Analysis
-
max time kernel
1201s -
max time network
1211s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
06/03/2024, 16:24
Behavioral task
behavioral1
Sample
Installer_patched.exe
Resource
win10-20240221-en
Behavioral task
behavioral2
Sample
Installer_patched.exe
Resource
win10v2004-20240226-en
General
-
Target
Installer_patched.exe
-
Size
18.9MB
-
MD5
2a189d9f7f70aa04cc814a207cf4ab82
-
SHA1
087f724eff0d1100541cf5fcc29f8180731f5ed7
-
SHA256
567b68b4686c9e40bb50a9697cf2393c0219f4873764efbb01a2a9b2d65f0bc5
-
SHA512
5016f7f1359303dec3f469de1ad249f2b16a294fe0d6b08f3068a720518165d5809191f3158c8529ccee78fe7d1561608ec8c062dd19b0f78360dc8182274ddd
-
SSDEEP
196608:B9GeDVI5DKBWZlkgJedYs6LtYdEhqTgKDV:BkYVI5DK2NNs6LtYdEhSpZ
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Installer_patched.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Installer_patched.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Installer_patched.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation Installer_patched.exe -
Loads dropped DLL 1 IoCs
pid Process 1048 Installer_patched.exe -
Obfuscated with Agile.Net obfuscator 1 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
resource yara_rule behavioral2/memory/1048-0-0x00000000002A0000-0x00000000012A0000-memory.dmp agile_net -
resource yara_rule behavioral2/files/0x000b000000023214-6.dat themida behavioral2/memory/1048-9-0x00007FF9E59B0000-0x00007FF9E6162000-memory.dmp themida behavioral2/memory/1048-11-0x00007FF9E59B0000-0x00007FF9E6162000-memory.dmp themida behavioral2/memory/1048-26-0x00007FF9E59B0000-0x00007FF9E6162000-memory.dmp themida behavioral2/memory/1048-42-0x00007FF9E59B0000-0x00007FF9E6162000-memory.dmp themida behavioral2/memory/1048-45-0x00007FF9E59B0000-0x00007FF9E6162000-memory.dmp themida behavioral2/memory/1048-91-0x00007FF9E59B0000-0x00007FF9E6162000-memory.dmp themida behavioral2/memory/1048-181-0x00007FF9E59B0000-0x00007FF9E6162000-memory.dmp themida behavioral2/memory/1048-234-0x00007FF9E59B0000-0x00007FF9E6162000-memory.dmp themida behavioral2/memory/1048-252-0x00007FF9E59B0000-0x00007FF9E6162000-memory.dmp themida behavioral2/memory/1048-276-0x00007FF9E59B0000-0x00007FF9E6162000-memory.dmp themida behavioral2/memory/1048-306-0x00007FF9E59B0000-0x00007FF9E6162000-memory.dmp themida behavioral2/memory/1048-312-0x00007FF9E59B0000-0x00007FF9E6162000-memory.dmp themida behavioral2/memory/1048-336-0x00007FF9E59B0000-0x00007FF9E6162000-memory.dmp themida behavioral2/memory/1048-378-0x00007FF9E59B0000-0x00007FF9E6162000-memory.dmp themida behavioral2/memory/1048-396-0x00007FF9E59B0000-0x00007FF9E6162000-memory.dmp themida behavioral2/memory/1048-432-0x00007FF9E59B0000-0x00007FF9E6162000-memory.dmp themida behavioral2/memory/1048-516-0x00007FF9E59B0000-0x00007FF9E6162000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Installer_patched.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings Installer_patched.exe -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 1048 Installer_patched.exe 1048 Installer_patched.exe 1048 Installer_patched.exe 1768 AcroRd32.exe 1768 AcroRd32.exe 1768 AcroRd32.exe 1768 AcroRd32.exe 1768 AcroRd32.exe 1768 AcroRd32.exe 1768 AcroRd32.exe 1768 AcroRd32.exe 1768 AcroRd32.exe 1768 AcroRd32.exe 1768 AcroRd32.exe 1768 AcroRd32.exe 1768 AcroRd32.exe 1768 AcroRd32.exe 1768 AcroRd32.exe 1768 AcroRd32.exe 1768 AcroRd32.exe 1768 AcroRd32.exe 1768 AcroRd32.exe 1768 AcroRd32.exe 1768 AcroRd32.exe 1768 AcroRd32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1048 Installer_patched.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1768 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 1768 AcroRd32.exe 1768 AcroRd32.exe 1768 AcroRd32.exe 1768 AcroRd32.exe 1768 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1048 wrote to memory of 1924 1048 Installer_patched.exe 97 PID 1048 wrote to memory of 1924 1048 Installer_patched.exe 97 PID 1924 wrote to memory of 4620 1924 csc.exe 99 PID 1924 wrote to memory of 4620 1924 csc.exe 99 PID 1048 wrote to memory of 1768 1048 Installer_patched.exe 100 PID 1048 wrote to memory of 1768 1048 Installer_patched.exe 100 PID 1048 wrote to memory of 1768 1048 Installer_patched.exe 100 PID 1768 wrote to memory of 4472 1768 AcroRd32.exe 103 PID 1768 wrote to memory of 4472 1768 AcroRd32.exe 103 PID 1768 wrote to memory of 4472 1768 AcroRd32.exe 103 PID 1768 wrote to memory of 4080 1768 AcroRd32.exe 104 PID 1768 wrote to memory of 4080 1768 AcroRd32.exe 104 PID 1768 wrote to memory of 4080 1768 AcroRd32.exe 104 PID 1768 wrote to memory of 1712 1768 AcroRd32.exe 105 PID 1768 wrote to memory of 1712 1768 AcroRd32.exe 105 PID 1768 wrote to memory of 1712 1768 AcroRd32.exe 105 PID 1712 wrote to memory of 2120 1712 RdrCEF.exe 106 PID 1712 wrote to memory of 2120 1712 RdrCEF.exe 106 PID 1712 wrote to memory of 2120 1712 RdrCEF.exe 106 PID 1712 wrote to memory of 2120 1712 RdrCEF.exe 106 PID 1712 wrote to memory of 2120 1712 RdrCEF.exe 106 PID 1712 wrote to memory of 2120 1712 RdrCEF.exe 106 PID 1712 wrote to memory of 2120 1712 RdrCEF.exe 106 PID 1712 wrote to memory of 2120 1712 RdrCEF.exe 106 PID 1712 wrote to memory of 2120 1712 RdrCEF.exe 106 PID 1712 wrote to memory of 2120 1712 RdrCEF.exe 106 PID 1712 wrote to memory of 2120 1712 RdrCEF.exe 106 PID 1712 wrote to memory of 2120 1712 RdrCEF.exe 106 PID 1712 wrote to memory of 2120 1712 RdrCEF.exe 106 PID 1712 wrote to memory of 2120 1712 RdrCEF.exe 106 PID 1712 wrote to memory of 2120 1712 RdrCEF.exe 106 PID 1712 wrote to memory of 2120 1712 RdrCEF.exe 106 PID 1712 wrote to memory of 2120 1712 RdrCEF.exe 106 PID 1712 wrote to memory of 2120 1712 RdrCEF.exe 106 PID 1712 wrote to memory of 2120 1712 RdrCEF.exe 106 PID 1712 wrote to memory of 2120 1712 RdrCEF.exe 106 PID 1712 wrote to memory of 2120 1712 RdrCEF.exe 106 PID 1712 wrote to memory of 2120 1712 RdrCEF.exe 106 PID 1712 wrote to memory of 2120 1712 RdrCEF.exe 106 PID 1712 wrote to memory of 2120 1712 RdrCEF.exe 106 PID 1712 wrote to memory of 2120 1712 RdrCEF.exe 106 PID 1712 wrote to memory of 2120 1712 RdrCEF.exe 106 PID 1712 wrote to memory of 2120 1712 RdrCEF.exe 106 PID 1712 wrote to memory of 2120 1712 RdrCEF.exe 106 PID 1712 wrote to memory of 2120 1712 RdrCEF.exe 106 PID 1712 wrote to memory of 2120 1712 RdrCEF.exe 106 PID 1712 wrote to memory of 2120 1712 RdrCEF.exe 106 PID 1712 wrote to memory of 2120 1712 RdrCEF.exe 106 PID 1712 wrote to memory of 2120 1712 RdrCEF.exe 106 PID 1712 wrote to memory of 2120 1712 RdrCEF.exe 106 PID 1712 wrote to memory of 2120 1712 RdrCEF.exe 106 PID 1712 wrote to memory of 2120 1712 RdrCEF.exe 106 PID 1712 wrote to memory of 2120 1712 RdrCEF.exe 106 PID 1712 wrote to memory of 2120 1712 RdrCEF.exe 106 PID 1712 wrote to memory of 2120 1712 RdrCEF.exe 106 PID 1712 wrote to memory of 2120 1712 RdrCEF.exe 106 PID 1712 wrote to memory of 2120 1712 RdrCEF.exe 106 PID 1712 wrote to memory of 4396 1712 RdrCEF.exe 107 PID 1712 wrote to memory of 4396 1712 RdrCEF.exe 107 PID 1712 wrote to memory of 4396 1712 RdrCEF.exe 107 PID 1712 wrote to memory of 4396 1712 RdrCEF.exe 107 PID 1712 wrote to memory of 4396 1712 RdrCEF.exe 107 PID 1712 wrote to memory of 4396 1712 RdrCEF.exe 107 PID 1712 wrote to memory of 4396 1712 RdrCEF.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\Installer_patched.exe"C:\Users\Admin\AppData\Local\Temp\Installer_patched.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Loads dropped DLL
- Checks whether UAC is enabled
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\osmdv0ht\osmdv0ht.cmdline"2⤵
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES29AB.tmp" "c:\Users\Admin\AppData\Local\Temp\osmdv0ht\CSCD4E824A1A1D448FF836088BB8E2A7625.TMP"3⤵PID:4620
-
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\~P9341841.pdf"2⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140433⤵PID:4472
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140433⤵PID:4080
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140433⤵
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=2BB8CA7EF6281A47D9BD103656E512F0 --mojo-platform-channel-handle=1740 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵PID:2120
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=A0DEC4BB5BA1EE36743924BB2CBE6E9F --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=A0DEC4BB5BA1EE36743924BB2CBE6E9F --renderer-client-id=2 --mojo-platform-channel-handle=1752 --allow-no-sandbox-job /prefetch:14⤵PID:4396
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=1290B962BAEA1B54A4DB4B6B0EDD6E29 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=1290B962BAEA1B54A4DB4B6B0EDD6E29 --renderer-client-id=4 --mojo-platform-channel-handle=2184 --allow-no-sandbox-job /prefetch:14⤵PID:2904
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=A0E5B265F4811ADA39556FF6696A9C0D --mojo-platform-channel-handle=1864 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵PID:388
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=03F85961B4DED19C1EEC877F8840D771 --mojo-platform-channel-handle=2588 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵PID:3972
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=B5510D92CAC7876F06C246B3FC0F35DB --mojo-platform-channel-handle=2564 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵PID:776
-
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3920
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1420 --field-trial-handle=1928,i,13242902252791919845,10377620236057253993,262144 --variations-seed-version /prefetch:81⤵PID:1992
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1404 --field-trial-handle=1928,i,13242902252791919845,10377620236057253993,262144 --variations-seed-version /prefetch:81⤵PID:1648
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5414a46c541882224150eb6952dbac2d0
SHA15916e11378742ae4120f3d861d003bc0bfaed8e9
SHA256666fe824035e94d08885954dd68d5d362af86207374846709b9632148bc442ff
SHA51261c3694305538e62000298adf51b402b7a842fdee66ff4656fb842c37b9ffb1ffccce7f2ce6452c7840ea1f006960ebeb8e45542ff150b2efbc2978297a4f87e
-
Filesize
36KB
MD5b30d3becc8731792523d599d949e63f5
SHA119350257e42d7aee17fb3bf139a9d3adb330fad4
SHA256b1b77e96279ead2b460de3de70e2ea4f5ad1b853598a4e27a5caf3f1a32cc4f3
SHA512523f54895fb07f62b9a5f72c8b62e83d4d9506bda57b183818615f6eb7286e3b9c5a50409bc5c5164867c3ccdeae88aa395ecca6bc7e36d991552f857510792e
-
Filesize
56KB
MD5752a1f26b18748311b691c7d8fc20633
SHA1c1f8e83eebc1cc1e9b88c773338eb09ff82ab862
SHA256111dac2948e4cecb10b0d2e10d8afaa663d78d643826b592d6414a1fd77cc131
SHA512a2f5f262faf2c3e9756da94b2c47787ce3a9391b5bd53581578aa9a764449e114836704d6dec4aadc097fed4c818831baa11affa1eb25be2bfad9349bb090fe5
-
Filesize
12KB
MD5180c964360b0bf0afdde9f73f8737b66
SHA1a86667f29babe2b7d9100faa95166e7dadbba1a9
SHA256f223dbbf6f4f68b2492e34c236cd3937a02c3b561dd04e18969e44232d5eef5a
SHA512315bbd0aeb42afcb2b1f17f819cc4781ecb133457207dd1c2110641971ebdb44f39f1466be2bd6a36ac648fd1fb8d9d7730550a946ad58770064c2f6d57b266e
-
Filesize
2.9MB
MD59bb6ed08af544d3738e60200d2804180
SHA15a40b484ca56b1ce59add4ec283e21d60070be02
SHA25686d49f3894cc3de038abcde03803de8b6f239c237f34930ce5c41ab725c26cb7
SHA51263e6b90457c3e3e6e419e30fe57e35c66e08059611fbe4ffb60d28acd6ee8d9f0ccfa31d7b27e9af44ab13512490f3b7b7f5130df947c5de50a937dcee0a91a5
-
Filesize
1KB
MD565372e15063ecc5a63a1a16931cc13b3
SHA13af56501af3f69226653ae5f3fd3f0efd0fcf577
SHA25669ce2307debcac1b84dca74e949c63c4f83b28d67dde2684c58ead882720a51f
SHA512b08d09824612692c7a471eefdca1b9087724f2e4ed33ab16c6220bf9dd2026e66bcc1db4ea0f172d7fea9ef0c9e6805da9205f214423e04ad6fe25a6e8a0e8e9
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
3KB
MD51ee5f68e28ac6447f97b31e9f175f912
SHA10f97c8d66abb3553cd2b3f4256762eb7f53cf360
SHA256f63a82eedaf685b527b495a12ae42b711db8e751225fc4f0a2f39e33def146d5
SHA51206bfe77855a007701abf75bffdfdf20d054fa40c3dad4a2ca9b46398127c5379b94e28fdc0aa31ba791682a86fd255a2744487539f274b8ff27a087397348933
-
Filesize
1.0MB
MD5321b082252cd8674a00d137cbacd274f
SHA198688c83e5f425638b2f1941e832e3b62f826ca8
SHA256d27c98640ecac9187406604749f410b82f1e00bca578163a6cb487cb5af5fb82
SHA5124636e16254f44f1fd5c1040bbe4e199787120b89ad6aa325c02daf764407928c1a985535ec783a34a9bc665fa81c1250d0a3c98910878ab899da539cfba9e7c3
-
Filesize
652B
MD5d2a4886c54669a7274e3915b304afa07
SHA1a4bafc60b684075bfc187bf773a5f9780c0d1175
SHA25685f5b70a13976e7721be92e040ad7f8cae020429766e86393a3d6d57cf6cbc93
SHA51292ea7f14d5d0da4d78eb909e19fb894b0d2af0b1e27753657c0c04f5d7186808a5618bc993e171677da669b4ac99fcd2a56268c176a5533af820b157a2948ae1
-
Filesize
244B
MD5b999975748af32dd007ff48814430b26
SHA146b54a3e3be2d3497127d67b96b3f6a55d26447d
SHA256ed13935d6ac43e5ce0419aa7d162dbc70562c02dedacb81d5efdfc609a035c69
SHA512f8e48caaac395db45ac4c8a899dbd64305dd6f57fcd22919a6d880b035455286d3504b097dca250d4ea283004cb64d47e376901b8fae65f4fa792234dee9f81e
-
Filesize
369B
MD5dadcc5adacdb3f988c8975bd2344b13e
SHA16ed2c8d6ceea0ce09cdcb60c865948566fd29fdf
SHA2560d3562e5af494787746e4b578856ba2c5a4f358353620a344c078bb4678b4e12
SHA5129a8d731d9463921925b03f84eb18f326fcefd788b3e44c76a3f889ef76560fcfdf330b832f6bc3e8054082b6ce776b8957aa4cf7fe9db35891679eeb6432e618