Overview
overview
4Static
static
4AIR FORCE/...FP.pdf
windows7-x64
1AIR FORCE/...FP.pdf
windows10-2004-x64
1AIR FORCE/...ed.pdf
windows7-x64
1AIR FORCE/...ed.pdf
windows10-2004-x64
1AIR FORCE/...T).pdf
windows7-x64
1AIR FORCE/...T).pdf
windows10-2004-x64
1AIR FORCE/... 1.pdf
windows7-x64
1AIR FORCE/... 1.pdf
windows10-2004-x64
1AIR FORCE/...22.pdf
windows7-x64
1AIR FORCE/...22.pdf
windows10-2004-x64
1AIR FORCE/...ce.pdf
windows7-x64
1AIR FORCE/...ce.pdf
windows10-2004-x64
1AIR FORCE/...02.pdf
windows7-x64
1AIR FORCE/...02.pdf
windows10-2004-x64
1AIR FORCE/...05.pdf
windows7-x64
1AIR FORCE/...05.pdf
windows10-2004-x64
1AIR FORCE/...1 .pdf
windows7-x64
1AIR FORCE/...1 .pdf
windows10-2004-x64
1AIR FORCE/...ed.pdf
windows7-x64
1AIR FORCE/...ed.pdf
windows10-2004-x64
1AIR FORCE/...19.pdf
windows7-x64
1AIR FORCE/...19.pdf
windows10-2004-x64
1AIR FORCE/...AL.pdf
windows7-x64
1AIR FORCE/...AL.pdf
windows10-2004-x64
1AIR FORCE/...17.pdf
windows7-x64
1AIR FORCE/...17.pdf
windows10-2004-x64
1AIR FORCE/...20.pdf
windows7-x64
1AIR FORCE/...20.pdf
windows10-2004-x64
1AIR FORCE/...ts.pdf
windows7-x64
1AIR FORCE/...ts.pdf
windows10-2004-x64
1AIR FORCE/...30.pdf
windows7-x64
1AIR FORCE/...30.pdf
windows10-2004-x64
1Analysis
-
max time kernel
146s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
03/06/2024, 15:46
Behavioral task
behavioral1
Sample
AIR FORCE/3. TMQ53 CLS PWS-RFP.pdf
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
AIR FORCE/3. TMQ53 CLS PWS-RFP.pdf
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
AIR FORCE/Attachment 0013g - D-IBCS-0471_Delta2_Suppl_PE_redacted.pdf
Resource
win7-20240215-en
Behavioral task
behavioral4
Sample
AIR FORCE/Attachment 0013g - D-IBCS-0471_Delta2_Suppl_PE_redacted.pdf
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
AIR FORCE/Attachment_7_-_Compliance_and_Reference_Documents_(DRAFT).pdf
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
AIR FORCE/Attachment_7_-_Compliance_and_Reference_Documents_(DRAFT).pdf
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
AIR FORCE/DRAFT JNWC-IV-IDIQ Work Statement v. 1.pdf
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
AIR FORCE/DRAFT JNWC-IV-IDIQ Work Statement v. 1.pdf
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
AIR FORCE/Draft GRIM SOW 7 Nov 2022.pdf
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
AIR FORCE/Draft GRIM SOW 7 Nov 2022.pdf
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
AIR FORCE/FTUAS Applicable Documents for Reference.pdf
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
AIR FORCE/FTUAS Applicable Documents for Reference.pdf
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
AIR FORCE/GEN-12-AMAM-02.pdf
Resource
win7-20240508-en
Behavioral task
behavioral14
Sample
AIR FORCE/GEN-12-AMAM-02.pdf
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
AIR FORCE/HSIP_FY21_SOW_BusinessPoints_20210105.pdf
Resource
win7-20240508-en
Behavioral task
behavioral16
Sample
AIR FORCE/HSIP_FY21_SOW_BusinessPoints_20210105.pdf
Resource
win10v2004-20240426-en
Behavioral task
behavioral17
Sample
AIR FORCE/HYDRA PWS_Draft_RFI V1 .pdf
Resource
win7-20240508-en
Behavioral task
behavioral18
Sample
AIR FORCE/HYDRA PWS_Draft_RFI V1 .pdf
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
AIR FORCE/LCMP-IDE_Follow-on_Exception_to_Fair_Opportunity_Justification_(004)_Redacted.pdf
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
AIR FORCE/LCMP-IDE_Follow-on_Exception_to_Fair_Opportunity_Justification_(004)_Redacted.pdf
Resource
win10v2004-20240508-en
Behavioral task
behavioral21
Sample
AIR FORCE/PBL_PWS_-_DRAFT_02212019.pdf
Resource
win7-20240508-en
Behavioral task
behavioral22
Sample
AIR FORCE/PBL_PWS_-_DRAFT_02212019.pdf
Resource
win10v2004-20240508-en
Behavioral task
behavioral23
Sample
AIR FORCE/PSIR-APC-01 Industry Day 4_21_2021 FINAL.pdf
Resource
win7-20240508-en
Behavioral task
behavioral24
Sample
AIR FORCE/PSIR-APC-01 Industry Day 4_21_2021 FINAL.pdf
Resource
win10v2004-20240426-en
Behavioral task
behavioral25
Sample
AIR FORCE/Polaris_Draft_SOW_1_Jun_2017.pdf
Resource
win7-20240220-en
Behavioral task
behavioral26
Sample
AIR FORCE/Polaris_Draft_SOW_1_Jun_2017.pdf
Resource
win10v2004-20240426-en
Behavioral task
behavioral27
Sample
AIR FORCE/RFI_FMI_11192020.pdf
Resource
win7-20231129-en
Behavioral task
behavioral28
Sample
AIR FORCE/RFI_FMI_11192020.pdf
Resource
win10v2004-20240508-en
Behavioral task
behavioral29
Sample
AIR FORCE/Site Visit Sign In Sheets.pdf
Resource
win7-20240221-en
Behavioral task
behavioral30
Sample
AIR FORCE/Site Visit Sign In Sheets.pdf
Resource
win10v2004-20240226-en
Behavioral task
behavioral31
Sample
AIR FORCE/VoICE Industry Day Presentation 20200930.pdf
Resource
win7-20240221-en
Behavioral task
behavioral32
Sample
AIR FORCE/VoICE Industry Day Presentation 20200930.pdf
Resource
win10v2004-20240508-en
General
-
Target
AIR FORCE/GEN-12-AMAM-02.pdf
-
Size
123KB
-
MD5
6f2d44248dac1de7184107c850b76ca2
-
SHA1
b7548cfb27b1e41853ff18b8e23e482796c5859c
-
SHA256
72c7c7833f2572f9e3415b942ae65936e6849f8cc7fc682155a72937d36fe44d
-
SHA512
e11d4aae4dd808d9d1ba528e7426645694c87e531ad655b6059139f0a802dc3961d1aa40174a633c59dffc161f8c70cdf5d5fdb9d5fe7e79b1f679bc2bae228c
-
SSDEEP
3072:3vzI4Ai/ax66fkkNsp7ntYTtyqpvkqW0ei8s/tMLY4:3oi/e6gu7CT0qpvk4Fx/tMB
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4960 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4960 AcroRd32.exe 4960 AcroRd32.exe 4960 AcroRd32.exe 4960 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4960 wrote to memory of 4024 4960 AcroRd32.exe 88 PID 4960 wrote to memory of 4024 4960 AcroRd32.exe 88 PID 4960 wrote to memory of 4024 4960 AcroRd32.exe 88 PID 4024 wrote to memory of 3708 4024 RdrCEF.exe 89 PID 4024 wrote to memory of 3708 4024 RdrCEF.exe 89 PID 4024 wrote to memory of 3708 4024 RdrCEF.exe 89 PID 4024 wrote to memory of 3708 4024 RdrCEF.exe 89 PID 4024 wrote to memory of 3708 4024 RdrCEF.exe 89 PID 4024 wrote to memory of 3708 4024 RdrCEF.exe 89 PID 4024 wrote to memory of 3708 4024 RdrCEF.exe 89 PID 4024 wrote to memory of 3708 4024 RdrCEF.exe 89 PID 4024 wrote to memory of 3708 4024 RdrCEF.exe 89 PID 4024 wrote to memory of 3708 4024 RdrCEF.exe 89 PID 4024 wrote to memory of 3708 4024 RdrCEF.exe 89 PID 4024 wrote to memory of 3708 4024 RdrCEF.exe 89 PID 4024 wrote to memory of 3708 4024 RdrCEF.exe 89 PID 4024 wrote to memory of 3708 4024 RdrCEF.exe 89 PID 4024 wrote to memory of 3708 4024 RdrCEF.exe 89 PID 4024 wrote to memory of 3708 4024 RdrCEF.exe 89 PID 4024 wrote to memory of 3708 4024 RdrCEF.exe 89 PID 4024 wrote to memory of 3708 4024 RdrCEF.exe 89 PID 4024 wrote to memory of 3708 4024 RdrCEF.exe 89 PID 4024 wrote to memory of 3708 4024 RdrCEF.exe 89 PID 4024 wrote to memory of 3708 4024 RdrCEF.exe 89 PID 4024 wrote to memory of 3708 4024 RdrCEF.exe 89 PID 4024 wrote to memory of 3708 4024 RdrCEF.exe 89 PID 4024 wrote to memory of 3708 4024 RdrCEF.exe 89 PID 4024 wrote to memory of 3708 4024 RdrCEF.exe 89 PID 4024 wrote to memory of 3708 4024 RdrCEF.exe 89 PID 4024 wrote to memory of 3708 4024 RdrCEF.exe 89 PID 4024 wrote to memory of 3708 4024 RdrCEF.exe 89 PID 4024 wrote to memory of 3708 4024 RdrCEF.exe 89 PID 4024 wrote to memory of 3708 4024 RdrCEF.exe 89 PID 4024 wrote to memory of 3708 4024 RdrCEF.exe 89 PID 4024 wrote to memory of 3708 4024 RdrCEF.exe 89 PID 4024 wrote to memory of 3708 4024 RdrCEF.exe 89 PID 4024 wrote to memory of 3708 4024 RdrCEF.exe 89 PID 4024 wrote to memory of 3708 4024 RdrCEF.exe 89 PID 4024 wrote to memory of 3708 4024 RdrCEF.exe 89 PID 4024 wrote to memory of 3708 4024 RdrCEF.exe 89 PID 4024 wrote to memory of 3708 4024 RdrCEF.exe 89 PID 4024 wrote to memory of 3708 4024 RdrCEF.exe 89 PID 4024 wrote to memory of 3708 4024 RdrCEF.exe 89 PID 4024 wrote to memory of 3708 4024 RdrCEF.exe 89 PID 4024 wrote to memory of 1976 4024 RdrCEF.exe 90 PID 4024 wrote to memory of 1976 4024 RdrCEF.exe 90 PID 4024 wrote to memory of 1976 4024 RdrCEF.exe 90 PID 4024 wrote to memory of 1976 4024 RdrCEF.exe 90 PID 4024 wrote to memory of 1976 4024 RdrCEF.exe 90 PID 4024 wrote to memory of 1976 4024 RdrCEF.exe 90 PID 4024 wrote to memory of 1976 4024 RdrCEF.exe 90 PID 4024 wrote to memory of 1976 4024 RdrCEF.exe 90 PID 4024 wrote to memory of 1976 4024 RdrCEF.exe 90 PID 4024 wrote to memory of 1976 4024 RdrCEF.exe 90 PID 4024 wrote to memory of 1976 4024 RdrCEF.exe 90 PID 4024 wrote to memory of 1976 4024 RdrCEF.exe 90 PID 4024 wrote to memory of 1976 4024 RdrCEF.exe 90 PID 4024 wrote to memory of 1976 4024 RdrCEF.exe 90 PID 4024 wrote to memory of 1976 4024 RdrCEF.exe 90 PID 4024 wrote to memory of 1976 4024 RdrCEF.exe 90 PID 4024 wrote to memory of 1976 4024 RdrCEF.exe 90 PID 4024 wrote to memory of 1976 4024 RdrCEF.exe 90 PID 4024 wrote to memory of 1976 4024 RdrCEF.exe 90 PID 4024 wrote to memory of 1976 4024 RdrCEF.exe 90
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\AIR FORCE\GEN-12-AMAM-02.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4960 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- Suspicious use of WriteProcessMemory
PID:4024 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=929BD723674750DEF0911A0AF5CD4C84 --mojo-platform-channel-handle=1732 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:3708
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=F4F92FB3CAE8D4D909828AFA67B1EDEC --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=F4F92FB3CAE8D4D909828AFA67B1EDEC --renderer-client-id=2 --mojo-platform-channel-handle=1744 --allow-no-sandbox-job /prefetch:13⤵PID:1976
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=0ECA6D606659E98F255B63C7CAA27B40 --mojo-platform-channel-handle=2276 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:4340
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=C25B9E18E580DC9D243F279A545648EA --mojo-platform-channel-handle=2432 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:3056
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=76641AE729B9640CCDD9747AAB710E0C --mojo-platform-channel-handle=2536 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:4920
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=3ABA2091D534EA6C434AE7AD25CBA42B --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=3ABA2091D534EA6C434AE7AD25CBA42B --renderer-client-id=7 --mojo-platform-channel-handle=2600 --allow-no-sandbox-job /prefetch:13⤵PID:1300
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD53a026a36133bb5f0130a2a7fc517d687
SHA1ab9bb8e05c1cd21d576cf895d6a0aa25f127f66e
SHA2565a8058c9ea3a535cf21de79d9e1e77c72ec9c1f6622b0f3a197ff3d4e720d752
SHA51282ee3eeaf22b0c001c3e31cad263fc1db26550fd522c557b56184ca867ef301eb0d0ff4bd2d2cf7b83dee57f397f71b700a91e3d0ec2fa98d8978ce44b7e64a5
-
Filesize
64KB
MD508c02fd13fe3d8bbe6e791cfd5303e3b
SHA1836a9e82d7b703b68bec38eec86720ea88760176
SHA256c9d97be85b6ed0709add5364c26cf830a38283a8c42b366f4f171411bd3618e7
SHA512df24d6966450608cd8d3551ce18af008b4fa0fed3c6286359bf90e5692e5b10645184fe621c006dfaca7b14a6e6bcabf971f9f133754704e8dd3829fcefcdf36