Analysis
-
max time kernel
149s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06-08-2024 01:05
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/Euronymou5/Doxxer-Toolkit
Resource
win10v2004-20240802-en
General
-
Target
https://github.com/Euronymou5/Doxxer-Toolkit
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 94 raw.githubusercontent.com 95 raw.githubusercontent.com -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\System32\DriverStore\FileRepository\display.inf_amd64_71aa85b0e2292a7a\display.PNF chrome.exe File created \??\c:\windows\system32\driverstore\filerepository\display.inf_amd64_71aa85b0e2292a7a\display.PNF chrome.exe -
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133673799733731576" chrome.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\Local Settings chrome.exe Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4732 chrome.exe 4732 chrome.exe 3428 chrome.exe 3428 chrome.exe 3428 chrome.exe 3428 chrome.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2568 OpenWith.exe -
Suspicious behavior: LoadsDriver 6 IoCs
pid Process 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 660 Process not Found -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4732 chrome.exe 4732 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4732 chrome.exe Token: SeCreatePagefilePrivilege 4732 chrome.exe Token: SeShutdownPrivilege 4732 chrome.exe Token: SeCreatePagefilePrivilege 4732 chrome.exe Token: SeShutdownPrivilege 4732 chrome.exe Token: SeCreatePagefilePrivilege 4732 chrome.exe Token: SeShutdownPrivilege 4732 chrome.exe Token: SeCreatePagefilePrivilege 4732 chrome.exe Token: SeShutdownPrivilege 4732 chrome.exe Token: SeCreatePagefilePrivilege 4732 chrome.exe Token: SeShutdownPrivilege 4732 chrome.exe Token: SeCreatePagefilePrivilege 4732 chrome.exe Token: SeShutdownPrivilege 4732 chrome.exe Token: SeCreatePagefilePrivilege 4732 chrome.exe Token: SeShutdownPrivilege 4732 chrome.exe Token: SeCreatePagefilePrivilege 4732 chrome.exe Token: SeShutdownPrivilege 4732 chrome.exe Token: SeCreatePagefilePrivilege 4732 chrome.exe Token: SeShutdownPrivilege 4732 chrome.exe Token: SeCreatePagefilePrivilege 4732 chrome.exe Token: SeShutdownPrivilege 4732 chrome.exe Token: SeCreatePagefilePrivilege 4732 chrome.exe Token: SeShutdownPrivilege 4732 chrome.exe Token: SeCreatePagefilePrivilege 4732 chrome.exe Token: SeShutdownPrivilege 4732 chrome.exe Token: SeCreatePagefilePrivilege 4732 chrome.exe Token: SeShutdownPrivilege 4732 chrome.exe Token: SeCreatePagefilePrivilege 4732 chrome.exe Token: SeShutdownPrivilege 4732 chrome.exe Token: SeCreatePagefilePrivilege 4732 chrome.exe Token: SeShutdownPrivilege 4732 chrome.exe Token: SeCreatePagefilePrivilege 4732 chrome.exe Token: SeShutdownPrivilege 4732 chrome.exe Token: SeCreatePagefilePrivilege 4732 chrome.exe Token: SeShutdownPrivilege 4732 chrome.exe Token: SeCreatePagefilePrivilege 4732 chrome.exe Token: SeShutdownPrivilege 4732 chrome.exe Token: SeCreatePagefilePrivilege 4732 chrome.exe Token: SeShutdownPrivilege 4732 chrome.exe Token: SeCreatePagefilePrivilege 4732 chrome.exe Token: SeShutdownPrivilege 4732 chrome.exe Token: SeCreatePagefilePrivilege 4732 chrome.exe Token: SeShutdownPrivilege 4732 chrome.exe Token: SeCreatePagefilePrivilege 4732 chrome.exe Token: SeShutdownPrivilege 4732 chrome.exe Token: SeCreatePagefilePrivilege 4732 chrome.exe Token: SeShutdownPrivilege 4732 chrome.exe Token: SeCreatePagefilePrivilege 4732 chrome.exe Token: SeShutdownPrivilege 4732 chrome.exe Token: SeCreatePagefilePrivilege 4732 chrome.exe Token: SeShutdownPrivilege 4732 chrome.exe Token: SeCreatePagefilePrivilege 4732 chrome.exe Token: SeShutdownPrivilege 4732 chrome.exe Token: SeCreatePagefilePrivilege 4732 chrome.exe Token: SeShutdownPrivilege 4732 chrome.exe Token: SeCreatePagefilePrivilege 4732 chrome.exe Token: SeShutdownPrivilege 4732 chrome.exe Token: SeCreatePagefilePrivilege 4732 chrome.exe Token: SeShutdownPrivilege 4732 chrome.exe Token: SeCreatePagefilePrivilege 4732 chrome.exe Token: SeShutdownPrivilege 4732 chrome.exe Token: SeCreatePagefilePrivilege 4732 chrome.exe Token: SeShutdownPrivilege 4732 chrome.exe Token: SeCreatePagefilePrivilege 4732 chrome.exe -
Suspicious use of FindShellTrayWindow 49 IoCs
pid Process 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe -
Suspicious use of SendNotifyMessage 40 IoCs
pid Process 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe -
Suspicious use of SetWindowsHookEx 19 IoCs
pid Process 2568 OpenWith.exe 2568 OpenWith.exe 2568 OpenWith.exe 2568 OpenWith.exe 2568 OpenWith.exe 2568 OpenWith.exe 2568 OpenWith.exe 2568 OpenWith.exe 2568 OpenWith.exe 2568 OpenWith.exe 2568 OpenWith.exe 2568 OpenWith.exe 2568 OpenWith.exe 2568 OpenWith.exe 2568 OpenWith.exe 4144 AcroRd32.exe 4144 AcroRd32.exe 4144 AcroRd32.exe 4144 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4732 wrote to memory of 2136 4732 chrome.exe 84 PID 4732 wrote to memory of 2136 4732 chrome.exe 84 PID 4732 wrote to memory of 748 4732 chrome.exe 86 PID 4732 wrote to memory of 748 4732 chrome.exe 86 PID 4732 wrote to memory of 748 4732 chrome.exe 86 PID 4732 wrote to memory of 748 4732 chrome.exe 86 PID 4732 wrote to memory of 748 4732 chrome.exe 86 PID 4732 wrote to memory of 748 4732 chrome.exe 86 PID 4732 wrote to memory of 748 4732 chrome.exe 86 PID 4732 wrote to memory of 748 4732 chrome.exe 86 PID 4732 wrote to memory of 748 4732 chrome.exe 86 PID 4732 wrote to memory of 748 4732 chrome.exe 86 PID 4732 wrote to memory of 748 4732 chrome.exe 86 PID 4732 wrote to memory of 748 4732 chrome.exe 86 PID 4732 wrote to memory of 748 4732 chrome.exe 86 PID 4732 wrote to memory of 748 4732 chrome.exe 86 PID 4732 wrote to memory of 748 4732 chrome.exe 86 PID 4732 wrote to memory of 748 4732 chrome.exe 86 PID 4732 wrote to memory of 748 4732 chrome.exe 86 PID 4732 wrote to memory of 748 4732 chrome.exe 86 PID 4732 wrote to memory of 748 4732 chrome.exe 86 PID 4732 wrote to memory of 748 4732 chrome.exe 86 PID 4732 wrote to memory of 748 4732 chrome.exe 86 PID 4732 wrote to memory of 748 4732 chrome.exe 86 PID 4732 wrote to memory of 748 4732 chrome.exe 86 PID 4732 wrote to memory of 748 4732 chrome.exe 86 PID 4732 wrote to memory of 748 4732 chrome.exe 86 PID 4732 wrote to memory of 748 4732 chrome.exe 86 PID 4732 wrote to memory of 748 4732 chrome.exe 86 PID 4732 wrote to memory of 748 4732 chrome.exe 86 PID 4732 wrote to memory of 748 4732 chrome.exe 86 PID 4732 wrote to memory of 748 4732 chrome.exe 86 PID 4732 wrote to memory of 208 4732 chrome.exe 87 PID 4732 wrote to memory of 208 4732 chrome.exe 87 PID 4732 wrote to memory of 5040 4732 chrome.exe 88 PID 4732 wrote to memory of 5040 4732 chrome.exe 88 PID 4732 wrote to memory of 5040 4732 chrome.exe 88 PID 4732 wrote to memory of 5040 4732 chrome.exe 88 PID 4732 wrote to memory of 5040 4732 chrome.exe 88 PID 4732 wrote to memory of 5040 4732 chrome.exe 88 PID 4732 wrote to memory of 5040 4732 chrome.exe 88 PID 4732 wrote to memory of 5040 4732 chrome.exe 88 PID 4732 wrote to memory of 5040 4732 chrome.exe 88 PID 4732 wrote to memory of 5040 4732 chrome.exe 88 PID 4732 wrote to memory of 5040 4732 chrome.exe 88 PID 4732 wrote to memory of 5040 4732 chrome.exe 88 PID 4732 wrote to memory of 5040 4732 chrome.exe 88 PID 4732 wrote to memory of 5040 4732 chrome.exe 88 PID 4732 wrote to memory of 5040 4732 chrome.exe 88 PID 4732 wrote to memory of 5040 4732 chrome.exe 88 PID 4732 wrote to memory of 5040 4732 chrome.exe 88 PID 4732 wrote to memory of 5040 4732 chrome.exe 88 PID 4732 wrote to memory of 5040 4732 chrome.exe 88 PID 4732 wrote to memory of 5040 4732 chrome.exe 88 PID 4732 wrote to memory of 5040 4732 chrome.exe 88 PID 4732 wrote to memory of 5040 4732 chrome.exe 88 PID 4732 wrote to memory of 5040 4732 chrome.exe 88 PID 4732 wrote to memory of 5040 4732 chrome.exe 88 PID 4732 wrote to memory of 5040 4732 chrome.exe 88 PID 4732 wrote to memory of 5040 4732 chrome.exe 88 PID 4732 wrote to memory of 5040 4732 chrome.exe 88 PID 4732 wrote to memory of 5040 4732 chrome.exe 88 PID 4732 wrote to memory of 5040 4732 chrome.exe 88 PID 4732 wrote to memory of 5040 4732 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://github.com/Euronymou5/Doxxer-Toolkit1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4732 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xf8,0xd4,0x7ffd8096cc40,0x7ffd8096cc4c,0x7ffd8096cc582⤵PID:2136
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1912,i,3998175627180340110,7929491638133874461,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1904 /prefetch:22⤵PID:748
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2024,i,3998175627180340110,7929491638133874461,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2188 /prefetch:32⤵PID:208
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2248,i,3998175627180340110,7929491638133874461,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2256 /prefetch:82⤵PID:5040
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3100,i,3998175627180340110,7929491638133874461,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3140 /prefetch:12⤵PID:1068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3108,i,3998175627180340110,7929491638133874461,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:2420
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4736,i,3998175627180340110,7929491638133874461,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4872 /prefetch:82⤵PID:4652
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=4892,i,3998175627180340110,7929491638133874461,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3740 /prefetch:82⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:3428
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4504,i,3998175627180340110,7929491638133874461,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5004 /prefetch:82⤵PID:3960
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:844
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:1524
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:320
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2568 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\Downloads\grabber.php"2⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4144 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140433⤵
- System Location Discovery: System Language Discovery
PID:5100 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=7F28B02CE05AF96E34ABF9A940A21666 --mojo-platform-channel-handle=1752 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵
- System Location Discovery: System Language Discovery
PID:516
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=1F8E8E4636BC2CDC7D99F738B4E31644 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=1F8E8E4636BC2CDC7D99F738B4E31644 --renderer-client-id=2 --mojo-platform-channel-handle=1764 --allow-no-sandbox-job /prefetch:14⤵
- System Location Discovery: System Language Discovery
PID:4032
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=5FE3469837E8511FEC5B67528F22B1AA --mojo-platform-channel-handle=2312 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵
- System Location Discovery: System Language Discovery
PID:4024
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=8D39CECF9058DCC59D6D335C3DC636D2 --mojo-platform-channel-handle=1952 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵
- System Location Discovery: System Language Discovery
PID:2112
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=E209EF8030ED49B8EB7C94E1A5304939 --mojo-platform-channel-handle=2340 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵
- System Location Discovery: System Language Discovery
PID:4932
-
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1252
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
102KB
MD53b6a5ec688b83457a4aca46453a89b9c
SHA1a1402b97a860f7fd149c3278445fe2e2ded5e77c
SHA256f341fb34378fb31e3223a1bfcf99ec3b4e5d85da513b5883ea39b77fb85f0cb9
SHA512a5a41f28b896b1f9488946a669ef1ebc7112c71e9ebe1e9bfc34ce99fb9caaba94f5f5aa1ec28467fb459d5a6fc518aaaa54ae65bf1537dafa0f101069be46f7
-
Filesize
2KB
MD5521b31b8ca9f93db546e4d00386e0f2d
SHA160131b9b9184ed27c46e09d8db26ba6a2df8b0ea
SHA256d3a2bd9d627758c321689fb3098f3e767fa88dc5283b36d2773ed5ec22472b70
SHA5124b80f6aab91a201d5d0bf30f2d26a55b9e2bb8b76598abb33c1ea82c9a6abdd62bc6ec21eb734e112ee51b870461473aef83bc17dcaae02e5d63d5cd8edc7308
-
Filesize
2KB
MD536942c56dc0cad41ed8621646c26b132
SHA1da9eb0c2f72513de6fdcb9758f2112b08fa45474
SHA25683bb98925879ccfec634617d660274420882f4eec5f09eed49b27d039bcebbc4
SHA5120f220662037d17fa4f8b760cc42912b3e51103e549cf2871937adc5f6510d00803e8729f7a5b4dd248e88af774e7ecbcbd7e2c69ce606e1cde2dde77ba871303
-
Filesize
2KB
MD535a8d063df80e15db54c6f7748064fbe
SHA1bbb2afead61153b0127f31a115e668d4b1f5db6d
SHA2562f342ac6851ac15c3fc896ba8485dbc83c6f921c968da82e5a7cf1bfc5b1c878
SHA5120938f01323cd0408ab138eca99e4dffb264ecf734282c6ea802639b56a71da92ae59d58361339ccc4cd3420ef83843ce2aa3b1056b1fb1e81877a3916813b77c
-
Filesize
2KB
MD531d0d182e9396764559e629cfb16ac8c
SHA1c818b733bff672d913e900a83b3fda49da6f0505
SHA256dde3bf2aadf45679676909a5e6ae3038cad20c1a77617b333b6731856c0b6f37
SHA5122350f9ef19402fff606bdc4b3096ce46cfd2c216d0b82aeea129a2b8086fd17badd431bb7f23bd7fcfbb36e3c2278091769615d34360d8951a10594c6c388ba8
-
Filesize
1KB
MD5d7cabefd2dc037c2ba33247db0656d55
SHA17d3cf26241f8dafa0d80f6f1e5af93e224bc7d2f
SHA25679211858c52f510db0a1df8653586878e8bd8ee0f4a8c15d0acc5cda72c364ce
SHA512e8909da93bd0d3c32f3a03ff3b18fb84fb762251bab47bb3d7932815931c0733acf4044def4dc0640008b2fc49a5f9d3bfbfd42774cc02adda4d8ca3217975ed
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD5bb449f680388323fd1ff7eaed64f5f86
SHA100a7fb3605d572d6fb4ec93c73e3cf3f1ac92dff
SHA256217436ae891390469ebcd5b5dd31c66a068d22a9cd6c5ad4cab7b74731096167
SHA51295ffd84b079a3785506d4bfeb2f11db51610ed8e87fc9d901127561fa5613e0133b2f127c808294c764c0ee601a2015dd6bca788efc797ac4cb623d1a86feb17
-
Filesize
1KB
MD557694d0e48bdf19c67f0fcddd081ce5a
SHA186f8250b2f1ccdc22a98e81aad4b30b91a5ba17d
SHA256464a551b976dda5b874add639c6ead7066bd3ef366a86d368cd9f0796a2b109a
SHA512f2a7e870dd37983a3577be23e45fcda14ae853f2c45baf3980ac738fe9d6aa098bbe0df348993f163d5043a482136d83e2000cbe72bf7b65b14de981dfce0e3a
-
Filesize
1KB
MD55792bb460b38fc5b78f9604284a2834a
SHA1551786c392ef5adb38062fa31bf5092cdfaa8860
SHA25680fd4d9c35b8f8fcd2cad042673a18184c4f65060e4459e6864f2eae65d590e8
SHA512efd3350e73a7b52fe4bfa046d3de8b5e6273ed9edd31663b0537c6c38e715b55496f27f061189236c6aeaeef9f85e3f24536819f35fb3800fb01bb678da181be
-
Filesize
1KB
MD59b10ff91a1d0b7d0c74f826b742a423a
SHA197e912e803000eacc4a403fdbe31c819efa4c34f
SHA2569dc1971653c308a3f82a3be3e24dc59509b2e5cc5dd8269cff4490b23414e4ca
SHA512487855bf314e53db6a3e2a0fc378dd46278c4a7a6ab6c834140feb1625e3bd9637ef2ddf8b0125c945c98a18539ad37ada356480e2ad91c5929a80433a2e1704
-
Filesize
1KB
MD581efabd307eff67adede4cc4f57c020f
SHA1ef0afc5a68d7b622e4dc59ea559b5d5f14af2588
SHA2560a02414739f94b4e396db9746b83fff106c58c4167debb18929ba8407a2b1ea1
SHA512ae7a5da78a2cbb2a1312fcf476c9c4dd96e94d3677f26dec10b8b23331baa9b0f0c3a0d6e35a9e201b13f88ed235a2275d6f4859fd7cb501c8f19b552f42ab82
-
Filesize
1KB
MD50261077cc0e6e49cf9d2de5415254a1a
SHA1276d093c5a93b33ab9348988fe133c17c98664d4
SHA256778a4fefe1b38519be0a2d679bd52e5029cc5baed4df96487c02ad3da1c37767
SHA5125f53faff43c9c0e1e24770665cb1b7264003a8eaa1674e17096e756b87a88671f3506738664cae37ab5f807678aacd93a90d14f83ff0d2a2d346f2ce8153004d
-
Filesize
1KB
MD52cdf4137101d2b86df58f6959ad7e63c
SHA1f3b1b1e9854d1a26336ea0d9b106188ceb55601a
SHA256d0e65ab42f6a715d81ccfcdc0d5b6caa4f401437494273d956b2e7cef2a5552c
SHA512850796fa44ee2d2b97e8cc543824b802decc44ee9493dfa3796bdf3db33d30e35c1ffc211840ca478f63da5620e3e1b54e89f4bdedfaaf5d3aeecf81c5c3d4f0
-
Filesize
9KB
MD5f967d128c429cf9b65921ae95e6a4ec4
SHA14267a424d207658ddc710949ef6a980f309215d7
SHA2565a49469e3b4f82979a6922f2c70232efefc401379397d80190ad895d770e02a7
SHA5128b4221c67d23739c93553c3334fca4e7e9cc237b8f8b416be249de2d7ceb23a90d3c587a7182fb5ea9be67cf4c1e81db45712b90271ad88f509ea837b4856297
-
Filesize
9KB
MD5687a3aeb2fddf67fdcc13f4ffd30070c
SHA1eba7676e72858c6ee81313427049744d525ebab6
SHA2565056881f9f94402eade5edaedfd5656b2cb2ff962a7809d9f714cbe85a7f758d
SHA512499dd353eccb0308916e1d8fc822594c5a90aa26816a9b94cd4594eb7d69e6e4782726b2c62a18d7e1f40633d115d50b134ab3790a23f9c518b7a3eac23444cb
-
Filesize
9KB
MD50b2ed9742996c50cd28b4465bcffa7fa
SHA171aedf8d4954f610f2c622d71edd34c2bd8b87a2
SHA25626f9266942b7677c984484341d990b374a5a1748bff0a64fccbb0c860e8da36b
SHA51299a3b438a7f24f979dd58a78c711d816d088c22fc20116b1340085718978c2b95a3385d2b9d1a2fdc6de032d4b5b3b45c46404c6055327b72a63492200b6fa2a
-
Filesize
9KB
MD5fc0991ad9e99ebedc2b9d84c2bfe9ad9
SHA13625fa42278d611679acd5f0ecf690fb53e585e3
SHA2564f8afcfd5ba5eab58e189f8a86cd71a3c602c8733844a99baede8ec7aa43747d
SHA512c0b87bf42fa5943e6d417ea37ae3740c6fa322d74e3d42e2ed19eaeba17454642adae33f71bd0042a1a58c6bbc7b6b6b1841c9921376dfa6ff16517c84eba030
-
Filesize
9KB
MD5046751c5bf790f353ad5ccd25e2cf525
SHA1809d5b1fbdef22b234c595158591cd1a91f97561
SHA256a7db0c5952e9c1a08e8093b267cccc18e26811dc757486b299cee53bbcc1567f
SHA512f10557915298567de63e10aebd04c74781ac1a2f80951b7baf47660946564986164c23d777128746229ad6947290de4a43ae1f3866851165115b29c03ed46b55
-
Filesize
9KB
MD5975ad2c320d1261c5a2d767c9f1df3a8
SHA1a6299261ffdb6b4759c6e87bcd5c020d5956f418
SHA25692ae825e641b60138e26d7f0e2497a314ee380e5268400f9d18ec3306e121989
SHA5122dd73d732e4f86fe98fee86cf2db71dae359aaaed76196d6341498d09fbcf6576b8a83201442994e834d027a95b23b12e11e0a66ccd61a6d40283d0a51a01ad0
-
Filesize
9KB
MD5cb3099154812ddfdde667a7d1571e7a0
SHA1188edaab7e76020e1279d783fc0fe49505abaa43
SHA256744ee4070b042fafb470fca1a0b1bbb290a68051397780e0b71184fe6458a734
SHA5125548de3ba603daf983ef3aed9241ce155e92d5042f0e5af4049ac260351aa7c0d266bc92de69019574c007ed4bb725f6a1b89864b7aacaa7041cef2c68f17f23
-
Filesize
9KB
MD5d041605941d8f687694d51e6d3cf1412
SHA1fb07a5e25a99bfdfa4725ef034b2e796e22ec71d
SHA25647cd67a8a8f90330644e2a21f3d0fa2fd1e3293cbbf2bee4c29642a8f83b97fa
SHA512ebc48da29937d4c219e33b09fac96917f9688aa4a8e6f4c3261e68f821169615a99fd413dedc93379b1418d0119cd9eff34d460475c0e8dcde391e4715daf5dc
-
Filesize
9KB
MD5d6fa205134779e1b1c25526311e614d5
SHA1c21dd2dab06cfe29450aa5b348d9222751b90562
SHA25640b4912006355f235676ee1ee0245c0fc027cbb29f8a64513488a8b6a4202e47
SHA512c9b6d684eb000789d0ddbd68844c1395f639b06a66109aafea53dec9dc688a89cea803c5028e587577c924b5d7bdbeb7ced6602267665b7507bf3e4efa472c36
-
Filesize
9KB
MD5823a019e9b9612d182f58b59244d4350
SHA14f4a2a4434fc712819dec0f3ffdb6a61a4112776
SHA256150e55fe6585fc83d04979e8e5876bb69129e70405eae4eb88e8e6c28f308a4d
SHA51209e689b1d65c37cf43dca5710bb93d14648c2715b97138a13ee3df2e1804af5a7c545702f1eaeb24df6a0793d923b5e68ad2439a51b0d8702f7b07b6e27e0a55
-
Filesize
99KB
MD57b31eb5742d67b8d769daa9034b51891
SHA1718e6842a57e37430ff836a8494bcc4dae776919
SHA2568981fa0a563451c80604c97f27604ff5403da9ffe0e07c4415323c9c6c6c6dce
SHA51285ff9f66119e9dfa2556617e9ae6d448e0425d9c023885fd4698e0e2e60811c3371776412e48ac4af2583f4c43dc0393a5893e76e496cc5fc7456ff20423e001
-
Filesize
99KB
MD5a1431d5d93190aca729ed0cdbceb8446
SHA149ea7ecf3e57494b2e5fd31032037aaa3e39b652
SHA25693017140113df60980d9d6a82692c720502a85dbb5f9ab8b35e35570f30717cd
SHA512040677e4c8029017c5c789bc94f7ebcffcca7cdca0d4ec3e1e31cd5fc66098d84d0353bc6fb7a818096faa78ad5881c6069cfc6429aa11e49f592788d0bdc4da
-
Filesize
4KB
MD5a2fe8874d3e671e8aa06365afcd62de4
SHA189a1e0420c39f0b09c096aca923701c240ad7418
SHA25694bfd5b16f02844bedf161a2852435967daccd184c8739c01eb5837ff3b28cba
SHA5120afbd547702a98bc36ae597d594ce7d3b513d06184eeb824c00c21284cd40a3fe010dfaece5c9d628f13959f814e4c74a29c2724e54f7d5925ffa466332ed2e3