Overview
overview
4Static
static
4DOCS/Custo...er.pdf
windows7_x64
1DOCS/Custo...er.pdf
windows10-2004_x64
1DOCS/attac...ood.pl
linux_amd64
DOCS/attac...ood.pl
linux_armhf
DOCS/attac...ood.pl
linux_mips
DOCS/attac...ood.pl
linux_mipsel
DOCS/attac...tup.pl
linux_amd64
DOCS/attac...tup.pl
linux_armhf
DOCS/attac...tup.pl
linux_mips
DOCS/attac...tup.pl
linux_mipsel
udpmod.exe
windows7_x64
1udpmod.exe
windows10-2004_x64
1assets/css...ve.xml
windows7_x64
1assets/css...ve.xml
windows10-2004_x64
1assets/css...nt.xml
windows7_x64
1assets/css...nt.xml
windows10-2004_x64
1assets/css...ar.xml
windows7_x64
1assets/css...ar.xml
windows10-2004_x64
1assets/css...ns.xml
windows7_x64
1assets/css...ns.xml
windows10-2004_x64
1assets/css...ns.xml
windows7_x64
1assets/css...ns.xml
windows10-2004_x64
1assets/js/...min.js
windows7_x64
1assets/js/...min.js
windows10-2004_x64
1assets/js/...min.js
windows7_x64
1assets/js/...min.js
windows10-2004_x64
1assets/js/...min.js
windows7_x64
1assets/js/...min.js
windows10-2004_x64
1assets/js/...ery.js
windows7_x64
1assets/js/...ery.js
windows10-2004_x64
1assets/js/...fig.js
windows7_x64
1assets/js/...fig.js
windows10-2004_x64
Analysis
-
max time kernel
147s -
max time network
310s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
20-05-2022 07:03
Behavioral task
behavioral1
Sample
DOCS/Custom Booter.pdf
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
DOCS/Custom Booter.pdf
Resource
win10v2004-20220414-en
Behavioral task
behavioral3
Sample
DOCS/attack scripts/flood.pl
Resource
ubuntu1804-amd64-en-20211208
Behavioral task
behavioral4
Sample
DOCS/attack scripts/flood.pl
Resource
debian9-armhf-en-20211208
Behavioral task
behavioral5
Sample
DOCS/attack scripts/flood.pl
Resource
debian9-mipsbe-en-20211208
Behavioral task
behavioral6
Sample
DOCS/attack scripts/flood.pl
Resource
debian9-mipsel-en-20211208
Behavioral task
behavioral7
Sample
DOCS/attack scripts/setup.pl
Resource
ubuntu1804-amd64-en-20211208
Behavioral task
behavioral8
Sample
DOCS/attack scripts/setup.pl
Resource
debian9-armhf-en-20211208
Behavioral task
behavioral9
Sample
DOCS/attack scripts/setup.pl
Resource
debian9-mipsbe-en-20211208
Behavioral task
behavioral10
Sample
DOCS/attack scripts/setup.pl
Resource
debian9-mipsel-en-20211208
Behavioral task
behavioral11
Sample
udpmod.exe
Resource
win7-20220414-en
Behavioral task
behavioral12
Sample
udpmod.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral13
Sample
assets/css/fonts/elusive/font/elusive.xml
Resource
win7-20220414-en
Behavioral task
behavioral14
Sample
assets/css/fonts/elusive/font/elusive.xml
Resource
win10v2004-20220414-en
Behavioral task
behavioral15
Sample
assets/css/fonts/fontawesome/fonts/fontawesome-webfont.xml
Resource
win7-20220414-en
Behavioral task
behavioral16
Sample
assets/css/fonts/fontawesome/fonts/fontawesome-webfont.xml
Resource
win10v2004-20220414-en
Behavioral task
behavioral17
Sample
assets/css/fonts/glyphicons/glyphicons-halflings-regular.xml
Resource
win7-20220414-en
Behavioral task
behavioral18
Sample
assets/css/fonts/glyphicons/glyphicons-halflings-regular.xml
Resource
win10v2004-20220414-en
Behavioral task
behavioral19
Sample
assets/css/fonts/linecons/font/linecons.xml
Resource
win7-20220414-en
Behavioral task
behavioral20
Sample
assets/css/fonts/linecons/font/linecons.xml
Resource
win10v2004-20220414-en
Behavioral task
behavioral21
Sample
assets/css/fonts/meteocons/font/meteocons.xml
Resource
win7-20220414-en
Behavioral task
behavioral22
Sample
assets/css/fonts/meteocons/font/meteocons.xml
Resource
win10v2004-20220414-en
Behavioral task
behavioral23
Sample
assets/js/TweenLite.min.js
Resource
win7-20220414-en
Behavioral task
behavioral24
Sample
assets/js/TweenLite.min.js
Resource
win10v2004-20220414-en
Behavioral task
behavioral25
Sample
assets/js/TweenMax.min.js
Resource
win7-20220414-en
Behavioral task
behavioral26
Sample
assets/js/TweenMax.min.js
Resource
win10v2004-20220414-en
Behavioral task
behavioral27
Sample
assets/js/bootstrap.min.js
Resource
win7-20220414-en
Behavioral task
behavioral28
Sample
assets/js/bootstrap.min.js
Resource
win10v2004-20220414-en
Behavioral task
behavioral29
Sample
assets/js/ckeditor/adapters/jquery.js
Resource
win7-20220414-en
Behavioral task
behavioral30
Sample
assets/js/ckeditor/adapters/jquery.js
Resource
win10v2004-20220414-en
Behavioral task
behavioral31
Sample
assets/js/ckeditor/build-config.js
Resource
win7-20220414-en
Behavioral task
behavioral32
Sample
assets/js/ckeditor/build-config.js
Resource
win10v2004-20220414-en
General
-
Target
DOCS/Custom Booter.pdf
-
Size
106KB
-
MD5
68eb5eaa3dc70d237bf4263a1e81cf97
-
SHA1
5a5412c14675b9194152ae5ed08aab5c034076ee
-
SHA256
89d2f44e9551d82b468d4b3d0edb2d61c7eb3672abd6954783640e6b9b48a1eb
-
SHA512
2f7e67efc99a3d2690be75373af7102a6b42aa0504686e5a9a5d1e2365e1ce678413783e85ec7ed3126c04877fe77003ea29f5297c7daf04544d1c2d263c0f41
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
AcroRd32.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
Processes:
AcroRd32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
Processes:
AcroRd32.exepid process 4092 AcroRd32.exe 4092 AcroRd32.exe 4092 AcroRd32.exe 4092 AcroRd32.exe 4092 AcroRd32.exe 4092 AcroRd32.exe 4092 AcroRd32.exe 4092 AcroRd32.exe 4092 AcroRd32.exe 4092 AcroRd32.exe 4092 AcroRd32.exe 4092 AcroRd32.exe 4092 AcroRd32.exe 4092 AcroRd32.exe 4092 AcroRd32.exe 4092 AcroRd32.exe 4092 AcroRd32.exe 4092 AcroRd32.exe 4092 AcroRd32.exe 4092 AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
AcroRd32.exepid process 4092 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
Processes:
AcroRd32.exeAdobeARM.exepid process 4092 AcroRd32.exe 4092 AcroRd32.exe 4092 AcroRd32.exe 4092 AcroRd32.exe 4092 AcroRd32.exe 4460 AdobeARM.exe 4092 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
AcroRd32.exeRdrCEF.exedescription pid process target process PID 4092 wrote to memory of 2180 4092 AcroRd32.exe RdrCEF.exe PID 4092 wrote to memory of 2180 4092 AcroRd32.exe RdrCEF.exe PID 4092 wrote to memory of 2180 4092 AcroRd32.exe RdrCEF.exe PID 2180 wrote to memory of 3532 2180 RdrCEF.exe RdrCEF.exe PID 2180 wrote to memory of 3532 2180 RdrCEF.exe RdrCEF.exe PID 2180 wrote to memory of 3532 2180 RdrCEF.exe RdrCEF.exe PID 2180 wrote to memory of 3532 2180 RdrCEF.exe RdrCEF.exe PID 2180 wrote to memory of 3532 2180 RdrCEF.exe RdrCEF.exe PID 2180 wrote to memory of 3532 2180 RdrCEF.exe RdrCEF.exe PID 2180 wrote to memory of 3532 2180 RdrCEF.exe RdrCEF.exe PID 2180 wrote to memory of 3532 2180 RdrCEF.exe RdrCEF.exe PID 2180 wrote to memory of 3532 2180 RdrCEF.exe RdrCEF.exe PID 2180 wrote to memory of 3532 2180 RdrCEF.exe RdrCEF.exe PID 2180 wrote to memory of 3532 2180 RdrCEF.exe RdrCEF.exe PID 2180 wrote to memory of 3532 2180 RdrCEF.exe RdrCEF.exe PID 2180 wrote to memory of 3532 2180 RdrCEF.exe RdrCEF.exe PID 2180 wrote to memory of 3532 2180 RdrCEF.exe RdrCEF.exe PID 2180 wrote to memory of 3532 2180 RdrCEF.exe RdrCEF.exe PID 2180 wrote to memory of 3532 2180 RdrCEF.exe RdrCEF.exe PID 2180 wrote to memory of 3532 2180 RdrCEF.exe RdrCEF.exe PID 2180 wrote to memory of 3532 2180 RdrCEF.exe RdrCEF.exe PID 2180 wrote to memory of 3532 2180 RdrCEF.exe RdrCEF.exe PID 2180 wrote to memory of 3532 2180 RdrCEF.exe RdrCEF.exe PID 2180 wrote to memory of 3532 2180 RdrCEF.exe RdrCEF.exe PID 2180 wrote to memory of 3532 2180 RdrCEF.exe RdrCEF.exe PID 2180 wrote to memory of 3532 2180 RdrCEF.exe RdrCEF.exe PID 2180 wrote to memory of 3532 2180 RdrCEF.exe RdrCEF.exe PID 2180 wrote to memory of 3532 2180 RdrCEF.exe RdrCEF.exe PID 2180 wrote to memory of 3532 2180 RdrCEF.exe RdrCEF.exe PID 2180 wrote to memory of 3532 2180 RdrCEF.exe RdrCEF.exe PID 2180 wrote to memory of 3532 2180 RdrCEF.exe RdrCEF.exe PID 2180 wrote to memory of 3532 2180 RdrCEF.exe RdrCEF.exe PID 2180 wrote to memory of 3532 2180 RdrCEF.exe RdrCEF.exe PID 2180 wrote to memory of 3532 2180 RdrCEF.exe RdrCEF.exe PID 2180 wrote to memory of 3532 2180 RdrCEF.exe RdrCEF.exe PID 2180 wrote to memory of 3532 2180 RdrCEF.exe RdrCEF.exe PID 2180 wrote to memory of 3532 2180 RdrCEF.exe RdrCEF.exe PID 2180 wrote to memory of 3532 2180 RdrCEF.exe RdrCEF.exe PID 2180 wrote to memory of 3532 2180 RdrCEF.exe RdrCEF.exe PID 2180 wrote to memory of 3532 2180 RdrCEF.exe RdrCEF.exe PID 2180 wrote to memory of 3532 2180 RdrCEF.exe RdrCEF.exe PID 2180 wrote to memory of 3532 2180 RdrCEF.exe RdrCEF.exe PID 2180 wrote to memory of 3532 2180 RdrCEF.exe RdrCEF.exe PID 2180 wrote to memory of 3532 2180 RdrCEF.exe RdrCEF.exe PID 2180 wrote to memory of 1304 2180 RdrCEF.exe RdrCEF.exe PID 2180 wrote to memory of 1304 2180 RdrCEF.exe RdrCEF.exe PID 2180 wrote to memory of 1304 2180 RdrCEF.exe RdrCEF.exe PID 2180 wrote to memory of 1304 2180 RdrCEF.exe RdrCEF.exe PID 2180 wrote to memory of 1304 2180 RdrCEF.exe RdrCEF.exe PID 2180 wrote to memory of 1304 2180 RdrCEF.exe RdrCEF.exe PID 2180 wrote to memory of 1304 2180 RdrCEF.exe RdrCEF.exe PID 2180 wrote to memory of 1304 2180 RdrCEF.exe RdrCEF.exe PID 2180 wrote to memory of 1304 2180 RdrCEF.exe RdrCEF.exe PID 2180 wrote to memory of 1304 2180 RdrCEF.exe RdrCEF.exe PID 2180 wrote to memory of 1304 2180 RdrCEF.exe RdrCEF.exe PID 2180 wrote to memory of 1304 2180 RdrCEF.exe RdrCEF.exe PID 2180 wrote to memory of 1304 2180 RdrCEF.exe RdrCEF.exe PID 2180 wrote to memory of 1304 2180 RdrCEF.exe RdrCEF.exe PID 2180 wrote to memory of 1304 2180 RdrCEF.exe RdrCEF.exe PID 2180 wrote to memory of 1304 2180 RdrCEF.exe RdrCEF.exe PID 2180 wrote to memory of 1304 2180 RdrCEF.exe RdrCEF.exe PID 2180 wrote to memory of 1304 2180 RdrCEF.exe RdrCEF.exe PID 2180 wrote to memory of 1304 2180 RdrCEF.exe RdrCEF.exe PID 2180 wrote to memory of 1304 2180 RdrCEF.exe RdrCEF.exe
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\DOCS\Custom Booter.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=BE6D06588E8AA981395CCADF83532C53 --mojo-platform-channel-handle=1744 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=836FDAA87379FC823EBD9F4A8340C862 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=1 --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=836FDAA87379FC823EBD9F4A8340C862 --renderer-client-id=2 --mojo-platform-channel-handle=1772 --allow-no-sandbox-job /prefetch:13⤵
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=75923BB2994B5572BCD16675351A1F2A --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=1 --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=75923BB2994B5572BCD16675351A1F2A --renderer-client-id=4 --mojo-platform-channel-handle=2020 --allow-no-sandbox-job /prefetch:13⤵
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=B6279AFAA7B8FCC9FD98989FB1A58F3A --mojo-platform-channel-handle=2552 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=1D5010763D200BFD7DA275D18F12ADAC --mojo-platform-channel-handle=1920 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=1B8DB04A9894D666FE4922099E146950 --mojo-platform-channel-handle=2784 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵
-
C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARM.exe"C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARM.exe" /PRODUCT:Reader /VERSION:19.0 /MODE:32⤵
- Suspicious use of SetWindowsHookEx
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Reader_sl.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Reader_sl.exe"3⤵
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1304-135-0x0000000000000000-mapping.dmp
-
memory/1664-149-0x0000000000000000-mapping.dmp
-
memory/2136-140-0x0000000000000000-mapping.dmp
-
memory/2180-130-0x0000000000000000-mapping.dmp
-
memory/3532-132-0x0000000000000000-mapping.dmp
-
memory/3784-151-0x0000000000000000-mapping.dmp
-
memory/4124-153-0x0000000000000000-mapping.dmp
-
memory/4452-146-0x0000000000000000-mapping.dmp
-
memory/4460-144-0x0000000000000000-mapping.dmp