Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
61s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
06/01/2023, 09:21
Static task
static1
Behavioral task
behavioral1
Sample
Chater_Rqst_rh_0.4.1 4.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Chater_Rqst_rh_0.4.1 4.exe
Resource
win10v2004-20221111-en
General
-
Target
Chater_Rqst_rh_0.4.1 4.exe
-
Size
1.7MB
-
MD5
fc0ef831ee6dcd34f1cc1e3b484b139b
-
SHA1
c864404fddc9e946a52cbc4c54c1b450e70d76b0
-
SHA256
2a99f25f4212f53d7479bfb140c572ca9f44394fbc4817743b1338cddf95a2d6
-
SHA512
6438c021d82def59fd9aa087e301c0ebafd9dfadc59ba4cc645c92634d19040426159357654f11614bcb649c8da51cc1f4f3e264d3be87472c4e3ef70308c0a7
-
SSDEEP
24576:eK5eCX7JpFCcuBLN/TrReV1sHXLgAE4SDExTwoOFzJg4J2Yq1/FcULgBi/E7V+AR:ejTfecT3OuYq12UqIg
Malware Config
Signatures
-
Enumerates VirtualBox registry keys 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF Chater_Rqst_rh_0.4.1 4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxVideo Chater_Rqst_rh_0.4.1 4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxGuest Chater_Rqst_rh_0.4.1 4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxMouse Chater_Rqst_rh_0.4.1 4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxService Chater_Rqst_rh_0.4.1 4.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Chater_Rqst_rh_0.4.1 4.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\FADT\VBOX__ Chater_Rqst_rh_0.4.1 4.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\RSDT\VBOX__ Chater_Rqst_rh_0.4.1 4.exe -
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Oracle\VirtualBox Guest Additions Chater_Rqst_rh_0.4.1 4.exe -
Looks for VMWare Tools registry key 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\VMware, Inc.\VMware Tools Chater_Rqst_rh_0.4.1 4.exe -
Checks BIOS information in registry 2 TTPs 3 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Chater_Rqst_rh_0.4.1 4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate Chater_Rqst_rh_0.4.1 4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Chater_Rqst_rh_0.4.1 4.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation Chater_Rqst_rh_0.4.1 4.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
pid Process 4856 Chater_Rqst_rh_0.4.1 4.exe 4856 Chater_Rqst_rh_0.4.1 4.exe 4856 Chater_Rqst_rh_0.4.1 4.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks SCSI registry key(s) 3 TTPs 5 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 Chater_Rqst_rh_0.4.1 4.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\HardwareID Chater_Rqst_rh_0.4.1 4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Chater_Rqst_rh_0.4.1 4.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Chater_Rqst_rh_0.4.1 4.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Chater_Rqst_rh_0.4.1 4.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings Chater_Rqst_rh_0.4.1 4.exe -
Suspicious behavior: EnumeratesProcesses 40 IoCs
pid Process 4856 Chater_Rqst_rh_0.4.1 4.exe 4856 Chater_Rqst_rh_0.4.1 4.exe 4856 Chater_Rqst_rh_0.4.1 4.exe 4856 Chater_Rqst_rh_0.4.1 4.exe 4856 Chater_Rqst_rh_0.4.1 4.exe 4856 Chater_Rqst_rh_0.4.1 4.exe 4856 Chater_Rqst_rh_0.4.1 4.exe 4856 Chater_Rqst_rh_0.4.1 4.exe 4856 Chater_Rqst_rh_0.4.1 4.exe 4856 Chater_Rqst_rh_0.4.1 4.exe 4856 Chater_Rqst_rh_0.4.1 4.exe 4856 Chater_Rqst_rh_0.4.1 4.exe 4856 Chater_Rqst_rh_0.4.1 4.exe 4856 Chater_Rqst_rh_0.4.1 4.exe 4856 Chater_Rqst_rh_0.4.1 4.exe 4856 Chater_Rqst_rh_0.4.1 4.exe 4856 Chater_Rqst_rh_0.4.1 4.exe 4856 Chater_Rqst_rh_0.4.1 4.exe 4856 Chater_Rqst_rh_0.4.1 4.exe 4856 Chater_Rqst_rh_0.4.1 4.exe 3168 AcroRd32.exe 3168 AcroRd32.exe 3168 AcroRd32.exe 3168 AcroRd32.exe 3168 AcroRd32.exe 3168 AcroRd32.exe 3168 AcroRd32.exe 3168 AcroRd32.exe 3168 AcroRd32.exe 3168 AcroRd32.exe 3168 AcroRd32.exe 3168 AcroRd32.exe 3168 AcroRd32.exe 3168 AcroRd32.exe 3168 AcroRd32.exe 3168 AcroRd32.exe 3168 AcroRd32.exe 3168 AcroRd32.exe 3168 AcroRd32.exe 3168 AcroRd32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 4856 Chater_Rqst_rh_0.4.1 4.exe Token: SeCreatePagefilePrivilege 4856 Chater_Rqst_rh_0.4.1 4.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3168 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3168 AcroRd32.exe 3168 AcroRd32.exe 3168 AcroRd32.exe 3168 AcroRd32.exe 3168 AcroRd32.exe 3168 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4856 wrote to memory of 3168 4856 Chater_Rqst_rh_0.4.1 4.exe 82 PID 4856 wrote to memory of 3168 4856 Chater_Rqst_rh_0.4.1 4.exe 82 PID 4856 wrote to memory of 3168 4856 Chater_Rqst_rh_0.4.1 4.exe 82 PID 3168 wrote to memory of 1684 3168 AcroRd32.exe 86 PID 3168 wrote to memory of 1684 3168 AcroRd32.exe 86 PID 3168 wrote to memory of 1684 3168 AcroRd32.exe 86 PID 1684 wrote to memory of 5104 1684 RdrCEF.exe 90 PID 1684 wrote to memory of 5104 1684 RdrCEF.exe 90 PID 1684 wrote to memory of 5104 1684 RdrCEF.exe 90 PID 1684 wrote to memory of 5104 1684 RdrCEF.exe 90 PID 1684 wrote to memory of 5104 1684 RdrCEF.exe 90 PID 1684 wrote to memory of 5104 1684 RdrCEF.exe 90 PID 1684 wrote to memory of 5104 1684 RdrCEF.exe 90 PID 1684 wrote to memory of 5104 1684 RdrCEF.exe 90 PID 1684 wrote to memory of 5104 1684 RdrCEF.exe 90 PID 1684 wrote to memory of 5104 1684 RdrCEF.exe 90 PID 1684 wrote to memory of 5104 1684 RdrCEF.exe 90 PID 1684 wrote to memory of 5104 1684 RdrCEF.exe 90 PID 1684 wrote to memory of 5104 1684 RdrCEF.exe 90 PID 1684 wrote to memory of 5104 1684 RdrCEF.exe 90 PID 1684 wrote to memory of 5104 1684 RdrCEF.exe 90 PID 1684 wrote to memory of 5104 1684 RdrCEF.exe 90 PID 1684 wrote to memory of 5104 1684 RdrCEF.exe 90 PID 1684 wrote to memory of 5104 1684 RdrCEF.exe 90 PID 1684 wrote to memory of 5104 1684 RdrCEF.exe 90 PID 1684 wrote to memory of 5104 1684 RdrCEF.exe 90 PID 1684 wrote to memory of 5104 1684 RdrCEF.exe 90 PID 1684 wrote to memory of 5104 1684 RdrCEF.exe 90 PID 1684 wrote to memory of 5104 1684 RdrCEF.exe 90 PID 1684 wrote to memory of 5104 1684 RdrCEF.exe 90 PID 1684 wrote to memory of 5104 1684 RdrCEF.exe 90 PID 1684 wrote to memory of 5104 1684 RdrCEF.exe 90 PID 1684 wrote to memory of 5104 1684 RdrCEF.exe 90 PID 1684 wrote to memory of 5104 1684 RdrCEF.exe 90 PID 1684 wrote to memory of 5104 1684 RdrCEF.exe 90 PID 1684 wrote to memory of 5104 1684 RdrCEF.exe 90 PID 1684 wrote to memory of 5104 1684 RdrCEF.exe 90 PID 1684 wrote to memory of 5104 1684 RdrCEF.exe 90 PID 1684 wrote to memory of 5104 1684 RdrCEF.exe 90 PID 1684 wrote to memory of 5104 1684 RdrCEF.exe 90 PID 1684 wrote to memory of 5104 1684 RdrCEF.exe 90 PID 1684 wrote to memory of 5104 1684 RdrCEF.exe 90 PID 1684 wrote to memory of 5104 1684 RdrCEF.exe 90 PID 1684 wrote to memory of 5104 1684 RdrCEF.exe 90 PID 1684 wrote to memory of 5104 1684 RdrCEF.exe 90 PID 1684 wrote to memory of 5104 1684 RdrCEF.exe 90 PID 1684 wrote to memory of 5104 1684 RdrCEF.exe 90 PID 1684 wrote to memory of 3612 1684 RdrCEF.exe 91 PID 1684 wrote to memory of 3612 1684 RdrCEF.exe 91 PID 1684 wrote to memory of 3612 1684 RdrCEF.exe 91 PID 1684 wrote to memory of 3612 1684 RdrCEF.exe 91 PID 1684 wrote to memory of 3612 1684 RdrCEF.exe 91 PID 1684 wrote to memory of 3612 1684 RdrCEF.exe 91 PID 1684 wrote to memory of 3612 1684 RdrCEF.exe 91 PID 1684 wrote to memory of 3612 1684 RdrCEF.exe 91 PID 1684 wrote to memory of 3612 1684 RdrCEF.exe 91 PID 1684 wrote to memory of 3612 1684 RdrCEF.exe 91 PID 1684 wrote to memory of 3612 1684 RdrCEF.exe 91 PID 1684 wrote to memory of 3612 1684 RdrCEF.exe 91 PID 1684 wrote to memory of 3612 1684 RdrCEF.exe 91 PID 1684 wrote to memory of 3612 1684 RdrCEF.exe 91 PID 1684 wrote to memory of 3612 1684 RdrCEF.exe 91 PID 1684 wrote to memory of 3612 1684 RdrCEF.exe 91 PID 1684 wrote to memory of 3612 1684 RdrCEF.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\Chater_Rqst_rh_0.4.1 4.exe"C:\Users\Admin\AppData\Local\Temp\Chater_Rqst_rh_0.4.1 4.exe"1⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Checks computer location settings
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks SCSI registry key(s)
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4856 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\6DB3.tmp.pdf"2⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3168 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140433⤵
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=3FCF157FF4D490AE43E6AF224AECC4C0 --mojo-platform-channel-handle=1744 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵PID:5104
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=6866E387F61767FD248196EEC5672689 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=1 --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=6866E387F61767FD248196EEC5672689 --renderer-client-id=2 --mojo-platform-channel-handle=1756 --allow-no-sandbox-job /prefetch:14⤵PID:3612
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=8FC9AD1484E10B1B30DCC79C5F6FF831 --mojo-platform-channel-handle=2172 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵PID:4068
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=9C4755CB955084BEC44EB9E926198AED --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=1 --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=9C4755CB955084BEC44EB9E926198AED --renderer-client-id=5 --mojo-platform-channel-handle=1736 --allow-no-sandbox-job /prefetch:14⤵PID:4416
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=5ABA5BCC2519C4BC46F012684CA06888 --mojo-platform-channel-handle=2560 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵PID:2812
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=AF1324E7D83B3B3247AB7C3C80D0BEFB --mojo-platform-channel-handle=2232 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵PID:2780
-
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3872
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
17KB
MD52089766457ca94fa37e9702e4aac01df
SHA1cb4a5f34497d8e2d8c619380f6142437b3e48e70
SHA256b70b7cced61190ae1e8b108f05b9c4e6f8aaa0d5b97b46e5b785c8dce13716df
SHA512d8e45db3c93962caa92fc757c100526daa1ca41a744e7cf15169b9a36639c8828d85ebb2ddaac5baa49afd456f950c41d4ba9df5e208c1a6c93080e724f3fc7e