Overview
overview
5Static
static
52025032812...am.msg
windows7-x64
52025032812...am.msg
windows10-2004-x64
3Info Envia...ON.pdf
windows7-x64
3Info Envia...ON.pdf
windows10-2004-x64
310 Ingreso...te.pdf
windows7-x64
310 Ingreso...te.pdf
windows10-2004-x64
310 Ingreso...se.pdf
windows7-x64
310 Ingreso...se.pdf
windows10-2004-x64
310 Ingreso...um.pdf
windows7-x64
310 Ingreso...um.pdf
windows10-2004-x64
310 Ingreso...ti.pdf
windows7-x64
310 Ingreso...ti.pdf
windows10-2004-x64
310 Ingreso...ra.pdf
windows7-x64
310 Ingreso...ra.pdf
windows10-2004-x64
310 Ingreso...OE.pdf
windows7-x64
310 Ingreso...OE.pdf
windows10-2004-x64
310 Ingreso...ra.pdf
windows7-x64
310 Ingreso...ra.pdf
windows10-2004-x64
310 Ingreso...ol.pdf
windows7-x64
310 Ingreso...ol.pdf
windows10-2004-x64
3Info Envia...s.xlsx
windows7-x64
3Info Envia...s.xlsx
windows10-2004-x64
1Info Envia...ER.pdf
windows7-x64
3Info Envia...ER.pdf
windows10-2004-x64
3Info Envia...ER.pdf
windows7-x64
3Info Envia...ER.pdf
windows10-2004-x64
3Info Envia...AL.pdf
windows7-x64
3Info Envia...AL.pdf
windows10-2004-x64
3Info Envia...ed.pdf
windows7-x64
3Info Envia...ed.pdf
windows10-2004-x64
3Info Envia...10.pdf
windows7-x64
3Info Envia...10.pdf
windows10-2004-x64
3Analysis
-
max time kernel
102s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
28/03/2025, 12:32
Behavioral task
behavioral1
Sample
20250328122946-013_RADICAD_74123-bboadam.msg
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
20250328122946-013_RADICAD_74123-bboadam.msg
Resource
win10v2004-20250313-en
Behavioral task
behavioral3
Sample
Info Enviada DIAN Acta de Visita 08112023/1.AUTORIZACION.pdf
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Info Enviada DIAN Acta de Visita 08112023/1.AUTORIZACION.pdf
Resource
win10v2004-20250314-en
Behavioral task
behavioral5
Sample
10 Ingresos y Retenciones/Hocol Retefuente.pdf
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
10 Ingresos y Retenciones/Hocol Retefuente.pdf
Resource
win10v2004-20250314-en
Behavioral task
behavioral7
Sample
10 Ingresos y Retenciones/NKL - Certificado Cundiboyacense.pdf
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
10 Ingresos y Retenciones/NKL - Certificado Cundiboyacense.pdf
Resource
win10v2004-20250313-en
Behavioral task
behavioral9
Sample
10 Ingresos y Retenciones/NKL - Certificado Petroleum.pdf
Resource
win7-20241010-en
Behavioral task
behavioral10
Sample
10 Ingresos y Retenciones/NKL - Certificado Petroleum.pdf
Resource
win10v2004-20250314-en
Behavioral task
behavioral11
Sample
10 Ingresos y Retenciones/NKL - Certificado Vanti.pdf
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
10 Ingresos y Retenciones/NKL - Certificado Vanti.pdf
Resource
win10v2004-20250314-en
Behavioral task
behavioral13
Sample
10 Ingresos y Retenciones/Trafigura.pdf
Resource
win7-20241010-en
Behavioral task
behavioral14
Sample
10 Ingresos y Retenciones/Trafigura.pdf
Resource
win10v2004-20250313-en
Behavioral task
behavioral15
Sample
10 Ingresos y Retenciones/UTOE.pdf
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
10 Ingresos y Retenciones/UTOE.pdf
Resource
win10v2004-20250314-en
Behavioral task
behavioral17
Sample
10 Ingresos y Retenciones/Vetra.pdf
Resource
win7-20240729-en
Behavioral task
behavioral18
Sample
10 Ingresos y Retenciones/Vetra.pdf
Resource
win10v2004-20250314-en
Behavioral task
behavioral19
Sample
10 Ingresos y Retenciones/Vitol.pdf
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
10 Ingresos y Retenciones/Vitol.pdf
Resource
win10v2004-20250314-en
Behavioral task
behavioral21
Sample
Info Enviada DIAN Acta de Visita 08112023/10. Ingresos y Retenciones.xlsx
Resource
win7-20241010-en
Behavioral task
behavioral22
Sample
Info Enviada DIAN Acta de Visita 08112023/10. Ingresos y Retenciones.xlsx
Resource
win10v2004-20250314-en
Behavioral task
behavioral23
Sample
Info Enviada DIAN Acta de Visita 08112023/11.1SOP INGR OPER.pdf
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
Info Enviada DIAN Acta de Visita 08112023/11.1SOP INGR OPER.pdf
Resource
win10v2004-20250314-en
Behavioral task
behavioral25
Sample
Info Enviada DIAN Acta de Visita 08112023/11.2SOP INGR OPER.pdf
Resource
win7-20250207-en
Behavioral task
behavioral26
Sample
Info Enviada DIAN Acta de Visita 08112023/11.2SOP INGR OPER.pdf
Resource
win10v2004-20250314-en
Behavioral task
behavioral27
Sample
Info Enviada DIAN Acta de Visita 08112023/2.EXISTENCIA REPRESENTACIN LEGAL.pdf
Resource
win7-20241010-en
Behavioral task
behavioral28
Sample
Info Enviada DIAN Acta de Visita 08112023/2.EXISTENCIA REPRESENTACIN LEGAL.pdf
Resource
win10v2004-20250314-en
Behavioral task
behavioral29
Sample
Info Enviada DIAN Acta de Visita 08112023/3.Contrato EP Buenavista ANH - UTOE_compressed.pdf
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
Info Enviada DIAN Acta de Visita 08112023/3.Contrato EP Buenavista ANH - UTOE_compressed.pdf
Resource
win10v2004-20250313-en
Behavioral task
behavioral31
Sample
Info Enviada DIAN Acta de Visita 08112023/3.Contrato UTOE - Otro SI No. 10.pdf
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
Info Enviada DIAN Acta de Visita 08112023/3.Contrato UTOE - Otro SI No. 10.pdf
Resource
win10v2004-20250313-en
General
-
Target
10 Ingresos y Retenciones/Hocol Retefuente.pdf
-
Size
17KB
-
MD5
8529ba4cfd0a2a524a991d934383690f
-
SHA1
e54361d2eca3624b64339fddacbfa2c04dd6a7f3
-
SHA256
1da1b807fe68f4c0e7cb918628a7b10d4d7265a5f68b82d58c85568bc3659c5d
-
SHA512
41e67f1101d01a1b3a381dc2633cfada9e6c0f0bb8594758fc8eb043c7865c16b2a28d1ff73ee31bf80161b0df30049b68a14c049a77f2e8ae7b97ed2b1ad438
-
SSDEEP
384:irMFbNZ7quiiMpG5nnYHdHGjh+a4KCBeokjXDLEIb9Ig2RM4JZD:JbNZ7qz8kdHGT0B8jTLEGCgg
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 1672 AcroRd32.exe 1672 AcroRd32.exe 1672 AcroRd32.exe 1672 AcroRd32.exe 1672 AcroRd32.exe 1672 AcroRd32.exe 1672 AcroRd32.exe 1672 AcroRd32.exe 1672 AcroRd32.exe 1672 AcroRd32.exe 1672 AcroRd32.exe 1672 AcroRd32.exe 1672 AcroRd32.exe 1672 AcroRd32.exe 1672 AcroRd32.exe 1672 AcroRd32.exe 1672 AcroRd32.exe 1672 AcroRd32.exe 1672 AcroRd32.exe 1672 AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1672 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 1672 AcroRd32.exe 1672 AcroRd32.exe 1672 AcroRd32.exe 1672 AcroRd32.exe 1672 AcroRd32.exe 1672 AcroRd32.exe 1672 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1672 wrote to memory of 4632 1672 AcroRd32.exe 91 PID 1672 wrote to memory of 4632 1672 AcroRd32.exe 91 PID 1672 wrote to memory of 4632 1672 AcroRd32.exe 91 PID 4632 wrote to memory of 3620 4632 RdrCEF.exe 94 PID 4632 wrote to memory of 3620 4632 RdrCEF.exe 94 PID 4632 wrote to memory of 3620 4632 RdrCEF.exe 94 PID 4632 wrote to memory of 3620 4632 RdrCEF.exe 94 PID 4632 wrote to memory of 3620 4632 RdrCEF.exe 94 PID 4632 wrote to memory of 3620 4632 RdrCEF.exe 94 PID 4632 wrote to memory of 3620 4632 RdrCEF.exe 94 PID 4632 wrote to memory of 3620 4632 RdrCEF.exe 94 PID 4632 wrote to memory of 3620 4632 RdrCEF.exe 94 PID 4632 wrote to memory of 3620 4632 RdrCEF.exe 94 PID 4632 wrote to memory of 3620 4632 RdrCEF.exe 94 PID 4632 wrote to memory of 3620 4632 RdrCEF.exe 94 PID 4632 wrote to memory of 3620 4632 RdrCEF.exe 94 PID 4632 wrote to memory of 3620 4632 RdrCEF.exe 94 PID 4632 wrote to memory of 3620 4632 RdrCEF.exe 94 PID 4632 wrote to memory of 3620 4632 RdrCEF.exe 94 PID 4632 wrote to memory of 3620 4632 RdrCEF.exe 94 PID 4632 wrote to memory of 3620 4632 RdrCEF.exe 94 PID 4632 wrote to memory of 3620 4632 RdrCEF.exe 94 PID 4632 wrote to memory of 3620 4632 RdrCEF.exe 94 PID 4632 wrote to memory of 3620 4632 RdrCEF.exe 94 PID 4632 wrote to memory of 3620 4632 RdrCEF.exe 94 PID 4632 wrote to memory of 3620 4632 RdrCEF.exe 94 PID 4632 wrote to memory of 3620 4632 RdrCEF.exe 94 PID 4632 wrote to memory of 3620 4632 RdrCEF.exe 94 PID 4632 wrote to memory of 3620 4632 RdrCEF.exe 94 PID 4632 wrote to memory of 3620 4632 RdrCEF.exe 94 PID 4632 wrote to memory of 3620 4632 RdrCEF.exe 94 PID 4632 wrote to memory of 3620 4632 RdrCEF.exe 94 PID 4632 wrote to memory of 3620 4632 RdrCEF.exe 94 PID 4632 wrote to memory of 3620 4632 RdrCEF.exe 94 PID 4632 wrote to memory of 3620 4632 RdrCEF.exe 94 PID 4632 wrote to memory of 3620 4632 RdrCEF.exe 94 PID 4632 wrote to memory of 3620 4632 RdrCEF.exe 94 PID 4632 wrote to memory of 3620 4632 RdrCEF.exe 94 PID 4632 wrote to memory of 3620 4632 RdrCEF.exe 94 PID 4632 wrote to memory of 3620 4632 RdrCEF.exe 94 PID 4632 wrote to memory of 3620 4632 RdrCEF.exe 94 PID 4632 wrote to memory of 3620 4632 RdrCEF.exe 94 PID 4632 wrote to memory of 3620 4632 RdrCEF.exe 94 PID 4632 wrote to memory of 3620 4632 RdrCEF.exe 94 PID 4632 wrote to memory of 5096 4632 RdrCEF.exe 95 PID 4632 wrote to memory of 5096 4632 RdrCEF.exe 95 PID 4632 wrote to memory of 5096 4632 RdrCEF.exe 95 PID 4632 wrote to memory of 5096 4632 RdrCEF.exe 95 PID 4632 wrote to memory of 5096 4632 RdrCEF.exe 95 PID 4632 wrote to memory of 5096 4632 RdrCEF.exe 95 PID 4632 wrote to memory of 5096 4632 RdrCEF.exe 95 PID 4632 wrote to memory of 5096 4632 RdrCEF.exe 95 PID 4632 wrote to memory of 5096 4632 RdrCEF.exe 95 PID 4632 wrote to memory of 5096 4632 RdrCEF.exe 95 PID 4632 wrote to memory of 5096 4632 RdrCEF.exe 95 PID 4632 wrote to memory of 5096 4632 RdrCEF.exe 95 PID 4632 wrote to memory of 5096 4632 RdrCEF.exe 95 PID 4632 wrote to memory of 5096 4632 RdrCEF.exe 95 PID 4632 wrote to memory of 5096 4632 RdrCEF.exe 95 PID 4632 wrote to memory of 5096 4632 RdrCEF.exe 95 PID 4632 wrote to memory of 5096 4632 RdrCEF.exe 95 PID 4632 wrote to memory of 5096 4632 RdrCEF.exe 95 PID 4632 wrote to memory of 5096 4632 RdrCEF.exe 95 PID 4632 wrote to memory of 5096 4632 RdrCEF.exe 95
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\10 Ingresos y Retenciones\Hocol Retefuente.pdf"1⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4632 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=01EF9CFE0D5C65A5800D1F2C42DF4E93 --mojo-platform-channel-handle=1732 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵
- System Location Discovery: System Language Discovery
PID:3620
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=9F94B4BDE401B3E24A9922999DCFE2BF --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=9F94B4BDE401B3E24A9922999DCFE2BF --renderer-client-id=2 --mojo-platform-channel-handle=1752 --allow-no-sandbox-job /prefetch:13⤵
- System Location Discovery: System Language Discovery
PID:5096
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=F0C84806D59B29F312D27981949CA12A --mojo-platform-channel-handle=2284 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵
- System Location Discovery: System Language Discovery
PID:5176
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=B8C3FA29B73FB55E97C343FEFB252F4C --mojo-platform-channel-handle=1932 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵
- System Location Discovery: System Language Discovery
PID:4508
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=B80C7FFDED8B31579561681C4C3D8649 --mojo-platform-channel-handle=2416 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵
- System Location Discovery: System Language Discovery
PID:5976
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=CD492FA2E8CCC21D2DE834814125FD20 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=CD492FA2E8CCC21D2DE834814125FD20 --renderer-client-id=7 --mojo-platform-channel-handle=2288 --allow-no-sandbox-job /prefetch:13⤵
- System Location Discovery: System Language Discovery
PID:1340
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=67BD3A26ED9FA54BC88A213D77ACD8F6 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=67BD3A26ED9FA54BC88A213D77ACD8F6 --renderer-client-id=10 --mojo-platform-channel-handle=2512 --allow-no-sandbox-job /prefetch:13⤵
- System Location Discovery: System Language Discovery
PID:2604
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3336
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD585387aaff449472e4816deb30c8b3935
SHA19ad43dc2fcd05b0aedc9112cb0434e4450408224
SHA256a314f55217c5f369d59929157a64397e1196e703f34ddc9723444b51613e4865
SHA5123bc3f4774aeb913c1cf6c67e7eac9abb2d5c7d0e6400b5f98c349d92792bc3626c817a32602e3a8c41f01dcb680148918f19eca9b71b361b92b3acd5f03dfe63
-
Filesize
36KB
MD5b30d3becc8731792523d599d949e63f5
SHA119350257e42d7aee17fb3bf139a9d3adb330fad4
SHA256b1b77e96279ead2b460de3de70e2ea4f5ad1b853598a4e27a5caf3f1a32cc4f3
SHA512523f54895fb07f62b9a5f72c8b62e83d4d9506bda57b183818615f6eb7286e3b9c5a50409bc5c5164867c3ccdeae88aa395ecca6bc7e36d991552f857510792e
-
Filesize
56KB
MD5752a1f26b18748311b691c7d8fc20633
SHA1c1f8e83eebc1cc1e9b88c773338eb09ff82ab862
SHA256111dac2948e4cecb10b0d2e10d8afaa663d78d643826b592d6414a1fd77cc131
SHA512a2f5f262faf2c3e9756da94b2c47787ce3a9391b5bd53581578aa9a764449e114836704d6dec4aadc097fed4c818831baa11affa1eb25be2bfad9349bb090fe5