Overview
overview
10Static
static
10virtual_fr...ds.ps1
windows7_x64
1virtual_fr...ds.ps1
windows10-2004_x64
1virtual_fr...es.ps1
windows7_x64
1virtual_fr...es.ps1
windows10-2004_x64
1virtual_fr...ts.ps1
windows7_x64
1virtual_fr...ts.ps1
windows10-2004_x64
1virtual_fr...ns.ps1
windows7_x64
1virtual_fr...ns.ps1
windows10-2004_x64
1virtual_fr...cts.js
windows7_x64
1virtual_fr...cts.js
windows10-2004_x64
1virtual_fr...ng.ps1
windows7_x64
1virtual_fr...ng.ps1
windows10-2004_x64
1virtual_fr...der.js
windows7_x64
1virtual_fr...der.js
windows10-2004_x64
1virtual_fr...x.html
windows7_x64
1virtual_fr...x.html
windows10-2004_x64
1virtual_fr...ck.ps1
windows7_x64
1virtual_fr...ck.ps1
windows10-2004_x64
1virtual_fr...de.pdf
windows7_x64
1virtual_fr...de.pdf
windows10-2004_x64
1virtual_fr...nks.js
windows7_x64
1virtual_fr...nks.js
windows10-2004_x64
1virtual_fr...x.html
windows7_x64
1virtual_fr...x.html
windows10-2004_x64
1virtual_fr...ler.js
windows7_x64
1virtual_fr...ler.js
windows10-2004_x64
1virtual_fr...tp.ps1
windows7_x64
1virtual_fr...tp.ps1
windows10-2004_x64
1virtual_fr...x.html
windows7_x64
1virtual_fr...x.html
windows10-2004_x64
1virtual_fr...oap.js
windows7_x64
1virtual_fr...oap.js
windows10-2004_x64
1Analysis
-
max time kernel
143s -
max time network
197s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
20-05-2022 07:07
Behavioral task
behavioral1
Sample
virtual_freer_v1.58/back/cards.ps1
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
virtual_freer_v1.58/back/cards.ps1
Resource
win10v2004-20220414-en
Behavioral task
behavioral3
Sample
virtual_freer_v1.58/back/categories.ps1
Resource
win7-20220414-en
Behavioral task
behavioral4
Sample
virtual_freer_v1.58/back/categories.ps1
Resource
win10v2004-20220414-en
Behavioral task
behavioral5
Sample
virtual_freer_v1.58/back/payments.ps1
Resource
win7-20220414-en
Behavioral task
behavioral6
Sample
virtual_freer_v1.58/back/payments.ps1
Resource
win10v2004-20220414-en
Behavioral task
behavioral7
Sample
virtual_freer_v1.58/back/plugins.ps1
Resource
win7-20220414-en
Behavioral task
behavioral8
Sample
virtual_freer_v1.58/back/plugins.ps1
Resource
win10v2004-20220414-en
Behavioral task
behavioral9
Sample
virtual_freer_v1.58/back/products.js
Resource
win7-20220414-en
Behavioral task
behavioral10
Sample
virtual_freer_v1.58/back/products.js
Resource
win10v2004-20220414-en
Behavioral task
behavioral11
Sample
virtual_freer_v1.58/back/setting.ps1
Resource
win7-20220414-en
Behavioral task
behavioral12
Sample
virtual_freer_v1.58/back/setting.ps1
Resource
win10v2004-20220414-en
Behavioral task
behavioral13
Sample
virtual_freer_v1.58/back/template/header.js
Resource
win7-20220414-en
Behavioral task
behavioral14
Sample
virtual_freer_v1.58/back/template/header.js
Resource
win10v2004-20220414-en
Behavioral task
behavioral15
Sample
virtual_freer_v1.58/back/template/index.html
Resource
win7-20220414-en
Behavioral task
behavioral16
Sample
virtual_freer_v1.58/back/template/index.html
Resource
win10v2004-20220414-en
Behavioral task
behavioral17
Sample
virtual_freer_v1.58/callback.ps1
Resource
win7-20220414-en
Behavioral task
behavioral18
Sample
virtual_freer_v1.58/callback.ps1
Resource
win10v2004-20220414-en
Behavioral task
behavioral19
Sample
virtual_freer_v1.58/guide.pdf
Resource
win7-20220414-en
Behavioral task
behavioral20
Sample
virtual_freer_v1.58/guide.pdf
Resource
win10v2004-20220414-en
Behavioral task
behavioral21
Sample
virtual_freer_v1.58/include/funks.js
Resource
win7-20220414-en
Behavioral task
behavioral22
Sample
virtual_freer_v1.58/include/funks.js
Resource
win10v2004-20220414-en
Behavioral task
behavioral23
Sample
virtual_freer_v1.58/include/index.html
Resource
win7-20220414-en
Behavioral task
behavioral24
Sample
virtual_freer_v1.58/include/index.html
Resource
win10v2004-20220414-en
Behavioral task
behavioral25
Sample
virtual_freer_v1.58/include/libs/class.phpmailer.js
Resource
win7-20220414-en
Behavioral task
behavioral26
Sample
virtual_freer_v1.58/include/libs/class.phpmailer.js
Resource
win10v2004-20220414-en
Behavioral task
behavioral27
Sample
virtual_freer_v1.58/include/libs/class.smtp.ps1
Resource
win7-20220414-en
Behavioral task
behavioral28
Sample
virtual_freer_v1.58/include/libs/class.smtp.ps1
Resource
win10v2004-20220414-en
Behavioral task
behavioral29
Sample
virtual_freer_v1.58/include/libs/index.html
Resource
win7-20220414-en
Behavioral task
behavioral30
Sample
virtual_freer_v1.58/include/libs/index.html
Resource
win10v2004-20220414-en
Behavioral task
behavioral31
Sample
virtual_freer_v1.58/include/libs/nusoap.js
Resource
win7-20220414-en
Behavioral task
behavioral32
Sample
virtual_freer_v1.58/include/libs/nusoap.js
Resource
win10v2004-20220414-en
General
-
Target
virtual_freer_v1.58/guide.pdf
-
Size
289KB
-
MD5
465298d9fade6033fea704c4c2b7d518
-
SHA1
d1fad500d6e145b008297bd2575e69c77f3a03da
-
SHA256
342ab8f1cb7c43c193acc00216a0c5137fdc00204c9fac6d354e529362cf2870
-
SHA512
bb8eff0031642c3f0b4f5ba6cfec295eb5281725867b93609c346b66d61e57b2280354e3c88954574ba30c912e39a673c74b969727001522532889e7152fe7d6
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
AcroRd32.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
Processes:
AcroRd32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
Processes:
AcroRd32.exepid process 3572 AcroRd32.exe 3572 AcroRd32.exe 3572 AcroRd32.exe 3572 AcroRd32.exe 3572 AcroRd32.exe 3572 AcroRd32.exe 3572 AcroRd32.exe 3572 AcroRd32.exe 3572 AcroRd32.exe 3572 AcroRd32.exe 3572 AcroRd32.exe 3572 AcroRd32.exe 3572 AcroRd32.exe 3572 AcroRd32.exe 3572 AcroRd32.exe 3572 AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
AcroRd32.exepid process 3572 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
Processes:
AcroRd32.exeAdobeARM.exepid process 3572 AcroRd32.exe 3572 AcroRd32.exe 3572 AcroRd32.exe 3572 AcroRd32.exe 860 AdobeARM.exe 3572 AcroRd32.exe 3572 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
AcroRd32.exeRdrCEF.exedescription pid process target process PID 3572 wrote to memory of 4612 3572 AcroRd32.exe RdrCEF.exe PID 3572 wrote to memory of 4612 3572 AcroRd32.exe RdrCEF.exe PID 3572 wrote to memory of 4612 3572 AcroRd32.exe RdrCEF.exe PID 4612 wrote to memory of 4960 4612 RdrCEF.exe RdrCEF.exe PID 4612 wrote to memory of 4960 4612 RdrCEF.exe RdrCEF.exe PID 4612 wrote to memory of 4960 4612 RdrCEF.exe RdrCEF.exe PID 4612 wrote to memory of 4960 4612 RdrCEF.exe RdrCEF.exe PID 4612 wrote to memory of 4960 4612 RdrCEF.exe RdrCEF.exe PID 4612 wrote to memory of 4960 4612 RdrCEF.exe RdrCEF.exe PID 4612 wrote to memory of 4960 4612 RdrCEF.exe RdrCEF.exe PID 4612 wrote to memory of 4960 4612 RdrCEF.exe RdrCEF.exe PID 4612 wrote to memory of 4960 4612 RdrCEF.exe RdrCEF.exe PID 4612 wrote to memory of 4960 4612 RdrCEF.exe RdrCEF.exe PID 4612 wrote to memory of 4960 4612 RdrCEF.exe RdrCEF.exe PID 4612 wrote to memory of 4960 4612 RdrCEF.exe RdrCEF.exe PID 4612 wrote to memory of 4960 4612 RdrCEF.exe RdrCEF.exe PID 4612 wrote to memory of 4960 4612 RdrCEF.exe RdrCEF.exe PID 4612 wrote to memory of 4960 4612 RdrCEF.exe RdrCEF.exe PID 4612 wrote to memory of 4960 4612 RdrCEF.exe RdrCEF.exe PID 4612 wrote to memory of 4960 4612 RdrCEF.exe RdrCEF.exe PID 4612 wrote to memory of 4960 4612 RdrCEF.exe RdrCEF.exe PID 4612 wrote to memory of 4960 4612 RdrCEF.exe RdrCEF.exe PID 4612 wrote to memory of 4960 4612 RdrCEF.exe RdrCEF.exe PID 4612 wrote to memory of 4960 4612 RdrCEF.exe RdrCEF.exe PID 4612 wrote to memory of 4960 4612 RdrCEF.exe RdrCEF.exe PID 4612 wrote to memory of 4960 4612 RdrCEF.exe RdrCEF.exe PID 4612 wrote to memory of 4960 4612 RdrCEF.exe RdrCEF.exe PID 4612 wrote to memory of 4960 4612 RdrCEF.exe RdrCEF.exe PID 4612 wrote to memory of 4960 4612 RdrCEF.exe RdrCEF.exe PID 4612 wrote to memory of 4960 4612 RdrCEF.exe RdrCEF.exe PID 4612 wrote to memory of 4960 4612 RdrCEF.exe RdrCEF.exe PID 4612 wrote to memory of 4960 4612 RdrCEF.exe RdrCEF.exe PID 4612 wrote to memory of 4960 4612 RdrCEF.exe RdrCEF.exe PID 4612 wrote to memory of 4960 4612 RdrCEF.exe RdrCEF.exe PID 4612 wrote to memory of 4960 4612 RdrCEF.exe RdrCEF.exe PID 4612 wrote to memory of 4960 4612 RdrCEF.exe RdrCEF.exe PID 4612 wrote to memory of 4960 4612 RdrCEF.exe RdrCEF.exe PID 4612 wrote to memory of 4960 4612 RdrCEF.exe RdrCEF.exe PID 4612 wrote to memory of 4960 4612 RdrCEF.exe RdrCEF.exe PID 4612 wrote to memory of 4960 4612 RdrCEF.exe RdrCEF.exe PID 4612 wrote to memory of 4960 4612 RdrCEF.exe RdrCEF.exe PID 4612 wrote to memory of 4960 4612 RdrCEF.exe RdrCEF.exe PID 4612 wrote to memory of 4960 4612 RdrCEF.exe RdrCEF.exe PID 4612 wrote to memory of 4960 4612 RdrCEF.exe RdrCEF.exe PID 4612 wrote to memory of 1604 4612 RdrCEF.exe RdrCEF.exe PID 4612 wrote to memory of 1604 4612 RdrCEF.exe RdrCEF.exe PID 4612 wrote to memory of 1604 4612 RdrCEF.exe RdrCEF.exe PID 4612 wrote to memory of 1604 4612 RdrCEF.exe RdrCEF.exe PID 4612 wrote to memory of 1604 4612 RdrCEF.exe RdrCEF.exe PID 4612 wrote to memory of 1604 4612 RdrCEF.exe RdrCEF.exe PID 4612 wrote to memory of 1604 4612 RdrCEF.exe RdrCEF.exe PID 4612 wrote to memory of 1604 4612 RdrCEF.exe RdrCEF.exe PID 4612 wrote to memory of 1604 4612 RdrCEF.exe RdrCEF.exe PID 4612 wrote to memory of 1604 4612 RdrCEF.exe RdrCEF.exe PID 4612 wrote to memory of 1604 4612 RdrCEF.exe RdrCEF.exe PID 4612 wrote to memory of 1604 4612 RdrCEF.exe RdrCEF.exe PID 4612 wrote to memory of 1604 4612 RdrCEF.exe RdrCEF.exe PID 4612 wrote to memory of 1604 4612 RdrCEF.exe RdrCEF.exe PID 4612 wrote to memory of 1604 4612 RdrCEF.exe RdrCEF.exe PID 4612 wrote to memory of 1604 4612 RdrCEF.exe RdrCEF.exe PID 4612 wrote to memory of 1604 4612 RdrCEF.exe RdrCEF.exe PID 4612 wrote to memory of 1604 4612 RdrCEF.exe RdrCEF.exe PID 4612 wrote to memory of 1604 4612 RdrCEF.exe RdrCEF.exe PID 4612 wrote to memory of 1604 4612 RdrCEF.exe RdrCEF.exe
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\virtual_freer_v1.58\guide.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3572 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- Suspicious use of WriteProcessMemory
PID:4612 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=61D419C52E357CEEF1C54D7C71C7FE3B --mojo-platform-channel-handle=1732 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:4960
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=7899CD77AEE2BD8BDC2BB2084E19411C --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=1 --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=7899CD77AEE2BD8BDC2BB2084E19411C --renderer-client-id=2 --mojo-platform-channel-handle=1796 --allow-no-sandbox-job /prefetch:13⤵PID:1604
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=2692B45AA13D1E16EA8115E5600D68FE --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=1 --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=2692B45AA13D1E16EA8115E5600D68FE --renderer-client-id=4 --mojo-platform-channel-handle=2172 --allow-no-sandbox-job /prefetch:13⤵PID:3268
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=EA880FFBB0BE6545D284EFCC0304F880 --mojo-platform-channel-handle=2564 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:4168
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=68A41480D32ECBC1AFDCA6DC6F391130 --mojo-platform-channel-handle=1792 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:2008
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=3A971C12E084558C0FDFF3A6E5B62F8D --mojo-platform-channel-handle=2652 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:5032
-
-
-
C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARM.exe"C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARM.exe" /PRODUCT:Reader /VERSION:19.0 /MODE:32⤵
- Suspicious use of SetWindowsHookEx
PID:860 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Reader_sl.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Reader_sl.exe"3⤵PID:1328
-
-