Analysis
-
max time kernel
75s -
max time network
79s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
25-07-2024 19:45
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/drive/u/0/folders/1sl57HRri_j7-Jy6GiT0EZJMEnFtRbBo0
Resource
win10v2004-20240709-en
General
-
Target
https://drive.google.com/drive/u/0/folders/1sl57HRri_j7-Jy6GiT0EZJMEnFtRbBo0
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 5 drive.google.com 9 drive.google.com -
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Modifies registry class 19 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000_Classes\䲵⒲대蠀\ = "prproj_auto_file" OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000_Classes\prproj_auto_file\shell\Read OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000_Classes\prproj_auto_file\shell\Read\command OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000_Classes\Local Settings msedge.exe Key created \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000_Classes\Local Settings OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000_Classes\䲳⒴눀蠀細䄝Ȏ\ = "prproj_auto_file" OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000_Classes\prproj_auto_file\shell OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000_Classes\prproj_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Acrobat Reader DC\\Reader\\AcroRd32.exe\" \"%1\"" OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000_Classes\prproj_auto_file OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000_Classes\篠䄝Ȏ OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000_Classes\䲵⒲대蠀 OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000_Classes\ OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000_Classes\鎀䄝Ȏ OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000_Classes\篠䄝Ȏ\ = "prproj_auto_file" OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000_Classes\䲳⒴눀蠀細䄝Ȏ OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000_Classes\鎀䄝Ȏ\ = "prproj_auto_file" OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000_Classes\.prproj OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000_Classes\.prproj\ = "prproj_auto_file" OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000_Classes\\ = "prproj_auto_file" OpenWith.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2208 msedge.exe 2208 msedge.exe 4144 msedge.exe 4144 msedge.exe 672 identity_helper.exe 672 identity_helper.exe 2204 msedge.exe 2204 msedge.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1624 OpenWith.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
pid Process 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe -
Suspicious use of SetWindowsHookEx 27 IoCs
pid Process 1624 OpenWith.exe 1624 OpenWith.exe 1624 OpenWith.exe 1624 OpenWith.exe 1624 OpenWith.exe 1624 OpenWith.exe 1624 OpenWith.exe 1624 OpenWith.exe 1624 OpenWith.exe 1624 OpenWith.exe 1624 OpenWith.exe 1624 OpenWith.exe 1624 OpenWith.exe 1624 OpenWith.exe 1624 OpenWith.exe 1624 OpenWith.exe 1624 OpenWith.exe 1624 OpenWith.exe 1624 OpenWith.exe 1624 OpenWith.exe 1624 OpenWith.exe 1624 OpenWith.exe 1624 OpenWith.exe 3884 AcroRd32.exe 3884 AcroRd32.exe 3884 AcroRd32.exe 3884 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4144 wrote to memory of 3456 4144 msedge.exe 84 PID 4144 wrote to memory of 3456 4144 msedge.exe 84 PID 4144 wrote to memory of 4636 4144 msedge.exe 85 PID 4144 wrote to memory of 4636 4144 msedge.exe 85 PID 4144 wrote to memory of 4636 4144 msedge.exe 85 PID 4144 wrote to memory of 4636 4144 msedge.exe 85 PID 4144 wrote to memory of 4636 4144 msedge.exe 85 PID 4144 wrote to memory of 4636 4144 msedge.exe 85 PID 4144 wrote to memory of 4636 4144 msedge.exe 85 PID 4144 wrote to memory of 4636 4144 msedge.exe 85 PID 4144 wrote to memory of 4636 4144 msedge.exe 85 PID 4144 wrote to memory of 4636 4144 msedge.exe 85 PID 4144 wrote to memory of 4636 4144 msedge.exe 85 PID 4144 wrote to memory of 4636 4144 msedge.exe 85 PID 4144 wrote to memory of 4636 4144 msedge.exe 85 PID 4144 wrote to memory of 4636 4144 msedge.exe 85 PID 4144 wrote to memory of 4636 4144 msedge.exe 85 PID 4144 wrote to memory of 4636 4144 msedge.exe 85 PID 4144 wrote to memory of 4636 4144 msedge.exe 85 PID 4144 wrote to memory of 4636 4144 msedge.exe 85 PID 4144 wrote to memory of 4636 4144 msedge.exe 85 PID 4144 wrote to memory of 4636 4144 msedge.exe 85 PID 4144 wrote to memory of 4636 4144 msedge.exe 85 PID 4144 wrote to memory of 4636 4144 msedge.exe 85 PID 4144 wrote to memory of 4636 4144 msedge.exe 85 PID 4144 wrote to memory of 4636 4144 msedge.exe 85 PID 4144 wrote to memory of 4636 4144 msedge.exe 85 PID 4144 wrote to memory of 4636 4144 msedge.exe 85 PID 4144 wrote to memory of 4636 4144 msedge.exe 85 PID 4144 wrote to memory of 4636 4144 msedge.exe 85 PID 4144 wrote to memory of 4636 4144 msedge.exe 85 PID 4144 wrote to memory of 4636 4144 msedge.exe 85 PID 4144 wrote to memory of 4636 4144 msedge.exe 85 PID 4144 wrote to memory of 4636 4144 msedge.exe 85 PID 4144 wrote to memory of 4636 4144 msedge.exe 85 PID 4144 wrote to memory of 4636 4144 msedge.exe 85 PID 4144 wrote to memory of 4636 4144 msedge.exe 85 PID 4144 wrote to memory of 4636 4144 msedge.exe 85 PID 4144 wrote to memory of 4636 4144 msedge.exe 85 PID 4144 wrote to memory of 4636 4144 msedge.exe 85 PID 4144 wrote to memory of 4636 4144 msedge.exe 85 PID 4144 wrote to memory of 4636 4144 msedge.exe 85 PID 4144 wrote to memory of 2208 4144 msedge.exe 86 PID 4144 wrote to memory of 2208 4144 msedge.exe 86 PID 4144 wrote to memory of 4176 4144 msedge.exe 87 PID 4144 wrote to memory of 4176 4144 msedge.exe 87 PID 4144 wrote to memory of 4176 4144 msedge.exe 87 PID 4144 wrote to memory of 4176 4144 msedge.exe 87 PID 4144 wrote to memory of 4176 4144 msedge.exe 87 PID 4144 wrote to memory of 4176 4144 msedge.exe 87 PID 4144 wrote to memory of 4176 4144 msedge.exe 87 PID 4144 wrote to memory of 4176 4144 msedge.exe 87 PID 4144 wrote to memory of 4176 4144 msedge.exe 87 PID 4144 wrote to memory of 4176 4144 msedge.exe 87 PID 4144 wrote to memory of 4176 4144 msedge.exe 87 PID 4144 wrote to memory of 4176 4144 msedge.exe 87 PID 4144 wrote to memory of 4176 4144 msedge.exe 87 PID 4144 wrote to memory of 4176 4144 msedge.exe 87 PID 4144 wrote to memory of 4176 4144 msedge.exe 87 PID 4144 wrote to memory of 4176 4144 msedge.exe 87 PID 4144 wrote to memory of 4176 4144 msedge.exe 87 PID 4144 wrote to memory of 4176 4144 msedge.exe 87 PID 4144 wrote to memory of 4176 4144 msedge.exe 87 PID 4144 wrote to memory of 4176 4144 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://drive.google.com/drive/u/0/folders/1sl57HRri_j7-Jy6GiT0EZJMEnFtRbBo01⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4144 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb947046f8,0x7ffb94704708,0x7ffb947047182⤵PID:3456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,5246264920801012316,16493214744492389287,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2156 /prefetch:22⤵PID:4636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2148,5246264920801012316,16493214744492389287,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2128 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2148,5246264920801012316,16493214744492389287,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2792 /prefetch:82⤵PID:4176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,5246264920801012316,16493214744492389287,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:5084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,5246264920801012316,16493214744492389287,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:12⤵PID:2584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,5246264920801012316,16493214744492389287,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5456 /prefetch:82⤵PID:3684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,5246264920801012316,16493214744492389287,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5456 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,5246264920801012316,16493214744492389287,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5460 /prefetch:12⤵PID:920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,5246264920801012316,16493214744492389287,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5132 /prefetch:12⤵PID:2748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,5246264920801012316,16493214744492389287,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5056 /prefetch:12⤵PID:4120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,5246264920801012316,16493214744492389287,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5064 /prefetch:12⤵PID:3572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2148,5246264920801012316,16493214744492389287,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=2144 /prefetch:82⤵PID:4556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,5246264920801012316,16493214744492389287,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5500 /prefetch:12⤵PID:2332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2148,5246264920801012316,16493214744492389287,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5592 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2204
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5100
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1312
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1624 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\Downloads\unstoppable Copy.prproj"2⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3884 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140433⤵
- System Location Discovery: System Language Discovery
PID:3180 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=191EFD4017D9B08E62DCB297C39F0E4A --mojo-platform-channel-handle=1752 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵
- System Location Discovery: System Language Discovery
PID:4840
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=523964EA4A0F42CFE62E70041AC08C72 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=523964EA4A0F42CFE62E70041AC08C72 --renderer-client-id=2 --mojo-platform-channel-handle=1764 --allow-no-sandbox-job /prefetch:14⤵
- System Location Discovery: System Language Discovery
PID:4764
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=7AA741281DE436C5597BA84FFEAA296B --mojo-platform-channel-handle=2312 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵
- System Location Discovery: System Language Discovery
PID:1300
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=5F06BC8405F7047265D5C252ABC18792 --mojo-platform-channel-handle=1888 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵
- System Location Discovery: System Language Discovery
PID:2528
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=1ECA130BA75FBB74BF19FDA4815909F1 --mojo-platform-channel-handle=1944 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵
- System Location Discovery: System Language Discovery
PID:3432
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD575c9f57baeefeecd6c184627de951c1e
SHA152e0468e13cbfc9f15fc62cc27ce14367a996cff
SHA256648ba270261690bb792f95d017e134d81a612ef4fc76dc41921c9e5b8f46d98f
SHA512c4570cc4bb4894de3ecc8eee6cd8bfa5809ea401ceef683557fb170175ff4294cc21cdc6834db4e79e5e82d3bf16105894fff83290d26343423324bc486d4a15
-
Filesize
152B
MD510fa19df148444a77ceec60cabd2ce21
SHA1685b599c497668166ede4945d8885d204fd8d70f
SHA256c3b5deb970d0f06a05c8111da90330ffe25da195aafa4e182211669484d1964b
SHA5123518ce16fef66c59e0bdb772db51aeaa9042c44ca399be61ca3d9979351f93655393236711cf2b1988d5f90a5b9318a7569a8cef3374fc745a8f9aa8323691ef
-
Filesize
36KB
MD5eae5fc6db735938044a4741054dca29e
SHA15ad3a1d30f1123fda791830cd373b9d9041a5663
SHA256967e35cf9787773151cb0a3945617f4a25b0232c8af0b8b8db30797426c40d3f
SHA512a996760ff518a4781eb2d5b6074fad7645b1c06fb98d1dac86c919b67d0e04289790a7e45c57c22b8ac28421b46ed299ecb38d6d979711bc95bf804f47c8556a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD5b239e472403b5c718195fb08704cf6d6
SHA19dc345c170e477710e5489e6ec8b99a57b661761
SHA256e54966b7d92e1ef3382f7c438973ba8194b52b96f5ca7eab2ef50efe9c35c708
SHA512856981e79f127477de9ddd3b85241cc736f5a81e2a8d68d49852ceeb2d2bcdcc2d1aac2db2be0b9b71fbd166999c9825119abfcb7f9bd16ca168b84dd28b95b3
-
Filesize
4KB
MD5da170803e16133341f85c8dd0275a757
SHA1d9eb5019f7f7cca9b8775831b15bfd8ce4b9b54e
SHA2563e9322dd33a78c0b5a8dfcf4f2f84886ba701f9457ce7376965f63611e3a877e
SHA51261d23401529242795ec47ea2a7f4c9ea879b52c03a08aa607e8e5c6e1d03676211e90a9a911080507f17d76fe9218b010faf358d812ce866e0b24e085ce24f90
-
Filesize
5KB
MD58ff1773271a27b57a17376e09d90320d
SHA1589999c689533dbf0c9641f3e05177c946dc4042
SHA256cba99a543b350641e9802b8318c4bcf1ce78400c9f0c7066be95d2e2ac21e3f7
SHA5126bd87ef36c1be4041b066241b4c0a72bb00954a6d149940c8855fce159e54c4c9137721d32c99d836d0187594be004a74c180bf2406e0eeba84ff4fcef923035
-
Filesize
6KB
MD56ee029b54b642b2b48272b1ec4a938d2
SHA177d5e89ad8784fa2475f13500dfcb4616308d05f
SHA2565086b319589b07b40b5a9e40f9c4e356bdc6589f3b0cda627bd9b542f442b72a
SHA512e575d31f1b9e75297ca3f73abad58138c8d4b6d147fea37c835dcf5fcd1d23748119d72df8bc3d71c21616056a40f5410b06d0d1d8bbb9faeed99a15ebc2a27b
-
Filesize
6KB
MD5c4e989509139234146bed469a298fe5f
SHA1f10b190a05a9ea45a4059efd1c78526d51de110e
SHA256c4f71aa18ec4526177b726ee670a809e7a2fc49027158e89489f14677609dbf0
SHA512b54a737b0aa3ea632bf99ddf26dfceec8dfdf825357c419fed75c873f9540f091dd840aef6259ff01f535fb364bc6b4081c764eda7f18eff84d57aa4b0601901
-
Filesize
1KB
MD5a6b0193e6f56702c985e990fd532514d
SHA1ddc20ff6b41c38966952bab4ccdc426a06d48c9f
SHA2566caf62e38436777496491f726e7aa9eef85c8ed778f424fc9fe48aad7cbdaf9d
SHA512bc92125147a716b13e5af442ce61b1e70426ba349f0071aa688e5c510f979c5dba5e0f6542d1abece6cdb4dabc7e94702bb8fe98b0d8a9524a4db52806aefa40
-
Filesize
1KB
MD5215262ac8f6ad94d303556a4699ea5a9
SHA1b826b9c7838401adfa4a794b91bfbd9950bae367
SHA256161a7cea6eada2954e209b222a45f901051ae0b99979dd3292bd0d0f50664aa3
SHA512d6157e969a6c654488161dff392170a2031ad97a4f5992e4107170103eb2c389510ef47a9a854a8aa904acda9cb1488f262232ec170581712e77e8c2700abddf
-
Filesize
1KB
MD538b0350f373910413c440bb9afe94dbb
SHA12e770a386f985df76d172cfc634b592681e56cad
SHA25655951ec028c9ee13ec42a5c9dda713be37f7f381540a993dc971a0a3a14c0e44
SHA512e33b58411cd23bc7df1ae8bf3b6291fb54dc8f6aa415fb7b1bbee3da94824f1d56dceff6dfd1210a230f3c097d56f229755c5fddf435ca527da980a0a2f8b85b
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD552c50fb5ce65d87860499efd3f378313
SHA1a07442da4c4ac8e29ea538d029e04836ba5b7ac9
SHA2567d6de7c2ec8f225aecfeb0f52dadca7b2756cb1a8ec91da532d8c197a009d3e6
SHA51239449deba87c7c33f4bdc9f7f993c5d75c667ae0e081ab642c1429f965492cbc8c4cbf322fba1f21ccb8822f8ffcebc081f7a47151ba66cbf1fb418350c3265b
-
Filesize
12KB
MD51ef2a58e640f6f459bd9ef67d8611443
SHA156972fe12450402a3dec0b7a91ab617698a41139
SHA256102469d8671aa033404630739cc6b84a4e071891d46edaca448ce03d8c1ac371
SHA51290b3906b5020615d3d3c24e7b16669882b7c7f445737c720b94ecd2d9add07071e7ec0698b7c87bc20e8dec69dd38381a98c8c15d7215c981396fddacc8972ea
-
Filesize
637KB
MD5a8c1e40a477eb4e318c22116bc296dd5
SHA1c1e49443605a21c57fd94b671af1beab1607e61f
SHA2568063be4f92f8615382e5eb43a82b83b2b0129c42ace5464c4313a92d50e63834
SHA5123a10b93eb7af279593c6c259fb6127af08a47fde77a6a3d40677cd1b6e7753cc90803f8bd3cb16d63ada7bbf37328a289da5b60c6d5ac953f89687d7abaf8f35