Resubmissions
13-08-2024 19:40
240813-ydnh3sxcmk 613-08-2024 19:35
240813-ya5yysxarn 613-08-2024 18:50
240813-xg379sveqp 6Analysis
-
max time kernel
50s -
max time network
50s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13-08-2024 18:50
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/uc?id=1kQN1i59Ni-FX7IFoIHgbNOILr_K3kQXQ&
Resource
win10v2004-20240802-en
General
-
Target
https://drive.google.com/uc?id=1kQN1i59Ni-FX7IFoIHgbNOILr_K3kQXQ&
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 7 drive.google.com 4 drive.google.com -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133680486401986745" chrome.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\Local Settings chrome.exe Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 1976 chrome.exe 1976 chrome.exe 4700 AcroRd32.exe 4700 AcroRd32.exe 4700 AcroRd32.exe 4700 AcroRd32.exe 4700 AcroRd32.exe 4700 AcroRd32.exe 4700 AcroRd32.exe 4700 AcroRd32.exe 4700 AcroRd32.exe 4700 AcroRd32.exe 4700 AcroRd32.exe 4700 AcroRd32.exe 4700 AcroRd32.exe 4700 AcroRd32.exe 4700 AcroRd32.exe 4700 AcroRd32.exe 4700 AcroRd32.exe 4700 AcroRd32.exe 4700 AcroRd32.exe 4700 AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1660 OpenWith.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1976 chrome.exe 1976 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1976 chrome.exe Token: SeCreatePagefilePrivilege 1976 chrome.exe Token: SeShutdownPrivilege 1976 chrome.exe Token: SeCreatePagefilePrivilege 1976 chrome.exe Token: SeShutdownPrivilege 1976 chrome.exe Token: SeCreatePagefilePrivilege 1976 chrome.exe Token: SeShutdownPrivilege 1976 chrome.exe Token: SeCreatePagefilePrivilege 1976 chrome.exe Token: SeShutdownPrivilege 1976 chrome.exe Token: SeCreatePagefilePrivilege 1976 chrome.exe Token: SeShutdownPrivilege 1976 chrome.exe Token: SeCreatePagefilePrivilege 1976 chrome.exe Token: SeShutdownPrivilege 1976 chrome.exe Token: SeCreatePagefilePrivilege 1976 chrome.exe Token: SeShutdownPrivilege 1976 chrome.exe Token: SeCreatePagefilePrivilege 1976 chrome.exe Token: SeShutdownPrivilege 1976 chrome.exe Token: SeCreatePagefilePrivilege 1976 chrome.exe Token: SeShutdownPrivilege 1976 chrome.exe Token: SeCreatePagefilePrivilege 1976 chrome.exe Token: SeShutdownPrivilege 1976 chrome.exe Token: SeCreatePagefilePrivilege 1976 chrome.exe Token: SeShutdownPrivilege 1976 chrome.exe Token: SeCreatePagefilePrivilege 1976 chrome.exe Token: SeShutdownPrivilege 1976 chrome.exe Token: SeCreatePagefilePrivilege 1976 chrome.exe Token: SeShutdownPrivilege 1976 chrome.exe Token: SeCreatePagefilePrivilege 1976 chrome.exe Token: SeShutdownPrivilege 1976 chrome.exe Token: SeCreatePagefilePrivilege 1976 chrome.exe Token: SeShutdownPrivilege 1976 chrome.exe Token: SeCreatePagefilePrivilege 1976 chrome.exe Token: SeShutdownPrivilege 1976 chrome.exe Token: SeCreatePagefilePrivilege 1976 chrome.exe Token: SeShutdownPrivilege 1976 chrome.exe Token: SeCreatePagefilePrivilege 1976 chrome.exe Token: SeShutdownPrivilege 1976 chrome.exe Token: SeCreatePagefilePrivilege 1976 chrome.exe Token: SeShutdownPrivilege 1976 chrome.exe Token: SeCreatePagefilePrivilege 1976 chrome.exe Token: SeShutdownPrivilege 1976 chrome.exe Token: SeCreatePagefilePrivilege 1976 chrome.exe Token: SeShutdownPrivilege 1976 chrome.exe Token: SeCreatePagefilePrivilege 1976 chrome.exe Token: SeShutdownPrivilege 1976 chrome.exe Token: SeCreatePagefilePrivilege 1976 chrome.exe Token: SeShutdownPrivilege 1976 chrome.exe Token: SeCreatePagefilePrivilege 1976 chrome.exe Token: SeShutdownPrivilege 1976 chrome.exe Token: SeCreatePagefilePrivilege 1976 chrome.exe Token: SeShutdownPrivilege 1976 chrome.exe Token: SeCreatePagefilePrivilege 1976 chrome.exe Token: SeShutdownPrivilege 1976 chrome.exe Token: SeCreatePagefilePrivilege 1976 chrome.exe Token: SeShutdownPrivilege 1976 chrome.exe Token: SeCreatePagefilePrivilege 1976 chrome.exe Token: SeShutdownPrivilege 1976 chrome.exe Token: SeCreatePagefilePrivilege 1976 chrome.exe Token: SeShutdownPrivilege 1976 chrome.exe Token: SeCreatePagefilePrivilege 1976 chrome.exe Token: SeShutdownPrivilege 1976 chrome.exe Token: SeCreatePagefilePrivilege 1976 chrome.exe Token: SeShutdownPrivilege 1976 chrome.exe Token: SeCreatePagefilePrivilege 1976 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 1976 chrome.exe 1976 chrome.exe 1976 chrome.exe 1976 chrome.exe 1976 chrome.exe 1976 chrome.exe 1976 chrome.exe 1976 chrome.exe 1976 chrome.exe 1976 chrome.exe 1976 chrome.exe 1976 chrome.exe 1976 chrome.exe 1976 chrome.exe 1976 chrome.exe 1976 chrome.exe 1976 chrome.exe 1976 chrome.exe 1976 chrome.exe 1976 chrome.exe 1976 chrome.exe 1976 chrome.exe 1976 chrome.exe 1976 chrome.exe 1976 chrome.exe 1976 chrome.exe 1976 chrome.exe 1976 chrome.exe 1976 chrome.exe 1976 chrome.exe 1976 chrome.exe 1976 chrome.exe 1976 chrome.exe 4700 AcroRd32.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1976 chrome.exe 1976 chrome.exe 1976 chrome.exe 1976 chrome.exe 1976 chrome.exe 1976 chrome.exe 1976 chrome.exe 1976 chrome.exe 1976 chrome.exe 1976 chrome.exe 1976 chrome.exe 1976 chrome.exe 1976 chrome.exe 1976 chrome.exe 1976 chrome.exe 1976 chrome.exe 1976 chrome.exe 1976 chrome.exe 1976 chrome.exe 1976 chrome.exe 1976 chrome.exe 1976 chrome.exe 1976 chrome.exe 1976 chrome.exe -
Suspicious use of SetWindowsHookEx 49 IoCs
pid Process 1660 OpenWith.exe 1660 OpenWith.exe 1660 OpenWith.exe 1660 OpenWith.exe 1660 OpenWith.exe 1660 OpenWith.exe 1660 OpenWith.exe 1660 OpenWith.exe 1660 OpenWith.exe 1660 OpenWith.exe 1660 OpenWith.exe 1660 OpenWith.exe 1660 OpenWith.exe 1660 OpenWith.exe 1660 OpenWith.exe 1660 OpenWith.exe 1660 OpenWith.exe 1660 OpenWith.exe 1660 OpenWith.exe 1660 OpenWith.exe 1660 OpenWith.exe 1660 OpenWith.exe 1660 OpenWith.exe 1660 OpenWith.exe 1660 OpenWith.exe 1660 OpenWith.exe 1660 OpenWith.exe 1660 OpenWith.exe 1660 OpenWith.exe 1660 OpenWith.exe 1660 OpenWith.exe 1660 OpenWith.exe 1660 OpenWith.exe 1660 OpenWith.exe 1660 OpenWith.exe 1660 OpenWith.exe 1660 OpenWith.exe 1660 OpenWith.exe 1660 OpenWith.exe 1660 OpenWith.exe 1660 OpenWith.exe 1660 OpenWith.exe 1660 OpenWith.exe 4700 AcroRd32.exe 4700 AcroRd32.exe 4700 AcroRd32.exe 4700 AcroRd32.exe 4700 AcroRd32.exe 4700 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1976 wrote to memory of 3328 1976 chrome.exe 92 PID 1976 wrote to memory of 3328 1976 chrome.exe 92 PID 1976 wrote to memory of 3348 1976 chrome.exe 93 PID 1976 wrote to memory of 3348 1976 chrome.exe 93 PID 1976 wrote to memory of 3348 1976 chrome.exe 93 PID 1976 wrote to memory of 3348 1976 chrome.exe 93 PID 1976 wrote to memory of 3348 1976 chrome.exe 93 PID 1976 wrote to memory of 3348 1976 chrome.exe 93 PID 1976 wrote to memory of 3348 1976 chrome.exe 93 PID 1976 wrote to memory of 3348 1976 chrome.exe 93 PID 1976 wrote to memory of 3348 1976 chrome.exe 93 PID 1976 wrote to memory of 3348 1976 chrome.exe 93 PID 1976 wrote to memory of 3348 1976 chrome.exe 93 PID 1976 wrote to memory of 3348 1976 chrome.exe 93 PID 1976 wrote to memory of 3348 1976 chrome.exe 93 PID 1976 wrote to memory of 3348 1976 chrome.exe 93 PID 1976 wrote to memory of 3348 1976 chrome.exe 93 PID 1976 wrote to memory of 3348 1976 chrome.exe 93 PID 1976 wrote to memory of 3348 1976 chrome.exe 93 PID 1976 wrote to memory of 3348 1976 chrome.exe 93 PID 1976 wrote to memory of 3348 1976 chrome.exe 93 PID 1976 wrote to memory of 3348 1976 chrome.exe 93 PID 1976 wrote to memory of 3348 1976 chrome.exe 93 PID 1976 wrote to memory of 3348 1976 chrome.exe 93 PID 1976 wrote to memory of 3348 1976 chrome.exe 93 PID 1976 wrote to memory of 3348 1976 chrome.exe 93 PID 1976 wrote to memory of 3348 1976 chrome.exe 93 PID 1976 wrote to memory of 3348 1976 chrome.exe 93 PID 1976 wrote to memory of 3348 1976 chrome.exe 93 PID 1976 wrote to memory of 3348 1976 chrome.exe 93 PID 1976 wrote to memory of 3348 1976 chrome.exe 93 PID 1976 wrote to memory of 3348 1976 chrome.exe 93 PID 1976 wrote to memory of 3720 1976 chrome.exe 94 PID 1976 wrote to memory of 3720 1976 chrome.exe 94 PID 1976 wrote to memory of 1068 1976 chrome.exe 95 PID 1976 wrote to memory of 1068 1976 chrome.exe 95 PID 1976 wrote to memory of 1068 1976 chrome.exe 95 PID 1976 wrote to memory of 1068 1976 chrome.exe 95 PID 1976 wrote to memory of 1068 1976 chrome.exe 95 PID 1976 wrote to memory of 1068 1976 chrome.exe 95 PID 1976 wrote to memory of 1068 1976 chrome.exe 95 PID 1976 wrote to memory of 1068 1976 chrome.exe 95 PID 1976 wrote to memory of 1068 1976 chrome.exe 95 PID 1976 wrote to memory of 1068 1976 chrome.exe 95 PID 1976 wrote to memory of 1068 1976 chrome.exe 95 PID 1976 wrote to memory of 1068 1976 chrome.exe 95 PID 1976 wrote to memory of 1068 1976 chrome.exe 95 PID 1976 wrote to memory of 1068 1976 chrome.exe 95 PID 1976 wrote to memory of 1068 1976 chrome.exe 95 PID 1976 wrote to memory of 1068 1976 chrome.exe 95 PID 1976 wrote to memory of 1068 1976 chrome.exe 95 PID 1976 wrote to memory of 1068 1976 chrome.exe 95 PID 1976 wrote to memory of 1068 1976 chrome.exe 95 PID 1976 wrote to memory of 1068 1976 chrome.exe 95 PID 1976 wrote to memory of 1068 1976 chrome.exe 95 PID 1976 wrote to memory of 1068 1976 chrome.exe 95 PID 1976 wrote to memory of 1068 1976 chrome.exe 95 PID 1976 wrote to memory of 1068 1976 chrome.exe 95 PID 1976 wrote to memory of 1068 1976 chrome.exe 95 PID 1976 wrote to memory of 1068 1976 chrome.exe 95 PID 1976 wrote to memory of 1068 1976 chrome.exe 95 PID 1976 wrote to memory of 1068 1976 chrome.exe 95 PID 1976 wrote to memory of 1068 1976 chrome.exe 95 PID 1976 wrote to memory of 1068 1976 chrome.exe 95
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://drive.google.com/uc?id=1kQN1i59Ni-FX7IFoIHgbNOILr_K3kQXQ&1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff84717cc40,0x7ff84717cc4c,0x7ff84717cc582⤵PID:3328
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1964,i,1331286276046970371,8181325632524586475,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1960 /prefetch:22⤵PID:3348
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1924,i,1331286276046970371,8181325632524586475,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2068 /prefetch:32⤵PID:3720
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2260,i,1331286276046970371,8181325632524586475,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2272 /prefetch:82⤵PID:1068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3116,i,1331286276046970371,8181325632524586475,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3152 /prefetch:12⤵PID:3964
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3132,i,1331286276046970371,8181325632524586475,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:1708
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4484,i,1331286276046970371,8181325632524586475,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4620 /prefetch:82⤵PID:4708
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4940,i,1331286276046970371,8181325632524586475,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4864 /prefetch:82⤵PID:944
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:4700
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:4320
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4188,i,8293235976513689021,7261015831736501466,262144 --variations-seed-version --mojo-platform-channel-handle=4112 /prefetch:81⤵PID:4284
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1660 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\Downloads\ACTA DE CITACION JUDICIAL - EXPEDIENTE.pdf.rar"2⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:4700 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140433⤵
- System Location Discovery: System Language Discovery
PID:4560 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=74591AE9CD9A809981E6D9ABBA07E680 --mojo-platform-channel-handle=1752 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵
- System Location Discovery: System Language Discovery
PID:5188
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=3FF418B892C693224FFAAEE416B03497 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=3FF418B892C693224FFAAEE416B03497 --renderer-client-id=2 --mojo-platform-channel-handle=1776 --allow-no-sandbox-job /prefetch:14⤵
- System Location Discovery: System Language Discovery
PID:5200
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=45E10F0D30F67CA3DF50F661B38BDE92 --mojo-platform-channel-handle=2304 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵
- System Location Discovery: System Language Discovery
PID:5412
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=598D1EE0DBC8C2DEF16AEEB460D127BD --mojo-platform-channel-handle=2320 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵
- System Location Discovery: System Language Discovery
PID:5516
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=3657F912E49B919F89DDD8B5BC5F13D8 --mojo-platform-channel-handle=2348 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵
- System Location Discovery: System Language Discovery
PID:5600
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=0D1CF6B7F8917966E1FE2A4A47A601FB --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=0D1CF6B7F8917966E1FE2A4A47A601FB --renderer-client-id=8 --mojo-platform-channel-handle=2596 --allow-no-sandbox-job /prefetch:14⤵
- System Location Discovery: System Language Discovery
PID:5824
-
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5392
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
36KB
MD5b30d3becc8731792523d599d949e63f5
SHA119350257e42d7aee17fb3bf139a9d3adb330fad4
SHA256b1b77e96279ead2b460de3de70e2ea4f5ad1b853598a4e27a5caf3f1a32cc4f3
SHA512523f54895fb07f62b9a5f72c8b62e83d4d9506bda57b183818615f6eb7286e3b9c5a50409bc5c5164867c3ccdeae88aa395ecca6bc7e36d991552f857510792e
-
Filesize
56KB
MD5752a1f26b18748311b691c7d8fc20633
SHA1c1f8e83eebc1cc1e9b88c773338eb09ff82ab862
SHA256111dac2948e4cecb10b0d2e10d8afaa663d78d643826b592d6414a1fd77cc131
SHA512a2f5f262faf2c3e9756da94b2c47787ce3a9391b5bd53581578aa9a764449e114836704d6dec4aadc097fed4c818831baa11affa1eb25be2bfad9349bb090fe5
-
Filesize
64KB
MD57580e56295f1bf1fbb507290404fb858
SHA1e368af74eb3fc27bca8ccf49109cea564b28aebe
SHA256517b164ba4b3963c0e8aaf87414a79493d3fbf760ecbea440c19731f835119b3
SHA512b6d6e7d1281a2f3e055592640b99b305e131ac46c64c72ab812af24e0c16d11e8a679ef9dd2cf7d586ae53f0bbbd5dcfc79415d3e969228a36b265c426456005
-
Filesize
649B
MD5b7695ba0ad7abf5df32e5b64179352ad
SHA151a3aeb480cded8a26fcaa933656307a30373330
SHA256cf11083400e7dde06829f515d400138d8d15d601fff13c38eae6809c4ecf1214
SHA51293365e21fd80d5d636f4c0df8a01cd6e527ae64806d15ff99511a243ba7dde53fcccedc63e05cca8f07af6ff3476bd9ec99806a7907539ae50b744200cd106ad
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
522B
MD52043d638ebcfa6063a3f66ab38751f26
SHA147e5662b387bf65a8b765da1c9405055fab02c08
SHA2564bfb6bdb86ea7d5da89727ab8a990af305d68b73ccff5bab1d741ae2335b408a
SHA512cc31d3bcf9f8e6e199b12b583c95ba61f55c1fb5937fa90cff039166c3e7df4f474957b577b04d963b5bcba05e9e7238500e3afdc7386494856d1d7dd9996bce
-
Filesize
9KB
MD5f5c9d483f050ba79228a5085567aed72
SHA10d699f80849746e9d8d336008de8de11238d3a8b
SHA256bc04d6d0d11e421b78091e9f44df5426eac5a2ee61298f0593c4d3676732a68d
SHA512a5e259d915c84cf8ac74a3a83bf7d9d528fde71f7c1bda59923799808880bea51900843285e80279579ecbf1d2251e56f7591e651ba38341c98cc83684b69927
-
Filesize
9KB
MD572bbd1046fefda6f66eb0d56c8ebe98c
SHA13a4e0957d0691f028f6163916b03c9c5356542ec
SHA2569c671180ba1a5ce66b8c2f62828a2e16155aee2a22b4ff138847612065ad4398
SHA512541f3694aa2fe337317d9f2979a3d4b7c13dc644dd2b7bcad5c726aa0a907ff4ecf9cf2fa8a3674ed8f0e2cdbf73b28411935959d03f2f3d4cfbff515e66b937
-
Filesize
9KB
MD5a7576d1f0327c4b96dbcf0a7d26a282c
SHA1b8eb07ca4e36a1c66921ce51f0cf65c4ec58d044
SHA256137d50c09e4021bf5771616a5c8650df420bce2dda9fcb749df50acaad1bcff5
SHA51290de5cf52b4be2a7c3a36f385b5469a35e62814acd09e7b0964b6571ce89fc924fdd67a269f6254c63781a008037876fbcf1724f56ad0c98945b24fc3a968c88
-
Filesize
99KB
MD5ca6ee5dfcc38de5e6e3fd8ef82d2500c
SHA1aac2117a6ac4af0e57f238c4dc09785d56ae264e
SHA2568db52c5a00815a7f8036799378c307bf04bee2f51770ae3b442011e826e42479
SHA512e1e478330d225ae196adbff39c62c7b4d36c174aba592f33d4ef72dc7adbc88f76e4df0da0a845d19e26aca6e23769388342aed15a62b39e7175cc35fc8856c5
-
Filesize
99KB
MD5bfe47059dc3c031b94e33f754046810e
SHA16ba3c544005337918d5d069062236cc25dfec76f
SHA2560d302d5860c614d4c91d0c78efefaa1654026ce8ad7f9aa3e21d6fdf5a131022
SHA512cb5e152e26c9dd5cd7857137a8528d112c362f48854a08afe8508fa417e2858a3300e9265a34e5b52e38ec2133a47ab43bc1a6d5f292fbc5f12fbde23f597ca1
-
Filesize
1.3MB
MD537dd2484d3fc18b2db173b32236eabbe
SHA1953d9b02c36105a34abf7e9203a46ab9ee3eaeaa
SHA2563884f9fe5ccfe6a9b4e8c522f96a0f1c7291bd529a6008d899561cc292f1596a
SHA512c687a0054a8be09a859c2d93750fd25e47f54c8e19eab5923fc7f76c075d17590c3262039dd6af7c177e8c02b9bb2f173061b167df918fe0f907fb323abe6c3a