Overview
overview
5Static
static
3404995b3-4...e4.eml
windows7-x64
5404995b3-4...e4.eml
windows10-2004-x64
=?UTF-8?Q?...?=.eml
windows7-x64
5=?UTF-8?Q?...?=.eml
windows10-2004-x64
1email-html-1.html
windows7-x64
3email-html-1.html
windows10-2004-x64
3=?UTF-8?Q?...?=.pdf
windows7-x64
3=?UTF-8?Q?...?=.pdf
windows10-2004-x64
3Cert_'agos...vo.pdf
windows7-x64
3Cert_'agos...vo.pdf
windows10-2004-x64
3Contrato d...to.pdf
windows7-x64
3Contrato d...to.pdf
windows10-2004-x64
3Des_'20240816'.pdf
windows7-x64
3Des_'20240816'.pdf
windows10-2004-x64
3IMG_20240823_0001.jpg
windows7-x64
3IMG_20240823_0001.jpg
windows10-2004-x64
3Informacio...la.pdf
windows7-x64
3Informacio...la.pdf
windows10-2004-x64
3Recibo agua.pdf
windows7-x64
3Recibo agua.pdf
windows10-2004-x64
3Recibo luz.pdf
windows7-x64
3Recibo luz.pdf
windows10-2004-x64
3b0cbaab0-9...c0.jpg
windows7-x64
3b0cbaab0-9...c0.jpg
windows10-2004-x64
3cedula Adr...la.pdf
windows7-x64
3cedula Adr...la.pdf
windows10-2004-x64
3cedula Fah...do.pdf
windows7-x64
3cedula Fah...do.pdf
windows10-2004-x64
3email-html-2.txt
windows7-x64
1email-html-2.txt
windows10-2004-x64
1email-plain-1.txt
windows7-x64
1email-plain-1.txt
windows10-2004-x64
1Resubmissions
23-08-2024 17:42
240823-v91xhazelm 523-08-2024 17:33
240823-v4v43azdlq 523-08-2024 17:08
240823-vntw3axbjb 5Analysis
-
max time kernel
149s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
23-08-2024 17:33
Behavioral task
behavioral1
Sample
404995b3-4da3-5767-e1c1-a037b6011fe4.eml
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
404995b3-4da3-5767-e1c1-a037b6011fe4.eml
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
=?UTF-8?Q?Tu_c=C3=B3digo_de_referencia_de_Efecty_Netflix=2Eeml?=.eml
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
=?UTF-8?Q?Tu_c=C3=B3digo_de_referencia_de_Efecty_Netflix=2Eeml?=.eml
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
email-html-1.html
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
email-html-1.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
=?UTF-8?Q?informaci=C3=B3n_lote_Fahir_Redondo=2Epdf?=.pdf
Resource
win7-20240705-en
Behavioral task
behavioral8
Sample
=?UTF-8?Q?informaci=C3=B3n_lote_Fahir_Redondo=2Epdf?=.pdf
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
Cert_'agosto fahir nuevo.pdf
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
Cert_'agosto fahir nuevo.pdf
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
Contrato de arrendamiento.pdf
Resource
win7-20240705-en
Behavioral task
behavioral12
Sample
Contrato de arrendamiento.pdf
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
Des_'20240816'.pdf
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
Des_'20240816'.pdf
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
IMG_20240823_0001.jpg
Resource
win7-20240704-en
Behavioral task
behavioral16
Sample
IMG_20240823_0001.jpg
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
Informacion Fahir Redondo y Adriana Arriola.pdf
Resource
win7-20240729-en
Behavioral task
behavioral18
Sample
Informacion Fahir Redondo y Adriana Arriola.pdf
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
Recibo agua.pdf
Resource
win7-20240704-en
Behavioral task
behavioral20
Sample
Recibo agua.pdf
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
Recibo luz.pdf
Resource
win7-20240708-en
Behavioral task
behavioral22
Sample
Recibo luz.pdf
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
b0cbaab0-9f98-482b-bbea-5f99fb8a1fc0.jpg
Resource
win7-20240704-en
Behavioral task
behavioral24
Sample
b0cbaab0-9f98-482b-bbea-5f99fb8a1fc0.jpg
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
cedula Adriana Arriola.pdf
Resource
win7-20240704-en
Behavioral task
behavioral26
Sample
cedula Adriana Arriola.pdf
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
cedula Fahir Redondo.pdf
Resource
win7-20240729-en
Behavioral task
behavioral28
Sample
cedula Fahir Redondo.pdf
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
email-html-2.txt
Resource
win7-20240705-en
Behavioral task
behavioral30
Sample
email-html-2.txt
Resource
win10v2004-20240802-en
Behavioral task
behavioral31
Sample
email-plain-1.txt
Resource
win7-20240708-en
Behavioral task
behavioral32
Sample
email-plain-1.txt
Resource
win10v2004-20240802-en
General
-
Target
=?UTF-8?Q?informaci=C3=B3n_lote_Fahir_Redondo=2Epdf?=.pdf
-
Size
202KB
-
MD5
ad58a5a1e2efd98874ba5fc3a9e7c168
-
SHA1
d96ec6d550df14c8cf198a6a0e6920d3db23eae2
-
SHA256
dba92d09f5a90f6b10df75e4e967dff57fc65beb7f74ff5894243b31b914d380
-
SHA512
28f3b39940daff80577400fb3a4dc4408fae51df9edd836d20cec4d703b5dcc3ef2fc4944e2db7f7afe20e0a558062005de8e2c749ddd56e915e68255883b867
-
SSDEEP
3072:BDASKb3ASK0iASKwLASKhMASK9+ASKaBASKWRASKyXDASKnWZ:BDezeVe8eie0eWegeUe2
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AdobeCollabSync.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AdobeCollabSync.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FullTrustNotifier.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\MuiCache AdobeCollabSync.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 3088 AcroRd32.exe 3088 AcroRd32.exe 3088 AcroRd32.exe 3088 AcroRd32.exe 3088 AcroRd32.exe 3088 AcroRd32.exe 3088 AcroRd32.exe 3088 AcroRd32.exe 3088 AcroRd32.exe 3088 AcroRd32.exe 3088 AcroRd32.exe 3088 AcroRd32.exe 3088 AcroRd32.exe 3088 AcroRd32.exe 3088 AcroRd32.exe 3088 AcroRd32.exe 3088 AcroRd32.exe 3088 AcroRd32.exe 3088 AcroRd32.exe 3088 AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3088 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 3088 AcroRd32.exe 3088 AcroRd32.exe 3088 AcroRd32.exe 3088 AcroRd32.exe 3088 AcroRd32.exe 3088 AcroRd32.exe 3088 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3088 wrote to memory of 4116 3088 AcroRd32.exe 88 PID 3088 wrote to memory of 4116 3088 AcroRd32.exe 88 PID 3088 wrote to memory of 4116 3088 AcroRd32.exe 88 PID 4116 wrote to memory of 1368 4116 AdobeCollabSync.exe 89 PID 4116 wrote to memory of 1368 4116 AdobeCollabSync.exe 89 PID 4116 wrote to memory of 1368 4116 AdobeCollabSync.exe 89 PID 1368 wrote to memory of 1068 1368 AdobeCollabSync.exe 94 PID 1368 wrote to memory of 1068 1368 AdobeCollabSync.exe 94 PID 1368 wrote to memory of 1068 1368 AdobeCollabSync.exe 94 PID 3088 wrote to memory of 2780 3088 AcroRd32.exe 98 PID 3088 wrote to memory of 2780 3088 AcroRd32.exe 98 PID 3088 wrote to memory of 2780 3088 AcroRd32.exe 98 PID 2780 wrote to memory of 2276 2780 RdrCEF.exe 99 PID 2780 wrote to memory of 2276 2780 RdrCEF.exe 99 PID 2780 wrote to memory of 2276 2780 RdrCEF.exe 99 PID 2780 wrote to memory of 2276 2780 RdrCEF.exe 99 PID 2780 wrote to memory of 2276 2780 RdrCEF.exe 99 PID 2780 wrote to memory of 2276 2780 RdrCEF.exe 99 PID 2780 wrote to memory of 2276 2780 RdrCEF.exe 99 PID 2780 wrote to memory of 2276 2780 RdrCEF.exe 99 PID 2780 wrote to memory of 2276 2780 RdrCEF.exe 99 PID 2780 wrote to memory of 2276 2780 RdrCEF.exe 99 PID 2780 wrote to memory of 2276 2780 RdrCEF.exe 99 PID 2780 wrote to memory of 2276 2780 RdrCEF.exe 99 PID 2780 wrote to memory of 2276 2780 RdrCEF.exe 99 PID 2780 wrote to memory of 2276 2780 RdrCEF.exe 99 PID 2780 wrote to memory of 2276 2780 RdrCEF.exe 99 PID 2780 wrote to memory of 2276 2780 RdrCEF.exe 99 PID 2780 wrote to memory of 2276 2780 RdrCEF.exe 99 PID 2780 wrote to memory of 2276 2780 RdrCEF.exe 99 PID 2780 wrote to memory of 2276 2780 RdrCEF.exe 99 PID 2780 wrote to memory of 2276 2780 RdrCEF.exe 99 PID 2780 wrote to memory of 2276 2780 RdrCEF.exe 99 PID 2780 wrote to memory of 2276 2780 RdrCEF.exe 99 PID 2780 wrote to memory of 2276 2780 RdrCEF.exe 99 PID 2780 wrote to memory of 2276 2780 RdrCEF.exe 99 PID 2780 wrote to memory of 2276 2780 RdrCEF.exe 99 PID 2780 wrote to memory of 2276 2780 RdrCEF.exe 99 PID 2780 wrote to memory of 2276 2780 RdrCEF.exe 99 PID 2780 wrote to memory of 2276 2780 RdrCEF.exe 99 PID 2780 wrote to memory of 2276 2780 RdrCEF.exe 99 PID 2780 wrote to memory of 2276 2780 RdrCEF.exe 99 PID 2780 wrote to memory of 2276 2780 RdrCEF.exe 99 PID 2780 wrote to memory of 2276 2780 RdrCEF.exe 99 PID 2780 wrote to memory of 2276 2780 RdrCEF.exe 99 PID 2780 wrote to memory of 2276 2780 RdrCEF.exe 99 PID 2780 wrote to memory of 2276 2780 RdrCEF.exe 99 PID 2780 wrote to memory of 2276 2780 RdrCEF.exe 99 PID 2780 wrote to memory of 2276 2780 RdrCEF.exe 99 PID 2780 wrote to memory of 2276 2780 RdrCEF.exe 99 PID 2780 wrote to memory of 2276 2780 RdrCEF.exe 99 PID 2780 wrote to memory of 2276 2780 RdrCEF.exe 99 PID 2780 wrote to memory of 2276 2780 RdrCEF.exe 99 PID 2780 wrote to memory of 2472 2780 RdrCEF.exe 100 PID 2780 wrote to memory of 2472 2780 RdrCEF.exe 100 PID 2780 wrote to memory of 2472 2780 RdrCEF.exe 100 PID 2780 wrote to memory of 2472 2780 RdrCEF.exe 100 PID 2780 wrote to memory of 2472 2780 RdrCEF.exe 100 PID 2780 wrote to memory of 2472 2780 RdrCEF.exe 100 PID 2780 wrote to memory of 2472 2780 RdrCEF.exe 100 PID 2780 wrote to memory of 2472 2780 RdrCEF.exe 100 PID 2780 wrote to memory of 2472 2780 RdrCEF.exe 100 PID 2780 wrote to memory of 2472 2780 RdrCEF.exe 100 PID 2780 wrote to memory of 2472 2780 RdrCEF.exe 100
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\=_UTF-8_Q_informaci=C3=B3n_lote_Fahir_Redondo=2Epdf_=.pdf"1⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3088 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AdobeCollabSync.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AdobeCollabSync.exe" -c2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4116 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AdobeCollabSync.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AdobeCollabSync.exe" -c --type=collab-renderer --proc=41163⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\FullTrustNotifier.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\FullTrustNotifier.exe" GetChannelUri4⤵
- System Location Discovery: System Language Discovery
PID:1068
-
-
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=6918B68E1BC9B1B564A0B20A20043F78 --mojo-platform-channel-handle=1728 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵
- System Location Discovery: System Language Discovery
PID:2276
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=EDF81F2DD7819EA5BD7B30BC383CB269 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=EDF81F2DD7819EA5BD7B30BC383CB269 --renderer-client-id=2 --mojo-platform-channel-handle=1732 --allow-no-sandbox-job /prefetch:13⤵
- System Location Discovery: System Language Discovery
PID:2472
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=E85C2594B6362E919E6E00DE314DB182 --mojo-platform-channel-handle=2300 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵
- System Location Discovery: System Language Discovery
PID:2376
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=C0719981F7B8D5ED2425814EC221C7BB --mojo-platform-channel-handle=1924 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵
- System Location Discovery: System Language Discovery
PID:2580
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=8F5BA4C97BF4D25E8A76423EFB404A5E --mojo-platform-channel-handle=2384 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵
- System Location Discovery: System Language Discovery
PID:4360
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=93BF9A4AAD57D7265A7E3720D1CED106 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=93BF9A4AAD57D7265A7E3720D1CED106 --renderer-client-id=7 --mojo-platform-channel-handle=2412 --allow-no-sandbox-job /prefetch:13⤵
- System Location Discovery: System Language Discovery
PID:1352
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2756
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
36KB
MD5b30d3becc8731792523d599d949e63f5
SHA119350257e42d7aee17fb3bf139a9d3adb330fad4
SHA256b1b77e96279ead2b460de3de70e2ea4f5ad1b853598a4e27a5caf3f1a32cc4f3
SHA512523f54895fb07f62b9a5f72c8b62e83d4d9506bda57b183818615f6eb7286e3b9c5a50409bc5c5164867c3ccdeae88aa395ecca6bc7e36d991552f857510792e
-
Filesize
56KB
MD5752a1f26b18748311b691c7d8fc20633
SHA1c1f8e83eebc1cc1e9b88c773338eb09ff82ab862
SHA256111dac2948e4cecb10b0d2e10d8afaa663d78d643826b592d6414a1fd77cc131
SHA512a2f5f262faf2c3e9756da94b2c47787ce3a9391b5bd53581578aa9a764449e114836704d6dec4aadc097fed4c818831baa11affa1eb25be2bfad9349bb090fe5
-
Filesize
64KB
MD564d980a6debd24c7e9bb0403a6ecce90
SHA1a56f593569fac18a36366d2d34109d0d760c0205
SHA25607db00f7b4c927eb9c25ee23a6389bddd8d350deff35dea3050c65d0ccc93664
SHA512c4e03a71aee3de5cbe1470f3338f4d50dddc48b6ca53ae4cacecbd2c36566266c9b198d32f992bef2a9bc6f9cdbf623573f1b1ba4e5d4066b547fadad5f61a98
-
Filesize
92KB
MD5aebe0d2eb7a2077a55e57a955e62406a
SHA13f811b8148f12220f4b45699135e6d21c9847d8a
SHA25687aa4c64348b534771f03919b5bdca09596e89f6e0cca0a992bb3d290ec4155a
SHA512efa1b082925a4e478fcea74764bbacb91d43da8c01c4b360a34e6f7402af23f91c93b5e91c6266120e144b5300e8dae73a62a7b6d7c4328410128f6a72a7baed
-
Filesize
92KB
MD5a2fe2ff8d6397e3a6777381159b7b2b9
SHA19c750995122543b6738eeee6b9a3f42578db9a7f
SHA256741e77f05a9259645075644996840c58c687ed771f06f4ec89fc4b5f71a60cd7
SHA512cb295d57a3be60bea63b0f71311f11bf4a0887875d90965b1391efe8718cebed77daca53ea94508934ff1e359e964be41a5ee65a8adf0444c470aa03d5d49d22
-
Filesize
92KB
MD595c71ec5914be021396023569640f68d
SHA1ec1e99f499732e67d743d1ea6079ef95ac44d7d2
SHA25662f16f2064bd855c996467c0ecb46dca8f6e0316f0d03174f42b455bf13d1aae
SHA512a6a704368a343e804a7af105a77f8e014b0920aa42a24c9b54e0c53899779f4cff2fd763cac0cf606dfe0990903d93d7279bd547693e1403f2d42f99e33956a5
-
Filesize
92KB
MD5245950c48f668cf2fcb3c64778e64089
SHA13a5a14c820f58e35a3fc6f5de29669f0840587d8
SHA256a027cf12f2055635a3020f08e0448b2f0314791260ccd25570426088c5b0e307
SHA5124fc8448536663b551cc716d78715f06d4ed217fbdf755924f0b30aebbb6212798a61c6638f919d5c14bdb6998d6a12f0ca37281f3c7f484c1821fbfc98d4a24d
-
Filesize
3.6MB
MD54761e9e5022ad59232d3ff1d6365fc28
SHA12fbb4de0513928aaf315dba85359cc2e475f90d3
SHA25652089e103b099774a479dc435d5902b82c85a458522d9ea52657c3011405c58c
SHA5123cc9497e99bf308b2f90ba2d45bb36f8b765fc184d457d06f63fcf0f4d74fc55d4a450878d1ca713fa6f9b70850e96c6b5fd3af9e84e3dde7e597f520b0d5f90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B398B80134F72209547439DB21AB308D_A4CF52CCA82D7458083F7280801A3A04
Filesize471B
MD574157cdc4d51af2eb625bad8b2a4c4db
SHA14687217fd551aa1aaa54b7499b17943c7b37b836
SHA256967975a9b6eba7637f517d4c53d04f062593bc6d1fb18cfe1e7e8273a597bc81
SHA512d50edfd0d77f2660d6f5ae23561c0566fa5c268027666792c7028238885cdb3fe89895d81f550261d334531f5e9149c2b001d648737d9842ac05a5f717f20de4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B398B80134F72209547439DB21AB308D_A4CF52CCA82D7458083F7280801A3A04
Filesize400B
MD5cf44037428be8e0c758b419af8925144
SHA17cb2c548de29b3722d224d10a1eb976043443e02
SHA25647810c8da4b925b09d2b46e99e2f36f252e2cc43800690f7a110a91ea64ff8a4
SHA512dea421d1ca936d7cf9615a5cfbb7281a951f962a07544716f4cc1836c097b8e0af3e6d80db2d0675505af670c6813f89493b19a9cf8d17d7fed105f5fb9428e7
-
Filesize
12KB
MD5dd56a70c88722bf0fc2e891db8ee2f3d
SHA12779e77c7d53c416eaca099a390704ac40eacca3
SHA2560d1cf5dece621a3e0b57c0153bccfca92adb57a62b2841b54f5df8182b8b7754
SHA5125d33d879c71ba2c434cd47861e1057843cbc54d36450a8d57a7416d3a019cad4faaca4f7b512a8d1fd53487c2e927eba3cfe69490c55b8a85d842fed9f4544bb
-
Filesize
14KB
MD5947f93fe0eed44767626846f28cfde05
SHA1f6276d2a2b4a9d8a8e23c84019cd3961e9d60e88
SHA25606a576fc14e995c437b26c0d150b4e84cd745e7cedfd972a84b42b51c842fc9b
SHA512f97739eb0d22a99b06ef340aefb0d5a5b45b679d28accff3de2565166392c7d2fabaa33f945696f7d456ba2ef323f48e43eb26578f71c8b2e8ed32fb4dc69bc9
-
Filesize
5.4MB
MD5a1704864c4cf60bee94efcf0bc41820d
SHA1397b15d6f4e34164f08ee1fb560b32bf02e57181
SHA2567a969b1616fe584ef8c6fa03258b43e43785001bb2e2effc86848ffa2aae7d06
SHA512bd96aa47c4d2d83af91cff0a838979729ac93913ca16132ebd5e795292daca28a298407e9fe439b365878c12ef13c64e6257caf5efbb8fe84010bd626eccc2cc