Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
01-08-2024 20:49
Behavioral task
behavioral1
Sample
HealthEquity Privacy Supplement to CIO Letter 7.8.24.pdf
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
HealthEquity Privacy Supplement to CIO Letter 7.8.24.pdf
Resource
win10v2004-20240730-en
Behavioral task
behavioral3
Sample
MicrosoftIRMServices Protected PDF.pdf
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
MicrosoftIRMServices Protected PDF.pdf
Resource
win10v2004-20240730-en
General
-
Target
MicrosoftIRMServices Protected PDF.pdf
-
Size
179KB
-
MD5
cd0211db9c79d245873ddc4577fab5ad
-
SHA1
1901f1d3e4077bcc98a867f43579091b6d7f1e78
-
SHA256
6dde899c1b0038a7c8a68472289f6089071beadb0221658ce798c408d119481e
-
SHA512
448a2e2f0c1f5ab595cde7f4ecbae59a92f37a6f712af612ffdbfd2b793ad2513beef0aa6a02e423f388d1b55a776b609365be31b08a31aef01cfd75fe3375c0
-
SSDEEP
3072:8qHMk2HPMsjjVOjVQ8sqNnDKUAD3fEV2ZchFHoAurvbkcIXmceJKel7XPcIo:8qHbiPMsP6PxDKlDPEV2wFbur4cIXgF6
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2951562807-3718269429-4208157415-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious behavior: EnumeratesProcesses 30 IoCs
pid Process 548 msedge.exe 548 msedge.exe 2104 msedge.exe 2104 msedge.exe 1616 identity_helper.exe 1616 identity_helper.exe 4460 AcroRd32.exe 4460 AcroRd32.exe 4460 AcroRd32.exe 4460 AcroRd32.exe 4460 AcroRd32.exe 4460 AcroRd32.exe 4460 AcroRd32.exe 4460 AcroRd32.exe 4460 AcroRd32.exe 4460 AcroRd32.exe 4460 AcroRd32.exe 4460 AcroRd32.exe 4460 AcroRd32.exe 4460 AcroRd32.exe 4460 AcroRd32.exe 4460 AcroRd32.exe 4460 AcroRd32.exe 4460 AcroRd32.exe 4460 AcroRd32.exe 4460 AcroRd32.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4460 AcroRd32.exe 4460 AcroRd32.exe 4460 AcroRd32.exe 4460 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4460 wrote to memory of 2104 4460 AcroRd32.exe 86 PID 4460 wrote to memory of 2104 4460 AcroRd32.exe 86 PID 2104 wrote to memory of 1568 2104 msedge.exe 87 PID 2104 wrote to memory of 1568 2104 msedge.exe 87 PID 2104 wrote to memory of 1828 2104 msedge.exe 88 PID 2104 wrote to memory of 1828 2104 msedge.exe 88 PID 2104 wrote to memory of 1828 2104 msedge.exe 88 PID 2104 wrote to memory of 1828 2104 msedge.exe 88 PID 2104 wrote to memory of 1828 2104 msedge.exe 88 PID 2104 wrote to memory of 1828 2104 msedge.exe 88 PID 2104 wrote to memory of 1828 2104 msedge.exe 88 PID 2104 wrote to memory of 1828 2104 msedge.exe 88 PID 2104 wrote to memory of 1828 2104 msedge.exe 88 PID 2104 wrote to memory of 1828 2104 msedge.exe 88 PID 2104 wrote to memory of 1828 2104 msedge.exe 88 PID 2104 wrote to memory of 1828 2104 msedge.exe 88 PID 2104 wrote to memory of 1828 2104 msedge.exe 88 PID 2104 wrote to memory of 1828 2104 msedge.exe 88 PID 2104 wrote to memory of 1828 2104 msedge.exe 88 PID 2104 wrote to memory of 1828 2104 msedge.exe 88 PID 2104 wrote to memory of 1828 2104 msedge.exe 88 PID 2104 wrote to memory of 1828 2104 msedge.exe 88 PID 2104 wrote to memory of 1828 2104 msedge.exe 88 PID 2104 wrote to memory of 1828 2104 msedge.exe 88 PID 2104 wrote to memory of 1828 2104 msedge.exe 88 PID 2104 wrote to memory of 1828 2104 msedge.exe 88 PID 2104 wrote to memory of 1828 2104 msedge.exe 88 PID 2104 wrote to memory of 1828 2104 msedge.exe 88 PID 2104 wrote to memory of 1828 2104 msedge.exe 88 PID 2104 wrote to memory of 1828 2104 msedge.exe 88 PID 2104 wrote to memory of 1828 2104 msedge.exe 88 PID 2104 wrote to memory of 1828 2104 msedge.exe 88 PID 2104 wrote to memory of 1828 2104 msedge.exe 88 PID 2104 wrote to memory of 1828 2104 msedge.exe 88 PID 2104 wrote to memory of 1828 2104 msedge.exe 88 PID 2104 wrote to memory of 1828 2104 msedge.exe 88 PID 2104 wrote to memory of 1828 2104 msedge.exe 88 PID 2104 wrote to memory of 1828 2104 msedge.exe 88 PID 2104 wrote to memory of 1828 2104 msedge.exe 88 PID 2104 wrote to memory of 1828 2104 msedge.exe 88 PID 2104 wrote to memory of 1828 2104 msedge.exe 88 PID 2104 wrote to memory of 1828 2104 msedge.exe 88 PID 2104 wrote to memory of 1828 2104 msedge.exe 88 PID 2104 wrote to memory of 1828 2104 msedge.exe 88 PID 2104 wrote to memory of 548 2104 msedge.exe 89 PID 2104 wrote to memory of 548 2104 msedge.exe 89 PID 2104 wrote to memory of 5068 2104 msedge.exe 90 PID 2104 wrote to memory of 5068 2104 msedge.exe 90 PID 2104 wrote to memory of 5068 2104 msedge.exe 90 PID 2104 wrote to memory of 5068 2104 msedge.exe 90 PID 2104 wrote to memory of 5068 2104 msedge.exe 90 PID 2104 wrote to memory of 5068 2104 msedge.exe 90 PID 2104 wrote to memory of 5068 2104 msedge.exe 90 PID 2104 wrote to memory of 5068 2104 msedge.exe 90 PID 2104 wrote to memory of 5068 2104 msedge.exe 90 PID 2104 wrote to memory of 5068 2104 msedge.exe 90 PID 2104 wrote to memory of 5068 2104 msedge.exe 90 PID 2104 wrote to memory of 5068 2104 msedge.exe 90 PID 2104 wrote to memory of 5068 2104 msedge.exe 90 PID 2104 wrote to memory of 5068 2104 msedge.exe 90 PID 2104 wrote to memory of 5068 2104 msedge.exe 90 PID 2104 wrote to memory of 5068 2104 msedge.exe 90 PID 2104 wrote to memory of 5068 2104 msedge.exe 90 PID 2104 wrote to memory of 5068 2104 msedge.exe 90
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\MicrosoftIRMServices Protected PDF.pdf"1⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4460 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://cgi1.adobe.com/special/acrobat/pluginfinder/pluginfinder.cgi?type=Filter&name=MicrosoftIRMServices&os=Win&vers=19.0&2⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffec3d146f8,0x7ffec3d14708,0x7ffec3d147183⤵PID:1568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,8023629661300612860,12443423161974289589,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:23⤵PID:1828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,8023629661300612860,12443423161974289589,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2080,8023629661300612860,12443423161974289589,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2836 /prefetch:83⤵PID:5068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,8023629661300612860,12443423161974289589,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:13⤵PID:3368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,8023629661300612860,12443423161974289589,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:13⤵PID:1244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,8023629661300612860,12443423161974289589,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4872 /prefetch:13⤵PID:4424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,8023629661300612860,12443423161974289589,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5664 /prefetch:83⤵PID:1076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,8023629661300612860,12443423161974289589,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5664 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:1616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,8023629661300612860,12443423161974289589,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4104 /prefetch:13⤵PID:3756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,8023629661300612860,12443423161974289589,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3960 /prefetch:13⤵PID:2268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,8023629661300612860,12443423161974289589,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3536 /prefetch:13⤵PID:4924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,8023629661300612860,12443423161974289589,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3620 /prefetch:13⤵PID:432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,8023629661300612860,12443423161974289589,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1372 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:5060
-
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- System Location Discovery: System Language Discovery
PID:3908 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=44978EF0927722D348742985DC6F78EC --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=44978EF0927722D348742985DC6F78EC --renderer-client-id=2 --mojo-platform-channel-handle=1724 --allow-no-sandbox-job /prefetch:13⤵
- System Location Discovery: System Language Discovery
PID:2872
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=FD39719EE1E73DBD460C39D8A2B59285 --mojo-platform-channel-handle=1728 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵
- System Location Discovery: System Language Discovery
PID:848
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=08D1C17D47163FB1038F04BE064B8D3F --mojo-platform-channel-handle=2300 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵
- System Location Discovery: System Language Discovery
PID:2388
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=1231ED77A279AD0D81E48B353DB1873A --mojo-platform-channel-handle=2060 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵
- System Location Discovery: System Language Discovery
PID:1488
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=F50132DB337439ADFDF5FBAE213617A2 --mojo-platform-channel-handle=2088 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵
- System Location Discovery: System Language Discovery
PID:1340
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3652
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:404
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:628
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
36KB
MD5b30d3becc8731792523d599d949e63f5
SHA119350257e42d7aee17fb3bf139a9d3adb330fad4
SHA256b1b77e96279ead2b460de3de70e2ea4f5ad1b853598a4e27a5caf3f1a32cc4f3
SHA512523f54895fb07f62b9a5f72c8b62e83d4d9506bda57b183818615f6eb7286e3b9c5a50409bc5c5164867c3ccdeae88aa395ecca6bc7e36d991552f857510792e
-
Filesize
56KB
MD5752a1f26b18748311b691c7d8fc20633
SHA1c1f8e83eebc1cc1e9b88c773338eb09ff82ab862
SHA256111dac2948e4cecb10b0d2e10d8afaa663d78d643826b592d6414a1fd77cc131
SHA512a2f5f262faf2c3e9756da94b2c47787ce3a9391b5bd53581578aa9a764449e114836704d6dec4aadc097fed4c818831baa11affa1eb25be2bfad9349bb090fe5
-
Filesize
64KB
MD5e04293123ab1619c34fba7c78c1ecbdb
SHA111450d4036389c3e4d6c22676fa6692954578989
SHA2568c781fef2c2411ef1fd4a86ac8f39427a6ec84061b7e07b0ee3b90cd073c22fc
SHA512f54a54469c6730532be8a070c63aa3997fe1d92f1c5525acaaec0cabfd283d498b3becbacf15b25728ae3f92dbc6e42beb5124870ddd33dd0bee1b32a178ab12
-
Filesize
152B
MD5336e632142966bb5b1555731fdae58b9
SHA1df21896206cb41e55caef4082b8d402435de5389
SHA256bf03fb88aee2f97c7757c4d05b84f3873ba82c16de2a537679f521bb42d2a3d8
SHA512f7cc58005811b16b1842307d473d379a0444269936ab2c0bbd58d827ad5383e0400e2a7e863f59215412a2f84924b1f8758b155b1b7eb83d045d1b6883c92173
-
Filesize
152B
MD5dd3fc896ff3b0d6ebf2ed72827fd3aa3
SHA18c8a9bcb355d3fddca81c5a0b7c85a094fbe9b5f
SHA2567d083e4431e3faf959c6c5f74d0319e5c7b199407b6a36c7adc980376e6da72e
SHA5125950639d09cd39676d2277efd11e4e21fcb6431cd67f7f2ba900def9d25fc4d56015ae2a0e32fa9f599e71f1ffd0f1b3981c57a30d73095915f975e783633619
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize816B
MD586af63fc46cb25379dcf5194a012a6f4
SHA1e971da83c5559e626a45b526d4d7251db13e8623
SHA2562b0fa44cb5848a78474d6ba4737850e9ed435cbb1914ef855040a8a0d3ce2b90
SHA512f29dae80071d648821025a2f75762ca98062cdea892d44333259af2d83b2966af0b1b2623094e6b7fbe012473b0d3bde3f060d9fea76e42039f8b6cf53d04dca
-
Filesize
1KB
MD5d605a295bdc12d539dba9a00c81dc5f0
SHA1eee1d8d6611f96ac7db871ee4b1f2b6182b4a63a
SHA2568f7adda58c4dbac23288e147964b95e19795702d0122848464f7d54cb038d7e8
SHA51298051ec23a57d96e1848251f25c719cffff85eb0472d5af6c8f33bda940746e0d92ccd4597564dc58adc286387339a1749f448e4e55fd979732d9c50553f04cd
-
Filesize
6KB
MD5afc462c2460ba71232934d85ec3a44e5
SHA175ce420da0c223f3b984b4581ee640c9283870bc
SHA256446e0d29c8c6be03ea168e420c849bb6f58d82c03fe80fb03113d518d2c74be3
SHA5122154eca0ad6fe65f82ea71db019cd0e0bec92de073f2560a27c1c910a8101c906da8e7e479e4cd351b48e619e0336d6919076bef918931a634fa0ed387557b0a
-
Filesize
6KB
MD5c0dd371f486993da254bca57f6914227
SHA18ce6136b02aeb629dee63fd9fd2af37e02bc5567
SHA25669994a0530a1932a004e2554037c50b2252a1ff80d8a0480ed0928adf3c22b94
SHA512780573d44f46bf7a76f5b5fdb3e2dddd04a09c11cc64b706f8167ad3f5a4ab12819f9b61ddac9563a105ebff387b791627f63db03affaf3a3c8709b7afe50e82
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5d05810f865ecf4f8724b39c917bd0b03
SHA1f8e80ff2453b5a789dbc7718577de57e9c20138a
SHA2566aa325445b2db3bd18eae44974f3be1c16f546896250fde771a95e65941f9b3d
SHA512887e9cb282f8025887a2f153c87027ffaee2206f052598e04d473112da0b82c20090545dce34982c948eea988e008670a6dafb2bc23c181a944c960a6f160e60