

                                77565aac5a544957b460aa12dc4fc613de8895b813092fba6f9e4b049f58748487b5961e02a84c872d6c62e0b8ae37f93c6ca1e383c038544633c395f811171a

                              • C:\ProgramData\obkprrq\logos\chuckskull.bmp

                                Filesize

                                5KB

                                MD5

                                39c7b460021042a446bd8bdca8476a83

                                SHA1

                                c3994ec1879a611093a06237eb22fd07bb1b2bda

                                SHA256

                                88bc2cd2dac6482c37132b691e2039dc793da95a1e7a548210682b56b52374c2

                                SHA512

                                0f865f28893ec5b0c4bff034a7cff99d4220b44c196c9e44de6530b5f91640892f2e40964c2792ff5f93a92652697ad2a19d427c354324a2945eb78cef4c9c48

                              • C:\ProgramData\obkprrq\logos\devl1.bmp

                                Filesize

                                5KB

                                MD5

                                ba8b503cbaa76346e3601e54e2c91ca3

                                SHA1

                                cca5e6e50157aea17b21dfc318fd0a696c4c46dc

                                SHA256

                                a03bb48e4599c5c1d15554119db31622a53bb9989e5b51d27f835ff70b40dcc8

                                SHA512

                                1184be62f352a059266d1b710f7b21faa67bbf03717d545746927cf2ea41dc5ce55a5c182769d151462da304c6ff5519249690e741d94af82134b913b8dfbce3

                              • C:\ProgramData\obkprrq\logos\gun1.bmp

                                Filesize

                                5KB

                                MD5

                                299be38a79f4112baaceab3f609faf1d

                                SHA1

                                8e4400f341bf9c7c819c2ea17de039bc4cf34cbc

                                SHA256

                                93ad5c9ac6af96dca019c59b2832c3d90b9db7ee7615a6d1d93d260f8f3ae240

                                SHA512

                                f26fe0c3683c7f0e9ab1c47825fd25c13fa5eaf4a97080de8431fd4f91d5bb22feb1d16b703a0657c3aca04f12cec43054bd56a4a91e1c8b18d31b3e08a1e71b

                              • C:\ProgramData\obkprrq\logos\lambda.bmp

                                Filesize

                                5KB

                                MD5

                                1876018802412e395418d9abdbc3b062

                                SHA1

                                871f13b1b420db932514f77324f79588458c9d41

                                SHA256

                                1af36b03a2df6da208575c6a54fa8244f7c7ab8c1ad4b1d2208ef0c28e94715d

                                SHA512

                                38fca57b73cb8a666406aa9bf2545438b27e06ab09e9302ef6a3cdbb29bd212f7e16733c5cb30a6cf33163695042dbd7ca54dea1c645977be56d7bc998772db6

                              • C:\ProgramData\obkprrq\logos\skull.bmp

                                Filesize

                                5KB

                                MD5

                                d8e44f63c296926b8a722279d225d4a4

                                SHA1

                                04c6b93e729c70768818a755da21c90bc499d525

                                SHA256

                                b8471cb9c6a85760cfbf29b814a168a37532e98e125485c3357dff31cfe8bd42

                                SHA512

                                98d0122074e0582308e0bc8c5d36a042460c3394218e58907710486cf12769d1047471f7123d54e7e9d4f4178c5d07c1f3dbae255de90f344c5e5e43aedaecf4

                              • C:\ProgramData\obkprrq\logos\smiley.bmp

                                Filesize

                                5KB

                                MD5

                                5bbda3940852184e3e49d97e818f6d1d

                                SHA1

                                ab3b863b198b1c589da615b0e5e7b8c316139150

                                SHA256

                                fed3427703ddee0a8e0ec08e645eaf039f97d4e42c3a48241ae1791188ad00ec

                                SHA512

                                ae4908036e08a2fae9e55777591ea3ae4ef3a93cdf2e08e745f0fea2fdba17e6e4e1850d2222f7a0326eae734e47e5a62925a6088f4be6c0fc69a5924b89f70b

                              • C:\ProgramData\obkprrq\logos\splatt.bmp

                                Filesize

                                5KB

                                MD5

                                90990db3ffcf9a0c05058b204892d155

                                SHA1

                                6925697346538b362975b1310ef99dcdc46c6482

                                SHA256

                                1734d46ebe96c82da9107db988727f78218f7f7d417a268d4dca38941dc7852f

                                SHA512

                                ef371e894bc18385715e90fa40418e62c3cc2761ae10b156c2175b6c4ee476f3d3cddac4f945ff3c3d1b10d3d87f05aa956896b8c661a789f886c1c33a76035b

                              • C:\ProgramData\obkprrq\logos\tiki.bmp

                                Filesize

                                5KB

                                MD5

                                727728ee19652652f6032c9e979976f2

                                SHA1

                                25101e697960914ada41b61ad7d1fa5f29cfd973

                                SHA256

                                555eb2ffe4789715c488a5b1298cbddbe807619a58201afd0f3e10074744cc33

                                SHA512

                                0d776de8924a456577ea24f41bd894150542dc75b33285888e6450e23812904a7176a345319cd970aef1053a0e9aea2b3678a85b09db4a5214af4a88ad08bfe1

                              • C:\ProgramData\obkprrq\logos\v_1.bmp

                                Filesize

                                5KB

                                MD5

                                e5d9acc68bcb1e4114a97a186cc54cf2

                                SHA1

                                ead2c585eb34248e2d709082e6ff5cca0b9c2215

                                SHA256

                                81cf60e1eed45acb0160374a78f0398e5005e5328e071b4692dcfdbd3175a65b

                                SHA512

                                8b946b58a04d54f8f825ff12b8d68a2f7223aa2992236e26812516dd016b74fd830fd5a937e997eda59b243beebd031f6f66bc20cfc4b7fbd1b3cf5d1e14d737

                              • C:\ProgramData\obkprrq\mprext.dll

                                Filesize

                                13KB

                                MD5

                                0eabd6ab464758f058fc039a47f61750

                                SHA1

                                51bc562a59e565e3f39a54e4c788896b8803354b

                                SHA256

                                f96e8d99b736e4ce7997bb1de65d88c32e16f1f725d8bd98f52c39a02969fd87

                                SHA512

                                f5a038615ecbb72072ef2a72d166cabbfd26aa879f28c911a26db71581cb8b93b7554b1cfa1517b063fdc5f942281e7d409e70c998b8273fe9ee6a0fc61a00fb

                              • C:\ProgramData\obkprrq\msidle.dll

                                Filesize

                                11KB

                                MD5

                                b1c1bb1ef2ac2d739aeaed77c33c1848

                                SHA1

                                efa181a1ea01e02cd44614f80259ce794b7a455c

                                SHA256

                                cd8d7caebfeb4eb9124ba3e025aff68dde554a8dd6b3365654bf936200c4e563

                                SHA512

                                f4e24c508248e6f331aa16ed01c7cdc6cebbc4cd09dfa9f511d02544e2c04eb36c9480ae71d9ddef039a1e9d6e0324179a9ba0f1c323e20c4bbf813a154e2fc0

                              • C:\ProgramData\obkprrq\msidntld.dll

                                Filesize

                                5KB

                                MD5

                                504e51418d856d664db23dd55a61352d

                                SHA1

                                522c0fb1ed2b9594e7a2aab9481883da57d8ca23

                                SHA256

                                f190e142f402de460455ff2d1835294a3e118ba74d76aa092af49372bb9b76f4

                                SHA512

                                28bebb26eeb8ba97fb0ac8cc4869576d3cc58cd7c0fdce988f6fe160c7b426c2a3906799ca021a65a26394cba266dfa3d3e58790ec41c7eb7ecd0fbd89d6e0db

                              • C:\ProgramData\obkprrq\neth.dll

                                Filesize

                                2KB

                                MD5

                                26bf659dc283cd389baad0ca54c1abca

                                SHA1

                                b386c4c9400880ec8315a93af0c5b38db6be9abd

                                SHA256

                                ad2310e7f3ba73c29872a14826f6a5118765a4c6b67a57168a336c05365dd152

                                SHA512

                                871449eb6b24a9d13134ca2d45f0839a2a417517969d1c7029219570aaee932e27026b29987553d41c58c13f265cf2a406442e21db54a07fb2555392cc4bf19f

                              • C:\ProgramData\obkprrq\netmsg.dll

                                Filesize

                                2KB

                                MD5

                                176e3d19f665faefd5c5f892cb310ac8

                                SHA1

                                da39984d4f8522ae694cb310a64282f150aa3b26

                                SHA256

                                6ff38f25cbf31af03633654469c67024df13bf59b1ed9fa29597c4d6cc5a624d

                                SHA512

                                4cacf6f1277a563ae80fff86c277580d9d570a53ef75ca7cd27e63bf33c2d0a4795eeff0696cadfec619018c6c9fd1b9f023ce7694e3a847e534cf7a24a8a19f

                              • C:\ProgramData\obkprrq\nskbfltr.inf

                                Filesize

                                328B

                                MD5

                                26e28c01461f7e65c402bdf09923d435

                                SHA1

                                1d9b5cfcc30436112a7e31d5e4624f52e845c573

                                SHA256

                                d96856cd944a9f1587907cacef974c0248b7f4210f1689c1e6bcac5fed289368

                                SHA512

                                c30ec66fecb0a41e91a31804be3a8b6047fc3789306adc106c723b3e5b166127766670c7da38d77d3694d99a8cddb26bc266ee21dba60a148cdf4d6ee10d27d7

                              • C:\ProgramData\obkprrq\nsm_vpro.ini

                                Filesize

                                46B

                                MD5

                                3be27483fdcdbf9ebae93234785235e3

                                SHA1

                                360b61fe19cdc1afb2b34d8c25d8b88a4c843a82

                                SHA256

                                4bfa4c00414660ba44bddde5216a7f28aeccaa9e2d42df4bbff66db57c60522b

                                SHA512

                                edbe8cf1cbc5fed80fedf963ade44e08052b19c064e8bca66fa0fe1b332141fbe175b8b727f8f56978d1584baaf27d331947c0b3593aaff5632756199dc470e5

                              • C:\ProgramData\obkprrq\panmap.dll

                                Filesize

                                14KB

                                MD5

                                c3f21a1cc9dc3cccc38491da27273f11

                                SHA1

                                b59cd05fa587eb37993e87359d26a9210beebb01

                                SHA256

                                cdb271b988bf3dc272ad93c272c446efa981c93fe19b7cbee8d2f01fb058a005

                                SHA512

                                a0d882bde23d545f37395311639b78123a1108c022d866d86fb449992387cb7e53fa4b4a54c0e53d74c3e31a9220a9e15a3058158df851cf598bf7e520b3e7b2

                              • C:\ProgramData\obkprrq\prflbmsg.dll

                                Filesize

                                13KB

                                MD5

                                54fb96ffb3e2984755f82cfff72e317a

                                SHA1

                                e569e22624267b38abfe33a452a1f7657848ea13

                                SHA256

                                73b88e1238ab71ed4142952f06e49d230f611c28ceeac263820f6af148d2965b

                                SHA512

                                105e5353ea3db3c90e5d2a7ad0ee0dea52d648e61c0a34a2ee507a3393ec3c925d15e96eab59cd186ecd2d9322211de886058db88ccd8b6ea706884d0eb632d3

                              • C:\ProgramData\obkprrq\provdiagnostics.dll

                                Filesize

                                21KB

                                MD5

                                81bd7399ef847e73954ae785471ac5b8

                                SHA1

                                3557ec236de42c3c1221898ae1e1dcee3fb40dad

                                SHA256

                                b7eb4c207979e5c4311e8c7553cf478129c5ede51bf93f4f53a99ab63c6029a2

                                SHA512

                                9bc2261001c4483aeed4c19ae089693fc0b220f784813ad64b9cdef97207d78a5d9b338ba85f8dc99752d87d4b4d73f90bb9db95cd16084c81ab8a25c738255a

                              • C:\ProgramData\obkprrq\remcmdstub.exe

                                Filesize

                                67KB

                                MD5

                                62cb7909b5247f472b0e3f748faedf35

                                SHA1

                                f424005eb21deb09f1617f33814d6e6c3851b7dc

                                SHA256

                                f6aac87863a73299b260315748cb0bc0b964d860cf5710993ca54bd79aaae5db

                                SHA512

                                2f4e36f6a0718e7fc9e08e5cca13b76089cb6c42ab772475a2fd68128268e3c0b6c6371ea665b793a8f6bcc3da76c6a57cb0b916d1d8b71c47d603933a7d72c4

                              • C:\ProgramData\obkprrq\wiatrace.dll

                                Filesize

                                18KB

                                MD5

                                2bdce845c9ab1d3eb0020b8e74c536dc

                                SHA1

                                2d9745fb19b3661d7bcea9b06cd2611d5b5ca80d

                                SHA256

                                9ad91cc28cbc6cb010911427a9b3d406a193d13f05f85e58ed7af01e8d9e3b2f

                                SHA512

                                321cec721eae62374384b82f092ff609b5ee48746d3a7839e20c098a40439f0fdbea1555922dda1e42ccfb1e28ca54ef6a0157016506f3ea8dc504db0e1f8f29

                              • C:\ProgramData\ynuhs6u.zip

                                Filesize

                                2.0MB

                                MD5

                                a3438bc1060db9dc6d7d287f43259115

                                SHA1

                                df33391e922d4ba353dc76c2f38a0bdac56cd591

                                SHA256

                                6c3dec03149c475e7d69059169d3a944ce67559c33228ee45030ac18a061aac9

                                SHA512

                                0297a9534795cc47f3dfb30ace3cb77fafa28d8dd2a5843598b71bb7dae3966af645739b6e4056db571322073df3dd23dbe89cddace3471a68f68151cd27fc00

                              • C:\ProgramData\ynuhs6u\HTCTL32.DLL

                                Filesize

                                306KB

                                MD5

                                3eed18b47412d3f91a394ae880b56ed2

                                SHA1

                                1b521a3ed4a577a33cce78eee627ae02445694ab

                                SHA256

                                13a17f2ad9288aac8941d895251604beb9524fa3c65c781197841ee15480a13f

                                SHA512

                                835f35af4fd241caa8b6a639626b8762db8525ccceb43afe8fffc24dffad76ca10852a5a8e9fc114bfbf7d1dc1950130a67037fc09b63a74374517a1f5448990

                              • C:\ProgramData\ynuhs6u\MSVCR100.dll

                                Filesize

                                755KB

                                MD5

                                0e37fbfa79d349d672456923ec5fbbe3

                                SHA1

                                4e880fc7625ccf8d9ca799d5b94ce2b1e7597335

                                SHA256

                                8793353461826fbd48f25ea8b835be204b758ce7510db2af631b28850355bd18

                                SHA512

                                2bea9bd528513a3c6a54beac25096ee200a4e6ccfc2a308ae9cfd1ad8738e2e2defd477d59db527a048e5e9a4fe1fc1d771701de14ef82b4dbcdc90df0387630

                              • C:\ProgramData\ynuhs6u\NSM.LIC

                                Filesize

                                262B

                                MD5

                                b9956282a0fed076ed083892e498ac69

                                SHA1

                                d14a665438385203283030a189ff6c5e7c4bf518

                                SHA256

                                fcc6afd664a8045bd61c398be3c37a97536a199a48d277e11977f93868ae1acc

                                SHA512

                                7daa09113c0e8a36c91cc6d657c65851a20dff6b60ac3d2f40c5737c12c1613c553955f84d131ba2139959973fef9fc616ca5e968cb16c25acf2d4739eed87eb

                              • C:\ProgramData\ynuhs6u\PCICAPI.dll

                                Filesize

                                44KB

                                MD5

                                9daa86d91a18131d5caf49d14fb8b6f2

                                SHA1

                                6b2f7ceb6157909e114a2b05a48a1a2606b5caf1

                                SHA256

                                1716640cce74322f7ee3e3e02b75cd53b91686f66e389d606dab01bd9f88c557

                                SHA512

                                9a98e0d9e2dda8aefa54bddb3c7b71501d638dff68863939de6caa117b0e7bf15e581a75419ef8a0da3f1c56a19f1b0f4c86d65f8581773ab88ff5764b9bb3aa

                              • C:\ProgramData\ynuhs6u\PCICHEK.DLL

                                Filesize

                                27KB

                                MD5

                                e311935a26ee920d5b7176cfa469253c

                                SHA1

                                eda6c815a02c4c91c9aacd819dc06e32ececf8f0

                                SHA256

                                0038ab626624fa2df9f65dd5e310b1206a9cd4d8ab7e65fb091cc25f13ebd34e

                                SHA512

                                48164e8841cfc91f4cbf4d3291d4f359518d081d9079a7995378f970e4085b534f4bafc15b83f4824cc79b5a1e54457b879963589b1acbcfe727a03eb3dffd1c

                              • C:\ProgramData\ynuhs6u\PCICL32.dll

                                Filesize

                                3.3MB

                                MD5

                                77b3988cbae5a2550caec42cc5e8ec35

                                SHA1

                                5fa1eeb60e881bfd82eb7c3d9e911587982aaa38

                                SHA256

                                650382fe6596c8dc0c1739713c2076d4ddff32d5c177210b1241550bb8148cfd

                                SHA512

                                480f3abef7b799bd604ba9825e2b8cf681e7850373761c579ef181607980d5159c225fb486996e3088f39662f873743d25b52368045d3ae5bd8d45e44d1e8bec

                              • C:\ProgramData\ynuhs6u\client32.exe

                                Filesize

                                117KB

                                MD5

                                1c19c2e97c5e6b30de69ee684e6e5589

                                SHA1

                                5734ef7f9e4dba0639c98881e00f03eea35a62ee

                                SHA256

                                312a0e4db34a40cb95ba1fac8bf87deb45d0c5f048d38ac65eb060273b07df67

                                SHA512

                                ab7240b81be04f1bced47701a5791bbeedcba6037ee936327478c304aa1ce5ae75856ca7f568f909f847e27db2a6b9c08db7cc1057a18fab14a39a5854f15cba

                              • C:\ProgramData\ynuhs6u\client32.ini

                                Filesize

                                731B

                                MD5

                                9ff762ddf8745986af8d1644963d34ff

                                SHA1

                                2d15dca3f43a0b91f87520db813329142452236a

                                SHA256

                                6859ad91454f4afe277821949caa4172661541b8d02e780c31faaea2ebcafd75

                                SHA512

                                9990cac92e4671435a964a57cb1e9ee1776a3f605c5be40a258f7058785f7f373bc22b49a427af81c99d096b395bd1a388d443175c5ccfc4a06942019d4fd26d

                              • C:\Users\Admin\AppData\LocalLow\Adobe\Acrobat\DC\ReaderMessages

                                Filesize

                                64KB

                                MD5

                                a422b40787cbacdf3f88f49aace96248

                                SHA1

                                d9b0ba30d16a7b9171890ed4515fb23c4fa2bcb5

                                SHA256

                                e35dae90740c3f2cbeb2e6d2a8d6738f2702dca6fc485f2ed9dca01eb1fe4845

                                SHA512

                                ff715e38a6053a34424bc35ea451813d28c67fcbcc9e8b8d537c667753c088590d6001266fd9c209e16ceacd2560ad5ea7a45981759946ee4843c2b5344974a9

                              • C:\Users\Admin\AppData\LocalLow\Adobe\Acrobat\DC\ReaderMessages

                                Filesize

                                36KB

                                MD5

                                b30d3becc8731792523d599d949e63f5

                                SHA1

                                19350257e42d7aee17fb3bf139a9d3adb330fad4

                                SHA256

                                b1b77e96279ead2b460de3de70e2ea4f5ad1b853598a4e27a5caf3f1a32cc4f3

                                SHA512

                                523f54895fb07f62b9a5f72c8b62e83d4d9506bda57b183818615f6eb7286e3b9c5a50409bc5c5164867c3ccdeae88aa395ecca6bc7e36d991552f857510792e

                              • C:\Users\Admin\AppData\LocalLow\Adobe\Acrobat\DC\ReaderMessages

                                Filesize

                                56KB

                                MD5

                                752a1f26b18748311b691c7d8fc20633

                                SHA1

                                c1f8e83eebc1cc1e9b88c773338eb09ff82ab862

                                SHA256

                                111dac2948e4cecb10b0d2e10d8afaa663d78d643826b592d6414a1fd77cc131

                                SHA512

                                a2f5f262faf2c3e9756da94b2c47787ce3a9391b5bd53581578aa9a764449e114836704d6dec4aadc097fed4c818831baa11affa1eb25be2bfad9349bb090fe5

                              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751

                                Filesize

                                734B

                                MD5

                                e192462f281446b5d1500d474fbacc4b

                                SHA1

                                5ed0044ac937193b78f9878ad7bac5c9ff7534ff

                                SHA256

                                f1ba9f1b63c447682ebf9de956d0da2a027b1b779abef9522d347d3479139a60

                                SHA512

                                cc69a761a4e8e1d4bf6585aa8e3e5a7dfed610f540a6d43a288ebb35b16e669874ed5d2b06756ee4f30854f6465c84ee423502fc5b67ee9e7758a2dab41b31d3

                              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\514FC9E59AD092258E4F69810BF8DBA4

                                Filesize

                                504B

                                MD5

                                6ee2e300786b254a2b895b038c3f88de

                                SHA1

                                d1a3c33988c41de4d1c45e5beaa68d740eb57ae0

                                SHA256

                                d3c276ef7ed0a1f2af2369983ef5d3f439c826378d3b8af32e5b13908a944399

                                SHA512

                                f7a45f011d3f5e643fb45e87488e0204a98c8c1f4a226f0701a98297ac4b5f5450756f57f700ea28bb7c1ed515766cf457dbebf974da6c0c1d4b8166ff5ce47b

                              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751

                                Filesize

                                192B

                                MD5

                                ba9f5a31fc6d5928a21981c1ce2fbec8

                                SHA1

                                5b8965af0cfc2ef6c958517d5322d97dab1cbb6b

                                SHA256

                                e9ecf73da64c20b5acf66a0d5b49c95908888ffa01e78305bc51122d00c5dc2b

                                SHA512

                                8f2f9b2b56bd68f8f64cee8da180fd9e46bd18ef67843397435de89d87f5bdb7cc988ee82ed5cd99c1c828161b85ad9d356886277fee4929a7003afa505045eb

                              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\514FC9E59AD092258E4F69810BF8DBA4

                                Filesize

                                550B

                                MD5

                                3b59fe280ff6cf3c3f74ed27ecee3b79

                                SHA1

                                88cf33200cea5eb1ebf2c6c2091854a4dc9dcf6e

                                SHA256

                                932b4062d70261f051aac7fafd9fe048ca5592af6bc48f72c621dcbdb118fc5e

                                SHA512

                                f0279ba4af4bab329179a060a13744ed317ab749ed739002be4d3b7dc9e23f630a9e8e0006598831adc2dc5eded8db54d5c7931fdbe797560bffe4ada6fd81f0

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                Filesize

                                152B

                                MD5

                                dcf6c443f82d4a5f87e2682853b2f355

                                SHA1

                                ca4623dc0bc7b7bc4f31dc0dd8834ee743fc357a

                                SHA256

                                30d0d0bb11a133f7295c839c78a88d72324d9e279b9c465124ee5d50299b7a86

                                SHA512

                                b9163bb08cafcfbc8e0e52d6cb7ca72c5137ff5347c0a7c86787478ce979c3390f355f9f1ece9be1a8fe5df9b94dbbb1ae574b0cc1b63959ea630157765e11f0

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                Filesize

                                152B

                                MD5

                                1af47ff71a93ce65b67715d8eab1463f

                                SHA1

                                f7cb1fe4b76f2a24d12acbe5d77d8e69b766245a

                                SHA256

                                d4e05a41fc65aca28648d51d557db9494dcb31c484c150a851d0b3369f18821e

                                SHA512

                                4826974f8d9e8280dc8329b8a43d18199909caa2e425de6a4583aacd71f94228a38688c26b0c6127fee13168e518457f50f0769d25215d9629f1c681dea34e7e

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                Filesize

                                111B

                                MD5

                                807419ca9a4734feaf8d8563a003b048

                                SHA1

                                a723c7d60a65886ffa068711f1e900ccc85922a6

                                SHA256

                                aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631

                                SHA512

                                f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                Filesize

                                295B

                                MD5

                                4c40b355f6e8a060974c57533cbef9b0

                                SHA1

                                8fbc5de93a78d09feb65244bcb5838e682e35b1e

                                SHA256

                                246c6ab6a2a9fe24101cec1710e5129b3c9934de78a7ab02c8a8dddd42520798

                                SHA512

                                4a34b98624bdd563f70dbc6284b1ca1faa602b82087ba9e0d6e6dd43c163b69cc231426fd5ed03225d7537e447e1c0ef6a5e0692f0158d0d79e98778275ad36e

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                Filesize

                                6KB

                                MD5

                                621c95aa7599c44ab527905191f85d5e

                                SHA1

                                c04f742dcf8d9612097e88090d796d233c457fff

                                SHA256

                                010f5c8873ea50c691084e413d69c4851370f23e9847ef5739e98f99287d072e

                                SHA512

                                1326513a43d8c627003bbccede850d6d0ff3af59a6b6bf7bad8be0988bddf95ce842ebd2705face55e18a110c29a359cef43cf05bda8bc665ef9f7c3a1c0af8a

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                Filesize

                                6KB

                                MD5

                                6fbe554166603820c4bdd09bc0431edc

                                SHA1

                                87297b52c86e4986e726518247c6e34f96397418

                                SHA256

                                bb8988877b272439c439c159d3e90b1fa47caf227d3d7750ae496a8854b28a6c

                                SHA512

                                c4145752f46e6953a7b38c9b5c9a85552da222e7c7c860a14d8e304ba03652d76050ea13bdc738fb7db6a1bdb75ee4b0882358ab8a29e00fe4273c6d719b2429

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                Filesize

                                6KB

                                MD5

                                79738e3968d8f0842f1779b4b85e9d7f

                                SHA1

                                d604825787e34989c0531799f74f7cc8fcc85f25

                                SHA256

                                62a33591c4c0fea0dc4175d89adc6fa5af221f567b7768e4e0b4c0f15d5c9c27

                                SHA512

                                7670c41f345004527c379557226786c229b5e631d6b6bef9213d779b88e430fb783684592a2ed7c79a8fc41ba5f80aef5640809a7eec4a5da5530bd0b1fbe1b5

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                Filesize

                                16B

                                MD5

                                46295cac801e5d4857d09837238a6394

                                SHA1

                                44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                SHA256

                                0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                SHA512

                                8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                Filesize

                                16B

                                MD5

                                206702161f94c5cd39fadd03f4014d98

                                SHA1

                                bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                                SHA256

                                1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                                SHA512

                                0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                Filesize

                                11KB

                                MD5

                                451914c692af980ee9fd3de75aef9f89

                                SHA1

                                596eacfdee24f13d6b2425369bf09e6e9c8c6ece

                                SHA256

                                b2011c3d3ab7cedb17b223bc30e7d8d40dcb1532d48db8c2d6ca230855096a74

                                SHA512

                                5b3fd364f9eec3f013aaeaf32163434d2cf8f71b3b9db96cc28751b323a6ee8fbd553e6cb8845a7df66e9fc48786127218b0a2c27cc019c67e92b7db2d84ac93

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                Filesize

                                8KB

                                MD5

                                26143229cff7f2c08bafe1f8d49300ba

                                SHA1

                                407ce7b432e345d7113a3a2bc76977059368da00

                                SHA256

                                a95594731f6de18bb4d9430326e94403a189da3df1e466354d01ab65d894928a

                                SHA512

                                0d7deb99bfa27f2f14bb64a3158aa9b74ff693a5ff9f7d9940ee0613a47242336492413f203f03e12c0b26e6ac43e284a61ef8cfbbf559d66ea34e15758b6051

                              • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\AutomaticDestinations\f01b4d95cf55d32a.automaticDestinations-ms

                                Filesize

                                10KB

                                MD5

                                52d890b241602fd5bb6f016143229e73

                                SHA1

                                048d5db7acf93e6b857594d59f1e4df458dd0470

                                SHA256

                                8e1585f28960dde77400704b89e90bdd56610c1071430ea5812e61ee7a2bf74e

                                SHA512

                                76943871dedb5180afeb081240611cbd3b8fd2a3b7e18abaecdfe1bf1ae09d3453cd6890a68568a4c7ceae6bfc0e07571f40360b565d6748a7e12b1d84d25584

                              • C:\Users\Admin\Downloads\scan_doc_000_132.rar

                                Filesize

                                232KB

                                MD5

                                b62574137945bab3683a48a8d2ee97b7

                                SHA1

                                eea5383b323eb753afe817aba70c19209c8a8fcd

                                SHA256

                                46a5a6b1c867df55906728f0d99d8d712c6e85ac934bf65997d30dee35ffaf11

                                SHA512

                                35de2eed10005e83bb75f560a112a6b7bb5fd4b115dbf88e75b50189a1284b4fc468d93ad18d5edf802b7d9471e9fcaf84b9387587a47be745ede407333ec02f

                              • C:\Users\Admin\Downloads\scan_doc_000_132\scan_doc_000_132.js

                                Filesize

                                1.6MB

                                MD5

                                fd51877d5d1438c89bac1e1402dcfb83

                                SHA1

                                22e6ff432b3f8eb423d74eb088300995fb0a9b6d

                                SHA256

                                7b96c945b9d6e3c52f14bf14a84d3ab3ca32fe561691fabd8ecdea41a8426ee6

                                SHA512

                                dc6bc3e706787725e16bb1b46f537cc646da6c297de540d4a3c2a720477fc970613065cdb36c631e8b4197c4f86ba5d92d89458cdc09000a2bfc6facda48447a