Analysis
-
max time kernel
119s -
max time network
128s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
11-09-2024 16:17
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/file/d/1KRvuFR5Phcgh_3hBYQR33hzb4c4luZlq/view?usp=drive_web
Resource
win11-20240802-en
General
-
Target
https://drive.google.com/file/d/1KRvuFR5Phcgh_3hBYQR33hzb4c4luZlq/view?usp=drive_web
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
flow ioc 10 drive.google.com 11 drive.google.com 12 drive.google.com 2 drive.google.com -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2842058299-443432012-2465494467-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2842058299-443432012-2465494467-1000_Classes\Local Settings msedge.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\Certificados_Nível_Superior.zip:Zone.Identifier msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3652 msedge.exe 3652 msedge.exe 1976 msedge.exe 1976 msedge.exe 580 identity_helper.exe 580 identity_helper.exe 4236 msedge.exe 4236 msedge.exe 3588 msedge.exe 3588 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe -
Suspicious use of FindShellTrayWindow 39 IoCs
pid Process 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1764 AcroRd32.exe 1976 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1764 AcroRd32.exe 1764 AcroRd32.exe 1764 AcroRd32.exe 1764 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1976 wrote to memory of 2756 1976 msedge.exe 78 PID 1976 wrote to memory of 2756 1976 msedge.exe 78 PID 1976 wrote to memory of 4560 1976 msedge.exe 79 PID 1976 wrote to memory of 4560 1976 msedge.exe 79 PID 1976 wrote to memory of 4560 1976 msedge.exe 79 PID 1976 wrote to memory of 4560 1976 msedge.exe 79 PID 1976 wrote to memory of 4560 1976 msedge.exe 79 PID 1976 wrote to memory of 4560 1976 msedge.exe 79 PID 1976 wrote to memory of 4560 1976 msedge.exe 79 PID 1976 wrote to memory of 4560 1976 msedge.exe 79 PID 1976 wrote to memory of 4560 1976 msedge.exe 79 PID 1976 wrote to memory of 4560 1976 msedge.exe 79 PID 1976 wrote to memory of 4560 1976 msedge.exe 79 PID 1976 wrote to memory of 4560 1976 msedge.exe 79 PID 1976 wrote to memory of 4560 1976 msedge.exe 79 PID 1976 wrote to memory of 4560 1976 msedge.exe 79 PID 1976 wrote to memory of 4560 1976 msedge.exe 79 PID 1976 wrote to memory of 4560 1976 msedge.exe 79 PID 1976 wrote to memory of 4560 1976 msedge.exe 79 PID 1976 wrote to memory of 4560 1976 msedge.exe 79 PID 1976 wrote to memory of 4560 1976 msedge.exe 79 PID 1976 wrote to memory of 4560 1976 msedge.exe 79 PID 1976 wrote to memory of 4560 1976 msedge.exe 79 PID 1976 wrote to memory of 4560 1976 msedge.exe 79 PID 1976 wrote to memory of 4560 1976 msedge.exe 79 PID 1976 wrote to memory of 4560 1976 msedge.exe 79 PID 1976 wrote to memory of 4560 1976 msedge.exe 79 PID 1976 wrote to memory of 4560 1976 msedge.exe 79 PID 1976 wrote to memory of 4560 1976 msedge.exe 79 PID 1976 wrote to memory of 4560 1976 msedge.exe 79 PID 1976 wrote to memory of 4560 1976 msedge.exe 79 PID 1976 wrote to memory of 4560 1976 msedge.exe 79 PID 1976 wrote to memory of 4560 1976 msedge.exe 79 PID 1976 wrote to memory of 4560 1976 msedge.exe 79 PID 1976 wrote to memory of 4560 1976 msedge.exe 79 PID 1976 wrote to memory of 4560 1976 msedge.exe 79 PID 1976 wrote to memory of 4560 1976 msedge.exe 79 PID 1976 wrote to memory of 4560 1976 msedge.exe 79 PID 1976 wrote to memory of 4560 1976 msedge.exe 79 PID 1976 wrote to memory of 4560 1976 msedge.exe 79 PID 1976 wrote to memory of 4560 1976 msedge.exe 79 PID 1976 wrote to memory of 4560 1976 msedge.exe 79 PID 1976 wrote to memory of 3652 1976 msedge.exe 80 PID 1976 wrote to memory of 3652 1976 msedge.exe 80 PID 1976 wrote to memory of 3848 1976 msedge.exe 81 PID 1976 wrote to memory of 3848 1976 msedge.exe 81 PID 1976 wrote to memory of 3848 1976 msedge.exe 81 PID 1976 wrote to memory of 3848 1976 msedge.exe 81 PID 1976 wrote to memory of 3848 1976 msedge.exe 81 PID 1976 wrote to memory of 3848 1976 msedge.exe 81 PID 1976 wrote to memory of 3848 1976 msedge.exe 81 PID 1976 wrote to memory of 3848 1976 msedge.exe 81 PID 1976 wrote to memory of 3848 1976 msedge.exe 81 PID 1976 wrote to memory of 3848 1976 msedge.exe 81 PID 1976 wrote to memory of 3848 1976 msedge.exe 81 PID 1976 wrote to memory of 3848 1976 msedge.exe 81 PID 1976 wrote to memory of 3848 1976 msedge.exe 81 PID 1976 wrote to memory of 3848 1976 msedge.exe 81 PID 1976 wrote to memory of 3848 1976 msedge.exe 81 PID 1976 wrote to memory of 3848 1976 msedge.exe 81 PID 1976 wrote to memory of 3848 1976 msedge.exe 81 PID 1976 wrote to memory of 3848 1976 msedge.exe 81 PID 1976 wrote to memory of 3848 1976 msedge.exe 81 PID 1976 wrote to memory of 3848 1976 msedge.exe 81
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://drive.google.com/file/d/1KRvuFR5Phcgh_3hBYQR33hzb4c4luZlq/view?usp=drive_web1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffb50193cb8,0x7ffb50193cc8,0x7ffb50193cd82⤵PID:2756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1892,1740869599269969041,12713211166394322666,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1952 /prefetch:22⤵PID:4560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1892,1740869599269969041,12713211166394322666,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2156 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1892,1740869599269969041,12713211166394322666,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2544 /prefetch:82⤵PID:3848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,1740869599269969041,12713211166394322666,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3192 /prefetch:12⤵PID:3084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,1740869599269969041,12713211166394322666,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3204 /prefetch:12⤵PID:3548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,1740869599269969041,12713211166394322666,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4828 /prefetch:12⤵PID:1012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1892,1740869599269969041,12713211166394322666,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5576 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1892,1740869599269969041,12713211166394322666,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4932 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,1740869599269969041,12713211166394322666,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4896 /prefetch:12⤵PID:2260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,1740869599269969041,12713211166394322666,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4948 /prefetch:12⤵PID:2616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,1740869599269969041,12713211166394322666,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5064 /prefetch:12⤵PID:1700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,1740869599269969041,12713211166394322666,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4908 /prefetch:12⤵PID:2456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,1740869599269969041,12713211166394322666,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6052 /prefetch:12⤵PID:2864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1892,1740869599269969041,12713211166394322666,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4828 /prefetch:82⤵
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
PID:3588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,1740869599269969041,12713211166394322666,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4992 /prefetch:12⤵PID:2368
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1256
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3604
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4784
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Temp1_Certificados_Nível_Superior.zip\Certificados_Ni╠üvel_Superior\Diploma_Especializac╠ºa╠âo Auditoria.pdf"1⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:1764 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- System Location Discovery: System Language Discovery
PID:4644 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=42F444091D1153E694780871DB589AC1 --mojo-platform-channel-handle=1792 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵
- System Location Discovery: System Language Discovery
PID:2472
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=2A300075DCA58FFE414F77F3397109D2 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=2A300075DCA58FFE414F77F3397109D2 --renderer-client-id=2 --mojo-platform-channel-handle=1784 --allow-no-sandbox-job /prefetch:13⤵
- System Location Discovery: System Language Discovery
PID:2220
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=B3E752576D9908A69DC2087A642D73F2 --mojo-platform-channel-handle=2376 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵
- System Location Discovery: System Language Discovery
PID:3140
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=1FBEE26BDD4E5BCDCB38F2C5350CE6F5 --mojo-platform-channel-handle=2564 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵
- System Location Discovery: System Language Discovery
PID:2180
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=231489A7384ED8F3A79B27B0737B73F7 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=231489A7384ED8F3A79B27B0737B73F7 --renderer-client-id=6 --mojo-platform-channel-handle=2476 --allow-no-sandbox-job /prefetch:13⤵
- System Location Discovery: System Language Discovery
PID:4672
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=4899EBEFDAEE3AB4C38A527A113F29CD --mojo-platform-channel-handle=1972 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵
- System Location Discovery: System Language Discovery
PID:4716
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5026e0c65239e15ba609a874aeac2dc33
SHA1a75e1622bc647ab73ab3bb2809872c2730dcf2df
SHA256593f20dfb73d2b81a17bfcc1f246848080dfc96898a1a62c5ddca62105ed1292
SHA5129fb7644c87bdd3430700f42137154069badbf2b7a67e5ac6c364382bca8cba95136d460f49279b346703d4b4fd81087e884822a01a2a38901568a3c3e3387569
-
Filesize
152B
MD5228fefc98d7fb5b4e27c6abab1de7207
SHA1ada493791316e154a906ec2c83c412adf3a7061a
SHA256448d09169319374935a249b1fc76bcf2430b4e1436611f3c2f3331b6eafe55a2
SHA512fa74f1cc5da8db978a7a5b8c9ebff3cd433660db7e91ce03c44a1d543dd667a51659ba79270d3d783d52b9e45d76d0f9467458df1482ded72ea79c873b2a5e56
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize408B
MD5a7bc1c702495f03dac847dd29951b046
SHA1d9167477efa4f31b51490801f94914c727fdb38a
SHA256fcf0b7c4c150e694d4f96ed6695b8109bc65df859b11bb01e138a267c96427da
SHA5127fef06df764df538d31e444ecc61e7a8d8b01b05a6b3585ca7f6ed54f50ed8d018a79f890834fddf3c94e8de7921022409bb4a0fad1b094382342e414d62bc95
-
Filesize
264KB
MD5bc3e8c517e91e4cce6f5c4457a25adf0
SHA1aa66cc17f77096c56a8b6ef9c30e77da89a052cc
SHA256e42cd7651610feeb911a580941481c1a84d376ad3493b4b3e0615ce5055e7030
SHA5123d3f6c7bb66747b982bd572e39628802978fd91b0335f160ddbcd001913e74ad0379928e3d5f29994c9227c8024c96463a2e5798317d73cfeda73ab7564ef285
-
Filesize
3KB
MD5db3573c3b5dac97aa96a005967a907e1
SHA1a811170c497b49930bf76e1967fee9ebbd00e899
SHA256282026740d762a665aa65b7937e7f94bed0e6ab67cce469f01488c5c93900576
SHA5121c57315c8c3e28d14eafa62e0968fde24e716d58cf0302b23920d2b2e70d4b3968135c7819158329863e3ea0f72b50f0aa726da05fd239de50a4a6cfa6688dc0
-
Filesize
3KB
MD5d2bfc4974e6a394ccbf18b2ced5edcae
SHA1c201fafa78366c3f4221a3616580fc2aabfcff97
SHA256f519dabc79da0b22e9b716da891f7e90ca83447ec00071d58dce23d64b1f65fb
SHA5121782ac25cd6d7a41fa2b698dc123f4ba7fd5526947994b6b3f468ce39330b96dbb9d896b0633271ca333bfe2607444e6abfa9b30c7abdcf936c79c49cf8f981b
-
Filesize
5KB
MD53cc12e5505343fe990601dbba520898e
SHA1bc17e80dd6313f5ec1508c85aa4a7fb3df65705a
SHA2565108bd37325641da03e802087a834acfc61803395371839919e8201035986695
SHA5120065bf15c4494736915d520cbdd20f18b793a61fe0f435445296efc92aa879cf930dbfcd6012b09f1343ed2f6db207b0ffcebd768672a6cb9cc40b7c968ed2f6
-
Filesize
6KB
MD56cdecd9c0636e7b92ef72df18511bc5f
SHA1fb735881c2c399353d34dff9dffb71d050ac097a
SHA256791ac1deafe51e8c6f1935e66dea2151c52387cb6f6118e7dc7980faa99d8110
SHA512302fad41c71876b65ff5500c8c7594d22e6b5fa10be2922cfc52142213874b0e6b487603cde8ba9b4fd728f06f4076c1283a07d7fc71e9a611a4a8e49b040b9f
-
Filesize
6KB
MD5ef01dce5a560b5706fda1e7577f087b0
SHA1a92aed6b23db7204c44d8ff2acec853f6609c27a
SHA25626671603406d3082b8d766759312d0d07931c7fd9fedbf441e4a1d90e7f0a6e5
SHA5121fca6cceb06ade865816a87520c42c8bf48f5555c70efd64e31b5bfe640134b06bb6ddb12d4d0a3703cd0483a983c847170a9badc1a334b6b5c6d48ec65aa1c5
-
Filesize
6KB
MD5a7aca09f6d62a65ff88d211a9d0776cf
SHA1267c03a3039c9401441724f02dac516cf64cb178
SHA256f60b179ce5364e7a699bb81ed57babf96407f5d24be99d2fa8f98617f5c4be01
SHA512d9748ba01cbb75e156bb7edc9989178681300693acfa877c0942002cb426c6504935af66e4a22e85e43cf7c1e3c99e5e7f99a9c1bc8b7e2b683e80b6a75f573d
-
Filesize
6KB
MD5d4b00c73cb7ffb1501f55b887d23b219
SHA18d31afc92f2b84ae1a007f5c9602380bacef5d7f
SHA25646d281220b6971904a0a7e45e601fd98e54d0dfaaa5b4202110fe41fab786f60
SHA512a965c713d455098a96d8da302f78a6abd0476fb865f588509cdf00d1b26b5efc80768e67d70079e2244d09d1a81f82d03f6050238a87d564692188841890711e
-
Filesize
6KB
MD5134cc0130de320a9857fdd1400ed7cb0
SHA1930400855068852d1f1adf0e835d34500688ff0d
SHA25688d73f426b5b15053ed6d44f6b8df81bc3c99cb868ddd799764e46a7dc0c3008
SHA512eaf070bd6a448a9b6ab334c97cd76831e8603a781bed722326b4598f85ddda91e075079b984376c672d1f29f4ae18505b25786c6e6641e6ffb061d478b8b3884
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD5e580c568648b91e2d3535736da064297
SHA10bcf719ec3aede86c10c238adf749a8bbe280555
SHA256419b1016b94ad71e4d182fa68a3fdd97532f1232be3a9c5105a116a4058e360a
SHA512148f0d08f924b584adb90422bcb1bc66133e1dc88c383e2b1bb361a4f6814b0383e452f144552ac65ec504674608832c22360e1b3eee266dad1b868701dbb784
-
Filesize
10KB
MD55244f7b4f78a82fbf7e7a0996443a151
SHA1a41538426147efbab1e9c70ce4a8dfdb5125149b
SHA25600857f8495ea5705d619244a264659b12e385e24759bb62e70835f8b3cc217f4
SHA5127c0247507595a88201ad5f376fe4a4a1f77c61f2048913f16817bbacdb782fb592bdf82f1922d6a97bd5affac93a41642aa47a91499b4688196ace575667f637
-
Filesize
11KB
MD5c4999b3eb6d1a5383e8e739ca779d93d
SHA174c058cedd8741988c2aa8b3d78fb58d85ffaed6
SHA256cacf2cb098ffd1c5e91b19dd3ab5213d08967bbf6cf5ab5f1ec5e5c5712862a2
SHA512c59d6d64779927d01d156d5d75066abe0f25beb3cf1fa4d0c6c73bbef08a12e4d58f8a269a646d8355328c1fbfd5782cdb9555f1cae4af8545548c743d1c3aff
-
Filesize
11KB
MD58b89976eea09f13f79ca744919a19906
SHA16bc611178a8375eb8e52661c92096e2477bacefe
SHA256ada96c2b8a0945e93d99bcc93e48383d5d5a2d6994b1eda7653f2cf08bc7209b
SHA512f81448775f43e22d280fc3230b46565ef248a4e9c54ab0889d4d7e8ce03eb1a3c97f45d4be45f5e95a5337caf9a993e95268891420a575ca2f97bf7883c27a4e
-
Filesize
26B
MD5fbccf14d504b7b2dbcb5a5bda75bd93b
SHA1d59fc84cdd5217c6cf74785703655f78da6b582b
SHA256eacd09517ce90d34ba562171d15ac40d302f0e691b439f91be1b6406e25f5913
SHA512aa1d2b1ea3c9de3ccadb319d4e3e3276a2f27dd1a5244fe72de2b6f94083dddc762480482c5c2e53f803cd9e3973ddefc68966f974e124307b5043e654443b98
-
Filesize
2.4MB
MD592750fb54c6ce1cffd55d9de5bd607d3
SHA17e14dc1d6c2160366ce4bd4e87c74a782505819c
SHA256cd16eaaefdb353df355cad16f7e159be79fb94b17b109ce8c426469811529b5b
SHA51222dc4828ed6f6e191a9e5f936db9a6e3fd86b5f8b2a3aeef520dee197081cc29344b432715792fe943ae06e4d57f80cb98b8bbbbb49b29a4c4ee90e9711d46a5