Overview
overview
6Static
static
6RV_ INGENI...NI.eml
windows7-x64
5RV_ INGENI...NI.eml
windows10-2004-x64
3Carta soli...ES.pdf
windows7-x64
3Carta soli...ES.pdf
windows10-2004-x64
3Certificad...24.pdf
windows7-x64
3Certificad...24.pdf
windows10-2004-x64
3FACUTURAS ...IRE.7z
windows7-x64
1FACUTURAS ...IRE.7z
windows10-2004-x64
1FACUTURAS ...53.zip
windows7-x64
4FACUTURAS ...53.zip
windows10-2004-x64
3FACUTURAS ...54.zip
windows7-x64
4FACUTURAS ...54.zip
windows10-2004-x64
1FACUTURAS ...55.zip
windows7-x64
4FACUTURAS ...55.zip
windows10-2004-x64
1FACUTURAS ...56.zip
windows7-x64
4FACUTURAS ...56.zip
windows10-2004-x64
1FACUTURAS ...14.zip
windows7-x64
4FACUTURAS ...14.zip
windows10-2004-x64
1FACUTURAS ...15.zip
windows7-x64
4FACUTURAS ...15.zip
windows10-2004-x64
1FACUTURAS ...16.zip
windows7-x64
1FACUTURAS ...16.zip
windows10-2004-x64
1FACUTURAS ...11.zip
windows7-x64
1FACUTURAS ...11.zip
windows10-2004-x64
1FACUTURAS ...30.zip
windows7-x64
1FACUTURAS ...30.zip
windows10-2004-x64
1FACUTURAS ...35.zip
windows7-x64
1FACUTURAS ...35.zip
windows10-2004-x64
1FACUTURAS ...36.zip
windows7-x64
1FACUTURAS ...36.zip
windows10-2004-x64
1FACUTURAS ...37.zip
windows7-x64
1FACUTURAS ...37.zip
windows10-2004-x64
1Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19/11/2024, 16:46
Behavioral task
behavioral1
Sample
RV_ INGENIERIA Y SOLUCINONES ESPECIALIZADAS SAS (ISES S.A.S.) NI.eml
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
RV_ INGENIERIA Y SOLUCINONES ESPECIALIZADAS SAS (ISES S.A.S.) NI.eml
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Carta solicitud acuerdo de pago - ISES.pdf
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
Carta solicitud acuerdo de pago - ISES.pdf
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Certificado Camara de Comercio Nov 2024.pdf
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
Certificado Camara de Comercio Nov 2024.pdf
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
FACUTURAS ISES-AIRE.7z
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
FACUTURAS ISES-AIRE.7z
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
FACUTURAS ISES-AIRE/CON ACEPTACION TACITA/FE8853.zip
Resource
win7-20240729-en
Behavioral task
behavioral10
Sample
FACUTURAS ISES-AIRE/CON ACEPTACION TACITA/FE8853.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
FACUTURAS ISES-AIRE/CON ACEPTACION TACITA/FE8854.zip
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
FACUTURAS ISES-AIRE/CON ACEPTACION TACITA/FE8854.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
FACUTURAS ISES-AIRE/CON ACEPTACION TACITA/FE8855.zip
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
FACUTURAS ISES-AIRE/CON ACEPTACION TACITA/FE8855.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
FACUTURAS ISES-AIRE/CON ACEPTACION TACITA/FE8856.zip
Resource
win7-20241010-en
Behavioral task
behavioral16
Sample
FACUTURAS ISES-AIRE/CON ACEPTACION TACITA/FE8856.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
FACUTURAS ISES-AIRE/CON ACEPTACION TACITA/FE8914.zip
Resource
win7-20241010-en
Behavioral task
behavioral18
Sample
FACUTURAS ISES-AIRE/CON ACEPTACION TACITA/FE8914.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
FACUTURAS ISES-AIRE/CON ACEPTACION TACITA/FE8915.zip
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
FACUTURAS ISES-AIRE/CON ACEPTACION TACITA/FE8915.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
FACUTURAS ISES-AIRE/CON ACEPTACION TACITA/FE8916.zip
Resource
win7-20240708-en
Behavioral task
behavioral22
Sample
FACUTURAS ISES-AIRE/CON ACEPTACION TACITA/FE8916.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
FACUTURAS ISES-AIRE/CON ACEPTACION TACITA/FE9111.zip
Resource
win7-20241010-en
Behavioral task
behavioral24
Sample
FACUTURAS ISES-AIRE/CON ACEPTACION TACITA/FE9111.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
FACUTURAS ISES-AIRE/CON ACEPTACION TACITA/FE9230.zip
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
FACUTURAS ISES-AIRE/CON ACEPTACION TACITA/FE9230.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
FACUTURAS ISES-AIRE/CON ACEPTACION TACITA/FE9235.zip
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
FACUTURAS ISES-AIRE/CON ACEPTACION TACITA/FE9235.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
FACUTURAS ISES-AIRE/CON ACEPTACION TACITA/FE9236.zip
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
FACUTURAS ISES-AIRE/CON ACEPTACION TACITA/FE9236.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
FACUTURAS ISES-AIRE/CON ACEPTACION TACITA/FE9237.zip
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
FACUTURAS ISES-AIRE/CON ACEPTACION TACITA/FE9237.zip
Resource
win10v2004-20241007-en
General
-
Target
FACUTURAS ISES-AIRE/CON ACEPTACION TACITA/FE8853.zip
-
Size
2.9MB
-
MD5
880aa470c20ad15fd401543546cf3ef2
-
SHA1
61ee373119f421a51f2abb0d91abd457122713aa
-
SHA256
5d595ed047ad67451b5821fbad215117d7665a1da83b77d5a0fe1e136d9f6a34
-
SHA512
56c414dc8f9840f6b7f53ac65498826d575964967ccb2001dabac0852cbe8f8e12789340a26b4b60390440073016e06edc1e4380269ab804da231cdf481be72d
-
SSDEEP
49152:GH2BL3zOt/uknshK24ka729f0I172BL3zOt/uknshK24ka729f0I1+l:5F3zOhfsB4V29f0kaF3zOhfsB4V29f0x
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 7zFM.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4228 7zFM.exe 4228 7zFM.exe 4228 7zFM.exe 4228 7zFM.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4228 7zFM.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeRestorePrivilege 4228 7zFM.exe Token: 35 4228 7zFM.exe Token: SeSecurityPrivilege 4228 7zFM.exe Token: SeSecurityPrivilege 4228 7zFM.exe Token: SeSecurityPrivilege 4228 7zFM.exe -
Suspicious use of FindShellTrayWindow 6 IoCs
pid Process 4228 7zFM.exe 4228 7zFM.exe 4228 7zFM.exe 4228 7zFM.exe 4228 7zFM.exe 3692 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3692 AcroRd32.exe 3692 AcroRd32.exe 3692 AcroRd32.exe 3692 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4228 wrote to memory of 740 4228 7zFM.exe 104 PID 4228 wrote to memory of 740 4228 7zFM.exe 104 PID 4228 wrote to memory of 3692 4228 7zFM.exe 111 PID 4228 wrote to memory of 3692 4228 7zFM.exe 111 PID 4228 wrote to memory of 3692 4228 7zFM.exe 111 PID 3692 wrote to memory of 1840 3692 AcroRd32.exe 112 PID 3692 wrote to memory of 1840 3692 AcroRd32.exe 112 PID 3692 wrote to memory of 1840 3692 AcroRd32.exe 112 PID 1840 wrote to memory of 1108 1840 RdrCEF.exe 113 PID 1840 wrote to memory of 1108 1840 RdrCEF.exe 113 PID 1840 wrote to memory of 1108 1840 RdrCEF.exe 113 PID 1840 wrote to memory of 1108 1840 RdrCEF.exe 113 PID 1840 wrote to memory of 1108 1840 RdrCEF.exe 113 PID 1840 wrote to memory of 1108 1840 RdrCEF.exe 113 PID 1840 wrote to memory of 1108 1840 RdrCEF.exe 113 PID 1840 wrote to memory of 1108 1840 RdrCEF.exe 113 PID 1840 wrote to memory of 1108 1840 RdrCEF.exe 113 PID 1840 wrote to memory of 1108 1840 RdrCEF.exe 113 PID 1840 wrote to memory of 1108 1840 RdrCEF.exe 113 PID 1840 wrote to memory of 1108 1840 RdrCEF.exe 113 PID 1840 wrote to memory of 1108 1840 RdrCEF.exe 113 PID 1840 wrote to memory of 1108 1840 RdrCEF.exe 113 PID 1840 wrote to memory of 1108 1840 RdrCEF.exe 113 PID 1840 wrote to memory of 1108 1840 RdrCEF.exe 113 PID 1840 wrote to memory of 1108 1840 RdrCEF.exe 113 PID 1840 wrote to memory of 1108 1840 RdrCEF.exe 113 PID 1840 wrote to memory of 1108 1840 RdrCEF.exe 113 PID 1840 wrote to memory of 1108 1840 RdrCEF.exe 113 PID 1840 wrote to memory of 1108 1840 RdrCEF.exe 113 PID 1840 wrote to memory of 1108 1840 RdrCEF.exe 113 PID 1840 wrote to memory of 1108 1840 RdrCEF.exe 113 PID 1840 wrote to memory of 1108 1840 RdrCEF.exe 113 PID 1840 wrote to memory of 1108 1840 RdrCEF.exe 113 PID 1840 wrote to memory of 1108 1840 RdrCEF.exe 113 PID 1840 wrote to memory of 1108 1840 RdrCEF.exe 113 PID 1840 wrote to memory of 1108 1840 RdrCEF.exe 113 PID 1840 wrote to memory of 1108 1840 RdrCEF.exe 113 PID 1840 wrote to memory of 1108 1840 RdrCEF.exe 113 PID 1840 wrote to memory of 1108 1840 RdrCEF.exe 113 PID 1840 wrote to memory of 1108 1840 RdrCEF.exe 113 PID 1840 wrote to memory of 1108 1840 RdrCEF.exe 113 PID 1840 wrote to memory of 1108 1840 RdrCEF.exe 113 PID 1840 wrote to memory of 1108 1840 RdrCEF.exe 113 PID 1840 wrote to memory of 1108 1840 RdrCEF.exe 113 PID 1840 wrote to memory of 1108 1840 RdrCEF.exe 113 PID 1840 wrote to memory of 1108 1840 RdrCEF.exe 113 PID 1840 wrote to memory of 1108 1840 RdrCEF.exe 113 PID 1840 wrote to memory of 1108 1840 RdrCEF.exe 113 PID 1840 wrote to memory of 1108 1840 RdrCEF.exe 113 PID 1840 wrote to memory of 2724 1840 RdrCEF.exe 114 PID 1840 wrote to memory of 2724 1840 RdrCEF.exe 114 PID 1840 wrote to memory of 2724 1840 RdrCEF.exe 114 PID 1840 wrote to memory of 2724 1840 RdrCEF.exe 114 PID 1840 wrote to memory of 2724 1840 RdrCEF.exe 114 PID 1840 wrote to memory of 2724 1840 RdrCEF.exe 114 PID 1840 wrote to memory of 2724 1840 RdrCEF.exe 114 PID 1840 wrote to memory of 2724 1840 RdrCEF.exe 114 PID 1840 wrote to memory of 2724 1840 RdrCEF.exe 114 PID 1840 wrote to memory of 2724 1840 RdrCEF.exe 114 PID 1840 wrote to memory of 2724 1840 RdrCEF.exe 114 PID 1840 wrote to memory of 2724 1840 RdrCEF.exe 114 PID 1840 wrote to memory of 2724 1840 RdrCEF.exe 114 PID 1840 wrote to memory of 2724 1840 RdrCEF.exe 114 PID 1840 wrote to memory of 2724 1840 RdrCEF.exe 114
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\FACUTURAS ISES-AIRE\CON ACEPTACION TACITA\FE8853.zip"1⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4228 -
C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE"C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\7zO480490F7\ad09004135880212400FE8853.xml"2⤵PID:740
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\7zO48004F08\HES__1000021871.PDF"2⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3692 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140433⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=FF0D9D6742E017D5BD2FC91F6FA450E0 --mojo-platform-channel-handle=1776 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵
- System Location Discovery: System Language Discovery
PID:1108
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=7AE601CB840E72497DB8D4EC843C2C5F --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=7AE601CB840E72497DB8D4EC843C2C5F --renderer-client-id=2 --mojo-platform-channel-handle=1780 --allow-no-sandbox-job /prefetch:14⤵
- System Location Discovery: System Language Discovery
PID:2724
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=99B7B2F4FB9B2F05E981052CB62FA831 --mojo-platform-channel-handle=2356 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵
- System Location Discovery: System Language Discovery
PID:1868
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=77F2B51AF7AFB2F32E65B9414898E82D --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=77F2B51AF7AFB2F32E65B9414898E82D --renderer-client-id=5 --mojo-platform-channel-handle=2492 --allow-no-sandbox-job /prefetch:14⤵
- System Location Discovery: System Language Discovery
PID:1552
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=AEDD42204009A8DC1766DFAE3939412C --mojo-platform-channel-handle=2712 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵
- System Location Discovery: System Language Discovery
PID:1988
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=BFF0CC96D27229DFA61A9951F023808D --mojo-platform-channel-handle=2824 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵
- System Location Discovery: System Language Discovery
PID:2656
-
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2520
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.5MB
MD50aa6adbe92cbc78130c023bc440e3549
SHA1760da87b10a1ddf286a65cc576e74e33c6188218
SHA2566d944311393ae1aa4f9d760e4d9f75ea6ce2c144da5f6d1c53f3d89d585f262d
SHA51215e4b321572b342cf28965ee885ce4dfb9e13928311eb44fbc8c3cc86bd506fe328496e740054d1cc04fd545a9ee7ddaac86adf912faeafc934a947cbe8babdd
-
Filesize
43KB
MD531638dbb918c175667818ee33ce9eac3
SHA138353c7948e912942d6d9e43e857289c2fe02bc4
SHA2563e5f8067d46a57adf4a543122f91e4878c35ce5b3d4a7ea60acae13ca69be96c
SHA512c0259bfb1850306af623b04a5d43d6fafd8a7c9c150a908762384cca6fd60f253cbf5188f165ec4c1408e62f65a34ffe9d993604f4d88eb4cd9bb828a28c312b