Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
368s -
max time network
432s -
platform
windows10-1703_x64 -
resource
win10-20220901-en -
resource tags
arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system -
submitted
19/09/2022, 16:00
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://jovalmachine.com/wp-content/uploads/2022/03/JoVal-Machine-Company-Overview.pdf
Resource
win10-20220901-en
General
-
Target
https://jovalmachine.com/wp-content/uploads/2022/03/JoVal-Machine-Company-Overview.pdf
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 IEXPLORE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30985281" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\HistoryJournalCertificate iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\FlipAhead iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$Telligent iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$http://www.typepad.com/ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\HistoryJournalCertificate\NextUpdateDate = "370384846" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 7030242141ccd801 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "536573459" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "536583312" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30985281" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$blogger iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$vBulletin 4 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\FlipAhead\FileVersion = "2016061511" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\FlipAhead\NextUpdateDate = "370416837" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "30985281" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$MediaWiki iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4B0D7156-3834-11ED-9424-C61147A093BC} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "539683592" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000048dd1ad2bf5eea499f26ca602abd801100000000020000000000106600000001000020000000c6f2213e46693821677c1e1915ce3aa2ddc5f804e5ae46bb2fce120aa627dac0000000000e80000000020000200000007fbfeeec0d324a8ab8ca4fbf862c6f75bf8bf4cfbae3b07c13dd4f6b1a9fee69200000007f839a82597d6ab0243ed13bd900db38861fb07ef8991382d8355f9dc7bb46f5400000008ad0fa0d197d6f6270ff0ead29a858031f06cd9da42a47b11f78459d1c473aba5c14a51e1f492cc4bd71deffa73c7695d560cf86d155ff1d18a1d8dcee62928c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$WordPress iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "370368252" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$vBulletin 3 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$Discuz! iexplore.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 4852 IEXPLORE.EXE 4852 IEXPLORE.EXE 4852 IEXPLORE.EXE 4852 IEXPLORE.EXE 4852 IEXPLORE.EXE 4852 IEXPLORE.EXE 4852 IEXPLORE.EXE 4852 IEXPLORE.EXE 4852 IEXPLORE.EXE 4852 IEXPLORE.EXE 4852 IEXPLORE.EXE 4852 IEXPLORE.EXE 4852 IEXPLORE.EXE 4852 IEXPLORE.EXE 4852 IEXPLORE.EXE 4852 IEXPLORE.EXE 4852 IEXPLORE.EXE 4852 IEXPLORE.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1532 iexplore.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1532 iexplore.exe 4852 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 11 IoCs
pid Process 1532 iexplore.exe 1532 iexplore.exe 4852 IEXPLORE.EXE 4852 IEXPLORE.EXE 4852 IEXPLORE.EXE 4852 IEXPLORE.EXE 4852 IEXPLORE.EXE 4852 IEXPLORE.EXE 4852 IEXPLORE.EXE 4852 IEXPLORE.EXE 4852 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1532 wrote to memory of 4852 1532 iexplore.exe 66 PID 1532 wrote to memory of 4852 1532 iexplore.exe 66 PID 1532 wrote to memory of 4852 1532 iexplore.exe 66 PID 4852 wrote to memory of 2996 4852 IEXPLORE.EXE 68 PID 4852 wrote to memory of 2996 4852 IEXPLORE.EXE 68 PID 4852 wrote to memory of 2996 4852 IEXPLORE.EXE 68 PID 4852 wrote to memory of 4000 4852 IEXPLORE.EXE 70 PID 4852 wrote to memory of 4000 4852 IEXPLORE.EXE 70 PID 4852 wrote to memory of 4000 4852 IEXPLORE.EXE 70 PID 4000 wrote to memory of 1448 4000 RdrCEF.exe 72 PID 4000 wrote to memory of 1448 4000 RdrCEF.exe 72 PID 4000 wrote to memory of 1448 4000 RdrCEF.exe 72 PID 4000 wrote to memory of 1448 4000 RdrCEF.exe 72 PID 4000 wrote to memory of 1448 4000 RdrCEF.exe 72 PID 4000 wrote to memory of 1448 4000 RdrCEF.exe 72 PID 4000 wrote to memory of 1448 4000 RdrCEF.exe 72 PID 4000 wrote to memory of 1448 4000 RdrCEF.exe 72 PID 4000 wrote to memory of 1448 4000 RdrCEF.exe 72 PID 4000 wrote to memory of 1448 4000 RdrCEF.exe 72 PID 4000 wrote to memory of 1448 4000 RdrCEF.exe 72 PID 4000 wrote to memory of 1448 4000 RdrCEF.exe 72 PID 4000 wrote to memory of 1448 4000 RdrCEF.exe 72 PID 4000 wrote to memory of 1448 4000 RdrCEF.exe 72 PID 4000 wrote to memory of 1448 4000 RdrCEF.exe 72 PID 4000 wrote to memory of 1448 4000 RdrCEF.exe 72 PID 4000 wrote to memory of 1448 4000 RdrCEF.exe 72 PID 4000 wrote to memory of 1448 4000 RdrCEF.exe 72 PID 4000 wrote to memory of 1448 4000 RdrCEF.exe 72 PID 4000 wrote to memory of 1448 4000 RdrCEF.exe 72 PID 4000 wrote to memory of 1448 4000 RdrCEF.exe 72 PID 4000 wrote to memory of 1448 4000 RdrCEF.exe 72 PID 4000 wrote to memory of 1448 4000 RdrCEF.exe 72 PID 4000 wrote to memory of 1448 4000 RdrCEF.exe 72 PID 4000 wrote to memory of 1448 4000 RdrCEF.exe 72 PID 4000 wrote to memory of 1448 4000 RdrCEF.exe 72 PID 4000 wrote to memory of 1448 4000 RdrCEF.exe 72 PID 4000 wrote to memory of 1448 4000 RdrCEF.exe 72 PID 4000 wrote to memory of 1448 4000 RdrCEF.exe 72 PID 4000 wrote to memory of 1448 4000 RdrCEF.exe 72 PID 4000 wrote to memory of 1448 4000 RdrCEF.exe 72 PID 4000 wrote to memory of 1448 4000 RdrCEF.exe 72 PID 4000 wrote to memory of 1448 4000 RdrCEF.exe 72 PID 4000 wrote to memory of 1448 4000 RdrCEF.exe 72 PID 4000 wrote to memory of 1448 4000 RdrCEF.exe 72 PID 4000 wrote to memory of 1448 4000 RdrCEF.exe 72 PID 4000 wrote to memory of 1448 4000 RdrCEF.exe 72 PID 4000 wrote to memory of 1448 4000 RdrCEF.exe 72 PID 4000 wrote to memory of 1448 4000 RdrCEF.exe 72 PID 4000 wrote to memory of 1448 4000 RdrCEF.exe 72 PID 4000 wrote to memory of 1448 4000 RdrCEF.exe 72 PID 4000 wrote to memory of 2140 4000 RdrCEF.exe 73 PID 4000 wrote to memory of 2140 4000 RdrCEF.exe 73 PID 4000 wrote to memory of 2140 4000 RdrCEF.exe 73 PID 4000 wrote to memory of 2140 4000 RdrCEF.exe 73 PID 4000 wrote to memory of 2140 4000 RdrCEF.exe 73 PID 4000 wrote to memory of 2140 4000 RdrCEF.exe 73 PID 4000 wrote to memory of 2140 4000 RdrCEF.exe 73 PID 4000 wrote to memory of 2140 4000 RdrCEF.exe 73 PID 4000 wrote to memory of 2140 4000 RdrCEF.exe 73 PID 4000 wrote to memory of 2140 4000 RdrCEF.exe 73 PID 4000 wrote to memory of 2140 4000 RdrCEF.exe 73 PID 4000 wrote to memory of 2140 4000 RdrCEF.exe 73 PID 4000 wrote to memory of 2140 4000 RdrCEF.exe 73 PID 4000 wrote to memory of 2140 4000 RdrCEF.exe 73
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://jovalmachine.com/wp-content/uploads/2022/03/JoVal-Machine-Company-Overview.pdf1⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1532 CREDAT:82945 /prefetch:22⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4852 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140433⤵PID:2996
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140433⤵
- Suspicious use of WriteProcessMemory
PID:4000 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=221992E2C68114824573A99083F83E6A --mojo-platform-channel-handle=1612 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵PID:1448
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=F304C555A8E295B2FE840153103C4FA3 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=1 --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=F304C555A8E295B2FE840153103C4FA3 --renderer-client-id=2 --mojo-platform-channel-handle=1620 --allow-no-sandbox-job /prefetch:14⤵PID:2140
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=A0C5F31374013D1C93817072C88B7D37 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=1 --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=A0C5F31374013D1C93817072C88B7D37 --renderer-client-id=4 --mojo-platform-channel-handle=2072 --allow-no-sandbox-job /prefetch:14⤵PID:2228
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=93D859D4EED7A05F9759EBEC45FD50E0 --mojo-platform-channel-handle=2340 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵PID:4612
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=8BEEF82589E7C6744F8D081E7C8FDD70 --mojo-platform-channel-handle=2628 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵PID:812
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=AAFFDDDE06B72E3B3E54F20C57E7CAE9 --mojo-platform-channel-handle=1908 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵PID:2324
-
-
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroBroker.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroBroker.exe" -Embedding1⤵PID:4356
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroBroker.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroBroker.exe" -Embedding1⤵PID:4284
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD5520071a63bb5e2038486cd0ce14055b1
SHA1752cfb61bbe3ae1e2c2609c53aeee510661a59ed
SHA256f8a989e9cf1fe0f0000c795537122a3c727e3b570b66582bfb62d9bbae4b20f8
SHA5126f0131c9e0943c6a13d52a7525e1c592c95db868bf2dd21a8a37254150a239748985cc31518d0c4844bebfc5613feee6857b5debfbbbd6ed4539cd5e494ebbb2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize404B
MD5866b503a255c012c8daead58e0e93f47
SHA102f33e463b224116f9bc5cd8c4197a6b916ae893
SHA2568c6b9d110890782323edd0ad8f3d16595a2c6f678b62a2ef62ca790d15d8f9d8
SHA5123bbf1cf28cd3f203d1e7dba9660331726b96423c69819bcbed1cfbf8355756c2b1359a133d02020786af680aac6dce4a5b55d89646c5f8154618d525f42117f6
-
Filesize
610B
MD56ce95ac6c145c4915be9029b3051edb8
SHA10560a9dc36ad303fa42a7d6c3effb66a67d79b89
SHA25675b9e52ce7f6cc8df6842f40bc7a53eeb199d503d6a35d0e910d35c584a0eb82
SHA5121818382e2af758a62666ab9aa385471af791152e4e25fd41156fee7580f769247d4cb3c848bda4b3ba608468085519c4293cb8364ce94b505c7e5b445cce3a3b
-
Filesize
610B
MD5495ec454299de2a5251b3d19622514a5
SHA155ee51595f9ef9a81f2488f8b58a1ed8cc9bd1ac
SHA256a8b77c53fd8026992878d318ed99d1292b60aceee778a8c45d2fc655b07ccee0
SHA512e7790b3342fc40090d8007033af4b54e3049ad40cc87edfc88dc426a7498133b8a94c6b86b1bf8decc1e9729fa0b42ad56cfb04e8ad20bf02dccea412f43c0a2