Analysis
-
max time kernel
104s -
max time network
108s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
16-12-2024 09:10
Static task
static1
URLScan task
urlscan1
General
Malware Config
Signatures
-
A potential corporate email address has been identified in the URL: FRRsultatazdazd@azdzad.frtestIP181.215.176.83AppareilMozilla5.0WindowsNT10.0Win64x64AppleWebKit537.36KHTMLlikeGeckoChrome92.0.4515.131Safari537.36Edg92.0.902.67
-
A potential corporate email address has been identified in the URL: FRRsultatazdazd@azdzad.frzadzadazfzafzafzafIP181.215.176.83AppareilMozilla5.0WindowsNT10.0Win64x64AppleWebKit537.36KHTMLlikeGeckoChrome92.0.4515.131Safari537.36Edg92.0.902.67
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 6 drive.google.com 9 drive.google.com -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 66 api.ipify.org 67 api.ipify.org -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4748 msedge.exe 4748 msedge.exe 2848 msedge.exe 2848 msedge.exe 2292 msedge.exe 2292 msedge.exe 1412 identity_helper.exe 1412 identity_helper.exe 4928 msedge.exe 4928 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe -
Suspicious use of FindShellTrayWindow 42 IoCs
pid Process 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 1784 AcroRd32.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1784 AcroRd32.exe 1784 AcroRd32.exe 1784 AcroRd32.exe 1784 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2848 wrote to memory of 3068 2848 msedge.exe 84 PID 2848 wrote to memory of 3068 2848 msedge.exe 84 PID 2848 wrote to memory of 2532 2848 msedge.exe 85 PID 2848 wrote to memory of 2532 2848 msedge.exe 85 PID 2848 wrote to memory of 2532 2848 msedge.exe 85 PID 2848 wrote to memory of 2532 2848 msedge.exe 85 PID 2848 wrote to memory of 2532 2848 msedge.exe 85 PID 2848 wrote to memory of 2532 2848 msedge.exe 85 PID 2848 wrote to memory of 2532 2848 msedge.exe 85 PID 2848 wrote to memory of 2532 2848 msedge.exe 85 PID 2848 wrote to memory of 2532 2848 msedge.exe 85 PID 2848 wrote to memory of 2532 2848 msedge.exe 85 PID 2848 wrote to memory of 2532 2848 msedge.exe 85 PID 2848 wrote to memory of 2532 2848 msedge.exe 85 PID 2848 wrote to memory of 2532 2848 msedge.exe 85 PID 2848 wrote to memory of 2532 2848 msedge.exe 85 PID 2848 wrote to memory of 2532 2848 msedge.exe 85 PID 2848 wrote to memory of 2532 2848 msedge.exe 85 PID 2848 wrote to memory of 2532 2848 msedge.exe 85 PID 2848 wrote to memory of 2532 2848 msedge.exe 85 PID 2848 wrote to memory of 2532 2848 msedge.exe 85 PID 2848 wrote to memory of 2532 2848 msedge.exe 85 PID 2848 wrote to memory of 2532 2848 msedge.exe 85 PID 2848 wrote to memory of 2532 2848 msedge.exe 85 PID 2848 wrote to memory of 2532 2848 msedge.exe 85 PID 2848 wrote to memory of 2532 2848 msedge.exe 85 PID 2848 wrote to memory of 2532 2848 msedge.exe 85 PID 2848 wrote to memory of 2532 2848 msedge.exe 85 PID 2848 wrote to memory of 2532 2848 msedge.exe 85 PID 2848 wrote to memory of 2532 2848 msedge.exe 85 PID 2848 wrote to memory of 2532 2848 msedge.exe 85 PID 2848 wrote to memory of 2532 2848 msedge.exe 85 PID 2848 wrote to memory of 2532 2848 msedge.exe 85 PID 2848 wrote to memory of 2532 2848 msedge.exe 85 PID 2848 wrote to memory of 2532 2848 msedge.exe 85 PID 2848 wrote to memory of 2532 2848 msedge.exe 85 PID 2848 wrote to memory of 2532 2848 msedge.exe 85 PID 2848 wrote to memory of 2532 2848 msedge.exe 85 PID 2848 wrote to memory of 2532 2848 msedge.exe 85 PID 2848 wrote to memory of 2532 2848 msedge.exe 85 PID 2848 wrote to memory of 2532 2848 msedge.exe 85 PID 2848 wrote to memory of 2532 2848 msedge.exe 85 PID 2848 wrote to memory of 4748 2848 msedge.exe 86 PID 2848 wrote to memory of 4748 2848 msedge.exe 86 PID 2848 wrote to memory of 1856 2848 msedge.exe 87 PID 2848 wrote to memory of 1856 2848 msedge.exe 87 PID 2848 wrote to memory of 1856 2848 msedge.exe 87 PID 2848 wrote to memory of 1856 2848 msedge.exe 87 PID 2848 wrote to memory of 1856 2848 msedge.exe 87 PID 2848 wrote to memory of 1856 2848 msedge.exe 87 PID 2848 wrote to memory of 1856 2848 msedge.exe 87 PID 2848 wrote to memory of 1856 2848 msedge.exe 87 PID 2848 wrote to memory of 1856 2848 msedge.exe 87 PID 2848 wrote to memory of 1856 2848 msedge.exe 87 PID 2848 wrote to memory of 1856 2848 msedge.exe 87 PID 2848 wrote to memory of 1856 2848 msedge.exe 87 PID 2848 wrote to memory of 1856 2848 msedge.exe 87 PID 2848 wrote to memory of 1856 2848 msedge.exe 87 PID 2848 wrote to memory of 1856 2848 msedge.exe 87 PID 2848 wrote to memory of 1856 2848 msedge.exe 87 PID 2848 wrote to memory of 1856 2848 msedge.exe 87 PID 2848 wrote to memory of 1856 2848 msedge.exe 87 PID 2848 wrote to memory of 1856 2848 msedge.exe 87 PID 2848 wrote to memory of 1856 2848 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://drive.google.com/uc?export=download&id=1qhJK8cNFt0wYal9Y2JHFkbBxTTd5Bc-A1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd22fd46f8,0x7ffd22fd4708,0x7ffd22fd47182⤵PID:3068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2168,13416301386932634932,8573376959681879313,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:22⤵PID:2532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2168,13416301386932634932,8573376959681879313,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2228 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2168,13416301386932634932,8573376959681879313,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2696 /prefetch:82⤵PID:1856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,13416301386932634932,8573376959681879313,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:2384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,13416301386932634932,8573376959681879313,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:12⤵PID:1480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2168,13416301386932634932,8573376959681879313,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=4572 /prefetch:82⤵PID:2952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,13416301386932634932,8573376959681879313,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4992 /prefetch:12⤵PID:3964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2168,13416301386932634932,8573376959681879313,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5344 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2168,13416301386932634932,8573376959681879313,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5328 /prefetch:82⤵PID:5080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2168,13416301386932634932,8573376959681879313,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5328 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,13416301386932634932,8573376959681879313,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5680 /prefetch:12⤵PID:3960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,13416301386932634932,8573376959681879313,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5696 /prefetch:12⤵PID:2036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,13416301386932634932,8573376959681879313,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6132 /prefetch:12⤵PID:3808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,13416301386932634932,8573376959681879313,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6196 /prefetch:12⤵PID:3320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,13416301386932634932,8573376959681879313,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6188 /prefetch:12⤵PID:3144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,13416301386932634932,8573376959681879313,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5960 /prefetch:12⤵PID:6004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,13416301386932634932,8573376959681879313,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6376 /prefetch:12⤵PID:5336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,13416301386932634932,8573376959681879313,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6136 /prefetch:12⤵PID:4300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2168,13416301386932634932,8573376959681879313,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6628 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4928
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3444
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2412
-
C:\Windows\system32\charmap.exe"C:\Windows\system32\charmap.exe"1⤵PID:5820
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4820
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\Downloads\Cahier des Charges.pdf"1⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:1784 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- System Location Discovery: System Language Discovery
PID:5564 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=A20FA33CD80A9CB6102ECF95E63FA2AF --mojo-platform-channel-handle=1760 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵
- System Location Discovery: System Language Discovery
PID:4732
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=C7B64D4F75597CF907458D196B5C6FC6 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=C7B64D4F75597CF907458D196B5C6FC6 --renderer-client-id=2 --mojo-platform-channel-handle=1768 --allow-no-sandbox-job /prefetch:13⤵
- System Location Discovery: System Language Discovery
PID:5732
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=5455397626A76BD73B63CD3EF68BEDCA --mojo-platform-channel-handle=2364 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:4872
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=DF8BFE2E786F84231427FDB2295B44A0 --mojo-platform-channel-handle=1836 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:3712
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=76F2B5745D98A9E413B7F159D0A6CA74 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=76F2B5745D98A9E413B7F159D0A6CA74 --renderer-client-id=6 --mojo-platform-channel-handle=2560 --allow-no-sandbox-job /prefetch:13⤵PID:1388
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3932
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD50a9dc42e4013fc47438e96d24beb8eff
SHA1806ab26d7eae031a58484188a7eb1adab06457fc
SHA25658d66151799526b3fa372552cd99b385415d9e9a119302b99aadc34dd51dd151
SHA512868d6b421ae2501a519595d0c34ddef25b2a98b082c5203da8349035f1f6764ddf183197f1054e7e86a752c71eccbc0649e515b63c55bc18cf5f0592397e258f
-
Filesize
152B
MD561cef8e38cd95bf003f5fdd1dc37dae1
SHA111f2f79ecb349344c143eea9a0fed41891a3467f
SHA256ae671613623b4477fbd5daf1fd2d148ae2a09ddcc3804b2b6d4ffcb60b317e3e
SHA5126fb9b333fe0e8fde19fdd0bd01a1990a4e60a87c0a02bc8297da1206e42f8690d06b030308e58c862e9e77714a585eed7cc1627590d99a10aeb77fc0dd3d864d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize480B
MD5e5ab4a7e47e9fdd9c6e0502e362b9141
SHA1b7e76abbe841cf5d85efdd7168c91013a8e301d3
SHA25658b3ee77ea7b9de0a8cc3fd162189e8b25621e7dad0d029152c8660a050a58ef
SHA512357843a70bfc9ef144475bea95924b673ee5c9b834e9e8aba7659cf595a1d6149b7fe04d8b3398eea225a2c99e1e617ea3a8540b3f6f97f1526fecc1b08b7d8e
-
Filesize
3KB
MD56aeb2a24fdcaecff496c48c2a7ec96fc
SHA16f08d6ba06b9fbe23cd501e3c0661c4aa0668a00
SHA256b4a06d750dd7fd0a0e15a723a9ad81f62078eb2204ec42b2e0371ef22ea506d6
SHA5127b50da09c478785c59f2c147932f4159cada54cd42d8cfd46e126d8acec38beebad33f1bd949a25637dc3a0798f8625d0a1cd8dd5ee322594623eefc89c05482
-
Filesize
6KB
MD52b48488f9bc72a159ac930ef53b06baf
SHA1f9ff44ae67d9fecbe3fb81242ad47f3216c7269d
SHA2566b274e32f9a94702051cf54dbf17e96a945848663760e4b27913371ca702cebc
SHA5125f5b80d1d1f4fda06c609c0f3bc93222222bec0a944ed6cd8cb6565a82152070a138acefa7283e3c5ec4272fef55e36d175e718e9a47656883e4f4dd341fb0d8
-
Filesize
7KB
MD5c053938cf4a04b16343a9d409f023ede
SHA17a5fd5695d1df639ce7bb76996e9d04f146ae3b1
SHA2569b85521ba5df5f8196116d27e88b1a2ef2b5599f629c29e268f254d23d8a85c0
SHA512491a56de4064fafde4413949c0cd987e4a5dc6c796df5bd970dce579f1cdfba6a7f82c310aaee7438a8e8e5135f8bf21572c7655237a150e0a40ae4af22ec1e5
-
Filesize
5KB
MD5fcda61d23e5312d227e6a0c0acf8627f
SHA1580a9dc66bd6a96d0adea6ee5944efdc008fe42b
SHA256e023c4aa777967c4a14bad29c3bfa20985cef6aef6bb31dd6fb68ba5905fdeb1
SHA512a6ef231f6ec68e4bec7ec3d761fedf1caad8dfd6452838dbfdffdafc2747861483a43a948e3793ae0ded91f6292835ccf91dec578326e57dbddb89371371e6e9
-
Filesize
6KB
MD521e083696c92773a5b8c31a0afa78fe6
SHA1ec70be7fedd12c36df2e3c7ceb8e37048df1c8b8
SHA2565694d8377100079b62cf28134a02ca01ce75bcf01d48dacf2fe62e11dfe4cc07
SHA51294b76f755ac839ecaf29322875c32a17cb37929009102872d8d9cc08d710a32e1247e9c1fb3bdf002be51e9341e9d867bc9fcea4d10480d9d0a377b73f230fc2
-
Filesize
1KB
MD52e569318866c68b270fd36e12171f56b
SHA11c48698321771403cf91d4a06c28427536557932
SHA256ed91fdf86331a9f3667dec0b6f51428db5d162cfb85fb50660d6b7f3d7c11404
SHA512fdb9bcfd376235c8c0a734d882b9559f37c36c20409f5caa9303606024bbaac35d97e92b0a6dabb10120213b243b39783bf7e51cf134d95cb9ff7367b1606b29
-
Filesize
1KB
MD548795ea25b5f72faa7e5e9f97a47beeb
SHA16785b4226d0227322b1e9e5707e9a91aeedf9302
SHA256bd82ca47f4bc3fa5bb7a26638e9139c6a7d2f315194c6b11361b33e2815bf124
SHA51273c299c1913bda8b39bc62b3afbcc72cb7b9d6b536556841d7b4be02bf330f06c695c9d2952d3639791279f25ca86fa7601e8106f7db6340db76f5b6dc4c056e
-
Filesize
371B
MD5dc7bff62c57bb961932944228f31e4fd
SHA13e50703c75648ca449cce9ca37a74eb0920be1b4
SHA25686130937a7766c1d47cf447efa0f7b3e93e1673fefc8333e6c86469834b95235
SHA5128b0c8b6b725f3999efe37a00d5061d76dfe06ad197cddbafab532dc55386d7f38be5d42328294a868158ac4db1da38a7e8f383374cbf7fe1e76dd11b7d115d9c
-
Filesize
371B
MD5058ad6290d2637695795c134ed3bbaef
SHA18873aed0aa8b78dd6f1cc1f239c800e6ccae6471
SHA2563f857c880fca5b9ab4c6ef5ffd52b0caa55da32ff726c4415f17a6d80f28b35a
SHA51294498a583444a9ee2ca1cb8f9fb3a3f931fc87dc00bf2624b6878e5f7c7d9198bfb1091bb6864cb748c2a115b1c4da76b74d7ada2da6dcf861703109ecc9388b
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5d4c51dedcd69d60b44958a016d239329
SHA109f9d84596df034562bff744ec923c7fb8c2b812
SHA256e56a40339c3a6a59a5fb49c3c0e2e2d1f087642e5b8a495a256866c87abcda99
SHA5127dda4406b9aac4933885727587325edef2edef963cb4db865f5dc8eda1b94f16531a5a9c26a6b73d3558c150e2e5288c85398acea55e6d2b35caa16d82711e71
-
Filesize
10KB
MD5bd327ea35973ca2691211bf70ef6cd52
SHA1f647fbc34181c60291a9d530cf197e99a21142c2
SHA256a3f742b4ab4645fd49dd0931e607d926256a8a1701aeb7fd440ee2f5a7c4ae27
SHA512a04e0bd6ead43463ba4a402a3e5de34407859b8bc142bce93f53403ea838ba18d9bcec64e1397ef0e52bc6a7ea671390841295ac6a61c085ca5cd03788a6bc1c
-
Filesize
10KB
MD5b297c4f3db0ecebb5cd2e3631d20592b
SHA117899f4c73f10f94010dd231ebde291bce4a99ef
SHA256c3870247a53f047afe062c7a7b7a83e95aab7541d3952d8446ca6b409ae3e1c3
SHA512fb9dc60a5ee4b5e03df4fed9c5b215a4d41b2c9f094bd203d06e7d81e4c29f880e7d92d34fe41075af5ddd40ce9e894cfdbe2b7da7052386e6b4aac8c40216d4
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
Filesize
312KB
MD52955ba82b90ad5dd65c16cc0f2ae9229
SHA14ef27976d6ec87ecf9033696db74bc28ca4c1649
SHA25676005d738b9209e6f2b0dc92060545077abd56e565424086d91a35827a21bdd1
SHA51277bcb929ca62060a01de454ae44ba124b6a57ce3fc49020362c9415a50bfd4a239b79207fa925ae0249602271d8a4f06f269ce5309080ae977f982a5c85a3c14