Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 13:49
Static task
static1
Behavioral task
behavioral1
Sample
838f09135a6741e7dec0e91b348ce34406d0b632897f1caba00fb7eee13d09f7.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
838f09135a6741e7dec0e91b348ce34406d0b632897f1caba00fb7eee13d09f7.exe
Resource
win10v2004-20220812-en
General
-
Target
838f09135a6741e7dec0e91b348ce34406d0b632897f1caba00fb7eee13d09f7.exe
-
Size
614KB
-
MD5
d3e489837c6dc761b9a1d355d0aea80c
-
SHA1
0f089235f5d4577bc5df82f44067172149786dbf
-
SHA256
838f09135a6741e7dec0e91b348ce34406d0b632897f1caba00fb7eee13d09f7
-
SHA512
8444e82b0a6fa0fddf9443c6e82a7c68b96fbfdd03907f427d2243c71af0909a83ec65788e51efe860de47c98f97e267eefebdd196865fc69303fd7e95ab3311
-
SSDEEP
12288:aK2mhAMJ/cPld+1Ys7XVEIoXYbAgtDvfPPiyVDQBmQ48GraUCXGM00pT9t2pR:r2O/Gld+1Ysrco0iHhhQBmF8UaUCj0TH
Malware Config
Extracted
xtremerat
alertsdanish.bounceme.net
čalertsdanish.bounceme.net
Signatures
-
Detect XtremeRAT payload 11 IoCs
Processes:
resource yara_rule behavioral2/memory/64-137-0x0000000000000000-mapping.dmp family_xtremerat behavioral2/memory/64-138-0x0000000010000000-0x0000000010097000-memory.dmp family_xtremerat behavioral2/memory/64-140-0x0000000010000000-0x0000000010097000-memory.dmp family_xtremerat behavioral2/memory/64-141-0x0000000010000000-0x0000000010097000-memory.dmp family_xtremerat behavioral2/memory/1488-143-0x0000000000000000-mapping.dmp family_xtremerat behavioral2/memory/1416-144-0x0000000000000000-mapping.dmp family_xtremerat behavioral2/memory/64-146-0x0000000010000000-0x0000000010097000-memory.dmp family_xtremerat behavioral2/memory/1416-148-0x0000000010000000-0x0000000010097000-memory.dmp family_xtremerat behavioral2/memory/64-149-0x0000000010000000-0x0000000010097000-memory.dmp family_xtremerat behavioral2/memory/1488-147-0x0000000010000000-0x0000000010097000-memory.dmp family_xtremerat behavioral2/memory/1416-169-0x0000000010000000-0x0000000010097000-memory.dmp family_xtremerat -
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Executes dropped EXE 2 IoCs
Processes:
fumic.exefumic.EXEpid process 1192 fumic.exe 64 fumic.EXE -
Modifies Installed Components in the registry 2 TTPs 2 IoCs
Processes:
explorer.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{TWDB4HK2-65MQ-224E-01L2-YY6624NJV2XC} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{TWDB4HK2-65MQ-224E-01L2-YY6624NJV2XC}\StubPath = "C:\\Windows\\InstallDir\\svchost.exe restart" explorer.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
838f09135a6741e7dec0e91b348ce34406d0b632897f1caba00fb7eee13d09f7.exefumic.EXEdescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation 838f09135a6741e7dec0e91b348ce34406d0b632897f1caba00fb7eee13d09f7.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation fumic.EXE -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
explorer.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\InstallDir\\svchost.exe" explorer.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Run explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\InstallDir\\svchost.exe" explorer.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
fumic.exedescription pid process target process PID 1192 set thread context of 64 1192 fumic.exe fumic.EXE -
Drops file in Windows directory 5 IoCs
Processes:
explorer.exefumic.EXEdescription ioc process File opened for modification C:\Windows\InstallDir\ explorer.exe File created C:\Windows\210Moto-Azabu Hills Apt 2204 Rosbacher.pdf.exe fumic.EXE File created C:\Windows\210Moto-Azabu Hills Apt 2204 Rosbacher.pdf fumic.EXE File opened for modification C:\Windows\InstallDir\svchost.exe explorer.exe File created C:\Windows\InstallDir\svchost.exe explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 4584 1488 WerFault.exe svchost.exe 4728 1488 WerFault.exe svchost.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
AcroRd32.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
Processes:
AcroRd32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Modifies registry class 1 IoCs
Processes:
fumic.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings fumic.EXE -
Suspicious behavior: EnumeratesProcesses 20 IoCs
Processes:
AcroRd32.exepid process 4888 AcroRd32.exe 4888 AcroRd32.exe 4888 AcroRd32.exe 4888 AcroRd32.exe 4888 AcroRd32.exe 4888 AcroRd32.exe 4888 AcroRd32.exe 4888 AcroRd32.exe 4888 AcroRd32.exe 4888 AcroRd32.exe 4888 AcroRd32.exe 4888 AcroRd32.exe 4888 AcroRd32.exe 4888 AcroRd32.exe 4888 AcroRd32.exe 4888 AcroRd32.exe 4888 AcroRd32.exe 4888 AcroRd32.exe 4888 AcroRd32.exe 4888 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
Processes:
fumic.exeexplorer.exeAcroRd32.exepid process 1192 fumic.exe 1416 explorer.exe 4888 AcroRd32.exe 4888 AcroRd32.exe 4888 AcroRd32.exe 4888 AcroRd32.exe 4888 AcroRd32.exe 4888 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
838f09135a6741e7dec0e91b348ce34406d0b632897f1caba00fb7eee13d09f7.exefumic.exefumic.EXEAcroRd32.exeRdrCEF.exedescription pid process target process PID 2704 wrote to memory of 1192 2704 838f09135a6741e7dec0e91b348ce34406d0b632897f1caba00fb7eee13d09f7.exe fumic.exe PID 2704 wrote to memory of 1192 2704 838f09135a6741e7dec0e91b348ce34406d0b632897f1caba00fb7eee13d09f7.exe fumic.exe PID 2704 wrote to memory of 1192 2704 838f09135a6741e7dec0e91b348ce34406d0b632897f1caba00fb7eee13d09f7.exe fumic.exe PID 1192 wrote to memory of 64 1192 fumic.exe fumic.EXE PID 1192 wrote to memory of 64 1192 fumic.exe fumic.EXE PID 1192 wrote to memory of 64 1192 fumic.exe fumic.EXE PID 1192 wrote to memory of 64 1192 fumic.exe fumic.EXE PID 1192 wrote to memory of 64 1192 fumic.exe fumic.EXE PID 1192 wrote to memory of 64 1192 fumic.exe fumic.EXE PID 1192 wrote to memory of 64 1192 fumic.exe fumic.EXE PID 1192 wrote to memory of 64 1192 fumic.exe fumic.EXE PID 1192 wrote to memory of 64 1192 fumic.exe fumic.EXE PID 1192 wrote to memory of 64 1192 fumic.exe fumic.EXE PID 1192 wrote to memory of 64 1192 fumic.exe fumic.EXE PID 1192 wrote to memory of 64 1192 fumic.exe fumic.EXE PID 1192 wrote to memory of 64 1192 fumic.exe fumic.EXE PID 64 wrote to memory of 1488 64 fumic.EXE svchost.exe PID 64 wrote to memory of 1488 64 fumic.EXE svchost.exe PID 64 wrote to memory of 1488 64 fumic.EXE svchost.exe PID 64 wrote to memory of 1488 64 fumic.EXE svchost.exe PID 64 wrote to memory of 1416 64 fumic.EXE explorer.exe PID 64 wrote to memory of 1416 64 fumic.EXE explorer.exe PID 64 wrote to memory of 1416 64 fumic.EXE explorer.exe PID 64 wrote to memory of 1416 64 fumic.EXE explorer.exe PID 64 wrote to memory of 4888 64 fumic.EXE AcroRd32.exe PID 64 wrote to memory of 4888 64 fumic.EXE AcroRd32.exe PID 64 wrote to memory of 4888 64 fumic.EXE AcroRd32.exe PID 4888 wrote to memory of 3700 4888 AcroRd32.exe RdrCEF.exe PID 4888 wrote to memory of 3700 4888 AcroRd32.exe RdrCEF.exe PID 4888 wrote to memory of 3700 4888 AcroRd32.exe RdrCEF.exe PID 3700 wrote to memory of 904 3700 RdrCEF.exe RdrCEF.exe PID 3700 wrote to memory of 904 3700 RdrCEF.exe RdrCEF.exe PID 3700 wrote to memory of 904 3700 RdrCEF.exe RdrCEF.exe PID 3700 wrote to memory of 904 3700 RdrCEF.exe RdrCEF.exe PID 3700 wrote to memory of 904 3700 RdrCEF.exe RdrCEF.exe PID 3700 wrote to memory of 904 3700 RdrCEF.exe RdrCEF.exe PID 3700 wrote to memory of 904 3700 RdrCEF.exe RdrCEF.exe PID 3700 wrote to memory of 904 3700 RdrCEF.exe RdrCEF.exe PID 3700 wrote to memory of 904 3700 RdrCEF.exe RdrCEF.exe PID 3700 wrote to memory of 904 3700 RdrCEF.exe RdrCEF.exe PID 3700 wrote to memory of 904 3700 RdrCEF.exe RdrCEF.exe PID 3700 wrote to memory of 904 3700 RdrCEF.exe RdrCEF.exe PID 3700 wrote to memory of 904 3700 RdrCEF.exe RdrCEF.exe PID 3700 wrote to memory of 904 3700 RdrCEF.exe RdrCEF.exe PID 3700 wrote to memory of 904 3700 RdrCEF.exe RdrCEF.exe PID 3700 wrote to memory of 904 3700 RdrCEF.exe RdrCEF.exe PID 3700 wrote to memory of 904 3700 RdrCEF.exe RdrCEF.exe PID 3700 wrote to memory of 904 3700 RdrCEF.exe RdrCEF.exe PID 3700 wrote to memory of 904 3700 RdrCEF.exe RdrCEF.exe PID 3700 wrote to memory of 904 3700 RdrCEF.exe RdrCEF.exe PID 3700 wrote to memory of 904 3700 RdrCEF.exe RdrCEF.exe PID 3700 wrote to memory of 904 3700 RdrCEF.exe RdrCEF.exe PID 3700 wrote to memory of 904 3700 RdrCEF.exe RdrCEF.exe PID 3700 wrote to memory of 904 3700 RdrCEF.exe RdrCEF.exe PID 3700 wrote to memory of 904 3700 RdrCEF.exe RdrCEF.exe PID 3700 wrote to memory of 904 3700 RdrCEF.exe RdrCEF.exe PID 3700 wrote to memory of 904 3700 RdrCEF.exe RdrCEF.exe PID 3700 wrote to memory of 904 3700 RdrCEF.exe RdrCEF.exe PID 3700 wrote to memory of 904 3700 RdrCEF.exe RdrCEF.exe PID 3700 wrote to memory of 904 3700 RdrCEF.exe RdrCEF.exe PID 3700 wrote to memory of 904 3700 RdrCEF.exe RdrCEF.exe PID 3700 wrote to memory of 904 3700 RdrCEF.exe RdrCEF.exe PID 3700 wrote to memory of 904 3700 RdrCEF.exe RdrCEF.exe PID 3700 wrote to memory of 904 3700 RdrCEF.exe RdrCEF.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\838f09135a6741e7dec0e91b348ce34406d0b632897f1caba00fb7eee13d09f7.exe"C:\Users\Admin\AppData\Local\Temp\838f09135a6741e7dec0e91b348ce34406d0b632897f1caba00fb7eee13d09f7.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Users\Admin\AppData\Local\Temp\fumic.exe"C:\Users\Admin\AppData\Local\Temp\fumic.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Users\Admin\AppData\Local\Temp\fumic.EXE"C:\Users\Admin\AppData\Local\Temp\fumic.EXE"3⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:64 -
C:\Windows\SysWOW64\svchost.exesvchost.exe4⤵PID:1488
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1488 -s 5165⤵
- Program crash
PID:4584
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1488 -s 5245⤵
- Program crash
PID:4728
-
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe4⤵
- Modifies Installed Components in the registry
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:1416
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Windows\210Moto-Azabu Hills Apt 2204 Rosbacher.pdf"4⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4888 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140435⤵
- Suspicious use of WriteProcessMemory
PID:3700 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=FE66B16FA859A9AC5816C146DEC7D4A7 --mojo-platform-channel-handle=1772 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:26⤵PID:904
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=300491287C4DF76C5F0866586A6289F3 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=1 --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=300491287C4DF76C5F0866586A6289F3 --renderer-client-id=2 --mojo-platform-channel-handle=1784 --allow-no-sandbox-job /prefetch:16⤵PID:716
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=D431C991C7035AAB6B00293AAAAC703F --mojo-platform-channel-handle=1840 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:26⤵PID:2868
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=3026D0E884E3A1759D79091373A9E410 --mojo-platform-channel-handle=2344 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:26⤵PID:1640
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=2B3BD8FD34A34478DEEA16D2EF31A9B3 --mojo-platform-channel-handle=1760 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:26⤵PID:1100
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 1488 -ip 14881⤵PID:4092
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 196 -p 1488 -ip 14881⤵PID:3720
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1148
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
519KB
MD5b1415073293fa408b8c1a31bdc34fcc4
SHA137642c6145a1f451c88b710b8573bca7afa7ba81
SHA25639ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b
SHA512b48214ddc7006268a2c2f273602b70e45aca4e909025e44b41b890455e527f94bbf36796fac7e0b1af656cefdfab5d79dff85d31b14f310990bba0c72fddb25b
-
Filesize
519KB
MD5b1415073293fa408b8c1a31bdc34fcc4
SHA137642c6145a1f451c88b710b8573bca7afa7ba81
SHA25639ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b
SHA512b48214ddc7006268a2c2f273602b70e45aca4e909025e44b41b890455e527f94bbf36796fac7e0b1af656cefdfab5d79dff85d31b14f310990bba0c72fddb25b
-
Filesize
519KB
MD5b1415073293fa408b8c1a31bdc34fcc4
SHA137642c6145a1f451c88b710b8573bca7afa7ba81
SHA25639ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b
SHA512b48214ddc7006268a2c2f273602b70e45aca4e909025e44b41b890455e527f94bbf36796fac7e0b1af656cefdfab5d79dff85d31b14f310990bba0c72fddb25b
-
Filesize
308KB
MD523bbd7c3a81207672ed44de64c7a3289
SHA1a190365064ad07ca95fcbe03c175b1ad575e1aa2
SHA256d23e94dfa47e49e83e3fbd60817e2cd20701ec1d06a4310845edfdb5f784b34d
SHA5124e1c7c423c6385376ab1bad1f660a8bb9bb9af0d94befcf65ceee7057dcc4991beb5abc4e4a5339c7c3b65a4ff60627b0381cc75cb1f1e9ae4c85ab93df397e4