Analysis
-
max time kernel
124s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
20/12/2022, 11:33
General
-
Target
CT.pdf
-
Size
123KB
-
MD5
a49a3f7fd16f27c1d40759e616d07481
-
SHA1
383b74f20e973f273bc780fc0ca7399ed839f309
-
SHA256
5e4ba7bc500b5db20d4dcb512c5c617ee36cc5ae8de3315a122a63625609bd43
-
SHA512
0853ddef2d474d26697a1f9592350d5006dd0017d4aecf081529e28896bd2025c4e7c1e614e02b4d6ee539466de8b99aa7840cae0ece4bff2251ccc05850546b
-
SSDEEP
3072:xSmlVKvYAYfR6PHFkOvzke5TzxRhLmmpC9yzlvN:s8KvYAYfRiHFk4zZRzxRhLmK227
Malware Config
Extracted
qakbot
404.46
BB11
1671442875
24.71.120.191:443
121.121.100.148:995
172.90.139.138:2222
70.55.120.16:2222
75.99.125.234:2222
172.248.42.122:443
37.14.229.220:2222
83.7.52.202:443
85.241.180.94:443
90.206.194.248:443
31.53.29.141:2222
72.80.7.6:50003
74.92.243.113:50000
90.48.151.17:2222
176.142.207.63:443
178.153.5.54:443
74.66.134.24:443
46.162.109.183:443
12.172.173.82:993
64.237.240.3:443
65.20.175.208:443
69.119.123.159:2222
94.105.123.53:443
99.229.164.42:443
91.169.12.198:32100
184.153.132.82:443
81.229.117.95:2222
82.34.170.37:443
86.96.75.237:2222
27.109.19.90:2078
109.219.126.249:2222
91.165.188.74:50000
175.139.130.191:2222
76.20.42.45:443
12.172.173.82:50001
91.96.249.3:443
150.107.231.59:2222
12.172.173.82:995
128.127.21.57:443
184.68.116.146:2222
87.220.205.65:2222
184.68.116.146:3389
87.223.95.66:443
92.189.214.236:2222
73.29.92.128:443
86.165.15.180:2222
82.6.99.234:443
92.27.86.48:2222
174.112.22.106:2078
187.199.184.14:32103
199.83.165.233:443
37.15.128.31:2222
90.79.129.166:2222
136.244.25.165:443
93.147.134.85:443
202.187.239.67:995
75.143.236.149:443
67.235.138.14:443
84.35.26.14:995
147.148.234.231:2222
108.6.249.139:443
86.98.23.199:443
60.254.51.168:443
103.55.67.180:443
176.44.121.220:995
103.42.86.42:995
103.141.50.151:995
217.128.200.114:2222
24.228.132.224:2222
90.119.197.132:2222
76.80.180.154:995
72.80.7.6:995
50.68.204.71:995
47.34.30.133:443
103.212.19.254:995
116.74.163.30:443
47.41.154.250:443
83.110.95.209:995
50.68.204.71:443
78.100.238.92:995
12.172.173.82:465
90.116.219.167:2222
86.99.15.254:2222
62.35.67.88:443
92.186.69.229:2222
84.108.173.79:443
79.13.202.140:443
77.86.98.236:443
123.3.240.16:995
86.196.35.232:2222
70.115.104.126:995
86.130.9.250:2222
92.185.204.18:2078
213.67.255.57:2222
73.36.196.11:443
186.64.67.55:443
103.144.201.62:2078
90.78.138.217:2222
76.170.252.153:995
87.202.101.164:50000
89.129.109.27:2222
87.57.13.215:443
108.162.6.34:443
87.65.160.87:995
45.152.16.14:443
12.172.173.82:20
85.245.221.87:2078
98.145.23.67:443
73.155.10.79:443
171.97.42.82:443
71.31.101.183:443
74.33.196.114:443
12.172.173.82:32101
45.248.169.101:443
174.104.184.149:443
90.66.229.185:2222
184.68.116.146:2078
12.172.173.82:22
173.18.126.3:443
-
salt
SoNuce]ugdiB3c[doMuce2s81*uXmcvP
Signatures
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000003\Service chrome.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000003 chrome.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000003\HardwareID chrome.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings chrome.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 360 AcroRd32.exe 360 AcroRd32.exe 360 AcroRd32.exe 360 AcroRd32.exe 360 AcroRd32.exe 360 AcroRd32.exe 360 AcroRd32.exe 360 AcroRd32.exe 360 AcroRd32.exe 360 AcroRd32.exe 360 AcroRd32.exe 360 AcroRd32.exe 360 AcroRd32.exe 360 AcroRd32.exe 360 AcroRd32.exe 360 AcroRd32.exe 360 AcroRd32.exe 360 AcroRd32.exe 360 AcroRd32.exe 360 AcroRd32.exe 1268 chrome.exe 1268 chrome.exe 3076 chrome.exe 3076 chrome.exe 5180 chrome.exe 5180 chrome.exe 5384 chrome.exe 5384 chrome.exe 5560 chrome.exe 5560 chrome.exe 5836 chrome.exe 5836 chrome.exe 5836 chrome.exe 5844 rundll32.exe 5844 rundll32.exe 5952 wermgr.exe 5952 wermgr.exe 5952 wermgr.exe 5952 wermgr.exe 5952 wermgr.exe 5952 wermgr.exe 5996 chrome.exe 5996 chrome.exe 5952 wermgr.exe 5952 wermgr.exe 5952 wermgr.exe 5952 wermgr.exe 5952 wermgr.exe 5952 wermgr.exe 5952 wermgr.exe 5952 wermgr.exe 5952 wermgr.exe 5952 wermgr.exe 5952 wermgr.exe 5952 wermgr.exe 5952 wermgr.exe 5952 wermgr.exe 5952 wermgr.exe 5952 wermgr.exe 5952 wermgr.exe 5952 wermgr.exe 5952 wermgr.exe 5952 wermgr.exe 5952 wermgr.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 5844 rundll32.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe -
Suspicious use of FindShellTrayWindow 38 IoCs
pid Process 360 AcroRd32.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 360 AcroRd32.exe 360 AcroRd32.exe 360 AcroRd32.exe 360 AcroRd32.exe 360 AcroRd32.exe 360 AcroRd32.exe 360 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 360 wrote to memory of 1396 360 AcroRd32.exe 86 PID 360 wrote to memory of 1396 360 AcroRd32.exe 86 PID 360 wrote to memory of 1396 360 AcroRd32.exe 86 PID 1396 wrote to memory of 940 1396 RdrCEF.exe 90 PID 1396 wrote to memory of 940 1396 RdrCEF.exe 90 PID 1396 wrote to memory of 940 1396 RdrCEF.exe 90 PID 1396 wrote to memory of 940 1396 RdrCEF.exe 90 PID 1396 wrote to memory of 940 1396 RdrCEF.exe 90 PID 1396 wrote to memory of 940 1396 RdrCEF.exe 90 PID 1396 wrote to memory of 940 1396 RdrCEF.exe 90 PID 1396 wrote to memory of 940 1396 RdrCEF.exe 90 PID 1396 wrote to memory of 940 1396 RdrCEF.exe 90 PID 1396 wrote to memory of 940 1396 RdrCEF.exe 90 PID 1396 wrote to memory of 940 1396 RdrCEF.exe 90 PID 1396 wrote to memory of 940 1396 RdrCEF.exe 90 PID 1396 wrote to memory of 940 1396 RdrCEF.exe 90 PID 1396 wrote to memory of 940 1396 RdrCEF.exe 90 PID 1396 wrote to memory of 940 1396 RdrCEF.exe 90 PID 1396 wrote to memory of 940 1396 RdrCEF.exe 90 PID 1396 wrote to memory of 940 1396 RdrCEF.exe 90 PID 1396 wrote to memory of 940 1396 RdrCEF.exe 90 PID 1396 wrote to memory of 940 1396 RdrCEF.exe 90 PID 1396 wrote to memory of 940 1396 RdrCEF.exe 90 PID 1396 wrote to memory of 940 1396 RdrCEF.exe 90 PID 1396 wrote to memory of 940 1396 RdrCEF.exe 90 PID 1396 wrote to memory of 940 1396 RdrCEF.exe 90 PID 1396 wrote to memory of 940 1396 RdrCEF.exe 90 PID 1396 wrote to memory of 940 1396 RdrCEF.exe 90 PID 1396 wrote to memory of 940 1396 RdrCEF.exe 90 PID 1396 wrote to memory of 940 1396 RdrCEF.exe 90 PID 1396 wrote to memory of 940 1396 RdrCEF.exe 90 PID 1396 wrote to memory of 940 1396 RdrCEF.exe 90 PID 1396 wrote to memory of 940 1396 RdrCEF.exe 90 PID 1396 wrote to memory of 940 1396 RdrCEF.exe 90 PID 1396 wrote to memory of 940 1396 RdrCEF.exe 90 PID 1396 wrote to memory of 940 1396 RdrCEF.exe 90 PID 1396 wrote to memory of 940 1396 RdrCEF.exe 90 PID 1396 wrote to memory of 940 1396 RdrCEF.exe 90 PID 1396 wrote to memory of 940 1396 RdrCEF.exe 90 PID 1396 wrote to memory of 940 1396 RdrCEF.exe 90 PID 1396 wrote to memory of 940 1396 RdrCEF.exe 90 PID 1396 wrote to memory of 940 1396 RdrCEF.exe 90 PID 1396 wrote to memory of 940 1396 RdrCEF.exe 90 PID 1396 wrote to memory of 940 1396 RdrCEF.exe 90 PID 1396 wrote to memory of 4324 1396 RdrCEF.exe 91 PID 1396 wrote to memory of 4324 1396 RdrCEF.exe 91 PID 1396 wrote to memory of 4324 1396 RdrCEF.exe 91 PID 1396 wrote to memory of 4324 1396 RdrCEF.exe 91 PID 1396 wrote to memory of 4324 1396 RdrCEF.exe 91 PID 1396 wrote to memory of 4324 1396 RdrCEF.exe 91 PID 1396 wrote to memory of 4324 1396 RdrCEF.exe 91 PID 1396 wrote to memory of 4324 1396 RdrCEF.exe 91 PID 1396 wrote to memory of 4324 1396 RdrCEF.exe 91 PID 1396 wrote to memory of 4324 1396 RdrCEF.exe 91 PID 1396 wrote to memory of 4324 1396 RdrCEF.exe 91 PID 1396 wrote to memory of 4324 1396 RdrCEF.exe 91 PID 1396 wrote to memory of 4324 1396 RdrCEF.exe 91 PID 1396 wrote to memory of 4324 1396 RdrCEF.exe 91 PID 1396 wrote to memory of 4324 1396 RdrCEF.exe 91 PID 1396 wrote to memory of 4324 1396 RdrCEF.exe 91 PID 1396 wrote to memory of 4324 1396 RdrCEF.exe 91 PID 1396 wrote to memory of 4324 1396 RdrCEF.exe 91 PID 1396 wrote to memory of 4324 1396 RdrCEF.exe 91 PID 1396 wrote to memory of 4324 1396 RdrCEF.exe 91
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\CT.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:360 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- Suspicious use of WriteProcessMemory
PID:1396 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=D11FFF93F9B3F3345984997769769583 --mojo-platform-channel-handle=1740 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:940
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=0BEE116FB07FDAA08C34E9B7A1B0E6AF --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=1 --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=0BEE116FB07FDAA08C34E9B7A1B0E6AF --renderer-client-id=2 --mojo-platform-channel-handle=1744 --allow-no-sandbox-job /prefetch:13⤵PID:4324
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=4D2A14F46C4FDC63C3299F5B7068FD18 --mojo-platform-channel-handle=2308 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:4688
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=1B3884A0ACF20B2EB90CFC46949583C5 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=1 --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=1B3884A0ACF20B2EB90CFC46949583C5 --renderer-client-id=5 --mojo-platform-channel-handle=2404 --allow-no-sandbox-job /prefetch:13⤵PID:3240
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=2C9734F6CAFCF1767F551680D1AA4DC5 --mojo-platform-channel-handle=2508 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:3756
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=28F492901A6CC6F40E4807EC3E432F37 --mojo-platform-channel-handle=1892 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:176
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3592
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:680
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\CT.pdf1⤵
- Checks SCSI registry key(s)
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3076 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xfc,0x100,0x104,0xdc,0x108,0x7ffd82294f50,0x7ffd82294f60,0x7ffd82294f702⤵PID:4688
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1648,18288323582538999364,6001098406020334010,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1680 /prefetch:22⤵PID:2648
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1648,18288323582538999364,6001098406020334010,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=2028 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1268
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1648,18288323582538999364,6001098406020334010,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2300 /prefetch:82⤵PID:4732
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1648,18288323582538999364,6001098406020334010,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2928 /prefetch:12⤵PID:2904
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1648,18288323582538999364,6001098406020334010,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2924 /prefetch:12⤵PID:3148
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1648,18288323582538999364,6001098406020334010,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3660 /prefetch:12⤵PID:3852
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=ppapi --field-trial-handle=1648,18288323582538999364,6001098406020334010,131072 --lang=en-US --device-scale-factor=1 --ppapi-antialiased-text-enabled=1 --ppapi-subpixel-rendering-setting=1 --mojo-platform-channel-handle=3980 /prefetch:32⤵PID:4212
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1648,18288323582538999364,6001098406020334010,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4596 /prefetch:82⤵PID:2172
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1648,18288323582538999364,6001098406020334010,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5344 /prefetch:82⤵PID:5148
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1648,18288323582538999364,6001098406020334010,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4844 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5180
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1648,18288323582538999364,6001098406020334010,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4816 /prefetch:82⤵PID:5188
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1648,18288323582538999364,6001098406020334010,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4664 /prefetch:82⤵PID:5256
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1648,18288323582538999364,6001098406020334010,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5104 /prefetch:82⤵PID:5292
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1648,18288323582538999364,6001098406020334010,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4796 /prefetch:12⤵PID:5324
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1648,18288323582538999364,6001098406020334010,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4824 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1648,18288323582538999364,6001098406020334010,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5504 /prefetch:12⤵PID:5444
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.FileUtilService --field-trial-handle=1648,18288323582538999364,6001098406020334010,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4628 /prefetch:82⤵PID:5512
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1648,18288323582538999364,6001098406020334010,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6020 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5560
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1648,18288323582538999364,6001098406020334010,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5836
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1648,18288323582538999364,6001098406020334010,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4676 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1648,18288323582538999364,6001098406020334010,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6048 /prefetch:82⤵PID:6108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1648,18288323582538999364,6001098406020334010,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1600 /prefetch:82⤵PID:4380
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1648,18288323582538999364,6001098406020334010,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1600 /prefetch:82⤵PID:5212
-
-
C:\Windows\System32\rundll32.exe"C:\Windows\System32\rundll32.exe" \Nlsdl.dat,DrawThemeIcon1⤵PID:5820
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" \Nlsdl.dat,DrawThemeIcon2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:5844 -
C:\Windows\SysWOW64\wermgr.exeC:\Windows\SysWOW64\wermgr.exe3⤵
- Suspicious behavior: EnumeratesProcesses
PID:5952
-
-