Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
28/03/2025, 12:49
General
-
Target
eac430dc86f3093384b805246424489f.pdf
-
Size
748KB
-
MD5
eac430dc86f3093384b805246424489f
-
SHA1
6624318ab045dcdd18766c5027e8b2bbdd14fbcb
-
SHA256
4d569a3436ca82b3690beb345f669dd30a5442b5ed548d3b05abbcc344649c48
-
SHA512
233a0a3d0d2b75fae54d87ff3c568c0163fa19dd2c5a8c622c985a4bcf4f9e27cc2a7d69a2106cd89fb1c4b812b641b4d80044bcc472e406db0f215af9ffaf8e
-
SSDEEP
12288:bzifqBzP4K3ALBQg1kBC01W5YM6Lytj6AS3fQlQLTP4a203Ep7zdhlQN8rqrUf:cqB7V2G/BCCZM6etLSPQl+74aJ3+vdh3
Malware Config
Signatures
-
A potential corporate email address has been identified in the URL: [email protected]
-
Drops file in Program Files directory 5 IoCs
description ioc Process File created C:\Program Files\chrome_Unpacker_BeginUnzipping5536_1380645119\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5536_1380645119\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5536_1340989094\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5536_1340989094\protocols.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5536_1340989094\manifest.fingerprint msedge.exe -
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier msedge.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133876398188599281" msedge.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry msedge.exe -
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-3218366390-1258052702-4267193707-1000\{A86EA69C-BC13-41DC-A70B-0688D2D5F733} msedge.exe Key created \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000_Classes\Local Settings AcroRd32.exe Key created \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 3896 AcroRd32.exe 3896 AcroRd32.exe 3896 AcroRd32.exe 3896 AcroRd32.exe 3896 AcroRd32.exe 3896 AcroRd32.exe 3896 AcroRd32.exe 3896 AcroRd32.exe 3896 AcroRd32.exe 3896 AcroRd32.exe 3896 AcroRd32.exe 3896 AcroRd32.exe 3896 AcroRd32.exe 3896 AcroRd32.exe 3896 AcroRd32.exe 3896 AcroRd32.exe 3896 AcroRd32.exe 3896 AcroRd32.exe 3896 AcroRd32.exe 3896 AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3896 AcroRd32.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 5536 msedge.exe 5536 msedge.exe 5536 msedge.exe 5536 msedge.exe 5536 msedge.exe 5536 msedge.exe 5536 msedge.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeSecurityPrivilege 3896 AcroRd32.exe Token: SeTakeOwnershipPrivilege 3896 AcroRd32.exe Token: SeSecurityPrivilege 3896 AcroRd32.exe Token: SeTakeOwnershipPrivilege 3896 AcroRd32.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 3896 AcroRd32.exe 5536 msedge.exe 5536 msedge.exe -
Suspicious use of SetWindowsHookEx 11 IoCs
pid Process 3896 AcroRd32.exe 3896 AcroRd32.exe 3896 AcroRd32.exe 3896 AcroRd32.exe 3896 AcroRd32.exe 3896 AcroRd32.exe 3896 AcroRd32.exe 3896 AcroRd32.exe 3896 AcroRd32.exe 3896 AcroRd32.exe 4616 OpenWith.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3896 wrote to memory of 4732 3896 AcroRd32.exe 91 PID 3896 wrote to memory of 4732 3896 AcroRd32.exe 91 PID 3896 wrote to memory of 4732 3896 AcroRd32.exe 91 PID 4732 wrote to memory of 1872 4732 RdrCEF.exe 94 PID 4732 wrote to memory of 1872 4732 RdrCEF.exe 94 PID 4732 wrote to memory of 1872 4732 RdrCEF.exe 94 PID 4732 wrote to memory of 1872 4732 RdrCEF.exe 94 PID 4732 wrote to memory of 1872 4732 RdrCEF.exe 94 PID 4732 wrote to memory of 1872 4732 RdrCEF.exe 94 PID 4732 wrote to memory of 1872 4732 RdrCEF.exe 94 PID 4732 wrote to memory of 1872 4732 RdrCEF.exe 94 PID 4732 wrote to memory of 1872 4732 RdrCEF.exe 94 PID 4732 wrote to memory of 1872 4732 RdrCEF.exe 94 PID 4732 wrote to memory of 1872 4732 RdrCEF.exe 94 PID 4732 wrote to memory of 1872 4732 RdrCEF.exe 94 PID 4732 wrote to memory of 1872 4732 RdrCEF.exe 94 PID 4732 wrote to memory of 1872 4732 RdrCEF.exe 94 PID 4732 wrote to memory of 1872 4732 RdrCEF.exe 94 PID 4732 wrote to memory of 1872 4732 RdrCEF.exe 94 PID 4732 wrote to memory of 1872 4732 RdrCEF.exe 94 PID 4732 wrote to memory of 1872 4732 RdrCEF.exe 94 PID 4732 wrote to memory of 1872 4732 RdrCEF.exe 94 PID 4732 wrote to memory of 1872 4732 RdrCEF.exe 94 PID 4732 wrote to memory of 1872 4732 RdrCEF.exe 94 PID 4732 wrote to memory of 1872 4732 RdrCEF.exe 94 PID 4732 wrote to memory of 1872 4732 RdrCEF.exe 94 PID 4732 wrote to memory of 1872 4732 RdrCEF.exe 94 PID 4732 wrote to memory of 1872 4732 RdrCEF.exe 94 PID 4732 wrote to memory of 1872 4732 RdrCEF.exe 94 PID 4732 wrote to memory of 1872 4732 RdrCEF.exe 94 PID 4732 wrote to memory of 1872 4732 RdrCEF.exe 94 PID 4732 wrote to memory of 1872 4732 RdrCEF.exe 94 PID 4732 wrote to memory of 1872 4732 RdrCEF.exe 94 PID 4732 wrote to memory of 1872 4732 RdrCEF.exe 94 PID 4732 wrote to memory of 1872 4732 RdrCEF.exe 94 PID 4732 wrote to memory of 1872 4732 RdrCEF.exe 94 PID 4732 wrote to memory of 1872 4732 RdrCEF.exe 94 PID 4732 wrote to memory of 1872 4732 RdrCEF.exe 94 PID 4732 wrote to memory of 1872 4732 RdrCEF.exe 94 PID 4732 wrote to memory of 1872 4732 RdrCEF.exe 94 PID 4732 wrote to memory of 1872 4732 RdrCEF.exe 94 PID 4732 wrote to memory of 1872 4732 RdrCEF.exe 94 PID 4732 wrote to memory of 1872 4732 RdrCEF.exe 94 PID 4732 wrote to memory of 1872 4732 RdrCEF.exe 94 PID 4732 wrote to memory of 3568 4732 RdrCEF.exe 95 PID 4732 wrote to memory of 3568 4732 RdrCEF.exe 95 PID 4732 wrote to memory of 3568 4732 RdrCEF.exe 95 PID 4732 wrote to memory of 3568 4732 RdrCEF.exe 95 PID 4732 wrote to memory of 3568 4732 RdrCEF.exe 95 PID 4732 wrote to memory of 3568 4732 RdrCEF.exe 95 PID 4732 wrote to memory of 3568 4732 RdrCEF.exe 95 PID 4732 wrote to memory of 3568 4732 RdrCEF.exe 95 PID 4732 wrote to memory of 3568 4732 RdrCEF.exe 95 PID 4732 wrote to memory of 3568 4732 RdrCEF.exe 95 PID 4732 wrote to memory of 3568 4732 RdrCEF.exe 95 PID 4732 wrote to memory of 3568 4732 RdrCEF.exe 95 PID 4732 wrote to memory of 3568 4732 RdrCEF.exe 95 PID 4732 wrote to memory of 3568 4732 RdrCEF.exe 95 PID 4732 wrote to memory of 3568 4732 RdrCEF.exe 95 PID 4732 wrote to memory of 3568 4732 RdrCEF.exe 95 PID 4732 wrote to memory of 3568 4732 RdrCEF.exe 95 PID 4732 wrote to memory of 3568 4732 RdrCEF.exe 95 PID 4732 wrote to memory of 3568 4732 RdrCEF.exe 95 PID 4732 wrote to memory of 3568 4732 RdrCEF.exe 95
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\eac430dc86f3093384b805246424489f.pdf"1⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3896 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4732 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=5E93BBFBAAA171E58050E4BB6928196C --mojo-platform-channel-handle=1752 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵
- System Location Discovery: System Language Discovery
PID:1872
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=6A537C8C498BB3E41AC14AEEA26EDD2E --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=6A537C8C498BB3E41AC14AEEA26EDD2E --renderer-client-id=2 --mojo-platform-channel-handle=1760 --allow-no-sandbox-job /prefetch:13⤵
- System Location Discovery: System Language Discovery
PID:3568
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=DA542AD6997EB002738A180F7A4083B8 --mojo-platform-channel-handle=2328 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵
- System Location Discovery: System Language Discovery
PID:3332
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=9C23FE2A851833C960580D54B0502416 --mojo-platform-channel-handle=1836 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵
- System Location Discovery: System Language Discovery
PID:1752
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=7F4BC60E7E1BFABCA9E04609DE922D70 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=7F4BC60E7E1BFABCA9E04609DE922D70 --renderer-client-id=6 --mojo-platform-channel-handle=1920 --allow-no-sandbox-job /prefetch:13⤵
- System Location Discovery: System Language Discovery
PID:788
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=6F3060A8F76842F7454D5F2CA70DF0DD --mojo-platform-channel-handle=2720 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵
- System Location Discovery: System Language Discovery
PID:1712
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=E841C9E8620C37CF6FE1EDBFB2FEC5FD --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=E841C9E8620C37CF6FE1EDBFB2FEC5FD --renderer-client-id=10 --mojo-platform-channel-handle=2940 --allow-no-sandbox-job /prefetch:13⤵
- System Location Discovery: System Language Discovery
PID:3264
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.casits.co.za/2⤵
- Drops file in Program Files directory
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:5536 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x2c8,0x2cc,0x2d0,0x2c4,0x360,0x7ff9784cf208,0x7ff9784cf214,0x7ff9784cf2203⤵PID:5264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1920,i,3781895245533681279,9514617318207595670,262144 --variations-seed-version --mojo-platform-channel-handle=2264 /prefetch:33⤵PID:6140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2228,i,3781895245533681279,9514617318207595670,262144 --variations-seed-version --mojo-platform-channel-handle=2224 /prefetch:23⤵PID:3460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2472,i,3781895245533681279,9514617318207595670,262144 --variations-seed-version --mojo-platform-channel-handle=2932 /prefetch:83⤵PID:4724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3392,i,3781895245533681279,9514617318207595670,262144 --variations-seed-version --mojo-platform-channel-handle=3548 /prefetch:13⤵PID:516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3496,i,3781895245533681279,9514617318207595670,262144 --variations-seed-version --mojo-platform-channel-handle=3536 /prefetch:13⤵PID:2856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --always-read-main-dll --field-trial-handle=4212,i,3781895245533681279,9514617318207595670,262144 --variations-seed-version --mojo-platform-channel-handle=4272 /prefetch:13⤵PID:4168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --extension-process --renderer-sub-type=extension --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --always-read-main-dll --field-trial-handle=4228,i,3781895245533681279,9514617318207595670,262144 --variations-seed-version --mojo-platform-channel-handle=4292 /prefetch:23⤵PID:5880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=3964,i,3781895245533681279,9514617318207595670,262144 --variations-seed-version --mojo-platform-channel-handle=3936 /prefetch:83⤵PID:2668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5340,i,3781895245533681279,9514617318207595670,262144 --variations-seed-version --mojo-platform-channel-handle=5352 /prefetch:83⤵PID:1876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5356,i,3781895245533681279,9514617318207595670,262144 --variations-seed-version --mojo-platform-channel-handle=5452 /prefetch:83⤵PID:1908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5432,i,3781895245533681279,9514617318207595670,262144 --variations-seed-version --mojo-platform-channel-handle=5380 /prefetch:83⤵PID:6004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5700,i,3781895245533681279,9514617318207595670,262144 --variations-seed-version --mojo-platform-channel-handle=5928 /prefetch:83⤵PID:4860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5700,i,3781895245533681279,9514617318207595670,262144 --variations-seed-version --mojo-platform-channel-handle=5928 /prefetch:83⤵PID:5312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6052,i,3781895245533681279,9514617318207595670,262144 --variations-seed-version --mojo-platform-channel-handle=6048 /prefetch:83⤵PID:1216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6212,i,3781895245533681279,9514617318207595670,262144 --variations-seed-version --mojo-platform-channel-handle=6232 /prefetch:83⤵PID:5508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6188,i,3781895245533681279,9514617318207595670,262144 --variations-seed-version --mojo-platform-channel-handle=6084 /prefetch:83⤵PID:5976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6184,i,3781895245533681279,9514617318207595670,262144 --variations-seed-version --mojo-platform-channel-handle=6068 /prefetch:83⤵PID:3004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6176,i,3781895245533681279,9514617318207595670,262144 --variations-seed-version --mojo-platform-channel-handle=6500 /prefetch:83⤵PID:6056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6520,i,3781895245533681279,9514617318207595670,262144 --variations-seed-version --mojo-platform-channel-handle=6664 /prefetch:83⤵PID:6132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6528,i,3781895245533681279,9514617318207595670,262144 --variations-seed-version --mojo-platform-channel-handle=6824 /prefetch:83⤵PID:4880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5364,i,3781895245533681279,9514617318207595670,262144 --variations-seed-version --mojo-platform-channel-handle=6976 /prefetch:83⤵PID:3988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --always-read-main-dll --field-trial-handle=7056,i,3781895245533681279,9514617318207595670,262144 --variations-seed-version --mojo-platform-channel-handle=6948 /prefetch:13⤵PID:5864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --always-read-main-dll --field-trial-handle=3588,i,3781895245533681279,9514617318207595670,262144 --variations-seed-version --mojo-platform-channel-handle=3568 /prefetch:13⤵PID:4160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=704,i,3781895245533681279,9514617318207595670,262144 --variations-seed-version --mojo-platform-channel-handle=4468 /prefetch:83⤵PID:6012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5140,i,3781895245533681279,9514617318207595670,262144 --variations-seed-version --mojo-platform-channel-handle=5112 /prefetch:83⤵PID:6036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5128,i,3781895245533681279,9514617318207595670,262144 --variations-seed-version --mojo-platform-channel-handle=5052 /prefetch:83⤵PID:2336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5492,i,3781895245533681279,9514617318207595670,262144 --variations-seed-version --mojo-platform-channel-handle=5056 /prefetch:83⤵PID:5032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5856,i,3781895245533681279,9514617318207595670,262144 --variations-seed-version --mojo-platform-channel-handle=5108 /prefetch:83⤵PID:5480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6904,i,3781895245533681279,9514617318207595670,262144 --variations-seed-version --mojo-platform-channel-handle=6564 /prefetch:83⤵PID:3184
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3216
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4616
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:3676
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
134B
MD5049c307f30407da557545d34db8ced16
SHA1f10b86ebfe8d30d0dc36210939ca7fa7a819d494
SHA256c36944790c4a1fa2f2acec5f7809a4d6689ecb7fb3b2f19c831c9adb4e17fc54
SHA51214f04e768956bdd9634f6a172104f2b630e2eeada2f73b9a249be2ec707f4a47ff60f2f700005ca95addd838db9438ad560e5136a10ed32df1d304d65f445780
-
Filesize
43B
MD5af3a9104ca46f35bb5f6123d89c25966
SHA11ffb1b0aa9f44bdbc57bdf4b98d26d3be0207ee8
SHA25681bd82ac27612a58be30a72dd8956b13f883e32ffb54a58076bd6a42b8afaeea
SHA5126a7a543fa2d1ead3574b4897d2fc714bb218c60a04a70a7e92ecfd2ea59d67028f91b6a2094313f606560087336c619093f1d38d66a3c63a1d1d235ca03d36d1
-
Filesize
64KB
MD5c7a2f99016f69befa77334f2573e7a24
SHA18feea705add8b23661b9f5fc0dc24943e1ba003e
SHA256de8ac2f4f5d53f12d9982bf8a7e41cb46254edc10bee5c9e05f42775af2122c8
SHA512bfd3e78b51760111f8dcef3a043544f28d481a5666b9c06c392ed356eacbda7c67f236120e9a506955cbc38d729d3ed9e4f9d62bcb920a453b8221d7215b81f8
-
Filesize
36KB
MD5b30d3becc8731792523d599d949e63f5
SHA119350257e42d7aee17fb3bf139a9d3adb330fad4
SHA256b1b77e96279ead2b460de3de70e2ea4f5ad1b853598a4e27a5caf3f1a32cc4f3
SHA512523f54895fb07f62b9a5f72c8b62e83d4d9506bda57b183818615f6eb7286e3b9c5a50409bc5c5164867c3ccdeae88aa395ecca6bc7e36d991552f857510792e
-
Filesize
56KB
MD5752a1f26b18748311b691c7d8fc20633
SHA1c1f8e83eebc1cc1e9b88c773338eb09ff82ab862
SHA256111dac2948e4cecb10b0d2e10d8afaa663d78d643826b592d6414a1fd77cc131
SHA512a2f5f262faf2c3e9756da94b2c47787ce3a9391b5bd53581578aa9a764449e114836704d6dec4aadc097fed4c818831baa11affa1eb25be2bfad9349bb090fe5
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\AutoLaunchProtocolsComponent\1.0.0.9\protocols.json
Filesize3KB
MD5f9fd82b572ef4ce41a3d1075acc52d22
SHA1fdded5eef95391be440cc15f84ded0480c0141e3
SHA2565f21978e992a53ebd9c138cb5391c481def7769e3525c586a8a94f276b3cd8d6
SHA51217084cc74462310a608355fbeafa8b51f295fb5fd067dfc641e752e69b1ee4ffba0e9eafa263aab67daab780b9b6be370dd3b54dd4ba8426ab499e50ff5c7339
-
Filesize
280B
MD5fed4ab68611c6ce720965bcb5dfbf546
SHA1af33fc71721625645993be6fcba5c5852e210864
SHA256c41acdf5d0a01d5e9720ef9f6d503099950791b6f975ba698ccd013c4defa8c4
SHA512f9ab23b3b4052f7fda6c9a3e8cd68056f21da5d0fcf28061331900cac6f31ef081705804d9a9d4103ee7d9c9bdb6aa4237987b7e821d2d96cd52da24219e55ee
-
Filesize
280B
MD54013ebc7b496bf70ecf9f6824832d4ae
SHA1cfdcdac5d8c939976c11525cf5e79c6a491c272a
SHA256fb1a67bdc2761f1f9e72bbc41b6fc0bf89c068205ffd0689e4f7e2c34264b22a
SHA51296822252f121fb358aa43d490bb5f5ce3a81c65c8de773c170f1d0e91da1e6beb83cb1fb9d4d656230344cd31c3dca51a6c421fda8e55598c364092232e0ad22
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize3KB
MD5c05a9bc50943df813b3499fce3775e3c
SHA114f79621283c005c315490d7ea4259e203ae4d41
SHA256cb56d1f48e08c29b6e794f8ec8b663f78758e7bd033b766626db2d95de64259b
SHA512dbdba1ee9d5a3964ce1dce5b78f90cbaa4b840365efa83626c5fa31e12f8ab1f8202529f2d0dad8b154419e595c9fe9a75aaa94de40bf3e5afd42c75d2a3e761
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index~RFe58f690.TMP
Filesize3KB
MD527597cf9b17666317f0b6ab9a40628e9
SHA12ab5597f4c06c98b91bdb79176fd6c3d7ccd843c
SHA25688120b951e2f5a00cd0b3a51467b6ba68900633beb7585565467e8f1ea55d304
SHA5124077e51393d90e4629137f0f3ac8566dd0c6d0cabb2a5254fa88f57e946964f8d6ebcfa92b33ae32e6aad7295f17a19f37e449fa0ad7e30d69d1584272fae10a
-
Filesize
69KB
MD5164a788f50529fc93a6077e50675c617
SHA1c53f6cd0531fd98d6abbd2a9e5fbb4319b221f48
SHA256b305e470fb9f8b69a8cd53b5a8ffb88538c9f6a9c7c2c194a226e8f6c9b53c17
SHA512ec7d173b55283f3e59a468a0037921dc4e1bf3fab1c693330b9d8e5826273c917b374c4b802f3234bbb5e5e210d55e52351426867e0eb8c9f6fba1a053cb05d4
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\jmjflgjpcpepeafmmgdpfkogkghcpiha\1.2.1_0\content.js
Filesize9KB
MD53d20584f7f6c8eac79e17cca4207fb79
SHA13c16dcc27ae52431c8cdd92fbaab0341524d3092
SHA2560d40a5153cb66b5bde64906ca3ae750494098f68ad0b4d091256939eea243643
SHA512315d1b4cc2e70c72d7eb7d51e0f304f6e64ac13ae301fd2e46d585243a6c936b2ad35a0964745d291ae9b317c316a29760b9b9782c88cc6a68599db531f87d59
-
Filesize
107KB
MD540e2018187b61af5be8caf035fb72882
SHA172a0b7bcb454b6b727bf90da35879b3e9a70621e
SHA256b3efd9d75856016510dd0bdb5e22359925cee7f2056b3cde6411c55ae8ae8ee5
SHA512a21b8f3f7d646909d6aed605ad5823269f52fda1255aa9bb4d4643e165a7b11935572bf9e0a6a324874f99c20a6f3b6d1e457c7ccd30adcac83c15febc063d12
-
Filesize
5KB
MD54da5e7844be5454bec6a2db80daaa93d
SHA15489ff81f748e95b3907dd4f1f1cfd4828d37de7
SHA25646d752d9c40b7d459813fd424d59a7983624bfc956092194db98c65eaa16a694
SHA512e00e4d29c987aac41f4e452bb4153fff32a8c8ba25025d219ff80a132470b153d69af804fb59d031aad930bfedef960c800138c4ec3404be7eaa65ce6da1fdd1
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
15KB
MD5b8726ef2d208f05e76ee7df04e81ec47
SHA114d08774829a6d6def8c0f3795ab0432c34b1f3c
SHA2568953cd32b567c902e0a06245cc5995eb21a00986456a1e0b01c5caaf444d50b5
SHA512eb61bf8d00d11717dda5896c2c2a9e4b4a1c1eec03d0fb55bbd01f31efdc4b7754f23bc0a1e06a4230335d49849afac2b391a770847924d7b0c18b39a53944ea
-
Filesize
15KB
MD5695b985d6fa8ab82e1e4c51f5753487a
SHA1f6c34e7a6a6456f86d8bf8bee6dbeb181f675a0b
SHA2560c21126b34fc9ef01f7ec2b4f6bef862bea925903da185a4453986b4e0031dc1
SHA512471997461d85823bc8f9645a1c9fd74dfe587b0fd1f3095dad0a8b2d140325592b6899ffa840c9e20bc564982fd39a1523caad003a8a9ddaedfc8e441d82acf2
-
Filesize
15KB
MD5423d2bce1710b880a496043fdfa2f0df
SHA195c1247e4ff84c1e1f3dc0fbd6fd19114a422b4b
SHA2567cde4199d238e6cccb657dcacd6c2baf8484d312371245598d6c103c8f1eea0d
SHA512e3168076284df228dc843807859c8331b93defe47cbb2fdc22e6b9be34ff3e413740fdd560e9e65f351e971e4b6e76026e0f1d763fe9147087731fb6cca676fb
-
Filesize
36KB
MD594761f27fa72c4bdb2d45be2cdf04efb
SHA16d04bf730177c2ee1983212f0629b0a3f8a4e282
SHA2565150267033febb410986eaf880d130da23a0fb6bdd2c5168c2bc4a31ebf7a335
SHA512bb2fd82e450695e2db0fcc6d74e5ea3f0b8e6480b826db81edc56d89cc43aaf4b91f94416d7b95e6065ef860bcdb60d4a05f74c69196a6565c1658f87fe56836
-
Filesize
4KB
MD57fafaffb26d10ccd1e9e8515736eb19e
SHA13a8985b5d460e95999b7aaeb97d0499d6786d59e
SHA25660ac349b5f05a99cf1540f257f6e8e7883005f09acbdaba45b7e4efa8e15e502
SHA512bd0403a0fe4ca971357d27e9a4473be2bb6d1d3e473ec50e433eb8bb963a431ec327a3805fa6064735d78c21bdfa071495bccddb608ec706a1a75b3cb673e88d
-
Filesize
876B
MD56e7eb6f5e0179e202be7764f9d00c8bb
SHA1d5cbba93d99851106288e4c97c391450ab0448c6
SHA256cf35d429ca845e04daffe82eeced792b2d58b5c5dbac1001289fcfe20cf29c50
SHA51293f6e4d321dc18e32d1cdcfc7ec23e5d769ecc32026e66d7a0f17ab5dff8a17c87e4e4b4ea988678d14b41f464f76d6c930aa260a4d52cdc2ea5dfc78e8b2880
-
Filesize
23KB
MD54ac903d0bf2b32bf52f33e92afa1258e
SHA1584530a02e2c5715b8b6ce0eb3d5645cb54959a1
SHA2564119033a1643e01e542214b773f3c56f907d1ef6ef9beb881ab5bae001a2f525
SHA51255bf10adfc0d8e8d93a15af52ab8c1b1b31a0f60a35895a3a6cc6ea6f1572d37f69a98fc601742747e3f5c8b3e186725ff945db0a0948a138de6e34a390c47af
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Cloud Config\CloudConfigLog~RFe5955a8.TMP
Filesize469B
MD5ad565e87640368b0737f001d3ef0b6e1
SHA114d7cf7f139d94d2afc78616b2703718238609a8
SHA2567f21b05f2926840850b2add26dbe64e497cc2081679067330236bbc1f5e51557
SHA51200640e413340a1cad4e1b7de8017c2cc1cc5ebaaf682734503036be8cd0e157de1162ec0a42ae70c8b2d3720ce39095591412cae3f650fa81c45dc884c9e6071
-
Filesize
22KB
MD556a63f182b2938fbe3e59fbf9681dc08
SHA1b76578ca24fb20b8bd5dafad4296e5a46735a5e1
SHA25636edc2510fb072092e4c6b95efe4521857d9dcb7f0b45afdf5e8ef02e5d19593
SHA512b17246b7c61e26fce1f211311b578d6b3d22c03a042137bb2bb5b23018ce5290a8fbf7a34b2f66fa30b2027296b8a570478f66a144385c320d63c1cef64434f8
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Cloud Config\OperationConfig~RFe5956a2.TMP
Filesize3KB
MD5c7569efb2fa9fe93c0ea2f0896f54036
SHA1e231c700b778b624f6065b035e5803fdd8b4db4b
SHA2562422f055fd21adce7a027c3eaab1bbc474345a26cb1b9762b3d7572ebde67d3f
SHA512c394da9a75cca87f6e20cb2abbc2e087d3e374b613bbc960f255ebfc8f01d4349fc8a487ec56ff8141f47566cf021dc33196e42b6295ce5399ff78e5ce4b066f
-
Filesize
30KB
MD5731ed574b4398ba5664c0445c9b07329
SHA14242e633f6aa1e041a08188ff4b58378d0ebf52d
SHA25653c76046fa832a778fce49c857e9291bcccc50b865d99e3b83c3e9bc4b28f8fe
SHA51207305a846b381a53c6507a2df25c5a2a28ee42d69335272b7bcd389de36d1fe8167c70330b3d793964f6c7350bae0641e164db040272150d7d68e50c23fef369
-
Filesize
6KB
MD5e4f12c3fe7fdc44f434bb33fb900553c
SHA1ecd8b61ede704acd2676cb96138e206a91b68d32
SHA2566db8cccba4affcdf6e6ed1dbf1c833fc1517a959bc979cf07ffb93a73b7fa269
SHA5124f44bb17918b8cf5529d8784a8de2727c7a8af7134ef7ccb5b1a1b8872bdc9149f6bc211fcc6f08752b5c98244aa156940d154e807047a567af3f6eef108de2d
-
Filesize
39KB
MD568a5c79dfa7f8aff145ef3278273e293
SHA1c457880637873ca5f3fba01a439a0f132a13caec
SHA25614ddb07a2e461592511384df93ab16c7d45422991498726ff6e5d3db9d03109a
SHA5126f8e4fba03e816e0b7e7203131449efe0387083909bfc35842def1bb48d05f96b5108a664fd9d34c51d61bdf330c78ef70e8fbcaa943fd05964c7ea53a6a8265
-
Filesize
7KB
MD57309c2850b3e57eb98926d93b8af9633
SHA109850dac2a2188504a1357c1bdba282c1fc9c213
SHA256796de522374fd95a79d7d45cee68b507f7a07ba118cc625d77fe159b0f1aee0c
SHA512c1c343c239da1c518bc0b9232d906bb11aa2926d9ed9c55b80f3f05499c2c7a6722c119333fad045eef60021a5ce1dbd9242637dc4b8d46edf51a8fa57cff368
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres
Filesize2KB
MD59be53d88ef497a88454a355ed341d73f
SHA1e0a405da5a84db2b5b5159cf8a5f4ce5e611948b
SHA256f73a1ca57b05151923e34155d16eae3dd58fa229cb6b5eb0ecacabf04e12c520
SHA512fb81a5dde8a82ce47db868059cb82c2c9c2d2896583a96811be44c5aa98f9b4c366330369a3438434a0f7447c64313da2d7c8f5f2481819aa009346ad7254784
-
Filesize
152KB
MD5dd9bf8448d3ddcfd067967f01e8bf6d7
SHA1d7829475b2bd6a3baa8fabfaf39af57c6439b35e
SHA256fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72
SHA51265347df34378c2bbb34417e2cccfb3251a0b2412422cc190eed9df525b6e0a9948e0295ea3c33b3ad873ce81e369e89a138ac41d6eb7229546c3269107e661de
-
Filesize
10KB
MD578e47dda17341bed7be45dccfd89ac87
SHA11afde30e46997452d11e4a2adbbf35cce7a1404f
SHA25667d161098be68cd24febc0c7b48f515f199dda72f20ae3bbb97fcf2542bb0550
SHA5129574a66d3756540479dc955c4057144283e09cae11ce11ebce801053bb48e536e67dc823b91895a9e3ee8d3cb27c065d5e9030c39a26cbf3f201348385b418a5
-
Filesize
1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84