Analysis
-
max time kernel
83s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
27-10-2022 17:41
Static task
static1
Behavioral task
behavioral1
Sample
Mutual.pdf
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
Mutual.pdf
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
Mutual_67.pdf.exe
Resource
win7-20220901-en
Behavioral task
behavioral4
Sample
Mutual_67.pdf.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
name.js
Resource
win7-20220812-en
General
-
Target
Mutual_67.pdf.exe
-
Size
316KB
-
MD5
982bf5b99b3ca20cfc0d93444ca1c40d
-
SHA1
77a6d8b1b01863ffd68bd0030b3b6122c4f6e1da
-
SHA256
7b83d9b8592def23e8ca5075c4d13e8c008bdb5f8a04763c57a5d56e14e3c1e1
-
SHA512
d1a0ffe634f4fff5427e5efd399146d7acb02ba582425e3b69ed5dd796e77caa29c37f50cfa544ad57e0f926f768336ee24a8132c1ea4ab5f3d27dd3c6edd508
-
SSDEEP
6144:4t5hBPi0BW69hd1MMdxPe9N9uA069TBBGFrnn:4tzww69TTI
Malware Config
Extracted
bumblebee
2510
69.46.15.158:443
135.125.241.35:443
172.86.120.141:443
Signatures
-
Enumerates VirtualBox registry keys 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxMouse 2510c_cr69.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxService 2510c_cr69.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF 2510c_cr69.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxVideo 2510c_cr69.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxGuest 2510c_cr69.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2510c_cr69.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\FADT\VBOX__ 2510c_cr69.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\RSDT\VBOX__ 2510c_cr69.exe -
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Oracle\VirtualBox Guest Additions 2510c_cr69.exe -
Executes dropped EXE 1 IoCs
pid Process 2832 2510c_cr69.exe -
Checks BIOS information in registry 2 TTPs 3 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2510c_cr69.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2510c_cr69.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate 2510c_cr69.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation Mutual_67.pdf.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Wine 2510c_cr69.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 2832 2510c_cr69.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings cmd.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2832 2510c_cr69.exe 2832 2510c_cr69.exe 2832 2510c_cr69.exe 2832 2510c_cr69.exe 2832 2510c_cr69.exe 2832 2510c_cr69.exe 2832 2510c_cr69.exe 2832 2510c_cr69.exe 2832 2510c_cr69.exe 2832 2510c_cr69.exe 2832 2510c_cr69.exe 2832 2510c_cr69.exe 2832 2510c_cr69.exe 2832 2510c_cr69.exe 2832 2510c_cr69.exe 2832 2510c_cr69.exe 2832 2510c_cr69.exe 2832 2510c_cr69.exe 2832 2510c_cr69.exe 2832 2510c_cr69.exe 2832 2510c_cr69.exe 2832 2510c_cr69.exe 2832 2510c_cr69.exe 2832 2510c_cr69.exe 2832 2510c_cr69.exe 2832 2510c_cr69.exe 2832 2510c_cr69.exe 2832 2510c_cr69.exe 2832 2510c_cr69.exe 2832 2510c_cr69.exe 2832 2510c_cr69.exe 2832 2510c_cr69.exe 2832 2510c_cr69.exe 2832 2510c_cr69.exe 2832 2510c_cr69.exe 2832 2510c_cr69.exe 2832 2510c_cr69.exe 2832 2510c_cr69.exe 2832 2510c_cr69.exe 2832 2510c_cr69.exe 2832 2510c_cr69.exe 2832 2510c_cr69.exe 2832 2510c_cr69.exe 2832 2510c_cr69.exe 2832 2510c_cr69.exe 2832 2510c_cr69.exe 2832 2510c_cr69.exe 2832 2510c_cr69.exe 2832 2510c_cr69.exe 2832 2510c_cr69.exe 2832 2510c_cr69.exe 2832 2510c_cr69.exe 2832 2510c_cr69.exe 2832 2510c_cr69.exe 2832 2510c_cr69.exe 2832 2510c_cr69.exe 2832 2510c_cr69.exe 2832 2510c_cr69.exe 2832 2510c_cr69.exe 2832 2510c_cr69.exe 2832 2510c_cr69.exe 2832 2510c_cr69.exe 2832 2510c_cr69.exe 2832 2510c_cr69.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2292 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2292 AcroRd32.exe 2292 AcroRd32.exe 2292 AcroRd32.exe 2292 AcroRd32.exe 2292 AcroRd32.exe 2292 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2364 wrote to memory of 4856 2364 Mutual_67.pdf.exe 82 PID 2364 wrote to memory of 4856 2364 Mutual_67.pdf.exe 82 PID 4856 wrote to memory of 4304 4856 cmd.exe 84 PID 4856 wrote to memory of 4304 4856 cmd.exe 84 PID 4856 wrote to memory of 2292 4856 cmd.exe 85 PID 4856 wrote to memory of 2292 4856 cmd.exe 85 PID 4856 wrote to memory of 2292 4856 cmd.exe 85 PID 4304 wrote to memory of 2360 4304 WScript.exe 87 PID 4304 wrote to memory of 2360 4304 WScript.exe 87 PID 2292 wrote to memory of 1520 2292 AcroRd32.exe 92 PID 2292 wrote to memory of 1520 2292 AcroRd32.exe 92 PID 2292 wrote to memory of 1520 2292 AcroRd32.exe 92 PID 4304 wrote to memory of 2832 4304 WScript.exe 93 PID 4304 wrote to memory of 2832 4304 WScript.exe 93 PID 2292 wrote to memory of 3824 2292 AcroRd32.exe 97 PID 2292 wrote to memory of 3824 2292 AcroRd32.exe 97 PID 2292 wrote to memory of 3824 2292 AcroRd32.exe 97 PID 1520 wrote to memory of 2268 1520 RdrCEF.exe 98 PID 1520 wrote to memory of 2268 1520 RdrCEF.exe 98 PID 1520 wrote to memory of 2268 1520 RdrCEF.exe 98 PID 1520 wrote to memory of 2268 1520 RdrCEF.exe 98 PID 1520 wrote to memory of 2268 1520 RdrCEF.exe 98 PID 1520 wrote to memory of 2268 1520 RdrCEF.exe 98 PID 1520 wrote to memory of 2268 1520 RdrCEF.exe 98 PID 1520 wrote to memory of 2268 1520 RdrCEF.exe 98 PID 1520 wrote to memory of 2268 1520 RdrCEF.exe 98 PID 1520 wrote to memory of 2268 1520 RdrCEF.exe 98 PID 1520 wrote to memory of 2268 1520 RdrCEF.exe 98 PID 1520 wrote to memory of 2268 1520 RdrCEF.exe 98 PID 1520 wrote to memory of 2268 1520 RdrCEF.exe 98 PID 1520 wrote to memory of 2268 1520 RdrCEF.exe 98 PID 1520 wrote to memory of 2268 1520 RdrCEF.exe 98 PID 1520 wrote to memory of 2268 1520 RdrCEF.exe 98 PID 1520 wrote to memory of 2268 1520 RdrCEF.exe 98 PID 1520 wrote to memory of 2268 1520 RdrCEF.exe 98 PID 1520 wrote to memory of 2268 1520 RdrCEF.exe 98 PID 1520 wrote to memory of 2268 1520 RdrCEF.exe 98 PID 1520 wrote to memory of 2268 1520 RdrCEF.exe 98 PID 1520 wrote to memory of 2268 1520 RdrCEF.exe 98 PID 1520 wrote to memory of 2268 1520 RdrCEF.exe 98 PID 1520 wrote to memory of 2268 1520 RdrCEF.exe 98 PID 1520 wrote to memory of 2268 1520 RdrCEF.exe 98 PID 1520 wrote to memory of 2268 1520 RdrCEF.exe 98 PID 1520 wrote to memory of 2268 1520 RdrCEF.exe 98 PID 1520 wrote to memory of 2268 1520 RdrCEF.exe 98 PID 1520 wrote to memory of 2268 1520 RdrCEF.exe 98 PID 1520 wrote to memory of 2268 1520 RdrCEF.exe 98 PID 1520 wrote to memory of 2268 1520 RdrCEF.exe 98 PID 1520 wrote to memory of 2268 1520 RdrCEF.exe 98 PID 1520 wrote to memory of 2268 1520 RdrCEF.exe 98 PID 1520 wrote to memory of 2268 1520 RdrCEF.exe 98 PID 1520 wrote to memory of 2268 1520 RdrCEF.exe 98 PID 1520 wrote to memory of 2268 1520 RdrCEF.exe 98 PID 1520 wrote to memory of 2268 1520 RdrCEF.exe 98 PID 1520 wrote to memory of 2268 1520 RdrCEF.exe 98 PID 1520 wrote to memory of 2268 1520 RdrCEF.exe 98 PID 1520 wrote to memory of 2268 1520 RdrCEF.exe 98 PID 1520 wrote to memory of 2268 1520 RdrCEF.exe 98 PID 1520 wrote to memory of 1172 1520 RdrCEF.exe 99 PID 1520 wrote to memory of 1172 1520 RdrCEF.exe 99 PID 1520 wrote to memory of 1172 1520 RdrCEF.exe 99 PID 1520 wrote to memory of 1172 1520 RdrCEF.exe 99 PID 1520 wrote to memory of 1172 1520 RdrCEF.exe 99 PID 1520 wrote to memory of 1172 1520 RdrCEF.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\Mutual_67.pdf.exe"C:\Users\Admin\AppData\Local\Temp\Mutual_67.pdf.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\D594.tmp\D595.tmp\D596.bat C:\Users\Admin\AppData\Local\Temp\Mutual_67.pdf.exe"2⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4856 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\name.js"3⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4304 -
C:\Windows\System32\cmdkey.exe"C:\Windows\System32\cmdkey.exe" /generic:Microsoft_Windows_Shell_ZipFolder:filename=C:\Users\Admin\AppData\Local\Temp\2510c_cr69.zip /pass:kLjBEyO /user:""4⤵PID:2360
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_2510c_cr69.zip\2510c_cr69.exe"C:\Users\Admin\AppData\Local\Temp\Temp1_2510c_cr69.zip\2510c_cr69.exe"4⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Looks for VirtualBox Guest Additions in registry
- Executes dropped EXE
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2832
-
-
C:\Windows\System32\cmdkey.exe"C:\Windows\System32\cmdkey.exe" /delete Microsoft_Windows_Shell_ZipFolder:filename=C:\Users\Admin\AppData\Local\Temp\2510c_cr69.zip4⤵PID:404
-
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Mutual.pdf"3⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140434⤵
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=77FE4CB1F88A86FF7F71100EF45EE74B --mojo-platform-channel-handle=1736 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:25⤵PID:2268
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=B9A143235A855F677C8CB3935DCCA847 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=1 --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=B9A143235A855F677C8CB3935DCCA847 --renderer-client-id=2 --mojo-platform-channel-handle=1764 --allow-no-sandbox-job /prefetch:15⤵PID:1172
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=D7F5AD617FA2DB2098F47961327C809E --mojo-platform-channel-handle=2292 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:25⤵PID:1472
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=25F00C129798644044C2B5D936B62987 --mojo-platform-channel-handle=2000 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:25⤵PID:2700
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=A36BEFBFB64330ADBDEB6FD0E5E4CBE5 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=1 --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=A36BEFBFB64330ADBDEB6FD0E5E4CBE5 --renderer-client-id=6 --mojo-platform-channel-handle=2404 --allow-no-sandbox-job /prefetch:15⤵PID:1160
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=0144E457E9DCF7BAD230539DECAC4E58 --mojo-platform-channel-handle=2580 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:25⤵PID:3168
-
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140434⤵PID:3824
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD538c904eb3b649ccd3cbf61d57b76c046
SHA11a699545e71e81c4c04ca1894bc3be9cc8f024b1
SHA2564e58072d8f22782ef8e4e5a97ac7178cc7cd9a69b925ffe71537e79097263924
SHA512a3613cd67349f05a1c4441202b100beac89ac0462f05586bed65bc28041488b03891dd86f7e80eb24ae2834a1b6929368db6d5f13a0d58904c3157e9a6363c86
-
Filesize
2.7MB
MD5bf5889c772dd1377789fb54da0c6d08c
SHA1ffb4b43e63cdc19f6bd7904a8bccd16038780b23
SHA256aea6933430252325e7bec04d778064ff973a4db0d7dd237622efca5ad1f7db20
SHA512e34e4019694390c69084b05cea1707f730808a09521284ac7fe082e48eff9a0401fdb884f770dee3053a24247baca4a2c409f4be2d80da06dec9269d68053caa
-
Filesize
2.7MB
MD5bf5889c772dd1377789fb54da0c6d08c
SHA1ffb4b43e63cdc19f6bd7904a8bccd16038780b23
SHA256aea6933430252325e7bec04d778064ff973a4db0d7dd237622efca5ad1f7db20
SHA512e34e4019694390c69084b05cea1707f730808a09521284ac7fe082e48eff9a0401fdb884f770dee3053a24247baca4a2c409f4be2d80da06dec9269d68053caa