Malware Analysis Report

2025-06-16 01:03

Sample ID 221123-rxelyshg24
Target 39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b
SHA256 39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b
Tags
xtremerat persistence rat spyware
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V6

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b

Threat Level: Known bad

The file 39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b was found to be: Known bad.

Malicious Activity Summary

xtremerat persistence rat spyware

Detect XtremeRAT payload

XtremeRAT

Modifies Installed Components in the registry

Checks computer location settings

Adds Run key to start application

Suspicious use of SetThreadContext

Drops file in Windows directory

Enumerates physical storage devices

Program crash

Checks processor information in registry

Modifies Internet Explorer settings

Suspicious use of WriteProcessMemory

Modifies registry class

Suspicious behavior: EnumeratesProcesses

Suspicious use of SetWindowsHookEx

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2022-11-23 14:34

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2022-11-23 14:34

Reported

2022-11-23 15:47

Platform

win7-20221111-en

Max time kernel

158s

Max time network

209s

Command Line

"C:\Users\Admin\AppData\Local\Temp\39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.exe"

Signatures

Detect XtremeRAT payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

XtremeRAT

persistence spyware rat xtremerat

Modifies Installed Components in the registry

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{TWDB4HK2-65MQ-224E-01L2-YY6624NJV2XC}\StubPath = "C:\\Windows\\InstallDir\\svchost.exe" C:\Windows\SysWOW64\svchost.exe N/A
Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{TWDB4HK2-65MQ-224E-01L2-YY6624NJV2XC} C:\Windows\SysWOW64\explorer.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{TWDB4HK2-65MQ-224E-01L2-YY6624NJV2XC}\StubPath = "C:\\Windows\\InstallDir\\svchost.exe restart" C:\Windows\SysWOW64\explorer.exe N/A
Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{TWDB4HK2-65MQ-224E-01L2-YY6624NJV2XC} C:\Windows\SysWOW64\svchost.exe N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run C:\Windows\SysWOW64\svchost.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\InstallDir\\svchost.exe" C:\Windows\SysWOW64\svchost.exe N/A
Key created \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run C:\Windows\SysWOW64\svchost.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\InstallDir\\svchost.exe" C:\Windows\SysWOW64\svchost.exe N/A
Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run C:\Windows\SysWOW64\explorer.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\InstallDir\\svchost.exe" C:\Windows\SysWOW64\explorer.exe N/A
Key created \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run C:\Windows\SysWOW64\explorer.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\InstallDir\\svchost.exe" C:\Windows\SysWOW64\explorer.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File created C:\Windows\210Moto-Azabu Hills Apt 2204 Rosbacher.pdf.exe C:\Users\Admin\AppData\Local\Temp\39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.EXE N/A
File created C:\Windows\210Moto-Azabu Hills Apt 2204 Rosbacher.pdf C:\Users\Admin\AppData\Local\Temp\39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.EXE N/A
File opened for modification C:\Windows\InstallDir\svchost.exe C:\Windows\SysWOW64\explorer.exe N/A
File created C:\Windows\InstallDir\svchost.exe C:\Windows\SysWOW64\explorer.exe N/A
File opened for modification C:\Windows\InstallDir\ C:\Windows\SysWOW64\explorer.exe N/A

Enumerates physical storage devices

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1324 wrote to memory of 968 N/A C:\Users\Admin\AppData\Local\Temp\39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.exe C:\Users\Admin\AppData\Local\Temp\39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.EXE
PID 1324 wrote to memory of 968 N/A C:\Users\Admin\AppData\Local\Temp\39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.exe C:\Users\Admin\AppData\Local\Temp\39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.EXE
PID 1324 wrote to memory of 968 N/A C:\Users\Admin\AppData\Local\Temp\39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.exe C:\Users\Admin\AppData\Local\Temp\39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.EXE
PID 1324 wrote to memory of 968 N/A C:\Users\Admin\AppData\Local\Temp\39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.exe C:\Users\Admin\AppData\Local\Temp\39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.EXE
PID 1324 wrote to memory of 968 N/A C:\Users\Admin\AppData\Local\Temp\39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.exe C:\Users\Admin\AppData\Local\Temp\39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.EXE
PID 1324 wrote to memory of 968 N/A C:\Users\Admin\AppData\Local\Temp\39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.exe C:\Users\Admin\AppData\Local\Temp\39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.EXE
PID 1324 wrote to memory of 968 N/A C:\Users\Admin\AppData\Local\Temp\39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.exe C:\Users\Admin\AppData\Local\Temp\39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.EXE
PID 1324 wrote to memory of 968 N/A C:\Users\Admin\AppData\Local\Temp\39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.exe C:\Users\Admin\AppData\Local\Temp\39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.EXE
PID 1324 wrote to memory of 968 N/A C:\Users\Admin\AppData\Local\Temp\39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.exe C:\Users\Admin\AppData\Local\Temp\39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.EXE
PID 1324 wrote to memory of 968 N/A C:\Users\Admin\AppData\Local\Temp\39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.exe C:\Users\Admin\AppData\Local\Temp\39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.EXE
PID 1324 wrote to memory of 968 N/A C:\Users\Admin\AppData\Local\Temp\39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.exe C:\Users\Admin\AppData\Local\Temp\39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.EXE
PID 1324 wrote to memory of 968 N/A C:\Users\Admin\AppData\Local\Temp\39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.exe C:\Users\Admin\AppData\Local\Temp\39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.EXE
PID 968 wrote to memory of 668 N/A C:\Users\Admin\AppData\Local\Temp\39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.EXE C:\Windows\SysWOW64\svchost.exe
PID 968 wrote to memory of 668 N/A C:\Users\Admin\AppData\Local\Temp\39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.EXE C:\Windows\SysWOW64\svchost.exe
PID 968 wrote to memory of 668 N/A C:\Users\Admin\AppData\Local\Temp\39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.EXE C:\Windows\SysWOW64\svchost.exe
PID 968 wrote to memory of 668 N/A C:\Users\Admin\AppData\Local\Temp\39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.EXE C:\Windows\SysWOW64\svchost.exe
PID 968 wrote to memory of 668 N/A C:\Users\Admin\AppData\Local\Temp\39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.EXE C:\Windows\SysWOW64\svchost.exe
PID 968 wrote to memory of 684 N/A C:\Users\Admin\AppData\Local\Temp\39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.EXE C:\Windows\SysWOW64\explorer.exe
PID 968 wrote to memory of 684 N/A C:\Users\Admin\AppData\Local\Temp\39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.EXE C:\Windows\SysWOW64\explorer.exe
PID 968 wrote to memory of 684 N/A C:\Users\Admin\AppData\Local\Temp\39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.EXE C:\Windows\SysWOW64\explorer.exe
PID 968 wrote to memory of 684 N/A C:\Users\Admin\AppData\Local\Temp\39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.EXE C:\Windows\SysWOW64\explorer.exe
PID 968 wrote to memory of 684 N/A C:\Users\Admin\AppData\Local\Temp\39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.EXE C:\Windows\SysWOW64\explorer.exe
PID 968 wrote to memory of 276 N/A C:\Users\Admin\AppData\Local\Temp\39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.EXE C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
PID 968 wrote to memory of 276 N/A C:\Users\Admin\AppData\Local\Temp\39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.EXE C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
PID 968 wrote to memory of 276 N/A C:\Users\Admin\AppData\Local\Temp\39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.EXE C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
PID 968 wrote to memory of 276 N/A C:\Users\Admin\AppData\Local\Temp\39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.EXE C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe

Processes

C:\Users\Admin\AppData\Local\Temp\39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.exe

"C:\Users\Admin\AppData\Local\Temp\39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.exe"

C:\Users\Admin\AppData\Local\Temp\39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.EXE

"C:\Users\Admin\AppData\Local\Temp\39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.EXE"

C:\Windows\SysWOW64\svchost.exe

svchost.exe

C:\Windows\SysWOW64\explorer.exe

explorer.exe

C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe

"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Windows\210Moto-Azabu Hills Apt 2204 Rosbacher.pdf"

Network

Country Destination Domain Proto
N/A 8.8.8.8:53 alertsdanish.bounceme.net udp

Files

memory/968-56-0x0000000010000000-0x0000000010097000-memory.dmp

memory/968-57-0x0000000010000000-0x0000000010097000-memory.dmp

memory/968-59-0x0000000010000000-0x0000000010097000-memory.dmp

memory/968-60-0x0000000010000000-0x0000000010097000-memory.dmp

memory/968-61-0x0000000010000000-0x0000000010097000-memory.dmp

memory/968-62-0x0000000010000000-0x0000000010097000-memory.dmp

memory/968-63-0x0000000010000000-0x0000000010097000-memory.dmp

memory/968-65-0x0000000010000000-0x0000000010097000-memory.dmp

memory/968-66-0x000000001000D0F4-mapping.dmp

memory/968-67-0x0000000010000000-0x0000000010097000-memory.dmp

memory/968-68-0x0000000076191000-0x0000000076193000-memory.dmp

memory/968-69-0x0000000010000000-0x0000000010097000-memory.dmp

memory/968-70-0x0000000010000000-0x0000000010097000-memory.dmp

memory/668-73-0x0000000000000000-mapping.dmp

memory/684-77-0x0000000000000000-mapping.dmp

memory/276-79-0x0000000000000000-mapping.dmp

memory/684-82-0x0000000074B51000-0x0000000074B53000-memory.dmp

memory/968-80-0x0000000010000000-0x0000000010097000-memory.dmp

memory/684-83-0x0000000010000000-0x0000000010097000-memory.dmp

memory/668-84-0x0000000010000000-0x0000000010097000-memory.dmp

C:\Windows\InstallDir\svchost.exe

MD5 b1415073293fa408b8c1a31bdc34fcc4
SHA1 37642c6145a1f451c88b710b8573bca7afa7ba81
SHA256 39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b
SHA512 b48214ddc7006268a2c2f273602b70e45aca4e909025e44b41b890455e527f94bbf36796fac7e0b1af656cefdfab5d79dff85d31b14f310990bba0c72fddb25b

C:\Windows\210Moto-Azabu Hills Apt 2204 Rosbacher.pdf

MD5 23bbd7c3a81207672ed44de64c7a3289
SHA1 a190365064ad07ca95fcbe03c175b1ad575e1aa2
SHA256 d23e94dfa47e49e83e3fbd60817e2cd20701ec1d06a4310845edfdb5f784b34d
SHA512 4e1c7c423c6385376ab1bad1f660a8bb9bb9af0d94befcf65ceee7057dcc4991beb5abc4e4a5339c7c3b65a4ff60627b0381cc75cb1f1e9ae4c85ab93df397e4

memory/668-87-0x0000000010000000-0x0000000010097000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2022-11-23 14:34

Reported

2022-11-23 15:47

Platform

win10v2004-20220812-en

Max time kernel

212s

Max time network

226s

Command Line

"C:\Users\Admin\AppData\Local\Temp\39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.exe"

Signatures

Detect XtremeRAT payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

XtremeRAT

persistence spyware rat xtremerat

Modifies Installed Components in the registry

persistence
Description Indicator Process Target
Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{TWDB4HK2-65MQ-224E-01L2-YY6624NJV2XC} C:\Windows\SysWOW64\explorer.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{TWDB4HK2-65MQ-224E-01L2-YY6624NJV2XC}\StubPath = "C:\\Windows\\InstallDir\\svchost.exe restart" C:\Windows\SysWOW64\explorer.exe N/A

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.EXE N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run C:\Windows\SysWOW64\explorer.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\InstallDir\\svchost.exe" C:\Windows\SysWOW64\explorer.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Run C:\Windows\SysWOW64\explorer.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\InstallDir\\svchost.exe" C:\Windows\SysWOW64\explorer.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File opened for modification C:\Windows\InstallDir\svchost.exe C:\Windows\SysWOW64\explorer.exe N/A
File created C:\Windows\InstallDir\svchost.exe C:\Windows\SysWOW64\explorer.exe N/A
File opened for modification C:\Windows\InstallDir\ C:\Windows\SysWOW64\explorer.exe N/A
File created C:\Windows\210Moto-Azabu Hills Apt 2204 Rosbacher.pdf.exe C:\Users\Admin\AppData\Local\Temp\39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.EXE N/A
File created C:\Windows\210Moto-Azabu Hills Apt 2204 Rosbacher.pdf C:\Users\Admin\AppData\Local\Temp\39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.EXE N/A

Enumerates physical storage devices

Checks processor information in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe N/A

Modifies Internet Explorer settings

adware spyware
Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe N/A

Modifies registry class

Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings C:\Users\Admin\AppData\Local\Temp\39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.EXE N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe N/A
N/A N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe N/A
N/A N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe N/A
N/A N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe N/A
N/A N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe N/A
N/A N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe N/A
N/A N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe N/A
N/A N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe N/A
N/A N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe N/A
N/A N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe N/A
N/A N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe N/A
N/A N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe N/A
N/A N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe N/A
N/A N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe N/A
N/A N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe N/A
N/A N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe N/A
N/A N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe N/A
N/A N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe N/A
N/A N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe N/A
N/A N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2152 wrote to memory of 3456 N/A C:\Users\Admin\AppData\Local\Temp\39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.exe C:\Users\Admin\AppData\Local\Temp\39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.EXE
PID 2152 wrote to memory of 3456 N/A C:\Users\Admin\AppData\Local\Temp\39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.exe C:\Users\Admin\AppData\Local\Temp\39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.EXE
PID 2152 wrote to memory of 3456 N/A C:\Users\Admin\AppData\Local\Temp\39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.exe C:\Users\Admin\AppData\Local\Temp\39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.EXE
PID 2152 wrote to memory of 3456 N/A C:\Users\Admin\AppData\Local\Temp\39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.exe C:\Users\Admin\AppData\Local\Temp\39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.EXE
PID 2152 wrote to memory of 3456 N/A C:\Users\Admin\AppData\Local\Temp\39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.exe C:\Users\Admin\AppData\Local\Temp\39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.EXE
PID 2152 wrote to memory of 3456 N/A C:\Users\Admin\AppData\Local\Temp\39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.exe C:\Users\Admin\AppData\Local\Temp\39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.EXE
PID 2152 wrote to memory of 3456 N/A C:\Users\Admin\AppData\Local\Temp\39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.exe C:\Users\Admin\AppData\Local\Temp\39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.EXE
PID 2152 wrote to memory of 3456 N/A C:\Users\Admin\AppData\Local\Temp\39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.exe C:\Users\Admin\AppData\Local\Temp\39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.EXE
PID 2152 wrote to memory of 3456 N/A C:\Users\Admin\AppData\Local\Temp\39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.exe C:\Users\Admin\AppData\Local\Temp\39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.EXE
PID 2152 wrote to memory of 3456 N/A C:\Users\Admin\AppData\Local\Temp\39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.exe C:\Users\Admin\AppData\Local\Temp\39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.EXE
PID 2152 wrote to memory of 3456 N/A C:\Users\Admin\AppData\Local\Temp\39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.exe C:\Users\Admin\AppData\Local\Temp\39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.EXE
PID 2152 wrote to memory of 3456 N/A C:\Users\Admin\AppData\Local\Temp\39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.exe C:\Users\Admin\AppData\Local\Temp\39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.EXE
PID 2152 wrote to memory of 3456 N/A C:\Users\Admin\AppData\Local\Temp\39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.exe C:\Users\Admin\AppData\Local\Temp\39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.EXE
PID 3456 wrote to memory of 4776 N/A C:\Users\Admin\AppData\Local\Temp\39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.EXE C:\Windows\SysWOW64\svchost.exe
PID 3456 wrote to memory of 4776 N/A C:\Users\Admin\AppData\Local\Temp\39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.EXE C:\Windows\SysWOW64\svchost.exe
PID 3456 wrote to memory of 4776 N/A C:\Users\Admin\AppData\Local\Temp\39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.EXE C:\Windows\SysWOW64\svchost.exe
PID 3456 wrote to memory of 4776 N/A C:\Users\Admin\AppData\Local\Temp\39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.EXE C:\Windows\SysWOW64\svchost.exe
PID 3456 wrote to memory of 4764 N/A C:\Users\Admin\AppData\Local\Temp\39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.EXE C:\Windows\SysWOW64\explorer.exe
PID 3456 wrote to memory of 4764 N/A C:\Users\Admin\AppData\Local\Temp\39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.EXE C:\Windows\SysWOW64\explorer.exe
PID 3456 wrote to memory of 4764 N/A C:\Users\Admin\AppData\Local\Temp\39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.EXE C:\Windows\SysWOW64\explorer.exe
PID 3456 wrote to memory of 4764 N/A C:\Users\Admin\AppData\Local\Temp\39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.EXE C:\Windows\SysWOW64\explorer.exe
PID 3456 wrote to memory of 1444 N/A C:\Users\Admin\AppData\Local\Temp\39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.EXE C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe
PID 3456 wrote to memory of 1444 N/A C:\Users\Admin\AppData\Local\Temp\39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.EXE C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe
PID 3456 wrote to memory of 1444 N/A C:\Users\Admin\AppData\Local\Temp\39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.EXE C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe
PID 1444 wrote to memory of 3764 N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
PID 1444 wrote to memory of 3764 N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
PID 1444 wrote to memory of 3764 N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
PID 3764 wrote to memory of 3504 N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
PID 3764 wrote to memory of 3504 N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
PID 3764 wrote to memory of 3504 N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
PID 3764 wrote to memory of 3504 N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
PID 3764 wrote to memory of 3504 N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
PID 3764 wrote to memory of 3504 N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
PID 3764 wrote to memory of 3504 N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
PID 3764 wrote to memory of 3504 N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
PID 3764 wrote to memory of 3504 N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
PID 3764 wrote to memory of 3504 N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
PID 3764 wrote to memory of 3504 N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
PID 3764 wrote to memory of 3504 N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
PID 3764 wrote to memory of 3504 N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
PID 3764 wrote to memory of 3504 N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
PID 3764 wrote to memory of 3504 N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
PID 3764 wrote to memory of 3504 N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
PID 3764 wrote to memory of 3504 N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
PID 3764 wrote to memory of 3504 N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
PID 3764 wrote to memory of 3504 N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
PID 3764 wrote to memory of 3504 N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
PID 3764 wrote to memory of 3504 N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
PID 3764 wrote to memory of 3504 N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
PID 3764 wrote to memory of 3504 N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
PID 3764 wrote to memory of 3504 N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
PID 3764 wrote to memory of 3504 N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
PID 3764 wrote to memory of 3504 N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
PID 3764 wrote to memory of 3504 N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
PID 3764 wrote to memory of 3504 N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
PID 3764 wrote to memory of 3504 N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
PID 3764 wrote to memory of 3504 N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
PID 3764 wrote to memory of 3504 N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
PID 3764 wrote to memory of 3504 N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
PID 3764 wrote to memory of 3504 N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
PID 3764 wrote to memory of 3504 N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
PID 3764 wrote to memory of 3504 N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
PID 3764 wrote to memory of 3504 N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
PID 3764 wrote to memory of 3504 N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe

Processes

C:\Users\Admin\AppData\Local\Temp\39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.exe

"C:\Users\Admin\AppData\Local\Temp\39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.exe"

C:\Users\Admin\AppData\Local\Temp\39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.EXE

"C:\Users\Admin\AppData\Local\Temp\39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.EXE"

C:\Windows\SysWOW64\svchost.exe

svchost.exe

C:\Windows\SysWOW64\explorer.exe

explorer.exe

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 4776 -ip 4776

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 4776 -s 484

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 4776 -ip 4776

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 4776 -s 492

C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe

"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Windows\210Moto-Azabu Hills Apt 2204 Rosbacher.pdf"

C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe

"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=16514043

C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe

"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=4A59B6C8EAB0CE596DC962186A8C63F1 --mojo-platform-channel-handle=1728 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:2

C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe

"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=0F56991FB7A7EFDB7B8651EC2765FC7D --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=1 --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=0F56991FB7A7EFDB7B8651EC2765FC7D --renderer-client-id=2 --mojo-platform-channel-handle=1740 --allow-no-sandbox-job /prefetch:1

C:\Windows\System32\CompPkgSrv.exe

C:\Windows\System32\CompPkgSrv.exe -Embedding

C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe

"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=FAF3BDA5156F1A1AB9A7F806DD40A4F6 --mojo-platform-channel-handle=2304 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:2

C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe

"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=C80DB1D5269A71546A8B64A10F1B2C05 --mojo-platform-channel-handle=1972 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:2

C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe

"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=7A8056A6748C58BEA6A050D5E5E9B741 --mojo-platform-channel-handle=2324 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:2

Network

Country Destination Domain Proto
N/A 52.109.13.63:443 tcp
N/A 93.184.220.29:80 tcp
N/A 93.184.221.240:80 tcp
N/A 20.189.173.7:443 tcp
N/A 93.184.221.240:80 tcp
N/A 93.184.221.240:80 tcp
N/A 13.107.4.50:80 tcp
N/A 13.107.4.50:80 tcp
N/A 13.107.4.50:80 tcp
N/A 8.8.8.8:53 alertsdanish.bounceme.net udp
N/A 8.8.8.8:53 alertsdanish.bounceme.net udp
N/A 8.8.8.8:53 alertsdanish.bounceme.net udp
N/A 8.8.8.8:53 alertsdanish.bounceme.net udp
N/A 8.8.8.8:53 151.122.125.40.in-addr.arpa udp
N/A 8.8.8.8:53 alertsdanish.bounceme.net udp
N/A 8.8.8.8:53 alertsdanish.bounceme.net udp
N/A 8.8.8.8:53 alertsdanish.bounceme.net udp
N/A 8.8.8.8:53 alertsdanish.bounceme.net udp
N/A 8.8.8.8:53 106.89.54.20.in-addr.arpa udp
N/A 8.8.8.8:53 alertsdanish.bounceme.net udp
N/A 8.8.8.8:53 alertsdanish.bounceme.net udp
N/A 8.8.8.8:53 alertsdanish.bounceme.net udp
N/A 8.8.8.8:53 alertsdanish.bounceme.net udp
N/A 8.8.8.8:53 alertsdanish.bounceme.net udp
N/A 8.8.8.8:53 alertsdanish.bounceme.net udp
N/A 8.8.8.8:53 alertsdanish.bounceme.net udp
N/A 8.8.8.8:53 alertsdanish.bounceme.net udp
N/A 8.8.8.8:53 alertsdanish.bounceme.net udp
N/A 8.8.8.8:53 alertsdanish.bounceme.net udp
N/A 8.8.8.8:53 alertsdanish.bounceme.net udp
N/A 8.8.8.8:53 alertsdanish.bounceme.net udp
N/A 8.8.8.8:53 alertsdanish.bounceme.net udp
N/A 8.8.8.8:53 alertsdanish.bounceme.net udp
N/A 8.8.8.8:53 alertsdanish.bounceme.net udp
N/A 8.8.8.8:53 alertsdanish.bounceme.net udp
N/A 8.8.8.8:53 alertsdanish.bounceme.net udp
N/A 8.8.8.8:53 alertsdanish.bounceme.net udp
N/A 8.8.8.8:53 alertsdanish.bounceme.net udp
N/A 8.8.8.8:53 alertsdanish.bounceme.net udp
N/A 8.8.8.8:53 alertsdanish.bounceme.net udp
N/A 8.8.8.8:53 alertsdanish.bounceme.net udp

Files

memory/3456-134-0x0000000000000000-mapping.dmp

memory/3456-135-0x0000000010000000-0x0000000010097000-memory.dmp

memory/3456-136-0x0000000010000000-0x0000000010097000-memory.dmp

memory/3456-137-0x0000000010000000-0x0000000010097000-memory.dmp

memory/4776-138-0x0000000000000000-mapping.dmp

memory/4764-139-0x0000000000000000-mapping.dmp

memory/3456-140-0x0000000010000000-0x0000000010097000-memory.dmp

memory/4776-141-0x0000000010000000-0x0000000010097000-memory.dmp

memory/4764-142-0x0000000010000000-0x0000000010097000-memory.dmp

memory/1444-143-0x0000000000000000-mapping.dmp

memory/3456-144-0x0000000010000000-0x0000000010097000-memory.dmp

C:\Windows\210Moto-Azabu Hills Apt 2204 Rosbacher.pdf

MD5 23bbd7c3a81207672ed44de64c7a3289
SHA1 a190365064ad07ca95fcbe03c175b1ad575e1aa2
SHA256 d23e94dfa47e49e83e3fbd60817e2cd20701ec1d06a4310845edfdb5f784b34d
SHA512 4e1c7c423c6385376ab1bad1f660a8bb9bb9af0d94befcf65ceee7057dcc4991beb5abc4e4a5339c7c3b65a4ff60627b0381cc75cb1f1e9ae4c85ab93df397e4

memory/3764-146-0x0000000000000000-mapping.dmp

memory/3504-148-0x0000000000000000-mapping.dmp

memory/3116-151-0x0000000000000000-mapping.dmp

memory/2964-156-0x0000000000000000-mapping.dmp

memory/768-159-0x0000000000000000-mapping.dmp

memory/536-162-0x0000000000000000-mapping.dmp

memory/4764-164-0x0000000010000000-0x0000000010097000-memory.dmp