Analysis
-
max time kernel
123s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
05-02-2023 09:22
Static task
static1
Behavioral task
behavioral1
Sample
8X/Code_Of_Conduct_-_2023(EN-US).exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8X/Code_Of_Conduct_-_2023(EN-US).exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
8X/MEXCGBL_COC_JAN23(JP).pdf.exe
Resource
win7-20221111-en
Behavioral task
behavioral4
Sample
8X/MEXCGBL_COC_JAN23(JP).pdf.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral5
Sample
8X/MEXCGBL_COC_JAN23(ZH-CN).pdf.exe
Resource
win7-20221111-en
General
-
Target
8X/MEXCGBL_COC_JAN23(JP).pdf.exe
-
Size
3.2MB
-
MD5
4213034709d158d906bc9f6c939a60cd
-
SHA1
6a9be511949d2f973150b4a110d4b881407f3575
-
SHA256
996032d5038305591ff35a216874b4ecc748d3c1237442b532bb053b0a932c6c
-
SHA512
e46e73321676ceaae08dc5b6241697eb3d64ab7b6c1f2a1c23f09932435ebac52a447b1ebdd942c668f0505195daaa28486d44de8cd9f7319765f319668a5495
-
SSDEEP
24576:bcqJge1JYGhCP3dbTb2XShCFVshuhBcomEl+11sILYx9pn0VTVL79eWP:EyXALoh+9YvWTtZp
Malware Config
Signatures
-
ParallaxRat payload 1 IoCs
Detects payload of Parallax Rat, a small portable Rat usually digitally signed with a Sectigo certificate.
resource yara_rule behavioral4/memory/532-137-0x0000000000400000-0x000000000073C000-memory.dmp parallax_rat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation MEXCGBL_COC_JAN23(JP).pdf.exe -
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Search.exe.exe DllHost.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Search.exe.exe DllHost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000_Classes\Local Settings MEXCGBL_COC_JAN23(JP).pdf.exe -
Suspicious behavior: EnumeratesProcesses 62 IoCs
pid Process 532 MEXCGBL_COC_JAN23(JP).pdf.exe 532 MEXCGBL_COC_JAN23(JP).pdf.exe 532 MEXCGBL_COC_JAN23(JP).pdf.exe 532 MEXCGBL_COC_JAN23(JP).pdf.exe 532 MEXCGBL_COC_JAN23(JP).pdf.exe 532 MEXCGBL_COC_JAN23(JP).pdf.exe 532 MEXCGBL_COC_JAN23(JP).pdf.exe 532 MEXCGBL_COC_JAN23(JP).pdf.exe 532 MEXCGBL_COC_JAN23(JP).pdf.exe 532 MEXCGBL_COC_JAN23(JP).pdf.exe 532 MEXCGBL_COC_JAN23(JP).pdf.exe 532 MEXCGBL_COC_JAN23(JP).pdf.exe 532 MEXCGBL_COC_JAN23(JP).pdf.exe 532 MEXCGBL_COC_JAN23(JP).pdf.exe 532 MEXCGBL_COC_JAN23(JP).pdf.exe 532 MEXCGBL_COC_JAN23(JP).pdf.exe 532 MEXCGBL_COC_JAN23(JP).pdf.exe 532 MEXCGBL_COC_JAN23(JP).pdf.exe 532 MEXCGBL_COC_JAN23(JP).pdf.exe 532 MEXCGBL_COC_JAN23(JP).pdf.exe 532 MEXCGBL_COC_JAN23(JP).pdf.exe 532 MEXCGBL_COC_JAN23(JP).pdf.exe 532 MEXCGBL_COC_JAN23(JP).pdf.exe 532 MEXCGBL_COC_JAN23(JP).pdf.exe 532 MEXCGBL_COC_JAN23(JP).pdf.exe 532 MEXCGBL_COC_JAN23(JP).pdf.exe 532 MEXCGBL_COC_JAN23(JP).pdf.exe 532 MEXCGBL_COC_JAN23(JP).pdf.exe 532 MEXCGBL_COC_JAN23(JP).pdf.exe 532 MEXCGBL_COC_JAN23(JP).pdf.exe 532 MEXCGBL_COC_JAN23(JP).pdf.exe 532 MEXCGBL_COC_JAN23(JP).pdf.exe 532 MEXCGBL_COC_JAN23(JP).pdf.exe 532 MEXCGBL_COC_JAN23(JP).pdf.exe 532 MEXCGBL_COC_JAN23(JP).pdf.exe 532 MEXCGBL_COC_JAN23(JP).pdf.exe 532 MEXCGBL_COC_JAN23(JP).pdf.exe 532 MEXCGBL_COC_JAN23(JP).pdf.exe 532 MEXCGBL_COC_JAN23(JP).pdf.exe 532 MEXCGBL_COC_JAN23(JP).pdf.exe 532 MEXCGBL_COC_JAN23(JP).pdf.exe 532 MEXCGBL_COC_JAN23(JP).pdf.exe 4068 AcroRd32.exe 4068 AcroRd32.exe 4068 AcroRd32.exe 4068 AcroRd32.exe 4068 AcroRd32.exe 4068 AcroRd32.exe 4068 AcroRd32.exe 4068 AcroRd32.exe 4068 AcroRd32.exe 4068 AcroRd32.exe 4068 AcroRd32.exe 4068 AcroRd32.exe 4068 AcroRd32.exe 4068 AcroRd32.exe 4068 AcroRd32.exe 4068 AcroRd32.exe 4068 AcroRd32.exe 4068 AcroRd32.exe 4068 AcroRd32.exe 4068 AcroRd32.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeShutdownPrivilege 676 Explorer.EXE Token: SeCreatePagefilePrivilege 676 Explorer.EXE Token: SeShutdownPrivilege 676 Explorer.EXE Token: SeCreatePagefilePrivilege 676 Explorer.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4068 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 4068 AcroRd32.exe 4068 AcroRd32.exe 4068 AcroRd32.exe 4068 AcroRd32.exe 4068 AcroRd32.exe 4068 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 532 wrote to memory of 4068 532 MEXCGBL_COC_JAN23(JP).pdf.exe 81 PID 532 wrote to memory of 4068 532 MEXCGBL_COC_JAN23(JP).pdf.exe 81 PID 532 wrote to memory of 4068 532 MEXCGBL_COC_JAN23(JP).pdf.exe 81 PID 532 wrote to memory of 676 532 MEXCGBL_COC_JAN23(JP).pdf.exe 36 PID 4068 wrote to memory of 2312 4068 AcroRd32.exe 82 PID 4068 wrote to memory of 2312 4068 AcroRd32.exe 82 PID 4068 wrote to memory of 2312 4068 AcroRd32.exe 82 PID 2312 wrote to memory of 3152 2312 RdrCEF.exe 85 PID 2312 wrote to memory of 3152 2312 RdrCEF.exe 85 PID 2312 wrote to memory of 3152 2312 RdrCEF.exe 85 PID 2312 wrote to memory of 3152 2312 RdrCEF.exe 85 PID 2312 wrote to memory of 3152 2312 RdrCEF.exe 85 PID 2312 wrote to memory of 3152 2312 RdrCEF.exe 85 PID 2312 wrote to memory of 3152 2312 RdrCEF.exe 85 PID 2312 wrote to memory of 3152 2312 RdrCEF.exe 85 PID 2312 wrote to memory of 3152 2312 RdrCEF.exe 85 PID 2312 wrote to memory of 3152 2312 RdrCEF.exe 85 PID 2312 wrote to memory of 3152 2312 RdrCEF.exe 85 PID 2312 wrote to memory of 3152 2312 RdrCEF.exe 85 PID 2312 wrote to memory of 3152 2312 RdrCEF.exe 85 PID 2312 wrote to memory of 3152 2312 RdrCEF.exe 85 PID 2312 wrote to memory of 3152 2312 RdrCEF.exe 85 PID 2312 wrote to memory of 3152 2312 RdrCEF.exe 85 PID 2312 wrote to memory of 3152 2312 RdrCEF.exe 85 PID 2312 wrote to memory of 3152 2312 RdrCEF.exe 85 PID 2312 wrote to memory of 3152 2312 RdrCEF.exe 85 PID 2312 wrote to memory of 3152 2312 RdrCEF.exe 85 PID 2312 wrote to memory of 3152 2312 RdrCEF.exe 85 PID 2312 wrote to memory of 3152 2312 RdrCEF.exe 85 PID 2312 wrote to memory of 3152 2312 RdrCEF.exe 85 PID 2312 wrote to memory of 3152 2312 RdrCEF.exe 85 PID 2312 wrote to memory of 3152 2312 RdrCEF.exe 85 PID 2312 wrote to memory of 3152 2312 RdrCEF.exe 85 PID 2312 wrote to memory of 3152 2312 RdrCEF.exe 85 PID 2312 wrote to memory of 3152 2312 RdrCEF.exe 85 PID 2312 wrote to memory of 3152 2312 RdrCEF.exe 85 PID 2312 wrote to memory of 3152 2312 RdrCEF.exe 85 PID 2312 wrote to memory of 3152 2312 RdrCEF.exe 85 PID 2312 wrote to memory of 3152 2312 RdrCEF.exe 85 PID 2312 wrote to memory of 3152 2312 RdrCEF.exe 85 PID 2312 wrote to memory of 3152 2312 RdrCEF.exe 85 PID 2312 wrote to memory of 3152 2312 RdrCEF.exe 85 PID 2312 wrote to memory of 3152 2312 RdrCEF.exe 85 PID 2312 wrote to memory of 3152 2312 RdrCEF.exe 85 PID 2312 wrote to memory of 3152 2312 RdrCEF.exe 85 PID 2312 wrote to memory of 3152 2312 RdrCEF.exe 85 PID 2312 wrote to memory of 3152 2312 RdrCEF.exe 85 PID 2312 wrote to memory of 3152 2312 RdrCEF.exe 85 PID 2312 wrote to memory of 4768 2312 RdrCEF.exe 86 PID 2312 wrote to memory of 4768 2312 RdrCEF.exe 86 PID 2312 wrote to memory of 4768 2312 RdrCEF.exe 86 PID 2312 wrote to memory of 4768 2312 RdrCEF.exe 86 PID 2312 wrote to memory of 4768 2312 RdrCEF.exe 86 PID 2312 wrote to memory of 4768 2312 RdrCEF.exe 86 PID 2312 wrote to memory of 4768 2312 RdrCEF.exe 86 PID 2312 wrote to memory of 4768 2312 RdrCEF.exe 86 PID 2312 wrote to memory of 4768 2312 RdrCEF.exe 86 PID 2312 wrote to memory of 4768 2312 RdrCEF.exe 86 PID 2312 wrote to memory of 4768 2312 RdrCEF.exe 86 PID 2312 wrote to memory of 4768 2312 RdrCEF.exe 86 PID 2312 wrote to memory of 4768 2312 RdrCEF.exe 86 PID 2312 wrote to memory of 4768 2312 RdrCEF.exe 86 PID 2312 wrote to memory of 4768 2312 RdrCEF.exe 86 PID 2312 wrote to memory of 4768 2312 RdrCEF.exe 86
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
PID:676 -
C:\Users\Admin\AppData\Local\Temp\8X\MEXCGBL_COC_JAN23(JP).pdf.exe"C:\Users\Admin\AppData\Local\Temp\8X\MEXCGBL_COC_JAN23(JP).pdf.exe"2⤵
- Checks computer location settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:532 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\uPNKX.pdf"3⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4068 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140434⤵
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=E09235C79BCA35C5E2B2C40C2BA3DDC9 --mojo-platform-channel-handle=1760 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:25⤵PID:3152
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=02A0667EE661DC80A5D35A41E9957007 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=1 --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=02A0667EE661DC80A5D35A41E9957007 --renderer-client-id=2 --mojo-platform-channel-handle=1772 --allow-no-sandbox-job /prefetch:15⤵PID:4768
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=D30AB3733DBA71BA2F49C7C625514C9C --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=1 --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=D30AB3733DBA71BA2F49C7C625514C9C --renderer-client-id=4 --mojo-platform-channel-handle=2172 --allow-no-sandbox-job /prefetch:15⤵PID:960
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=55F14D733FED39635E6166AA04340E7E --mojo-platform-channel-handle=2560 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:25⤵PID:2080
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=0E858F0004F22C62869B8965CBDFA36A --mojo-platform-channel-handle=1824 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:25⤵PID:3208
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=00E99A5DB815E2954279FCD76619A60A --mojo-platform-channel-handle=1764 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:25⤵PID:4136
-
-
-
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{3AD05575-8857-4850-9277-11B85BDB8E09}1⤵
- Drops startup file
PID:1896
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3748
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
108KB
MD5581f6d01f96f99e2417042eca4686957
SHA1b91f2d78e13e623752854639fc7435e294d92114
SHA25615eadadf55c509ebfa738a7c33a14fb146205fd5fc8a6af83dfb74f7105f71e0
SHA5129966c09e6341d5d329c0377a1b3aea9346671015a02c97ad43f993d44ee1d7ee9007715a0c5fba3406f4b6f63ebe4df0158be68e87194bf7d90e7c44ead221c9