Analysis
-
max time kernel
1198s -
max time network
888s -
platform
windows10-1703_x64 -
resource
win10-20240221-en -
resource tags
arch:x64arch:x86image:win10-20240221-enlocale:en-usos:windows10-1703-x64system -
submitted
06/03/2024, 16:24
Behavioral task
behavioral1
Sample
Installer_patched.exe
Resource
win10-20240221-en
Behavioral task
behavioral2
Sample
Installer_patched.exe
Resource
win10v2004-20240226-en
General
-
Target
Installer_patched.exe
-
Size
18.9MB
-
MD5
2a189d9f7f70aa04cc814a207cf4ab82
-
SHA1
087f724eff0d1100541cf5fcc29f8180731f5ed7
-
SHA256
567b68b4686c9e40bb50a9697cf2393c0219f4873764efbb01a2a9b2d65f0bc5
-
SHA512
5016f7f1359303dec3f469de1ad249f2b16a294fe0d6b08f3068a720518165d5809191f3158c8529ccee78fe7d1561608ec8c062dd19b0f78360dc8182274ddd
-
SSDEEP
196608:B9GeDVI5DKBWZlkgJedYs6LtYdEhqTgKDV:BkYVI5DK2NNs6LtYdEhSpZ
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Installer_patched.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Installer_patched.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Installer_patched.exe -
Loads dropped DLL 1 IoCs
pid Process 1636 Installer_patched.exe -
Obfuscated with Agile.Net obfuscator 1 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
resource yara_rule behavioral1/memory/1636-1-0x0000000000AF0000-0x0000000001AF0000-memory.dmp agile_net -
resource yara_rule behavioral1/files/0x000700000001ac3b-6.dat themida behavioral1/memory/1636-9-0x00007FFDAB170000-0x00007FFDAB922000-memory.dmp themida behavioral1/memory/1636-11-0x00007FFDAB170000-0x00007FFDAB922000-memory.dmp themida behavioral1/memory/1636-35-0x00007FFDAB170000-0x00007FFDAB922000-memory.dmp themida behavioral1/memory/1636-169-0x00007FFDAB170000-0x00007FFDAB922000-memory.dmp themida behavioral1/memory/1636-176-0x00007FFDAB170000-0x00007FFDAB922000-memory.dmp themida behavioral1/memory/1636-308-0x00007FFDAB170000-0x00007FFDAB922000-memory.dmp themida behavioral1/memory/1636-374-0x00007FFDAB170000-0x00007FFDAB922000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Installer_patched.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1903027113-674645041-2759338396-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1903027113-674645041-2759338396-1000_Classes\Local Settings Installer_patched.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\2C98BA640FC85A79729E3A6A4C2365C0E78749EB Installer_patched.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\2C98BA640FC85A79729E3A6A4C2365C0E78749EB\Blob = 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 Installer_patched.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\2C98BA640FC85A79729E3A6A4C2365C0E78749EB\Blob = 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 Installer_patched.exe -
Suspicious behavior: EnumeratesProcesses 23 IoCs
pid Process 1636 Installer_patched.exe 1636 Installer_patched.exe 1636 Installer_patched.exe 4116 AcroRd32.exe 4116 AcroRd32.exe 4116 AcroRd32.exe 4116 AcroRd32.exe 4116 AcroRd32.exe 4116 AcroRd32.exe 4116 AcroRd32.exe 4116 AcroRd32.exe 4116 AcroRd32.exe 4116 AcroRd32.exe 4116 AcroRd32.exe 4116 AcroRd32.exe 4116 AcroRd32.exe 4116 AcroRd32.exe 4116 AcroRd32.exe 4116 AcroRd32.exe 4116 AcroRd32.exe 4116 AcroRd32.exe 4116 AcroRd32.exe 4116 AcroRd32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1636 Installer_patched.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4116 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 4116 AcroRd32.exe 4116 AcroRd32.exe 4116 AcroRd32.exe 4116 AcroRd32.exe 4116 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1636 wrote to memory of 4608 1636 Installer_patched.exe 72 PID 1636 wrote to memory of 4608 1636 Installer_patched.exe 72 PID 4608 wrote to memory of 4516 4608 csc.exe 74 PID 4608 wrote to memory of 4516 4608 csc.exe 74 PID 1636 wrote to memory of 4116 1636 Installer_patched.exe 75 PID 1636 wrote to memory of 4116 1636 Installer_patched.exe 75 PID 1636 wrote to memory of 4116 1636 Installer_patched.exe 75 PID 4116 wrote to memory of 2796 4116 AcroRd32.exe 76 PID 4116 wrote to memory of 2796 4116 AcroRd32.exe 76 PID 4116 wrote to memory of 2796 4116 AcroRd32.exe 76 PID 2796 wrote to memory of 3424 2796 RdrCEF.exe 77 PID 2796 wrote to memory of 3424 2796 RdrCEF.exe 77 PID 2796 wrote to memory of 3424 2796 RdrCEF.exe 77 PID 2796 wrote to memory of 3424 2796 RdrCEF.exe 77 PID 2796 wrote to memory of 3424 2796 RdrCEF.exe 77 PID 2796 wrote to memory of 3424 2796 RdrCEF.exe 77 PID 2796 wrote to memory of 3424 2796 RdrCEF.exe 77 PID 2796 wrote to memory of 3424 2796 RdrCEF.exe 77 PID 2796 wrote to memory of 3424 2796 RdrCEF.exe 77 PID 2796 wrote to memory of 3424 2796 RdrCEF.exe 77 PID 2796 wrote to memory of 3424 2796 RdrCEF.exe 77 PID 2796 wrote to memory of 3424 2796 RdrCEF.exe 77 PID 2796 wrote to memory of 3424 2796 RdrCEF.exe 77 PID 2796 wrote to memory of 3424 2796 RdrCEF.exe 77 PID 2796 wrote to memory of 3424 2796 RdrCEF.exe 77 PID 2796 wrote to memory of 3424 2796 RdrCEF.exe 77 PID 2796 wrote to memory of 3424 2796 RdrCEF.exe 77 PID 2796 wrote to memory of 3424 2796 RdrCEF.exe 77 PID 2796 wrote to memory of 3424 2796 RdrCEF.exe 77 PID 2796 wrote to memory of 3424 2796 RdrCEF.exe 77 PID 2796 wrote to memory of 3424 2796 RdrCEF.exe 77 PID 2796 wrote to memory of 3424 2796 RdrCEF.exe 77 PID 2796 wrote to memory of 3424 2796 RdrCEF.exe 77 PID 2796 wrote to memory of 3424 2796 RdrCEF.exe 77 PID 2796 wrote to memory of 3424 2796 RdrCEF.exe 77 PID 2796 wrote to memory of 3424 2796 RdrCEF.exe 77 PID 2796 wrote to memory of 3424 2796 RdrCEF.exe 77 PID 2796 wrote to memory of 3424 2796 RdrCEF.exe 77 PID 2796 wrote to memory of 3424 2796 RdrCEF.exe 77 PID 2796 wrote to memory of 3424 2796 RdrCEF.exe 77 PID 2796 wrote to memory of 3424 2796 RdrCEF.exe 77 PID 2796 wrote to memory of 3424 2796 RdrCEF.exe 77 PID 2796 wrote to memory of 3424 2796 RdrCEF.exe 77 PID 2796 wrote to memory of 3424 2796 RdrCEF.exe 77 PID 2796 wrote to memory of 3424 2796 RdrCEF.exe 77 PID 2796 wrote to memory of 3424 2796 RdrCEF.exe 77 PID 2796 wrote to memory of 3424 2796 RdrCEF.exe 77 PID 2796 wrote to memory of 3424 2796 RdrCEF.exe 77 PID 2796 wrote to memory of 3424 2796 RdrCEF.exe 77 PID 2796 wrote to memory of 3424 2796 RdrCEF.exe 77 PID 2796 wrote to memory of 3424 2796 RdrCEF.exe 77 PID 2796 wrote to memory of 1120 2796 RdrCEF.exe 78 PID 2796 wrote to memory of 1120 2796 RdrCEF.exe 78 PID 2796 wrote to memory of 1120 2796 RdrCEF.exe 78 PID 2796 wrote to memory of 1120 2796 RdrCEF.exe 78 PID 2796 wrote to memory of 1120 2796 RdrCEF.exe 78 PID 2796 wrote to memory of 1120 2796 RdrCEF.exe 78 PID 2796 wrote to memory of 1120 2796 RdrCEF.exe 78 PID 2796 wrote to memory of 1120 2796 RdrCEF.exe 78 PID 2796 wrote to memory of 1120 2796 RdrCEF.exe 78 PID 2796 wrote to memory of 1120 2796 RdrCEF.exe 78 PID 2796 wrote to memory of 1120 2796 RdrCEF.exe 78 PID 2796 wrote to memory of 1120 2796 RdrCEF.exe 78 PID 2796 wrote to memory of 1120 2796 RdrCEF.exe 78
Processes
-
C:\Users\Admin\AppData\Local\Temp\Installer_patched.exe"C:\Users\Admin\AppData\Local\Temp\Installer_patched.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Loads dropped DLL
- Checks whether UAC is enabled
- Modifies registry class
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\ael5pzgr\ael5pzgr.cmdline"2⤵
- Suspicious use of WriteProcessMemory
PID:4608 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESBDE1.tmp" "c:\Users\Admin\AppData\Local\Temp\ael5pzgr\CSC36FF8B0C10DE45C981EEEEABF437F3B4.TMP"3⤵PID:4516
-
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\~P9341841.pdf"2⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4116 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140433⤵
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=FFC1C7191B14C7D8D7D03E6141AD1C42 --mojo-platform-channel-handle=1640 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵PID:3424
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=7C481EB2D82B8083E74E94CFD535A0E1 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=7C481EB2D82B8083E74E94CFD535A0E1 --renderer-client-id=2 --mojo-platform-channel-handle=1632 --allow-no-sandbox-job /prefetch:14⤵PID:1120
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=CEEA8B59E7BDCC6DF9881DC21BA38819 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=CEEA8B59E7BDCC6DF9881DC21BA38819 --renderer-client-id=4 --mojo-platform-channel-handle=2224 --allow-no-sandbox-job /prefetch:14⤵PID:5092
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=A9C6D026F6F1FBC448AD32FF09BEFADD --mojo-platform-channel-handle=2576 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵PID:2776
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=77978EB30365C994E5DB384655A4E283 --mojo-platform-channel-handle=1852 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵PID:1644
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=F50F9943D5CF147DE7CBE56627F22E35 --mojo-platform-channel-handle=2668 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵PID:960
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD51575b144bb07242471c28136b85f3378
SHA17e098974c7f4163e091a9d812ebb660e861d56a7
SHA2560e4725da3247ef01ab53b0a7ccc0ed3077ccfb9d1f6f7c5e32f574873e6add7b
SHA512bac138462504492333b746e771611767bb8ec9fdf739207f833d60812e330f432059f304b3e4bfedf5671b33a9548fa579108b2e3a506b322615cf83845f613c
-
Filesize
36KB
MD5b30d3becc8731792523d599d949e63f5
SHA119350257e42d7aee17fb3bf139a9d3adb330fad4
SHA256b1b77e96279ead2b460de3de70e2ea4f5ad1b853598a4e27a5caf3f1a32cc4f3
SHA512523f54895fb07f62b9a5f72c8b62e83d4d9506bda57b183818615f6eb7286e3b9c5a50409bc5c5164867c3ccdeae88aa395ecca6bc7e36d991552f857510792e
-
Filesize
56KB
MD5752a1f26b18748311b691c7d8fc20633
SHA1c1f8e83eebc1cc1e9b88c773338eb09ff82ab862
SHA256111dac2948e4cecb10b0d2e10d8afaa663d78d643826b592d6414a1fd77cc131
SHA512a2f5f262faf2c3e9756da94b2c47787ce3a9391b5bd53581578aa9a764449e114836704d6dec4aadc097fed4c818831baa11affa1eb25be2bfad9349bb090fe5
-
Filesize
1KB
MD5126831cae3fdfb3f44876a01303bd4f2
SHA16e1760fd340c067b0784fc2fd4d90a6b710456b1
SHA25669fcadfde357328ed301972a5d3f37d62aabaf3003870b4773caf66fea3a4aa1
SHA512fdf5712fcb16ff9f020bacfa45fd78fee9104ce16bebb1acc38f7191a31c84dc0498db95e6008561ce9f52778da9209d6016d12423135f08ac2350484532e3eb
-
Filesize
3KB
MD5fddfcd575d3e6372a82b3a8b7be888ff
SHA1824f298b3d0ce154b9aa1734b395f0d466f2c6a4
SHA25665a4a7039621124cfaf29122f730eeb23906714e8283cd38646bae79b83ddaaa
SHA5123231e144df3c965071362c324b4955b46c1e61f1ec32bf0bf43cfaa121eeaf59e88892f1a24ce6d7c5a0e43215be8ac0a9e42874c87995f462d138b3fa23a1de
-
Filesize
1.2MB
MD568f8dd08d18ffcab6ce7cd36b2afb628
SHA156ff35449bbc305f220b3341242834e03de03e1a
SHA25645a0e460d69c8bc0af5d2ec0c04e54dcc6c1ec2fd2d09a20f72f8a7adc46569c
SHA512529dd745877bc71a5ecd7f424ebb48576cb6893b12ad4e93c31a1618549f02b79804b63aea55727234645c97112271a82e236ab9e8f0f1aba98e2feae56f41ca
-
Filesize
652B
MD52d986d4b8a9e9d572adef2235f4e264b
SHA11f5301fc51c776d63061ccbd82eba123f20a126a
SHA256fd2587e4d5285e1c96b7de7f788e03f2aca7901cec00ef23ac6e089eb66c0d43
SHA512474852a86c25c7f0743a8cb46d0ebfef71dc03536e63d9dcacb78d6d52c44ba68975dd99387aaa419032eef90e7ed28e660b2da307f504ed04a9add28459ab2e
-
Filesize
244B
MD5b999975748af32dd007ff48814430b26
SHA146b54a3e3be2d3497127d67b96b3f6a55d26447d
SHA256ed13935d6ac43e5ce0419aa7d162dbc70562c02dedacb81d5efdfc609a035c69
SHA512f8e48caaac395db45ac4c8a899dbd64305dd6f57fcd22919a6d880b035455286d3504b097dca250d4ea283004cb64d47e376901b8fae65f4fa792234dee9f81e
-
Filesize
369B
MD5cbc723c7d103c10dbed8062f2dc0fc06
SHA10a0c59e48d7e23fc45402924bdd1acc3184940ec
SHA256aa16824cfad60e584d0687155b1f2ebc6416ebc3742946f66eee8f491b9af52e
SHA5125d749cee980b6e0ad8ccc5a0ed48fe25ee71884757bdccc19b201c43885e701645b5c2beaad6d01e5dd735b801ee403d72881a65b1af4c5fbf1a0fda6d605af1
-
Filesize
2.9MB
MD59bb6ed08af544d3738e60200d2804180
SHA15a40b484ca56b1ce59add4ec283e21d60070be02
SHA25686d49f3894cc3de038abcde03803de8b6f239c237f34930ce5c41ab725c26cb7
SHA51263e6b90457c3e3e6e419e30fe57e35c66e08059611fbe4ffb60d28acd6ee8d9f0ccfa31d7b27e9af44ab13512490f3b7b7f5130df947c5de50a937dcee0a91a5