IOC Report
Douglas County Government.pdf

loading gif

Files

File Path
Type
Category
Malicious
Douglas County Government.pdf
PDF document, version 1.7, 1 pages
initial sample
malicious
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\LOG
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb\LOG
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Network\65107d28-4ad3-478c-a2b5-2ed981cc8a44.tmp
JSON data
modified
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Network\Network Persistent State (copy)
JSON data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\000003.log
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\LOG
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\ConnectorIcons\icon-241023224755Z-198.bmp
PC bitmap, Windows 3.x format, 164 x -115 x 32, cbSize 75494, bits offset 54
dropped
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\ReaderMessages
SQLite 3.x database, last written using SQLite version 3040000, file counter 11, database pages 21, cookie 0x5, schema 4, UTF-8, version-valid-for 11
dropped
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\ReaderMessages-journal
SQLite Rollback Journal
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\2D85F72862B55C4EADD9E66E06947F3D
Certificate, Version=3
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
Microsoft Cabinet archive data, Windows 2000/XP setup, 71954 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\2D85F72862B55C4EADD9E66E06947F3D
data
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
data
modified
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\AdobeFnt23.lst.5004
PostScript document text
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\AdobeSysFnt23.lst (copy)
PostScript document text
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\IconCacheAcro65536.dat
data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\ACROBAT_READER_MASTER_SURFACEID
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_FirstMile_Home_View_Surface
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_FirstMile_Right_Sec_Surface
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_READER_LAUNCH_CARD
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Convert_LHP_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Disc_LHP_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Disc_LHP_Retention
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Edit_LHP_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Home_LHP_Trial_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_More_LHP_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_RHP_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_RHP_Intent_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_RHP_Retention
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Sign_LHP_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Upsell_Cards
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\Edit_InApp_Aug2020
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\TESTING
data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\SOPHIA.json
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SharedDataEvents
SQLite 3.x database, last written using SQLite version 3040000, file counter 24, database pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 24
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SharedDataEvents-journal
SQLite Rollback Journal
dropped
C:\Users\user\AppData\Local\Temp\MSIef90c.LOG
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\acrobat_sbx\NGL\NGLClient_AcrobatReader123.6.20320.6 2024-10-23 18-47-52-698.log
ASCII text, with very long lines (393)
dropped
C:\Users\user\AppData\Local\Temp\acrobat_sbx\NGL\NGLClient_AcrobatReader123.6.20320.6.log
ASCII text, with very long lines (393), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\acrobat_sbx\acroNGLLog.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\acrocef_low\3a63db07-6cb0-4a15-99cb-88196ef663f1.tmp
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 33081
dropped
C:\Users\user\AppData\Local\Temp\acrocef_low\4c3a4eb8-b4e9-4940-ba6c-3493bd34b927.tmp
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 1311022
dropped
C:\Users\user\AppData\Local\Temp\acrocef_low\65b281cc-8a18-46b9-89bd-cbf367d4e349.tmp
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 299538
dropped
C:\Users\user\AppData\Local\Temp\acrocef_low\b1209d63-ffe0-4fdf-8ee3-8a8101d6a115.tmp
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 57837
dropped
Chrome Cache Entry: 209
PNG image data, 2 x 2, 8-bit/color RGB, non-interlaced
downloaded
Chrome Cache Entry: 210
ASCII text, with no line terminators
downloaded
Chrome Cache Entry: 211
ASCII text, with very long lines (47531)
downloaded
Chrome Cache Entry: 212
ASCII text, with very long lines (50758)
downloaded
Chrome Cache Entry: 213
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
downloaded
Chrome Cache Entry: 214
ASCII text, with very long lines (47531)
dropped
Chrome Cache Entry: 215
ASCII text, with very long lines (65536), with no line terminators
downloaded
Chrome Cache Entry: 216
ASCII text, with very long lines (32065)
downloaded
Chrome Cache Entry: 217
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 218
ASCII text, with very long lines (6927), with no line terminators
downloaded
Chrome Cache Entry: 219
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 220
HTML document, ASCII text, with very long lines (5004)
downloaded
Chrome Cache Entry: 221
PNG image data, 60 x 27, 8-bit/color RGB, non-interlaced
downloaded
Chrome Cache Entry: 222
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 223
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 224
PNG image data, 60 x 27, 8-bit/color RGB, non-interlaced
dropped
Chrome Cache Entry: 225
PNG image data, 2 x 2, 8-bit/color RGB, non-interlaced
dropped
There are 55 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
"C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe" "C:\Users\user\Desktop\Douglas County Government.pdf"
C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
"C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --backgroundcolor=16777215
C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
"C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --log-severity=disable --user-agent-product="ReaderServices/23.6.20320 Chrome/105.0.0.0" --lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --log-file="C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\debug.log" --mojo-platform-channel-handle=1796 --field-trial-handle=1732,i,3600882816956457796,436860592170962583,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "https://docsend.com/view/38rmsxw2rqttb6y7"
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2068 --field-trial-handle=1996,i,6620047814814875631,87383685304778094,262144 /prefetch:8

URLs

Name
IP
Malicious
https://douglascounty.kaisersupportcom.top/favicon.ico
172.67.219.183
malicious
https://douglascounty.kaisersupportcom.top/homea5428aa1af5200350664eefb7fe9e2eb
172.67.219.183
malicious
https://douglascounty.kaisersupportcom.top/logo_/5FWdkYmY5uOWJQt
172.67.219.183
malicious
https://douglascounty.kaisersupportcom.top/js___/67197dbfda298-bb1b0798a53ec245351b5f58e899428a
172.67.219.183
malicious
https://douglascounty.kaisersupportcom.top/b_/67197dbfda2a1-bb1b0798a53ec245351b5f58e899428a
172.67.219.183
malicious
https://douglascounty.kaisersupportcom.top/css_/ijTP7k50O5FP4Mp
172.67.219.183
malicious
https://douglascounty.kaisersupportcom.top/js_/67197dbfda2a2-bb1b0798a53ec245351b5f58e899428a
172.67.219.183
malicious
https://douglascounty.kaisersupportcom.top/
malicious
https://douglascounty.kaisersupportcom.top/fav/G70PSKOQV73Ii5l
172.67.219.183
malicious
https://douglascounty.kaisersupportcom.top/cdn-cgi/challenge-platform/h/g/orchestrate/chl_page/v1?ray=8d7546440d25462c
172.67.219.183
malicious
https://douglascounty.kaisersupportcom.top/sig/ea748d6cd8541e66844d5ebb999d132167197dc45813a
172.67.219.183
malicious
https://douglascounty.kaisersupportcom.top/logo_/ea748d6cd8541e66844d5ebb999d132167197dc4580bc
172.67.219.183
malicious
https://douglascounty.kaisersupportcom.top/cdn-cgi/challenge-platform/h/g/flow/ov1/1818318327:1729702629:c-2lb-gOa0QemdKj4Z2iFIOttPYSvhWe4Z3IorcqLO8/8d7546440d25462c/YVB2WT.Q5y1y5XCBBjBRMkJwR6uylnkTYw37xD_RFF4-1729723704-1.1.1.1-Bcr5dSdNLhKJTfiohW5bb1D5AWTOa9BUNCFfoNC0fnyAFZs15lCAGYXxGZD8sp9V
172.67.219.183
malicious
https://douglascounty.kaisersupportcom.top/2svg/eBevQGWJ2ENPQj0
172.67.219.183
malicious
https://douglascounty.kaisersupportcom.top/&redirect=3ad0b201923e4047522303fad46c31e79b252232main&uid=f253efe302d32ab264a76e0ce65be76967197dbe0f5d3
malicious
http://x1.i.lencr.org/
unknown
https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/g/turnstile/if/ov2/av0/rcv0/0/jx6iy/0x4AAAAAAADnPIDROrmt1Wwj/light/fbE/normal/auto/
104.18.94.41
https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/g/flow/ov1/1471796142:1729702734:ptgFvXyp7PGk9wWsWoS0VbWiG3X_R4-0VZAdcTTu1Rc/8d754661e896e79e/R36xeldURKxOi6KwiC9NxkjSZUiaoHRUTHj1JbL6n7I-1729723709-1.1.1.1-piYYsE7K6Y7bJaQ1mXrknj0KJcVygsI_Kh1DPdnRvB7qDHFWmir7jV3Zb3MSV2Sn
104.18.94.41
https://a.nel.cloudflare.com/report/v4?s=sX3mL%2BhP9cV4muXZZ2lO226vTObh7l%2BbSljYqgjbdbvCKzHkpihX1F59TtB1a228TE2UoqEhoCrzkqUOkDEFeNq6Zu3Hi7%2FVgRTS2SjgrCIxHtuwVzDPhS7wlXTfXnrdv6JBPiQBCPAeNDiI3VTCJ4cgpFvI
35.190.80.1
https://docsend.com/view/38rmsxw2rqttb6y7)
unknown
https://getbootstrap.com/)
unknown
https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/g/i/8d754661e896e79e/1729723712545/GFMaV7kXSWLywAa
104.18.94.41
https://docsend.com/view/38rmsxw2rqttb6y7
18.173.205.79
https://github.com/twbs/bootstrap/graphs/contributors)
unknown
https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/g/orchestrate/chl_api/v1?ray=8d754661e896e79e&lang=auto
104.18.94.41
https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/g/cmg/1
104.18.94.41
https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/g/pat/8d754661e896e79e/1729723712542/17f3c7f99787208ecab29cf773ee8c7adece7f677206138511685c2078d00f0b/vTdPOBzgvE-1kmQ
104.18.94.41
https://a.nel.cloudflare.com/report/v4?s=LKpnBoFV8ma9uNqc515cDa5IJz1k11%2FbWU1VBxdxUgQKdlG2YH9xfgymeo9RaPJ6R2EeyFWAlXsn8e1VsXwc0b9hXTKJqa1wQT0i48L3EWoiZN%2BNem84zSECXfUigo0Tuh5ZvV6aiqVrkj1lU3UHI58BLsbD
35.190.80.1
https://github.com/twbs/bootstrap/blob/master/LICENSE)
unknown
There are 19 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
douglascounty.kaisersupportcom.top
172.67.219.183
malicious
bg.microsoft.map.fastly.net
199.232.214.172
a.nel.cloudflare.com
35.190.80.1
challenges.cloudflare.com
104.18.94.41
www.google.com
142.250.186.36
docsend.com
18.173.205.79
x1.i.lencr.org
unknown

IPs

IP
Domain
Country
Malicious
172.67.219.183
douglascounty.kaisersupportcom.top
United States
malicious
104.18.94.41
challenges.cloudflare.com
United States
192.168.2.9
unknown
unknown
192.168.2.4
unknown
unknown
192.168.2.6
unknown
unknown
35.190.80.1
a.nel.cloudflare.com
United States
142.250.186.36
www.google.com
United States
104.18.95.41
unknown
United States
192.168.2.11
unknown
unknown
192.168.2.10
unknown
unknown
18.173.205.79
docsend.com
United States
239.255.255.250
unknown
Reserved
There are 2 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
aFS
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
tDIText
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
tFileName
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
tFileSource
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
sFileAncestors
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
sDI
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
sDate
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
uFileSize
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
uPageCount
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
sAssetId
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
bisSharedFile
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
aFS
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
tDIText
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
tFileName
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
sFileAncestors
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
sDI
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
sDate
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
uFileSize
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
uPageCount
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
bisSharedFile
There are 10 hidden registries, click here to show them.

DOM / HTML

URL
Malicious
https://douglascounty.kaisersupportcom.top/&redirect=3ad0b201923e4047522303fad46c31e79b252232main&uid=f253efe302d32ab264a76e0ce65be76967197dbe0f5d3
malicious
https://douglascounty.kaisersupportcom.top/
https://douglascounty.kaisersupportcom.top/
https://douglascounty.kaisersupportcom.top/
https://douglascounty.kaisersupportcom.top/
https://douglascounty.kaisersupportcom.top/&redirect=3ad0b201923e4047522303fad46c31e79b252232main&uid=f253efe302d32ab264a76e0ce65be76967197dbe0f5d3