Analysis
-
max time kernel
242s -
max time network
251s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-es -
resource tags
arch:x64arch:x86image:win10v2004-20220812-eslocale:es-esos:windows10-2004-x64systemwindows -
submitted
04-02-2023 23:16
Static task
static1
Behavioral task
behavioral1
Sample
Adobe Reader W10.exe
Resource
win10v2004-20220812-es
General
-
Target
Adobe Reader W10.exe
-
Size
170.7MB
-
MD5
335e91e2cb652048ba440411b9f8f2c6
-
SHA1
600262a0d18d9ab6142ab7c669057fbcc4da0bd9
-
SHA256
086597278e12f85f681434711e5c61d4ab0ae8637eb02da51980c381428144f5
-
SHA512
627892316329ec3fa2051579992d99ace6c90253f45468d9512528107875444b9e7f55bbb67059e5028aac47585c2edb9425fe3d7c9a6ad663a5cb3a471e2e71
-
SSDEEP
3145728:zzq68nRPiL6n6hokae38T37ewj/FR5HGhd34WR3W8fEbc2fjX5HGOfpWaJRlpxNq:zG6wRiWYokaeMT37Z9nHGf34WV3fEYo3
Malware Config
Signatures
-
Blocklisted process makes network request 4 IoCs
Processes:
msiexec.exeflow pid process 57 216 msiexec.exe 61 216 msiexec.exe 63 216 msiexec.exe 78 216 msiexec.exe -
Modifies Installed Components in the registry 2 TTPs 1 IoCs
Processes:
MsiExec.exedescription ioc process Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432NODE\MICROSOFT\ACTIVE SETUP\INSTALLED COMPONENTS\{A6EADE66-0000-0000-484E-7E8A45000000} MsiExec.exe -
Sets file execution options in registry 2 TTPs 16 IoCs
Processes:
MsiExec.exemsiexec.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AcroRd32.exe MsiExec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AcroRd32.exe\MitigationOptions = "256" MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AcroRd32.exe msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RdrServicesUpdater.exe\DisableExceptionChainValidation = "0" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RdrCEF.exe MsiExec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RdrCEF.exe\MitigationOptions = "256" MsiExec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RdrServicesUpdater.exe\MitigationOptions = "256" MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AcroRd32Info.exe msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AcroRd32Info.exe\MitigationOptions = "256" MsiExec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RdrCEF.exe\DisableExceptionChainValidation = "0" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AcroRd32Info.exe MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RdrServicesUpdater.exe MsiExec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AcroRd32Info.exe\DisableExceptionChainValidation = "0" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RdrCEF.exe msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AcroRd32.exe\DisableExceptionChainValidation = "0" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RdrServicesUpdater.exe msiexec.exe -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
AdobeARM.exeRdrCEF.exeRdrCEF.exeAcroRd32.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation AdobeARM.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation RdrCEF.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation RdrCEF.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation AcroRd32.exe -
Executes dropped EXE 14 IoCs
Processes:
setup.exeMSI12EF.tmpFullTrustNotifier.exeRdrServicesUpdater.exearmsvc.exeAcroRd32.exeRdrCEF.exeRdrCEF.exeRdrCEF.exeRdrCEF.exeRdrCEF.exeRdrCEF.exeAdobeARM.exeReader_sl.exepid process 408 setup.exe 4664 MSI12EF.tmp 3472 FullTrustNotifier.exe 1968 RdrServicesUpdater.exe 3600 armsvc.exe 4288 AcroRd32.exe 2060 RdrCEF.exe 2076 RdrCEF.exe 660 RdrCEF.exe 5008 RdrCEF.exe 520 RdrCEF.exe 760 RdrCEF.exe 4192 AdobeARM.exe 4872 Reader_sl.exe -
Loads dropped DLL 64 IoCs
Processes:
MsiExec.exeMsiExec.exeMsiExec.exepid process 868 MsiExec.exe 868 MsiExec.exe 868 MsiExec.exe 868 MsiExec.exe 868 MsiExec.exe 868 MsiExec.exe 868 MsiExec.exe 4452 MsiExec.exe 4452 MsiExec.exe 4452 MsiExec.exe 4452 MsiExec.exe 4452 MsiExec.exe 4452 MsiExec.exe 4452 MsiExec.exe 4452 MsiExec.exe 4452 MsiExec.exe 4452 MsiExec.exe 4452 MsiExec.exe 4452 MsiExec.exe 4452 MsiExec.exe 4452 MsiExec.exe 4452 MsiExec.exe 4452 MsiExec.exe 4452 MsiExec.exe 4452 MsiExec.exe 4452 MsiExec.exe 752 MsiExec.exe 752 MsiExec.exe 752 MsiExec.exe 752 MsiExec.exe 752 MsiExec.exe 752 MsiExec.exe 752 MsiExec.exe 752 MsiExec.exe 752 MsiExec.exe 752 MsiExec.exe 752 MsiExec.exe 752 MsiExec.exe 752 MsiExec.exe 752 MsiExec.exe 752 MsiExec.exe 752 MsiExec.exe 752 MsiExec.exe 752 MsiExec.exe 752 MsiExec.exe 752 MsiExec.exe 752 MsiExec.exe 752 MsiExec.exe 4452 MsiExec.exe 4452 MsiExec.exe 4452 MsiExec.exe 4452 MsiExec.exe 4452 MsiExec.exe 4452 MsiExec.exe 4452 MsiExec.exe 4452 MsiExec.exe 4452 MsiExec.exe 4452 MsiExec.exe 4452 MsiExec.exe 4452 MsiExec.exe 4452 MsiExec.exe 752 MsiExec.exe 752 MsiExec.exe 752 MsiExec.exe -
Registers COM server for autorun 1 TTPs 8 IoCs
Processes:
MsiExec.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{F0B4F6AD-5E09-4CB1-B763-EC390CBDE51D}\InprocServer32\ThreadingModel = "Apartment" MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{F0B4F6AD-5E09-4CB1-B763-EC390CBDE51D}\InprocServer32\ = "C:\\Program Files (x86)\\Common Files\\Adobe\\Acrobat\\ActiveX\\AcroPDFImpl64.dll" MsiExec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CA8A9780-280D-11CF-A24D-444553540000}\InprocServer32 MsiExec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{F0B4F6AD-5E09-4CB1-B763-EC390CBDE51D}\InprocServer32 MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CA8A9780-280D-11CF-A24D-444553540000}\InprocServer32 MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CA8A9780-280D-11CF-A24D-444553540000}\InprocServer32\ = "C:\\Program Files (x86)\\Common Files\\Adobe\\Acrobat\\ActiveX\\AcroPDF64.dll" MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CA8A9780-280D-11CF-A24D-444553540000}\InprocServer32\ThreadingModel = "Apartment" MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{F0B4F6AD-5E09-4CB1-B763-EC390CBDE51D}\InprocServer32 MsiExec.exe -
Processes:
AcroRd32.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA AcroRd32.exe -
Drops desktop.ini file(s) 1 IoCs
Processes:
msiexec.exedescription ioc process File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\desktop.ini msiexec.exe -
Enumerates connected drives 3 TTPs 48 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
msiexec.exemsiexec.exedescription ioc process File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\W: msiexec.exe -
Drops file in System32 directory 11 IoCs
Processes:
msiexec.exemsiexec.exeMsiExec.exedescription ioc process File opened for modification C:\Windows\SysWOW64\vccorlib110.dll msiexec.exe File opened for modification C:\Windows\SysWOW64\msvcr110.dll msiexec.exe File opened for modification C:\Windows\SysWOW64\msvcr100.dll msiexec.exe File opened for modification C:\Windows\SysWOW64\msvcp110.dll msiexec.exe File opened for modification C:\Windows\SysWOW64\vccorlib110.dll msiexec.exe File created C:\Windows\SysWOW64\Elevation.tmp MsiExec.exe File opened for modification C:\Windows\SysWOW64\msvcp100.dll msiexec.exe File opened for modification C:\Windows\SysWOW64\msvcr110.dll msiexec.exe File opened for modification C:\Windows\SysWOW64\msvcp110.dll msiexec.exe File opened for modification C:\Windows\SysWOW64\msvcr100.dll msiexec.exe File opened for modification C:\Windows\SysWOW64\msvcp100.dll msiexec.exe -
Drops file in Program Files directory 64 IoCs
Processes:
MsiExec.exeRdrServicesUpdater.exemsiexec.exemsiexec.exedescription ioc process File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\walk-through\images\themes\dark\close.svg MsiExec.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\pt-br\ui-strings.js RdrServicesUpdater.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\img\tools\dot_2x.png RdrServicesUpdater.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\images\themeless\edit_pdf_gif_Exp.gif RdrServicesUpdater.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\ui-strings.js RdrServicesUpdater.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\sk-sk\ui-strings.js RdrServicesUpdater.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\ESP\Edit_R_RHP.aapp msiexec.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\A12_Spinner.gif MsiExec.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\file_types\sendforsignature.svg RdrServicesUpdater.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\en-gb\ui-strings.js RdrServicesUpdater.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\img\tools\circle_2x.png RdrServicesUpdater.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\uk-ua\ui-strings.js RdrServicesUpdater.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\Unicode\Mappings\Mac\UKRAINE.TXT msiexec.exe File created C:\Program Files (x86)\Common Files\Adobe\Acrobat\ActiveX\AcroPDF64.dll msiexec.exe File created C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe msiexec.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\Font\ msiexec.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\createpdf.svg MsiExec.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\sl-si\ui-strings.js MsiExec.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\images\themes\dark\s_thumbnailview_18.svg MsiExec.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\hr-hr\ui-strings.js RdrServicesUpdater.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\WCChromeExtn\WCChromeNativeMessagingHost.exe msiexec.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\file_types\duplicate.svg MsiExec.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\ru-ru\ui-strings.js MsiExec.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\sl-si\ui-strings.js MsiExec.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\img\sample-thumb.png MsiExec.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\sl-si\ui-strings.js MsiExec.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\fi-fi\ui-strings.js RdrServicesUpdater.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\images\themeless\media_poster.jpg RdrServicesUpdater.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\images\themeless\Playstore\da_get.svg MsiExec.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\images\s_share_attach_18@2x.png RdrServicesUpdater.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\cs-cz\ui-strings.js RdrServicesUpdater.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\fi-fi\ui-strings.js RdrServicesUpdater.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\RHP_icons.png MsiExec.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\win8-scrollbar\arrow-down-pressed.gif MsiExec.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files-select\js\selector.js RdrServicesUpdater.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\Download_on_the_App_Store_Badge_it_135x40.svg RdrServicesUpdater.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Reader\DC\Linguistics\Providers\Plugins2\AdobeHunspellPlugin\SupplementalDictionaries\en_CA\added.txt msiexec.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\img\themes\dark\sample-thumb.png MsiExec.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\images\themes\dark\rhp_world_icon_hover.png RdrServicesUpdater.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\images\s_filter_18.svg RdrServicesUpdater.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\Updater.api msiexec.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\images\cstm_brand_preview.png MsiExec.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\home\images\new_icons.png RdrServicesUpdater.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\images\themeless\Playstore\ar_get.svg RdrServicesUpdater.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\es-es\ui-strings.js RdrServicesUpdater.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\walk-through\js\nls\root\ui-strings.js RdrServicesUpdater.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\apple-touch-icon-144x144-precomposed.png MsiExec.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\root\ui-strings.js MsiExec.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\selection-actions.png RdrServicesUpdater.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\ja-jp\ui-strings.js RdrServicesUpdater.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\images\example_icons2x.png RdrServicesUpdater.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\images\themes\dark\illustrations_retina.png MsiExec.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\s_filter-hover_32.svg RdrServicesUpdater.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\selection-actions.png RdrServicesUpdater.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\css\desktop-tool-view.css RdrServicesUpdater.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\images\themes\dark\download-btn.png MsiExec.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\delete.svg RdrServicesUpdater.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\img\themes\dark\core_icons_retina.png RdrServicesUpdater.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\fullscreen-hover.svg RdrServicesUpdater.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\images\s_close_h.png RdrServicesUpdater.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\js\nls\nl-nl\ui-strings.js MsiExec.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\s_link_18.svg RdrServicesUpdater.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\s_listview-hover.svg RdrServicesUpdater.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\nl-nl\ui-strings.js RdrServicesUpdater.exe -
Drops file in Windows directory 64 IoCs
Processes:
msiexec.exedescription ioc process File created C:\Windows\Installer\$PatchCache$\Managed\68AB67CA7DA74301B744CAF070E41400\15.7.20033\acrocef.exe.15EE1C08_ED51_465D_B6F3_FB152B1CC435 msiexec.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\68AB67CA7DA74301B744CAF070E41400\15.7.20033\acropdf64.dll msiexec.exe File created C:\Windows\Installer\e584e6d.HDR msiexec.exe File opened for modification C:\Windows\Installer\e584e72.HDR msiexec.exe File created C:\Windows\Installer\e584f4e.HDR msiexec.exe File opened for modification C:\Windows\Installer\e584f04.HDR msiexec.exe File created C:\Windows\Installer\e584f13.HDR msiexec.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\68AB67CA7DA74301B744CAF070E41400\15.7.20033\ahclient.dll msiexec.exe File created C:\Windows\Installer\$PatchCache$\Managed\68AB67CA7DA74301B744CAF070E41400\15.7.20033\EScript.ESP msiexec.exe File opened for modification C:\Windows\Installer\MSI12EF.tmp msiexec.exe File opened for modification C:\Windows\Installer\e584ed5.HDR msiexec.exe File opened for modification C:\Windows\Installer\e584ef8.HDR msiexec.exe File opened for modification C:\Windows\Installer\e584f3e.HDR msiexec.exe File opened for modification C:\Windows\Installer\MSI37A3.tmp msiexec.exe File opened for modification C:\Windows\Installer\e584eaf.HDR msiexec.exe File opened for modification C:\Windows\Installer\e584ec8.HDR msiexec.exe File opened for modification C:\Windows\Installer\e584f53.HDR msiexec.exe File created C:\Windows\Installer\$PatchCache$\Managed\68AB67CA7DA74301B744CAF070E41400\15.7.20033\prcr.x3d msiexec.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\68AB67CA7DA73301B744CAF070E41400\15.7.20033\ViewerPS.dll msiexec.exe File opened for modification C:\Windows\Installer\MSI58CE.tmp msiexec.exe File opened for modification C:\Windows\Installer\e584eb5.HDR msiexec.exe File opened for modification C:\Windows\Installer\e584eee.HDR msiexec.exe File created C:\Windows\Installer\e584f58.HDR msiexec.exe File created C:\Windows\Installer\$PatchCache$\Managed\68AB67CA7DA74301B744CAF070E41400\15.7.20033\drvSOFT.x3d msiexec.exe File opened for modification C:\Windows\Installer\e584e88.HDR msiexec.exe File created C:\Windows\Installer\e584e8f.HDR msiexec.exe File created C:\Windows\Installer\e584ea5.HDR msiexec.exe File created C:\Windows\Installer\$PatchCache$\Managed\68AB67CA7DA74301B744CAF070E41400\15.7.20033\AcroRd32.exe msiexec.exe File created C:\Windows\Installer\$PatchCache$\Managed\68AB67CA7DA74301B744CAF070E41400\15.7.20033\libcef.dll.15EE1C08_ED51_465D_B6F3_FB152B1CC435 msiexec.exe File opened for modification C:\Windows\Installer\MSI7A7.tmp msiexec.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\68AB67CA7DA73301B744CAF070E41400\15.7.20033\icucnv40.dll msiexec.exe File opened for modification C:\Windows\Installer\e584e5c.HDR msiexec.exe File created C:\Windows\Installer\e584e73.HDR msiexec.exe File created C:\Windows\Installer\$PatchCache$\Managed\68AB67CA7DA74301B744CAF070E41400\15.7.20033\Edit_R_RHP.aapp msiexec.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\68AB67CA7DA74301B744CAF070E41400\15.7.20033\acrotextextractor.exe msiexec.exe File opened for modification C:\Windows\Installer\MSI58AD.tmp msiexec.exe File created C:\Windows\Installer\e584eb2.HDR msiexec.exe File opened for modification C:\Windows\Installer\e584f41.HDR msiexec.exe File created C:\Windows\Installer\e584f46.HDR msiexec.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\68AB67CA7DA74301B744CAF070E41400\15.7.20033\brdlang32.esp msiexec.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\68AB67CA7DA73301B744CAF070E41400\15.7.20033\CP1254.TXT msiexec.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\68AB67CA7DA73301B744CAF070E41400\15.7.20033\F_CENTRAL_msvcr120_x86.194841A2_D0F2_3B96_9F71_05BA91BEA0FA msiexec.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\68AB67CA7DA74301B744CAF070E41400\15.7.20033\CollectSignatures.aapp7 msiexec.exe File opened for modification C:\Windows\Installer\MSI373F.tmp msiexec.exe File created C:\Windows\Installer\e584ec4.HDR msiexec.exe File opened for modification C:\Windows\Installer\e584ed6.HDR msiexec.exe File created C:\Windows\Installer\e584f42.HDR msiexec.exe File created C:\Windows\Installer\e584f16.HDR msiexec.exe File created C:\Windows\Installer\$PatchCache$\Managed\68AB67CA7DA74301B744CAF070E41400\15.7.20033\displaylanguagenames.es_pa.t msiexec.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\68AB67CA7DA73301B744CAF070E41400\15.7.20033\DataMatrix.pmp msiexec.exe File created C:\Windows\Installer\e584ee7.HDR msiexec.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\68AB67CA7DA74301B744CAF070E41400\15.7.20033\displaylanguagenames.es_sv.t msiexec.exe File created C:\Windows\Installer\$PatchCache$\Managed\68AB67CA7DA74301B744CAF070E41400\15.7.20033\AGM.dll msiexec.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\68AB67CA7DA74301B744CAF070E41400\15.7.20033\Edit_R_RHP.aapp msiexec.exe File opened for modification C:\Windows\Installer\MSI12DE.tmp msiexec.exe File opened for modification C:\Windows\Installer\e584e6d.HDR msiexec.exe File opened for modification C:\Windows\Installer\e584eb2.HDR msiexec.exe File created C:\Windows\Installer\e584f4f.HDR msiexec.exe File created C:\Windows\Installer\e584ef5.HDR msiexec.exe File created C:\Windows\Installer\e584f24.HDR msiexec.exe File opened for modification C:\Windows\Installer\e584f52.HDR msiexec.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\68AB67CA7DA74301B744CAF070E41400\15.7.20033\MCIMPP.mpp msiexec.exe File created C:\Windows\Installer\$PatchCache$\Managed\68AB67CA7DA74301B744CAF070E41400\15.7.20033\EPDF_Full.aapp msiexec.exe File created C:\Windows\Installer\e584e76.HDR msiexec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks SCSI registry key(s) 3 TTPs 5 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
vssvc.exedescription ioc process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr\PartitionTableCache = 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 vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr\SnapshotDataCache = 534e41505041525401000000700000008ec7416a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 vssvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters vssvc.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters vssvc.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
AcroRd32.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
Processes:
msiexec.exeAcroRd32.exeMsiExec.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{7AC06A6F-4C88-4707-8DEC-61017CB50E1E} msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{15B3FB63-66F4-4EFC-B717-BB283B85E79B}\AppPath = "C:\\Program Files (x86)\\Adobe\\Acrobat Reader DC\\Reader\\" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{9C6A861C-B233-4994-AFB1-C158EE4FC578} msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{9C6A861C-B233-4994-AFB1-C158EE4FC578}\AppPath = "C:\\Program Files (x86)\\Adobe\\Acrobat Reader DC\\Reader" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{B7278BD0-7970-47D6-8954-99B2343EED88}\AppPath = "C:\\Program Files (x86)\\Adobe\\Acrobat Reader DC\\Reader\\AcroCEF" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{B7278BD0-7970-47D6-8954-99B2343EED88}\Policy = "3" msiexec.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{76E2369A-75BA-41F9-8B9E-16059E5CF9A6}\AppPath = "C:\\Program Files (x86)\\Common Files\\Adobe\\ARM\\1.0\\" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{B7278BD0-7970-47D6-8954-99B2343EED88} msiexec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{B723F941-52A2-4392-B500-60F3889659B4} MsiExec.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\AcroRd32.exe = "11000" AcroRd32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{15B3FB63-66F4-4EFC-B717-BB283B85E79B}\Policy = "3" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{7AC06A6F-4C88-4707-8DEC-61017CB50E1E}\Policy = "3" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{9C6A861C-B233-4994-AFB1-C158EE4FC578}\AppName = "AcroRd32.exe" msiexec.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\Low Rights MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{B723F941-52A2-4392-B500-60F3889659B4}\AppPath = "C:\\Program Files (x86)\\Adobe\\Acrobat Reader DC\\Reader" MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{7AC06A6F-4C88-4707-8DEC-61017CB50E1E}\AppPath = "C:\\Program Files (x86)\\Adobe\\Acrobat Reader DC\\Reader" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{9C6A861C-B233-4994-AFB1-C158EE4FC578}\Policy = "3" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{8E1F80F4-953F-41E7-8460-E64AE5BE4ED3}\Policy = "3" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{7AC06A6F-4C88-4707-8DEC-61017CB50E1E}\AppName = "AcroRd32.exe" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{8E1F80F4-953F-41E7-8460-E64AE5BE4ED3}\AppName = "AdobeCollabSync.exe" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{B723F941-52A2-4392-B500-60F3889659B4}\Policy = "3" MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{76E2369A-75BA-41F9-8B9E-16059E5CF9A6} msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{15B3FB63-66F4-4EFC-B717-BB283B85E79B}\AppName = "AcroBroker.exe" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{BD57A9B2-4E7D-4892-9107-9F4106472DA4} msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{8E1F80F4-953F-41E7-8460-E64AE5BE4ED3} msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{8E1F80F4-953F-41E7-8460-E64AE5BE4ED3}\AppPath = "C:\\Program Files (x86)\\Adobe\\Acrobat Reader DC\\Reader" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{B7278BD0-7970-47D6-8954-99B2343EED88}\AppName = "RdrCEF.exe" msiexec.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{B723F941-52A2-4392-B500-60F3889659B4} MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{B723F941-52A2-4392-B500-60F3889659B4}\AppName = "AcroRd32.exe" MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{76E2369A-75BA-41F9-8B9E-16059E5CF9A6}\AppName = "AdobeARM.exe" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{15B3FB63-66F4-4EFC-B717-BB283B85E79B} msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{76E2369A-75BA-41F9-8B9E-16059E5CF9A6}\Policy = "3" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\ msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{BD57A9B2-4E7D-4892-9107-9F4106472DA4}\Compatibility Flags = "1024" msiexec.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\Low Rights\ElevationPolicy MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility msiexec.exe -
Modifies data under HKEY_USERS 7 IoCs
Processes:
msiexec.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1f msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\1F msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\20 msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\20 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\21 msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\1E\52C64B7E msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e msiexec.exe -
Modifies registry class 64 IoCs
Processes:
msiexec.exeMsiExec.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.acrobatsecuritysettings\OpenWithProgids\ msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AcroExch.XDPDoc\shell\Printto\command\ = "\"C:\\Program Files (x86)\\Adobe\\Acrobat Reader DC\\Reader\\AcroRd32.exe\" /t \"%1\" \"%2\" \"%3\" \"%4\"" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\68AB67CA7DA74301B744CAF070E41400\Language = "1034" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AFormAut.App\ = "AFormApp Class" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\Adobe.AcrobatSearch msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B801CA65-A1FC-11D0-85AD-444553540000}\DataFormats\GetSet\4\ = "NotesDocInfo, 1, 1, 2" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\Interface\{9B4CD3EE-4981-101B-9CA8-9240CE2738AE}\ProxyStubClsid msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{00FFD6C4-1A94-44BC-AD3E-8AC18552E3E6}\{B4848E37-7C66-40A6-9F66-D3A9BC8F4636}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{7CD069A0-50AA-11D1-B8F0-00A0C9259304}\ProxyStubClsid\ = "{00020424-0000-0000-C000-000000000046}" msiexec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CA8A9780-280D-11CF-A24D-444553540000} MsiExec.exe Key created \REGISTRY\MACHINE\Software\Classes\AcroExch.FDFDoc\shell\Open\command msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B801CA65-A1FC-11D0-85AD-444553540000}\DataFormats\GetSet\8\ = "Rich Text Format, 1, 1, 1" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\CLSID\{CA8A9780-280D-11CF-A24D-444553540000}\Version msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\CLSID\{B801CA65-A1FC-11D0-85AD-444553540000}\DataFormats\GetSet\7 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5AAABB05-F91B-4bce-AB18-D8319DEDABA8}\VersionIndependentProgID\ = "Adobe.Reader.BitmapFactory" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\68AB67CA7DA74301B744CAF070E41400\Plugins = "ReaderProgramFiles" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\application/vnd.fdf msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\AcroExch.XFDFDoc\shell\Print msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\acrobat\shell\open\ddeexec\topic\ = "Control" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\PDFPrevHndlr.PDFPreviewHandler\ = "Adobe PDF Preview Handler for Vista" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{9B4CD3EA-4981-101B-9CA8-9240CE2738AE}\ = "CAcroPDPage" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{05BFD3F1-6319-4F30-B752-C7A22889BCC4}\1.0\ = "Adobe Acrobat 7.0 Browser Control Type Library 1.0" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AcroExch.acrobatsecuritysettings\CurVer\ = "AcroExch.acrobatsecuritysettings.1" msiexec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CA8A9780-280D-11CF-A24D-444553540000}\ToolboxBitmap32 MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\application/vnd.adobe.xdp+xml\Extension = ".xdp" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AcroExch.Document.DC\protocol\ msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{566A7BC7-B295-41B7-A818-12F9E5CA46CA}\ProxyStubClsid32\ = "{671B6145-4169-4ADD-9AF3-E6990EB2B325}" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{24DA047B-40C0-4018-841B-6B7409F730FC}\ = "Adobe Acrobat Sharepoint OpenDocuments Component" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Applications\AcroRD32.exe\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Acrobat Reader DC\\Reader\\AcroRd32.exe\" \"%1\"" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{DC6EFB56-9CFA-464D-8880-44885D7DC193} msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.fdf\OpenWithProgids MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{9B4CD3F0-4981-101B-9CA8-9240CE2738AE}\TypeLib\Version = "1.1" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\Interface\{9B4CD3F1-4981-101B-9CA8-9240CE2738AE} msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AcroExch.pdfxml\CLSID\ = "{B801CA65-A1FC-11D0-85AD-444553540000}" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\acrobat2018\DefaultIcon\ = "C:\\Program Files (x86)\\Adobe\\Acrobat Reader DC\\Reader\\AcroRd32.exe" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\application/vnd.adobe.xfdf\CLSID = "{CA8A9780-280D-11CF-A24D-444553540000}" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AcroBroker.Broker\CLSID\ = "{BD57A9B2-4E7D-4892-9107-9F4106472DA4}" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\CLSID\{F0B4F6AD-5E09-4CB1-B763-EC390CBDE51D}\Control msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\acrobat2018\shell\open\ddeexec\topic msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\Interface\{9B4CD3EC-4981-101B-9CA8-9240CE2738AE}\ProxyStubClsid32 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B801CA65-A1FC-11D0-85AD-444553540000}\DataFormats\GetSet\1\ = "14,1,64,1" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{41C5FFFE-36DD-415D-9ED0-2976A342A1C8}\1.0\FLAGS\ = "0" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AcroExch.pdfxml.1\shell\ = "Read" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.pdx\OpenWithProgids\ msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\AcroExch.FDFDoc\CLSID msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{8D46C1B6-BBAB-450D-A61F-4DDC898B21D4}\ProxyStubClsid32\ = "{12BA069D-0FC6-4577-97C6-5DF634CE6E84}" msiexec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{F0B4F6AD-5E09-4CB1-B763-EC390CBDE51D}\MiscStatus MsiExec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\.api msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\Interface\{17F2E344-8227-4AA7-A25A-E89424566BBA} msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\Interface\{0C52A2CC-66F1-4B2B-A9E4-9723791F0BBD}\NumMethods msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{D3F22039-E3CF-4FC4-9A30-426A46056B8C}\TypeLib\Version = "1.0" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{7EA23D88-569E-4EFD-9851-A1528A7745F9}\TypeLib\ = "{05BFD3F1-6319-4F30-B752-C7A22889BCC4}" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CA8A9780-280D-11CF-A24D-444553540000}\EnableFullPage\.xfd MsiExec.exe Key created \REGISTRY\MACHINE\Software\Classes\MIME\Database\Content Type\application/pdf msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{9B4CD3EB-4981-101B-9CA8-9240CE2738AE}\ = "CAcroPDAnnot" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\Interface\{3B813CE7-7C10-4F84-AD06-9DF76D97A9AA}\TypeLib msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{8D46C1B6-BBAB-450D-A61F-4DDC898B21D4}\NumMethods\ = "7" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\acrobat\DefaultIcon\ = "C:\\Program Files (x86)\\Adobe\\Acrobat Reader DC\\Reader\\AcroRd32.exe" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AcroExch.pdfxml.1\shell\Read\ = "Abrir con Adobe Acrobat Reader DC" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\AppID\{F2383816-917A-46CC-AD2A-5013BED3800F} msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CA8A9780-280D-11CF-A24D-444553540000}\ProgID MsiExec.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\Interface\{4A894040-247E-4AFF-BB08-3489E9905235} msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\AcroExch.FDFDoc\AcrobatVersion msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{F9F2FE81-F764-4BD0-AFA5-5DE841DDB625}\TypeLib\Version = "3.0" msiexec.exe -
Suspicious behavior: EnumeratesProcesses 32 IoCs
Processes:
MsiExec.exeMsiExec.exeMsiExec.exeAcroRd32.exepid process 868 MsiExec.exe 868 MsiExec.exe 4452 MsiExec.exe 4452 MsiExec.exe 752 MsiExec.exe 752 MsiExec.exe 752 MsiExec.exe 752 MsiExec.exe 752 MsiExec.exe 752 MsiExec.exe 752 MsiExec.exe 752 MsiExec.exe 4288 AcroRd32.exe 4288 AcroRd32.exe 4288 AcroRd32.exe 4288 AcroRd32.exe 4288 AcroRd32.exe 4288 AcroRd32.exe 4288 AcroRd32.exe 4288 AcroRd32.exe 4288 AcroRd32.exe 4288 AcroRd32.exe 4288 AcroRd32.exe 4288 AcroRd32.exe 4288 AcroRd32.exe 4288 AcroRd32.exe 4288 AcroRd32.exe 4288 AcroRd32.exe 4288 AcroRd32.exe 4288 AcroRd32.exe 4288 AcroRd32.exe 4288 AcroRd32.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
msiexec.exemsiexec.exedescription pid process Token: SeShutdownPrivilege 216 msiexec.exe Token: SeIncreaseQuotaPrivilege 216 msiexec.exe Token: SeSecurityPrivilege 392 msiexec.exe Token: SeCreateTokenPrivilege 216 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 216 msiexec.exe Token: SeLockMemoryPrivilege 216 msiexec.exe Token: SeIncreaseQuotaPrivilege 216 msiexec.exe Token: SeMachineAccountPrivilege 216 msiexec.exe Token: SeTcbPrivilege 216 msiexec.exe Token: SeSecurityPrivilege 216 msiexec.exe Token: SeTakeOwnershipPrivilege 216 msiexec.exe Token: SeLoadDriverPrivilege 216 msiexec.exe Token: SeSystemProfilePrivilege 216 msiexec.exe Token: SeSystemtimePrivilege 216 msiexec.exe Token: SeProfSingleProcessPrivilege 216 msiexec.exe Token: SeIncBasePriorityPrivilege 216 msiexec.exe Token: SeCreatePagefilePrivilege 216 msiexec.exe Token: SeCreatePermanentPrivilege 216 msiexec.exe Token: SeBackupPrivilege 216 msiexec.exe Token: SeRestorePrivilege 216 msiexec.exe Token: SeShutdownPrivilege 216 msiexec.exe Token: SeDebugPrivilege 216 msiexec.exe Token: SeAuditPrivilege 216 msiexec.exe Token: SeSystemEnvironmentPrivilege 216 msiexec.exe Token: SeChangeNotifyPrivilege 216 msiexec.exe Token: SeRemoteShutdownPrivilege 216 msiexec.exe Token: SeUndockPrivilege 216 msiexec.exe Token: SeSyncAgentPrivilege 216 msiexec.exe Token: SeEnableDelegationPrivilege 216 msiexec.exe Token: SeManageVolumePrivilege 216 msiexec.exe Token: SeImpersonatePrivilege 216 msiexec.exe Token: SeCreateGlobalPrivilege 216 msiexec.exe Token: SeCreateTokenPrivilege 216 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 216 msiexec.exe Token: SeLockMemoryPrivilege 216 msiexec.exe Token: SeIncreaseQuotaPrivilege 216 msiexec.exe Token: SeMachineAccountPrivilege 216 msiexec.exe Token: SeTcbPrivilege 216 msiexec.exe Token: SeSecurityPrivilege 216 msiexec.exe Token: SeTakeOwnershipPrivilege 216 msiexec.exe Token: SeLoadDriverPrivilege 216 msiexec.exe Token: SeSystemProfilePrivilege 216 msiexec.exe Token: SeSystemtimePrivilege 216 msiexec.exe Token: SeProfSingleProcessPrivilege 216 msiexec.exe Token: SeIncBasePriorityPrivilege 216 msiexec.exe Token: SeCreatePagefilePrivilege 216 msiexec.exe Token: SeCreatePermanentPrivilege 216 msiexec.exe Token: SeBackupPrivilege 216 msiexec.exe Token: SeRestorePrivilege 216 msiexec.exe Token: SeShutdownPrivilege 216 msiexec.exe Token: SeDebugPrivilege 216 msiexec.exe Token: SeAuditPrivilege 216 msiexec.exe Token: SeSystemEnvironmentPrivilege 216 msiexec.exe Token: SeChangeNotifyPrivilege 216 msiexec.exe Token: SeRemoteShutdownPrivilege 216 msiexec.exe Token: SeUndockPrivilege 216 msiexec.exe Token: SeSyncAgentPrivilege 216 msiexec.exe Token: SeEnableDelegationPrivilege 216 msiexec.exe Token: SeManageVolumePrivilege 216 msiexec.exe Token: SeImpersonatePrivilege 216 msiexec.exe Token: SeCreateGlobalPrivilege 216 msiexec.exe Token: SeCreateTokenPrivilege 216 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 216 msiexec.exe Token: SeLockMemoryPrivilege 216 msiexec.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
msiexec.exepid process 216 msiexec.exe 216 msiexec.exe -
Suspicious use of SetWindowsHookEx 14 IoCs
Processes:
Adobe Reader W10.exesetup.exeAcroRd32.exeAdobeARM.exepid process 4824 Adobe Reader W10.exe 4824 Adobe Reader W10.exe 4824 Adobe Reader W10.exe 408 setup.exe 408 setup.exe 408 setup.exe 408 setup.exe 408 setup.exe 4288 AcroRd32.exe 4288 AcroRd32.exe 4288 AcroRd32.exe 4288 AcroRd32.exe 4288 AcroRd32.exe 4192 AdobeARM.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
Adobe Reader W10.exesetup.exemsiexec.exerundll32.exeAcroRd32.exeRdrCEF.exedescription pid process target process PID 4824 wrote to memory of 408 4824 Adobe Reader W10.exe setup.exe PID 4824 wrote to memory of 408 4824 Adobe Reader W10.exe setup.exe PID 4824 wrote to memory of 408 4824 Adobe Reader W10.exe setup.exe PID 408 wrote to memory of 216 408 setup.exe msiexec.exe PID 408 wrote to memory of 216 408 setup.exe msiexec.exe PID 408 wrote to memory of 216 408 setup.exe msiexec.exe PID 392 wrote to memory of 868 392 msiexec.exe MsiExec.exe PID 392 wrote to memory of 868 392 msiexec.exe MsiExec.exe PID 392 wrote to memory of 868 392 msiexec.exe MsiExec.exe PID 392 wrote to memory of 3188 392 msiexec.exe srtasks.exe PID 392 wrote to memory of 3188 392 msiexec.exe srtasks.exe PID 392 wrote to memory of 4452 392 msiexec.exe MsiExec.exe PID 392 wrote to memory of 4452 392 msiexec.exe MsiExec.exe PID 392 wrote to memory of 4452 392 msiexec.exe MsiExec.exe PID 392 wrote to memory of 752 392 msiexec.exe MsiExec.exe PID 392 wrote to memory of 752 392 msiexec.exe MsiExec.exe PID 392 wrote to memory of 752 392 msiexec.exe MsiExec.exe PID 392 wrote to memory of 4664 392 msiexec.exe MSI12EF.tmp PID 392 wrote to memory of 4664 392 msiexec.exe MSI12EF.tmp PID 392 wrote to memory of 4664 392 msiexec.exe MSI12EF.tmp PID 392 wrote to memory of 3472 392 msiexec.exe FullTrustNotifier.exe PID 392 wrote to memory of 3472 392 msiexec.exe FullTrustNotifier.exe PID 392 wrote to memory of 3472 392 msiexec.exe FullTrustNotifier.exe PID 392 wrote to memory of 1968 392 msiexec.exe RdrServicesUpdater.exe PID 392 wrote to memory of 1968 392 msiexec.exe RdrServicesUpdater.exe PID 392 wrote to memory of 1968 392 msiexec.exe RdrServicesUpdater.exe PID 392 wrote to memory of 4632 392 msiexec.exe rundll32.exe PID 392 wrote to memory of 4632 392 msiexec.exe rundll32.exe PID 4632 wrote to memory of 1784 4632 rundll32.exe rundll32.exe PID 4632 wrote to memory of 1784 4632 rundll32.exe rundll32.exe PID 4632 wrote to memory of 1784 4632 rundll32.exe rundll32.exe PID 4288 wrote to memory of 2060 4288 AcroRd32.exe RdrCEF.exe PID 4288 wrote to memory of 2060 4288 AcroRd32.exe RdrCEF.exe PID 4288 wrote to memory of 2060 4288 AcroRd32.exe RdrCEF.exe PID 2060 wrote to memory of 2076 2060 RdrCEF.exe RdrCEF.exe PID 2060 wrote to memory of 2076 2060 RdrCEF.exe RdrCEF.exe PID 2060 wrote to memory of 2076 2060 RdrCEF.exe RdrCEF.exe PID 2060 wrote to memory of 2076 2060 RdrCEF.exe RdrCEF.exe PID 2060 wrote to memory of 2076 2060 RdrCEF.exe RdrCEF.exe PID 2060 wrote to memory of 2076 2060 RdrCEF.exe RdrCEF.exe PID 2060 wrote to memory of 2076 2060 RdrCEF.exe RdrCEF.exe PID 2060 wrote to memory of 2076 2060 RdrCEF.exe RdrCEF.exe PID 2060 wrote to memory of 2076 2060 RdrCEF.exe RdrCEF.exe PID 2060 wrote to memory of 2076 2060 RdrCEF.exe RdrCEF.exe PID 2060 wrote to memory of 2076 2060 RdrCEF.exe RdrCEF.exe PID 2060 wrote to memory of 2076 2060 RdrCEF.exe RdrCEF.exe PID 2060 wrote to memory of 2076 2060 RdrCEF.exe RdrCEF.exe PID 2060 wrote to memory of 2076 2060 RdrCEF.exe RdrCEF.exe PID 2060 wrote to memory of 2076 2060 RdrCEF.exe RdrCEF.exe PID 2060 wrote to memory of 2076 2060 RdrCEF.exe RdrCEF.exe PID 2060 wrote to memory of 2076 2060 RdrCEF.exe RdrCEF.exe PID 2060 wrote to memory of 2076 2060 RdrCEF.exe RdrCEF.exe PID 2060 wrote to memory of 2076 2060 RdrCEF.exe RdrCEF.exe PID 2060 wrote to memory of 2076 2060 RdrCEF.exe RdrCEF.exe PID 2060 wrote to memory of 2076 2060 RdrCEF.exe RdrCEF.exe PID 2060 wrote to memory of 2076 2060 RdrCEF.exe RdrCEF.exe PID 2060 wrote to memory of 2076 2060 RdrCEF.exe RdrCEF.exe PID 2060 wrote to memory of 2076 2060 RdrCEF.exe RdrCEF.exe PID 2060 wrote to memory of 2076 2060 RdrCEF.exe RdrCEF.exe PID 2060 wrote to memory of 2076 2060 RdrCEF.exe RdrCEF.exe PID 2060 wrote to memory of 2076 2060 RdrCEF.exe RdrCEF.exe PID 2060 wrote to memory of 2076 2060 RdrCEF.exe RdrCEF.exe PID 2060 wrote to memory of 2076 2060 RdrCEF.exe RdrCEF.exe PID 2060 wrote to memory of 2076 2060 RdrCEF.exe RdrCEF.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Adobe Reader W10.exe"C:\Users\Admin\AppData\Local\Temp\Adobe Reader W10.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\ProgramData\Adobe\Setup\{AC76BA86-7AD7-1034-7B44-AC0F074E4100}\setup.exe"C:\ProgramData\Adobe\Setup\{AC76BA86-7AD7-1034-7B44-AC0F074E4100}\setup.exe" /msi DISABLE_CACHE=12⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\ProgramData\Adobe\Setup\{AC76BA86-7AD7-1034-7B44-AC0F074E4100}\AcroRead.msi" DISABLE_CACHE=1 REBOOT="ReallySuppress" PATCH="C:\ProgramData\Adobe\Setup\{AC76BA86-7AD7-1034-7B44-AC0F074E4100}\AcroRdrDCUpd2000920063.msp"3⤵
- Blocklisted process makes network request
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Sets file execution options in registry
- Drops desktop.ini file(s)
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 9CA6B6A33558D3810FD12102DF0F30C3 C2⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\srtasks.exeC:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:22⤵
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding C157A227C12E883F0F9D8027C31A69A02⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 22A57C6DF40177FB208E5F9D4C86451F E Global\MSI00002⤵
- Modifies Installed Components in the registry
- Sets file execution options in registry
- Loads dropped DLL
- Registers COM server for autorun
- Drops file in Program Files directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\Installer\MSI12EF.tmp"C:\Windows\Installer\MSI12EF.tmp" /b 5 120 02⤵
- Executes dropped EXE
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\FullTrustNotifier.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\FullTrustNotifier.exe" ClearToasts2⤵
- Executes dropped EXE
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrServicesUpdater.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrServicesUpdater.exe" 20.009.20063 19.010.20069.02⤵
- Executes dropped EXE
- Drops file in Program Files directory
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\AiodLite.dll",CreateReaderUserSettings2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\AiodLite.dll",CreateReaderUserSettings3⤵
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Checks SCSI registry key(s)
-
C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe"C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe"1⤵
- Executes dropped EXE
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"1⤵
- Checks computer location settings
- Executes dropped EXE
- Checks whether UAC is enabled
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --field-trial-handle=1840,12680376146050673477,12833168073936337656,131072 --disable-features=NetworkService,VizDisplayCompositor --disable-pack-loading --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/20.9.20063 Chrome/80.0.0.0" --lang=en-US --gpu-preferences=KAAAAAAAAADgACAgAQAAAAAAAAAAAGAAAAAAABAAAAAIAAAAAAAAACgAAAAEAAAAIAAAAAAAAAAoAAAAAAAAADAAAAAAAAAAOAAAAAAAAAAQAAAAAAAAAAAAAAAFAAAAEAAAAAAAAAAAAAAABgAAABAAAAAAAAAAAQAAAAUAAAAQAAAAAAAAAAEAAAAGAAAA --use-gl=swiftshader-webgl --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --service-request-channel-token=15614261659580506198 --mojo-platform-channel-handle=1868 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵
- Executes dropped EXE
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --touch-events=enabled --field-trial-handle=1840,12680376146050673477,12833168073936337656,131072 --disable-features=NetworkService,VizDisplayCompositor --disable-gpu-compositing --lang=en-US --disable-pack-loading --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/20.9.20063 Chrome/80.0.0.0" --device-scale-factor=1 --num-raster-threads=1 --service-request-channel-token=8500862331438473455 --renderer-client-id=2 --mojo-platform-channel-handle=1892 --allow-no-sandbox-job /prefetch:13⤵
- Checks computer location settings
- Executes dropped EXE
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --field-trial-handle=1840,12680376146050673477,12833168073936337656,131072 --disable-features=NetworkService,VizDisplayCompositor --disable-pack-loading --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/20.9.20063 Chrome/80.0.0.0" --lang=en-US --gpu-preferences=KAAAAAAAAADgACAgAQAAAAAAAAAAAGAAAAAAABAAAAAIAAAAAAAAACgAAAAEAAAAIAAAAAAAAAAoAAAAAAAAADAAAAAAAAAAOAAAAAAAAAAQAAAAAAAAAAAAAAAFAAAAEAAAAAAAAAAAAAAABgAAABAAAAAAAAAAAQAAAAUAAAAQAAAAAAAAAAEAAAAGAAAA --use-gl=swiftshader-webgl --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --service-request-channel-token=2525642789466578465 --mojo-platform-channel-handle=2096 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵
- Executes dropped EXE
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --field-trial-handle=1840,12680376146050673477,12833168073936337656,131072 --disable-features=NetworkService,VizDisplayCompositor --disable-pack-loading --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/20.9.20063 Chrome/80.0.0.0" --lang=en-US --gpu-preferences=KAAAAAAAAADgACAgAQAAAAAAAAAAAGAAAAAAABAAAAAIAAAAAAAAACgAAAAEAAAAIAAAAAAAAAAoAAAAAAAAADAAAAAAAAAAOAAAAAAAAAAQAAAAAAAAAAAAAAAFAAAAEAAAAAAAAAAAAAAABgAAABAAAAAAAAAAAQAAAAUAAAAQAAAAAAAAAAEAAAAGAAAA --use-gl=swiftshader-webgl --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --service-request-channel-token=4823836970138637012 --mojo-platform-channel-handle=2320 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵
- Executes dropped EXE
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --touch-events=enabled --field-trial-handle=1840,12680376146050673477,12833168073936337656,131072 --disable-features=NetworkService,VizDisplayCompositor --disable-gpu-compositing --lang=en-US --disable-pack-loading --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/20.9.20063 Chrome/80.0.0.0" --device-scale-factor=1 --num-raster-threads=1 --service-request-channel-token=666074929620331664 --renderer-client-id=6 --mojo-platform-channel-handle=2324 --allow-no-sandbox-job /prefetch:13⤵
- Checks computer location settings
- Executes dropped EXE
-
C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARM.exe"C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARM.exe" /PRODUCT:Reader /VERSION:20.0 /MODE:32⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Reader_sl.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Reader_sl.exe"3⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\PROGRAMDATA\ADOBE\SETUP\{AC76BA86-7AD7-1034-7B44-AC0F074E4100}\Abcpy.iniFilesize
608B
MD5818d3a4899c5596d8d8da00a87e6d8bb
SHA14e0e04f5ca5d81661702877852fd9d059722762f
SHA2569986830f6e44d24b86936851c2c0cd961ecdddbed3b34e8f6a64693f36e9429d
SHA5121cd1c882adcee3d89bdc2b07ccf8d4913149565085d42e0f67a4c08b4c4d504b51c9ae44a11de906a1aed202391eb2b3461f63268158b6879cae9a18d56da239
-
C:\ProgramData\Adobe\Setup\{AC76BA86-7AD7-1034-7B44-AC0F074E4100}\AcroRdrDCUpd2000920063.mspFilesize
233.1MB
MD57ec737bd443a0aa00c6c332831c11099
SHA182fdab10639348b4e3a2d6992cd335b7a54773d4
SHA256f98ad060a9f7c2ef01dd2377dbef0cfe795f8562a9b32d2b40b6806130943194
SHA512e2a895abcc35ecd0acc1cd325fda0cb318f41ad99707f3bfb78e86e1561e402286f8fa84f384622d24867be228d2debacbeb23199c2081a8f6ff8b0d1bc886d6
-
C:\ProgramData\Adobe\Setup\{AC76BA86-7AD7-1034-7B44-AC0F074E4100}\AcroRead.msiFilesize
2.7MB
MD561d8449d9beca981dd0c51a913b7ea35
SHA1a8e175868e0dfc1c08cbfb267fa353f33395bb95
SHA25636b2789a878b9350415de3330048b7a5c097c6c7af4cd34ba15a1e29f3d7c152
SHA512d406f7751e771df4eca1aa7d4ea296710e203398abd5e0014f84477198b734abdb7c6b128b9858284cc612470f1628619e58f8295d23991276798ade885577aa
-
C:\ProgramData\Adobe\Setup\{AC76BA86-7AD7-1034-7B44-AC0F074E4100}\Data1.cabFilesize
171.5MB
MD5f6084b8748bc251436afabbe8fa025f6
SHA1dcf0cac36e419a9d416979ca30f0271f8fa7e40a
SHA256c681e16a9ca4647a1f62402a73728f6c46f40b466ac0bb25c769fc6c13582841
SHA5123354158555c648bb5b664f2cd8812064cbbf0d5d704522e026e8f2660c3e22f7f342e82755deb0bd8a7bd76397b00f18b209a763ef94d3361a09192614db0173
-
C:\ProgramData\Adobe\Setup\{AC76BA86-7AD7-1034-7B44-AC0F074E4100}\setup.exeFilesize
457KB
MD5446366ca32877e2290d0bd8f22e11809
SHA1b620d296d53566d9a07c1cabc92c50d0f5c4f34a
SHA2564b76c0ea832d58966f824cfedb9a3831b1c286b13cc22d56e29dad7966847184
SHA512edbb4cd70b9c372f827136db217087451732f83a34af854ff031a659e9aee0fe849c0005a38d2bd19f438f8277147101a577fa900b89e2e1f804b369134255cf
-
C:\ProgramData\Adobe\Setup\{AC76BA86-7AD7-1034-7B44-AC0F074E4100}\setup.exeFilesize
457KB
MD5446366ca32877e2290d0bd8f22e11809
SHA1b620d296d53566d9a07c1cabc92c50d0f5c4f34a
SHA2564b76c0ea832d58966f824cfedb9a3831b1c286b13cc22d56e29dad7966847184
SHA512edbb4cd70b9c372f827136db217087451732f83a34af854ff031a659e9aee0fe849c0005a38d2bd19f438f8277147101a577fa900b89e2e1f804b369134255cf
-
C:\ProgramData\Adobe\Setup\{AC76BA86-7AD7-1034-7B44-AC0F074E4100}\setup.iniFilesize
214B
MD59f81c07b6cd7095413dd6929187e2f4d
SHA11de1a54adadd0f1b62c4001734d84cfd50576470
SHA256df8ff64da09022529a346c9e434a11e756b4f546066bdc1ec906b531a92d4a30
SHA51233de8361016abde98f1398d6c9e203c3364d636b3d15f8cc48052446140143e5a44433791983d1c3ce4de31311001c0b1243a14c0fde8f4c1ddb37823669c091
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7D266D9E1E69FA1EEFB9699B009B34C8_1D5A876A9113EC07224C45E5A870E3BDFilesize
5B
MD55bfa51f3a417b98e7443eca90fc94703
SHA18c015d80b8a23f780bdd215dc842b0f5551f63bd
SHA256bebe2853a3485d1c2e5c5be4249183e0ddaff9f87de71652371700a89d937128
SHA5124cd03686254bb28754cbaa635ae1264723e2be80ce1dd0f78d1ab7aee72232f5b285f79e488e9c5c49ff343015bd07bb8433d6cee08ae3cea8c317303e3ac399
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8890A77645B73478F5B1DED18ACBF795_C090A8C88B266C6FF99A97210E92B44DFilesize
471B
MD58e9e10222014669a5646aa1ac942c432
SHA1c0cb1a325490bec4743ddbaf37be58eb49aeb8f3
SHA2569690e2ed4d1278b588d930387b59c5df54bc8116c7d1c37a0cd41c3388ef8cde
SHA5127e93a7d6ac804c011b1b937e24d2e1895b3ea36137e71b24caf20344c511db10f01b60c87c95dae2de8771b5b8b63b12d841a6f3c588a487926cfb846996b1ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8DFDF057024880D7A081AFBF6D26B92FFilesize
834B
MD52697ffc1489ca9a1a388fda347debd01
SHA10eb33674ffb03de5e747e7259b02b6896ac76a7b
SHA256dee80fd8c130e8ca99a83a844f0359414d6ad990184a036096d57d0fcec68588
SHA512ccbe7d84d9931855a55761da5fd15a43525cc8c57ea2b1c2d56294b7b66e92cf147e27e314f66c0ff8a1bf54933089d43835abf1a2e594cc05b9a145727aef6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B3BB9C1BA2D19E090AE305B2683903A0_B89A63AC6877BD1ED812438CE82C3EB8Filesize
1KB
MD5560751a5f681b74cc2344254c5ddf70a
SHA1de45370f8bf2acda7be01e92734c7c35e365558e
SHA256ff010cbfcecf0ca9ecbaea618bd1fc792f0a6102cb8e1c489f15fc4ae0074694
SHA5121ab1392bfbb450ea937fd6c54e844f245c36fe460842f3d22ca6e32fcadee2bb22f17b59c5bbd2f00727db600e75cd8ff11fdec39876c9909ab48ca5cf13887d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\DA3B6E45325D5FFF28CF6BAD6065C907_6FE39FFDDF34494A44B81D08964F8CFAFilesize
471B
MD52db8a298eb4e65768f136550907bb9e9
SHA12d85df6584f1230ebd005dccd6e6368abf59e6e9
SHA25629b073f3358e0240f4ede51ba289595d3f9b7fba87245b8b756066a1a344d15c
SHA512c215a84c2c3b8f2aaf05fedaa1b038321ee28103f2d31c42c7d097a86d09ca05530934766b424e7b14b83296dc84c281800a79e160910ca8e03415b7039ccc74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7D266D9E1E69FA1EEFB9699B009B34C8_1D5A876A9113EC07224C45E5A870E3BDFilesize
408B
MD5cedb8219033110a8c6ace7147034847c
SHA10afaf430ec20259d996e0d82065adcb5a06cf26e
SHA2562df70b819f53c3f76950ac673b0b488e2f1dca24a888886b97230ea364dd01e4
SHA512aefb65871928681d616121e14a496512f1d7a87885339283ba00575a17264af4ab16c3123b57d07984895dcb711a5d5dfbc4cf25a6ae774dfd031fd9c31e50c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8890A77645B73478F5B1DED18ACBF795_C090A8C88B266C6FF99A97210E92B44DFilesize
426B
MD5af94bb52b258aacbe66c31f8a6213a1b
SHA17d0b86302fc7e1cd4a30b5ef59fa92538f174b7a
SHA2567d8d2d821be3ab0c2859dbde547e13f36daf7cf7a098f5996e57d8d26da1bb69
SHA512679a8cdbd9be153dec0964f2ee8d566d07562827a9b8906aa9a618995cd621540b67b7ffd44d655b9bea74cd4e4034edf4d9cc2646502c872d8089c63e40cd42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8DFDF057024880D7A081AFBF6D26B92FFilesize
188B
MD5719563c19f37668876663367644eb951
SHA15efc32ab1e9f00ae334e62ba58e5c156dfbf53ed
SHA256098ac8555a463085a16f3efcf9771f6c777d75b6589f2c2e2161a1f79a7a9755
SHA512dd85e11c197165c799a47941452e3bdce4d5085a5ab824e26b19e9077223ad79efc3a4c081215335aba00708bf4f36be2a4be2532c93c41e9616afcb58734655
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B3BB9C1BA2D19E090AE305B2683903A0_B89A63AC6877BD1ED812438CE82C3EB8Filesize
416B
MD5df6cac9dd61317f099ee90edc9a6d597
SHA14dfb0e63bfcc5b387b014955b146f39279b48446
SHA2563810951e69ce54bca1b7ceb72a77569db42985dba0e145dacb03822c480e1e32
SHA512e39b10c12c6cce9ad846b7c2e4225a46a68ffe8d23dc41c63c819a0d20bfe2a6aa0cc377dbfbb1836c2084c75c0e06f20145a08a8ed4d27b6f97553a4518ba9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\DA3B6E45325D5FFF28CF6BAD6065C907_6FE39FFDDF34494A44B81D08964F8CFAFilesize
438B
MD50d6d9cee42cf1e5a0af1b47cfb7ae34f
SHA1e3da1e50a71b7f5e7c17df2fc5ea0dc6b62d6a85
SHA256fbb5b8f581875f4c41ea584a83f60982947d2c39dd28444da14a31f33dd86cdf
SHA512e30ed7681ba457ba91add678b84192212ea23790dae1bf0a582c56b8a8fd50540d324eaac82991fa9e33d5bd8fac078d826cebd22ccfb611d23481bf57b8095c
-
C:\Users\Admin\AppData\Local\Temp\MSI6E3B.tmpFilesize
57KB
MD5c23d4d5a87e08f8a822ad5a8dbd69592
SHA1317df555bc309dace46ae5c5589bec53ea8f137e
SHA2566d149866246e79919bde5a0b45569ea41327c32ee250f37ad8216275a641bb27
SHA512fa584655ae241004af44774a1f43508e53e95028ce96b39f8b5c62742f38acdf2b1df8871b468ac70c6043ca0e7ae8241bad2db6bc4f700d78471f12bb809e6b
-
C:\Users\Admin\AppData\Local\Temp\MSI6E3B.tmpFilesize
57KB
MD5c23d4d5a87e08f8a822ad5a8dbd69592
SHA1317df555bc309dace46ae5c5589bec53ea8f137e
SHA2566d149866246e79919bde5a0b45569ea41327c32ee250f37ad8216275a641bb27
SHA512fa584655ae241004af44774a1f43508e53e95028ce96b39f8b5c62742f38acdf2b1df8871b468ac70c6043ca0e7ae8241bad2db6bc4f700d78471f12bb809e6b
-
C:\Users\Admin\AppData\Local\Temp\MSI6F55.tmpFilesize
106KB
MD59f7f4025c4ed522d47ddc3206a14e830
SHA1b593f933d0089d0ef62626962967c0f50ffeda5d
SHA25631024f642ba41f76c78954eb3a53613ede06ad0e88ca9068580753896e084a36
SHA51259dcb04bc9179694b34cc250ee11b8f57b49ce183ccf0a8636a6152ad72d775aa5b07976536be65d6d73ec4d9d6edde64b261b373a302ee2f5dac245f587e62d
-
C:\Users\Admin\AppData\Local\Temp\MSI6F55.tmpFilesize
106KB
MD59f7f4025c4ed522d47ddc3206a14e830
SHA1b593f933d0089d0ef62626962967c0f50ffeda5d
SHA25631024f642ba41f76c78954eb3a53613ede06ad0e88ca9068580753896e084a36
SHA51259dcb04bc9179694b34cc250ee11b8f57b49ce183ccf0a8636a6152ad72d775aa5b07976536be65d6d73ec4d9d6edde64b261b373a302ee2f5dac245f587e62d
-
C:\Users\Admin\AppData\Local\Temp\MSI6FF2.tmpFilesize
423KB
MD516f5faf4ddf213904a4f0f25d48c66d2
SHA19e1c96cb93f9c22fda4f64e6eb226f72afb33d96
SHA2564d7a6f7124908e54ebf66dd74eb047a7c785a16f931f9a0462389e857847d6b1
SHA5129118fc1091c3633d9084d499265f47c9b57dfe2e889ca43063b46168a827dc27cff1330a223d1030ee980cdae4d0848092bd1d7c6661c6eb822901b7ffa2f05a
-
C:\Users\Admin\AppData\Local\Temp\MSI6FF2.tmpFilesize
423KB
MD516f5faf4ddf213904a4f0f25d48c66d2
SHA19e1c96cb93f9c22fda4f64e6eb226f72afb33d96
SHA2564d7a6f7124908e54ebf66dd74eb047a7c785a16f931f9a0462389e857847d6b1
SHA5129118fc1091c3633d9084d499265f47c9b57dfe2e889ca43063b46168a827dc27cff1330a223d1030ee980cdae4d0848092bd1d7c6661c6eb822901b7ffa2f05a
-
C:\Users\Admin\AppData\Local\Temp\MSI7060.tmpFilesize
423KB
MD516f5faf4ddf213904a4f0f25d48c66d2
SHA19e1c96cb93f9c22fda4f64e6eb226f72afb33d96
SHA2564d7a6f7124908e54ebf66dd74eb047a7c785a16f931f9a0462389e857847d6b1
SHA5129118fc1091c3633d9084d499265f47c9b57dfe2e889ca43063b46168a827dc27cff1330a223d1030ee980cdae4d0848092bd1d7c6661c6eb822901b7ffa2f05a
-
C:\Users\Admin\AppData\Local\Temp\MSI7060.tmpFilesize
423KB
MD516f5faf4ddf213904a4f0f25d48c66d2
SHA19e1c96cb93f9c22fda4f64e6eb226f72afb33d96
SHA2564d7a6f7124908e54ebf66dd74eb047a7c785a16f931f9a0462389e857847d6b1
SHA5129118fc1091c3633d9084d499265f47c9b57dfe2e889ca43063b46168a827dc27cff1330a223d1030ee980cdae4d0848092bd1d7c6661c6eb822901b7ffa2f05a
-
C:\Users\Admin\AppData\Local\Temp\MSI70BF.tmpFilesize
209KB
MD50e91605ee2395145d077adb643609085
SHA1303263aa6889013ce889bd4ea0324acdf35f29f2
SHA2565472237b0947d129ab6ad89b71d8e007fd5c4624e97af28cd342919ba0d5f87b
SHA5123712c3645be47db804f08ef0f44465d0545cd0d435b4e6310c39966ccb85a801645adb98781b548472b2dfd532dd79520bf3ff98042a5457349f2380b52b45be
-
C:\Users\Admin\AppData\Local\Temp\MSI70BF.tmpFilesize
209KB
MD50e91605ee2395145d077adb643609085
SHA1303263aa6889013ce889bd4ea0324acdf35f29f2
SHA2565472237b0947d129ab6ad89b71d8e007fd5c4624e97af28cd342919ba0d5f87b
SHA5123712c3645be47db804f08ef0f44465d0545cd0d435b4e6310c39966ccb85a801645adb98781b548472b2dfd532dd79520bf3ff98042a5457349f2380b52b45be
-
C:\Users\Admin\AppData\Local\Temp\MSI70EF.tmpFilesize
423KB
MD516f5faf4ddf213904a4f0f25d48c66d2
SHA19e1c96cb93f9c22fda4f64e6eb226f72afb33d96
SHA2564d7a6f7124908e54ebf66dd74eb047a7c785a16f931f9a0462389e857847d6b1
SHA5129118fc1091c3633d9084d499265f47c9b57dfe2e889ca43063b46168a827dc27cff1330a223d1030ee980cdae4d0848092bd1d7c6661c6eb822901b7ffa2f05a
-
C:\Users\Admin\AppData\Local\Temp\MSI70EF.tmpFilesize
423KB
MD516f5faf4ddf213904a4f0f25d48c66d2
SHA19e1c96cb93f9c22fda4f64e6eb226f72afb33d96
SHA2564d7a6f7124908e54ebf66dd74eb047a7c785a16f931f9a0462389e857847d6b1
SHA5129118fc1091c3633d9084d499265f47c9b57dfe2e889ca43063b46168a827dc27cff1330a223d1030ee980cdae4d0848092bd1d7c6661c6eb822901b7ffa2f05a
-
C:\Users\Admin\AppData\Local\Temp\MSIE8A1.tmpFilesize
423KB
MD516f5faf4ddf213904a4f0f25d48c66d2
SHA19e1c96cb93f9c22fda4f64e6eb226f72afb33d96
SHA2564d7a6f7124908e54ebf66dd74eb047a7c785a16f931f9a0462389e857847d6b1
SHA5129118fc1091c3633d9084d499265f47c9b57dfe2e889ca43063b46168a827dc27cff1330a223d1030ee980cdae4d0848092bd1d7c6661c6eb822901b7ffa2f05a
-
C:\Users\Admin\AppData\Local\Temp\MSIE8A1.tmpFilesize
423KB
MD516f5faf4ddf213904a4f0f25d48c66d2
SHA19e1c96cb93f9c22fda4f64e6eb226f72afb33d96
SHA2564d7a6f7124908e54ebf66dd74eb047a7c785a16f931f9a0462389e857847d6b1
SHA5129118fc1091c3633d9084d499265f47c9b57dfe2e889ca43063b46168a827dc27cff1330a223d1030ee980cdae4d0848092bd1d7c6661c6eb822901b7ffa2f05a
-
C:\Windows\Installer\MSI585C.tmpFilesize
423KB
MD516f5faf4ddf213904a4f0f25d48c66d2
SHA19e1c96cb93f9c22fda4f64e6eb226f72afb33d96
SHA2564d7a6f7124908e54ebf66dd74eb047a7c785a16f931f9a0462389e857847d6b1
SHA5129118fc1091c3633d9084d499265f47c9b57dfe2e889ca43063b46168a827dc27cff1330a223d1030ee980cdae4d0848092bd1d7c6661c6eb822901b7ffa2f05a
-
C:\Windows\Installer\MSI585C.tmpFilesize
423KB
MD516f5faf4ddf213904a4f0f25d48c66d2
SHA19e1c96cb93f9c22fda4f64e6eb226f72afb33d96
SHA2564d7a6f7124908e54ebf66dd74eb047a7c785a16f931f9a0462389e857847d6b1
SHA5129118fc1091c3633d9084d499265f47c9b57dfe2e889ca43063b46168a827dc27cff1330a223d1030ee980cdae4d0848092bd1d7c6661c6eb822901b7ffa2f05a
-
C:\Windows\Installer\MSI5B4B.tmpFilesize
148KB
MD5be0b6bea2e4e12bf5d966c6f74fa79b5
SHA18468ec23f0a30065eee6913bf8eba62dd79651ec
SHA2566bac226fb3b530c6d4b409dd1858e0b53735abb5344779b6dfe8859658b2e164
SHA512dddb9689ad4910cc6c40f5f343bd661bae23b986156f2a56ab32832ddb727af5c767c9f21f94eec3986023bae9a4f10f8d24a9af44fa6e8e7e8610d7b686867b
-
C:\Windows\Installer\MSI5B4B.tmpFilesize
148KB
MD5be0b6bea2e4e12bf5d966c6f74fa79b5
SHA18468ec23f0a30065eee6913bf8eba62dd79651ec
SHA2566bac226fb3b530c6d4b409dd1858e0b53735abb5344779b6dfe8859658b2e164
SHA512dddb9689ad4910cc6c40f5f343bd661bae23b986156f2a56ab32832ddb727af5c767c9f21f94eec3986023bae9a4f10f8d24a9af44fa6e8e7e8610d7b686867b
-
C:\Windows\Installer\MSI5B6B.tmpFilesize
423KB
MD516f5faf4ddf213904a4f0f25d48c66d2
SHA19e1c96cb93f9c22fda4f64e6eb226f72afb33d96
SHA2564d7a6f7124908e54ebf66dd74eb047a7c785a16f931f9a0462389e857847d6b1
SHA5129118fc1091c3633d9084d499265f47c9b57dfe2e889ca43063b46168a827dc27cff1330a223d1030ee980cdae4d0848092bd1d7c6661c6eb822901b7ffa2f05a
-
C:\Windows\Installer\MSI5B6B.tmpFilesize
423KB
MD516f5faf4ddf213904a4f0f25d48c66d2
SHA19e1c96cb93f9c22fda4f64e6eb226f72afb33d96
SHA2564d7a6f7124908e54ebf66dd74eb047a7c785a16f931f9a0462389e857847d6b1
SHA5129118fc1091c3633d9084d499265f47c9b57dfe2e889ca43063b46168a827dc27cff1330a223d1030ee980cdae4d0848092bd1d7c6661c6eb822901b7ffa2f05a
-
C:\Windows\Installer\MSI658E.tmpFilesize
106KB
MD59f7f4025c4ed522d47ddc3206a14e830
SHA1b593f933d0089d0ef62626962967c0f50ffeda5d
SHA25631024f642ba41f76c78954eb3a53613ede06ad0e88ca9068580753896e084a36
SHA51259dcb04bc9179694b34cc250ee11b8f57b49ce183ccf0a8636a6152ad72d775aa5b07976536be65d6d73ec4d9d6edde64b261b373a302ee2f5dac245f587e62d
-
C:\Windows\Installer\MSI658E.tmpFilesize
106KB
MD59f7f4025c4ed522d47ddc3206a14e830
SHA1b593f933d0089d0ef62626962967c0f50ffeda5d
SHA25631024f642ba41f76c78954eb3a53613ede06ad0e88ca9068580753896e084a36
SHA51259dcb04bc9179694b34cc250ee11b8f57b49ce183ccf0a8636a6152ad72d775aa5b07976536be65d6d73ec4d9d6edde64b261b373a302ee2f5dac245f587e62d
-
C:\Windows\Installer\MSI65ED.tmpFilesize
209KB
MD50e91605ee2395145d077adb643609085
SHA1303263aa6889013ce889bd4ea0324acdf35f29f2
SHA2565472237b0947d129ab6ad89b71d8e007fd5c4624e97af28cd342919ba0d5f87b
SHA5123712c3645be47db804f08ef0f44465d0545cd0d435b4e6310c39966ccb85a801645adb98781b548472b2dfd532dd79520bf3ff98042a5457349f2380b52b45be
-
C:\Windows\Installer\MSI65ED.tmpFilesize
209KB
MD50e91605ee2395145d077adb643609085
SHA1303263aa6889013ce889bd4ea0324acdf35f29f2
SHA2565472237b0947d129ab6ad89b71d8e007fd5c4624e97af28cd342919ba0d5f87b
SHA5123712c3645be47db804f08ef0f44465d0545cd0d435b4e6310c39966ccb85a801645adb98781b548472b2dfd532dd79520bf3ff98042a5457349f2380b52b45be
-
C:\Windows\Installer\MSI6FA2.tmpFilesize
423KB
MD516f5faf4ddf213904a4f0f25d48c66d2
SHA19e1c96cb93f9c22fda4f64e6eb226f72afb33d96
SHA2564d7a6f7124908e54ebf66dd74eb047a7c785a16f931f9a0462389e857847d6b1
SHA5129118fc1091c3633d9084d499265f47c9b57dfe2e889ca43063b46168a827dc27cff1330a223d1030ee980cdae4d0848092bd1d7c6661c6eb822901b7ffa2f05a
-
C:\Windows\Installer\MSI6FA2.tmpFilesize
423KB
MD516f5faf4ddf213904a4f0f25d48c66d2
SHA19e1c96cb93f9c22fda4f64e6eb226f72afb33d96
SHA2564d7a6f7124908e54ebf66dd74eb047a7c785a16f931f9a0462389e857847d6b1
SHA5129118fc1091c3633d9084d499265f47c9b57dfe2e889ca43063b46168a827dc27cff1330a223d1030ee980cdae4d0848092bd1d7c6661c6eb822901b7ffa2f05a
-
C:\Windows\Installer\MSI7476.tmpFilesize
423KB
MD516f5faf4ddf213904a4f0f25d48c66d2
SHA19e1c96cb93f9c22fda4f64e6eb226f72afb33d96
SHA2564d7a6f7124908e54ebf66dd74eb047a7c785a16f931f9a0462389e857847d6b1
SHA5129118fc1091c3633d9084d499265f47c9b57dfe2e889ca43063b46168a827dc27cff1330a223d1030ee980cdae4d0848092bd1d7c6661c6eb822901b7ffa2f05a
-
C:\Windows\Installer\MSI7476.tmpFilesize
423KB
MD516f5faf4ddf213904a4f0f25d48c66d2
SHA19e1c96cb93f9c22fda4f64e6eb226f72afb33d96
SHA2564d7a6f7124908e54ebf66dd74eb047a7c785a16f931f9a0462389e857847d6b1
SHA5129118fc1091c3633d9084d499265f47c9b57dfe2e889ca43063b46168a827dc27cff1330a223d1030ee980cdae4d0848092bd1d7c6661c6eb822901b7ffa2f05a
-
C:\Windows\Installer\MSI7D12.tmpFilesize
423KB
MD516f5faf4ddf213904a4f0f25d48c66d2
SHA19e1c96cb93f9c22fda4f64e6eb226f72afb33d96
SHA2564d7a6f7124908e54ebf66dd74eb047a7c785a16f931f9a0462389e857847d6b1
SHA5129118fc1091c3633d9084d499265f47c9b57dfe2e889ca43063b46168a827dc27cff1330a223d1030ee980cdae4d0848092bd1d7c6661c6eb822901b7ffa2f05a
-
C:\Windows\Installer\MSI7D12.tmpFilesize
423KB
MD516f5faf4ddf213904a4f0f25d48c66d2
SHA19e1c96cb93f9c22fda4f64e6eb226f72afb33d96
SHA2564d7a6f7124908e54ebf66dd74eb047a7c785a16f931f9a0462389e857847d6b1
SHA5129118fc1091c3633d9084d499265f47c9b57dfe2e889ca43063b46168a827dc27cff1330a223d1030ee980cdae4d0848092bd1d7c6661c6eb822901b7ffa2f05a
-
C:\Windows\Installer\MSI9473.tmpFilesize
423KB
MD516f5faf4ddf213904a4f0f25d48c66d2
SHA19e1c96cb93f9c22fda4f64e6eb226f72afb33d96
SHA2564d7a6f7124908e54ebf66dd74eb047a7c785a16f931f9a0462389e857847d6b1
SHA5129118fc1091c3633d9084d499265f47c9b57dfe2e889ca43063b46168a827dc27cff1330a223d1030ee980cdae4d0848092bd1d7c6661c6eb822901b7ffa2f05a
-
C:\Windows\Installer\MSI9473.tmpFilesize
423KB
MD516f5faf4ddf213904a4f0f25d48c66d2
SHA19e1c96cb93f9c22fda4f64e6eb226f72afb33d96
SHA2564d7a6f7124908e54ebf66dd74eb047a7c785a16f931f9a0462389e857847d6b1
SHA5129118fc1091c3633d9084d499265f47c9b57dfe2e889ca43063b46168a827dc27cff1330a223d1030ee980cdae4d0848092bd1d7c6661c6eb822901b7ffa2f05a
-
C:\Windows\Installer\MSI9474.tmpFilesize
148KB
MD5be0b6bea2e4e12bf5d966c6f74fa79b5
SHA18468ec23f0a30065eee6913bf8eba62dd79651ec
SHA2566bac226fb3b530c6d4b409dd1858e0b53735abb5344779b6dfe8859658b2e164
SHA512dddb9689ad4910cc6c40f5f343bd661bae23b986156f2a56ab32832ddb727af5c767c9f21f94eec3986023bae9a4f10f8d24a9af44fa6e8e7e8610d7b686867b
-
C:\Windows\Installer\MSI9474.tmpFilesize
148KB
MD5be0b6bea2e4e12bf5d966c6f74fa79b5
SHA18468ec23f0a30065eee6913bf8eba62dd79651ec
SHA2566bac226fb3b530c6d4b409dd1858e0b53735abb5344779b6dfe8859658b2e164
SHA512dddb9689ad4910cc6c40f5f343bd661bae23b986156f2a56ab32832ddb727af5c767c9f21f94eec3986023bae9a4f10f8d24a9af44fa6e8e7e8610d7b686867b
-
C:\Windows\Installer\MSI9502.tmpFilesize
148KB
MD5be0b6bea2e4e12bf5d966c6f74fa79b5
SHA18468ec23f0a30065eee6913bf8eba62dd79651ec
SHA2566bac226fb3b530c6d4b409dd1858e0b53735abb5344779b6dfe8859658b2e164
SHA512dddb9689ad4910cc6c40f5f343bd661bae23b986156f2a56ab32832ddb727af5c767c9f21f94eec3986023bae9a4f10f8d24a9af44fa6e8e7e8610d7b686867b
-
C:\Windows\Installer\MSI9502.tmpFilesize
148KB
MD5be0b6bea2e4e12bf5d966c6f74fa79b5
SHA18468ec23f0a30065eee6913bf8eba62dd79651ec
SHA2566bac226fb3b530c6d4b409dd1858e0b53735abb5344779b6dfe8859658b2e164
SHA512dddb9689ad4910cc6c40f5f343bd661bae23b986156f2a56ab32832ddb727af5c767c9f21f94eec3986023bae9a4f10f8d24a9af44fa6e8e7e8610d7b686867b
-
C:\Windows\Installer\MSI9580.tmpFilesize
148KB
MD5be0b6bea2e4e12bf5d966c6f74fa79b5
SHA18468ec23f0a30065eee6913bf8eba62dd79651ec
SHA2566bac226fb3b530c6d4b409dd1858e0b53735abb5344779b6dfe8859658b2e164
SHA512dddb9689ad4910cc6c40f5f343bd661bae23b986156f2a56ab32832ddb727af5c767c9f21f94eec3986023bae9a4f10f8d24a9af44fa6e8e7e8610d7b686867b
-
C:\Windows\Installer\MSI9580.tmpFilesize
148KB
MD5be0b6bea2e4e12bf5d966c6f74fa79b5
SHA18468ec23f0a30065eee6913bf8eba62dd79651ec
SHA2566bac226fb3b530c6d4b409dd1858e0b53735abb5344779b6dfe8859658b2e164
SHA512dddb9689ad4910cc6c40f5f343bd661bae23b986156f2a56ab32832ddb727af5c767c9f21f94eec3986023bae9a4f10f8d24a9af44fa6e8e7e8610d7b686867b
-
C:\Windows\Installer\MSI95CF.tmpFilesize
423KB
MD516f5faf4ddf213904a4f0f25d48c66d2
SHA19e1c96cb93f9c22fda4f64e6eb226f72afb33d96
SHA2564d7a6f7124908e54ebf66dd74eb047a7c785a16f931f9a0462389e857847d6b1
SHA5129118fc1091c3633d9084d499265f47c9b57dfe2e889ca43063b46168a827dc27cff1330a223d1030ee980cdae4d0848092bd1d7c6661c6eb822901b7ffa2f05a
-
C:\Windows\Installer\MSI95CF.tmpFilesize
423KB
MD516f5faf4ddf213904a4f0f25d48c66d2
SHA19e1c96cb93f9c22fda4f64e6eb226f72afb33d96
SHA2564d7a6f7124908e54ebf66dd74eb047a7c785a16f931f9a0462389e857847d6b1
SHA5129118fc1091c3633d9084d499265f47c9b57dfe2e889ca43063b46168a827dc27cff1330a223d1030ee980cdae4d0848092bd1d7c6661c6eb822901b7ffa2f05a
-
C:\Windows\Installer\MSI966C.tmpFilesize
423KB
MD516f5faf4ddf213904a4f0f25d48c66d2
SHA19e1c96cb93f9c22fda4f64e6eb226f72afb33d96
SHA2564d7a6f7124908e54ebf66dd74eb047a7c785a16f931f9a0462389e857847d6b1
SHA5129118fc1091c3633d9084d499265f47c9b57dfe2e889ca43063b46168a827dc27cff1330a223d1030ee980cdae4d0848092bd1d7c6661c6eb822901b7ffa2f05a
-
C:\Windows\Installer\MSI966C.tmpFilesize
423KB
MD516f5faf4ddf213904a4f0f25d48c66d2
SHA19e1c96cb93f9c22fda4f64e6eb226f72afb33d96
SHA2564d7a6f7124908e54ebf66dd74eb047a7c785a16f931f9a0462389e857847d6b1
SHA5129118fc1091c3633d9084d499265f47c9b57dfe2e889ca43063b46168a827dc27cff1330a223d1030ee980cdae4d0848092bd1d7c6661c6eb822901b7ffa2f05a
-
C:\Windows\Installer\MSI971A.tmpFilesize
423KB
MD516f5faf4ddf213904a4f0f25d48c66d2
SHA19e1c96cb93f9c22fda4f64e6eb226f72afb33d96
SHA2564d7a6f7124908e54ebf66dd74eb047a7c785a16f931f9a0462389e857847d6b1
SHA5129118fc1091c3633d9084d499265f47c9b57dfe2e889ca43063b46168a827dc27cff1330a223d1030ee980cdae4d0848092bd1d7c6661c6eb822901b7ffa2f05a
-
C:\Windows\Installer\MSI971A.tmpFilesize
423KB
MD516f5faf4ddf213904a4f0f25d48c66d2
SHA19e1c96cb93f9c22fda4f64e6eb226f72afb33d96
SHA2564d7a6f7124908e54ebf66dd74eb047a7c785a16f931f9a0462389e857847d6b1
SHA5129118fc1091c3633d9084d499265f47c9b57dfe2e889ca43063b46168a827dc27cff1330a223d1030ee980cdae4d0848092bd1d7c6661c6eb822901b7ffa2f05a
-
C:\Windows\Installer\MSI9788.tmpFilesize
423KB
MD516f5faf4ddf213904a4f0f25d48c66d2
SHA19e1c96cb93f9c22fda4f64e6eb226f72afb33d96
SHA2564d7a6f7124908e54ebf66dd74eb047a7c785a16f931f9a0462389e857847d6b1
SHA5129118fc1091c3633d9084d499265f47c9b57dfe2e889ca43063b46168a827dc27cff1330a223d1030ee980cdae4d0848092bd1d7c6661c6eb822901b7ffa2f05a
-
\??\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\System Volume Information\SPP\metadata-2Filesize
23.0MB
MD510c1520520d13428a06da0a52556d7e0
SHA132766e35c426669551e1850f7eb975b2cef3c44e
SHA256ac63fdd5df36172a08125046d90ed8196f1ef721937338c1a2528f36d83f01ce
SHA51255e457226729f7de4e85a263e6ddd1716006320d6cf25a539cf0b04bc562005cbfa4074b74dd56b74a7da6a57ffd99d9cec82ba957938b67307f521de84eb5f6
-
\??\Volume{06969d78-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{1d55daa2-0e45-4c8f-9538-ce92d84390d4}_OnDiskSnapshotPropFilesize
5KB
MD5adf3d1d2c5fe29860edee5a48bc05161
SHA1681918685d1b6a2fdf72346c64eeeb6c21732a99
SHA2562eb7587f9090220e0b4b0d516e4105b7d71dc2de34098b42730b4b0905ed81b1
SHA512f97cf9e6ea6b06d4c704199e86ce5c1c25451c62fafa421a76653e64ceebadc5e99449d6ecef5eb641607bc408c87fe8797cf23a8b9acdda06825ba9ba9c8fb5
-
memory/216-137-0x0000000000000000-mapping.dmp
-
memory/408-132-0x0000000000000000-mapping.dmp
-
memory/520-220-0x0000000000000000-mapping.dmp
-
memory/660-212-0x0000000000000000-mapping.dmp
-
memory/752-201-0x0000000000000000-mapping.dmp
-
memory/760-223-0x0000000000000000-mapping.dmp
-
memory/868-139-0x0000000000000000-mapping.dmp
-
memory/1784-206-0x0000000000000000-mapping.dmp
-
memory/1968-204-0x0000000000000000-mapping.dmp
-
memory/2060-207-0x0000000000000000-mapping.dmp
-
memory/2076-209-0x0000000000000000-mapping.dmp
-
memory/3188-155-0x0000000000000000-mapping.dmp
-
memory/3472-203-0x0000000000000000-mapping.dmp
-
memory/4192-227-0x0000000000000000-mapping.dmp
-
memory/4452-166-0x0000000000000000-mapping.dmp
-
memory/4632-205-0x0000000000000000-mapping.dmp
-
memory/4664-202-0x0000000000000000-mapping.dmp
-
memory/4872-228-0x0000000000000000-mapping.dmp
-
memory/5008-215-0x0000000000000000-mapping.dmp