Analysis
-
max time kernel
119s -
max time network
114s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
27/07/2024, 00:51
Static task
static1
Behavioral task
behavioral1
Sample
760820e10d0691001d224b11a95b5c40N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
760820e10d0691001d224b11a95b5c40N.exe
Resource
win10v2004-20240709-en
General
-
Target
760820e10d0691001d224b11a95b5c40N.exe
-
Size
1.3MB
-
MD5
760820e10d0691001d224b11a95b5c40
-
SHA1
eb2f339256f1ee795cce2628bfdc4d1439ff0145
-
SHA256
fa380ca30f778032bc7af4452951c8e94738cad08e4cf521a1cced58d729e51e
-
SHA512
d83983d89dd54482e9feab524cc83ec945331fa85f377f3f200eef3b509e5445f42c6b1e56f8bf28f9be6cc50072a5c959bfe22fae5b63b70c7f257b1a45e78b
-
SSDEEP
24576:0/ApeDWpzxyLt1Yio5n4s0Ab7Ixb0wiqu86LIzfWZB0vxI0:04xat1NoBHcOwimtZH
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation 760820e10d0691001d224b11a95b5c40N.exe -
Executes dropped EXE 2 IoCs
pid Process 3816 285D9.exe 2072 285D9.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Update = "C:\\Users\\Admin\\AppData\\Roaming\\285D9.exe" reg.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3816 set thread context of 2072 3816 285D9.exe 109 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 12 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 760820e10d0691001d224b11a95b5c40N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 285D9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 285D9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000_Classes\Local Settings 760820e10d0691001d224b11a95b5c40N.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 1764 reg.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 3592 AcroRd32.exe 3592 AcroRd32.exe 3592 AcroRd32.exe 3592 AcroRd32.exe 3592 AcroRd32.exe 3592 AcroRd32.exe 3592 AcroRd32.exe 3592 AcroRd32.exe 3592 AcroRd32.exe 3592 AcroRd32.exe 3592 AcroRd32.exe 3592 AcroRd32.exe 3592 AcroRd32.exe 3592 AcroRd32.exe 3592 AcroRd32.exe 3592 AcroRd32.exe 3592 AcroRd32.exe 3592 AcroRd32.exe 3592 AcroRd32.exe 3592 AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3592 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 3592 AcroRd32.exe 3592 AcroRd32.exe 3592 AcroRd32.exe 3592 AcroRd32.exe 3592 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4996 wrote to memory of 1764 4996 760820e10d0691001d224b11a95b5c40N.exe 92 PID 4996 wrote to memory of 1764 4996 760820e10d0691001d224b11a95b5c40N.exe 92 PID 4996 wrote to memory of 1764 4996 760820e10d0691001d224b11a95b5c40N.exe 92 PID 4996 wrote to memory of 3816 4996 760820e10d0691001d224b11a95b5c40N.exe 94 PID 4996 wrote to memory of 3816 4996 760820e10d0691001d224b11a95b5c40N.exe 94 PID 4996 wrote to memory of 3816 4996 760820e10d0691001d224b11a95b5c40N.exe 94 PID 4996 wrote to memory of 3592 4996 760820e10d0691001d224b11a95b5c40N.exe 96 PID 4996 wrote to memory of 3592 4996 760820e10d0691001d224b11a95b5c40N.exe 96 PID 4996 wrote to memory of 3592 4996 760820e10d0691001d224b11a95b5c40N.exe 96 PID 3592 wrote to memory of 4636 3592 AcroRd32.exe 99 PID 3592 wrote to memory of 4636 3592 AcroRd32.exe 99 PID 3592 wrote to memory of 4636 3592 AcroRd32.exe 99 PID 4636 wrote to memory of 1252 4636 RdrCEF.exe 100 PID 4636 wrote to memory of 1252 4636 RdrCEF.exe 100 PID 4636 wrote to memory of 1252 4636 RdrCEF.exe 100 PID 4636 wrote to memory of 1252 4636 RdrCEF.exe 100 PID 4636 wrote to memory of 1252 4636 RdrCEF.exe 100 PID 4636 wrote to memory of 1252 4636 RdrCEF.exe 100 PID 4636 wrote to memory of 1252 4636 RdrCEF.exe 100 PID 4636 wrote to memory of 1252 4636 RdrCEF.exe 100 PID 4636 wrote to memory of 1252 4636 RdrCEF.exe 100 PID 4636 wrote to memory of 1252 4636 RdrCEF.exe 100 PID 4636 wrote to memory of 1252 4636 RdrCEF.exe 100 PID 4636 wrote to memory of 1252 4636 RdrCEF.exe 100 PID 4636 wrote to memory of 1252 4636 RdrCEF.exe 100 PID 4636 wrote to memory of 1252 4636 RdrCEF.exe 100 PID 4636 wrote to memory of 1252 4636 RdrCEF.exe 100 PID 4636 wrote to memory of 1252 4636 RdrCEF.exe 100 PID 4636 wrote to memory of 1252 4636 RdrCEF.exe 100 PID 4636 wrote to memory of 1252 4636 RdrCEF.exe 100 PID 4636 wrote to memory of 1252 4636 RdrCEF.exe 100 PID 4636 wrote to memory of 1252 4636 RdrCEF.exe 100 PID 4636 wrote to memory of 1252 4636 RdrCEF.exe 100 PID 4636 wrote to memory of 1252 4636 RdrCEF.exe 100 PID 4636 wrote to memory of 1252 4636 RdrCEF.exe 100 PID 4636 wrote to memory of 1252 4636 RdrCEF.exe 100 PID 4636 wrote to memory of 1252 4636 RdrCEF.exe 100 PID 4636 wrote to memory of 1252 4636 RdrCEF.exe 100 PID 4636 wrote to memory of 1252 4636 RdrCEF.exe 100 PID 4636 wrote to memory of 1252 4636 RdrCEF.exe 100 PID 4636 wrote to memory of 1252 4636 RdrCEF.exe 100 PID 4636 wrote to memory of 1252 4636 RdrCEF.exe 100 PID 4636 wrote to memory of 1252 4636 RdrCEF.exe 100 PID 4636 wrote to memory of 1252 4636 RdrCEF.exe 100 PID 4636 wrote to memory of 1252 4636 RdrCEF.exe 100 PID 4636 wrote to memory of 1252 4636 RdrCEF.exe 100 PID 4636 wrote to memory of 1252 4636 RdrCEF.exe 100 PID 4636 wrote to memory of 1252 4636 RdrCEF.exe 100 PID 4636 wrote to memory of 1252 4636 RdrCEF.exe 100 PID 4636 wrote to memory of 1252 4636 RdrCEF.exe 100 PID 4636 wrote to memory of 1252 4636 RdrCEF.exe 100 PID 4636 wrote to memory of 1252 4636 RdrCEF.exe 100 PID 4636 wrote to memory of 1252 4636 RdrCEF.exe 100 PID 4636 wrote to memory of 3392 4636 RdrCEF.exe 101 PID 4636 wrote to memory of 3392 4636 RdrCEF.exe 101 PID 4636 wrote to memory of 3392 4636 RdrCEF.exe 101 PID 4636 wrote to memory of 3392 4636 RdrCEF.exe 101 PID 4636 wrote to memory of 3392 4636 RdrCEF.exe 101 PID 4636 wrote to memory of 3392 4636 RdrCEF.exe 101 PID 4636 wrote to memory of 3392 4636 RdrCEF.exe 101 PID 4636 wrote to memory of 3392 4636 RdrCEF.exe 101 PID 4636 wrote to memory of 3392 4636 RdrCEF.exe 101 PID 4636 wrote to memory of 3392 4636 RdrCEF.exe 101 PID 4636 wrote to memory of 3392 4636 RdrCEF.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\760820e10d0691001d224b11a95b5c40N.exe"C:\Users\Admin\AppData\Local\Temp\760820e10d0691001d224b11a95b5c40N.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4996 -
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v "Windows Update" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\285D9.exe" /f2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:1764
-
-
C:\Users\Admin\AppData\Roaming\285D9.exe"C:\Users\Admin\AppData\Roaming\285D9.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3816 -
C:\Users\Admin\AppData\Roaming\285D9.exe"C:\Users\Admin\AppData\Roaming\285D9.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2072
-
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Roaming\fiore.pdf"2⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3592 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140433⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4636 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=C5E5466727A4A26A8B13676407F14D63 --mojo-platform-channel-handle=1740 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵
- System Location Discovery: System Language Discovery
PID:1252
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=6129C0936E1D873F3AC8CCE6C3790C74 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=6129C0936E1D873F3AC8CCE6C3790C74 --renderer-client-id=2 --mojo-platform-channel-handle=1752 --allow-no-sandbox-job /prefetch:14⤵
- System Location Discovery: System Language Discovery
PID:3392
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=A90DBC8A8BE0D69DFB12BD5C0FE84F5D --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=A90DBC8A8BE0D69DFB12BD5C0FE84F5D --renderer-client-id=4 --mojo-platform-channel-handle=2316 --allow-no-sandbox-job /prefetch:14⤵
- System Location Discovery: System Language Discovery
PID:5116
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=90D668A46D8DE724CDFA896C206D5F86 --mojo-platform-channel-handle=2672 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵
- System Location Discovery: System Language Discovery
PID:544
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=7B4F160BDFD53097511B64E7540A81D5 --mojo-platform-channel-handle=2856 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵
- System Location Discovery: System Language Discovery
PID:4836
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=F7837108FCDEBCB841375C16883749FB --mojo-platform-channel-handle=1848 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵
- System Location Discovery: System Language Discovery
PID:4496
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD58b14f11e004e7c0f61055b5949843f18
SHA13839432bf73b85f86daa8e832d69b70ba2f0ca1d
SHA25659847846c6c823ed7a180c778a7a0f09a5c3b924b83af98abebdf34d28647b60
SHA5121ff6ca319988d8e65f135eb0d391b7a438593f7690e19fa135c2812349b4990f36097fc583e20b9bbefd630882db4d20cd4d6f9b41bb40a360f77335944e7d62
-
Filesize
36KB
MD5b30d3becc8731792523d599d949e63f5
SHA119350257e42d7aee17fb3bf139a9d3adb330fad4
SHA256b1b77e96279ead2b460de3de70e2ea4f5ad1b853598a4e27a5caf3f1a32cc4f3
SHA512523f54895fb07f62b9a5f72c8b62e83d4d9506bda57b183818615f6eb7286e3b9c5a50409bc5c5164867c3ccdeae88aa395ecca6bc7e36d991552f857510792e
-
Filesize
56KB
MD5752a1f26b18748311b691c7d8fc20633
SHA1c1f8e83eebc1cc1e9b88c773338eb09ff82ab862
SHA256111dac2948e4cecb10b0d2e10d8afaa663d78d643826b592d6414a1fd77cc131
SHA512a2f5f262faf2c3e9756da94b2c47787ce3a9391b5bd53581578aa9a764449e114836704d6dec4aadc097fed4c818831baa11affa1eb25be2bfad9349bb090fe5
-
Filesize
1.3MB
MD586e2b3187b846be9749da412e6863dc2
SHA1b1dbda8ad6d26b565f6b9efb3c3b68f2564a5731
SHA256cf059acdd4c03b41b794dd3e51e9752b68d86a916f27ed0cb111737f50969458
SHA5122d38e8e353dec011ddb2a8793da1733df74e8421f79f0499d14c9ec8d53becb53b759c4b723cd2b070f8bd759fb240b11c3add4f1c90272ada4480a3bd6fc845
-
Filesize
209KB
MD58a7db5362268dd64b9cec01fd99db7c5
SHA13c27053b7309527659ed0c07fa986516a14b2d3c
SHA2568bc7bbfc60dba3928611f77d80508bbf77762657d6be35106146830b5fe5edc5
SHA512c17d9b58e7246938e66d52d65bd6a54eaa22b932023b1dcd8a34c0b2ac82e8f91f4c5ade12f7a1857c5c36f30aeec2c650a1f9b087627725cfd3613a4f683036