IOC Report
Copyright_Infringement_Evidence.exe

loading gif

Files

File Path
Type
Category
Malicious
Copyright_Infringement_Evidence.exe
PE32+ executable (GUI) x86-64, for MS Windows
initial sample
malicious
C:\Users\Public\Documents\1p_stc.js
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Users\Public\Documents\infringing_content.pdf
PDF document, version 1.4, 21 pages
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\LOG
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb\LOG
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Network\62c9f349-4d9c-40d1-bfca-a8591e137e70.tmp
JSON data
modified
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Network\Network Persistent State (copy)
JSON data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\000003.log
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\LOG
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\ConnectorIcons\icon-241008000806Z-161.bmp
PC bitmap, Windows 3.x format, 114 x -152 x 32, cbSize 69366, bits offset 54
dropped
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\ReaderMessages
SQLite 3.x database, last written using SQLite version 3040000, file counter 13, database pages 21, cookie 0x5, schema 4, UTF-8, version-valid-for 13
dropped
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\ReaderMessages-journal
SQLite Rollback Journal
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\2D85F72862B55C4EADD9E66E06947F3D
Certificate, Version=3
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\2D85F72862B55C4EADD9E66E06947F3D
data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\ACROBAT_READER_MASTER_SURFACEID
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_FirstMile_Home_View_Surface
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_FirstMile_Right_Sec_Surface
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_READER_LAUNCH_CARD
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Convert_LHP_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Disc_LHP_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Disc_LHP_Retention
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Edit_LHP_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Home_LHP_Trial_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_More_LHP_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_RHP_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_RHP_Intent_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_RHP_Retention
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Sign_LHP_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Upsell_Cards
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\Edit_InApp_Aug2020
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\TESTING
data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\SOPHIA.json
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SharedDataEvents
SQLite 3.x database, last written using SQLite version 3040000, file counter 24, database pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 24
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SharedDataEvents-journal
SQLite Rollback Journal
dropped
C:\Users\user\AppData\Local\Temp\MSI90399.LOG
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\acrobat_sbx\A91obhrej_12rngfn_454.tmp
Zip data (MIME type "application/vnd.adobe.air-ucf-package+zip"?)
dropped
C:\Users\user\AppData\Local\Temp\acrobat_sbx\A9ot1ngx_12rngfl_454.tmp
Zip data (MIME type "application/vnd.adobe.air-ucf-package+zip"?)
dropped
C:\Users\user\AppData\Local\Temp\acrobat_sbx\NGL\NGLClient_AcrobatReader123.6.20320.6 2024-10-07 20-08-04-931.log
ASCII text, with very long lines (393)
dropped
C:\Users\user\AppData\Local\Temp\acrobat_sbx\NGL\NGLClient_AcrobatReader123.6.20320.6.log
ASCII text, with very long lines (393), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\acrobat_sbx\acroNGLLog.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\acrocef_low\2eeb6302-3fa6-499e-bf27-1efc7ee1b1f0.tmp
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 5111142
dropped
C:\Users\user\AppData\Local\Temp\acrocef_low\32adfae0-4802-4115-90d3-8dd5ad976667.tmp
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 1311022
dropped
C:\Users\user\AppData\Local\Temp\acrocef_low\6070af0f-2f50-4c69-a1a8-00a82439e04e.tmp
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 299538
dropped
C:\Users\user\AppData\Local\Temp\acrocef_low\eafaa857-6f4e-4f69-8df5-18a673b00228.tmp
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 33081
dropped
C:\Users\user\AppData\Roaming\Adobe\Acrobat\DC\Security\CRLCache\915DEAC5D1E15E49646B8A94E04E470958C9BB89.crl
data
dropped
C:\Users\user\AppData\Roaming\Adobe\Acrobat\DC\Security\CRLCache\DF22CF8B8C3B46C10D3D5C407561EABEB57F8181.crl
data
dropped
There are 39 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Copyright_Infringement_Evidence.exe
"C:\Users\user\Desktop\Copyright_Infringement_Evidence.exe"
malicious
C:\Windows\System32\cmd.exe
"cmd" /C start C:\Users\Public\Documents\infringing_content.pdf
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
"C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe" "C:\Users\Public\Documents\infringing_content.pdf"
C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
"C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --backgroundcolor=16777215
C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
"C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --log-severity=disable --user-agent-product="ReaderServices/23.6.20320 Chrome/105.0.0.0" --lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --log-file="C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\debug.log" --mojo-platform-channel-handle=2100 --field-trial-handle=1676,i,12330115841079905350,6086354628428383365,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:8

URLs

Name
IP
Malicious
http://cevcsca2021.ocsp-certum.com07
unknown
http://x1.i.lencr.org/
unknown
https://www.bu.edu/academics/policies/intellectual-property-policy/)
unknown
http://65.52.240.233/data/1x_stc.js%
unknown
http://65.52.240.233/data/1x_stc.js
unknown
http://65.52.240.233/data/1x_stc.jsZ
unknown
https://copyright.columbia.edu/index.html)
unknown
https://drive.google.com/file/d/0BxyQzf2unIzKM0FMZ2pydklwMWc/view)
unknown
http://65.52.240.233/data/privacy_policy.pdf
unknown
https://docs.rs/getrandom#nodejs-es-module-support
unknown
http://fairuse.stanford.edu/)
unknown
http://cevcsca2021.crl.certum.pl/cevcsca2021.crl0w
unknown
https://www.certum.pl/CPS0
unknown
http://repository.certum.pl/cevcsca2021.cer0
unknown
http://65.52.240.233/data/1x_stc.jsk
unknown
https://rdoge.ru/test/config.json
unknown
http://65.52.240.233/data/1p_stc.jsh
unknown
https://creativecommons.org/)
unknown
http://65.52.240.233/data/1p_stc.js
unknown
http://65.52.240.233/data/1x_stc.js~
unknown
http://65.52.240.233/data/privacy_policy.pdfr
unknown
http://subca.ocsp-certum.com02
unknown
http://copyright.cornell.edu/)
unknown
http://crl.certum.pl/ctnca2.crl0l
unknown
http://repository.certum.pl/ctnca2.cer09
unknown
http://65.52.240.233/data/1p_stc.js8
unknown
https://rdoge.ru/test/config.jsonS
unknown
http://65.52.240.233/data/1p_stc.jst
unknown
http://65.52.240.233/data/1p_stc.js~
unknown
http://www.certum.pl/CPS0
unknown
https://rdoge.ru/test/config.json_
unknown
https://ccsearch.creativecommons.org/)
unknown
There are 22 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
96.17.64.189
unknown
United States
65.52.240.233
unknown
United States
172.67.158.129
unknown
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
aFS
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
tDIText
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
tFileName
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
tFileSource
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
sFileAncestors
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
sDI
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
sDate
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
uFileSize
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
uPageCount
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
sAssetId
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
bisSharedFile
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
aFS
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
tDIText
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
tFileName
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
sFileAncestors
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
sDI
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
sDate
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
uFileSize
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
uPageCount
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
bisSharedFile
There are 13 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
27288C7A000
heap
page read and write
D079FFE000
stack
page read and write
7FF6F39A0000
unkown
page read and write
7FF6F37A1000
unkown
page execute read
27288BFA000
heap
page read and write
7FF6F37A0000
unkown
page readonly
27288C6F000
heap
page read and write
27288C47000
heap
page read and write
27288BF7000
heap
page read and write
7FF6F38FA000
unkown
page readonly
27288C72000
heap
page read and write
27288C6C000
heap
page read and write
27288C6F000
heap
page read and write
27288C86000
heap
page read and write
27288C6C000
heap
page read and write
27288C6A000
heap
page read and write
27288BFD000
heap
page read and write
27288BFE000
heap
page read and write
27288C6A000
heap
page read and write
27288BFD000
heap
page read and write
27288C47000
heap
page read and write
27288C68000
heap
page read and write
27288C49000
heap
page read and write
27288BFE000
heap
page read and write
7FF6F39A2000
unkown
page read and write
27288C7C000
heap
page read and write
27288C47000
heap
page read and write
27288C6F000
heap
page read and write
27288C6D000
heap
page read and write
27288BF7000
heap
page read and write
27288C49000
heap
page read and write
27288B30000
heap
page read and write
27288C49000
heap
page read and write
27288C47000
heap
page read and write
7FF6F39A1000
unkown
page write copy
27288BFA000
heap
page read and write
27288C6F000
heap
page read and write
27288C6C000
heap
page read and write
27288C49000
heap
page read and write
27288C49000
heap
page read and write
27288BFA000
heap
page read and write
27288C71000
heap
page read and write
27288C6A000
heap
page read and write
27288BD0000
heap
page read and write
27288C49000
heap
page read and write
27288BF4000
heap
page read and write
27288C6F000
heap
page read and write
27288C6F000
heap
page read and write
27288BFD000
heap
page read and write
7FF6F37A0000
unkown
page readonly
27288C47000
heap
page read and write
27288C47000
heap
page read and write
27288C6C000
heap
page read and write
7FF6F39A4000
unkown
page readonly
27288C6F000
heap
page read and write
27288DA1000
heap
page read and write
27288C6C000
heap
page read and write
27288F30000
heap
page read and write
27288C6A000
heap
page read and write
27288C49000
heap
page read and write
D07A0FE000
stack
page read and write
27288B70000
remote allocation
page read and write
27288BEE000
heap
page read and write
27288C47000
heap
page read and write
27288C05000
heap
page read and write
27288C6F000
heap
page read and write
27288C01000
heap
page read and write
27288C49000
heap
page read and write
27288C6C000
heap
page read and write
27288BFC000
heap
page read and write
D07A7FE000
stack
page read and write
27288C6F000
heap
page read and write
27288C49000
heap
page read and write
27288BF7000
heap
page read and write
27288BFD000
heap
page read and write
27288C67000
heap
page read and write
27288C67000
heap
page read and write
27288BDB000
heap
page read and write
D079EFC000
stack
page read and write
27288F35000
heap
page read and write
27288C84000
heap
page read and write
27288BFD000
heap
page read and write
27288C49000
heap
page read and write
27288B70000
remote allocation
page read and write
D07A6FF000
stack
page read and write
27288C8D000
heap
page read and write
27288C47000
heap
page read and write
27288C47000
heap
page read and write
27288DA0000
heap
page read and write
27288C6C000
heap
page read and write
27288B20000
heap
page read and write
27288C49000
heap
page read and write
27288C6F000
heap
page read and write
27288BF6000
heap
page read and write
27288B50000
heap
page read and write
27288BEA000
heap
page read and write
27288BFD000
heap
page read and write
27288B70000
remote allocation
page read and write
7FF6F37A1000
unkown
page execute read
27288C9D000
heap
page read and write
7FF6F39A0000
unkown
page write copy
27288C47000
heap
page read and write
27288C47000
heap
page read and write
7FF6F38FA000
unkown
page readonly
27288BD6000
heap
page read and write
27288C82000
heap
page read and write
27288BF7000
heap
page read and write
27288BFD000
heap
page read and write
7FF6F39A4000
unkown
page readonly
There are 99 hidden memdumps, click here to show them.