Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13-09-2024 15:16
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/file/d/1QJHbxweHJtQdl10HtOfcBRao6UiSEuPP/view
Resource
win10v2004-20240802-en
General
-
Target
https://drive.google.com/file/d/1QJHbxweHJtQdl10HtOfcBRao6UiSEuPP/view
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 7 drive.google.com 4 drive.google.com -
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000_Classes\Local Settings msedge.exe Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 2368 msedge.exe 2368 msedge.exe 4948 msedge.exe 4948 msedge.exe 4588 msedge.exe 4588 msedge.exe 408 identity_helper.exe 408 identity_helper.exe 5248 AcroRd32.exe 5248 AcroRd32.exe 5248 AcroRd32.exe 5248 AcroRd32.exe 5248 AcroRd32.exe 5248 AcroRd32.exe 5248 AcroRd32.exe 5248 AcroRd32.exe 5248 AcroRd32.exe 5248 AcroRd32.exe 5248 AcroRd32.exe 5248 AcroRd32.exe 5248 AcroRd32.exe 5248 AcroRd32.exe 5248 AcroRd32.exe 5248 AcroRd32.exe 5248 AcroRd32.exe 5248 AcroRd32.exe 5248 AcroRd32.exe 5248 AcroRd32.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4648 OpenWith.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe -
Suspicious use of SetWindowsHookEx 38 IoCs
pid Process 4648 OpenWith.exe 4648 OpenWith.exe 4648 OpenWith.exe 4648 OpenWith.exe 4648 OpenWith.exe 4648 OpenWith.exe 4648 OpenWith.exe 4648 OpenWith.exe 4648 OpenWith.exe 4648 OpenWith.exe 4648 OpenWith.exe 4648 OpenWith.exe 4648 OpenWith.exe 4648 OpenWith.exe 4648 OpenWith.exe 4648 OpenWith.exe 4648 OpenWith.exe 4648 OpenWith.exe 4648 OpenWith.exe 4648 OpenWith.exe 4648 OpenWith.exe 4648 OpenWith.exe 4648 OpenWith.exe 4648 OpenWith.exe 4648 OpenWith.exe 4648 OpenWith.exe 4648 OpenWith.exe 4648 OpenWith.exe 4648 OpenWith.exe 4648 OpenWith.exe 4648 OpenWith.exe 4648 OpenWith.exe 4648 OpenWith.exe 5248 AcroRd32.exe 5248 AcroRd32.exe 5248 AcroRd32.exe 5248 AcroRd32.exe 5248 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4948 wrote to memory of 2080 4948 msedge.exe 83 PID 4948 wrote to memory of 2080 4948 msedge.exe 83 PID 4948 wrote to memory of 4224 4948 msedge.exe 84 PID 4948 wrote to memory of 4224 4948 msedge.exe 84 PID 4948 wrote to memory of 4224 4948 msedge.exe 84 PID 4948 wrote to memory of 4224 4948 msedge.exe 84 PID 4948 wrote to memory of 4224 4948 msedge.exe 84 PID 4948 wrote to memory of 4224 4948 msedge.exe 84 PID 4948 wrote to memory of 4224 4948 msedge.exe 84 PID 4948 wrote to memory of 4224 4948 msedge.exe 84 PID 4948 wrote to memory of 4224 4948 msedge.exe 84 PID 4948 wrote to memory of 4224 4948 msedge.exe 84 PID 4948 wrote to memory of 4224 4948 msedge.exe 84 PID 4948 wrote to memory of 4224 4948 msedge.exe 84 PID 4948 wrote to memory of 4224 4948 msedge.exe 84 PID 4948 wrote to memory of 4224 4948 msedge.exe 84 PID 4948 wrote to memory of 4224 4948 msedge.exe 84 PID 4948 wrote to memory of 4224 4948 msedge.exe 84 PID 4948 wrote to memory of 4224 4948 msedge.exe 84 PID 4948 wrote to memory of 4224 4948 msedge.exe 84 PID 4948 wrote to memory of 4224 4948 msedge.exe 84 PID 4948 wrote to memory of 4224 4948 msedge.exe 84 PID 4948 wrote to memory of 4224 4948 msedge.exe 84 PID 4948 wrote to memory of 4224 4948 msedge.exe 84 PID 4948 wrote to memory of 4224 4948 msedge.exe 84 PID 4948 wrote to memory of 4224 4948 msedge.exe 84 PID 4948 wrote to memory of 4224 4948 msedge.exe 84 PID 4948 wrote to memory of 4224 4948 msedge.exe 84 PID 4948 wrote to memory of 4224 4948 msedge.exe 84 PID 4948 wrote to memory of 4224 4948 msedge.exe 84 PID 4948 wrote to memory of 4224 4948 msedge.exe 84 PID 4948 wrote to memory of 4224 4948 msedge.exe 84 PID 4948 wrote to memory of 4224 4948 msedge.exe 84 PID 4948 wrote to memory of 4224 4948 msedge.exe 84 PID 4948 wrote to memory of 4224 4948 msedge.exe 84 PID 4948 wrote to memory of 4224 4948 msedge.exe 84 PID 4948 wrote to memory of 4224 4948 msedge.exe 84 PID 4948 wrote to memory of 4224 4948 msedge.exe 84 PID 4948 wrote to memory of 4224 4948 msedge.exe 84 PID 4948 wrote to memory of 4224 4948 msedge.exe 84 PID 4948 wrote to memory of 4224 4948 msedge.exe 84 PID 4948 wrote to memory of 4224 4948 msedge.exe 84 PID 4948 wrote to memory of 2368 4948 msedge.exe 85 PID 4948 wrote to memory of 2368 4948 msedge.exe 85 PID 4948 wrote to memory of 3688 4948 msedge.exe 86 PID 4948 wrote to memory of 3688 4948 msedge.exe 86 PID 4948 wrote to memory of 3688 4948 msedge.exe 86 PID 4948 wrote to memory of 3688 4948 msedge.exe 86 PID 4948 wrote to memory of 3688 4948 msedge.exe 86 PID 4948 wrote to memory of 3688 4948 msedge.exe 86 PID 4948 wrote to memory of 3688 4948 msedge.exe 86 PID 4948 wrote to memory of 3688 4948 msedge.exe 86 PID 4948 wrote to memory of 3688 4948 msedge.exe 86 PID 4948 wrote to memory of 3688 4948 msedge.exe 86 PID 4948 wrote to memory of 3688 4948 msedge.exe 86 PID 4948 wrote to memory of 3688 4948 msedge.exe 86 PID 4948 wrote to memory of 3688 4948 msedge.exe 86 PID 4948 wrote to memory of 3688 4948 msedge.exe 86 PID 4948 wrote to memory of 3688 4948 msedge.exe 86 PID 4948 wrote to memory of 3688 4948 msedge.exe 86 PID 4948 wrote to memory of 3688 4948 msedge.exe 86 PID 4948 wrote to memory of 3688 4948 msedge.exe 86 PID 4948 wrote to memory of 3688 4948 msedge.exe 86 PID 4948 wrote to memory of 3688 4948 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://drive.google.com/file/d/1QJHbxweHJtQdl10HtOfcBRao6UiSEuPP/view1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4948 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb53e546f8,0x7ffb53e54708,0x7ffb53e547182⤵PID:2080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1984,14013494986788574555,11472755275931400994,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2196 /prefetch:22⤵PID:4224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1984,14013494986788574555,11472755275931400994,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2252 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1984,14013494986788574555,11472755275931400994,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2796 /prefetch:82⤵PID:3688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,14013494986788574555,11472755275931400994,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:4172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,14013494986788574555,11472755275931400994,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:12⤵PID:1612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,14013494986788574555,11472755275931400994,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4960 /prefetch:12⤵PID:3832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,14013494986788574555,11472755275931400994,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5512 /prefetch:12⤵PID:3856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=1984,14013494986788574555,11472755275931400994,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5128 /prefetch:82⤵PID:3460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,14013494986788574555,11472755275931400994,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5656 /prefetch:12⤵PID:1568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1984,14013494986788574555,11472755275931400994,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6548 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1984,14013494986788574555,11472755275931400994,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6776 /prefetch:82⤵PID:4648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1984,14013494986788574555,11472755275931400994,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6776 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,14013494986788574555,11472755275931400994,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6816 /prefetch:12⤵PID:5556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,14013494986788574555,11472755275931400994,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6028 /prefetch:12⤵PID:5564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,14013494986788574555,11472755275931400994,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4908 /prefetch:12⤵PID:5380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,14013494986788574555,11472755275931400994,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6260 /prefetch:12⤵PID:5368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1984,14013494986788574555,11472755275931400994,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4844 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4568
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2400
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2812
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:4648 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\Downloads\Lossless Scaling 2.11 RELASE.rar"2⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5248 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140433⤵
- System Location Discovery: System Language Discovery
PID:5576 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=F4507F64F3E19A0306AF724F32695DE5 --mojo-platform-channel-handle=1752 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵
- System Location Discovery: System Language Discovery
PID:5868
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=B8B01B59BEA469C45F9CEAFE8025B069 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=B8B01B59BEA469C45F9CEAFE8025B069 --renderer-client-id=2 --mojo-platform-channel-handle=1772 --allow-no-sandbox-job /prefetch:14⤵
- System Location Discovery: System Language Discovery
PID:5884
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=EDB5A5D1E97A6472FF54F5A6B56F1114 --mojo-platform-channel-handle=2328 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵
- System Location Discovery: System Language Discovery
PID:6056
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=EC5C4F08DC6F5BF23BA0573AC61CEF25 --mojo-platform-channel-handle=1820 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵
- System Location Discovery: System Language Discovery
PID:5160
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=6FC74687371835B36D3F526BB8716A1D --mojo-platform-channel-handle=2036 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵
- System Location Discovery: System Language Discovery
PID:608
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
36KB
MD5b30d3becc8731792523d599d949e63f5
SHA119350257e42d7aee17fb3bf139a9d3adb330fad4
SHA256b1b77e96279ead2b460de3de70e2ea4f5ad1b853598a4e27a5caf3f1a32cc4f3
SHA512523f54895fb07f62b9a5f72c8b62e83d4d9506bda57b183818615f6eb7286e3b9c5a50409bc5c5164867c3ccdeae88aa395ecca6bc7e36d991552f857510792e
-
Filesize
56KB
MD5752a1f26b18748311b691c7d8fc20633
SHA1c1f8e83eebc1cc1e9b88c773338eb09ff82ab862
SHA256111dac2948e4cecb10b0d2e10d8afaa663d78d643826b592d6414a1fd77cc131
SHA512a2f5f262faf2c3e9756da94b2c47787ce3a9391b5bd53581578aa9a764449e114836704d6dec4aadc097fed4c818831baa11affa1eb25be2bfad9349bb090fe5
-
Filesize
64KB
MD5bcf2202663916056afdbd0e4e503b9ae
SHA1319e444cdb7b3491aa6c96347ba88c43890e32fd
SHA25673c736771a5e265ca4ad56deef2384c64639ee4565a13ca3ebf76f2cdf020e4b
SHA5124b24cb9e938d091abef1340c50d7f884dee27285cdac8aaaf3bcf829a24a1372c77025325e318e34bcfc628b6b9a75bdc898b031a05e620bea3d73ea708d3e98
-
Filesize
152B
MD59b008261dda31857d68792b46af6dd6d
SHA1e82dc88e2d1da2df7cb19d79a0346b9bb90d52b3
SHA2569ac598d4f8170f7e475d84103aead9e3c23d5f2d292741a7f56a17bde8b6f7da
SHA51278853091403a06beeec4998e2e3a4342111895ffd485f7f7cd367741a4883f7a25864cba00a6c86f27dc0c9ce9d04f08011ecc40c8ae9383d33274739ac39f10
-
Filesize
152B
MD50446fcdd21b016db1f468971fb82a488
SHA1726b91562bb75f80981f381e3c69d7d832c87c9d
SHA25662c5dc18b25e758f3508582a7c58bb46b734a774d97fc0e8a20614235caa8222
SHA5121df7c085042266959f1fe0aedc5f6d40ceba485b54159f51f0c38f17bb250b79ea941b735e1b6faf219f23fe8ab65ac4557f545519d52d5416b89ad0f9047a31
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize408B
MD52bf2d64ec6b94104a1901d177ceef2ed
SHA1482e64787bb586e146232247b5e8f966435d93e3
SHA2568442cc0081e4d39733d8ab16f88b3a0d5d0c357a5d6cbba51663925133347a22
SHA512d8665dd4bbb72a7645625a15ada68ed6f0777afea29a6e6bc9625a32f03f9aed15f0fccaaf68814e6d443a2cc9c291b466bd49952c8486ccd1bfe563945e1666
-
Filesize
3KB
MD5e25ca20c339e72b678a8ec8c1e841664
SHA1dda29e74a3504525c18d6c389c850b18ae119b14
SHA256ef2358129adde50d69218cd0e05a8fe89c15ec67b80aa51a5bbb3a4123b5779c
SHA51217ca5cf2c568a66a8b73cbd7810a8074e0b3044cd4de96bbd31fe710450ebc148e33deb37b46f9161735a1fe0459befeceee93a1775cae899dce020b894e4cd7
-
Filesize
3KB
MD5240dcd4f83743eb4bde741ebb26eefcc
SHA182296b0814a236c75efc0fb099d359924118e049
SHA2569fad76158b5c2687d9b5d844c1c98dfd3a66589c2e8588c4dc1f8e04fca7b36b
SHA51211b795e2cf4b5c1002a653c50c8e219df5e52caaac8b9f7d067f9bf901651dcd966ce413869f0bed5b0bc46c41162e37a9dec5b91f79cbe960a528847ce5b7c7
-
Filesize
5KB
MD567a9b12702d10bcb24b2b5c3639f4c5f
SHA1d59003f5be46b40b391837c6159156623bb00534
SHA2561e69eddc6e8e95fc6e003a4fe88429c389ddf5ba3dc6f03e8cc12cf8f0919d6c
SHA5120fd755023ceb2654425a016baa8051802f3efbefceb4e31440850d6d5469e5e5aed3d24b7340155902688db70931c9c2bf5c54f3feb0da6419bd5a90709a3c3a
-
Filesize
6KB
MD5edbd6097429b981acc4155151663b7af
SHA1691eddbdb50d3d6446b2d8cceb832fd2b767ec11
SHA25601c002c897dd75d6ba03235dbc1084d87260797fb3ba9582b19316d211641761
SHA5120892c571da1386a1344775c582e85fa4cba4e6c23774469cbf4dae3e26eedb7896b897cb4e200fa386a4b3a4c8c35fb10575100685e3d8aa39c9c0b2f467bd3d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\af68ffda-6b29-4729-920f-7d0d4d5c25c3.tmp
Filesize6KB
MD586ce69a03b4c90b2778cbc7d32a350fa
SHA164faba0fe2530ce2fbf1dcd7d7c3626d701ae886
SHA256d9e2c3509c9f2dd6b6e872dacbeb558e8326e07a0482ecc48402daa154c8a00c
SHA512272c8ea28a3446c970cacc0fa1e6a447047cb7498e4ccb6481902956be841a5d14c80070f91ad58aba2823790648c76fe0dfe356292d50d3f61d8f140204a2cd
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD53d80d774dbacd4132319cbb7e393fea0
SHA156a27d785fda375be47aa6bc10e360a133d55d69
SHA25698e5180baf0a7f374236092493895c03a59bf59e8ed4d1b7b7d40548b0dc3131
SHA512552c6627bd53b83016e01affced1a214261838038d0643b6403a0667e0b98e742f7ab4d08210bce0c831a7abb0bddee5d2bfcaa8ad55d3553996c635fb6986fa
-
Filesize
10KB
MD5558ebac6fb4169230548b48eca9e6a51
SHA1b2a46f07d1dfeba8fd33b5e7dd03e6f0cb488fc4
SHA256277eea79881324a55502d23b769582528fffee14e62367c6d60d1ae2bfb6d45a
SHA512839fde1217380928e53ffa36c2642dce5b8ec0195f90853697ab079de0edc564048b691ac858b0493dc1d3a4c05dcf0f2b0aa6ba2d475d6acf50ce5f85f3a7a3
-
Filesize
2.0MB
MD5b8e2a35a15aafc76095333cb7583e559
SHA1e80c3db00b6be91c9e9bfb47d5b5d95d3cbace83
SHA256e71a3997d11f6a08969cd1ffecfa38e8d3e198712982ea7e80dd7770626782a3
SHA512ba69ede8d0fd8de5864e8cb2abd1e0b4ab164d67d70fa1b0e6110558cd66164bd8f675a4866a951ad48df5ee5a6c803a3014ad0bd6ea8d4438a98cc5e22eb0ff