Analysis
-
max time kernel
149s -
max time network
125s -
platform
windows10_x64 -
resource
win10-20220414-en -
submitted
28-05-2022 21:15
Static task
static1
General
-
Target
cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe
-
Size
19.2MB
-
MD5
79a96bb852ef4835ef9b25478f4a2ec3
-
SHA1
086f4a6046d888564f40143b81e378a28dfc8168
-
SHA256
cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c
-
SHA512
48453bcf4ece8511ed37c5a7ec49df05fff6be9a8c9a8f56aa973f5a800c6fa2859cb0c2d827ef1355f1c06a6bc684d0fb1c0d32532b667a099b5aca6583d80b
Malware Config
Signatures
-
Drops file in Drivers directory 2 IoCs
Processes:
cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exedescription ioc process File opened for modification C:\Windows\System32\drivers\etc\hosts cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe File created C:\Windows\System32\drivers\etc\hosts cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe -
Executes dropped EXE 6 IoCs
Processes:
uteuzfs.exescraxkr.exe~ympbsuq.exe~ympbsuq.exeibazlzq.exe~ympbsuq.exepid process 2116 uteuzfs.exe 2448 scraxkr.exe 640 ~ympbsuq.exe 1276 ~ympbsuq.exe 496 ibazlzq.exe 2656 ~ympbsuq.exe -
Modifies Installed Components in the registry 2 TTPs
-
Processes:
resource yara_rule behavioral1/memory/3676-140-0x0000000001050000-0x00000000036DF000-memory.dmp upx behavioral1/memory/3676-170-0x0000000001050000-0x00000000036DF000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\fmvprwb\uteuzfs.exe upx C:\Users\Admin\AppData\Local\Temp\scraxkr.exe upx C:\Users\Admin\AppData\Local\Temp\fmvprwb\uteuzfs.exe upx behavioral1/memory/2116-254-0x0000000000AC0000-0x000000000314F000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\scraxkr.exe upx behavioral1/memory/2448-295-0x0000000000990000-0x000000000301F000-memory.dmp upx behavioral1/memory/1872-338-0x0000000001050000-0x00000000036DF000-memory.dmp upx behavioral1/memory/2116-339-0x0000000000AC0000-0x000000000314F000-memory.dmp upx behavioral1/memory/2448-340-0x0000000000990000-0x000000000301F000-memory.dmp upx behavioral1/memory/1872-492-0x0000000001050000-0x00000000036DF000-memory.dmp upx behavioral1/memory/2116-493-0x0000000000AC0000-0x000000000314F000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\ibazlzq.exe upx behavioral1/memory/2448-512-0x0000000000990000-0x000000000301F000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\ibazlzq.exe upx behavioral1/memory/496-524-0x0000000001010000-0x000000000369F000-memory.dmp upx behavioral1/memory/496-563-0x0000000001010000-0x000000000369F000-memory.dmp upx behavioral1/memory/496-581-0x0000000001010000-0x000000000369F000-memory.dmp upx behavioral1/memory/3676-593-0x0000000001050000-0x00000000036DF000-memory.dmp upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3297182285-798020602-2032295036-1000\Control Panel\International\Geo\Nation cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe -
Drops startup file 1 IoCs
Processes:
cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 20 IoCs
Processes:
cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exeRundll32.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnceEx cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCEEX cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe Key created \REGISTRY\USER\S-1-5-21-3297182285-798020602-2032295036-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe Key deleted \REGISTRY\USER\S-1-5-21-3297182285-798020602-2032295036-1000\Software\Microsoft\Windows\CurrentVersion\Run cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe Key deleted \REGISTRY\USER\S-1-5-21-3297182285-798020602-2032295036-1000\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCEEX cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe Key created \REGISTRY\USER\S-1-5-21-3297182285-798020602-2032295036-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnceEx cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe Key created \REGISTRY\USER\S-1-5-21-3297182285-798020602-2032295036-1000\Software\Microsoft\Windows\CurrentVersion\Run cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\GrpConv = "grpconv -o" Rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3297182285-798020602-2032295036-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnceEx cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe Key deleted \REGISTRY\USER\S-1-5-21-3297182285-798020602-2032295036-1000\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCEEX cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe -
Drops desktop.ini file(s) 3 IoCs
Processes:
cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe -
Enumerates connected drives 3 TTPs 25 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exeexplorer.exedescription ioc process File opened (read-only) \??\g: cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe File opened (read-only) \??\j: cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe File opened (read-only) \??\m: cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe File opened (read-only) \??\p: cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe File opened (read-only) \??\t: cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe File opened (read-only) \??\u: cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe File opened (read-only) \??\b: cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe File opened (read-only) \??\e: cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe File opened (read-only) \??\y: cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe File opened (read-only) \??\k: cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe File opened (read-only) \??\a: cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe File opened (read-only) \??\h: cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe File opened (read-only) \??\q: cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe File opened (read-only) \??\r: cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe File opened (read-only) \??\v: cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe File opened (read-only) \??\x: cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe File opened (read-only) \??\z: cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe File opened (read-only) \??\D: explorer.exe File opened (read-only) \??\f: cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe File opened (read-only) \??\l: cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe File opened (read-only) \??\o: cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe File opened (read-only) \??\s: cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe File opened (read-only) \??\w: cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe File opened (read-only) \??\i: cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe File opened (read-only) \??\n: cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe -
Installs/modifies Browser Helper Object 2 TTPs
BHOs are DLL modules which act as plugins for Internet Explorer.
-
AutoIT Executable 10 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral1/memory/3676-170-0x0000000001050000-0x00000000036DF000-memory.dmp autoit_exe behavioral1/memory/1872-338-0x0000000001050000-0x00000000036DF000-memory.dmp autoit_exe behavioral1/memory/2116-339-0x0000000000AC0000-0x000000000314F000-memory.dmp autoit_exe behavioral1/memory/2448-340-0x0000000000990000-0x000000000301F000-memory.dmp autoit_exe behavioral1/memory/1872-492-0x0000000001050000-0x00000000036DF000-memory.dmp autoit_exe behavioral1/memory/2116-493-0x0000000000AC0000-0x000000000314F000-memory.dmp autoit_exe behavioral1/memory/2448-512-0x0000000000990000-0x000000000301F000-memory.dmp autoit_exe behavioral1/memory/496-563-0x0000000001010000-0x000000000369F000-memory.dmp autoit_exe behavioral1/memory/496-581-0x0000000001010000-0x000000000369F000-memory.dmp autoit_exe behavioral1/memory/3676-593-0x0000000001050000-0x00000000036DF000-memory.dmp autoit_exe -
Drops file in Program Files directory 2 IoCs
Processes:
cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exedescription ioc process File created C:\Program Files (x86)\360\360Safe\deepscan\speedmem2.hg cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe File opened for modification C:\Program Files (x86)\360\360Safe\deepscan\speedmem2.hg cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe -
Drops file in Windows directory 3 IoCs
Processes:
explorer.exeSearchUI.exedescription ioc process File created C:\Windows\rescache\_merged\2717123927\3950266016.pri explorer.exe File created C:\Windows\rescache\_merged\1601268389\3877292338.pri SearchUI.exe File created C:\Windows\rescache\_merged\4032412167\2900507189.pri explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks SCSI registry key(s) 3 TTPs 12 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
explorer.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\0064 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\ConfigFlags explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Capabilities explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\HardwareID explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\HardwareID explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\ConfigFlags explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Capabilities explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0003 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\0064 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0003 explorer.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
runonce.exedescription ioc process Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 runonce.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz runonce.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
Processes:
SearchUI.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS SearchUI.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU SearchUI.exe -
Processes:
~ympbsuq.execea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe~ympbsuq.exe~ympbsuq.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\MAIN ~ympbsuq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\Default_Page_URL = "http://web.503118.com/?30528" cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe Set value (str) \REGISTRY\USER\S-1-5-21-3297182285-798020602-2032295036-1000\Software\Microsoft\Internet Explorer\Main\First Home Page = "http://web.503118.com/?30528" cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\Main cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Main\Default_Page_URL = "http://web.503118.com/?30528" cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\MAIN ~ympbsuq.exe Key created \REGISTRY\USER\S-1-5-21-3297182285-798020602-2032295036-1000\Software\Microsoft\Internet Explorer\Main cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\MAIN ~ympbsuq.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\MAIN cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\First Home Page = "http://web.503118.com/?30528" cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe Key created \REGISTRY\USER\S-1-5-21-3297182285-798020602-2032295036-1000\SOFTWARE\Microsoft\Internet Explorer\Main cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe Set value (str) \REGISTRY\USER\S-1-5-21-3297182285-798020602-2032295036-1000\Software\Microsoft\Internet Explorer\Main\Default_Page_URL = "http://web.503118.com/?30528" cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Main\First Home Page = "http://web.503118.com/?30528" cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe -
Modifies Internet Explorer start page 1 TTPs 3 IoCs
Processes:
cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\Start Page = "http://web.503118.com/?30528" cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe Set value (str) \REGISTRY\USER\S-1-5-21-3297182285-798020602-2032295036-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://web.503118.com/?30528" cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "http://web.503118.com/?30528" cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe -
Modifies registry class 54 IoCs
Processes:
explorer.exeSearchUI.execea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3297182285-798020602-2032295036-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\TrayNotify explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3297182285-798020602-2032295036-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-3297182285-798020602-2032295036-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DOMStorage\windows.cortana SearchUI.exe Set value (int) \REGISTRY\USER\S-1-5-21-3297182285-798020602-2032295036-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DOMStorage\windows.cortana\Total = "23" SearchUI.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B5EAD1DB-7C18-4954-8820-01733BC08C82}\shell\NoAddOns\Command cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B5EAD1DB-7C18-4954-8820-01733BC08C82}\shell\Set cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B5EAD1DB-7C18-4954-8820-01733BC08C82}\shell\Set\Command cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe Key created \REGISTRY\USER\S-1-5-21-3297182285-798020602-2032295036-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DOMStorage\microsoft.windows.cortana SearchUI.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B5EAD1DB-7C18-4954-8820-01733BC08C82} cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe Set value (data) \REGISTRY\USER\S-1-5-21-3297182285-798020602-2032295036-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3297182285-798020602-2032295036-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Settings\Cache\History\CachePrefix = "Visited:" SearchUI.exe Key created \REGISTRY\USER\S-1-5-21-3297182285-798020602-2032295036-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\EdpDomStorage SearchUI.exe Key created \REGISTRY\USER\S-1-5-21-3297182285-798020602-2032295036-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\microsoft.windows.cortana SearchUI.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B5EAD1DB-7C18-4954-8820-01733BC08C82}\shell\NoAddOns\ = "在没有加载项的情况下启动" cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B5EAD1DB-7C18-4954-8820-01733BC08C82}\shell\Open\ = "打开主页(&H)" cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\shell\OpenHomePage cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B5EAD1DB-7C18-4954-8820-01733BC08C82}\shell\NoAddOns\Command\ = "\"C:\\Program Files (x86)\\Internet Explorer\\iexplore.exe\" -extoff" cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe Key created \REGISTRY\USER\S-1-5-21-3297182285-798020602-2032295036-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DomStorageState SearchUI.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B5EAD1DB-7C18-4954-8820-01733BC08C82}\DefaultIcon cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe Set value (int) \REGISTRY\USER\S-1-5-21-3297182285-798020602-2032295036-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DOMStorage\microsoft.windows.cortana\ = "23" SearchUI.exe Key created \REGISTRY\USER\S-1-5-21-3297182285-798020602-2032295036-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total SearchUI.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B5EAD1DB-7C18-4954-8820-01733BC08C82}\shell\Open cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe Key created \REGISTRY\USER\S-1-5-21-3297182285-798020602-2032295036-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3297182285-798020602-2032295036-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance explorer.exe Key created \REGISTRY\USER\S-1-5-21-3297182285-798020602-2032295036-1000_Classes\Local Settings cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe Set value (int) \REGISTRY\USER\S-1-5-21-3297182285-798020602-2032295036-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "152" SearchUI.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B5EAD1DB-7C18-4954-8820-01733BC08C82}\DefaultIcon\ = "C:\\Windows\\SysWOW64\\ieframe.dll,-190" cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B5EAD1DB-7C18-4954-8820-01733BC08C82}\ = "Internet Explorer" cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B5EAD1DB-7C18-4954-8820-01733BC08C82}\shell\NoAddOns cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B5EAD1DB-7C18-4954-8820-01733BC08C82}\shell\Set\Command\ = "C:\\Windows\\SysWOW64\\rundll32.exe C:\\Windows\\SysWOW64\\shell32.dll,Control_RunDLL C:\\Windows\\SysWOW64\\inetcpl.cpl" cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe Set value (int) \REGISTRY\USER\S-1-5-21-3297182285-798020602-2032295036-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DOMStorage\microsoft.windows.cortana\ = "56" SearchUI.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D} cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe Key created \REGISTRY\USER\S-1-5-21-3297182285-798020602-2032295036-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance explorer.exe Key created \REGISTRY\USER\S-1-5-21-3297182285-798020602-2032295036-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\Total SearchUI.exe Set value (data) \REGISTRY\USER\S-1-5-21-3297182285-798020602-2032295036-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\TrayNotify\IconStreams = 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 explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B5EAD1DB-7C18-4954-8820-01733BC08C82}\shell\Set\ = "属性(&R)" cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe Key created \REGISTRY\USER\S-1-5-21-3297182285-798020602-2032295036-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DOMStorage SearchUI.exe Set value (int) \REGISTRY\USER\S-1-5-21-3297182285-798020602-2032295036-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "185" SearchUI.exe Set value (int) \REGISTRY\USER\S-1-5-21-3297182285-798020602-2032295036-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\TrayNotify\UserStartTime = "132944508945364454" explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B5EAD1DB-7C18-4954-8820-01733BC08C82}\shell\Open\Command cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe Key created \REGISTRY\USER\S-1-5-21-3297182285-798020602-2032295036-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\windows.cortana SearchUI.exe Set value (int) \REGISTRY\USER\S-1-5-21-3297182285-798020602-2032295036-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DOMStorage\windows.cortana\Total = "56" SearchUI.exe Set value (str) \REGISTRY\USER\S-1-5-21-3297182285-798020602-2032295036-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Settings\Cache\Content\CachePrefix SearchUI.exe Set value (str) \REGISTRY\USER\S-1-5-21-3297182285-798020602-2032295036-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" SearchUI.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\shell cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe Key created \REGISTRY\USER\S-1-5-21-3297182285-798020602-2032295036-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B5EAD1DB-7C18-4954-8820-01733BC08C82}\shell cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B5EAD1DB-7C18-4954-8820-01733BC08C82}\shell\Open\Command\ = "\"C:\\Program Files (x86)\\Internet Explorer\\iexplore.exe\"" cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\shell\OpenHomePage\Command cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe -
Runs ping.exe 1 TTPs 3 IoCs
Processes:
PING.EXEPING.EXEPING.EXEpid process 3800 PING.EXE 3236 PING.EXE 2448 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exepid process 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exepid process 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe -
Suspicious use of AdjustPrivilegeToken 62 IoCs
Processes:
cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe~ympbsuq.exe~ympbsuq.execea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exeuteuzfs.exescraxkr.exe~ympbsuq.exeibazlzq.exeexplorer.exedescription pid process Token: SeDebugPrivilege 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe Token: SeBackupPrivilege 640 ~ympbsuq.exe Token: SeRestorePrivilege 640 ~ympbsuq.exe Token: SeTakeOwnershipPrivilege 640 ~ympbsuq.exe Token: SeBackupPrivilege 1276 ~ympbsuq.exe Token: SeRestorePrivilege 1276 ~ympbsuq.exe Token: SeTakeOwnershipPrivilege 1276 ~ympbsuq.exe Token: SeDebugPrivilege 1872 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe Token: SeDebugPrivilege 2116 uteuzfs.exe Token: SeDebugPrivilege 2448 scraxkr.exe Token: SeRestorePrivilege 2448 scraxkr.exe Token: SeTakeOwnershipPrivilege 2448 scraxkr.exe Token: SeDebugPrivilege 2448 scraxkr.exe Token: SeSecurityPrivilege 2448 scraxkr.exe Token: SeBackupPrivilege 2656 ~ympbsuq.exe Token: SeRestorePrivilege 2656 ~ympbsuq.exe Token: SeTakeOwnershipPrivilege 2656 ~ympbsuq.exe Token: SeDebugPrivilege 496 ibazlzq.exe Token: SeRestorePrivilege 496 ibazlzq.exe Token: SeTakeOwnershipPrivilege 496 ibazlzq.exe Token: SeDebugPrivilege 496 ibazlzq.exe Token: SeSecurityPrivilege 496 ibazlzq.exe Token: SeShutdownPrivilege 3784 explorer.exe Token: SeCreatePagefilePrivilege 3784 explorer.exe Token: SeShutdownPrivilege 3784 explorer.exe Token: SeCreatePagefilePrivilege 3784 explorer.exe Token: SeShutdownPrivilege 3784 explorer.exe Token: SeCreatePagefilePrivilege 3784 explorer.exe Token: SeShutdownPrivilege 3784 explorer.exe Token: SeCreatePagefilePrivilege 3784 explorer.exe Token: SeShutdownPrivilege 3784 explorer.exe Token: SeCreatePagefilePrivilege 3784 explorer.exe Token: SeShutdownPrivilege 3784 explorer.exe Token: SeCreatePagefilePrivilege 3784 explorer.exe Token: SeShutdownPrivilege 3784 explorer.exe Token: SeCreatePagefilePrivilege 3784 explorer.exe Token: SeShutdownPrivilege 3784 explorer.exe Token: SeCreatePagefilePrivilege 3784 explorer.exe Token: SeShutdownPrivilege 3784 explorer.exe Token: SeCreatePagefilePrivilege 3784 explorer.exe Token: SeShutdownPrivilege 3784 explorer.exe Token: SeCreatePagefilePrivilege 3784 explorer.exe Token: SeShutdownPrivilege 3784 explorer.exe Token: SeCreatePagefilePrivilege 3784 explorer.exe Token: SeShutdownPrivilege 3784 explorer.exe Token: SeCreatePagefilePrivilege 3784 explorer.exe Token: SeShutdownPrivilege 3784 explorer.exe Token: SeCreatePagefilePrivilege 3784 explorer.exe Token: SeShutdownPrivilege 3784 explorer.exe Token: SeCreatePagefilePrivilege 3784 explorer.exe Token: SeShutdownPrivilege 3784 explorer.exe Token: SeCreatePagefilePrivilege 3784 explorer.exe Token: SeShutdownPrivilege 3784 explorer.exe Token: SeCreatePagefilePrivilege 3784 explorer.exe Token: SeShutdownPrivilege 3784 explorer.exe Token: SeCreatePagefilePrivilege 3784 explorer.exe Token: SeShutdownPrivilege 3784 explorer.exe Token: SeCreatePagefilePrivilege 3784 explorer.exe Token: SeShutdownPrivilege 3784 explorer.exe Token: SeCreatePagefilePrivilege 3784 explorer.exe Token: SeShutdownPrivilege 3784 explorer.exe Token: SeCreatePagefilePrivilege 3784 explorer.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exepid process 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe -
Suspicious use of SendNotifyMessage 64 IoCs
Processes:
cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exepid process 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
SearchUI.exepid process 1396 SearchUI.exe -
Suspicious use of WriteProcessMemory 36 IoCs
Processes:
cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exeuteuzfs.execmd.exeRundll32.exerunonce.execmd.execmd.exedescription pid process target process PID 3676 wrote to memory of 1872 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe PID 3676 wrote to memory of 1872 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe PID 3676 wrote to memory of 1872 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe PID 3676 wrote to memory of 2116 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe uteuzfs.exe PID 3676 wrote to memory of 2116 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe uteuzfs.exe PID 3676 wrote to memory of 2116 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe uteuzfs.exe PID 3676 wrote to memory of 2448 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe scraxkr.exe PID 3676 wrote to memory of 2448 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe scraxkr.exe PID 3676 wrote to memory of 2448 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe scraxkr.exe PID 3676 wrote to memory of 640 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe ~ympbsuq.exe PID 3676 wrote to memory of 640 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe ~ympbsuq.exe PID 3676 wrote to memory of 1276 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe ~ympbsuq.exe PID 3676 wrote to memory of 1276 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe ~ympbsuq.exe PID 2116 wrote to memory of 68 2116 uteuzfs.exe cmd.exe PID 2116 wrote to memory of 68 2116 uteuzfs.exe cmd.exe PID 68 wrote to memory of 3800 68 cmd.exe PING.EXE PID 68 wrote to memory of 3800 68 cmd.exe PING.EXE PID 3676 wrote to memory of 496 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe ibazlzq.exe PID 3676 wrote to memory of 496 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe ibazlzq.exe PID 3676 wrote to memory of 496 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe ibazlzq.exe PID 3676 wrote to memory of 2656 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe ~ympbsuq.exe PID 3676 wrote to memory of 2656 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe ~ympbsuq.exe PID 3676 wrote to memory of 2340 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe Rundll32.exe PID 3676 wrote to memory of 2340 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe Rundll32.exe PID 2340 wrote to memory of 2508 2340 Rundll32.exe runonce.exe PID 2340 wrote to memory of 2508 2340 Rundll32.exe runonce.exe PID 2508 wrote to memory of 4044 2508 runonce.exe grpconv.exe PID 2508 wrote to memory of 4044 2508 runonce.exe grpconv.exe PID 3676 wrote to memory of 724 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe cmd.exe PID 3676 wrote to memory of 724 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe cmd.exe PID 3676 wrote to memory of 1176 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe cmd.exe PID 3676 wrote to memory of 1176 3676 cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe cmd.exe PID 1176 wrote to memory of 3236 1176 cmd.exe PING.EXE PID 1176 wrote to memory of 3236 1176 cmd.exe PING.EXE PID 724 wrote to memory of 2448 724 cmd.exe PING.EXE PID 724 wrote to memory of 2448 724 cmd.exe PING.EXE -
System policy modification 1 TTPs 3 IoCs
Processes:
cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe"C:\Users\Admin\AppData\Local\Temp\cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe"1⤵
- Drops file in Drivers directory
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- Drops desktop.ini file(s)
- Enumerates connected drives
- Drops file in Program Files directory
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3676 -
C:\Users\Admin\AppData\Local\Temp\cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exeC:\Users\Admin\AppData\Local\Temp\cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c.exe /nstart2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1872 -
C:\Users\Admin\AppData\Local\Temp\fmvprwb\uteuzfs.exeC:\Users\Admin\AppData\Local\Temp\fmvprwb\uteuzfs.exe /nys2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\QWIQHse.bat3⤵
- Suspicious use of WriteProcessMemory
PID:68 -
C:\Windows\system32\PING.EXEping -n 1 127.0.0.14⤵
- Runs ping.exe
PID:3800 -
C:\Users\Admin\AppData\Local\Temp\scraxkr.exeC:\Users\Admin\AppData\Local\Temp\scraxkr.exe /HomeRegAccess102⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2448 -
C:\Users\Admin\AppData\Local\Temp\~ympbsuq.exeC:\Users\Admin\AppData\Local\Temp\~ympbsuq.exe -on "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\MAIN" -ot reg -actn setowner -ownr "n:Administrators"2⤵
- Executes dropped EXE
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
PID:640 -
C:\Users\Admin\AppData\Local\Temp\~ympbsuq.exeC:\Users\Admin\AppData\Local\Temp\~ympbsuq.exe -on "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\MAIN" -ot reg -actn ace -ace "n:Everyone;p:full;i:np;m:set" -rec no2⤵
- Executes dropped EXE
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
PID:1276 -
C:\Users\Admin\AppData\Local\Temp\ibazlzq.exeC:\Users\Admin\AppData\Local\Temp\ibazlzq.exe /HomeRegAccess102⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:496 -
C:\Users\Admin\AppData\Local\Temp\~ympbsuq.exeC:\Users\Admin\AppData\Local\Temp\~ympbsuq.exe -on "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\MAIN" -ot reg -actn ace -ace "n:Everyone;p:full;i:np;m:set" -rec no2⤵
- Executes dropped EXE
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
PID:2656 -
C:\Windows\SYSTEM32\Rundll32.exeRundll32.exe setupapi,InstallHinfSection DefaultInstall 132 C:\Users\Admin\AppData\Local\Temp\~vfuneys.inf2⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Windows\system32\runonce.exe"C:\Windows\system32\runonce.exe" -r3⤵
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Windows\System32\grpconv.exe"C:\Windows\System32\grpconv.exe" -o4⤵PID:4044
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\F612gaf.bat2⤵
- Suspicious use of WriteProcessMemory
PID:724 -
C:\Windows\system32\PING.EXEping -n 1 127.0.0.13⤵
- Runs ping.exe
PID:2448 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\KP2MmY5.bat2⤵
- Suspicious use of WriteProcessMemory
PID:1176 -
C:\Windows\system32\PING.EXEping -n 1 127.0.0.13⤵
- Runs ping.exe
PID:3236
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Enumerates connected drives
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:3784
-
C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe"C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe" -ServerName:CortanaUI.AppXa50dqqa5gqv4a428c9y1jjw7m3btvepj.mca1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1396
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\F612gaf.batFilesize
465B
MD512ea99f9ad51fd3a6d0f551413f2ff21
SHA13ed6f6e68d4b448f151099c4de097eb13a4e657b
SHA2563697009cc478fd6507f17a32ea98351957a91f3f41c5725887aca123db9127c9
SHA512a4c61d3d25718a324e9ef83267e34587a755bacc710086a941b4d06e02ce14369fcd2d134075c8e4214cba50f4c466c48456850bda7e56e3656797e72f4c40b2
-
C:\Users\Admin\AppData\Local\Temp\KP2MmY5.batFilesize
689B
MD5dbf88c8beba651ec4ce628160f17d24f
SHA13a037228f963abe354cc967548b997dea7d2b0fb
SHA256b6478928d3b1f3fe8366634caaa68476795f777b3d8f344c59b605c9f21ef905
SHA512aad7da71a7f337f3c319da83c8204814945b98728af191c39b327dc9e1bd1a5db0d890ca516ba7fb48fe971b7352f46dc59a9ca7aa46fbb125d1d63935cd0825
-
C:\Users\Admin\AppData\Local\Temp\QWIQHse.batFilesize
493B
MD53567c3c565229decd42b64d64dc20e26
SHA10b4ae2a177c90c7c959f9514481715d239465566
SHA256ffe7e8af21118fed0d8f4b44a20663375802b408c5dddc5b1ef61a667e9a81ff
SHA5128527a99b3f26948eaf34bf38c3cd266725424d12b6e28ef010a57be0b41680294cda71ba874fd198e9eab3054bfabf152280e5fa2ef6bf5bcc902ff803ecd311
-
C:\Users\Admin\AppData\Local\Temp\fmvprwb\uteuzfs.exeFilesize
19.2MB
MD579a96bb852ef4835ef9b25478f4a2ec3
SHA1086f4a6046d888564f40143b81e378a28dfc8168
SHA256cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c
SHA51248453bcf4ece8511ed37c5a7ec49df05fff6be9a8c9a8f56aa973f5a800c6fa2859cb0c2d827ef1355f1c06a6bc684d0fb1c0d32532b667a099b5aca6583d80b
-
C:\Users\Admin\AppData\Local\Temp\fmvprwb\uteuzfs.exeFilesize
19.2MB
MD579a96bb852ef4835ef9b25478f4a2ec3
SHA1086f4a6046d888564f40143b81e378a28dfc8168
SHA256cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c
SHA51248453bcf4ece8511ed37c5a7ec49df05fff6be9a8c9a8f56aa973f5a800c6fa2859cb0c2d827ef1355f1c06a6bc684d0fb1c0d32532b667a099b5aca6583d80b
-
C:\Users\Admin\AppData\Local\Temp\ibazlzq.exeFilesize
19.2MB
MD579a96bb852ef4835ef9b25478f4a2ec3
SHA1086f4a6046d888564f40143b81e378a28dfc8168
SHA256cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c
SHA51248453bcf4ece8511ed37c5a7ec49df05fff6be9a8c9a8f56aa973f5a800c6fa2859cb0c2d827ef1355f1c06a6bc684d0fb1c0d32532b667a099b5aca6583d80b
-
C:\Users\Admin\AppData\Local\Temp\ibazlzq.exeFilesize
19.2MB
MD579a96bb852ef4835ef9b25478f4a2ec3
SHA1086f4a6046d888564f40143b81e378a28dfc8168
SHA256cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c
SHA51248453bcf4ece8511ed37c5a7ec49df05fff6be9a8c9a8f56aa973f5a800c6fa2859cb0c2d827ef1355f1c06a6bc684d0fb1c0d32532b667a099b5aca6583d80b
-
C:\Users\Admin\AppData\Local\Temp\scraxkr.exeFilesize
19.2MB
MD579a96bb852ef4835ef9b25478f4a2ec3
SHA1086f4a6046d888564f40143b81e378a28dfc8168
SHA256cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c
SHA51248453bcf4ece8511ed37c5a7ec49df05fff6be9a8c9a8f56aa973f5a800c6fa2859cb0c2d827ef1355f1c06a6bc684d0fb1c0d32532b667a099b5aca6583d80b
-
C:\Users\Admin\AppData\Local\Temp\scraxkr.exeFilesize
19.2MB
MD579a96bb852ef4835ef9b25478f4a2ec3
SHA1086f4a6046d888564f40143b81e378a28dfc8168
SHA256cea8570dc1cf4b9fdbe95dbd54592ad6165846c37e9fe707d2261b93bf1d8b4c
SHA51248453bcf4ece8511ed37c5a7ec49df05fff6be9a8c9a8f56aa973f5a800c6fa2859cb0c2d827ef1355f1c06a6bc684d0fb1c0d32532b667a099b5aca6583d80b
-
C:\Users\Admin\AppData\Local\Temp\~vfuneys.infFilesize
32B
MD58f5f4837dd4a1680d79bbdca9cc1e08f
SHA1688b5d5ef993733b97b303ed4c8409a14b230de5
SHA2562bce6b9395cc74d16b9c94fd90debd9d524ffb53c6f6ae3a49b6e139671417b2
SHA512bd75b564fe3c93dffdc65fe58463378f54268308ca5eaba5fc7f80458016f331a6596bfdaf63845c1d5c6c60df2a0ec2aff94d2aae7797da4f5f975f0363bd66
-
C:\Users\Admin\AppData\Local\Temp\~ympbsuq.exeFilesize
546KB
MD53e350eb5df15c06dec400a39dd1c6f29
SHA1f1434cfef2c05fda919922b721ec1a17adb3194e
SHA256427ff43693cb3ca2812c4754f607f107a6b2d3f5a8b313addee57d89982df419
SHA512b6b6cdfe2b08aa49254e48302385a3a2a8385e2228bdcffd3032757acf1a1d4abff1270f5488083cfa4480439ff161a9d0ea5f193cabc1eb1e7b1255ce262ab6
-
C:\Users\Admin\AppData\Local\Temp\~ympbsuq.exeFilesize
546KB
MD53e350eb5df15c06dec400a39dd1c6f29
SHA1f1434cfef2c05fda919922b721ec1a17adb3194e
SHA256427ff43693cb3ca2812c4754f607f107a6b2d3f5a8b313addee57d89982df419
SHA512b6b6cdfe2b08aa49254e48302385a3a2a8385e2228bdcffd3032757acf1a1d4abff1270f5488083cfa4480439ff161a9d0ea5f193cabc1eb1e7b1255ce262ab6
-
C:\Users\Admin\AppData\Local\Temp\~ympbsuq.exeFilesize
546KB
MD53e350eb5df15c06dec400a39dd1c6f29
SHA1f1434cfef2c05fda919922b721ec1a17adb3194e
SHA256427ff43693cb3ca2812c4754f607f107a6b2d3f5a8b313addee57d89982df419
SHA512b6b6cdfe2b08aa49254e48302385a3a2a8385e2228bdcffd3032757acf1a1d4abff1270f5488083cfa4480439ff161a9d0ea5f193cabc1eb1e7b1255ce262ab6
-
C:\Users\Admin\AppData\Local\Temp\~ympbsuq.exeFilesize
546KB
MD53e350eb5df15c06dec400a39dd1c6f29
SHA1f1434cfef2c05fda919922b721ec1a17adb3194e
SHA256427ff43693cb3ca2812c4754f607f107a6b2d3f5a8b313addee57d89982df419
SHA512b6b6cdfe2b08aa49254e48302385a3a2a8385e2228bdcffd3032757acf1a1d4abff1270f5488083cfa4480439ff161a9d0ea5f193cabc1eb1e7b1255ce262ab6
-
memory/68-476-0x0000000000000000-mapping.dmp
-
memory/496-503-0x0000000000000000-mapping.dmp
-
memory/496-524-0x0000000001010000-0x000000000369F000-memory.dmpFilesize
38.6MB
-
memory/496-563-0x0000000001010000-0x000000000369F000-memory.dmpFilesize
38.6MB
-
memory/496-581-0x0000000001010000-0x000000000369F000-memory.dmpFilesize
38.6MB
-
memory/640-334-0x0000000000000000-mapping.dmp
-
memory/724-579-0x0000000000000000-mapping.dmp
-
memory/1176-580-0x0000000000000000-mapping.dmp
-
memory/1276-341-0x0000000000000000-mapping.dmp
-
memory/1872-172-0x0000000077000000-0x000000007718E000-memory.dmpFilesize
1.6MB
-
memory/1872-171-0x0000000000000000-mapping.dmp
-
memory/1872-492-0x0000000001050000-0x00000000036DF000-memory.dmpFilesize
38.6MB
-
memory/1872-338-0x0000000001050000-0x00000000036DF000-memory.dmpFilesize
38.6MB
-
memory/1872-183-0x0000000077000000-0x000000007718E000-memory.dmpFilesize
1.6MB
-
memory/1872-182-0x0000000077000000-0x000000007718E000-memory.dmpFilesize
1.6MB
-
memory/1872-181-0x0000000077000000-0x000000007718E000-memory.dmpFilesize
1.6MB
-
memory/1872-180-0x0000000077000000-0x000000007718E000-memory.dmpFilesize
1.6MB
-
memory/1872-179-0x0000000077000000-0x000000007718E000-memory.dmpFilesize
1.6MB
-
memory/1872-178-0x0000000077000000-0x000000007718E000-memory.dmpFilesize
1.6MB
-
memory/1872-177-0x0000000077000000-0x000000007718E000-memory.dmpFilesize
1.6MB
-
memory/1872-176-0x0000000077000000-0x000000007718E000-memory.dmpFilesize
1.6MB
-
memory/1872-174-0x0000000077000000-0x000000007718E000-memory.dmpFilesize
1.6MB
-
memory/2116-493-0x0000000000AC0000-0x000000000314F000-memory.dmpFilesize
38.6MB
-
memory/2116-231-0x0000000000000000-mapping.dmp
-
memory/2116-339-0x0000000000AC0000-0x000000000314F000-memory.dmpFilesize
38.6MB
-
memory/2116-254-0x0000000000AC0000-0x000000000314F000-memory.dmpFilesize
38.6MB
-
memory/2340-559-0x0000000000000000-mapping.dmp
-
memory/2448-592-0x0000000000000000-mapping.dmp
-
memory/2448-512-0x0000000000990000-0x000000000301F000-memory.dmpFilesize
38.6MB
-
memory/2448-340-0x0000000000990000-0x000000000301F000-memory.dmpFilesize
38.6MB
-
memory/2448-295-0x0000000000990000-0x000000000301F000-memory.dmpFilesize
38.6MB
-
memory/2448-235-0x0000000000000000-mapping.dmp
-
memory/2508-561-0x0000000000000000-mapping.dmp
-
memory/2656-535-0x0000000000000000-mapping.dmp
-
memory/3236-591-0x0000000000000000-mapping.dmp
-
memory/3676-141-0x0000000077000000-0x000000007718E000-memory.dmpFilesize
1.6MB
-
memory/3676-146-0x0000000077000000-0x000000007718E000-memory.dmpFilesize
1.6MB
-
memory/3676-168-0x0000000077000000-0x000000007718E000-memory.dmpFilesize
1.6MB
-
memory/3676-169-0x0000000077000000-0x000000007718E000-memory.dmpFilesize
1.6MB
-
memory/3676-170-0x0000000001050000-0x00000000036DF000-memory.dmpFilesize
38.6MB
-
memory/3676-157-0x0000000077000000-0x000000007718E000-memory.dmpFilesize
1.6MB
-
memory/3676-117-0x0000000077000000-0x000000007718E000-memory.dmpFilesize
1.6MB
-
memory/3676-173-0x0000000077000000-0x000000007718E000-memory.dmpFilesize
1.6MB
-
memory/3676-159-0x0000000077000000-0x000000007718E000-memory.dmpFilesize
1.6MB
-
memory/3676-163-0x0000000077000000-0x000000007718E000-memory.dmpFilesize
1.6MB
-
memory/3676-162-0x0000000077000000-0x000000007718E000-memory.dmpFilesize
1.6MB
-
memory/3676-161-0x0000000077000000-0x000000007718E000-memory.dmpFilesize
1.6MB
-
memory/3676-175-0x0000000077000000-0x000000007718E000-memory.dmpFilesize
1.6MB
-
memory/3676-160-0x0000000077000000-0x000000007718E000-memory.dmpFilesize
1.6MB
-
memory/3676-158-0x0000000077000000-0x000000007718E000-memory.dmpFilesize
1.6MB
-
memory/3676-156-0x0000000077000000-0x000000007718E000-memory.dmpFilesize
1.6MB
-
memory/3676-152-0x0000000077000000-0x000000007718E000-memory.dmpFilesize
1.6MB
-
memory/3676-148-0x0000000077000000-0x000000007718E000-memory.dmpFilesize
1.6MB
-
memory/3676-142-0x0000000077000000-0x000000007718E000-memory.dmpFilesize
1.6MB
-
memory/3676-166-0x0000000077000000-0x000000007718E000-memory.dmpFilesize
1.6MB
-
memory/3676-165-0x0000000077000000-0x000000007718E000-memory.dmpFilesize
1.6MB
-
memory/3676-155-0x0000000077000000-0x000000007718E000-memory.dmpFilesize
1.6MB
-
memory/3676-139-0x0000000077000000-0x000000007718E000-memory.dmpFilesize
1.6MB
-
memory/3676-164-0x0000000077000000-0x000000007718E000-memory.dmpFilesize
1.6MB
-
memory/3676-138-0x0000000077000000-0x000000007718E000-memory.dmpFilesize
1.6MB
-
memory/3676-131-0x0000000077000000-0x000000007718E000-memory.dmpFilesize
1.6MB
-
memory/3676-137-0x0000000077000000-0x000000007718E000-memory.dmpFilesize
1.6MB
-
memory/3676-136-0x0000000077000000-0x000000007718E000-memory.dmpFilesize
1.6MB
-
memory/3676-135-0x0000000077000000-0x000000007718E000-memory.dmpFilesize
1.6MB
-
memory/3676-167-0x0000000077000000-0x000000007718E000-memory.dmpFilesize
1.6MB
-
memory/3676-140-0x0000000001050000-0x00000000036DF000-memory.dmpFilesize
38.6MB
-
memory/3676-145-0x0000000077000000-0x000000007718E000-memory.dmpFilesize
1.6MB
-
memory/3676-134-0x0000000077000000-0x000000007718E000-memory.dmpFilesize
1.6MB
-
memory/3676-132-0x0000000077000000-0x000000007718E000-memory.dmpFilesize
1.6MB
-
memory/3676-133-0x0000000077000000-0x000000007718E000-memory.dmpFilesize
1.6MB
-
memory/3676-130-0x0000000077000000-0x000000007718E000-memory.dmpFilesize
1.6MB
-
memory/3676-593-0x0000000001050000-0x00000000036DF000-memory.dmpFilesize
38.6MB
-
memory/3676-144-0x0000000077000000-0x000000007718E000-memory.dmpFilesize
1.6MB
-
memory/3676-143-0x0000000077000000-0x000000007718E000-memory.dmpFilesize
1.6MB
-
memory/3676-129-0x0000000077000000-0x000000007718E000-memory.dmpFilesize
1.6MB
-
memory/3676-128-0x0000000077000000-0x000000007718E000-memory.dmpFilesize
1.6MB
-
memory/3676-147-0x0000000077000000-0x000000007718E000-memory.dmpFilesize
1.6MB
-
memory/3676-126-0x0000000077000000-0x000000007718E000-memory.dmpFilesize
1.6MB
-
memory/3676-127-0x0000000077000000-0x000000007718E000-memory.dmpFilesize
1.6MB
-
memory/3676-125-0x0000000077000000-0x000000007718E000-memory.dmpFilesize
1.6MB
-
memory/3676-149-0x0000000077000000-0x000000007718E000-memory.dmpFilesize
1.6MB
-
memory/3676-150-0x0000000077000000-0x000000007718E000-memory.dmpFilesize
1.6MB
-
memory/3676-124-0x0000000077000000-0x000000007718E000-memory.dmpFilesize
1.6MB
-
memory/3676-151-0x0000000077000000-0x000000007718E000-memory.dmpFilesize
1.6MB
-
memory/3676-154-0x0000000077000000-0x000000007718E000-memory.dmpFilesize
1.6MB
-
memory/3676-122-0x0000000077000000-0x000000007718E000-memory.dmpFilesize
1.6MB
-
memory/3676-123-0x0000000077000000-0x000000007718E000-memory.dmpFilesize
1.6MB
-
memory/3676-121-0x0000000077000000-0x000000007718E000-memory.dmpFilesize
1.6MB
-
memory/3676-120-0x0000000077000000-0x000000007718E000-memory.dmpFilesize
1.6MB
-
memory/3676-153-0x0000000077000000-0x000000007718E000-memory.dmpFilesize
1.6MB
-
memory/3676-119-0x0000000077000000-0x000000007718E000-memory.dmpFilesize
1.6MB
-
memory/3676-118-0x0000000077000000-0x000000007718E000-memory.dmpFilesize
1.6MB
-
memory/3800-491-0x0000000000000000-mapping.dmp
-
memory/4044-562-0x0000000000000000-mapping.dmp