Analysis
-
max time kernel
269s -
max time network
263s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13-11-2024 15:32
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/file/d/1qZ0Q5PVfxCX9VVuPJPw0OXi0nY4401wK/view?usp=sharing
Resource
win10v2004-20241007-en
General
-
Target
https://drive.google.com/file/d/1qZ0Q5PVfxCX9VVuPJPw0OXi0nY4401wK/view?usp=sharing
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 4 drive.google.com 8 drive.google.com 9 drive.google.com -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133759857400287706" chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings chrome.exe -
Suspicious behavior: EnumeratesProcesses 26 IoCs
pid Process 748 chrome.exe 748 chrome.exe 2208 AcroRd32.exe 2208 AcroRd32.exe 2208 AcroRd32.exe 2208 AcroRd32.exe 2208 AcroRd32.exe 2208 AcroRd32.exe 2208 AcroRd32.exe 2208 AcroRd32.exe 2208 AcroRd32.exe 2208 AcroRd32.exe 2208 AcroRd32.exe 2208 AcroRd32.exe 2208 AcroRd32.exe 2208 AcroRd32.exe 2208 AcroRd32.exe 2208 AcroRd32.exe 2208 AcroRd32.exe 2208 AcroRd32.exe 2208 AcroRd32.exe 2208 AcroRd32.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 748 chrome.exe 748 chrome.exe 748 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 748 chrome.exe Token: SeCreatePagefilePrivilege 748 chrome.exe Token: SeShutdownPrivilege 748 chrome.exe Token: SeCreatePagefilePrivilege 748 chrome.exe Token: SeShutdownPrivilege 748 chrome.exe Token: SeCreatePagefilePrivilege 748 chrome.exe Token: SeShutdownPrivilege 748 chrome.exe Token: SeCreatePagefilePrivilege 748 chrome.exe Token: SeShutdownPrivilege 748 chrome.exe Token: SeCreatePagefilePrivilege 748 chrome.exe Token: SeShutdownPrivilege 748 chrome.exe Token: SeCreatePagefilePrivilege 748 chrome.exe Token: SeShutdownPrivilege 748 chrome.exe Token: SeCreatePagefilePrivilege 748 chrome.exe Token: SeShutdownPrivilege 748 chrome.exe Token: SeCreatePagefilePrivilege 748 chrome.exe Token: SeShutdownPrivilege 748 chrome.exe Token: SeCreatePagefilePrivilege 748 chrome.exe Token: SeShutdownPrivilege 748 chrome.exe Token: SeCreatePagefilePrivilege 748 chrome.exe Token: SeShutdownPrivilege 748 chrome.exe Token: SeCreatePagefilePrivilege 748 chrome.exe Token: SeShutdownPrivilege 748 chrome.exe Token: SeCreatePagefilePrivilege 748 chrome.exe Token: SeShutdownPrivilege 748 chrome.exe Token: SeCreatePagefilePrivilege 748 chrome.exe Token: SeShutdownPrivilege 748 chrome.exe Token: SeCreatePagefilePrivilege 748 chrome.exe Token: SeShutdownPrivilege 748 chrome.exe Token: SeCreatePagefilePrivilege 748 chrome.exe Token: SeShutdownPrivilege 748 chrome.exe Token: SeCreatePagefilePrivilege 748 chrome.exe Token: SeShutdownPrivilege 748 chrome.exe Token: SeCreatePagefilePrivilege 748 chrome.exe Token: SeShutdownPrivilege 748 chrome.exe Token: SeCreatePagefilePrivilege 748 chrome.exe Token: SeShutdownPrivilege 748 chrome.exe Token: SeCreatePagefilePrivilege 748 chrome.exe Token: SeShutdownPrivilege 748 chrome.exe Token: SeCreatePagefilePrivilege 748 chrome.exe Token: SeShutdownPrivilege 748 chrome.exe Token: SeCreatePagefilePrivilege 748 chrome.exe Token: SeShutdownPrivilege 748 chrome.exe Token: SeCreatePagefilePrivilege 748 chrome.exe Token: SeShutdownPrivilege 748 chrome.exe Token: SeCreatePagefilePrivilege 748 chrome.exe Token: SeShutdownPrivilege 748 chrome.exe Token: SeCreatePagefilePrivilege 748 chrome.exe Token: SeShutdownPrivilege 748 chrome.exe Token: SeCreatePagefilePrivilege 748 chrome.exe Token: SeShutdownPrivilege 748 chrome.exe Token: SeCreatePagefilePrivilege 748 chrome.exe Token: SeShutdownPrivilege 748 chrome.exe Token: SeCreatePagefilePrivilege 748 chrome.exe Token: SeShutdownPrivilege 748 chrome.exe Token: SeCreatePagefilePrivilege 748 chrome.exe Token: SeShutdownPrivilege 748 chrome.exe Token: SeCreatePagefilePrivilege 748 chrome.exe Token: SeShutdownPrivilege 748 chrome.exe Token: SeCreatePagefilePrivilege 748 chrome.exe Token: SeShutdownPrivilege 748 chrome.exe Token: SeCreatePagefilePrivilege 748 chrome.exe Token: SeShutdownPrivilege 748 chrome.exe Token: SeCreatePagefilePrivilege 748 chrome.exe -
Suspicious use of FindShellTrayWindow 35 IoCs
pid Process 748 chrome.exe 748 chrome.exe 748 chrome.exe 748 chrome.exe 748 chrome.exe 748 chrome.exe 748 chrome.exe 748 chrome.exe 748 chrome.exe 748 chrome.exe 748 chrome.exe 748 chrome.exe 748 chrome.exe 748 chrome.exe 748 chrome.exe 748 chrome.exe 748 chrome.exe 748 chrome.exe 748 chrome.exe 748 chrome.exe 748 chrome.exe 748 chrome.exe 748 chrome.exe 748 chrome.exe 748 chrome.exe 748 chrome.exe 748 chrome.exe 748 chrome.exe 748 chrome.exe 748 chrome.exe 748 chrome.exe 748 chrome.exe 748 chrome.exe 748 chrome.exe 2208 AcroRd32.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 748 chrome.exe 748 chrome.exe 748 chrome.exe 748 chrome.exe 748 chrome.exe 748 chrome.exe 748 chrome.exe 748 chrome.exe 748 chrome.exe 748 chrome.exe 748 chrome.exe 748 chrome.exe 748 chrome.exe 748 chrome.exe 748 chrome.exe 748 chrome.exe 748 chrome.exe 748 chrome.exe 748 chrome.exe 748 chrome.exe 748 chrome.exe 748 chrome.exe 748 chrome.exe 748 chrome.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2208 AcroRd32.exe 2208 AcroRd32.exe 2208 AcroRd32.exe 2208 AcroRd32.exe 2208 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 748 wrote to memory of 1240 748 chrome.exe 83 PID 748 wrote to memory of 1240 748 chrome.exe 83 PID 748 wrote to memory of 4032 748 chrome.exe 85 PID 748 wrote to memory of 4032 748 chrome.exe 85 PID 748 wrote to memory of 4032 748 chrome.exe 85 PID 748 wrote to memory of 4032 748 chrome.exe 85 PID 748 wrote to memory of 4032 748 chrome.exe 85 PID 748 wrote to memory of 4032 748 chrome.exe 85 PID 748 wrote to memory of 4032 748 chrome.exe 85 PID 748 wrote to memory of 4032 748 chrome.exe 85 PID 748 wrote to memory of 4032 748 chrome.exe 85 PID 748 wrote to memory of 4032 748 chrome.exe 85 PID 748 wrote to memory of 4032 748 chrome.exe 85 PID 748 wrote to memory of 4032 748 chrome.exe 85 PID 748 wrote to memory of 4032 748 chrome.exe 85 PID 748 wrote to memory of 4032 748 chrome.exe 85 PID 748 wrote to memory of 4032 748 chrome.exe 85 PID 748 wrote to memory of 4032 748 chrome.exe 85 PID 748 wrote to memory of 4032 748 chrome.exe 85 PID 748 wrote to memory of 4032 748 chrome.exe 85 PID 748 wrote to memory of 4032 748 chrome.exe 85 PID 748 wrote to memory of 4032 748 chrome.exe 85 PID 748 wrote to memory of 4032 748 chrome.exe 85 PID 748 wrote to memory of 4032 748 chrome.exe 85 PID 748 wrote to memory of 4032 748 chrome.exe 85 PID 748 wrote to memory of 4032 748 chrome.exe 85 PID 748 wrote to memory of 4032 748 chrome.exe 85 PID 748 wrote to memory of 4032 748 chrome.exe 85 PID 748 wrote to memory of 4032 748 chrome.exe 85 PID 748 wrote to memory of 4032 748 chrome.exe 85 PID 748 wrote to memory of 4032 748 chrome.exe 85 PID 748 wrote to memory of 4032 748 chrome.exe 85 PID 748 wrote to memory of 3408 748 chrome.exe 86 PID 748 wrote to memory of 3408 748 chrome.exe 86 PID 748 wrote to memory of 3024 748 chrome.exe 87 PID 748 wrote to memory of 3024 748 chrome.exe 87 PID 748 wrote to memory of 3024 748 chrome.exe 87 PID 748 wrote to memory of 3024 748 chrome.exe 87 PID 748 wrote to memory of 3024 748 chrome.exe 87 PID 748 wrote to memory of 3024 748 chrome.exe 87 PID 748 wrote to memory of 3024 748 chrome.exe 87 PID 748 wrote to memory of 3024 748 chrome.exe 87 PID 748 wrote to memory of 3024 748 chrome.exe 87 PID 748 wrote to memory of 3024 748 chrome.exe 87 PID 748 wrote to memory of 3024 748 chrome.exe 87 PID 748 wrote to memory of 3024 748 chrome.exe 87 PID 748 wrote to memory of 3024 748 chrome.exe 87 PID 748 wrote to memory of 3024 748 chrome.exe 87 PID 748 wrote to memory of 3024 748 chrome.exe 87 PID 748 wrote to memory of 3024 748 chrome.exe 87 PID 748 wrote to memory of 3024 748 chrome.exe 87 PID 748 wrote to memory of 3024 748 chrome.exe 87 PID 748 wrote to memory of 3024 748 chrome.exe 87 PID 748 wrote to memory of 3024 748 chrome.exe 87 PID 748 wrote to memory of 3024 748 chrome.exe 87 PID 748 wrote to memory of 3024 748 chrome.exe 87 PID 748 wrote to memory of 3024 748 chrome.exe 87 PID 748 wrote to memory of 3024 748 chrome.exe 87 PID 748 wrote to memory of 3024 748 chrome.exe 87 PID 748 wrote to memory of 3024 748 chrome.exe 87 PID 748 wrote to memory of 3024 748 chrome.exe 87 PID 748 wrote to memory of 3024 748 chrome.exe 87 PID 748 wrote to memory of 3024 748 chrome.exe 87 PID 748 wrote to memory of 3024 748 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://drive.google.com/file/d/1qZ0Q5PVfxCX9VVuPJPw0OXi0nY4401wK/view?usp=sharing1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:748 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff8ea82cc40,0x7ff8ea82cc4c,0x7ff8ea82cc582⤵PID:1240
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1888,i,13210098163137782622,10627033017783442544,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1880 /prefetch:22⤵PID:4032
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2128,i,13210098163137782622,10627033017783442544,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2216 /prefetch:32⤵PID:3408
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2240,i,13210098163137782622,10627033017783442544,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2252 /prefetch:82⤵PID:3024
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3116,i,13210098163137782622,10627033017783442544,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3136 /prefetch:12⤵PID:2884
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3124,i,13210098163137782622,10627033017783442544,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:1116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4696,i,13210098163137782622,10627033017783442544,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4544 /prefetch:12⤵PID:1296
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4972,i,13210098163137782622,10627033017783442544,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5172 /prefetch:82⤵PID:4488
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=5004,i,13210098163137782622,10627033017783442544,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=968 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4192
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5456,i,13210098163137782622,10627033017783442544,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5468 /prefetch:82⤵PID:2600
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:2868
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4836
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\Downloads\Dr Raaf Anwr New CV Resume for full time or part time.pdf"1⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:2208 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- System Location Discovery: System Language Discovery
PID:2888 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=ED8F5ED67267C6C0E0221ACDA761A3DE --mojo-platform-channel-handle=1764 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵
- System Location Discovery: System Language Discovery
PID:3112
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=1ED474B7B0EF3E1A1978719C959C364B --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=1ED474B7B0EF3E1A1978719C959C364B --renderer-client-id=2 --mojo-platform-channel-handle=1792 --allow-no-sandbox-job /prefetch:13⤵
- System Location Discovery: System Language Discovery
PID:2876
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=7D0FFC72303DBB51D85496D8178D4BB3 --mojo-platform-channel-handle=2336 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵
- System Location Discovery: System Language Discovery
PID:4300
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=737BC740A2BE050AC2A8530F46269C37 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=737BC740A2BE050AC2A8530F46269C37 --renderer-client-id=5 --mojo-platform-channel-handle=2452 --allow-no-sandbox-job /prefetch:13⤵
- System Location Discovery: System Language Discovery
PID:2780
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=CA7F723E42FB960ADE9B25ADF37C1442 --mojo-platform-channel-handle=2596 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵
- System Location Discovery: System Language Discovery
PID:32
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=31910DE408ACB548F7CB29D133ED0B63 --mojo-platform-channel-handle=2432 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵
- System Location Discovery: System Language Discovery
PID:1344
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3880
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:3540
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
36KB
MD5b30d3becc8731792523d599d949e63f5
SHA119350257e42d7aee17fb3bf139a9d3adb330fad4
SHA256b1b77e96279ead2b460de3de70e2ea4f5ad1b853598a4e27a5caf3f1a32cc4f3
SHA512523f54895fb07f62b9a5f72c8b62e83d4d9506bda57b183818615f6eb7286e3b9c5a50409bc5c5164867c3ccdeae88aa395ecca6bc7e36d991552f857510792e
-
Filesize
56KB
MD5752a1f26b18748311b691c7d8fc20633
SHA1c1f8e83eebc1cc1e9b88c773338eb09ff82ab862
SHA256111dac2948e4cecb10b0d2e10d8afaa663d78d643826b592d6414a1fd77cc131
SHA512a2f5f262faf2c3e9756da94b2c47787ce3a9391b5bd53581578aa9a764449e114836704d6dec4aadc097fed4c818831baa11affa1eb25be2bfad9349bb090fe5
-
Filesize
64KB
MD51a9491cff50c7388946a5ed8f10eeef2
SHA11270774545148fd4a0890c868a5a6a60d49f7938
SHA25675a37efe04469ca9e246099f1933a88a0c14676e3d853a0cb1bbc60b672e80f6
SHA512594989c25490cb96f60d057d5058da96367bbe41e10b470c7a979eeefbca6fb74fb661017dcc031e2b7c3a9ade22aac45c1c63d5410da23e36b5c5fb51378f24
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\55a7baac-ff3a-4cef-b917-e083a93692fe.tmp
Filesize10KB
MD5f2936861ed216a3f69baf74c34cd6227
SHA1362dc5e5ecbbe56d69224f43b94f66a2c2c42a37
SHA256679ee04cf94866a669ec637e59bb14ce41590986cf031dc702e837d6b6ea47e4
SHA512fc6f0108ce601bbd87afffc799325d5171ef1071421194b58fc3e777620abdbeee05bd59d661c251fca5ad64b030d6499aff29096cc8fc3ce8fe202fca9cbbab
-
Filesize
649B
MD556ddb6541ac2b60b695bc348bb7bad96
SHA175f888ba387a6b84cbaa6235ee0ddd5ddd8548eb
SHA2561d18c13867a0b99437e56d970cc037241d15afb5b1fc852f108100fa31722488
SHA5121e17e032f840504eba6037b242331d924cfcd4a886a342ac506651416f360f4ed6dcc044368be04d1c3c60e019ac7a0ccfeedbb78422b970ce39b19d36441395
-
Filesize
408B
MD5091f097599890f3fe5e7eab7632072a4
SHA10dd8a721c9a88c270c2908bfdb8ce6eeb0c5175c
SHA256c029d1f41ad36275455684aaaa16d79ff2d6a0f3b565539ea78df7d7a351650b
SHA512e37c78685591a9e3a7bfebe3aaae9635eb567e7359bff9beeaff11db2796e1ca59d4769c7d4c942de36a430cba0c51246bcc4d9f3c3b018acd639a65c7bb9e2b
-
Filesize
6KB
MD5f3611c6da2ad714d8dd9737d05fb5bc2
SHA185b07cd6769b8fae8ea31514ff01683d7dbed6db
SHA256bcc5e088c4471e1c72843daa2fafc5e1a3f32134631b5a13bb58779598933fd7
SHA51242daec660c4b6982b119b825dacb7873eac28aa5d27fc93349590b8f550bc3759ea54d089d96848daf6afb08edd44434a5a8e6e0db995b5fdae7de29064a52cb
-
Filesize
2KB
MD577beda6f550700cc3bca19497bffbe77
SHA15a657fcc193b829af119de9873ef19b2ec0ad6ff
SHA256bdece1f7200205df562ad366eccdde53f0579331cfab8c7c76f4f83f1c7dc4ae
SHA512a5b9d9cd847619c9c0afbbfb8cf14ecef393522aee61259a84c1350ce42fc685c267a9ff60a56117b3dd958aaa02f3d99fc9a797f3df53f1a3406f4c646872d2
-
Filesize
5KB
MD56a2c4b06307d5a99d703d6707d6dd905
SHA17582d8edb55c98a5eb7ae27e803c8e0c73b3f3e2
SHA256c899ffb29d033f66b31f4fece3be949403652d26ad18bd4ccab670dd45c1b411
SHA51284ef00bf18d23fb60366b162d98bbad92259d3f65ad56236d6061bc1b9ac57fcd7fc66a20c36f18ad7cc843ed20942e8799c885de33019ac87fb03788acd17e3
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD5a0b6e52ef6d6ea551ddf539199f20805
SHA1368377a965f5dc4596d205405be53991429708e0
SHA2564abe5987069a44e93ee22066fc9a8e47ef2a242ca41198f5a0523b73cf315881
SHA512076f1e7040194d5bf691eb8e75053e7b42ce10c9033ebdb7d4347f9547d00eab00addb3cbebd58266eadcdf4322535744a35e4f65d94b14b404f4f551a9728ac
-
Filesize
1KB
MD53b056446dedf59300e42df5b36c6dbde
SHA1046e19ee611c00690cba98982d1c204b5174c781
SHA2564115e1f352e28ed576a015e1908434a092962b6071de298631f1e59045ec3b8c
SHA5123d22dde1acc68bd46ea29decb79afbbb9ae40e787b96c63a5865ce93cf90a90216084fa9da357285d7818fb525f88d0ee57267de24e2ede2889d8f24865d4ad1
-
Filesize
10KB
MD55f5010547c347c4ef8fc91bdf87b91e4
SHA1dcc5af3c712e8ec19d3070fc26175608864eab82
SHA256fa47fbbeba67596c78169143a75c9de13d341a7d7faed0c6ebc9a3978de5b5ce
SHA512cdbf8c71b20e9e145dfb4df26ce6b00154f7d67ae253fbac4193b0454604ed303d46255667a59ca6c1b1834a7a27aada6141a082f9e447b7e5a544180349ba19
-
Filesize
9KB
MD58a2ec77eca28738373e0e128d3a4ae78
SHA1e1f9215039500d2970380e581cd7e64307191363
SHA2560671ca0bccf2e457110a34bc5d3b1d533f01917b228b5155da088ac9e450d9fe
SHA512da352fa16da1f4b82c3f6d021990bf80db50d9eaa96ba83d46addedcf85faa884a69cc418540b9f92290880fdea202a37cefb4eea5034ca9ad1c3667657b1968
-
Filesize
10KB
MD5db9dd43b5c557b86e0019a1659e276ac
SHA1f82f7d821facfbcbf172913e676a7292c632769c
SHA2567df8bfa63ea13619a3ec9a300f4e13bea66d807aa0ae99d8d547e5fe1828db89
SHA5123b37aa2df36a948b7721e0c9e6c3c603bbbe2776f68fccd5f2a5184435e97d17bbbf60d8ce5f8c94b52c8261b16e156322b9b9659bb2ca55c6fad3c7adbffd58
-
Filesize
10KB
MD5afe52fb866e7d52e898da5bc04a189f5
SHA1e1c686dbb6db36d8af474f4f3bc646337fd30f9a
SHA25691f5650ace9075f95beb10832de9e22e78746327689ed45972c9e7da1e2be18c
SHA512c2a03db5620812aab20519f2d6aed58e81436fc9b80910c0637a2e4caf3d9e8dd0310065ded92de5902900f70ff36df17cdcde48e6ebd24bc91d0e770948fbc1
-
Filesize
10KB
MD52d920b848fbecc3369af7b6099d6bc9d
SHA11c50837526c0262153003aa3935a94855fdfc682
SHA25666e409cad1fc0dbfec9e2dc045431985e8d253d6dccca82cc0202daf2c6f86cc
SHA5128b9790b8488f3067cf9d6566a661e50647fd83e21fb72ae455b8fc8f256e7be98653f9be2e6cea102131b49ee491634565de0e17ff7ca65bcffdbaec0df4ef51
-
Filesize
10KB
MD518db8edb442c21edcaa44f441f428c7b
SHA1d16e739ac0852406f38368fe5c093622715e4448
SHA25606bca9973215d20e688045bfdd424d8bb77944e71a562bc5860a6d52ad75e237
SHA5126a9d07234f8da1c1bd759d20c7521b5e0ab624b3769b99830a9968cff9508ffae886aa9ec3176ca8491aa113c905c0d0d2189415c79fff5f777948d46a3ab57b
-
Filesize
10KB
MD55376b14a66ab9e75e08477aca988fc21
SHA1ab055f2e33ca6bb871dc5433571c3016c832fa88
SHA2563e71175e84e3f1ee5047905c202761b20811c0063bffb613fda31b7087c67092
SHA512c2de01a4d3d1d971b0dc9ac6f30a6af562a2ce144bbbb040f1d86337ad71804cb4dca148c3b07628a41ccccfd1dacbdf408f3a172d1193a06c510175f7a0bdd7
-
Filesize
10KB
MD5ed7935ffc2cee2f6a972b062674f42ac
SHA1ca54a331491d6c32a08c91d7e91706a122c09400
SHA25691ae08e4beec3917d48f65b641a04fc223dfc8663575bccf35e28c12371b113f
SHA5121c8cc403957e6b5b25aeb413e643aa541ad0bdec78729c08acb7f66b31575c053eaa4a8bb959d124f7130c78b612a93f99fed32a8032fe98a3786510320e270f
-
Filesize
10KB
MD54a0fbd93cd232366fe99ef5842a088b4
SHA1db971a57aabf8d32611c72fe28d4a949616c5a42
SHA2562bed9d4233dd73b47c7bd9cc8b112583013e32e573ab76321f5e2a95f40fea60
SHA512348ba4892d62e99389149418661a2856a9fae0f283ed84cdfa54e7f28a5ab4a69ad81688f77fe1e0f4e3e13491f54ca4783ed983daa5829706b6c9ab33d1c7cc
-
Filesize
9KB
MD543ebbfb3adf9240aebdcc9575f9567be
SHA10df51f544028e18a98f477594c7093fc931c492b
SHA256b735ccf46638933d24a87be7c47f453f545862436c0c90d47581284509b1fc83
SHA51215021a5ccc95cf9d0ea4cbc25000f7ebe6f6555ecee25274646a701211e471cb1b3bc861ed16d1a1a1dd6e8a5a5c3612df80637f6d5ebb617f6c9328c6d588eb
-
Filesize
9KB
MD59293f99976fd51403ed1ebdf51979ac8
SHA131e877fba2b5e5a7326e21bbc3e7c05d2a6d33d3
SHA25697aa31c15a0fb2983e7334fcf36bf9f249fef58a340916e6e041e40a9fbce33a
SHA51227fce25fb8850ac0b0498c1c0b9229623b86888eb38920f445646e4ca52d37a837e5dc431405b8c4794537c638d865f4321eb017079ffb6468bf5c80191c5d53
-
Filesize
9KB
MD534335fb807cdf6188003ddaecaaa1aaa
SHA159aadb7a0a2133e3a2c48dc3490a3a3f10a830b9
SHA25675bb4c491c348b7c47259b759ea8bb2720662068db9ff1517f4cedf4fa04f780
SHA512acfdac00798eeae2d6071d547e8d36cf6372d55974a0b09144381201bafaafede3afb4a14409da0b9bf234736abf3a4a99eb4b3c9c4bcef68f6720aec813726f
-
Filesize
116KB
MD54314942824b4bb5e8775b1bbc9b355e4
SHA15c3373fa8a28f374d8d1970a95d58b41cf467e8a
SHA25641b7b1f32c5c3991cc1844fa2a815c625d1445eb12a549ac163c8fb3893677b7
SHA51275910a0ab867eef352ac4aa0b7241ce3a4b13bb2cd31dddcd73c396d2e4479dfbae5efef418a6634d3c6e70633ec6a7f439867d6f96183da143bb850561fdd9c
-
Filesize
116KB
MD5d8d12c0dc26bd90e0d71177c3d7bb395
SHA15788e4fc906f0bfc3a80da785e4d0686faaa7ad3
SHA25625a48238b66965d1170c88ef022bafb13cd85ac79e11e1d6ca93db0f63e3cac9
SHA512ccfd510d754f5f2440636ae1917ba84b67aeb52fa99c385cc4245e14dc325eeee4c4dc220ed7dfd90536147f73605892175fe6aea9417507a4cc5fe3921d7134
-
Filesize
116KB
MD5e07bd44a4ec285a8a450953b1aeb7233
SHA13b6537d9bed2c05af0fac81a900d1ef98fe70642
SHA256fe396122e00beef955b3d1a75707165654af9c47cb6c4dc8b4b3d4af49d10cdf
SHA51285e5a75f43bf20cb8deb2ae4cf139b751998ca5d15433c0d79eec7c72ae26690a9a7e3a8540ccf10ab2af9c6ce8ef31bec4a85c70c7f9d76c5597537c7798a67
-
Filesize
4.3MB
MD5bf44918c4bc0c69486d2cadcb03c3cb9
SHA1ef63805ba8ef2294c59cb8503a9694b1fb9d79ff
SHA25666bdf21d514f6bb509f9ae36d25a1e37cf25f6ea40b13b877b7912db3cbe1365
SHA512509f4459d73cbb339328c41d6d1738a252654192cce5b957b5594a5387b4ad81b6c04354cfaf9aba4b595f285f7b17a3c28d15e416cd3828ad05f8f9541a9d16