Analysis
-
max time kernel
152s -
max time network
158s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
09-05-2021 20:05
Behavioral task
behavioral1
Sample
082e8b6b74753482bca3797cb17c79e93f7f4fac591bd9a20239235b3595473a.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
082e8b6b74753482bca3797cb17c79e93f7f4fac591bd9a20239235b3595473a.exe
Resource
win10v20210408
General
-
Target
082e8b6b74753482bca3797cb17c79e93f7f4fac591bd9a20239235b3595473a.exe
-
Size
2.9MB
-
MD5
c7022a3694ea7867e1b3d92f3e9a9b28
-
SHA1
ecf16ede30e2923a6d68579a5c603c4b43de0b13
-
SHA256
082e8b6b74753482bca3797cb17c79e93f7f4fac591bd9a20239235b3595473a
-
SHA512
0d9f178cc9e85bf66906ca1a1f458c2388897c549fc0ccf436025164964f087eff69c7767783b8c9c32b540a75c67f144c74cc5a481eada204d740815b073c61
Malware Config
Extracted
remcos
daya4659.ddns.net:8282
Signatures
-
RevcodeRat, WebMonitorRat
WebMonitor is a remote access tool that you can use from any browser access to control, and monitor your phones, or PCs.
-
Executes dropped EXE 12 IoCs
pid Process 1072 remcos_agent_Protected.exe 3724 remcos_agent_Protected.exe 1688 remcos.exe 212 remcos.exe 1116 driverquery.exe 3604 sfc.exe 3764 driverquery.exe 4148 sfc.exe 4440 sfc.exe 4464 driverquery.exe 4488 driverquery.exe 4608 sfc.exe -
resource yara_rule behavioral2/memory/3044-118-0x0000000000400000-0x00000000004C0000-memory.dmp upx behavioral2/memory/3044-121-0x0000000000400000-0x00000000004C0000-memory.dmp upx -
Adds Run key to start application 2 TTPs 9 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\remcos = "\"C:\\Users\\Admin\\AppData\\Roaming\\remcos\\remcos.exe\"" remcos_agent_Protected.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\ remcos.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\remcos = "\"C:\\Users\\Admin\\AppData\\Roaming\\remcos\\remcos.exe\"" remcos.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\ remcos_agent_Protected.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\remcos = "\"C:\\Users\\Admin\\AppData\\Roaming\\remcos\\remcos.exe\"" remcos_agent_Protected.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ remcos_agent_Protected.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ remcos.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\remcos = "\"C:\\Users\\Admin\\AppData\\Roaming\\remcos\\remcos.exe\"" remcos.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\WebMonitor-9923 = "C:\\Users\\Admin\\AppData\\Roaming\\WebMonitor-9923.exe" 082e8b6b74753482bca3797cb17c79e93f7f4fac591bd9a20239235b3595473a.exe -
Suspicious use of SetThreadContext 7 IoCs
description pid Process procid_target PID 1108 set thread context of 3044 1108 082e8b6b74753482bca3797cb17c79e93f7f4fac591bd9a20239235b3595473a.exe 79 PID 1072 set thread context of 3724 1072 remcos_agent_Protected.exe 82 PID 1688 set thread context of 212 1688 remcos.exe 89 PID 1116 set thread context of 3764 1116 driverquery.exe 103 PID 3604 set thread context of 4148 3604 sfc.exe 106 PID 4464 set thread context of 4488 4464 driverquery.exe 114 PID 4440 set thread context of 4608 4440 sfc.exe 117 -
HTTP links in PDF interactive object 6 IoCs
Detects HTTP links in interactive objects within PDF files.
resource yara_rule behavioral2/files/0x000100000001ab2e-143.dat pdf_with_link_action behavioral2/files/0x000100000001ab30-186.dat pdf_with_link_action behavioral2/files/0x000100000001ab30-187.dat pdf_with_link_action behavioral2/files/0x000100000001ab30-193.dat pdf_with_link_action behavioral2/files/0x000100000001ab30-211.dat pdf_with_link_action behavioral2/files/0x000100000001ab30-216.dat pdf_with_link_action -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
Creates scheduled task(s) 1 TTPs 7 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2844 schtasks.exe 3960 schtasks.exe 904 schtasks.exe 4100 schtasks.exe 4224 schtasks.exe 4560 schtasks.exe 4680 schtasks.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings 082e8b6b74753482bca3797cb17c79e93f7f4fac591bd9a20239235b3595473a.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings remcos_agent_Protected.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 344 AcroRd32.exe 344 AcroRd32.exe 344 AcroRd32.exe 344 AcroRd32.exe 344 AcroRd32.exe 344 AcroRd32.exe 344 AcroRd32.exe 344 AcroRd32.exe 344 AcroRd32.exe 344 AcroRd32.exe 344 AcroRd32.exe 344 AcroRd32.exe 344 AcroRd32.exe 344 AcroRd32.exe 344 AcroRd32.exe 344 AcroRd32.exe 344 AcroRd32.exe 344 AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 212 remcos.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3044 082e8b6b74753482bca3797cb17c79e93f7f4fac591bd9a20239235b3595473a.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 344 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 344 AcroRd32.exe 344 AcroRd32.exe 212 remcos.exe 344 AcroRd32.exe 344 AcroRd32.exe 344 AcroRd32.exe 344 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1108 wrote to memory of 1072 1108 082e8b6b74753482bca3797cb17c79e93f7f4fac591bd9a20239235b3595473a.exe 75 PID 1108 wrote to memory of 1072 1108 082e8b6b74753482bca3797cb17c79e93f7f4fac591bd9a20239235b3595473a.exe 75 PID 1108 wrote to memory of 1072 1108 082e8b6b74753482bca3797cb17c79e93f7f4fac591bd9a20239235b3595473a.exe 75 PID 1108 wrote to memory of 344 1108 082e8b6b74753482bca3797cb17c79e93f7f4fac591bd9a20239235b3595473a.exe 77 PID 1108 wrote to memory of 344 1108 082e8b6b74753482bca3797cb17c79e93f7f4fac591bd9a20239235b3595473a.exe 77 PID 1108 wrote to memory of 344 1108 082e8b6b74753482bca3797cb17c79e93f7f4fac591bd9a20239235b3595473a.exe 77 PID 1108 wrote to memory of 3880 1108 082e8b6b74753482bca3797cb17c79e93f7f4fac591bd9a20239235b3595473a.exe 78 PID 1108 wrote to memory of 3880 1108 082e8b6b74753482bca3797cb17c79e93f7f4fac591bd9a20239235b3595473a.exe 78 PID 1108 wrote to memory of 3880 1108 082e8b6b74753482bca3797cb17c79e93f7f4fac591bd9a20239235b3595473a.exe 78 PID 1108 wrote to memory of 3044 1108 082e8b6b74753482bca3797cb17c79e93f7f4fac591bd9a20239235b3595473a.exe 79 PID 1108 wrote to memory of 3044 1108 082e8b6b74753482bca3797cb17c79e93f7f4fac591bd9a20239235b3595473a.exe 79 PID 1108 wrote to memory of 3044 1108 082e8b6b74753482bca3797cb17c79e93f7f4fac591bd9a20239235b3595473a.exe 79 PID 1108 wrote to memory of 3044 1108 082e8b6b74753482bca3797cb17c79e93f7f4fac591bd9a20239235b3595473a.exe 79 PID 1108 wrote to memory of 3044 1108 082e8b6b74753482bca3797cb17c79e93f7f4fac591bd9a20239235b3595473a.exe 79 PID 1108 wrote to memory of 2844 1108 082e8b6b74753482bca3797cb17c79e93f7f4fac591bd9a20239235b3595473a.exe 80 PID 1108 wrote to memory of 2844 1108 082e8b6b74753482bca3797cb17c79e93f7f4fac591bd9a20239235b3595473a.exe 80 PID 1108 wrote to memory of 2844 1108 082e8b6b74753482bca3797cb17c79e93f7f4fac591bd9a20239235b3595473a.exe 80 PID 1072 wrote to memory of 3724 1072 remcos_agent_Protected.exe 82 PID 1072 wrote to memory of 3724 1072 remcos_agent_Protected.exe 82 PID 1072 wrote to memory of 3724 1072 remcos_agent_Protected.exe 82 PID 1072 wrote to memory of 3724 1072 remcos_agent_Protected.exe 82 PID 1072 wrote to memory of 3724 1072 remcos_agent_Protected.exe 82 PID 1072 wrote to memory of 3960 1072 remcos_agent_Protected.exe 83 PID 1072 wrote to memory of 3960 1072 remcos_agent_Protected.exe 83 PID 1072 wrote to memory of 3960 1072 remcos_agent_Protected.exe 83 PID 3724 wrote to memory of 1732 3724 remcos_agent_Protected.exe 85 PID 3724 wrote to memory of 1732 3724 remcos_agent_Protected.exe 85 PID 3724 wrote to memory of 1732 3724 remcos_agent_Protected.exe 85 PID 1732 wrote to memory of 692 1732 WScript.exe 86 PID 1732 wrote to memory of 692 1732 WScript.exe 86 PID 1732 wrote to memory of 692 1732 WScript.exe 86 PID 692 wrote to memory of 1688 692 cmd.exe 88 PID 692 wrote to memory of 1688 692 cmd.exe 88 PID 692 wrote to memory of 1688 692 cmd.exe 88 PID 1688 wrote to memory of 212 1688 remcos.exe 89 PID 1688 wrote to memory of 212 1688 remcos.exe 89 PID 1688 wrote to memory of 212 1688 remcos.exe 89 PID 1688 wrote to memory of 212 1688 remcos.exe 89 PID 1688 wrote to memory of 212 1688 remcos.exe 89 PID 212 wrote to memory of 1456 212 remcos.exe 90 PID 212 wrote to memory of 1456 212 remcos.exe 90 PID 212 wrote to memory of 1456 212 remcos.exe 90 PID 1688 wrote to memory of 904 1688 remcos.exe 91 PID 1688 wrote to memory of 904 1688 remcos.exe 91 PID 1688 wrote to memory of 904 1688 remcos.exe 91 PID 344 wrote to memory of 3860 344 AcroRd32.exe 93 PID 344 wrote to memory of 3860 344 AcroRd32.exe 93 PID 344 wrote to memory of 3860 344 AcroRd32.exe 93 PID 344 wrote to memory of 2320 344 AcroRd32.exe 94 PID 344 wrote to memory of 2320 344 AcroRd32.exe 94 PID 344 wrote to memory of 2320 344 AcroRd32.exe 94 PID 3860 wrote to memory of 1276 3860 RdrCEF.exe 95 PID 3860 wrote to memory of 1276 3860 RdrCEF.exe 95 PID 3860 wrote to memory of 1276 3860 RdrCEF.exe 95 PID 3860 wrote to memory of 1276 3860 RdrCEF.exe 95 PID 3860 wrote to memory of 1276 3860 RdrCEF.exe 95 PID 3860 wrote to memory of 1276 3860 RdrCEF.exe 95 PID 3860 wrote to memory of 1276 3860 RdrCEF.exe 95 PID 3860 wrote to memory of 1276 3860 RdrCEF.exe 95 PID 3860 wrote to memory of 1276 3860 RdrCEF.exe 95 PID 3860 wrote to memory of 1276 3860 RdrCEF.exe 95 PID 3860 wrote to memory of 1276 3860 RdrCEF.exe 95 PID 3860 wrote to memory of 1276 3860 RdrCEF.exe 95 PID 3860 wrote to memory of 1276 3860 RdrCEF.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\082e8b6b74753482bca3797cb17c79e93f7f4fac591bd9a20239235b3595473a.exe"C:\Users\Admin\AppData\Local\Temp\082e8b6b74753482bca3797cb17c79e93f7f4fac591bd9a20239235b3595473a.exe"1⤵
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1108 -
C:\Users\Admin\AppData\Roaming\remcos_agent_Protected.exe"C:\Users\Admin\AppData\Roaming\remcos_agent_Protected.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1072 -
C:\Users\Admin\AppData\Roaming\remcos_agent_Protected.exe"C:\Users\Admin\AppData\Roaming\remcos_agent_Protected.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3724 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\install.vbs"4⤵
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c "C:\Users\Admin\AppData\Roaming\remcos\remcos.exe"5⤵
- Suspicious use of WriteProcessMemory
PID:692 -
C:\Users\Admin\AppData\Roaming\remcos\remcos.exeC:\Users\Admin\AppData\Roaming\remcos\remcos.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Users\Admin\AppData\Roaming\remcos\remcos.exe"C:\Users\Admin\AppData\Roaming\remcos\remcos.exe"7⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:212 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe8⤵PID:1456
-
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn setx /tr "C:\Users\Admin\AppData\Roaming\CapabilityAccessHandlers\sfc.exe" /sc minute /mo 1 /F7⤵
- Creates scheduled task(s)
PID:904
-
-
-
-
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn setx /tr "C:\Users\Admin\AppData\Roaming\CapabilityAccessHandlers\sfc.exe" /sc minute /mo 1 /F3⤵
- Creates scheduled task(s)
PID:3960
-
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\medical-application-form.pdf"2⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:344 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140433⤵
- Suspicious use of WriteProcessMemory
PID:3860 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=1157296227436D723313DB47A6E7A1EE --mojo-platform-channel-handle=1636 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵PID:1276
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=C93CEB6F7C8628C85079B0B6ECB72567 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=1 --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=C93CEB6F7C8628C85079B0B6ECB72567 --renderer-client-id=2 --mojo-platform-channel-handle=1652 --allow-no-sandbox-job /prefetch:14⤵PID:996
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=8348B6778DA452EF33B3E828FD0DA3DE --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=1 --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=8348B6778DA452EF33B3E828FD0DA3DE --renderer-client-id=4 --mojo-platform-channel-handle=2064 --allow-no-sandbox-job /prefetch:14⤵PID:1800
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=82E609F6B03C0AD34966E8A1090A566E --mojo-platform-channel-handle=1712 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵PID:2116
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=1220421CE3EFA90F8CAF556E6F2FBE11 --mojo-platform-channel-handle=2476 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵PID:1468
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=C39E1CC84E476F6788425136AE569B22 --mojo-platform-channel-handle=1772 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵PID:3844
-
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140433⤵PID:2320
-
-
-
C:\Users\Admin\AppData\Local\Temp\082e8b6b74753482bca3797cb17c79e93f7f4fac591bd9a20239235b3595473a.exe"C:\Users\Admin\AppData\Local\Temp\082e8b6b74753482bca3797cb17c79e93f7f4fac591bd9a20239235b3595473a.exe"2⤵PID:3880
-
-
C:\Users\Admin\AppData\Local\Temp\082e8b6b74753482bca3797cb17c79e93f7f4fac591bd9a20239235b3595473a.exe"C:\Users\Admin\AppData\Local\Temp\082e8b6b74753482bca3797cb17c79e93f7f4fac591bd9a20239235b3595473a.exe"2⤵
- Adds Run key to start application
- Suspicious behavior: RenamesItself
PID:3044
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn WWAHost /tr "C:\Users\Admin\AppData\Roaming\RtDCpl64\driverquery.exe" /sc minute /mo 1 /F2⤵
- Creates scheduled task(s)
PID:2844
-
-
C:\Users\Admin\AppData\Roaming\RtDCpl64\driverquery.exeC:\Users\Admin\AppData\Roaming\RtDCpl64\driverquery.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1116 -
C:\Users\Admin\AppData\Roaming\RtDCpl64\driverquery.exe"C:\Users\Admin\AppData\Roaming\RtDCpl64\driverquery.exe"2⤵
- Executes dropped EXE
PID:3764
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn WWAHost /tr "C:\Users\Admin\AppData\Roaming\RtDCpl64\driverquery.exe" /sc minute /mo 1 /F2⤵
- Creates scheduled task(s)
PID:4100
-
-
C:\Users\Admin\AppData\Roaming\CapabilityAccessHandlers\sfc.exeC:\Users\Admin\AppData\Roaming\CapabilityAccessHandlers\sfc.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3604 -
C:\Users\Admin\AppData\Roaming\CapabilityAccessHandlers\sfc.exe"C:\Users\Admin\AppData\Roaming\CapabilityAccessHandlers\sfc.exe"2⤵
- Executes dropped EXE
PID:4148
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn setx /tr "C:\Users\Admin\AppData\Roaming\CapabilityAccessHandlers\sfc.exe" /sc minute /mo 1 /F2⤵
- Creates scheduled task(s)
PID:4224
-
-
C:\Users\Admin\AppData\Roaming\CapabilityAccessHandlers\sfc.exeC:\Users\Admin\AppData\Roaming\CapabilityAccessHandlers\sfc.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4440 -
C:\Users\Admin\AppData\Roaming\CapabilityAccessHandlers\sfc.exe"C:\Users\Admin\AppData\Roaming\CapabilityAccessHandlers\sfc.exe"2⤵
- Executes dropped EXE
PID:4608
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn setx /tr "C:\Users\Admin\AppData\Roaming\CapabilityAccessHandlers\sfc.exe" /sc minute /mo 1 /F2⤵
- Creates scheduled task(s)
PID:4680
-
-
C:\Users\Admin\AppData\Roaming\RtDCpl64\driverquery.exeC:\Users\Admin\AppData\Roaming\RtDCpl64\driverquery.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4464 -
C:\Users\Admin\AppData\Roaming\RtDCpl64\driverquery.exe"C:\Users\Admin\AppData\Roaming\RtDCpl64\driverquery.exe"2⤵
- Executes dropped EXE
PID:4488
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn WWAHost /tr "C:\Users\Admin\AppData\Roaming\RtDCpl64\driverquery.exe" /sc minute /mo 1 /F2⤵
- Creates scheduled task(s)
PID:4560
-