Analysis
-
max time kernel
157s -
max time network
164s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
12/02/2024, 14:48
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://static2.sharepointonline.com/files/fabric/assets/fonts/segoeui-westeuropean/segoeui-semibold.woff2
Resource
win10v2004-20231215-en
General
-
Target
https://static2.sharepointonline.com/files/fabric/assets/fonts/segoeui-westeuropean/segoeui-semibold.woff2
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133522229435392106" chrome.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000_Classes\Local Settings chrome.exe Key created \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 3608 AcroRd32.exe 3608 AcroRd32.exe 3608 AcroRd32.exe 3608 AcroRd32.exe 3608 AcroRd32.exe 3608 AcroRd32.exe 3608 AcroRd32.exe 3608 AcroRd32.exe 3608 AcroRd32.exe 3608 AcroRd32.exe 3608 AcroRd32.exe 3608 AcroRd32.exe 3608 AcroRd32.exe 3608 AcroRd32.exe 3608 AcroRd32.exe 3608 AcroRd32.exe 3608 AcroRd32.exe 3608 AcroRd32.exe 3608 AcroRd32.exe 3608 AcroRd32.exe 416 chrome.exe 416 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1580 chrome.exe 1580 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 3608 AcroRd32.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe -
Suspicious use of SetWindowsHookEx 25 IoCs
pid Process 5068 OpenWith.exe 5068 OpenWith.exe 5068 OpenWith.exe 5068 OpenWith.exe 5068 OpenWith.exe 5068 OpenWith.exe 5068 OpenWith.exe 5068 OpenWith.exe 5068 OpenWith.exe 5068 OpenWith.exe 5068 OpenWith.exe 5068 OpenWith.exe 5068 OpenWith.exe 5068 OpenWith.exe 5068 OpenWith.exe 5068 OpenWith.exe 5068 OpenWith.exe 5068 OpenWith.exe 5068 OpenWith.exe 3608 AcroRd32.exe 3608 AcroRd32.exe 3608 AcroRd32.exe 3608 AcroRd32.exe 3608 AcroRd32.exe 3608 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1580 wrote to memory of 4456 1580 chrome.exe 84 PID 1580 wrote to memory of 4456 1580 chrome.exe 84 PID 1580 wrote to memory of 4180 1580 chrome.exe 86 PID 1580 wrote to memory of 4180 1580 chrome.exe 86 PID 1580 wrote to memory of 4180 1580 chrome.exe 86 PID 1580 wrote to memory of 4180 1580 chrome.exe 86 PID 1580 wrote to memory of 4180 1580 chrome.exe 86 PID 1580 wrote to memory of 4180 1580 chrome.exe 86 PID 1580 wrote to memory of 4180 1580 chrome.exe 86 PID 1580 wrote to memory of 4180 1580 chrome.exe 86 PID 1580 wrote to memory of 4180 1580 chrome.exe 86 PID 1580 wrote to memory of 4180 1580 chrome.exe 86 PID 1580 wrote to memory of 4180 1580 chrome.exe 86 PID 1580 wrote to memory of 4180 1580 chrome.exe 86 PID 1580 wrote to memory of 4180 1580 chrome.exe 86 PID 1580 wrote to memory of 4180 1580 chrome.exe 86 PID 1580 wrote to memory of 4180 1580 chrome.exe 86 PID 1580 wrote to memory of 4180 1580 chrome.exe 86 PID 1580 wrote to memory of 4180 1580 chrome.exe 86 PID 1580 wrote to memory of 4180 1580 chrome.exe 86 PID 1580 wrote to memory of 4180 1580 chrome.exe 86 PID 1580 wrote to memory of 4180 1580 chrome.exe 86 PID 1580 wrote to memory of 4180 1580 chrome.exe 86 PID 1580 wrote to memory of 4180 1580 chrome.exe 86 PID 1580 wrote to memory of 4180 1580 chrome.exe 86 PID 1580 wrote to memory of 4180 1580 chrome.exe 86 PID 1580 wrote to memory of 4180 1580 chrome.exe 86 PID 1580 wrote to memory of 4180 1580 chrome.exe 86 PID 1580 wrote to memory of 4180 1580 chrome.exe 86 PID 1580 wrote to memory of 4180 1580 chrome.exe 86 PID 1580 wrote to memory of 4180 1580 chrome.exe 86 PID 1580 wrote to memory of 4180 1580 chrome.exe 86 PID 1580 wrote to memory of 4180 1580 chrome.exe 86 PID 1580 wrote to memory of 4180 1580 chrome.exe 86 PID 1580 wrote to memory of 4180 1580 chrome.exe 86 PID 1580 wrote to memory of 4180 1580 chrome.exe 86 PID 1580 wrote to memory of 4180 1580 chrome.exe 86 PID 1580 wrote to memory of 4180 1580 chrome.exe 86 PID 1580 wrote to memory of 4180 1580 chrome.exe 86 PID 1580 wrote to memory of 4180 1580 chrome.exe 86 PID 1580 wrote to memory of 5052 1580 chrome.exe 88 PID 1580 wrote to memory of 5052 1580 chrome.exe 88 PID 1580 wrote to memory of 2504 1580 chrome.exe 87 PID 1580 wrote to memory of 2504 1580 chrome.exe 87 PID 1580 wrote to memory of 2504 1580 chrome.exe 87 PID 1580 wrote to memory of 2504 1580 chrome.exe 87 PID 1580 wrote to memory of 2504 1580 chrome.exe 87 PID 1580 wrote to memory of 2504 1580 chrome.exe 87 PID 1580 wrote to memory of 2504 1580 chrome.exe 87 PID 1580 wrote to memory of 2504 1580 chrome.exe 87 PID 1580 wrote to memory of 2504 1580 chrome.exe 87 PID 1580 wrote to memory of 2504 1580 chrome.exe 87 PID 1580 wrote to memory of 2504 1580 chrome.exe 87 PID 1580 wrote to memory of 2504 1580 chrome.exe 87 PID 1580 wrote to memory of 2504 1580 chrome.exe 87 PID 1580 wrote to memory of 2504 1580 chrome.exe 87 PID 1580 wrote to memory of 2504 1580 chrome.exe 87 PID 1580 wrote to memory of 2504 1580 chrome.exe 87 PID 1580 wrote to memory of 2504 1580 chrome.exe 87 PID 1580 wrote to memory of 2504 1580 chrome.exe 87 PID 1580 wrote to memory of 2504 1580 chrome.exe 87 PID 1580 wrote to memory of 2504 1580 chrome.exe 87 PID 1580 wrote to memory of 2504 1580 chrome.exe 87 PID 1580 wrote to memory of 2504 1580 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://static2.sharepointonline.com/files/fabric/assets/fonts/segoeui-westeuropean/segoeui-semibold.woff21⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1580 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x100,0x104,0x108,0xfc,0x10c,0x7ffd93089758,0x7ffd93089768,0x7ffd930897782⤵PID:4456
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1724 --field-trial-handle=1764,i,5073765938026496367,10071688844085628101,131072 /prefetch:22⤵PID:4180
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2208 --field-trial-handle=1764,i,5073765938026496367,10071688844085628101,131072 /prefetch:82⤵PID:2504
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2012 --field-trial-handle=1764,i,5073765938026496367,10071688844085628101,131072 /prefetch:82⤵PID:5052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2904 --field-trial-handle=1764,i,5073765938026496367,10071688844085628101,131072 /prefetch:12⤵PID:3160
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2936 --field-trial-handle=1764,i,5073765938026496367,10071688844085628101,131072 /prefetch:12⤵PID:892
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4792 --field-trial-handle=1764,i,5073765938026496367,10071688844085628101,131072 /prefetch:82⤵PID:4284
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5036 --field-trial-handle=1764,i,5073765938026496367,10071688844085628101,131072 /prefetch:82⤵PID:1560
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5308 --field-trial-handle=1764,i,5073765938026496367,10071688844085628101,131072 /prefetch:82⤵PID:4252
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3684 --field-trial-handle=1764,i,5073765938026496367,10071688844085628101,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:416
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1888
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:5068 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\Downloads\segoeui-semibold.woff2"2⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:3608 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140433⤵PID:2020
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=6023A847BE9AB6161EE7B65B345B6CE2 --mojo-platform-channel-handle=1760 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵PID:64
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=132839744EE724D90D2CDA02E2F9A9F9 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=132839744EE724D90D2CDA02E2F9A9F9 --renderer-client-id=2 --mojo-platform-channel-handle=1752 --allow-no-sandbox-job /prefetch:14⤵PID:540
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=4284E098B713D0234532BAFF45AF27C6 --mojo-platform-channel-handle=2192 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵PID:736
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=D1CFD5AB16408B060F726FB8F702507B --mojo-platform-channel-handle=1756 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵PID:4964
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=77283DB6849AD401B9AB32FDCE620335 --mojo-platform-channel-handle=2200 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵PID:3776
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=C8FD0255F014AF60B9D326D42A8EAA3D --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=C8FD0255F014AF60B9D326D42A8EAA3D --renderer-client-id=8 --mojo-platform-channel-handle=2212 --allow-no-sandbox-job /prefetch:14⤵PID:3460
-
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1940
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
36KB
MD5b30d3becc8731792523d599d949e63f5
SHA119350257e42d7aee17fb3bf139a9d3adb330fad4
SHA256b1b77e96279ead2b460de3de70e2ea4f5ad1b853598a4e27a5caf3f1a32cc4f3
SHA512523f54895fb07f62b9a5f72c8b62e83d4d9506bda57b183818615f6eb7286e3b9c5a50409bc5c5164867c3ccdeae88aa395ecca6bc7e36d991552f857510792e
-
Filesize
56KB
MD5752a1f26b18748311b691c7d8fc20633
SHA1c1f8e83eebc1cc1e9b88c773338eb09ff82ab862
SHA256111dac2948e4cecb10b0d2e10d8afaa663d78d643826b592d6414a1fd77cc131
SHA512a2f5f262faf2c3e9756da94b2c47787ce3a9391b5bd53581578aa9a764449e114836704d6dec4aadc097fed4c818831baa11affa1eb25be2bfad9349bb090fe5
-
Filesize
64KB
MD540ec207c5317fbee56471397a7586ae1
SHA15cb651835c90aca325461b4dcb8fc627ed5fdb65
SHA256127d22fdf99b00de3f7277f6eb8b4c57926859842d22a643446153e492501359
SHA5129c3823b5f2b26419b630d2dde9b8dd56d6cd37bf7efa0edb855d83ff2cac54160940d530c6c1e9d0385f53490ff02a2ba3b6851365584dc3be3bbcd164c1e1d1
-
Filesize
910B
MD5676aeb77d24a8aedf8596d57dc72bb95
SHA10ebd44fc11d3265b16939b7dc9fa0bccb437f039
SHA256bfd97969780d12d376484e63eddee235e3508ff6a9b6132c59799a4d94f3f05c
SHA51299e9fe5e9f865e0156931d0786ddf71a4fa3413f802ac1da644bb48562cb35bdb767768f69938d05b44bc9776a23534a08e308f64ad82baa58891a3df5c45166
-
Filesize
6KB
MD547a471e328fa0c1592ffedd09b9f09b6
SHA1ec8bf8b07cfed969844432d39313c0bb8c0d7366
SHA2567b0ddd8ad2349a2670666c2e0315e896dd181d10485a8263f54bf45d79e76bde
SHA512e87384e12d7ea235371f5678a407a25c182ae0b794b2fbd405e26ffde9f574ca7d34c3b87f520a45738ff54575436547eb95cc61bdd588f4f10311779e826623
-
Filesize
114KB
MD5a881e21fcad3f6973ef84b1e9ee224d5
SHA1bcba613920fc3c16b408b82be5ac5279a8ead42f
SHA2561ae9097a2d00ed9c4c221159a11f683d19008a200b1e1e0a2afda20f192a80a1
SHA512a809c038a39f96301158a97811565ffddb5856e66fe3d6ca555b6cffb8ae96862b4de6f5030de3b56b4deb35ce0f142b0d22bdbc66380c4dfdef628579693f6d
-
Filesize
107KB
MD5326e5005dd2caecdb3cce5ebd83d8651
SHA15fbe444ada85c2a334fc6831eb5662c1704f8694
SHA256c496091feaedba8000ff02192fb567f62cb033e213c9f92d20700b26869d6de5
SHA5128a3ff029d6cf38bc7dae5d4682d80ec98f7cb70f312a40417b29dbd0b749aeb43cd3db5df5c296eca05d2e2184c748e8fe46451288cc533f54375ba6ac54da05
-
Filesize
103KB
MD5fa4c47dcbb91d642ba72574db29b4483
SHA1d7f008296f3bef5a66602e584bdd0e96c1d61d81
SHA256ea79d133c2493d8e56f9b602513565f23f5789802d25f1b33919472ec752f13c
SHA512b782f73e53a960922b674d0edb433ac46777025f1ca65f2ebe4db4627fe7d909a745fc7f8cb51b88df4744095e8c791ccdf24ddbe79e8bf71fc6ac28147e338e
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
31KB
MD566d11e55b7a413ddf6a84e858697e7b6
SHA1fe2693ad426bd3dc173c870ca856478c7e20d43a
SHA25622e7ac6e00b3f7463f2c89c577877ed717686d6f219614c890317d86560c413d
SHA512bfbcbdca48f43a15af46c69ba3fbc4e8c5e797da8b67e74f4d33252c041561098974a21ca3d9925d3385f2faefb7f6cef6ed9ed0026969ddb4668149fef588c1