Resubmissions
03/04/2025, 17:22
250403-vxwr1szzax 1003/04/2025, 17:16
250403-vtj9tazybz 603/04/2025, 17:12
250403-vq9ejasqy5 1003/04/2025, 17:08
250403-vnqveaspy5 1003/04/2025, 17:05
250403-vl1a3azvhv 6Analysis
-
max time kernel
199s -
max time network
204s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
03/04/2025, 17:12
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://malwarewatch.org/
Resource
win10v2004-20250314-en
Errors
General
-
Target
https://malwarewatch.org/
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "C:\\Users\\Admin\\AppData\\Local\\system.exe" reg.exe -
UAC bypass 3 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Executes dropped EXE 2 IoCs
pid Process 2180 system.exe 4732 system.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Antivirus = "\"C:\\Program Files (x86)\\AnVi\\avt.exe\" -noscan" [email protected] Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\System = "C:\\Users\\Admin\\AppData\\Local\\system.exe" reg.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\G: [email protected] File opened (read-only) \??\L: [email protected] File opened (read-only) \??\P: [email protected] File opened (read-only) \??\Q: [email protected] File opened (read-only) \??\S: [email protected] File opened (read-only) \??\W: [email protected] File opened (read-only) \??\E: [email protected] File opened (read-only) \??\J: [email protected] File opened (read-only) \??\T: [email protected] File opened (read-only) \??\U: [email protected] File opened (read-only) \??\V: [email protected] File opened (read-only) \??\Y: [email protected] File opened (read-only) \??\Z: [email protected] File opened (read-only) \??\A: [email protected] File opened (read-only) \??\H: [email protected] File opened (read-only) \??\I: [email protected] File opened (read-only) \??\K: [email protected] File opened (read-only) \??\N: [email protected] File opened (read-only) \??\X: [email protected] File opened (read-only) \??\B: [email protected] File opened (read-only) \??\M: [email protected] File opened (read-only) \??\O: [email protected] File opened (read-only) \??\R: [email protected] -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 5 IoCs
flow ioc 246 raw.githubusercontent.com 242 raw.githubusercontent.com 243 raw.githubusercontent.com 244 raw.githubusercontent.com 245 raw.githubusercontent.com -
Drops file in System32 directory 7 IoCs
description ioc Process File opened for modification C:\Windows\system32\wbem\repository\INDEX.BTR svchost.exe File opened for modification C:\Windows\system32\wbem\repository svchost.exe File opened for modification C:\Windows\system32\wbem\repository\WRITABLE.TST svchost.exe File opened for modification C:\Windows\system32\wbem\repository\MAPPING1.MAP svchost.exe File opened for modification C:\Windows\system32\wbem\repository\MAPPING2.MAP svchost.exe File opened for modification C:\Windows\system32\wbem\repository\MAPPING3.MAP svchost.exe File opened for modification C:\Windows\system32\wbem\repository\OBJECTS.DATA svchost.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\hu-hu\ui-strings.js.9CA25083A9A22154933F44B757F3DBD587E2051DDB943F3E02F969991D648208 [email protected] File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\home-view\selector.js.9CA25083A9A22154933F44B757F3DBD587E2051DDB943F3E02F969991D648208 [email protected] File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\Unicode\Mappings\Mac\CROATIAN.TXT.9CA25083A9A22154933F44B757F3DBD587E2051DDB943F3E02F969991D648208 [email protected] File created C:\Program Files\chrome_Unpacker_BeginUnzipping3936_1454099460\_locales\pa\messages.json msedge.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\images\themeless\mobile_reader_logo.svg.9CA25083A9A22154933F44B757F3DBD587E2051DDB943F3E02F969991D648208 [email protected] File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\ar-ae\ui-strings.js.9CA25083A9A22154933F44B757F3DBD587E2051DDB943F3E02F969991D648208 [email protected] File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\ru-ru\ui-strings.js.9CA25083A9A22154933F44B757F3DBD587E2051DDB943F3E02F969991D648208 [email protected] File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\images\themeless\Playstore\sv_get.svg.9CA25083A9A22154933F44B757F3DBD587E2051DDB943F3E02F969991D648208 [email protected] File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\132.0.2957.140\Locales\eu.pak.9CA25083A9A22154933F44B757F3DBD587E2051DDB943F3E02F969991D648208 [email protected] File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\s_comment_18.svg.9CA25083A9A22154933F44B757F3DBD587E2051DDB943F3E02F969991D648208 [email protected] File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\ko-kr\ui-strings.js.9CA25083A9A22154933F44B757F3DBD587E2051DDB943F3E02F969991D648208 [email protected] File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\home\images\files_icons2x.png.9CA25083A9A22154933F44B757F3DBD587E2051DDB943F3E02F969991D648208 [email protected] File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\pt-br\ui-strings.js.9CA25083A9A22154933F44B757F3DBD587E2051DDB943F3E02F969991D648208 [email protected] File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\sv-se\ui-strings.js.9CA25083A9A22154933F44B757F3DBD587E2051DDB943F3E02F969991D648208 [email protected] File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\uk-ua\ui-strings.js.9CA25083A9A22154933F44B757F3DBD587E2051DDB943F3E02F969991D648208 [email protected] File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\ja-jp\ui-strings.js.9CA25083A9A22154933F44B757F3DBD587E2051DDB943F3E02F969991D648208 [email protected] File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\tool\selector.js.9CA25083A9A22154933F44B757F3DBD587E2051DDB943F3E02F969991D648208 [email protected] File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\images\new_icons_retina.png.9CA25083A9A22154933F44B757F3DBD587E2051DDB943F3E02F969991D648208 [email protected] File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\cs-cz\ui-strings.js.9CA25083A9A22154933F44B757F3DBD587E2051DDB943F3E02F969991D648208 [email protected] File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\images\themes\dark\s_checkbox_unselected_18.svg.9CA25083A9A22154933F44B757F3DBD587E2051DDB943F3E02F969991D648208 [email protected] File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\img\tools\@1x\A12_Checkmark_White@1x.png.9CA25083A9A22154933F44B757F3DBD587E2051DDB943F3E02F969991D648208 [email protected] File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\Locales\ro.pak.9CA25083A9A22154933F44B757F3DBD587E2051DDB943F3E02F969991D648208 [email protected] File created C:\Program Files\chrome_Unpacker_BeginUnzipping3936_1454099460\_locales\km\messages.json msedge.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\back-arrow-focus.svg.9CA25083A9A22154933F44B757F3DBD587E2051DDB943F3E02F969991D648208 [email protected] File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\cs-cz\ui-strings.js.9CA25083A9A22154933F44B757F3DBD587E2051DDB943F3E02F969991D648208 [email protected] File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\plugins\rhp\combinepdf-selector.js.9CA25083A9A22154933F44B757F3DBD587E2051DDB943F3E02F969991D648208 [email protected] File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls\eu-es\ui-strings.js.9CA25083A9A22154933F44B757F3DBD587E2051DDB943F3E02F969991D648208 [email protected] File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\132.0.2957.140\BHO\ie_to_edge_bho.dll.9CA25083A9A22154933F44B757F3DBD587E2051DDB943F3E02F969991D648208 [email protected] File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\ResiliencyLinks\msedge.exe.sig.DATA.9CA25083A9A22154933F44B757F3DBD587E2051DDB943F3E02F969991D648208 [email protected] File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\ResiliencyLinks\Locales\cy.pak.DATA.9CA25083A9A22154933F44B757F3DBD587E2051DDB943F3E02F969991D648208 [email protected] File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\init.js.9CA25083A9A22154933F44B757F3DBD587E2051DDB943F3E02F969991D648208 [email protected] File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\hr-hr\ui-strings.js.9CA25083A9A22154933F44B757F3DBD587E2051DDB943F3E02F969991D648208 [email protected] File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\sk-sk\ui-strings.js.9CA25083A9A22154933F44B757F3DBD587E2051DDB943F3E02F969991D648208 [email protected] File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\nb-no\ui-strings.js.9CA25083A9A22154933F44B757F3DBD587E2051DDB943F3E02F969991D648208 [email protected] File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe.9CA25083A9A22154933F44B757F3DBD587E2051DDB943F3E02F969991D648208 [email protected] File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\es-ES\PSGet.Resource.psd1.9CA25083A9A22154933F44B757F3DBD587E2051DDB943F3E02F969991D648208 [email protected] File created C:\Program Files\chrome_Unpacker_BeginUnzipping3936_1454099460\_locales\th\messages.json msedge.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\s_sortedby_up_18.svg.9CA25083A9A22154933F44B757F3DBD587E2051DDB943F3E02F969991D648208 [email protected] File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\s_newfolder-default.svg.9CA25083A9A22154933F44B757F3DBD587E2051DDB943F3E02F969991D648208 [email protected] File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\plugin.js.9CA25083A9A22154933F44B757F3DBD587E2051DDB943F3E02F969991D648208 [email protected] File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\img\tools\themes\dark\line_2x.png.9CA25083A9A22154933F44B757F3DBD587E2051DDB943F3E02F969991D648208 [email protected] File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\Download_on_the_App_Store_Badge_zh_cn_135x40.svg.9CA25083A9A22154933F44B757F3DBD587E2051DDB943F3E02F969991D648208 [email protected] File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\nb-no\ui-strings.js.9CA25083A9A22154933F44B757F3DBD587E2051DDB943F3E02F969991D648208 [email protected] File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\images\themes\dark\close.svg.9CA25083A9A22154933F44B757F3DBD587E2051DDB943F3E02F969991D648208 [email protected] File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\s_sortedby_hover_18.svg.9CA25083A9A22154933F44B757F3DBD587E2051DDB943F3E02F969991D648208 [email protected] File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\ru-ru\ui-strings.js.9CA25083A9A22154933F44B757F3DBD587E2051DDB943F3E02F969991D648208 [email protected] File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files-select\js\plugin.js.9CA25083A9A22154933F44B757F3DBD587E2051DDB943F3E02F969991D648208 [email protected] File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\ja-jp\ui-strings.js.9CA25083A9A22154933F44B757F3DBD587E2051DDB943F3E02F969991D648208 [email protected] File opened for modification C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\1.3.147.37\msedgeupdateres_am.dll.9CA25083A9A22154933F44B757F3DBD587E2051DDB943F3E02F969991D648208 [email protected] File opened for modification C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\1.3.147.37\msedgeupdateres_cy.dll.9CA25083A9A22154933F44B757F3DBD587E2051DDB943F3E02F969991D648208 [email protected] File opened for modification C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\Workflow.VisualBasic.Targets.9CA25083A9A22154933F44B757F3DBD587E2051DDB943F3E02F969991D648208 [email protected] File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Tracker\bl.gif.9CA25083A9A22154933F44B757F3DBD587E2051DDB943F3E02F969991D648208 [email protected] File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\s_replace_signer_18.svg.9CA25083A9A22154933F44B757F3DBD587E2051DDB943F3E02F969991D648208 [email protected] File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\svgCheckboxUnselected.svg.9CA25083A9A22154933F44B757F3DBD587E2051DDB943F3E02F969991D648208 [email protected] File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\hr-hr\ui-strings.js.9CA25083A9A22154933F44B757F3DBD587E2051DDB943F3E02F969991D648208 [email protected] File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\eu-es\ui-strings.js.9CA25083A9A22154933F44B757F3DBD587E2051DDB943F3E02F969991D648208 [email protected] File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\images\themes\dark\sat_logo_2x.png.9CA25083A9A22154933F44B757F3DBD587E2051DDB943F3E02F969991D648208 [email protected] File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\images\themes\dark\SearchEmail.png.9CA25083A9A22154933F44B757F3DBD587E2051DDB943F3E02F969991D648208 [email protected] File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls\de-de\ui-strings.js.9CA25083A9A22154933F44B757F3DBD587E2051DDB943F3E02F969991D648208 [email protected] File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\s_download_audit_report_18.svg.9CA25083A9A22154933F44B757F3DBD587E2051DDB943F3E02F969991D648208 [email protected] File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\img\tools\check_2x.png.9CA25083A9A22154933F44B757F3DBD587E2051DDB943F3E02F969991D648208 [email protected] File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\Localized_images\en-us\PlayStore_icon.svg.9CA25083A9A22154933F44B757F3DBD587E2051DDB943F3E02F969991D648208 [email protected] File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\images\themeless\Playstore\zh-cn_get.svg.9CA25083A9A22154933F44B757F3DBD587E2051DDB943F3E02F969991D648208 [email protected] File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\images\download-btn.png.9CA25083A9A22154933F44B757F3DBD587E2051DDB943F3E02F969991D648208 [email protected] -
System Location Discovery: System Language Discovery 1 TTPs 35 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language [email protected] Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language [email protected] Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language [email protected] Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language system.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mofcomp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SCHTASKS.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language system.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language shutdown.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 [email protected] Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString [email protected] -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\Software\Microsoft\Internet Explorer\Main [email protected] Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Use FormSuggest = "Yes" [email protected] -
Modifies data under HKEY_USERS 17 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "124" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4288567808" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry msedge.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133881739957631978" msedge.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = a6d8ff0076b9ed00429ce3000078d700005a9e000042750000264200f7630c00 LogonUI.exe -
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-308834014-1004923324-1191300197-1000\{F4A6BBDD-D01C-4EC6-8C25-C1065991FFD3} msedge.exe Key created \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000_Classes\Local Settings msedge.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-308834014-1004923324-1191300197-1000\{7C4E429B-FC38-45A6-A08A-80C4F88D3A6E} [email protected] -
Runs net.exe
-
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2712 SCHTASKS.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
-
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeSecurityPrivilege 5544 mofcomp.exe Token: SeAssignPrimaryTokenPrivilege 6112 svchost.exe Token: SeIncreaseQuotaPrivilege 6112 svchost.exe Token: SeSecurityPrivilege 6112 svchost.exe Token: SeTakeOwnershipPrivilege 6112 svchost.exe Token: SeLoadDriverPrivilege 6112 svchost.exe Token: SeSystemtimePrivilege 6112 svchost.exe Token: SeBackupPrivilege 6112 svchost.exe Token: SeRestorePrivilege 6112 svchost.exe Token: SeShutdownPrivilege 6112 svchost.exe Token: SeSystemEnvironmentPrivilege 6112 svchost.exe Token: SeUndockPrivilege 6112 svchost.exe Token: SeManageVolumePrivilege 6112 svchost.exe Token: SeAssignPrimaryTokenPrivilege 6112 svchost.exe Token: SeIncreaseQuotaPrivilege 6112 svchost.exe Token: SeSecurityPrivilege 6112 svchost.exe Token: SeTakeOwnershipPrivilege 6112 svchost.exe Token: SeLoadDriverPrivilege 6112 svchost.exe Token: SeSystemtimePrivilege 6112 svchost.exe Token: SeBackupPrivilege 6112 svchost.exe Token: SeRestorePrivilege 6112 svchost.exe Token: SeShutdownPrivilege 6112 svchost.exe Token: SeSystemEnvironmentPrivilege 6112 svchost.exe Token: SeUndockPrivilege 6112 svchost.exe Token: SeManageVolumePrivilege 6112 svchost.exe Token: SeAssignPrimaryTokenPrivilege 6112 svchost.exe Token: SeIncreaseQuotaPrivilege 6112 svchost.exe Token: SeSecurityPrivilege 6112 svchost.exe Token: SeTakeOwnershipPrivilege 6112 svchost.exe Token: SeLoadDriverPrivilege 6112 svchost.exe Token: SeSystemtimePrivilege 6112 svchost.exe Token: SeBackupPrivilege 6112 svchost.exe Token: SeRestorePrivilege 6112 svchost.exe Token: SeShutdownPrivilege 6112 svchost.exe Token: SeSystemEnvironmentPrivilege 6112 svchost.exe Token: SeUndockPrivilege 6112 svchost.exe Token: SeManageVolumePrivilege 6112 svchost.exe Token: SeAssignPrimaryTokenPrivilege 6112 svchost.exe Token: SeIncreaseQuotaPrivilege 6112 svchost.exe Token: SeSecurityPrivilege 6112 svchost.exe Token: SeTakeOwnershipPrivilege 6112 svchost.exe Token: SeLoadDriverPrivilege 6112 svchost.exe Token: SeSystemtimePrivilege 6112 svchost.exe Token: SeBackupPrivilege 6112 svchost.exe Token: SeRestorePrivilege 6112 svchost.exe Token: SeShutdownPrivilege 6112 svchost.exe Token: SeSystemEnvironmentPrivilege 6112 svchost.exe Token: SeUndockPrivilege 6112 svchost.exe Token: SeManageVolumePrivilege 6112 svchost.exe Token: SeAssignPrimaryTokenPrivilege 6112 svchost.exe Token: SeIncreaseQuotaPrivilege 6112 svchost.exe Token: SeSecurityPrivilege 6112 svchost.exe Token: SeTakeOwnershipPrivilege 6112 svchost.exe Token: SeLoadDriverPrivilege 6112 svchost.exe Token: SeSystemtimePrivilege 6112 svchost.exe Token: SeBackupPrivilege 6112 svchost.exe Token: SeRestorePrivilege 6112 svchost.exe Token: SeShutdownPrivilege 6112 svchost.exe Token: SeSystemEnvironmentPrivilege 6112 svchost.exe Token: SeUndockPrivilege 6112 svchost.exe Token: SeManageVolumePrivilege 6112 svchost.exe Token: SeAssignPrimaryTokenPrivilege 6112 svchost.exe Token: SeIncreaseQuotaPrivilege 6112 svchost.exe Token: SeSecurityPrivilege 6112 svchost.exe -
Suspicious use of FindShellTrayWindow 50 IoCs
pid Process 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 1616 [email protected] 1616 [email protected] 1616 [email protected] 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe -
Suspicious use of SendNotifyMessage 27 IoCs
pid Process 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 1616 [email protected] 1616 [email protected] 1616 [email protected] -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 1616 [email protected] 1616 [email protected] 1616 [email protected] 1616 [email protected] 1616 [email protected] 1616 [email protected] 1616 [email protected] 1616 [email protected] 1616 [email protected] 1616 [email protected] 1616 [email protected] 1616 [email protected] 2636 LogonUI.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3936 wrote to memory of 5848 3936 msedge.exe 88 PID 3936 wrote to memory of 5848 3936 msedge.exe 88 PID 3936 wrote to memory of 1464 3936 msedge.exe 89 PID 3936 wrote to memory of 1464 3936 msedge.exe 89 PID 3936 wrote to memory of 5564 3936 msedge.exe 90 PID 3936 wrote to memory of 5564 3936 msedge.exe 90 PID 3936 wrote to memory of 5564 3936 msedge.exe 90 PID 3936 wrote to memory of 5564 3936 msedge.exe 90 PID 3936 wrote to memory of 5564 3936 msedge.exe 90 PID 3936 wrote to memory of 5564 3936 msedge.exe 90 PID 3936 wrote to memory of 5564 3936 msedge.exe 90 PID 3936 wrote to memory of 5564 3936 msedge.exe 90 PID 3936 wrote to memory of 5564 3936 msedge.exe 90 PID 3936 wrote to memory of 5564 3936 msedge.exe 90 PID 3936 wrote to memory of 5564 3936 msedge.exe 90 PID 3936 wrote to memory of 5564 3936 msedge.exe 90 PID 3936 wrote to memory of 5564 3936 msedge.exe 90 PID 3936 wrote to memory of 5564 3936 msedge.exe 90 PID 3936 wrote to memory of 5564 3936 msedge.exe 90 PID 3936 wrote to memory of 5564 3936 msedge.exe 90 PID 3936 wrote to memory of 5564 3936 msedge.exe 90 PID 3936 wrote to memory of 5564 3936 msedge.exe 90 PID 3936 wrote to memory of 5564 3936 msedge.exe 90 PID 3936 wrote to memory of 5564 3936 msedge.exe 90 PID 3936 wrote to memory of 5564 3936 msedge.exe 90 PID 3936 wrote to memory of 5564 3936 msedge.exe 90 PID 3936 wrote to memory of 5564 3936 msedge.exe 90 PID 3936 wrote to memory of 5564 3936 msedge.exe 90 PID 3936 wrote to memory of 5564 3936 msedge.exe 90 PID 3936 wrote to memory of 5564 3936 msedge.exe 90 PID 3936 wrote to memory of 5564 3936 msedge.exe 90 PID 3936 wrote to memory of 5564 3936 msedge.exe 90 PID 3936 wrote to memory of 5564 3936 msedge.exe 90 PID 3936 wrote to memory of 5564 3936 msedge.exe 90 PID 3936 wrote to memory of 5564 3936 msedge.exe 90 PID 3936 wrote to memory of 5564 3936 msedge.exe 90 PID 3936 wrote to memory of 5564 3936 msedge.exe 90 PID 3936 wrote to memory of 5564 3936 msedge.exe 90 PID 3936 wrote to memory of 5564 3936 msedge.exe 90 PID 3936 wrote to memory of 5564 3936 msedge.exe 90 PID 3936 wrote to memory of 5564 3936 msedge.exe 90 PID 3936 wrote to memory of 5564 3936 msedge.exe 90 PID 3936 wrote to memory of 5564 3936 msedge.exe 90 PID 3936 wrote to memory of 5564 3936 msedge.exe 90 PID 3936 wrote to memory of 5564 3936 msedge.exe 90 PID 3936 wrote to memory of 5564 3936 msedge.exe 90 PID 3936 wrote to memory of 5564 3936 msedge.exe 90 PID 3936 wrote to memory of 5564 3936 msedge.exe 90 PID 3936 wrote to memory of 5564 3936 msedge.exe 90 PID 3936 wrote to memory of 5564 3936 msedge.exe 90 PID 3936 wrote to memory of 5564 3936 msedge.exe 90 PID 3936 wrote to memory of 5564 3936 msedge.exe 90 PID 3936 wrote to memory of 5564 3936 msedge.exe 90 PID 3936 wrote to memory of 5564 3936 msedge.exe 90 PID 3936 wrote to memory of 5564 3936 msedge.exe 90 PID 3936 wrote to memory of 4660 3936 msedge.exe 91 PID 3936 wrote to memory of 4660 3936 msedge.exe 91 PID 3936 wrote to memory of 4660 3936 msedge.exe 91 PID 3936 wrote to memory of 4660 3936 msedge.exe 91 PID 3936 wrote to memory of 4660 3936 msedge.exe 91 PID 3936 wrote to memory of 4660 3936 msedge.exe 91 PID 3936 wrote to memory of 4660 3936 msedge.exe 91 PID 3936 wrote to memory of 4660 3936 msedge.exe 91 PID 3936 wrote to memory of 4660 3936 msedge.exe 91
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://malwarewatch.org/1⤵
- Drops file in Program Files directory
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3936 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x23c,0x240,0x244,0x238,0x250,0x7ff9e194f208,0x7ff9e194f214,0x7ff9e194f2202⤵PID:5848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1916,i,753489750415539582,3885092396391033568,262144 --variations-seed-version --mojo-platform-channel-handle=2288 /prefetch:32⤵PID:1464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2252,i,753489750415539582,3885092396391033568,262144 --variations-seed-version --mojo-platform-channel-handle=2248 /prefetch:22⤵PID:5564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2720,i,753489750415539582,3885092396391033568,262144 --variations-seed-version --mojo-platform-channel-handle=2728 /prefetch:82⤵PID:4660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3492,i,753489750415539582,3885092396391033568,262144 --variations-seed-version --mojo-platform-channel-handle=3528 /prefetch:12⤵PID:4716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3484,i,753489750415539582,3885092396391033568,262144 --variations-seed-version --mojo-platform-channel-handle=3524 /prefetch:12⤵PID:4724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --always-read-main-dll --field-trial-handle=4824,i,753489750415539582,3885092396391033568,262144 --variations-seed-version --mojo-platform-channel-handle=4336 /prefetch:12⤵PID:5876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5492,i,753489750415539582,3885092396391033568,262144 --variations-seed-version --mojo-platform-channel-handle=5472 /prefetch:82⤵PID:3040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5484,i,753489750415539582,3885092396391033568,262144 --variations-seed-version --mojo-platform-channel-handle=5552 /prefetch:82⤵PID:2952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6192,i,753489750415539582,3885092396391033568,262144 --variations-seed-version --mojo-platform-channel-handle=6216 /prefetch:82⤵PID:2284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6192,i,753489750415539582,3885092396391033568,262144 --variations-seed-version --mojo-platform-channel-handle=6216 /prefetch:82⤵PID:3304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6352,i,753489750415539582,3885092396391033568,262144 --variations-seed-version --mojo-platform-channel-handle=6360 /prefetch:82⤵PID:5792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6272,i,753489750415539582,3885092396391033568,262144 --variations-seed-version --mojo-platform-channel-handle=6304 /prefetch:82⤵PID:1604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6304,i,753489750415539582,3885092396391033568,262144 --variations-seed-version --mojo-platform-channel-handle=5212 /prefetch:82⤵PID:3820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5200,i,753489750415539582,3885092396391033568,262144 --variations-seed-version --mojo-platform-channel-handle=6456 /prefetch:82⤵PID:3364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6292,i,753489750415539582,3885092396391033568,262144 --variations-seed-version --mojo-platform-channel-handle=6364 /prefetch:82⤵PID:4952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6284,i,753489750415539582,3885092396391033568,262144 --variations-seed-version --mojo-platform-channel-handle=6312 /prefetch:82⤵PID:4572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --always-read-main-dll --field-trial-handle=6232,i,753489750415539582,3885092396391033568,262144 --variations-seed-version --mojo-platform-channel-handle=6448 /prefetch:12⤵PID:1952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5128,i,753489750415539582,3885092396391033568,262144 --variations-seed-version --mojo-platform-channel-handle=5160 /prefetch:82⤵PID:3364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5468,i,753489750415539582,3885092396391033568,262144 --variations-seed-version --mojo-platform-channel-handle=5756 /prefetch:82⤵PID:6088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --always-read-main-dll --field-trial-handle=3780,i,753489750415539582,3885092396391033568,262144 --variations-seed-version --mojo-platform-channel-handle=3740 /prefetch:12⤵PID:1268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --lang=en-US --service-sandbox-type=collections --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5204,i,753489750415539582,3885092396391033568,262144 --variations-seed-version --mojo-platform-channel-handle=5496 /prefetch:82⤵PID:2008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6816,i,753489750415539582,3885092396391033568,262144 --variations-seed-version --mojo-platform-channel-handle=6796 /prefetch:82⤵PID:4148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=7028,i,753489750415539582,3885092396391033568,262144 --variations-seed-version --mojo-platform-channel-handle=6900 /prefetch:82⤵PID:3896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --always-read-main-dll --field-trial-handle=6896,i,753489750415539582,3885092396391033568,262144 --variations-seed-version --mojo-platform-channel-handle=3788 /prefetch:12⤵PID:1784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5108,i,753489750415539582,3885092396391033568,262144 --variations-seed-version --mojo-platform-channel-handle=6928 /prefetch:82⤵PID:1736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6280,i,753489750415539582,3885092396391033568,262144 --variations-seed-version --mojo-platform-channel-handle=3536 /prefetch:82⤵PID:516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=30 --always-read-main-dll --field-trial-handle=3632,i,753489750415539582,3885092396391033568,262144 --variations-seed-version --mojo-platform-channel-handle=5268 /prefetch:12⤵PID:5392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --string-annotations --gpu-preferences=UAAAAAAAAADoAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAABCAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=3672,i,753489750415539582,3885092396391033568,262144 --variations-seed-version --mojo-platform-channel-handle=7016 /prefetch:82⤵PID:4188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=32 --always-read-main-dll --field-trial-handle=3728,i,753489750415539582,3885092396391033568,262144 --variations-seed-version --mojo-platform-channel-handle=5496 /prefetch:12⤵PID:4048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=33 --always-read-main-dll --field-trial-handle=6824,i,753489750415539582,3885092396391033568,262144 --variations-seed-version --mojo-platform-channel-handle=3752 /prefetch:12⤵PID:4608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=7056,i,753489750415539582,3885092396391033568,262144 --variations-seed-version --mojo-platform-channel-handle=3648 /prefetch:82⤵PID:5040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=756,i,753489750415539582,3885092396391033568,262144 --variations-seed-version --mojo-platform-channel-handle=6308 /prefetch:82⤵PID:5456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:4764
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start1⤵PID:2276
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start2⤵PID:5084
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1004
-
C:\Users\Admin\AppData\Local\Temp\Temp1_Antivirus.zip\[email protected]"C:\Users\Admin\AppData\Local\Temp\Temp1_Antivirus.zip\[email protected]"1⤵
- Adds Run key to start application
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1616 -
C:\Windows\SysWOW64\net.exenet stop wscsvc2⤵
- System Location Discovery: System Language Discovery
PID:3040 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wscsvc3⤵
- System Location Discovery: System Language Discovery
PID:5944
-
-
-
C:\Windows\SysWOW64\net.exenet stop winmgmt /y2⤵
- System Location Discovery: System Language Discovery
PID:2228 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop winmgmt /y3⤵
- System Location Discovery: System Language Discovery
PID:3152
-
-
-
C:\Windows\SysWOW64\net.exenet start winmgmt2⤵
- System Location Discovery: System Language Discovery
PID:2516 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start winmgmt3⤵
- System Location Discovery: System Language Discovery
PID:1076
-
-
-
C:\Windows\SysWOW64\net.exenet start wscsvc2⤵
- System Location Discovery: System Language Discovery
PID:1892 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start wscsvc3⤵
- System Location Discovery: System Language Discovery
PID:404
-
-
-
C:\Windows\SysWOW64\Wbem\mofcomp.exemofcomp C:\Users\Admin\AppData\Local\Temp\4otjesjty.mof2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5544
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Program Files (x86)\AnVi\avt.exe" -noscan1⤵PID:2364
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt1⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:6112
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x46c 0x2f41⤵PID:860
-
C:\Users\Admin\AppData\Local\Temp\Temp1_InfinityCrypt.zip\[email protected]"C:\Users\Admin\AppData\Local\Temp\Temp1_InfinityCrypt.zip\[email protected]"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:3912
-
C:\Users\Admin\AppData\Local\Temp\Temp1_7ev3n.zip\[email protected]"C:\Users\Admin\AppData\Local\Temp\Temp1_7ev3n.zip\[email protected]"1⤵
- System Location Discovery: System Language Discovery
PID:2332 -
C:\Users\Admin\AppData\Local\system.exe"C:\Users\Admin\AppData\Local\system.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2180 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\del.bat3⤵
- System Location Discovery: System Language Discovery
PID:3292
-
-
C:\Windows\SysWOW64\SCHTASKS.exeC:\Windows\System32\SCHTASKS.exe /create /SC ONLOGON /TN uac /TR "C:\Users\Admin\AppData\Local\bcd.bat" /RL HIGHEST /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2712
-
-
C:\windows\SysWOW64\cmd.exeC:\windows\system32\cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon" /v "Shell" /t REG_SZ /d "C:\Users\Admin\AppData\Local\system.exe" /f /reg:643⤵
- System Location Discovery: System Language Discovery
PID:2768 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon" /v "Shell" /t REG_SZ /d "C:\Users\Admin\AppData\Local\system.exe" /f /reg:644⤵
- Modifies WinLogon for persistence
- System Location Discovery: System Language Discovery
PID:4880
-
-
-
C:\windows\SysWOW64\cmd.exeC:\windows\system32\cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "System" /t REG_SZ /d "C:\Users\Admin\AppData\Local\system.exe" /f /reg:643⤵
- System Location Discovery: System Language Discovery
PID:5048 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "System" /t REG_SZ /d "C:\Users\Admin\AppData\Local\system.exe" /f /reg:644⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:4288
-
-
-
C:\windows\SysWOW64\cmd.exeC:\windows\system32\cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layout" /v "Scancode Map" /t REG_BINARY /d "00000000000000001700000000003800000038e000005be000005ce00000360000001d0000001de000000f000000010000001c0000003e0000003b00000044000000450000003d0000005de000000000" /f /reg:643⤵
- System Location Discovery: System Language Discovery
PID:5940 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layout" /v "Scancode Map" /t REG_BINARY /d "00000000000000001700000000003800000038e000005be000005ce00000360000001d0000001de000000f000000010000001c0000003e0000003b00000044000000450000003d0000005de000000000" /f /reg:644⤵
- System Location Discovery: System Language Discovery
PID:3564
-
-
-
C:\windows\SysWOW64\cmd.exeC:\windows\system32\cmd.exe /c REG ADD "HKEY_CURRENT_USER\Control Panel\Accessibility\StickyKeys" /v "Flags" /t REG_SZ /d 506 /f /reg:643⤵
- System Location Discovery: System Language Discovery
PID:1340 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_CURRENT_USER\Control Panel\Accessibility\StickyKeys" /v "Flags" /t REG_SZ /d 506 /f /reg:644⤵
- System Location Discovery: System Language Discovery
PID:2292
-
-
-
C:\windows\SysWOW64\cmd.exeC:\windows\system32\cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion" /v "rgd_bcd_condition" /t REG_SZ /d 1 /f /reg:643⤵
- System Location Discovery: System Language Discovery
PID:1588 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion" /v "rgd_bcd_condition" /t REG_SZ /d 1 /f /reg:644⤵
- System Location Discovery: System Language Discovery
PID:2936
-
-
-
C:\windows\SysWOW64\cmd.exeC:\windows\system32\cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "EnableLUA" /t REG_DWORD /d 0 /f /reg:643⤵
- System Location Discovery: System Language Discovery
PID:5708 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "EnableLUA" /t REG_DWORD /d 0 /f /reg:644⤵
- UAC bypass
- System Location Discovery: System Language Discovery
PID:3932
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion" /v "crypted" /t REG_SZ /d 1 /f /reg:643⤵
- System Location Discovery: System Language Discovery
PID:3228 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion" /v "crypted" /t REG_SZ /d 1 /f /reg:644⤵
- System Location Discovery: System Language Discovery
PID:6008
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c shutdown -r -t 10 -f3⤵
- System Location Discovery: System Language Discovery
PID:5364 -
C:\Windows\SysWOW64\shutdown.exeshutdown -r -t 10 -f4⤵
- System Location Discovery: System Language Discovery
PID:388
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\system.exe1⤵PID:5736
-
C:\Users\Admin\AppData\Local\system.exeC:\Users\Admin\AppData\Local\system.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4732 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\del.bat3⤵
- System Location Discovery: System Language Discovery
PID:2552
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion" /v "crypted" /t REG_SZ /d 1 /f /reg:643⤵
- System Location Discovery: System Language Discovery
PID:4288 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion" /v "crypted" /t REG_SZ /d 1 /f /reg:644⤵
- System Location Discovery: System Language Discovery
PID:3488
-
-
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa38fa055 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:2636
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\icudtl.dat.9CA25083A9A22154933F44B757F3DBD587E2051DDB943F3E02F969991D648208
Filesize16B
MD55cada866005a2e958cc23a0a88188d6c
SHA17412aca68c8e9b1125e9a78e833b533cf5bff6dc
SHA25605b571dd93ac9eee88c6c6f2c500041c67941cc3204802b5593535b9fc46aa9b
SHA512afa0c18d4216847e87819902858d4fac57435cf4a69cb4740e0099bfc52e0b78a532dd2a39ffa17dbf1bed61b4d37b89b25302202337ad754724d4f129de1e84
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\s_remove_18.svg.9CA25083A9A22154933F44B757F3DBD587E2051DDB943F3E02F969991D648208
Filesize720B
MD5ea9919c5343d6acb41e66d2bb88702a5
SHA18a9a2686bf1f33e572bf72408b0db609bb20919d
SHA256fc2907bb2b681b70fcd0808d49d4582927eaecb1f6e5c2dbea9f7712e33ca2fb
SHA512d989e164f6e93b8d79152ae14d477e63c2bb6d18e3ce51e11965849da814018e5e1c5f741f2221ca957ac17270f4b9c097313ef964164adfd666409c708df093
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\images\example_icons.png.9CA25083A9A22154933F44B757F3DBD587E2051DDB943F3E02F969991D648208
Filesize688B
MD504ea3f516a17e26d28a965789fa4e639
SHA18afca7b69ca6f7a113060c732349cd6ad20f914f
SHA256745128fdcaf58af203da75d5170fb62a190bd6328c9c95bedf8356e2929b1c7f
SHA512d81495bd6124f97788bf6b860685ab55c4a59061db3cba4d0a6fdd5b33ebdf626a01b6ec78bc36c0a634573504fb782df56c5a2ea8affba53fd8a72840e9d289
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\images\example_icons2x.png.9CA25083A9A22154933F44B757F3DBD587E2051DDB943F3E02F969991D648208
Filesize1KB
MD561ef6314704bcc099c22f5e154a8fa44
SHA15e62f3752bb0470eb8fbaa16894d83b579239893
SHA2564fd4a7380912253a36eb4d6ddf124e3a7174bc2a7b3337d8eb1c66cd0f62006f
SHA5122348a261856f77ca960d95c89e7c26309cbfb7c75db2cc6620fd534b5c60980b5990cede049eb0513774eb9bbb9e563be0369f3098c43fa692ded5d00dca3c55
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\images\rhp_world_icon.png.9CA25083A9A22154933F44B757F3DBD587E2051DDB943F3E02F969991D648208
Filesize448B
MD55ecd65e34cb7bfe299c04ddea47886ad
SHA16bc78b78c6ad2b5680e3606f7e05ddcd8ac69e59
SHA2561141c36585cc1265cdd38fa345c2f49dc1c3c9005812448439a2a20de3228fa6
SHA512ba0add76756f47cb50d942d2e684637d1d6f21e619ef867c32b503e06e6e4e75c0ad9f7ebb75c8285d53107112108624abc43c66e2051a92ca144c99f97cb71e
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\images\rhp_world_icon_2x.png.9CA25083A9A22154933F44B757F3DBD587E2051DDB943F3E02F969991D648208
Filesize624B
MD5c8aa54e51da6d47d8c6148e24f0a5bd6
SHA1599c9e88c4a391ef3af67910f48a053c7fce7cc8
SHA256b4bb6dcbe44e3cbc64099e959076a976f241eb8944c4ed4f2e013663660cd3c2
SHA5122bfad122cb11b12fd742d900a626eff4c21aca429c7140a27f30db59a8b4d95d07878ea295a45bbd7e508dbf95af1f2709c4be4570162f2a0a9cb151cc58da54
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\images\rhp_world_icon_hover.png.9CA25083A9A22154933F44B757F3DBD587E2051DDB943F3E02F969991D648208
Filesize400B
MD5d239d675f55bb382ac0c2f9b3dcca4f1
SHA1cf0575f7c551aa4ecd6bb491db8261027a6c882f
SHA256d0c7e89db3e738d2e01af4df6a413e285d62fc2b33f0d7f0e6df5c4723d1d81b
SHA512ea6950a9fe60a16fec6f69b7bc9349b393dd81b6e7e4b5694ab061dfc135e24cf8817d68b728433844e259f67be82b243502b2d593c593b1905b3e04269b8f5c
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\images\rhp_world_icon_hover_2x.png.9CA25083A9A22154933F44B757F3DBD587E2051DDB943F3E02F969991D648208
Filesize560B
MD57a4c22a600707e922c7ae54fbe83aba2
SHA12ffac182742d35abf37eb2dca228afae55e60ea8
SHA2566dc78cbe5a8487c983df6e8ddade8b4f82937b7f14afa158a62aa6302bbf72e1
SHA512d398b6d6ab45892618f38e76bf49e5032d7b01da98703004acfa84a5ba8a8f4cc6d41d4a1b4c38987840aa81b8806b69cfa1e24d04b0ae86720a688dd3d7ed06
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\images\themes\dark\rhp_world_icon.png.9CA25083A9A22154933F44B757F3DBD587E2051DDB943F3E02F969991D648208
Filesize400B
MD5f5619e3121459340c4013ac3edb0da9c
SHA1232f8d7e70b37f58b03d40ed45017941c4361235
SHA256cf8f0f6a8ef80e9af1c8a5e5bdba48502d83f00076e42a370233e6298e678875
SHA5122a7eb35b3babb6ab0e6a367dfa45a6592dedc7e7ee0ef5aeac9a4f34d25e553109b494973ec3f0f2c7cbd8370ff00f94c1e383803b215a03ccbf13d25e8b0442
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\images\themes\dark\rhp_world_icon_2x.png.9CA25083A9A22154933F44B757F3DBD587E2051DDB943F3E02F969991D648208
Filesize560B
MD58db3a3f335e1b1dac0d658c696f54d81
SHA1500c61b293dcde3c5a8e2a96690212a76fa961b4
SHA256fbda42e9d49cae210f7f3fce2b53baa85f0c518e3d14c87d9dadc9080170fa42
SHA51257bef8298df4051a05b27856158937c0ca22800161973c96495995739e88d50c1d824b9f5b732cb035c9ad9e1a6c402d46cf7a884d766d9c033b9202ae8b1a43
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\images\themes\dark\rhp_world_icon_hover.png.9CA25083A9A22154933F44B757F3DBD587E2051DDB943F3E02F969991D648208
Filesize400B
MD571bb143457e4e7e6fdd0ccd5732b453b
SHA12332592e6cd6b2a8b54bee63577260ef6af2cefd
SHA25665d16918af8b4bb22799f6d0ff14c74ed1cd785f68938da1b043dcafc7b910c9
SHA51200b1bbcd2d0c4586ea9157921daddaaf618799a3ad0e833babe67e829749e436f6d9313037439505306bf1f63f19d98cf7a732828f6023395c9606ec171fb68b
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\images\themes\dark\rhp_world_icon_hover_2x.png.9CA25083A9A22154933F44B757F3DBD587E2051DDB943F3E02F969991D648208
Filesize560B
MD5f69ba59cf910f46ef110c1953903ba95
SHA163b49576475778362c54f63f8c12ad4c31000cc3
SHA2562d5c9ed02a69ba311a288ef47b94d188806bace224d05288e99048e76423af1e
SHA5124fc9c7b0b888d757a8b8eb4721c3cb7bb861c153294b4356432f1a1e8a97cf76e4c3fdcf61a1cb016bfc4db72917dde56dd153b02c6a593be64374e97097a43a
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\images\icons.png.9CA25083A9A22154933F44B757F3DBD587E2051DDB943F3E02F969991D648208
Filesize7KB
MD5c24a975694b923c28f48ee147c5615f2
SHA12142ebf37e649a9ca9b80334a7d67b45b8a1db6d
SHA256a18146324a5c766cc8792bc90174055b163ae17aa827e32317b78010e6dc7765
SHA512944aae10ef9f1d46088c8c4258076751ec733d06614bc1655628e099e83bb75db2883c173de08a7d2ee4d87a33070ffaae7ea20413ae8b67b910868ac5740c56
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\images\icons_ie8.gif.9CA25083A9A22154933F44B757F3DBD587E2051DDB943F3E02F969991D648208
Filesize7KB
MD58e326416c4af9b1e59f33e5bbc444609
SHA1250d6272769544b9706412a225ae1a948860ff1b
SHA256cc2e680e6c7e30adbbaab507cc49188939ca09d64c8b9da617ecd86170ac2707
SHA5125d9a874f523f7361ce661a16cdfa4a1c3db5bb65df2aac796936982bb7a491ed7e20189b52d3ebfd1caa8dd409dec4bbbb4c174d6f12ffe8ea855ccafb8d5648
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\images\icons_retina.png.9CA25083A9A22154933F44B757F3DBD587E2051DDB943F3E02F969991D648208
Filesize15KB
MD5a0f2f49b7b42ce85b6f3399448dd42f5
SHA14daca909ba6e7020c6bcd401ac474eecf07d8e20
SHA256606365e901b1d74b977e301111e1e9b9d5e4c42ceb81811cbc1f1961cfcdbc43
SHA51262a451b9a82287f2bbba0ddf0bc3fa60458bb42dd0818c254f5288ea7ec40f859b6d72bb0726c7cf99c52186537d961ef526cf8e1dfac955c02d3b679af3f5f7
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\images\new_icons.png.9CA25083A9A22154933F44B757F3DBD587E2051DDB943F3E02F969991D648208
Filesize8KB
MD5bf82369e96339aef7cbecccbea2f8d37
SHA1f88d5195a9fb08c10d6cfaceff3a8cad503a2b13
SHA256f52997685449f3eabbfc67c45e4ecb2bb6f956a229db25463ce77f61c5c0d72d
SHA5124d88a354c23e25ac201fd3fa42fb22aa796fee31692ffd420625cb9ac27b5f5739384fdd696bd2441ad3e2de741a42b46e30980cccc5ed1ef9c2b001f5713022
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\images\new_icons_retina.png.9CA25083A9A22154933F44B757F3DBD587E2051DDB943F3E02F969991D648208
Filesize17KB
MD58d0f992edf15bcd63022093d96c47b4b
SHA12735afd3578d11b2fadab83bc4b922782cb78d14
SHA2566e87353bcbe4601ed846f12eb96a4aad3aaa29caadd82e59f6046c4d5831a938
SHA51227057d437376a94f0abf6080610c861cfd4ab1eedb14dd60b53b04c734cbd23c63c03ac6e9779a2073094db9e2fea3034d9d1cc028bdaf06f9f92a02a8466ddb
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\images\bg_pattern_RHP.png.9CA25083A9A22154933F44B757F3DBD587E2051DDB943F3E02F969991D648208
Filesize192B
MD50a50a855602c1d89618b374dd3bb910a
SHA19cc85b4908476e2c3b232856b82987425d67a9b1
SHA2565c59cef2ccfea42eb6bf2f2807f8f475692f6ee0b4c294fd7bd672898068e0dc
SHA512dffb3f0b4bf5a7735111aef2ede144aac3da97cb101897c1073e68dc3cead6ae92536a51bbc245e65f576552dcfd062a3ec9c2625eccbcc243526361b17d2100
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\images\bg_patterns_header.png.9CA25083A9A22154933F44B757F3DBD587E2051DDB943F3E02F969991D648208
Filesize704B
MD57d818279bbadf25b5055680cd7564095
SHA1e73902113c006341157f1a3c6841695665348873
SHA2564b0327a8c7367d86c714abff86953ca6d4815222130f71764e6878229f10dfd8
SHA51296c57bf3bb3efbc36d89f2f14cd66cca32d3f2ba46e242509177f4cca794af9d7b2b3b3aa6a5edd1b5108e149c5bc8ee0baf2f54b4442041be0399bffe1be23a
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\images\illustrations.png.9CA25083A9A22154933F44B757F3DBD587E2051DDB943F3E02F969991D648208
Filesize8KB
MD505a76450acf1810e07df1b6d86a2b3d2
SHA16f18ebdfb0a64715d55d81f8238efbb18bb27b4d
SHA256330737b66c8b3f1625545f64c91965f36fd5ed984a8c3df581f85185bd5df925
SHA51222c975b3d0d125af0de5496ada95870ee283259f4650ba542b5391d235dc0ea433881ff2e67c7dc747b08dd9cc0d5c1134c8170d104ee611d8e65fd7570abf00
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\images\illustrations_retina.png.9CA25083A9A22154933F44B757F3DBD587E2051DDB943F3E02F969991D648208
Filesize19KB
MD517fb37f03aa7140693d7accf5b84c3df
SHA115bc4d3cf050b61be27513fe0101c681a19215d8
SHA256082115d1aa9d7fec84d4a11417dae86865208569ffe2c6f83a9d35acf19541a8
SHA512ca01f6db68d21b987ec13e4783f1b243adb2260138b00eec95efbd2f21fab461d06aed8d072f71ee6c5e393d3b2a5398cd33c15d0e20d0c1600d8c1507f4a156
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\en-gb\ui-strings.js.9CA25083A9A22154933F44B757F3DBD587E2051DDB943F3E02F969991D648208
Filesize832B
MD571e08c4ebc93e2c3391c65789a8a3378
SHA1915f2ad3486bfe77db96f0ff1da8d0d5c1c9be81
SHA256fef62f166734be4b90a551a44257f0905a51e7718892032a1d507b2dd8da29fe
SHA5127a68092c588d17544d97190532395b8875c115d0c86fa857d9a57ca7f1c7d211abb260af85f3efd6b4ffc0e0b7a300443007056cdf0947171dfffe26e294f3d6
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\ui-strings.js.9CA25083A9A22154933F44B757F3DBD587E2051DDB943F3E02F969991D648208
Filesize1KB
MD5125db25852a38c61eb1f2abd8ab6d04e
SHA166a9a5ab74042243f74aa4412ebf14abb6f4cf18
SHA256eeda310684d193829166b3004ae7326d112d815496bdb5015b0bf2ab3e5b381b
SHA5123e591c1e53041b40a677c562dbd5ad363e58a260c09e140bafd2d9966f5aaa44f0a3696e1b59fa601b09319a9a27bed603250ff615b2a63e9329a14b6842a7d5
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\ui-strings.js.9CA25083A9A22154933F44B757F3DBD587E2051DDB943F3E02F969991D648208
Filesize1KB
MD5f1d18503e863deb41d3bd2fa0c8b875f
SHA1627f12f6f867022a3663b213d96d3e2591a9c93b
SHA256a4bd7b15acd564ed710eb39d46586719fadc57fbc0013fa66a32d5c172e3e432
SHA5124faf24bed288208509a262db52e391920dd4ac586a1c7aa47c433c99c0f4d1dbfe1bb4cd57d5491da0c69e2b00b779626473272bed2a2a32836cb751a01445af
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\task-handler\css\main.css.9CA25083A9A22154933F44B757F3DBD587E2051DDB943F3E02F969991D648208
Filesize816B
MD5c0f067660bcaa705085308eb88396d16
SHA1c09a159e1dd053718f65fb8511fbfbe389012fb6
SHA25640d7d59c32099e73eb7098eca5134ecb112c613279b2b96e7f6968cb15416f2d
SHA512e83e0ceea81dbc4e7dcc23efc9b11dd7d1d22a675cd928e2c30a602f1722f43873bd140c0aac7c4d431104f06a63cee1c7893b42d7d7acee327e866fb4c3fc63
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\images\bun.png.9CA25083A9A22154933F44B757F3DBD587E2051DDB943F3E02F969991D648208
Filesize2KB
MD5876d82c12d8e0e1258456773e7d79fed
SHA154b4967f0c21225eebc297a3748fbfb2f2687d78
SHA2566af6b66d1b062b062294293fcf60f99be2a67d59a13a8009f6293e9ac4ba6533
SHA512e30bf3d052a8173a7c21394333cf69b0d9ab43f017c3ad04fa480b20b13e80d7cb176101d884973fcd9e0c93780d71d544301352038797bf03243474c4b3feaa
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\images\cstm_brand_preview.png.9CA25083A9A22154933F44B757F3DBD587E2051DDB943F3E02F969991D648208
Filesize2KB
MD55dc7f450e54aba812bff8ba2386275a4
SHA1379b907e93203d3696fbfc13ed8d464dcf253cf5
SHA256cafb80c10b70fb0af53b9afeaa96f09b57f59c418a4ced6e21a1d8649a587b0e
SHA5129818d129763791984cb4f2e0f358a25c4e4eb3551f26e69ad855cb0ae52d2a54bcfb60d7aff31773f216a387a5716bb395e559f0486ac61f3dda3ed8763840ff
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\images\cstm_brand_preview2x.png.9CA25083A9A22154933F44B757F3DBD587E2051DDB943F3E02F969991D648208
Filesize4KB
MD565a8a54045b02f26e098a771a7d5c9a1
SHA10f507f00d9433a291656e160bfbc2c32d30be455
SHA2568da66ed8e38947566add3c8669d7af493177df9dd080bc1d7ac0d7d51c83844b
SHA512394f67fad362c2919576fae80e2c060fa4ad599619bb17c718dfb49d489a23a0d79715d7c993111b4414a966e435d62f920ad686735f0c2f991e35bb9c17591d
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\images\dd_arrow_small.png.9CA25083A9A22154933F44B757F3DBD587E2051DDB943F3E02F969991D648208
Filesize304B
MD52b39f03cb72b871ee461d46f22456fd7
SHA16c30e814d93c5c76cda9917ba74ef8f656d96217
SHA256ee2be24e0b615630ad26909d9559885fb0a7682b45e6a11f93d165079654ccd9
SHA5124f34c53f28d46f2332ee4fa70d2eaaddb7c57d8479cd79131ad38a4e209ed2a4b347968cdc25b148ce30662eb152c2e3987ce1fe713277339216f16b07d4728e
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\images\dd_arrow_small2x.png.9CA25083A9A22154933F44B757F3DBD587E2051DDB943F3E02F969991D648208
Filesize400B
MD547a048e0657464f6b2a652dca67ac9d4
SHA113786d4c479df36fa30bc6d0f10fa8086e6c3be5
SHA256e186b181e424569c774a5bd26d58d2ccf7425c840cb3923ef11e137fea4a1898
SHA512bf276a91ff3f1d4efcdd6b46d3eefd6d00474c6cba8db21914291201689e456b6e3f5a2ba3f9d83939161cb4c57b3ddfbef5e1b4a5ebfbfc20614f6dd62b2c47
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\images\nub.png.9CA25083A9A22154933F44B757F3DBD587E2051DDB943F3E02F969991D648208
Filesize1008B
MD520fb420818c936a4c4e6f9d2583ab124
SHA1aa7c20adc32b826f222b9076b8681505a5ecb351
SHA256d97f888a0cd373a37bfcae29930e93f04d010b1b1d355642cbde726bea957bb8
SHA5129e547989df5ced6df6875ba9f1c32a535a3aa47b48e03ebbf6f09f4e299deef6d5fb7d0cd4ef8d293c70dc299aff52ea2b61b4f4ac28596badf161bb33761c52
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\images\share_icons.png.9CA25083A9A22154933F44B757F3DBD587E2051DDB943F3E02F969991D648208
Filesize1KB
MD5dd34f711ddd9324c473c4563616f217d
SHA14d61db89f1d408295a9e95bebe1b017cfa9a0e3a
SHA2564e23862f4ebe3f7d3c47fc49cf6490f1bf2a2b61dcd80a36d11ad6905d9e3e07
SHA512ed1ba404f7be18775f93f9ee02af5297a0fad8d1543d28a91f10d3e5d3782231a5eb86f76c25e94089ffd70e7387a902cfba85bdb04742c2842956bb2a784dab
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\images\share_icons2x.png.9CA25083A9A22154933F44B757F3DBD587E2051DDB943F3E02F969991D648208
Filesize2KB
MD5796fe68fe78047ea129929c5397d41f6
SHA1a47883f6c76d71c251ece4a2a661ebbfa894341b
SHA256d9eee9b7f262d4cad04d99fc9ddcc4e037b08de878aa5409e339d13bfdb985ff
SHA5126046b05c28116bafacc92dedf82a0c5f3417d42befd5351594aa9486368359f60613c3e75b27d255dca3f0e3293b865e514a32254f68b1795c72356ad99a755c
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\viewer\nls\nl-nl\ui-strings.js.9CA25083A9A22154933F44B757F3DBD587E2051DDB943F3E02F969991D648208
Filesize848B
MD551e88e37ce3a13be5aced4abfb386c83
SHA13acd32f7998caab011130662cba9dfd7691e1771
SHA256c671999c631b3ccb156f7ed8b0a40b732524c56f7776e497f2ba79087a424f62
SHA512700e2bacf38024f415146392702db3859dc08bb22f89cacc43c0707be6f97c5d3af13697d955f3af354696223a06f332a0c4fe2909d52c222caa9636164d971b
-
C:\Program Files (x86)\Common Files\Adobe\Reader\DC\Linguistics\LanguageNames2\DisplayLanguageNames.en_US_POSIX.txt.9CA25083A9A22154933F44B757F3DBD587E2051DDB943F3E02F969991D648208
Filesize32KB
MD5cac5d658d3182339f2a61b577133397e
SHA1115cf7ac7b883b27be7a48c4ea9419f0b96ef70c
SHA2561060ef52368659da2bb958eff6ecad63aed72ac5852ee44d9b5c3ec7742baff7
SHA51265cbaf6a915b675ac935a722fe6941442476503f9f24ccb053321cd548d9955d44c9ce9ca147729fc6b804cc70bb4ca68aecf731fcbfa606cce68276f5f6c1e2
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\ResiliencyLinks\identity_proxy\win10\identity_helper.Sparse.Beta.msix.DATA.9CA25083A9A22154933F44B757F3DBD587E2051DDB943F3E02F969991D648208
Filesize53KB
MD51448bd944488139818cfd33b55406ee4
SHA1632dd1f2abf90f131499c72cff32ca1370b772aa
SHA25699d0777323f34e30566a75196c31f298582796a407082a0e6d14d4f1b9ec0ebd
SHA512b38eaf735f5c38f458d201a4d87c6ca0c5ee2e503e100a2bd333d3de60390994374ce7ab0cbe9754dba1e61b065d93b919db0cb0bbc3d65b056d6574447faee4
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\ResiliencyLinks\identity_proxy\win10\identity_helper.Sparse.Canary.msix.DATA.9CA25083A9A22154933F44B757F3DBD587E2051DDB943F3E02F969991D648208
Filesize53KB
MD53d706229f3be1a370ab248bc13771c2e
SHA11aad230855e656a764169e7da07620ceb2cc75e9
SHA2567a9f42abe85cddec99455e8fcfd08f86070e312bdd4d8759cd380f46fe6063df
SHA51246ca72459f9569a3e447ce9e5829fb03404b6868274fdc10975f509e73432a9aa37ab3dad66f965c713745fd8f2c91681bf7b65b788a7743c649be2888018fe1
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\ResiliencyLinks\identity_proxy\win10\identity_helper.Sparse.Dev.msix.DATA.9CA25083A9A22154933F44B757F3DBD587E2051DDB943F3E02F969991D648208
Filesize52KB
MD5b0a55ef757418e62f673f0040681ae65
SHA1cc68df95a0b9b7a1d3a056776fe1b18c0c7ceec0
SHA25611be2810060b2ad87bf88777c9e504de5d0b337cbdc8e45e94c5603a8e870452
SHA5128b1d8a18caa56d66af3284689bfffbd0e979895c2a9783d9f488a0a242f446386e634b149951857df9b1ce0e0c94bc8bb1893b88df0f83759b501649821d07e7
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\identity_proxy\win10\identity_helper.Sparse.Internal.msix.9CA25083A9A22154933F44B757F3DBD587E2051DDB943F3E02F969991D648208
Filesize56KB
MD5815377130487e25a69aa7db3acfc410b
SHA188ae2b78a339f9d69d2ae26651123be755fd869c
SHA256d99fa3f5f3106643380d5d2bfa113e58099b015573c4474ba483b5fcdc08a556
SHA512dde36b54ad9927d9ac41fa2be9824d4cc14fd48f52fbd3db11739ee70cb857409e2d4dc55eacf382062f568b359548dbf31c5fa2f1a37626837e6d827825a768
-
Filesize
66B
MD5496b05677135db1c74d82f948538c21c
SHA1e736e675ca5195b5fc16e59fb7de582437fb9f9a
SHA256df55a9464ee22a0f860c0f3b4a75ec62471d37b4d8cb7a0e460eef98cb83ebe7
SHA5128bd1b683e24a8c8c03b0bc041288296448f799a6f431bacbd62cb33e621672991141c7151d9424ad60ab65a7a6a30298243b8b71d281f9e99b8abb79fe16bd3c
-
Filesize
134B
MD5049c307f30407da557545d34db8ced16
SHA1f10b86ebfe8d30d0dc36210939ca7fa7a819d494
SHA256c36944790c4a1fa2f2acec5f7809a4d6689ecb7fb3b2f19c831c9adb4e17fc54
SHA51214f04e768956bdd9634f6a172104f2b630e2eeada2f73b9a249be2ec707f4a47ff60f2f700005ca95addd838db9438ad560e5136a10ed32df1d304d65f445780
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\80237EE4964FC9C409AAF55BF996A292_FB287BEB63DB9E8D59A799779773B97C
Filesize471B
MD528decc6f0aecae80894d0199f7fe8d59
SHA1315fc537d8a8e84de81c2c6dfa07f0d64e66b64b
SHA256e2378e763df9277002ad175394f575ed3f56f13bd3bd1a11b24a8327410fbca6
SHA512711a848228c68c48e818a4dfca1cb315d9ef2613be095d10b149c6e5b97c82732bdb08d1ae4775a28d258c22ccdcafb12a59cd6daadcbd2b44f4c8a2bb7c5ed9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\80237EE4964FC9C409AAF55BF996A292_FB287BEB63DB9E8D59A799779773B97C
Filesize420B
MD59c6e329b77647d8e1f8908df7281aac0
SHA187de94d2ad9d63f71b135f3d22bae2be031e60a7
SHA256f76cc86135a66f62d7ebc0c6cbb48b8e0626d49f468de9fbf5867440d60dad5b
SHA512ba21951f673124428b6851d9f647117f9d01bede62ffefe7af363de82c64b1a8953a671237afbec669abeed95124c6ef1d9dcbe6feabff01c028af7e48ea8607
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\AutoLaunchProtocolsComponent\1.0.0.9\protocols.json
Filesize3KB
MD5f9fd82b572ef4ce41a3d1075acc52d22
SHA1fdded5eef95391be440cc15f84ded0480c0141e3
SHA2565f21978e992a53ebd9c138cb5391c481def7769e3525c586a8a94f276b3cd8d6
SHA51217084cc74462310a608355fbeafa8b51f295fb5fd067dfc641e752e69b1ee4ffba0e9eafa263aab67daab780b9b6be370dd3b54dd4ba8426ab499e50ff5c7339
-
Filesize
280B
MD501cc3a42395638ce669dd0d7aba1f929
SHA189aa0871fa8e25b55823dd0db9a028ef46dfbdd8
SHA256d0c6ee43e769188d8a32f782b44cb00052099222be21cbe8bf119469c6612dee
SHA512d3b88e797333416a4bc6c7f7e224ba68362706747e191a1cd8846a080329473b8f1bfebee5e3fe21faa4d24c8a7683041705e995777714330316e9b563d38e41
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\7e33e867-89fc-4ae3-aedd-505be470a4fc.tmp
Filesize107KB
MD52b66d93c82a06797cdfd9df96a09e74a
SHA15f7eb526ee8a0c519b5d86c845fea8afd15b0c28
SHA256d4c064db769b3c109da2ed80a53fbab00987c17421a47921e41e213781d67954
SHA51295e45c0aea0e704be5f512dffaae377d4abef78da99b3bca769264d69be20f2570daf2f47905645217e1b2696e42b101f26149219f148b4d6dd97a6c2868b6f5
-
Filesize
33KB
MD55569bfe4f06724dd750c2a4690b79ba0
SHA105414c7d5dacf43370ab451d28d4ac27bdcabf22
SHA256cfa4daab47e6eb546323d4c976261aefba3947b4cce1a655dde9d9d6d725b527
SHA512775bd600625dc5d293cfebb208d7dc9b506b08dd0da22124a7a69fb435756c2a309cbd3d813fc78543fd9bae7e9b286a5bd83a956859c05f5656daa96fcc2165
-
Filesize
5KB
MD50da4635a5597f68ed80b03ed185ce324
SHA1624853c60f9fec2205576bf27f9fe35b77cfdbdc
SHA256ab584f97c1ad7a28a83440cfd332aab1c0288d140183921fc72824ec116d458d
SHA51222f49964cf029e830d2fc519a3242aaf84fb3cbbfb2e0f92b482aeed0554038d36c2e52c9fb9ba2a1f9029772fc0c5a44333b3f6728f6c1fb4786ec900bc07c4
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize3KB
MD5efee6421ec26e70dc5c1673c5d6c6b86
SHA176e3a7e87b3d290def07dc246bb33408a45e950c
SHA256dae51228200623677553a16f875f47dc6b164035cb26b092eb62e2eb21d8fc1c
SHA5128c9be03deafebe1baf71563ebc8399ef53ade36f2680f023d9fa6fe85ebd81693f8f9d8611bf2d34cd63138a024f2cca11016ca8934a2cf5976513c2b5f04d5c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index~RFe58026c.TMP
Filesize3KB
MD580a6604147739be2b7acafc782c9dd63
SHA12030dbf7426042448f01e829a633edefa79bc8f8
SHA25690d078bf8f4b9cc93c5c52c28f3234df1c42d63edd816de6530593a78aae6cae
SHA512f04a24c6359697cc10758bbd7f0442f64871aabfda44519a47ab999591ed70855a69a947188d8e4efd6397767dd9742b71791ce468d4c96da39182563dfe3d59
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
7KB
MD53528da27f122d1f18dfedca5c4f0d4bc
SHA17a7fb209a2e031a2d1282dbeff9ca9287eeeb4d1
SHA256cc23e22b40219210eb60d6210638ef2c45f2ebf321f50aca314fb5e6b8f3aaad
SHA5120b87626b4080f438de3e1b90f1e56b0ce24fecee6ca8dd6f690e68231774925d9c5d5b07f54a05a3538ad1998240ffa41f66049ebab5ec70bc88f1310936528b
-
Filesize
7KB
MD5db5a0c904fb19d13575641f622aa9282
SHA1a49766d228ad2fb3d4fe158937a259539716942f
SHA256ecf448d97b2facab067c59b2c43368070d4f4e0150e8c236c710a693937a31ad
SHA5127f32675377b2a46e49ceba3e4d7edf1b78689faeefccd8aa54579e86894b69dc0e145411f6b3e7c97939ec53949d82b8b6dd14dc234265abb17be07895c0ee78
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
40B
MD520d4b8fa017a12a108c87f540836e250
SHA11ac617fac131262b6d3ce1f52f5907e31d5f6f00
SHA2566028bd681dbf11a0a58dde8a0cd884115c04caa59d080ba51bde1b086ce0079d
SHA512507b2b8a8a168ff8f2bdafa5d9d341c44501a5f17d9f63f3d43bd586bc9e8ae33221887869fa86f845b7d067cb7d2a7009efd71dda36e03a40a74fee04b86856
-
Filesize
17KB
MD5ac7fc66eaadce558826fe2623c25b1b4
SHA12547d58365b23985c494b9eae656b736e9f4fbd0
SHA2562cfc4fd0e1a63a87ff2e89e913bd61271e9ff488f02f4f3505c6ca298b937610
SHA512731dd187ffe29b008be12228a423827784f2b72e4b8c342b0105791699a621d31ae323cc3c41bb57fecbbf8681a39990c628bdb4ee4321dc1bfa776fa6cd1a4b
-
Filesize
17KB
MD5e01ae34b5601ef4419722a20c8cd93a0
SHA1138b6e2ac04f0a4e532319637cfcf3878aa7491f
SHA256675d93c3eb6c80c79848aeed7a24c7e1ac7157b36efc85266b29aadb3b30d8e9
SHA512b16316b8e2af11efca075372378085e228a27bfdb857090867f3e3af4dae0453c96cb2da79226751eb57bc6212efc993989d6ef11419490100cb3b9c6f594efe
-
Filesize
18KB
MD58f596a74f55576798c679c7f53aa62b5
SHA1a5f0cbc09f47c9ddc43e0354c4d20a70308df3a8
SHA256797912377991781a77c40abd46291282952318c8395cabc002512404a7d078dd
SHA5129399972b6619fb638d978244a92a0e75aca4ad3c62c8b63a6b580ae33721f991258d35f2cddd6faeb4808802302035b85ea75f88ba7bc0fe4d7b1e46967a4350
-
Filesize
16KB
MD5f79788971340efab10a77c32503ad768
SHA150879df9467caf5af1f205d86a7f60debad409ca
SHA25607e697e50100b82250b33c247c9b4eb830ae67910ac7a0b8caa91190083c8ef4
SHA5128a2e7901929b3f50cc08c5d979e567c70977da29255a0b80aa3cb024df60c7eb6843b0b07e6f90da36698bd88df8ebc402aeab4022b29248a295babc595abb4a
-
Filesize
36KB
MD54cc4229157afaceb6b8016efff0e9b7a
SHA1429f8ab81a0e35ec6b8b7998c35480277fa92759
SHA2566e4c586f4d8fc57d8c35b80971de9a5c6168c9b486dd3ef7d5008a0ff658c8f0
SHA51243398843671f9c57c308e56cac4dbdae9dd7510103cf001b54479fcc8f721e389b173eb3096e871a0d2e31ad2b5b40e466c0c5b496ae827bc57285728edced7a
-
Filesize
23KB
MD55222f848b6ba294fe5ecd63b68d4193d
SHA10cdcd0ddcb0b184a6532316435f300e823782ced
SHA2562c3743a025b54d3b2c2dd08e9020e48c06a6b6fdccae7118bfe42ec703115404
SHA51216e47596e294939d4a96b2a5fa185e3edacc47fe972208cde589d584ec0f27c35564ae1819db9d6cbcbe6e08275c50b5081a260833e6060c09d6e4764842ee1e
-
Filesize
82B
MD59c12ec41b948e46a5108b7dbfaf1d16c
SHA1860c5126809bae1950aa06800c5c1bcdf05f6c53
SHA25634291f16a0ca09f3129132c388fbf0d909778432ae92059c6d85f77a622dc004
SHA512a93099ce7e7896b91fe111c44df3beece4828d40705f08f403c63502cf778822f276a3d40f01bee3433b8b1de32cfeef9c8b445bfcfaf56befae6b3ec43f463c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\WebStorage\2\CacheStorage\index.txt~RFe57a095.TMP
Filesize146B
MD54d516a9e0c7c40ada7547ca6d59e4a3c
SHA176aede17ae6937f7a8311d34cf2e5f26aa86fffd
SHA256bb0dfec01b716e7604d6a9fa941abb172b9f26797656c9d02603a5c7ba3427f6
SHA51284e35c69ee1d9a4e3bd2d5c8884dd3c4aef013492a5e183185f1c3fb49f8618c07835bae3b6b8735329e0bb8ac2288170db3468fb0efc99e878546743ca1ff8d
-
Filesize
465B
MD552283537e040326ceb15a7934e479caa
SHA1df4f62ff1a4a56ec9464d8fff6134e7a8a3b0386
SHA25661726be4c3366bb8d80563e2fbb857d94a78bff19fd099c3063e27bd5b72cafa
SHA512b14ce79bd0889aa43178fec4b98e276ac69cfbd15d239f001e35202bf41918e7358b765aa8aeaf5ec4e4bebcb64c8c84e5d55cc01405f922fa6e350f31f347b4
-
Filesize
896B
MD5a03f0d38d0bdc607ff4f34c02adf043f
SHA1fdeaa9d5054dab7ac06e995e619f4b77dccc27be
SHA256be24b9b866f7063ba1cc3e477d411ddae6cde78a690beb2ec9ae9c1a4bce58d0
SHA512e34a4f87d00e95322be3580cc2e3ab6e590e76b56e35304d1d371da29ed65634930faa7df4535d6f6f09cdc34e202969c2006bc383f226fbe47d3e556ad1797c
-
Filesize
23KB
MD5ae2db6536111d3116c54a4ccf69174e6
SHA1326c39e60ac739af12143e166887ddefb06d1abe
SHA256f9a3a1fae611553d46b9a2b06421c7c7d770fbbc280536dbac072774940012a3
SHA512461c40235f440fe8b3fb9d9c90403b4c63ba1ce66eabc5e729ea1ceb475e1de461a250e666d37d487b14190fc4c03be3214012c277df79f52dc675fa4cf3ff05
-
Filesize
19KB
MD541c1930548d8b99ff1dbb64ba7fecb3d
SHA1d8acfeaf7c74e2b289be37687f886f50c01d4f2f
SHA25616cee17a989167242dd7ee2755721e357dd23bcfcb61f5789cc19deafe7ca502
SHA512a684d61324c71ac15f3a907788ab2150f61e7e2b2bf13ca08c14e9822b22336d0d45d9ff2a2a145aa7321d28d6b71408f9515131f8a1bd9f4927b105e6471b75
-
Filesize
41KB
MD59a2fa0e2e594d25028d005b08a95bef9
SHA1a23b59972f10d17795abffbbc851137c6ddebc6e
SHA256ea34ff52f3a6e2663494ff628cbd7f639133a714a1b363f85bbf24166612f8a6
SHA512e484bfa91a41000f96c84a0a8a4cec6c4ace925c5aff78382660a2a892eb6330913d4a00b5ad477ed4d3993921a1e922b482ef5f8fa94f9eb3cdb15485459c35
-
Filesize
55KB
MD505b13400ac007186ee43e03094d350e2
SHA1b2e71c16dfe4f4b165782ffb5fd3f4159e9ba202
SHA256e9a740b59dd6195ec9550b6b5c3c55969b3f5ada762b3442717857e31066bb61
SHA51295b7b9139271f6648254f72b375d3da1677f5ee52333d4460fe3ab8e0ccc913f25b7d35a2ef6ce942d922ffa68bec1f8e33126456f48bbd5a95b9aceb9bf499c
-
Filesize
41KB
MD5ad4d93ce4c60a3c04e272d5020462af0
SHA1b2816c3fbfe1580077cda640c8b933b6df99fd39
SHA256dfe5eee75784f717a8fa14f323720a523ebdea5aa050b92e3cac8ca29030a97a
SHA512050b321bee9530230943d64dbf912f7844db85678e72b1b60fd87c7cdf3bc4d932aa9a752dc09e5d696e7a2d837d0c1c3ffabe03a7b940dd8b736031cce7a8ba
-
Filesize
55KB
MD52d7bdbc6e730cecaa92ac48220dce3fd
SHA1de6326b6942e19b828a2571c507fb21ba3c9ef78
SHA25648b8079c699c662cf8d0d6fc6108265506588d7cf5ae49fd6fddb951c0398d33
SHA512979abeffa63dfd21a6bd2be60d46fb92165541eecccdbdc0fd8380abf2ad0e02fece89e4152d51d5b8d6734fa624a34b8b4809447d62d9544974531ccaa9d7ad
-
Filesize
55KB
MD5122ebe28cb102c0798e58152cbe23b9b
SHA1826115f665c0055b00588a2f81b6faabae6e6b18
SHA256fe08a68e8097b3403ef41b62ca292d5a82e7eec5d4d4eea671f78f30cf3c9b70
SHA512d90d7f56b210fc96b00504c2f9fd361fb68d88aba6c3eda38826575272a07eeebafd0cb665099cc5d45bdfee52f6201a355b2d1c12dc3a6da045fa423237f6ee
-
Filesize
50KB
MD5a0774616c224fe1ae570f58cbdbaa07b
SHA10453c51b93a71358f714cfc2cab1d1891c39dca5
SHA256681679283357e12661a72afff303b9e5b96227ec8145d9d69d81fa0a36c7d391
SHA5126c107730a43df2bbc98ae8e3e0bd227c73b71dd1f5288d548ee69b40138c53721316830cf84bf9f22ec51f50de44917772de710dd3e99a7a589ea6026965ab6b
-
Filesize
55KB
MD58c1fd92dafc631f8224c18509967a6e9
SHA14b2b807c7306e2f1eb75c5c01b62d9c1351fd136
SHA2565f1ae855703b01ff2623071fd732dc77df3bf76f6fd4fc6e54e88fbf79de654c
SHA512e482efefbdcf304953565bf5b7cad85ab0eedb066d268e18bbed510fdd01ef5018808d1f39a65fc7d4b280b70a7f698cb3a92e4f007bc2ffd318bf26d8c2aa17
-
Filesize
55KB
MD53c71323e155916cac218cef339bfbf14
SHA173713e8cc9cff72833232792ae7dd3ae1ad09a4c
SHA256cb07d3d4f3b81cb321cde8a732efc3436dec00db17c5babc3e5688a9eca901fa
SHA512db6f8e63ce389c04545aa5985079bd37e861d147e41635db9c1d3fa9686e4a602ade30b55edfb83c8332f7327810a9725e61ac3ea404325637b7d7206153c724
-
Filesize
392B
MD57d2b30b1d9316914f17c9fc28301ec45
SHA1b91cba25d6c5d0be16b953f095f424c33683a990
SHA25645145e87aca781af2b5ac29720af818dc2978dc849633aea1d16ca05a92a65a3
SHA51209e7364401c3d08e8e81629b05444e96f66eaee36a81295b1e6f8efd7605f96009632c8aa7572647ba71485a997ad847417378e1178569ccde14f4403be8923c
-
Filesize
392B
MD5d062df23e191572cd68f15347167066e
SHA16f10d3ccfe2069b07d2918a5dba61ad8c536959e
SHA25676707bf82e03f9658f3db047543ccfbfdecee35fb41fb759ffa28fda15145079
SHA5127a6a71924bca3a2bb937e5e7a5fcd041ef92834952c9516da4551a1e89cf9607917acc3eb94d6dcf81ff6dfc2be48d93e09cb0fcdb24d6df70ee859c94682f12
-
Filesize
392B
MD58d132c152e3533ee78e3178d2c3a285c
SHA14698a5a9bda625f31fa86e3110d8e346920fae54
SHA256ce171e42a5a39694aecb5d467bef27bce1de1c5e4e729fb5e1caa71db271b614
SHA5121d2e359d118aaaacd6177802eb186aff8a100b301cb2d9d16ada10810ee2b6c4d7502a0eec44aae9bbddbf622fbfe33d86ac29c6e83045b6e14521169b9827ef
-
Filesize
392B
MD5d71ed7f5b8e08fca0b4007b4ecc18ce4
SHA180f97f28e957be1cc63c8cf142c0a0454b1f198f
SHA256f5ebb2bee627f56452ac4f8ec55503c294f14371daef6dee4b0b686ead5ccdc3
SHA512e08999248eedba863b5859cc65abebf20cfd3986ba870cbb62647149cb1e1d432a2d21ee1bd62919b048ecc71b98b60fe561b4a7ba26035036a5b71f14683585
-
Filesize
392B
MD5ceb17262eacef92cf191ee03f45030ca
SHA11a862179aa4751a3b6b77ccbfe5d6aff861b35c9
SHA256835092c43d5ced7d9bbb2bdc2a976608bf49df67f90240b3d639f8277f1c6176
SHA5125fa90854bbf7764c89c1947ee471b1c3a1f4660a2ec7cc7a951c8ac813bcac40d128d9ba366d36126d4624363acc4aca1999e9854134346cdd42315215f31739
-
Filesize
392B
MD515aa9dab4692460623180e45438884b7
SHA1e4a8147a27bed82347972c1e1c6cb4e6b8512d4d
SHA25606e0c95f7fb25e64fa727dd0956c83fce6fc891154e18bcd5121309ea9681a97
SHA5123f601974173cbc2573260304eac04211481da943d42da76f4333561d67fd4a88f1f4396bec7e6168989d92e072080b28f208c4b7c22527ddc9bf7c50c432b3d6
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\extensions_crx_cache\ghbmnnjooekpmoecnnnilnnbdlolhkhi_1.fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72
Filesize152KB
MD5dd9bf8448d3ddcfd067967f01e8bf6d7
SHA1d7829475b2bd6a3baa8fabfaf39af57c6439b35e
SHA256fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72
SHA51265347df34378c2bbb34417e2cccfb3251a0b2412422cc190eed9df525b6e0a9948e0295ea3c33b3ad873ce81e369e89a138ac41d6eb7229546c3269107e661de
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres
Filesize2KB
MD5799d4ba861004c9e64dff326bc27e573
SHA19f68e221fbecc85e9381fa965fcc2ae6f9fc0fcf
SHA256752bae32573af6f31bb38573e0e245a948a0e0d4bdca51b91a8082fc9aeefe7b
SHA512ac051c1eedc5b356ad142a27a901f833f057e3be41a920667e01d944302dcae70897f351a937f9e7c37122f54edd2d398e8c005c09913bb3ab1edc1eac904c52
-
Filesize
9KB
MD57050d5ae8acfbe560fa11073fef8185d
SHA15bc38e77ff06785fe0aec5a345c4ccd15752560e
SHA256cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b
SHA512a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b
-
Filesize
443B
MD57fad92afda308dca8acfc6ff45c80c24
SHA1a7fa35e7f90f772fc943c2e940737a48b654c295
SHA25676e19416eb826a27bdcf626c3877cf7812bbe9b62cc2ccc5c2f65461d644246f
SHA51249eed1e1197401cb856064bf7fdbd9f3bc57f3c864d47f509346d44eed3b54757d8c6cdb6254990d21291065f0762d2a1588d09e43c5728f77a420f6a8dcd6ea
-
Filesize
92B
MD5ec326bbb3bccbdc24ecbca52d7727227
SHA16d230c114148c2c62d1ee91fcf6b9575194ebea2
SHA256e430f2a59f3cdd5474ecbe58a9d3a2414813e84f3124ecbd4d9180802e7cc57a
SHA51259768d77a6360d2bb7f161ccc747635516ee374fd158ddd6163802559cf02bd6843087f04c26f3471ba8472f8b2219564b6e998f705770105672db86747e5525
-
Filesize
315KB
MD59f8bc96c96d43ecb69f883388d228754
SHA161ed25a706afa2f6684bb4d64f69c5fb29d20953
SHA2567d373ccb96d1dbb1856ef31afa87c2112a0c1795a796ab01cb154700288afec5
SHA512550a891c1059f58aa983138caf65a7ea9c326cb1b94c15f3e7594128f6e9f1295b9c2dbc0925637dba7c94e938083fffc6a63dc7c2e5b1e247679931cce505c6
-
Filesize
10KB
MD5bbebcc04f3f47749a828633beb1d65f4
SHA119832b3fac750a18c3616e795d23c9954afea49f
SHA256a422f8b5c6fee3c3e6836964ef442756bd2d61f48d4fd663a8dfd9bd74b246c0
SHA5126ff55d08dc5092c2122a1cf4eba7043b414b870ded2c65dc79e7a971f5f70794442e14f18255ae8857348f1591cfc808d705b293e42704cc51161fd905f6c055
-
Filesize
12KB
MD59f77d4aa49ce879506dd0ebcb7a63c20
SHA134a36fe1f8dd95b1b7fa2010a179f41ba99cba0d
SHA2565151f1c6089f24194221f7eb5a94c4cf5b4394bb4ddd18c9ca82b35f094ddf85
SHA5120d8ae667299c9557d63643c7646a32fc70b380d5677f3c5af5a23990e0d3b70524ddf45e06ba264a8f0194896c21ccbe7c4c96eb8308c1c39087fb5c4b04f466
-
Filesize
1.1MB
MD5cecca7ff32c1a962ad10523548caa4e7
SHA1017c6f9a35a85d3c9374b3145ce24b44ab16ae06
SHA2564446f278b8c9231848ba55498fc95f7b560a445aa96efd7cbdf61423d4a6c5ce
SHA51283e008fb11b6b5eabdf606bfd9b503b3f334500154fd2425c32f4b52935961db3357fdc69788f034f1d2582f0bd7eabf4d3785f9656d3f8563f988ec3d9ad617
-
Filesize
548KB
MD5c08735b9160884b144cdf2c3a6120ae5
SHA1199fb23bbe80524d57e8b4a9c0137cfa46d7652f
SHA25625e83c4b08ad3c0bca89924385ac190a905baa8442729147a51b8c1989d0acba
SHA512d6e4c3c9eac0847fe324b9fa922410e4f2a96e8e2f20464696c201bd7ba96c8df6880ec000ba8ac575c927444e84a4ac32022aad438f2a4485f794a262183068
-
Filesize
274KB
MD5777ea7de64fcf02eacb7531dfcf30c3b
SHA1a2fc1369497240707c5465b6255f8d5f7f6dcede
SHA256081ac3983bb15a25964eb6d31c395dbfd843ea0a77fbc1e30c823db3042ca4c5
SHA5125951c9c269302716de3eb83b9f0ad6ec0e6f5b2d4b59a4952af3d3fc7c5f57e03ee287a7ba7aa9717c06f6695c7ba1ff2a6750a77e8d0a2a5d24e75103674d34
-
Filesize
607KB
MD599017a76673ffdfad43ab93313825e82
SHA18754f3f98f8a50d270e1e62e527f4ff65a6e6f61
SHA2565c4b6ce159dfb1370f50c357055d5c37564962841d37bb37088a47b6c097dd49
SHA512d9835a702af226a2e540492377dc2d76bf2b4f0b31ac84790fb2e4dfd7ca4b78225d6de94f4b7fb0c7ab15e0cd0f0ec48800284d825f0c658ef9435aecbe9d3b
-
Filesize
13KB
MD5bbf3ff2478eb5f6a7a7959817744f2f8
SHA15fe0129f9711608976a66d66ad7d5eac769c2796
SHA256e4b221959fce9ba15aae296e515a4c5e2738c0b0d97c6561ba39b28b72f151ba
SHA5125705bfa2e4c7a5c863fb172425b829e0ab5767b53333d4657c61b7f05b605e202cb55685d2b41db87d49c1da773139426ca19b9a6a3becd3e0d159cc529960c7
-
Filesize
12KB
MD57f17ab0a8dde18a72058b2f75b42903b
SHA12bc72cfebcddc1100aaee692e96d2739c02847c9
SHA256babc7ba84481b6868f6367bb13f5dadce91bc11d6dea56913c288cb3eaf3e77f
SHA512fd14adddd32e89d6dbbe7d74ca8274cc0a80cde786ae133e1d8d18e078ece6363dfea28b72bca9a85624be8451b6f286dbe9bb2def38fd6add1bbfde33019156
-
Filesize
385KB
MD50f3ffb6a640a8bc5303751f2d502f1ab
SHA12374d3edf5be0aee8c8a9a70094aebffcac3ddef
SHA2562cad9d75bd6a1472e360d7738685f475ae7b0a50d292fac55a0ddba4611908d0
SHA51204f3a214ca138876f8dfa21bf83797bbda3d9ec4c4abe9695ad9b36d62da4a5ff7da759d09a4df62dc885940444fab85d1b16f5261170630ffe988c3a75ad983
-
Filesize
12KB
MD5c27441d8c4ddc228d7f7efef7c7ca2d6
SHA13bbdf85762275620136ea25786cfdeff402ae543
SHA256d644d69f883c13160bf809c3f5373a9d864440391b6e507705de87ed71e73134
SHA512a33f8e7322a37b88e7bce44975b5079c135ae6476f3abf74ae5b35a83934e533ad3b0588969756acc2333369ee60ba10aaef8a01d1794b8cae0a130f6fded874
-
Filesize
14KB
MD5a644e1db14ce62737aa8e6de4fa0a610
SHA1d723efff50517054a7a0fa071230986d7255dce6
SHA256df1369af6c91b49bafb04da098e1ac6bebbd154d5d96acf646df699885bb0c8a
SHA5124caae4c0f67a73f31ad5bf9f9d9ae9a5198172acc8ee8bec0c73134fdb1e87cc02ffca18e357dfa7fad851d85604737433994717b7fd81497573c1ef8784827c
-
Filesize
352KB
MD57cdbf820f248e070fd94a5ae50a5487c
SHA1744ae51afef8da01ebfb867a186dd18a99dc9953
SHA2563a72a3483c1727b54292a265afceff56fb94133e7d7630ef711368faed49ce6a
SHA512949f23828a024e323bf9e20cc898542b98462d7939fe2ce6703d8d9bc8c1e9a659048516e885a1a86a86e62a6ef55458c6170780d104ffdd82c3a437cb89fa23
-
Filesize
15KB
MD57bb39cbf066e16509c7c0a33f0db375a
SHA15eba3d5d8e904036d342a460e1d28a53c3763534
SHA2564b0033e2c5182da52b8ba1904fb5e78e42dd25f2c7763c11126bdf225e51b668
SHA512b90157cd1c2683730801a68987c35652ba21ce64e9d17f53c2f85bd7150d1efd50990e4f5397b65020b743b7d7e4c2ebbd73f1d00bc3f612d21a0ec5bcdfb4c4
-
Filesize
286KB
MD58419b1fcc98be690f0142b78a2742a09
SHA177e85db1aafdc260cc9fd6e5a8c5ef9c1b8b07b7
SHA256ad6a82a4261df8309b11e104e3bf277fb054e0fa4b22b52edc857c4b412a7b02
SHA512ade8681bab048a1f892ff0f4a8b114e79d3dd8e1b51403ab3c3debb4edebfa0df4fc61399d5badcbb655f59b9444b089ad7c618c66243d9e6ad5156b1b351f15
-
Filesize
20KB
MD5db4b65ce9cbf0cb7e026e453a42a5b90
SHA15865565df6992b2c846869ca551943644d5c2893
SHA2567391c83df9e6cdde0771c4720817f5582a669deac105fa87f27fee116eeb0327
SHA5129f1ac1c24d70185cdf3e4a60d108a165016765cfb93659edb1199728949c5ba24032b1c7db01930887f3c87a33a48b9e3adc7fefee71e55b4540314755821de4
-
Filesize
407KB
MD57a73064f0f59595999bfa32e880a7447
SHA191c80470181f3a62534ba551ab1fa1f229789f01
SHA2561e621ecaa882c6bbf028ea0fe5d7365a23addbdc7777ee0680cc4cacbec501a8
SHA512fa9ffb91a438ea51cc4d44369c2330b180ed1e5dcbe32fabc40043a78a4033ec47fa96afd2b1176c1b1a3d6693e249281f2593b4f4cbecc43eefa495ae834625
-
Filesize
264KB
MD5dd4f85f80ef49a1d09cbcf22af4d274a
SHA1cec96aaa1a78794c671a3be560525574a4519ea7
SHA2569e1c2c93606b5fe90ea32b0085c2797ecf7cfb743bac66f5ae7fe52c70d4c371
SHA5129edcfe3d764972070e0a017348e76d63e3f45e28915ea6d8e7624049f1e72bf6d8cd4c04238ecb1fb1963611c275557f92f1af682a29e4bca36d3c4ec7e4a181
-
Filesize
330KB
MD554e7544dd2caf5cf6a4f74e6786c4c49
SHA1a154f2e7c543403b24f3ded1018fdeca5552a5ac
SHA256ea2c37011ed92a3f91b4cf92f9450a95b457e34b34d5ca130ebc95e408061a4c
SHA512da9100c19cd66a37afafca3843588b5540de2e0dcbdd776c55488e3b0a51cea8d28204ed1bebf82b34becb88f9ed72687331bbc3b2834e91b85ffd4b1ed93ad9
-
Filesize
221KB
MD59939df1e39ac634df580500901c36e2a
SHA1c71c5e1820b00c88a5d0af938269e395708539d9
SHA256f3c57d3d73475b8b2c259df08a0d2f7ee92adb92917ce134ba443e0b412b2c55
SHA5124323f908207310c0f65d102e0ad41a88661f8809c2bb137ff844543cfe6829f324a03abbcf8ca99fd3eace3b5562e145fcf5f7145284b52a1ce3836895b718f9
-
Filesize
139KB
MD5c6f3d62c4fb57212172d358231e027bc
SHA111276d7a49093a51f04667975e718bb15bc1289b
SHA256ea60123ec363610c8cfcd0ad5f0ab2832934af69a3c715020a09e6d907691d4c
SHA5120f58acac541e6dece45949f4bee300e5bbb15ff1e60defe6b854ff4fb57579b18718b313bce425999d3f24319cfb3034cd05ebff0ecbd4c55ce42c7f59169b44
-
Filesize
139KB
MD585a5c7b6d0e7b7451295278a9bb40eb0
SHA177a258417a7294cc354bc4d883f0537de8dea579
SHA256be1fd9cb06b2083b60f4878a1c6de0ae41e22b25daa2478634f9d6d8df9f92ca
SHA5123db3c96fbcacf33c75ba9dd3b2f8fb3218031d10da4acb844fe10a8115488fffbedff6c42dc15a643d07f5ce630d4c16babc0ade3bbd3d1ce94fb319e432df8c
-
Filesize
576KB
MD5c6c6850011082930d32ba724661ed3e3
SHA1a7d9a2f0291c4e4d7b86d3ecddc8e59bb412fcba
SHA2563a9709fcce1f75e568ca612c17b9559b11cb7ae11d79773c7856540a53fb26fe
SHA512ac6a31827bd721cb57e69ee4e10c7a324876e1cf8b1fa947e928d95ebb68f1375c5a1a0bed7251d3a2d8b8e47f0e4b70e5d789889f19198760d42a9ace22c44d
-
Filesize
1.3MB
MD53723a15c1323e42b92b6f3a79717c91f
SHA11fc8614b643b874a119ed1651476b676ffec5070
SHA256261579b886132acfcee31198242c5444a614b7af2a4609439015960a63c6c4bd
SHA5127ea82f75f225daf80340ec1670c8ce64cb886c36f8c9eba2fe2db2ce1e2dc63ac170eb11740c71909b1e65188f8ed6bec4d568a99f800aa4c463d80f6eb6dc93
-
Filesize
1.3MB
MD5e1ac4770f42bac0e4a6826314331c6ea
SHA166493386ad995819871aca4c30897b6f29ab358f
SHA256eabf7fdd31c5838d66ccbc3ca52b0f6eaf8120f83eed43f372f21e4d31734b73
SHA512e691103064075b24b1fc2f5b4d1a1c2701ee7c5074c96a7faaf284f975de3d7309e7a3ea9b80fb6a2d8950a3b12aceb22e3516777508cac70cba8be48527f55c
-
Filesize
33KB
MD5f45f2e025b9a68db53b662b8e4dbc7ad
SHA1715db3b3eddad5c9eea37f848337debb62df9256
SHA2566fb89ddec48acf474d5dda4606fea7b9a1f11aab559a8e4822a1b59a37c51dce
SHA5121f389805aee155e95a429a2919b5290e3779c2dba168ac7d72b09e136f5b5eba92127a028d4fdd3767f695827c61e72cb470c9609b9abf8ddf5ea4ee23d48041
-
Filesize
179KB
MD52805510d5d7b215b0f9380f8415bedf8
SHA118e205643962a7d8481bc0b9306cff7913ac5854
SHA2561a7123e022fd39cad237ad7dc2f1ed148ee25e70d22fe9e90a0c3e79eca567b5
SHA5126ad10be6007f4419d12c1d027f33dcd42e971ce8a236a30683818c833c8cda129ad55de21c51223aee3636a16c19d348dff5381fe397326269a96ac28a518148
-
Filesize
363KB
MD5e4f99f99b665038b90eb6306167bb425
SHA10f5bde0dec5354938e1be62869c71bd2387751cb
SHA2568f2fe00e68eb57d87cf7e3692f9bc29a4c1e79accbc9bac5698a8a6cbbe589e6
SHA512b70a816dede56e8db40b92363e32b4e04911b34a9fdf53ed16f4a73737a885a9e558e0adb4f28bb1d1fc923e93971c3e4359764fe431b3587da27dcde12d4add
-
Filesize
839KB
MD55b3a9a4151520431995ce97326049a56
SHA187f2a417c7c8e3ff8106205b400db2ba15d1c58f
SHA256189905ae5a76eb298e375768384701d4c335bee47345ced5f927f222bd1d20c5
SHA51253391098de4f2fdc7997f3e4452b4cb6898afa551be1f6c3253cee6ef612f1fc547e976793c0395a4b12d5eaafc66164be0e3a2f9e7ca1a69494957fb0ceeef9
-
Filesize
283KB
MD515e97abfeab2099bda6fca65534e46c8
SHA11f833fbe242f99d62b6188dcd6383ad1a22f3678
SHA256c802b57cd94667f2414062f839bcfe52fb54371727322bc96d56be03724afd6c
SHA51229da9da6fee6a63e6041733920520c8610accd8dee94124eacb9aee95f4f385886778be087f9a1f883cdd483e2aab3efb1f07c2b73c33b62cc4f0cbd3e462a72
-
Filesize
839KB
MD5db4ea70bb45d4284e05d867950538a44
SHA13e0f9162d402c7e63726a786027e27f4ed0e943c
SHA2567876971da6ada88a78da3e83848594fa0949ba56a198b7e540ffb912a936440c
SHA512547d90a1396bee8220a663d41dda8a171d905093676ee1e9f66263124524c913eec99394208623c5a2b10a6ea94f551615239d004192dfc99b287b70651eb58e
-
Filesize
24KB
MD5aadc3903cb34cdbbca8d47fc2ca69d16
SHA1a8a7b60c35e08ddb46cc64c4942824d297c2863e
SHA256335b4c7e7e3521379db11cc54ca66c2b43fb2987ab8e8b8c29bee413a678ba96
SHA51262ec7d1fa5a3cdb1c2ad0d5c25e1eb0bdb640be259b8083942a76e93665176aea68d52b7e68945d86eb3bf5f86065d4ae2cddc32e3dac33db4aaab5718918487
-
Filesize
917KB
MD52fa9e1b94fa3cf837f08f524f12d1f3b
SHA18e39bdbce15612425f88cd3bee7570969465e294
SHA25620fe10cc9e58be30aa1e5317c03f080c41b31d63d6e87a12fce0eeef7ba8b3cd
SHA512cf190edf0b22024f6b817622e4eb662f06c0fb26588786627d5150483d92065775b24c3b8184eea9f31d1a4cd78e1de5e8f7394f53ad582e609771268049c077