Analysis
-
max time kernel
149s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-11-2024 07:14
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/drive/folders/1WjUnU3o3zVvcF0Rc4LBUpQ0E7GNz6u9a?usp=sharing
Resource
win10v2004-20241007-en
General
-
Target
https://drive.google.com/drive/folders/1WjUnU3o3zVvcF0Rc4LBUpQ0E7GNz6u9a?usp=sharing
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 5 drive.google.com 8 drive.google.com 10 drive.google.com -
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133758693115143833" chrome.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings chrome.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4104 chrome.exe 4104 chrome.exe 3040 chrome.exe 3040 chrome.exe 3040 chrome.exe 3040 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4104 chrome.exe 4104 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4104 chrome.exe Token: SeCreatePagefilePrivilege 4104 chrome.exe Token: SeShutdownPrivilege 4104 chrome.exe Token: SeCreatePagefilePrivilege 4104 chrome.exe Token: SeShutdownPrivilege 4104 chrome.exe Token: SeCreatePagefilePrivilege 4104 chrome.exe Token: SeShutdownPrivilege 4104 chrome.exe Token: SeCreatePagefilePrivilege 4104 chrome.exe Token: SeShutdownPrivilege 4104 chrome.exe Token: SeCreatePagefilePrivilege 4104 chrome.exe Token: SeShutdownPrivilege 4104 chrome.exe Token: SeCreatePagefilePrivilege 4104 chrome.exe Token: SeShutdownPrivilege 4104 chrome.exe Token: SeCreatePagefilePrivilege 4104 chrome.exe Token: SeShutdownPrivilege 4104 chrome.exe Token: SeCreatePagefilePrivilege 4104 chrome.exe Token: SeShutdownPrivilege 4104 chrome.exe Token: SeCreatePagefilePrivilege 4104 chrome.exe Token: SeShutdownPrivilege 4104 chrome.exe Token: SeCreatePagefilePrivilege 4104 chrome.exe Token: SeShutdownPrivilege 4104 chrome.exe Token: SeCreatePagefilePrivilege 4104 chrome.exe Token: SeShutdownPrivilege 4104 chrome.exe Token: SeCreatePagefilePrivilege 4104 chrome.exe Token: SeShutdownPrivilege 4104 chrome.exe Token: SeCreatePagefilePrivilege 4104 chrome.exe Token: SeShutdownPrivilege 4104 chrome.exe Token: SeCreatePagefilePrivilege 4104 chrome.exe Token: SeShutdownPrivilege 4104 chrome.exe Token: SeCreatePagefilePrivilege 4104 chrome.exe Token: SeShutdownPrivilege 4104 chrome.exe Token: SeCreatePagefilePrivilege 4104 chrome.exe Token: SeShutdownPrivilege 4104 chrome.exe Token: SeCreatePagefilePrivilege 4104 chrome.exe Token: SeShutdownPrivilege 4104 chrome.exe Token: SeCreatePagefilePrivilege 4104 chrome.exe Token: SeShutdownPrivilege 4104 chrome.exe Token: SeCreatePagefilePrivilege 4104 chrome.exe Token: SeShutdownPrivilege 4104 chrome.exe Token: SeCreatePagefilePrivilege 4104 chrome.exe Token: SeShutdownPrivilege 4104 chrome.exe Token: SeCreatePagefilePrivilege 4104 chrome.exe Token: SeShutdownPrivilege 4104 chrome.exe Token: SeCreatePagefilePrivilege 4104 chrome.exe Token: SeShutdownPrivilege 4104 chrome.exe Token: SeCreatePagefilePrivilege 4104 chrome.exe Token: SeShutdownPrivilege 4104 chrome.exe Token: SeCreatePagefilePrivilege 4104 chrome.exe Token: SeShutdownPrivilege 4104 chrome.exe Token: SeCreatePagefilePrivilege 4104 chrome.exe Token: SeShutdownPrivilege 4104 chrome.exe Token: SeCreatePagefilePrivilege 4104 chrome.exe Token: SeShutdownPrivilege 4104 chrome.exe Token: SeCreatePagefilePrivilege 4104 chrome.exe Token: SeShutdownPrivilege 4104 chrome.exe Token: SeCreatePagefilePrivilege 4104 chrome.exe Token: SeShutdownPrivilege 4104 chrome.exe Token: SeCreatePagefilePrivilege 4104 chrome.exe Token: SeShutdownPrivilege 4104 chrome.exe Token: SeCreatePagefilePrivilege 4104 chrome.exe Token: SeShutdownPrivilege 4104 chrome.exe Token: SeCreatePagefilePrivilege 4104 chrome.exe Token: SeShutdownPrivilege 4104 chrome.exe Token: SeCreatePagefilePrivilege 4104 chrome.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
pid Process 4104 chrome.exe 4104 chrome.exe 4104 chrome.exe 4104 chrome.exe 4104 chrome.exe 4104 chrome.exe 4104 chrome.exe 4104 chrome.exe 4104 chrome.exe 4104 chrome.exe 4104 chrome.exe 4104 chrome.exe 4104 chrome.exe 4104 chrome.exe 4104 chrome.exe 4104 chrome.exe 4104 chrome.exe 4104 chrome.exe 4104 chrome.exe 4104 chrome.exe 4104 chrome.exe 4104 chrome.exe 4104 chrome.exe 4104 chrome.exe 4104 chrome.exe 4104 chrome.exe 4104 chrome.exe 4104 chrome.exe 4104 chrome.exe 4104 chrome.exe 4104 chrome.exe 4104 chrome.exe 4104 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4104 chrome.exe 4104 chrome.exe 4104 chrome.exe 4104 chrome.exe 4104 chrome.exe 4104 chrome.exe 4104 chrome.exe 4104 chrome.exe 4104 chrome.exe 4104 chrome.exe 4104 chrome.exe 4104 chrome.exe 4104 chrome.exe 4104 chrome.exe 4104 chrome.exe 4104 chrome.exe 4104 chrome.exe 4104 chrome.exe 4104 chrome.exe 4104 chrome.exe 4104 chrome.exe 4104 chrome.exe 4104 chrome.exe 4104 chrome.exe -
Suspicious use of SetWindowsHookEx 23 IoCs
pid Process 4592 OpenWith.exe 4592 OpenWith.exe 4592 OpenWith.exe 4592 OpenWith.exe 4592 OpenWith.exe 4592 OpenWith.exe 4592 OpenWith.exe 4592 OpenWith.exe 4592 OpenWith.exe 4592 OpenWith.exe 4592 OpenWith.exe 4592 OpenWith.exe 4592 OpenWith.exe 4592 OpenWith.exe 4592 OpenWith.exe 4592 OpenWith.exe 4592 OpenWith.exe 4592 OpenWith.exe 4592 OpenWith.exe 4216 AcroRd32.exe 4216 AcroRd32.exe 4216 AcroRd32.exe 4216 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4104 wrote to memory of 4544 4104 chrome.exe 83 PID 4104 wrote to memory of 4544 4104 chrome.exe 83 PID 4104 wrote to memory of 1548 4104 chrome.exe 84 PID 4104 wrote to memory of 1548 4104 chrome.exe 84 PID 4104 wrote to memory of 1548 4104 chrome.exe 84 PID 4104 wrote to memory of 1548 4104 chrome.exe 84 PID 4104 wrote to memory of 1548 4104 chrome.exe 84 PID 4104 wrote to memory of 1548 4104 chrome.exe 84 PID 4104 wrote to memory of 1548 4104 chrome.exe 84 PID 4104 wrote to memory of 1548 4104 chrome.exe 84 PID 4104 wrote to memory of 1548 4104 chrome.exe 84 PID 4104 wrote to memory of 1548 4104 chrome.exe 84 PID 4104 wrote to memory of 1548 4104 chrome.exe 84 PID 4104 wrote to memory of 1548 4104 chrome.exe 84 PID 4104 wrote to memory of 1548 4104 chrome.exe 84 PID 4104 wrote to memory of 1548 4104 chrome.exe 84 PID 4104 wrote to memory of 1548 4104 chrome.exe 84 PID 4104 wrote to memory of 1548 4104 chrome.exe 84 PID 4104 wrote to memory of 1548 4104 chrome.exe 84 PID 4104 wrote to memory of 1548 4104 chrome.exe 84 PID 4104 wrote to memory of 1548 4104 chrome.exe 84 PID 4104 wrote to memory of 1548 4104 chrome.exe 84 PID 4104 wrote to memory of 1548 4104 chrome.exe 84 PID 4104 wrote to memory of 1548 4104 chrome.exe 84 PID 4104 wrote to memory of 1548 4104 chrome.exe 84 PID 4104 wrote to memory of 1548 4104 chrome.exe 84 PID 4104 wrote to memory of 1548 4104 chrome.exe 84 PID 4104 wrote to memory of 1548 4104 chrome.exe 84 PID 4104 wrote to memory of 1548 4104 chrome.exe 84 PID 4104 wrote to memory of 1548 4104 chrome.exe 84 PID 4104 wrote to memory of 1548 4104 chrome.exe 84 PID 4104 wrote to memory of 1548 4104 chrome.exe 84 PID 4104 wrote to memory of 844 4104 chrome.exe 85 PID 4104 wrote to memory of 844 4104 chrome.exe 85 PID 4104 wrote to memory of 4376 4104 chrome.exe 86 PID 4104 wrote to memory of 4376 4104 chrome.exe 86 PID 4104 wrote to memory of 4376 4104 chrome.exe 86 PID 4104 wrote to memory of 4376 4104 chrome.exe 86 PID 4104 wrote to memory of 4376 4104 chrome.exe 86 PID 4104 wrote to memory of 4376 4104 chrome.exe 86 PID 4104 wrote to memory of 4376 4104 chrome.exe 86 PID 4104 wrote to memory of 4376 4104 chrome.exe 86 PID 4104 wrote to memory of 4376 4104 chrome.exe 86 PID 4104 wrote to memory of 4376 4104 chrome.exe 86 PID 4104 wrote to memory of 4376 4104 chrome.exe 86 PID 4104 wrote to memory of 4376 4104 chrome.exe 86 PID 4104 wrote to memory of 4376 4104 chrome.exe 86 PID 4104 wrote to memory of 4376 4104 chrome.exe 86 PID 4104 wrote to memory of 4376 4104 chrome.exe 86 PID 4104 wrote to memory of 4376 4104 chrome.exe 86 PID 4104 wrote to memory of 4376 4104 chrome.exe 86 PID 4104 wrote to memory of 4376 4104 chrome.exe 86 PID 4104 wrote to memory of 4376 4104 chrome.exe 86 PID 4104 wrote to memory of 4376 4104 chrome.exe 86 PID 4104 wrote to memory of 4376 4104 chrome.exe 86 PID 4104 wrote to memory of 4376 4104 chrome.exe 86 PID 4104 wrote to memory of 4376 4104 chrome.exe 86 PID 4104 wrote to memory of 4376 4104 chrome.exe 86 PID 4104 wrote to memory of 4376 4104 chrome.exe 86 PID 4104 wrote to memory of 4376 4104 chrome.exe 86 PID 4104 wrote to memory of 4376 4104 chrome.exe 86 PID 4104 wrote to memory of 4376 4104 chrome.exe 86 PID 4104 wrote to memory of 4376 4104 chrome.exe 86 PID 4104 wrote to memory of 4376 4104 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://drive.google.com/drive/folders/1WjUnU3o3zVvcF0Rc4LBUpQ0E7GNz6u9a?usp=sharing1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4104 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff83d5fcc40,0x7ff83d5fcc4c,0x7ff83d5fcc582⤵PID:4544
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1976,i,3093881211093457668,11519896358248659354,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1972 /prefetch:22⤵PID:1548
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2144,i,3093881211093457668,11519896358248659354,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2176 /prefetch:32⤵PID:844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2236,i,3093881211093457668,11519896358248659354,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2244 /prefetch:82⤵PID:4376
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3108,i,3093881211093457668,11519896358248659354,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3144 /prefetch:12⤵PID:3064
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3116,i,3093881211093457668,11519896358248659354,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3168 /prefetch:12⤵PID:2428
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4608,i,3093881211093457668,11519896358248659354,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4616 /prefetch:82⤵PID:3392
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4400,i,3093881211093457668,11519896358248659354,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=208 /prefetch:82⤵PID:4292
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=4904,i,3093881211093457668,11519896358248659354,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4964 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3040
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:3976
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:2432
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4508
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4592 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\Downloads\DS_Store"2⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4216 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140433⤵
- System Location Discovery: System Language Discovery
PID:4572 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=A5BC3C8C29E9F38B8CCC0D4D3DCDEFFE --mojo-platform-channel-handle=1760 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵
- System Location Discovery: System Language Discovery
PID:920
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=30864C63C00DBE298EFC1FFEE3BD7C9A --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=30864C63C00DBE298EFC1FFEE3BD7C9A --renderer-client-id=2 --mojo-platform-channel-handle=1752 --allow-no-sandbox-job /prefetch:14⤵
- System Location Discovery: System Language Discovery
PID:2316
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=58F78020145D1451D75A68F81F80084D --mojo-platform-channel-handle=2320 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵
- System Location Discovery: System Language Discovery
PID:4284
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=54E0A763E14EC3C2C162A51F881DFC8F --mojo-platform-channel-handle=2436 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵
- System Location Discovery: System Language Discovery
PID:4588
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=8D8BFFDB5023C82A2448D3E1D829EBFF --mojo-platform-channel-handle=2548 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵
- System Location Discovery: System Language Discovery
PID:5040
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\42114338-771a-4338-920f-8c1567997288.tmp
Filesize10KB
MD5b09231108a6fbe1204a2d296a3f7beb1
SHA1a7028f2260749c7038bc4430dbbb8485974b8c6c
SHA256996a834c3cb811653c8e8d7362d13aac0e609ea8b4c63f717109ea8d63ecb085
SHA512c57238fd5e02e8b26251e85953bc48f48f3bbce1f4a9543e703435188506bd935a767370148293097fc17e0b3d4f12afb4b826f57876726dd816d4d40c60f05a
-
Filesize
649B
MD5966177403ff2d17f7a91607d05812698
SHA154a2a8c9c9e0f15f726550962c6868a580696527
SHA256062e1b7fdc9af668b5ec3d01d16c79aa0b1e74dd7f8974a18ea6932445ef6f00
SHA512477a3eeefac497dfface278638d7dd9c0415ef402e38f361ee75f7e498290216c2b098fdae41a1d303d27c94fbc006d5af11b94c9d6aced4a9bc804825fa7b03
-
Filesize
25KB
MD59222217ea98c35e71acd00dfe056b030
SHA142fc786d7b865bdba84117ff15357fada69d3b35
SHA2561bbd4cf227b3645dccb3d9e3e03736d4e7612326ef09126cf18fccf00b1aac4f
SHA5127aaaa2031579bdbc89a31201613e26f4a1b67998cafc0d2372438beb22f11ba0bcc13d41c6d6e074b3e5a8d87a15dee42747b796c92d619549e83bb117362780
-
Filesize
1KB
MD54ebb5551fdb1d9bed46a002e8d8d78c2
SHA166547a25a2834686cd8fa58473de568b1f1e8d62
SHA256c8fccb82511aa4505135c68c5a88f88670e1df087959b4e24dee8005b6e495c9
SHA5120f86ac170e67434980c92252ec36faa69134616a87ab649ed78bf7c4721b723e283391a9a53f3f0f5726547e04d887e93b6970dcab9670c61295988156d56845
-
Filesize
1KB
MD59bb849419b5738387f779c7115071f82
SHA1e2d67e6c82c626f20e2ef89051d874c197224fa1
SHA256b4da51958368b684a04cd3bdf1213c51388d5c98f24818f84760ddb307dab862
SHA5126856522c9fd1147c375508cfa00430eefa2cc43f7010ae09797c4a8eb91e5608ff79fdae5ab82e871067bab461b96df93673ef78b4b1c7300b02feab02a7f321
-
Filesize
1KB
MD5d3826c699d8deea195586e9324f660ac
SHA1e451c3d891b7a78c9556eecf847c6b071bed243f
SHA2564c607b24e8b3f06d8d2b40414e3b777d0ceb43efa94451774f2d58c3b225b61d
SHA51258d85abe1407e8ec88b25a9fc381e87467372078478b6068dc3795ac051bcd908ff057f4d08c56105353c6ec763bc7e66db5753c9a374ee78b7d31bd70c2bbb7
-
Filesize
6KB
MD554907728097326f0dc9cdbce387d0295
SHA1f40a29e726e441f54156636255b353a6f72d0aca
SHA2569b55edec2d6db11fa1f1975425bc17a7e45d87f52a14271fb5f2d7cb448cc85b
SHA512e9f1d58b0d3641b6fba1de9937640f5420402f9898d762b472f2c084d1a640567929df695a91e67372b01106c13c2044e1142d238f5d94e8a7c2ace19e75917c
-
Filesize
7KB
MD5c85219769c3e3ac6e10b714a7d045348
SHA127be4d15de23244ad0b81e1373334ca96cb8ea19
SHA25656c1eb56efe0885bd25b9cc4f2b93f9b14f2233158650d3c451a4eb6300aa18e
SHA512c371dce15a648e47e120c2b7bfd367f3ba401740f907e829bb965f8ec019c259825676337d29bbc2885d331479a3f595b0142a3331f7ccf18123dff830cb1c1c
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD50fe1947d8d5be6b2ed46bb124137a9f5
SHA16d554e7bd950ec58dbc7951d16611ef2550c0d93
SHA256e8de3b3785d8a95b24425846ec96ced464252ffc8e07b018bd55d92f11103ac8
SHA51267ad5beb1eb8be9fb6a42a4ea0b2477e9b9d820925ce3c180c49c0133e4a22c7a66af5ff374c6a0b1205bca88d81d828fbe5ccc8647b07ddaa1f0b46fb37f3c5
-
Filesize
1KB
MD58ed2874bd96168d5490b148b4b7dfec1
SHA1664d89fbe070ce384f899c5525bc301b4d8221f2
SHA25659dcdd605d41aeae376bd7b8d6f1de84219e6bf70853dfdaadc11cb4a335e7e4
SHA512d34b652290d7b8637396c73c6b20d43d40502831b0824b03b4dd320c790454e634a0bd5a5ed60a053135c905863c802b3a5ca42d22402f4784063af4014ffb92
-
Filesize
1KB
MD566eea991791d1297b2f7e98a926d6b28
SHA1b029d68635600b8e9ea37fa1d833a002bf6fd220
SHA25659d3834872a9316eda8482e1d299f9375ca58a4ee317f31623d2c5ee2b5c81ed
SHA512d959d6649dcbb79eb40bec3fa0558f3d03d02d7711c8fc87223c52e9a0fe51f5acae16a058de50f33e8f0d3d6ed3d6c4bfba7d95856238ba0dbdf3026157ad8a
-
Filesize
1KB
MD5f4ed572ac1e925540c0c721b383df978
SHA19113884af56d0ba790c540873646fd42f65451df
SHA2567d6a839ecf73f3948d59e51797102470ea9d59c787b77df2348b7ecc43815f7b
SHA5125a69de1ac434e8d7014d35125f285e59b819d0f6942339ec7bcf4e0c7eb820a616ea61e2d626d97ce722943f267b44e28720d3dd75ffc0d11debe39435c937a9
-
Filesize
1KB
MD54575b7786f4598cb868a53391bdab458
SHA12f154f0e8dafd84d06afed54f756ed46ef899493
SHA256404cb806318ed536afc4ae9eb98ceb48af8f1fdff13effe7c14e6b7a26684aac
SHA51276041a9fb38c9d86b0f34b896cd76e18df6d60df94a4ff58c2f8958b2eddf3fe1b3d96abebad808b0b2e49c57994d0da50eb5a427a0c2b0b2a8a84a4d638a7fc
-
Filesize
1KB
MD5d7426ed5a5e7eabf55f86d7b422922f5
SHA15e1d0029feae120f0910834b3a966083cfc21430
SHA256f320ff01076149bee9f099cd52eb1e7db1757fd34d6cd9000986188d080b970e
SHA512af380515c5a7090a8b539b328bd3f4ec11934ae6b304fc32641691df7223cb08d36ebff82e67c1e5377f6d381ca2900a5d8f6ef9e44b8153f6e02eac778eb464
-
Filesize
1KB
MD5578d87a24621e23e6f229e284690179e
SHA175b1021ba58eec291d4e7a31ae9f227f4a1770a6
SHA2566ab452f4cd7babec4d375f5f958a86e82bcde4dca95351d660f3e850f3494134
SHA512b068784dd006a58e736b4daf5d978853ff34dc2b51b465727f0327d33f0ccd936fd734e5e906dc7e14465f5c151923044fa4d199f90bd13c2b84dad5ec5400e2
-
Filesize
10KB
MD56257ee7ba270b937238241557643fab9
SHA18f1775ce70b1786d8487c966def160c3b0ea7c4f
SHA25644003c8504e9ee3f03ba6b167eb4659ef8f8f73ea87f3cfc581820ca4023e2c7
SHA51244778e99dfe3a1b59b9fe0ee64a9c8b2af27cd05470b3d00ecaf2fcdcbeacfad041e18b562ecf8b957390ae762e7ee184c7bb8890505fc1f5aec85f97a87a4b8
-
Filesize
10KB
MD545406bc895c3a7b7962a29d8bbf72f89
SHA184813db9261e927aaa169c2fe7ffa63bd1f417bc
SHA256fb272cb76079a23cbbda8c9ccb8c5837a5000ee4e38d62b08fd8981d148a83f8
SHA512029ef2ee861a9f6c38490e8ba95750f4a8a228b19d2acc3711f49d2924f1985a0317c8ca36602e73104e5ac4041cb9696a5e570a3140419221175fb2e83afbf1
-
Filesize
10KB
MD53909e1b3f39adcf90f6d024af5264660
SHA179f88a3d4338e4b9ae0c18e307aaea9e47e7f250
SHA256dc7318d7257a84522cea4048ba800099bb66859bf04b534a9a03275edf0867e2
SHA5124ebbd2e73de4cd6d41f6edc7ea24ed3a500126ed761f2741164ea032d3f502a913f43fd63288cb24a98a52724d5a3953d04ddfd5335fb171b873c4216685b8ea
-
Filesize
9KB
MD535759d1eedc45d8929f32c6cbc5b72aa
SHA141c3e571975ffd94bdc84e4a5440df396e597c23
SHA256abea94f30ec20e5ca1756ea1e452a98b6f6978245c727384c1b4a7d4551784dd
SHA512bad61c89cd28f24209a28002d9ba4b3fe5008217ee1cd6d91ec170f5f76f3ef3bb23e8738b8bfdb2e1e8af0986296c6f08397524830e16a974333bc5c56d0bf6
-
Filesize
10KB
MD5503d4ebd991445ede62b7fb085331880
SHA14bb923dd3cb2c6f14ebf1b438a53484db79be498
SHA2562a0aea6e1388eb1306d18b63848c20d8f558b838ff8b3f3734bf26cb16babd23
SHA51220accebbc334c48e9789e75476968d89de07920d3795818e455cae78bba7b461d6c0512d5e695a497bd480fd16ed3a1af83b30093ae98a13ced9f8e206aa40fd
-
Filesize
9KB
MD5105a1470e22bdb62f5e182fd74d708a3
SHA1312f15801c94ef277b3dbed34ea7979fd06a5af9
SHA2563d888f5326c2bb93a22604fd64d5f30b536bb99a6bc5385b7e0b195daf01d2c9
SHA512cddc00c200d819a0c10e8c99f4340eeb927ccae9177a678f01ce5351a21880c2c6843da041d166d35c5a1ea777e9316cb2f454c8704973133a8007de83ec53e3
-
Filesize
10KB
MD553221d1dee6cf56fee882ba3c6638daf
SHA14df3a018f21e41466195eaf440365dbb42934f93
SHA256021f9dd965ec5c636a8e68ebe3b4229c5fffe9c39da6253773d737213e14f59d
SHA5120c308e69247f0b608d57d64acea103b5e2964b9aa723c1222892dd74bfb0599c8d2f6b7ecf62c52b9ee900481d7b98623c2fc64f7f268548e6c59e64ad1654c6
-
Filesize
10KB
MD5eb3363931e74d3d975d7342a684e0177
SHA165e380c3102658df4addf8b1e6426bc972a551b7
SHA256a26d14a533ec3783229af790e8e4f5265ac626e784459326ae01a9bd6a9d491e
SHA5127366463f7e442c9bfaa290dcdc14581a50259488030ca7ce0cead9696d523745f17003d1b7d70179d86fd803ed5e58f0301c389a5bf7cc798a6325182b801090
-
Filesize
10KB
MD5675abcf1565a0d40d80c5f35ae6da22e
SHA14c36e1ed2f99eff6cc191f394791dbbb53cb43aa
SHA256b7811273004346119313481b2ff3b38869a71feaf507fba4417dea008892b183
SHA512960bf28879475bdc4d4e3b5dd11af950c1f11244b2485543d0902750722e6dedd1c8b45f19b9ca59825f7cbeea527b9930602125bc340abbf7e60e50f7ff4d69
-
Filesize
116KB
MD502726af67e31341f9fad5e26a9aaa364
SHA16d221114d2659333415446a368bcf29d3b59f617
SHA256ceef92f8908ffd714e3fa4023fd1aeac8621377bb9d1b2b52c7e5cba0765acc2
SHA5122314266ac349120304098c204f12b08c579b63bd0930157ad41aeb51ca29c0fb382270d8a6c430d479835df646537432d9769ff82e59a247500397fb3e70380f
-
Filesize
116KB
MD5e323c9649cd9f730d532ad59cdb6dd45
SHA1887793035fe5806812d2fae5325bb9de723f8e4e
SHA2561acd1a9eb8495bf8d53c6f529a0db8260ee3bbf0637967e46279458ada5448be
SHA512fce9a1f5ee4348c7557ca9fe7ab886906b86058c1edad3cbbc792c5c99ad1cc1f440c1a199e221ded2b59aaf2e1577a59cbc0620874a3c0f89d4628dffd31b8a
-
Filesize
6KB
MD5194577a7e20bdcc7afbb718f502c134c
SHA1df2fbeb1400acda0909a32c1cf6bf492f1121e07
SHA256d65165279105ca6773180500688df4bdc69a2c7b771752f0a46ef120b7fd8ec3
SHA51258941214a8334331e52114aab851fc3d8d5da5dd14983f933da8735c24b0ddcac134e8f13692553199c4d9a14a4b3188b62878a30b9d696edda1204666b60837