Analysis
-
max time kernel
143s -
max time network
151s -
platform
windows7_x64 -
resource
win7 -
submitted
30-06-2020 12:47
Static task
static1
Behavioral task
behavioral1
Sample
PI.exe
Resource
win7
Behavioral task
behavioral2
Sample
PI.exe
Resource
win10v200430
General
-
Target
PI.exe
-
Size
339KB
-
MD5
e9b130e7262d0aafa2c0ba84d28539dd
-
SHA1
5e799f43441bd288094370b03bdfa554eafb6324
-
SHA256
dd668abafa9cbdf937e710f2e2e7f6228ca99c7a226b507d43f887c03dff8509
-
SHA512
7e934097fbd3e1500c7810794c1fda4267aa64d70197d0623c6dca5f2e91d67960d5e11ec87cfa853c457b5342eebb4d7fc98d5892efd7ad239a32211f0322b5
Malware Config
Extracted
azorult
http://45.95.168.162/city/index.php
Signatures
-
Suspicious behavior: EnumeratesProcesses 12605 IoCs
Processes:
PI.exepid process 1612 PI.exe 1612 PI.exe 1612 PI.exe 1612 PI.exe 1612 PI.exe 1612 PI.exe 1612 PI.exe 1612 PI.exe 1612 PI.exe 1612 PI.exe 1612 PI.exe 1612 PI.exe 1612 PI.exe 1612 PI.exe 1612 PI.exe 1612 PI.exe 1612 PI.exe 1612 PI.exe 1612 PI.exe 1612 PI.exe 1612 PI.exe 1612 PI.exe 1612 PI.exe 1612 PI.exe 1612 PI.exe 1612 PI.exe 1612 PI.exe 1612 PI.exe 1612 PI.exe 1612 PI.exe 1612 PI.exe 1612 PI.exe 1612 PI.exe 1612 PI.exe 1612 PI.exe 1612 PI.exe 1612 PI.exe 1612 PI.exe 1612 PI.exe 1612 PI.exe 1612 PI.exe 1612 PI.exe 1612 PI.exe 1612 PI.exe 1612 PI.exe 1612 PI.exe 1612 PI.exe 1612 PI.exe 1612 PI.exe 1612 PI.exe 1612 PI.exe 1612 PI.exe 1612 PI.exe 1612 PI.exe 1612 PI.exe 1612 PI.exe 1612 PI.exe 1612 PI.exe 1612 PI.exe 1612 PI.exe 1612 PI.exe 1612 PI.exe 1612 PI.exe 1612 PI.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Delays execution with timeout.exe 7 IoCs
Processes:
timeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exepid process 1644 timeout.exe 1304 timeout.exe 1956 timeout.exe 1128 timeout.exe 1280 timeout.exe 1152 timeout.exe 1576 timeout.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of WriteProcessMemory 1087 IoCs
Processes:
PI.execmd.exePI.execmd.exePI.exedescription pid process target process PID 1612 wrote to memory of 1072 1612 PI.exe RegAsm.exe PID 1612 wrote to memory of 1072 1612 PI.exe RegAsm.exe PID 1612 wrote to memory of 1072 1612 PI.exe RegAsm.exe PID 1612 wrote to memory of 1072 1612 PI.exe RegAsm.exe PID 1612 wrote to memory of 1072 1612 PI.exe RegAsm.exe PID 1612 wrote to memory of 1072 1612 PI.exe RegAsm.exe PID 1612 wrote to memory of 1072 1612 PI.exe RegAsm.exe PID 1612 wrote to memory of 1052 1612 PI.exe RegAsm.exe PID 1612 wrote to memory of 1052 1612 PI.exe RegAsm.exe PID 1612 wrote to memory of 1052 1612 PI.exe RegAsm.exe PID 1612 wrote to memory of 1052 1612 PI.exe RegAsm.exe PID 1612 wrote to memory of 1052 1612 PI.exe RegAsm.exe PID 1612 wrote to memory of 1052 1612 PI.exe RegAsm.exe PID 1612 wrote to memory of 1052 1612 PI.exe RegAsm.exe PID 1612 wrote to memory of 1052 1612 PI.exe RegAsm.exe PID 1612 wrote to memory of 1768 1612 PI.exe cmd.exe PID 1612 wrote to memory of 1768 1612 PI.exe cmd.exe PID 1612 wrote to memory of 1768 1612 PI.exe cmd.exe PID 1612 wrote to memory of 1768 1612 PI.exe cmd.exe PID 1768 wrote to memory of 1420 1768 cmd.exe choice.exe PID 1768 wrote to memory of 1420 1768 cmd.exe choice.exe PID 1768 wrote to memory of 1420 1768 cmd.exe choice.exe PID 1768 wrote to memory of 1420 1768 cmd.exe choice.exe PID 1612 wrote to memory of 1416 1612 PI.exe PI.exe PID 1612 wrote to memory of 1416 1612 PI.exe PI.exe PID 1612 wrote to memory of 1416 1612 PI.exe PI.exe PID 1612 wrote to memory of 1416 1612 PI.exe PI.exe PID 1416 wrote to memory of 1948 1416 PI.exe RegAsm.exe PID 1416 wrote to memory of 1948 1416 PI.exe RegAsm.exe PID 1416 wrote to memory of 1948 1416 PI.exe RegAsm.exe PID 1416 wrote to memory of 1948 1416 PI.exe RegAsm.exe PID 1416 wrote to memory of 1948 1416 PI.exe RegAsm.exe PID 1416 wrote to memory of 1948 1416 PI.exe RegAsm.exe PID 1416 wrote to memory of 1948 1416 PI.exe RegAsm.exe PID 1416 wrote to memory of 1948 1416 PI.exe RegAsm.exe PID 1416 wrote to memory of 1972 1416 PI.exe cmd.exe PID 1416 wrote to memory of 1972 1416 PI.exe cmd.exe PID 1416 wrote to memory of 1972 1416 PI.exe cmd.exe PID 1416 wrote to memory of 1972 1416 PI.exe cmd.exe PID 1416 wrote to memory of 2000 1416 PI.exe PI.exe PID 1416 wrote to memory of 2000 1416 PI.exe PI.exe PID 1416 wrote to memory of 2000 1416 PI.exe PI.exe PID 1416 wrote to memory of 2000 1416 PI.exe PI.exe PID 1972 wrote to memory of 1592 1972 cmd.exe choice.exe PID 1972 wrote to memory of 1592 1972 cmd.exe choice.exe PID 1972 wrote to memory of 1592 1972 cmd.exe choice.exe PID 1972 wrote to memory of 1592 1972 cmd.exe choice.exe PID 2000 wrote to memory of 1652 2000 PI.exe RegAsm.exe PID 2000 wrote to memory of 1652 2000 PI.exe RegAsm.exe PID 2000 wrote to memory of 1652 2000 PI.exe RegAsm.exe PID 2000 wrote to memory of 1652 2000 PI.exe RegAsm.exe PID 2000 wrote to memory of 1652 2000 PI.exe RegAsm.exe PID 2000 wrote to memory of 1652 2000 PI.exe RegAsm.exe PID 2000 wrote to memory of 1652 2000 PI.exe RegAsm.exe PID 2000 wrote to memory of 1664 2000 PI.exe RegAsm.exe PID 2000 wrote to memory of 1664 2000 PI.exe RegAsm.exe PID 2000 wrote to memory of 1664 2000 PI.exe RegAsm.exe PID 2000 wrote to memory of 1664 2000 PI.exe RegAsm.exe PID 2000 wrote to memory of 1664 2000 PI.exe RegAsm.exe PID 2000 wrote to memory of 1664 2000 PI.exe RegAsm.exe PID 2000 wrote to memory of 1664 2000 PI.exe RegAsm.exe PID 2000 wrote to memory of 1664 2000 PI.exe RegAsm.exe PID 2000 wrote to memory of 1632 2000 PI.exe cmd.exe PID 2000 wrote to memory of 1632 2000 PI.exe cmd.exe -
Suspicious behavior: MapViewOfSection 71 IoCs
Processes:
PI.exePI.exePI.exePI.exePI.exePI.exePI.exePI.exePI.exePI.exePI.exePI.exePI.exePI.exePI.exePI.exePI.exePI.exePI.exePI.exePI.exePI.exePI.exePI.exePI.exePI.exePI.exePI.exePI.exePI.exePI.exePI.exePI.exePI.exePI.exePI.exePI.exepid process 1612 PI.exe 1612 PI.exe 1416 PI.exe 2000 PI.exe 2000 PI.exe 620 PI.exe 1536 PI.exe 1628 PI.exe 1656 PI.exe 1656 PI.exe 1656 PI.exe 580 PI.exe 324 PI.exe 1940 PI.exe 1380 PI.exe 1048 PI.exe 1048 PI.exe 1048 PI.exe 1048 PI.exe 792 PI.exe 1076 PI.exe 1076 PI.exe 1076 PI.exe 1076 PI.exe 1076 PI.exe 1076 PI.exe 1076 PI.exe 1076 PI.exe 1964 PI.exe 1164 PI.exe 1368 PI.exe 828 PI.exe 828 PI.exe 828 PI.exe 1932 PI.exe 588 PI.exe 588 PI.exe 588 PI.exe 588 PI.exe 1916 PI.exe 1916 PI.exe 1916 PI.exe 1916 PI.exe 1916 PI.exe 1856 PI.exe 1052 PI.exe 1572 PI.exe 1572 PI.exe 1632 PI.exe 1632 PI.exe 1632 PI.exe 1864 PI.exe 1952 PI.exe 1832 PI.exe 1832 PI.exe 1672 PI.exe 2016 PI.exe 2028 PI.exe 832 PI.exe 1132 PI.exe 276 PI.exe 1520 PI.exe 240 PI.exe 820 PI.exe -
Loads dropped DLL 112 IoCs
Processes:
RegAsm.exeRegAsm.exeRegAsm.exeRegAsm.exepid process 1052 RegAsm.exe 1052 RegAsm.exe 1052 RegAsm.exe 1052 RegAsm.exe 1052 RegAsm.exe 1052 RegAsm.exe 1052 RegAsm.exe 1052 RegAsm.exe 1052 RegAsm.exe 1052 RegAsm.exe 1052 RegAsm.exe 1052 RegAsm.exe 1052 RegAsm.exe 1052 RegAsm.exe 1052 RegAsm.exe 1052 RegAsm.exe 1504 RegAsm.exe 1504 RegAsm.exe 1504 RegAsm.exe 1504 RegAsm.exe 1504 RegAsm.exe 1504 RegAsm.exe 1504 RegAsm.exe 1504 RegAsm.exe 1504 RegAsm.exe 1504 RegAsm.exe 1504 RegAsm.exe 1504 RegAsm.exe 1504 RegAsm.exe 1504 RegAsm.exe 1504 RegAsm.exe 1504 RegAsm.exe 528 RegAsm.exe 528 RegAsm.exe 528 RegAsm.exe 528 RegAsm.exe 528 RegAsm.exe 528 RegAsm.exe 528 RegAsm.exe 528 RegAsm.exe 528 RegAsm.exe 528 RegAsm.exe 528 RegAsm.exe 528 RegAsm.exe 528 RegAsm.exe 528 RegAsm.exe 528 RegAsm.exe 528 RegAsm.exe 1316 RegAsm.exe 1316 RegAsm.exe 1316 RegAsm.exe 1316 RegAsm.exe 1316 RegAsm.exe 1316 RegAsm.exe 1316 RegAsm.exe 1316 RegAsm.exe 1316 RegAsm.exe 1316 RegAsm.exe 1316 RegAsm.exe 1316 RegAsm.exe 1316 RegAsm.exe 1316 RegAsm.exe 1316 RegAsm.exe 1316 RegAsm.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Checks processor information in registry 2 TTPs 14 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
RegAsm.exeRegAsm.exeRegAsm.exeRegAsm.exeRegAsm.exeRegAsm.exeRegAsm.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 RegAsm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString RegAsm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString RegAsm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString RegAsm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString RegAsm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString RegAsm.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 RegAsm.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 RegAsm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString RegAsm.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 RegAsm.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 RegAsm.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 RegAsm.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 RegAsm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString RegAsm.exe -
Checks for installed software on the system 1 TTPs 210 IoCs
Processes:
RegAsm.exeRegAsm.exeRegAsm.exeRegAsm.exeRegAsm.exeRegAsm.exeRegAsm.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\IE5BAKEX\DisplayName RegAsm.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}.KB2524860\DisplayName RegAsm.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Connection Manager\DisplayName RegAsm.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Adobe AIR\DisplayName RegAsm.exe Key opened \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Windows\CurrentVersion\Uninstall RegAsm.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}.KB2544655\DisplayName RegAsm.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{f4220b74-9edd-4ded-bc8b-0342c1e164d8}\DisplayName RegAsm.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\MobileOptionPack\DisplayName RegAsm.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Adobe AIR\DisplayName RegAsm.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\IE40\DisplayName RegAsm.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\SchedulingAgent\DisplayName RegAsm.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}.KB2544655\DisplayName RegAsm.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Fontcore\DisplayName RegAsm.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\IE5BAKEX\DisplayName RegAsm.exe Key opened \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall RegAsm.exe Key enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall RegAsm.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\IE5BAKEX\DisplayName RegAsm.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{00203668-8170-44A0-BE44-B632FA4D780F}\DisplayName RegAsm.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\SchedulingAgent\DisplayName RegAsm.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}.KB2151757\DisplayName RegAsm.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\IE4Data\DisplayName RegAsm.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}.KB982573\DisplayName RegAsm.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{00203668-8170-44A0-BE44-B632FA4D780F}\DisplayName RegAsm.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\WIC\DisplayName RegAsm.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{92FB6C44-E685-45AD-9B20-CADF4CABA132}.KB4087364\DisplayName RegAsm.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Adobe AIR\DisplayName RegAsm.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\IE4Data\DisplayName RegAsm.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{f4220b74-9edd-4ded-bc8b-0342c1e164d8}\DisplayName RegAsm.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Connection Manager\DisplayName RegAsm.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}.KB2565063\DisplayName RegAsm.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\IE4Data\DisplayName RegAsm.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\MobileOptionPack\DisplayName RegAsm.exe Key opened \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall RegAsm.exe Key enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall RegAsm.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}.KB982573\DisplayName RegAsm.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Fontcore\DisplayName RegAsm.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\IE5BAKEX\DisplayName RegAsm.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}.KB2151757\DisplayName RegAsm.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Adobe AIR\DisplayName RegAsm.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\SchedulingAgent\DisplayName RegAsm.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{BB8B979E-E336-47E7-96BC-1031C1B94561}\DisplayName RegAsm.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\IE40\DisplayName RegAsm.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{ef6b00ec-13e1-4c25-9064-b2f383cb8412}\DisplayName RegAsm.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{AC76BA86-7AD7-1033-7B44-A90000000001}\DisplayName RegAsm.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}.KB2544655\DisplayName RegAsm.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\IEData\DisplayName RegAsm.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{AC76BA86-7AD7-1033-7B44-A90000000001}\DisplayName RegAsm.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\DirectDrawEx\DisplayName RegAsm.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\IE5BAKEX\DisplayName RegAsm.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\IE5BAKEX\DisplayName RegAsm.exe Key opened \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Windows\CurrentVersion\Uninstall RegAsm.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{f4220b74-9edd-4ded-bc8b-0342c1e164d8}\DisplayName RegAsm.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}.KB2544655\DisplayName RegAsm.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}.KB2565063\DisplayName RegAsm.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{BB8B979E-E336-47E7-96BC-1031C1B94561}\DisplayName RegAsm.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}.KB2549743\DisplayName RegAsm.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{ef6b00ec-13e1-4c25-9064-b2f383cb8412}\DisplayName RegAsm.exe Key opened \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall RegAsm.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\AddressBook\DisplayName RegAsm.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\WIC\DisplayName RegAsm.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{92FB6C44-E685-45AD-9B20-CADF4CABA132}.KB4087364\DisplayName RegAsm.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{ef6b00ec-13e1-4c25-9064-b2f383cb8412}\DisplayName RegAsm.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{ef6b00ec-13e1-4c25-9064-b2f383cb8412}\DisplayName RegAsm.exe Key opened \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Windows\CurrentVersion\Uninstall RegAsm.exe -
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Suspicious use of SetThreadContext 42 IoCs
Processes:
PI.exePI.exePI.exePI.exePI.exePI.exePI.exePI.exePI.exePI.exePI.exePI.exePI.exePI.exePI.exePI.exePI.exePI.exePI.exePI.exePI.exePI.exePI.exePI.exePI.exePI.exePI.exePI.exePI.exePI.exePI.exePI.exePI.exePI.exePI.exePI.exePI.exePI.exePI.exePI.exePI.exePI.exedescription pid process target process PID 1612 set thread context of 1052 1612 PI.exe RegAsm.exe PID 1416 set thread context of 1948 1416 PI.exe RegAsm.exe PID 2000 set thread context of 1664 2000 PI.exe RegAsm.exe PID 620 set thread context of 1272 620 PI.exe RegAsm.exe PID 1536 set thread context of 1868 1536 PI.exe RegAsm.exe PID 1628 set thread context of 1116 1628 PI.exe RegAsm.exe PID 1656 set thread context of 1852 1656 PI.exe RegAsm.exe PID 580 set thread context of 1560 580 PI.exe RegAsm.exe PID 324 set thread context of 1604 324 PI.exe RegAsm.exe PID 1940 set thread context of 1028 1940 PI.exe RegAsm.exe PID 1380 set thread context of 1804 1380 PI.exe RegAsm.exe PID 1048 set thread context of 1592 1048 PI.exe RegAsm.exe PID 792 set thread context of 1504 792 PI.exe RegAsm.exe PID 1076 set thread context of 1752 1076 PI.exe RegAsm.exe PID 1964 set thread context of 1140 1964 PI.exe RegAsm.exe PID 1164 set thread context of 1588 1164 PI.exe RegAsm.exe PID 1368 set thread context of 1080 1368 PI.exe RegAsm.exe PID 828 set thread context of 556 828 PI.exe RegAsm.exe PID 1932 set thread context of 1588 1932 PI.exe RegAsm.exe PID 588 set thread context of 1080 588 PI.exe RegAsm.exe PID 1916 set thread context of 528 1916 PI.exe RegAsm.exe PID 1856 set thread context of 1544 1856 PI.exe RegAsm.exe PID 1052 set thread context of 1088 1052 PI.exe RegAsm.exe PID 1572 set thread context of 1420 1572 PI.exe RegAsm.exe PID 1632 set thread context of 1316 1632 PI.exe RegAsm.exe PID 1864 set thread context of 1488 1864 PI.exe RegAsm.exe PID 1952 set thread context of 884 1952 PI.exe RegAsm.exe PID 1832 set thread context of 1752 1832 PI.exe RegAsm.exe PID 1672 set thread context of 1608 1672 PI.exe RegAsm.exe PID 2016 set thread context of 860 2016 PI.exe RegAsm.exe PID 2028 set thread context of 1572 2028 PI.exe RegAsm.exe PID 832 set thread context of 1488 832 PI.exe RegAsm.exe PID 1132 set thread context of 1708 1132 PI.exe RegAsm.exe PID 276 set thread context of 1772 276 PI.exe RegAsm.exe PID 1520 set thread context of 1688 1520 PI.exe RegAsm.exe PID 240 set thread context of 1664 240 PI.exe RegAsm.exe PID 820 set thread context of 1608 820 PI.exe RegAsm.exe PID 560 set thread context of 1140 560 PI.exe RegAsm.exe PID 1920 set thread context of 1088 1920 PI.exe RegAsm.exe PID 1692 set thread context of 1048 1692 PI.exe RegAsm.exe PID 268 set thread context of 1604 268 PI.exe RegAsm.exe PID 1056 set thread context of 1544 1056 PI.exe RegAsm.exe -
Suspicious use of AdjustPrivilegeToken 41 IoCs
Processes:
PI.exePI.exePI.exePI.exePI.exePI.exePI.exePI.exePI.exePI.exePI.exePI.exePI.exePI.exePI.exePI.exePI.exePI.exePI.exePI.exePI.exePI.exePI.exePI.exePI.exePI.exePI.exePI.exePI.exePI.exePI.exePI.exePI.exePI.exePI.exePI.exePI.exePI.exePI.exePI.exePI.exedescription pid process Token: SeDebugPrivilege 1612 PI.exe Token: SeDebugPrivilege 1416 PI.exe Token: SeDebugPrivilege 2000 PI.exe Token: SeDebugPrivilege 620 PI.exe Token: SeDebugPrivilege 1536 PI.exe Token: SeDebugPrivilege 1628 PI.exe Token: SeDebugPrivilege 1656 PI.exe Token: SeDebugPrivilege 580 PI.exe Token: SeDebugPrivilege 324 PI.exe Token: SeDebugPrivilege 1940 PI.exe Token: SeDebugPrivilege 1380 PI.exe Token: SeDebugPrivilege 1048 PI.exe Token: SeDebugPrivilege 792 PI.exe Token: SeDebugPrivilege 1076 PI.exe Token: SeDebugPrivilege 1964 PI.exe Token: SeDebugPrivilege 1164 PI.exe Token: SeDebugPrivilege 1368 PI.exe Token: SeDebugPrivilege 828 PI.exe Token: SeDebugPrivilege 1932 PI.exe Token: SeDebugPrivilege 588 PI.exe Token: SeDebugPrivilege 1916 PI.exe Token: SeDebugPrivilege 1856 PI.exe Token: SeDebugPrivilege 1052 PI.exe Token: SeDebugPrivilege 1572 PI.exe Token: SeDebugPrivilege 1632 PI.exe Token: SeDebugPrivilege 1864 PI.exe Token: SeDebugPrivilege 1952 PI.exe Token: SeDebugPrivilege 1832 PI.exe Token: SeDebugPrivilege 1672 PI.exe Token: SeDebugPrivilege 2016 PI.exe Token: SeDebugPrivilege 2028 PI.exe Token: SeDebugPrivilege 832 PI.exe Token: SeDebugPrivilege 1132 PI.exe Token: SeDebugPrivilege 276 PI.exe Token: SeDebugPrivilege 1520 PI.exe Token: SeDebugPrivilege 240 PI.exe Token: SeDebugPrivilege 820 PI.exe Token: SeDebugPrivilege 560 PI.exe Token: SeDebugPrivilege 1920 PI.exe Token: SeDebugPrivilege 1692 PI.exe Token: SeDebugPrivilege 268 PI.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\PI.exe"C:\Users\Admin\AppData\Local\Temp\PI.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- Loads dropped DLL
- Checks processor information in registry
- Checks for installed software on the system
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c C:\Windows\system32\timeout.exe 3 & del "RegAsm.exe"3⤵
-
C:\Windows\SysWOW64\timeout.exeC:\Windows\system32\timeout.exe 34⤵
- Delays execution with timeout.exe
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\PI.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 33⤵
-
C:\Users\Admin\AppData\Local\Temp\PI.exe"C:\Users\Admin\AppData\Local\Temp\PI.exe"2⤵
- Suspicious use of WriteProcessMemory
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\PI.exe"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 34⤵
-
C:\Users\Admin\AppData\Local\Temp\PI.exe"C:\Users\Admin\AppData\Local\Temp\PI.exe"3⤵
- Suspicious use of WriteProcessMemory
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\PI.exe"4⤵
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 35⤵
-
C:\Users\Admin\AppData\Local\Temp\PI.exe"C:\Users\Admin\AppData\Local\Temp\PI.exe"4⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"5⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\PI.exe"5⤵
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 36⤵
-
C:\Users\Admin\AppData\Local\Temp\PI.exe"C:\Users\Admin\AppData\Local\Temp\PI.exe"5⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"6⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\PI.exe"6⤵
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 37⤵
-
C:\Users\Admin\AppData\Local\Temp\PI.exe"C:\Users\Admin\AppData\Local\Temp\PI.exe"6⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"7⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\PI.exe"7⤵
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 38⤵
-
C:\Users\Admin\AppData\Local\Temp\PI.exe"C:\Users\Admin\AppData\Local\Temp\PI.exe"7⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"8⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"8⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"8⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\PI.exe"8⤵
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 39⤵
-
C:\Users\Admin\AppData\Local\Temp\PI.exe"C:\Users\Admin\AppData\Local\Temp\PI.exe"8⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"9⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\PI.exe"9⤵
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 310⤵
-
C:\Users\Admin\AppData\Local\Temp\PI.exe"C:\Users\Admin\AppData\Local\Temp\PI.exe"9⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"10⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\PI.exe"10⤵
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 311⤵
-
C:\Users\Admin\AppData\Local\Temp\PI.exe"C:\Users\Admin\AppData\Local\Temp\PI.exe"10⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"11⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\PI.exe"11⤵
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 312⤵
-
C:\Users\Admin\AppData\Local\Temp\PI.exe"C:\Users\Admin\AppData\Local\Temp\PI.exe"11⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"12⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\PI.exe"12⤵
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 313⤵
-
C:\Users\Admin\AppData\Local\Temp\PI.exe"C:\Users\Admin\AppData\Local\Temp\PI.exe"12⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"13⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"13⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"13⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"13⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\PI.exe"13⤵
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 314⤵
-
C:\Users\Admin\AppData\Local\Temp\PI.exe"C:\Users\Admin\AppData\Local\Temp\PI.exe"13⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"14⤵
- Loads dropped DLL
- Checks processor information in registry
- Checks for installed software on the system
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c C:\Windows\system32\timeout.exe 3 & del "RegAsm.exe"15⤵
-
C:\Windows\SysWOW64\timeout.exeC:\Windows\system32\timeout.exe 316⤵
- Delays execution with timeout.exe
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\PI.exe"14⤵
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 315⤵
-
C:\Users\Admin\AppData\Local\Temp\PI.exe"C:\Users\Admin\AppData\Local\Temp\PI.exe"14⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"15⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"15⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"15⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"15⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"15⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"15⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"15⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"15⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\PI.exe"15⤵
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 316⤵
-
C:\Users\Admin\AppData\Local\Temp\PI.exe"C:\Users\Admin\AppData\Local\Temp\PI.exe"15⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"16⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\PI.exe"16⤵
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 317⤵
-
C:\Users\Admin\AppData\Local\Temp\PI.exe"C:\Users\Admin\AppData\Local\Temp\PI.exe"16⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"17⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\PI.exe"17⤵
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 318⤵
-
C:\Users\Admin\AppData\Local\Temp\PI.exe"C:\Users\Admin\AppData\Local\Temp\PI.exe"17⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"18⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\PI.exe"18⤵
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 319⤵
-
C:\Users\Admin\AppData\Local\Temp\PI.exe"C:\Users\Admin\AppData\Local\Temp\PI.exe"18⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"19⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"19⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"19⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\PI.exe"19⤵
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 320⤵
-
C:\Users\Admin\AppData\Local\Temp\PI.exe"C:\Users\Admin\AppData\Local\Temp\PI.exe"19⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"20⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\PI.exe"20⤵
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 321⤵
-
C:\Users\Admin\AppData\Local\Temp\PI.exe"C:\Users\Admin\AppData\Local\Temp\PI.exe"20⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"21⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"21⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"21⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"21⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\PI.exe"21⤵
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 322⤵
-
C:\Users\Admin\AppData\Local\Temp\PI.exe"C:\Users\Admin\AppData\Local\Temp\PI.exe"21⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"22⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"22⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"22⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"22⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"22⤵
- Loads dropped DLL
- Checks processor information in registry
- Checks for installed software on the system
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c C:\Windows\system32\timeout.exe 3 & del "RegAsm.exe"23⤵
-
C:\Windows\SysWOW64\timeout.exeC:\Windows\system32\timeout.exe 324⤵
- Delays execution with timeout.exe
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\PI.exe"22⤵
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 323⤵
-
C:\Users\Admin\AppData\Local\Temp\PI.exe"C:\Users\Admin\AppData\Local\Temp\PI.exe"22⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"23⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\PI.exe"23⤵
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 324⤵
-
C:\Users\Admin\AppData\Local\Temp\PI.exe"C:\Users\Admin\AppData\Local\Temp\PI.exe"23⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"24⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\PI.exe"24⤵
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 325⤵
-
C:\Users\Admin\AppData\Local\Temp\PI.exe"C:\Users\Admin\AppData\Local\Temp\PI.exe"24⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"25⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"25⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\PI.exe"25⤵
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 326⤵
-
C:\Users\Admin\AppData\Local\Temp\PI.exe"C:\Users\Admin\AppData\Local\Temp\PI.exe"25⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"26⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"26⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"26⤵
- Loads dropped DLL
- Checks processor information in registry
- Checks for installed software on the system
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c C:\Windows\system32\timeout.exe 3 & del "RegAsm.exe"27⤵
-
C:\Windows\SysWOW64\timeout.exeC:\Windows\system32\timeout.exe 328⤵
- Delays execution with timeout.exe
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\PI.exe"26⤵
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 327⤵
-
C:\Users\Admin\AppData\Local\Temp\PI.exe"C:\Users\Admin\AppData\Local\Temp\PI.exe"26⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"27⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\PI.exe"27⤵
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 328⤵
-
C:\Users\Admin\AppData\Local\Temp\PI.exe"C:\Users\Admin\AppData\Local\Temp\PI.exe"27⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"28⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\PI.exe"28⤵
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 329⤵
-
C:\Users\Admin\AppData\Local\Temp\PI.exe"C:\Users\Admin\AppData\Local\Temp\PI.exe"28⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"29⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"29⤵
- Checks processor information in registry
- Checks for installed software on the system
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c C:\Windows\system32\timeout.exe 3 & del "RegAsm.exe"30⤵
-
C:\Windows\SysWOW64\timeout.exeC:\Windows\system32\timeout.exe 331⤵
- Delays execution with timeout.exe
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\PI.exe"29⤵
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 330⤵
-
C:\Users\Admin\AppData\Local\Temp\PI.exe"C:\Users\Admin\AppData\Local\Temp\PI.exe"29⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"30⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\PI.exe"30⤵
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 331⤵
-
C:\Users\Admin\AppData\Local\Temp\PI.exe"C:\Users\Admin\AppData\Local\Temp\PI.exe"30⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"31⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\PI.exe"31⤵
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 332⤵
-
C:\Users\Admin\AppData\Local\Temp\PI.exe"C:\Users\Admin\AppData\Local\Temp\PI.exe"31⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"32⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\PI.exe"32⤵
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 333⤵
-
C:\Users\Admin\AppData\Local\Temp\PI.exe"C:\Users\Admin\AppData\Local\Temp\PI.exe"32⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"33⤵
- Checks processor information in registry
- Checks for installed software on the system
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c C:\Windows\system32\timeout.exe 3 & del "RegAsm.exe"34⤵
-
C:\Windows\SysWOW64\timeout.exeC:\Windows\system32\timeout.exe 335⤵
- Delays execution with timeout.exe
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\PI.exe"33⤵
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 334⤵
-
C:\Users\Admin\AppData\Local\Temp\PI.exe"C:\Users\Admin\AppData\Local\Temp\PI.exe"33⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"34⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\PI.exe"34⤵
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 335⤵
-
C:\Users\Admin\AppData\Local\Temp\PI.exe"C:\Users\Admin\AppData\Local\Temp\PI.exe"34⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"35⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\PI.exe"35⤵
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 336⤵
-
C:\Users\Admin\AppData\Local\Temp\PI.exe"C:\Users\Admin\AppData\Local\Temp\PI.exe"35⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"36⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\PI.exe"36⤵
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 337⤵
-
C:\Users\Admin\AppData\Local\Temp\PI.exe"C:\Users\Admin\AppData\Local\Temp\PI.exe"36⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"37⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\PI.exe"37⤵
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 338⤵
-
C:\Users\Admin\AppData\Local\Temp\PI.exe"C:\Users\Admin\AppData\Local\Temp\PI.exe"37⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"38⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"38⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"38⤵
- Checks processor information in registry
- Checks for installed software on the system
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c C:\Windows\system32\timeout.exe 3 & del "RegAsm.exe"39⤵
-
C:\Windows\SysWOW64\timeout.exeC:\Windows\system32\timeout.exe 340⤵
- Delays execution with timeout.exe
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\PI.exe"38⤵
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 339⤵
-
C:\Users\Admin\AppData\Local\Temp\PI.exe"C:\Users\Admin\AppData\Local\Temp\PI.exe"38⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"39⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\PI.exe"39⤵
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 340⤵
-
C:\Users\Admin\AppData\Local\Temp\PI.exe"C:\Users\Admin\AppData\Local\Temp\PI.exe"39⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"40⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\PI.exe"40⤵
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 341⤵
-
C:\Users\Admin\AppData\Local\Temp\PI.exe"C:\Users\Admin\AppData\Local\Temp\PI.exe"40⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"41⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\PI.exe"41⤵
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 342⤵
-
C:\Users\Admin\AppData\Local\Temp\PI.exe"C:\Users\Admin\AppData\Local\Temp\PI.exe"41⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"42⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\PI.exe"42⤵
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 343⤵
-
C:\Users\Admin\AppData\Local\Temp\PI.exe"C:\Users\Admin\AppData\Local\Temp\PI.exe"42⤵
- Suspicious use of SetThreadContext
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"43⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\2fda\mozglue.dll
-
C:\Users\Admin\AppData\Local\Temp\2fda\msvcp140.dll
-
C:\Users\Admin\AppData\Local\Temp\2fda\msvcp140.dll
-
C:\Users\Admin\AppData\Local\Temp\2fda\nss3.dll
-
C:\Users\Admin\AppData\Local\Temp\2fda\nss3.dll
-
C:\Users\Admin\AppData\Local\Temp\2fda\nss3.dll
-
C:\Users\Admin\AppData\Local\Temp\2fda\nss3.dll
-
\Users\Admin\AppData\Local\Temp\2fda\api-ms-win-crt-convert-l1-1-0.dll
-
\Users\Admin\AppData\Local\Temp\2fda\api-ms-win-crt-convert-l1-1-0.dll
-
\Users\Admin\AppData\Local\Temp\2fda\api-ms-win-crt-convert-l1-1-0.dll
-
\Users\Admin\AppData\Local\Temp\2fda\api-ms-win-crt-convert-l1-1-0.dll
-
\Users\Admin\AppData\Local\Temp\2fda\api-ms-win-crt-convert-l1-1-0.dll
-
\Users\Admin\AppData\Local\Temp\2fda\api-ms-win-crt-convert-l1-1-0.dll
-
\Users\Admin\AppData\Local\Temp\2fda\api-ms-win-crt-convert-l1-1-0.dll
-
\Users\Admin\AppData\Local\Temp\2fda\api-ms-win-crt-environment-l1-1-0.dll
-
\Users\Admin\AppData\Local\Temp\2fda\api-ms-win-crt-environment-l1-1-0.dll
-
\Users\Admin\AppData\Local\Temp\2fda\api-ms-win-crt-environment-l1-1-0.dll
-
\Users\Admin\AppData\Local\Temp\2fda\api-ms-win-crt-environment-l1-1-0.dll
-
\Users\Admin\AppData\Local\Temp\2fda\api-ms-win-crt-environment-l1-1-0.dll
-
\Users\Admin\AppData\Local\Temp\2fda\api-ms-win-crt-environment-l1-1-0.dll
-
\Users\Admin\AppData\Local\Temp\2fda\api-ms-win-crt-environment-l1-1-0.dll
-
\Users\Admin\AppData\Local\Temp\2fda\api-ms-win-crt-filesystem-l1-1-0.dll
-
\Users\Admin\AppData\Local\Temp\2fda\api-ms-win-crt-filesystem-l1-1-0.dll
-
\Users\Admin\AppData\Local\Temp\2fda\api-ms-win-crt-filesystem-l1-1-0.dll
-
\Users\Admin\AppData\Local\Temp\2fda\api-ms-win-crt-filesystem-l1-1-0.dll
-
\Users\Admin\AppData\Local\Temp\2fda\api-ms-win-crt-filesystem-l1-1-0.dll
-
\Users\Admin\AppData\Local\Temp\2fda\api-ms-win-crt-filesystem-l1-1-0.dll
-
\Users\Admin\AppData\Local\Temp\2fda\api-ms-win-crt-filesystem-l1-1-0.dll
-
\Users\Admin\AppData\Local\Temp\2fda\api-ms-win-crt-heap-l1-1-0.dll
-
\Users\Admin\AppData\Local\Temp\2fda\api-ms-win-crt-heap-l1-1-0.dll
-
\Users\Admin\AppData\Local\Temp\2fda\api-ms-win-crt-heap-l1-1-0.dll
-
\Users\Admin\AppData\Local\Temp\2fda\api-ms-win-crt-heap-l1-1-0.dll
-
\Users\Admin\AppData\Local\Temp\2fda\api-ms-win-crt-heap-l1-1-0.dll
-
\Users\Admin\AppData\Local\Temp\2fda\api-ms-win-crt-heap-l1-1-0.dll
-
\Users\Admin\AppData\Local\Temp\2fda\api-ms-win-crt-heap-l1-1-0.dll
-
\Users\Admin\AppData\Local\Temp\2fda\api-ms-win-crt-locale-l1-1-0.dll
-
\Users\Admin\AppData\Local\Temp\2fda\api-ms-win-crt-locale-l1-1-0.dll
-
\Users\Admin\AppData\Local\Temp\2fda\api-ms-win-crt-locale-l1-1-0.dll
-
\Users\Admin\AppData\Local\Temp\2fda\api-ms-win-crt-locale-l1-1-0.dll
-
\Users\Admin\AppData\Local\Temp\2fda\api-ms-win-crt-locale-l1-1-0.dll
-
\Users\Admin\AppData\Local\Temp\2fda\api-ms-win-crt-locale-l1-1-0.dll
-
\Users\Admin\AppData\Local\Temp\2fda\api-ms-win-crt-locale-l1-1-0.dll
-
\Users\Admin\AppData\Local\Temp\2fda\api-ms-win-crt-math-l1-1-0.dll
-
\Users\Admin\AppData\Local\Temp\2fda\api-ms-win-crt-math-l1-1-0.dll
-
\Users\Admin\AppData\Local\Temp\2fda\api-ms-win-crt-math-l1-1-0.dll
-
\Users\Admin\AppData\Local\Temp\2fda\api-ms-win-crt-math-l1-1-0.dll
-
\Users\Admin\AppData\Local\Temp\2fda\api-ms-win-crt-math-l1-1-0.dll
-
\Users\Admin\AppData\Local\Temp\2fda\api-ms-win-crt-math-l1-1-0.dll
-
\Users\Admin\AppData\Local\Temp\2fda\api-ms-win-crt-math-l1-1-0.dll
-
\Users\Admin\AppData\Local\Temp\2fda\api-ms-win-crt-multibyte-l1-1-0.dll
-
\Users\Admin\AppData\Local\Temp\2fda\api-ms-win-crt-multibyte-l1-1-0.dll
-
\Users\Admin\AppData\Local\Temp\2fda\api-ms-win-crt-multibyte-l1-1-0.dll
-
\Users\Admin\AppData\Local\Temp\2fda\api-ms-win-crt-multibyte-l1-1-0.dll
-
\Users\Admin\AppData\Local\Temp\2fda\api-ms-win-crt-multibyte-l1-1-0.dll
-
\Users\Admin\AppData\Local\Temp\2fda\api-ms-win-crt-multibyte-l1-1-0.dll
-
\Users\Admin\AppData\Local\Temp\2fda\api-ms-win-crt-multibyte-l1-1-0.dll
-
\Users\Admin\AppData\Local\Temp\2fda\api-ms-win-crt-runtime-l1-1-0.dll
-
\Users\Admin\AppData\Local\Temp\2fda\api-ms-win-crt-runtime-l1-1-0.dll
-
\Users\Admin\AppData\Local\Temp\2fda\api-ms-win-crt-runtime-l1-1-0.dll
-
\Users\Admin\AppData\Local\Temp\2fda\api-ms-win-crt-runtime-l1-1-0.dll
-
\Users\Admin\AppData\Local\Temp\2fda\api-ms-win-crt-runtime-l1-1-0.dll
-
\Users\Admin\AppData\Local\Temp\2fda\api-ms-win-crt-runtime-l1-1-0.dll
-
\Users\Admin\AppData\Local\Temp\2fda\api-ms-win-crt-runtime-l1-1-0.dll
-
\Users\Admin\AppData\Local\Temp\2fda\api-ms-win-crt-stdio-l1-1-0.dll
-
\Users\Admin\AppData\Local\Temp\2fda\api-ms-win-crt-stdio-l1-1-0.dll
-
\Users\Admin\AppData\Local\Temp\2fda\api-ms-win-crt-stdio-l1-1-0.dll
-
\Users\Admin\AppData\Local\Temp\2fda\api-ms-win-crt-stdio-l1-1-0.dll
-
\Users\Admin\AppData\Local\Temp\2fda\api-ms-win-crt-stdio-l1-1-0.dll
-
\Users\Admin\AppData\Local\Temp\2fda\api-ms-win-crt-stdio-l1-1-0.dll
-
\Users\Admin\AppData\Local\Temp\2fda\api-ms-win-crt-stdio-l1-1-0.dll
-
\Users\Admin\AppData\Local\Temp\2fda\api-ms-win-crt-string-l1-1-0.dll
-
\Users\Admin\AppData\Local\Temp\2fda\api-ms-win-crt-string-l1-1-0.dll
-
\Users\Admin\AppData\Local\Temp\2fda\api-ms-win-crt-string-l1-1-0.dll
-
\Users\Admin\AppData\Local\Temp\2fda\api-ms-win-crt-string-l1-1-0.dll
-
\Users\Admin\AppData\Local\Temp\2fda\api-ms-win-crt-string-l1-1-0.dll
-
\Users\Admin\AppData\Local\Temp\2fda\api-ms-win-crt-string-l1-1-0.dll
-
\Users\Admin\AppData\Local\Temp\2fda\api-ms-win-crt-string-l1-1-0.dll
-
\Users\Admin\AppData\Local\Temp\2fda\api-ms-win-crt-time-l1-1-0.dll
-
\Users\Admin\AppData\Local\Temp\2fda\api-ms-win-crt-time-l1-1-0.dll
-
\Users\Admin\AppData\Local\Temp\2fda\api-ms-win-crt-time-l1-1-0.dll
-
\Users\Admin\AppData\Local\Temp\2fda\api-ms-win-crt-time-l1-1-0.dll
-
\Users\Admin\AppData\Local\Temp\2fda\api-ms-win-crt-time-l1-1-0.dll
-
\Users\Admin\AppData\Local\Temp\2fda\api-ms-win-crt-time-l1-1-0.dll
-
\Users\Admin\AppData\Local\Temp\2fda\api-ms-win-crt-time-l1-1-0.dll
-
\Users\Admin\AppData\Local\Temp\2fda\api-ms-win-crt-utility-l1-1-0.dll
-
\Users\Admin\AppData\Local\Temp\2fda\api-ms-win-crt-utility-l1-1-0.dll
-
\Users\Admin\AppData\Local\Temp\2fda\api-ms-win-crt-utility-l1-1-0.dll
-
\Users\Admin\AppData\Local\Temp\2fda\api-ms-win-crt-utility-l1-1-0.dll
-
\Users\Admin\AppData\Local\Temp\2fda\api-ms-win-crt-utility-l1-1-0.dll
-
\Users\Admin\AppData\Local\Temp\2fda\api-ms-win-crt-utility-l1-1-0.dll
-
\Users\Admin\AppData\Local\Temp\2fda\api-ms-win-crt-utility-l1-1-0.dll
-
\Users\Admin\AppData\Local\Temp\2fda\mozglue.dll
-
\Users\Admin\AppData\Local\Temp\2fda\mozglue.dll
-
\Users\Admin\AppData\Local\Temp\2fda\mozglue.dll
-
\Users\Admin\AppData\Local\Temp\2fda\mozglue.dll
-
\Users\Admin\AppData\Local\Temp\2fda\mozglue.dll
-
\Users\Admin\AppData\Local\Temp\2fda\mozglue.dll
-
\Users\Admin\AppData\Local\Temp\2fda\mozglue.dll
-
\Users\Admin\AppData\Local\Temp\2fda\msvcp140.dll
-
\Users\Admin\AppData\Local\Temp\2fda\msvcp140.dll
-
\Users\Admin\AppData\Local\Temp\2fda\msvcp140.dll
-
\Users\Admin\AppData\Local\Temp\2fda\msvcp140.dll
-
\Users\Admin\AppData\Local\Temp\2fda\msvcp140.dll
-
\Users\Admin\AppData\Local\Temp\2fda\msvcp140.dll
-
\Users\Admin\AppData\Local\Temp\2fda\msvcp140.dll
-
\Users\Admin\AppData\Local\Temp\2fda\nss3.dll
-
\Users\Admin\AppData\Local\Temp\2fda\nss3.dll
-
\Users\Admin\AppData\Local\Temp\2fda\nss3.dll
-
\Users\Admin\AppData\Local\Temp\2fda\nss3.dll
-
\Users\Admin\AppData\Local\Temp\2fda\nss3.dll
-
\Users\Admin\AppData\Local\Temp\2fda\nss3.dll
-
\Users\Admin\AppData\Local\Temp\2fda\nss3.dll
-
\Users\Admin\AppData\Local\Temp\2fda\vcruntime140.dll
-
\Users\Admin\AppData\Local\Temp\2fda\vcruntime140.dll
-
\Users\Admin\AppData\Local\Temp\2fda\vcruntime140.dll
-
\Users\Admin\AppData\Local\Temp\2fda\vcruntime140.dll
-
\Users\Admin\AppData\Local\Temp\2fda\vcruntime140.dll
-
\Users\Admin\AppData\Local\Temp\2fda\vcruntime140.dll
-
\Users\Admin\AppData\Local\Temp\2fda\vcruntime140.dll
-
memory/112-64-0x0000000000000000-mapping.dmp
-
memory/112-339-0x0000000000000000-mapping.dmp
-
memory/240-479-0x0000000000000000-mapping.dmp
-
memory/240-36-0x0000000000000000-mapping.dmp
-
memory/268-552-0x0000000000000000-mapping.dmp
-
memory/268-158-0x0000000000000000-mapping.dmp
-
memory/276-457-0x0000000000000000-mapping.dmp
-
memory/324-87-0x0000000000000000-mapping.dmp
-
memory/324-354-0x0000000000000000-mapping.dmp
-
memory/332-326-0x0000000000000000-mapping.dmp
-
memory/364-276-0x0000000000000000-mapping.dmp
-
memory/364-403-0x0000000000000000-mapping.dmp
-
memory/464-543-0x0000000000000000-mapping.dmp
-
memory/520-73-0x0000000000000000-mapping.dmp
-
memory/520-329-0x0000000000000000-mapping.dmp
-
memory/528-255-0x000000000041A1F8-mapping.dmp
-
memory/556-206-0x000000000041A1F8-mapping.dmp
-
memory/560-519-0x0000000000000000-mapping.dmp
-
memory/572-398-0x0000000000000000-mapping.dmp
-
memory/572-108-0x0000000000000000-mapping.dmp
-
memory/580-76-0x0000000000000000-mapping.dmp
-
memory/588-226-0x0000000000000000-mapping.dmp
-
memory/620-32-0x0000000000000000-mapping.dmp
-
memory/784-257-0x0000000000000000-mapping.dmp
-
memory/792-147-0x0000000000000000-mapping.dmp
-
memory/820-507-0x0000000000000000-mapping.dmp
-
memory/828-204-0x0000000000000000-mapping.dmp
-
memory/828-86-0x0000000000000000-mapping.dmp
-
memory/832-433-0x0000000000000000-mapping.dmp
-
memory/860-395-0x000000000041A1F8-mapping.dmp
-
memory/876-203-0x0000000000000000-mapping.dmp
-
memory/876-517-0x0000000000000000-mapping.dmp
-
memory/884-343-0x000000000041A1F8-mapping.dmp
-
memory/1028-100-0x000000000041A1F8-mapping.dmp
-
memory/1032-531-0x0000000000000000-mapping.dmp
-
memory/1048-544-0x000000000041A1F8-mapping.dmp
-
memory/1048-120-0x0000000000000000-mapping.dmp
-
memory/1052-2-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/1052-6-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/1052-5-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/1052-7-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/1052-4-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/1052-0-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/1052-1-0x000000000041A1F8-mapping.dmp
-
memory/1052-3-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/1052-277-0x0000000000000000-mapping.dmp
-
memory/1052-378-0x0000000000000000-mapping.dmp
-
memory/1056-563-0x0000000000000000-mapping.dmp
-
memory/1056-468-0x0000000000000000-mapping.dmp
-
memory/1060-192-0x0000000000000000-mapping.dmp
-
memory/1072-442-0x0000000000000000-mapping.dmp
-
memory/1076-160-0x0000000000000000-mapping.dmp
-
memory/1080-195-0x000000000041A1F8-mapping.dmp
-
memory/1080-228-0x000000000041A1F8-mapping.dmp
-
memory/1080-58-0x0000000000000000-mapping.dmp
-
memory/1088-533-0x000000000041A1F8-mapping.dmp
-
memory/1088-279-0x000000000041A1F8-mapping.dmp
-
memory/1116-96-0x0000000000000000-mapping.dmp
-
memory/1116-56-0x000000000041A1F8-mapping.dmp
-
memory/1116-520-0x0000000000000000-mapping.dmp
-
memory/1116-374-0x0000000000000000-mapping.dmp
-
memory/1128-159-0x0000000000000000-mapping.dmp
-
memory/1132-445-0x0000000000000000-mapping.dmp
-
memory/1140-173-0x000000000041A1F8-mapping.dmp
-
memory/1140-208-0x0000000000000000-mapping.dmp
-
memory/1140-522-0x000000000041A1F8-mapping.dmp
-
memory/1148-48-0x0000000000000000-mapping.dmp
-
memory/1148-392-0x0000000000000000-mapping.dmp
-
memory/1152-177-0x0000000000000000-mapping.dmp
-
memory/1152-328-0x0000000000000000-mapping.dmp
-
memory/1164-181-0x0000000000000000-mapping.dmp
-
memory/1176-434-0x0000000000000000-mapping.dmp
-
memory/1264-560-0x0000000000000000-mapping.dmp
-
memory/1272-553-0x0000000000000000-mapping.dmp
-
memory/1272-340-0x0000000000000000-mapping.dmp
-
memory/1272-34-0x000000000041A1F8-mapping.dmp
-
memory/1280-266-0x0000000000000000-mapping.dmp
-
memory/1304-510-0x0000000000000000-mapping.dmp
-
memory/1316-325-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/1316-319-0x000000000041A1F8-mapping.dmp
-
memory/1316-324-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/1316-327-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/1316-323-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/1316-322-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/1360-504-0x0000000000000000-mapping.dmp
-
memory/1364-272-0x0000000000000000-mapping.dmp
-
memory/1364-31-0x0000000000000000-mapping.dmp
-
memory/1364-463-0x0000000000000000-mapping.dmp
-
memory/1368-193-0x0000000000000000-mapping.dmp
-
memory/1380-109-0x0000000000000000-mapping.dmp
-
memory/1416-233-0x0000000000000000-mapping.dmp
-
memory/1416-10-0x0000000000000000-mapping.dmp
-
memory/1420-292-0x000000000041A1F8-mapping.dmp
-
memory/1420-9-0x0000000000000000-mapping.dmp
-
memory/1488-332-0x000000000041A1F8-mapping.dmp
-
memory/1488-214-0x0000000000000000-mapping.dmp
-
memory/1488-440-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/1488-444-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/1488-439-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/1488-437-0x000000000041A1F8-mapping.dmp
-
memory/1488-105-0x0000000000000000-mapping.dmp
-
memory/1488-443-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/1488-441-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/1496-186-0x0000000000000000-mapping.dmp
-
memory/1504-149-0x000000000041A1F8-mapping.dmp
-
memory/1508-564-0x0000000000000000-mapping.dmp
-
memory/1520-467-0x0000000000000000-mapping.dmp
-
memory/1520-145-0x0000000000000000-mapping.dmp
-
memory/1524-551-0x0000000000000000-mapping.dmp
-
memory/1536-508-0x0000000000000000-mapping.dmp
-
memory/1536-43-0x0000000000000000-mapping.dmp
-
memory/1540-75-0x0000000000000000-mapping.dmp
-
memory/1544-268-0x000000000041A1F8-mapping.dmp
-
memory/1544-119-0x0000000000000000-mapping.dmp
-
memory/1560-78-0x000000000041A1F8-mapping.dmp
-
memory/1560-140-0x0000000000000000-mapping.dmp
-
memory/1564-264-0x0000000000000000-mapping.dmp
-
memory/1572-412-0x000000000041A1F8-mapping.dmp
-
memory/1572-288-0x0000000000000000-mapping.dmp
-
memory/1576-380-0x0000000000000000-mapping.dmp
-
memory/1576-155-0x0000000000000000-mapping.dmp
-
memory/1580-42-0x0000000000000000-mapping.dmp
-
memory/1584-170-0x0000000000000000-mapping.dmp
-
memory/1584-320-0x0000000000000000-mapping.dmp
-
memory/1588-217-0x000000000041A1F8-mapping.dmp
-
memory/1588-184-0x000000000041A1F8-mapping.dmp
-
memory/1592-316-0x0000000000000000-mapping.dmp
-
memory/1592-21-0x0000000000000000-mapping.dmp
-
memory/1592-128-0x000000000041A1F8-mapping.dmp
-
memory/1600-285-0x0000000000000000-mapping.dmp
-
memory/1604-89-0x000000000041A1F8-mapping.dmp
-
memory/1604-555-0x000000000041A1F8-mapping.dmp
-
memory/1608-511-0x000000000041A1F8-mapping.dmp
-
memory/1608-384-0x000000000041A1F8-mapping.dmp
-
memory/1612-312-0x0000000000000000-mapping.dmp
-
memory/1628-53-0x0000000000000000-mapping.dmp
-
memory/1632-432-0x0000000000000000-mapping.dmp
-
memory/1632-317-0x0000000000000000-mapping.dmp
-
memory/1632-27-0x0000000000000000-mapping.dmp
-
memory/1644-435-0x0000000000000000-mapping.dmp
-
memory/1652-115-0x0000000000000000-mapping.dmp
-
memory/1652-225-0x0000000000000000-mapping.dmp
-
memory/1656-238-0x0000000000000000-mapping.dmp
-
memory/1656-65-0x0000000000000000-mapping.dmp
-
memory/1660-391-0x0000000000000000-mapping.dmp
-
memory/1664-484-0x000000000041A1F8-mapping.dmp
-
memory/1664-23-0x000000000041A1F8-mapping.dmp
-
memory/1672-382-0x0000000000000000-mapping.dmp
-
memory/1688-287-0x0000000000000000-mapping.dmp
-
memory/1688-527-0x0000000000000000-mapping.dmp
-
memory/1688-470-0x000000000041A1F8-mapping.dmp
-
memory/1692-541-0x0000000000000000-mapping.dmp
-
memory/1708-448-0x000000000041A1F8-mapping.dmp
-
memory/1752-371-0x000000000041A1F8-mapping.dmp
-
memory/1752-162-0x000000000041A1F8-mapping.dmp
-
memory/1768-8-0x0000000000000000-mapping.dmp
-
memory/1772-459-0x000000000041A1F8-mapping.dmp
-
memory/1776-446-0x0000000000000000-mapping.dmp
-
memory/1780-477-0x0000000000000000-mapping.dmp
-
memory/1780-583-0x0000000000000000-mapping.dmp
-
memory/1804-111-0x000000000041A1F8-mapping.dmp
-
memory/1824-451-0x0000000000000000-mapping.dmp
-
memory/1832-358-0x0000000000000000-mapping.dmp
-
memory/1836-169-0x0000000000000000-mapping.dmp
-
memory/1844-428-0x0000000000000000-mapping.dmp
-
memory/1852-67-0x000000000041A1F8-mapping.dmp
-
memory/1856-265-0x0000000000000000-mapping.dmp
-
memory/1864-330-0x0000000000000000-mapping.dmp
-
memory/1868-45-0x000000000041A1F8-mapping.dmp
-
memory/1896-81-0x0000000000000000-mapping.dmp
-
memory/1900-224-0x0000000000000000-mapping.dmp
-
memory/1908-381-0x0000000000000000-mapping.dmp
-
memory/1916-242-0x0000000000000000-mapping.dmp
-
memory/1920-259-0x0000000000000000-mapping.dmp
-
memory/1920-530-0x0000000000000000-mapping.dmp
-
memory/1932-215-0x0000000000000000-mapping.dmp
-
memory/1932-538-0x0000000000000000-mapping.dmp
-
memory/1936-506-0x0000000000000000-mapping.dmp
-
memory/1940-350-0x0000000000000000-mapping.dmp
-
memory/1940-98-0x0000000000000000-mapping.dmp
-
memory/1948-12-0x000000000041A1F8-mapping.dmp
-
memory/1948-54-0x0000000000000000-mapping.dmp
-
memory/1952-341-0x0000000000000000-mapping.dmp
-
memory/1952-182-0x0000000000000000-mapping.dmp
-
memory/1956-584-0x0000000000000000-mapping.dmp
-
memory/1964-171-0x0000000000000000-mapping.dmp
-
memory/1972-16-0x0000000000000000-mapping.dmp
-
memory/1980-97-0x0000000000000000-mapping.dmp
-
memory/2000-20-0x0000000000000000-mapping.dmp
-
memory/2012-157-0x0000000000000000-mapping.dmp
-
memory/2016-393-0x0000000000000000-mapping.dmp
-
memory/2020-200-0x0000000000000000-mapping.dmp
-
memory/2024-456-0x0000000000000000-mapping.dmp
-
memory/2028-481-0x0000000000000000-mapping.dmp
-
memory/2028-406-0x0000000000000000-mapping.dmp