Analysis
-
max time kernel
150s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
26-09-2022 08:50
Static task
static1
Behavioral task
behavioral1
Sample
3fbd38a88a5302483a14d8fa2510faf9.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3fbd38a88a5302483a14d8fa2510faf9.exe
Resource
win10v2004-20220812-en
General
-
Target
3fbd38a88a5302483a14d8fa2510faf9.exe
-
Size
1MB
-
MD5
3fbd38a88a5302483a14d8fa2510faf9
-
SHA1
776a02c79a42da5ec021aa1cbd7ac19367d6cb07
-
SHA256
3d10c53032ea46fb31e8b921c09466bf4a93347f5809c181a0d41ac8e423a153
-
SHA512
24b06af982e636f5faca9eca61958dc87a5ac4a272c789be842ff2c0f5e4f4cb5baf37186690d0c7c83ad65a45eef0ddc71d2f364da0c0d13e44c4335c515bb3
-
SSDEEP
24576:UAOcZXcxP6qNenHO4jTZpFY1q8LPHYOoW6Viduv:CH9CHO4HZXYIwQOolIduv
Malware Config
Extracted
netwire
37.0.14.206:3384
-
activex_autorun
false
-
copy_executable
true
-
delete_original
false
-
host_id
HostId-%Rand%
-
install_path
%AppData%\Install\Host.exe
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
true
-
offline_keylogger
true
-
password
Password234
-
registry_autorun
false
-
use_mutex
false
Signatures
-
NetWire RAT payload 64 IoCs
Processes:
resource yara_rule behavioral2/memory/1052-138-0x0000000000D00000-0x0000000001382000-memory.dmp netwire behavioral2/memory/1052-139-0x0000000000D0242D-mapping.dmp netwire behavioral2/memory/1052-142-0x0000000000D00000-0x0000000001382000-memory.dmp netwire behavioral2/memory/1052-146-0x0000000000D00000-0x0000000001382000-memory.dmp netwire behavioral2/memory/4028-154-0x0000000000500000-0x0000000000B8A000-memory.dmp netwire behavioral2/memory/4028-155-0x000000000050242D-mapping.dmp netwire behavioral2/memory/4028-158-0x0000000000500000-0x0000000000B8A000-memory.dmp netwire behavioral2/memory/4028-162-0x0000000000500000-0x0000000000B8A000-memory.dmp netwire behavioral2/memory/544-168-0x0000000000C20000-0x0000000001216000-memory.dmp netwire behavioral2/memory/544-169-0x0000000000C2242D-mapping.dmp netwire behavioral2/memory/544-172-0x0000000000C20000-0x0000000001216000-memory.dmp netwire behavioral2/memory/544-174-0x0000000000C20000-0x0000000001216000-memory.dmp netwire behavioral2/memory/4224-181-0x0000000000900000-0x0000000000E03000-memory.dmp netwire behavioral2/memory/4224-182-0x000000000090242D-mapping.dmp netwire behavioral2/memory/4224-185-0x0000000000900000-0x0000000000E03000-memory.dmp netwire behavioral2/memory/4224-189-0x0000000000900000-0x0000000000E03000-memory.dmp netwire behavioral2/memory/1864-194-0x0000000000700000-0x0000000000BCF000-memory.dmp netwire behavioral2/memory/1864-195-0x000000000070242D-mapping.dmp netwire behavioral2/memory/1864-198-0x0000000000700000-0x0000000000BCF000-memory.dmp netwire behavioral2/memory/1864-202-0x0000000000700000-0x0000000000BCF000-memory.dmp netwire behavioral2/memory/1820-208-0x000000000071242D-mapping.dmp netwire behavioral2/memory/1820-207-0x0000000000710000-0x0000000000E19000-memory.dmp netwire behavioral2/memory/1820-211-0x0000000000710000-0x0000000000E19000-memory.dmp netwire behavioral2/memory/1820-216-0x0000000000710000-0x0000000000E19000-memory.dmp netwire behavioral2/memory/1260-221-0x0000000000D0242D-mapping.dmp netwire behavioral2/memory/1260-220-0x0000000000D00000-0x00000000013A3000-memory.dmp netwire behavioral2/memory/1260-224-0x0000000000D00000-0x00000000013A3000-memory.dmp netwire behavioral2/memory/1260-228-0x0000000000D00000-0x00000000013A3000-memory.dmp netwire behavioral2/memory/2464-234-0x000000000050242D-mapping.dmp netwire behavioral2/memory/2464-233-0x0000000000500000-0x0000000000C2F000-memory.dmp netwire behavioral2/memory/2464-237-0x0000000000500000-0x0000000000C2F000-memory.dmp netwire behavioral2/memory/2464-242-0x0000000000500000-0x0000000000C2F000-memory.dmp netwire behavioral2/memory/4172-246-0x0000000000B00000-0x000000000122F000-memory.dmp netwire behavioral2/memory/4172-247-0x0000000000B0242D-mapping.dmp netwire behavioral2/memory/4172-250-0x0000000000B00000-0x000000000122F000-memory.dmp netwire behavioral2/memory/4172-254-0x0000000000B00000-0x000000000122F000-memory.dmp netwire behavioral2/memory/1496-260-0x0000000000C0242D-mapping.dmp netwire behavioral2/memory/1496-259-0x0000000000C00000-0x00000000010B0000-memory.dmp netwire behavioral2/memory/1496-263-0x0000000000C00000-0x00000000010B0000-memory.dmp netwire behavioral2/memory/1496-265-0x0000000000C00000-0x00000000010B0000-memory.dmp netwire behavioral2/memory/2272-273-0x0000000000BA242D-mapping.dmp netwire behavioral2/memory/2272-272-0x0000000000BA0000-0x0000000001143000-memory.dmp netwire behavioral2/memory/2272-276-0x0000000000BA0000-0x0000000001143000-memory.dmp netwire behavioral2/memory/2272-280-0x0000000000BA0000-0x0000000001143000-memory.dmp netwire behavioral2/memory/2292-285-0x0000000000B00000-0x0000000001220000-memory.dmp netwire behavioral2/memory/2292-286-0x0000000000B0242D-mapping.dmp netwire behavioral2/memory/2292-289-0x0000000000B00000-0x0000000001220000-memory.dmp netwire behavioral2/memory/2292-291-0x0000000000B00000-0x0000000001220000-memory.dmp netwire behavioral2/memory/3048-296-0x0000000000B2242D-mapping.dmp netwire behavioral2/memory/3048-295-0x0000000000B20000-0x0000000001216000-memory.dmp netwire behavioral2/memory/3048-298-0x0000000000B20000-0x0000000001216000-memory.dmp netwire behavioral2/memory/3048-300-0x0000000000B20000-0x0000000001216000-memory.dmp netwire behavioral2/memory/3492-304-0x0000000000700000-0x0000000000BD7000-memory.dmp netwire behavioral2/memory/3492-305-0x000000000070242D-mapping.dmp netwire behavioral2/memory/3492-307-0x0000000000700000-0x0000000000BD7000-memory.dmp netwire behavioral2/memory/3492-308-0x0000000000700000-0x0000000000BD7000-memory.dmp netwire behavioral2/memory/2492-313-0x0000000000C0242D-mapping.dmp netwire behavioral2/memory/2492-312-0x0000000000C00000-0x00000000011BE000-memory.dmp netwire behavioral2/memory/2492-315-0x0000000000C00000-0x00000000011BE000-memory.dmp netwire behavioral2/memory/2492-316-0x0000000000C00000-0x00000000011BE000-memory.dmp netwire behavioral2/memory/5016-321-0x000000000063242D-mapping.dmp netwire behavioral2/memory/5016-320-0x0000000000630000-0x0000000000D5D000-memory.dmp netwire behavioral2/memory/5016-323-0x0000000000630000-0x0000000000D5D000-memory.dmp netwire behavioral2/memory/5016-324-0x0000000000630000-0x0000000000D5D000-memory.dmp netwire -
Executes dropped EXE 64 IoCs
Processes:
xckjkc.pifRegSvcs.exeHost.exexckjkc.pifRegSvcs.exeHost.exexckjkc.pifRegSvcs.exeHost.exexckjkc.pifRegSvcs.exeHost.exexckjkc.pifRegSvcs.exeHost.exexckjkc.pifRegSvcs.exeHost.exexckjkc.pifRegSvcs.exeHost.exexckjkc.pifRegSvcs.exeHost.exexckjkc.pifRegSvcs.exeHost.exexckjkc.pifRegSvcs.exeHost.exexckjkc.pifRegSvcs.exeHost.exexckjkc.pifRegSvcs.exeHost.exexckjkc.pifRegSvcs.exeHost.exexckjkc.pifRegSvcs.exeHost.exexckjkc.pifRegSvcs.exeHost.exexckjkc.pifRegSvcs.exeHost.exexckjkc.pifRegSvcs.exeHost.exexckjkc.pifRegSvcs.exeHost.exexckjkc.pifRegSvcs.exeHost.exexckjkc.pifRegSvcs.exeHost.exexckjkc.pifRegSvcs.exeHost.exexckjkc.pifpid process 3756 xckjkc.pif 1052 RegSvcs.exe 1060 Host.exe 2656 xckjkc.pif 4028 RegSvcs.exe 2812 Host.exe 4288 xckjkc.pif 544 RegSvcs.exe 736 Host.exe 1880 xckjkc.pif 4224 RegSvcs.exe 3500 Host.exe 4868 xckjkc.pif 1864 RegSvcs.exe 1432 Host.exe 4464 xckjkc.pif 1820 RegSvcs.exe 1720 Host.exe 1040 xckjkc.pif 1260 RegSvcs.exe 1216 Host.exe 4956 xckjkc.pif 2464 RegSvcs.exe 380 Host.exe 1484 xckjkc.pif 4172 RegSvcs.exe 4396 Host.exe 4320 xckjkc.pif 1496 RegSvcs.exe 4048 Host.exe 4624 xckjkc.pif 2272 RegSvcs.exe 820 Host.exe 3948 xckjkc.pif 2292 RegSvcs.exe 5096 Host.exe 4152 xckjkc.pif 3048 RegSvcs.exe 8 Host.exe 2544 xckjkc.pif 3492 RegSvcs.exe 1440 Host.exe 2128 xckjkc.pif 2492 RegSvcs.exe 4344 Host.exe 4200 xckjkc.pif 5016 RegSvcs.exe 3956 Host.exe 4160 xckjkc.pif 2800 RegSvcs.exe 3764 Host.exe 1520 xckjkc.pif 1800 RegSvcs.exe 1904 Host.exe 4140 xckjkc.pif 2884 RegSvcs.exe 3224 Host.exe 3896 xckjkc.pif 2104 RegSvcs.exe 3200 Host.exe 4864 xckjkc.pif 664 RegSvcs.exe 4684 Host.exe 4620 xckjkc.pif -
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
WScript.exeRegSvcs.exeRegSvcs.exexckjkc.pifRegSvcs.exeWScript.exeRegSvcs.exeRegSvcs.exeWScript.exexckjkc.pifWScript.exexckjkc.pifWScript.exeRegSvcs.exeRegSvcs.exeWScript.exexckjkc.pifRegSvcs.exeWScript.exeRegSvcs.exeWScript.exeRegSvcs.exeRegSvcs.exexckjkc.pifxckjkc.pifxckjkc.pifWScript.exeWScript.exexckjkc.pifWScript.exe3fbd38a88a5302483a14d8fa2510faf9.exexckjkc.pifRegSvcs.exexckjkc.pifWScript.exexckjkc.pifxckjkc.pifxckjkc.pifxckjkc.pifxckjkc.pifRegSvcs.exexckjkc.pifRegSvcs.exexckjkc.pifRegSvcs.exeRegSvcs.exexckjkc.pifRegSvcs.exeWScript.exexckjkc.pifRegSvcs.exexckjkc.pifWScript.exexckjkc.pifRegSvcs.exeWScript.exeRegSvcs.exeWScript.exeWScript.exeWScript.exexckjkc.pifWScript.exeWScript.exexckjkc.pifdescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation RegSvcs.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation RegSvcs.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation xckjkc.pif Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation RegSvcs.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation RegSvcs.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation RegSvcs.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation xckjkc.pif Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation xckjkc.pif Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation RegSvcs.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation RegSvcs.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation xckjkc.pif Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation RegSvcs.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation RegSvcs.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation RegSvcs.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation RegSvcs.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation xckjkc.pif Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation xckjkc.pif Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation xckjkc.pif Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation xckjkc.pif Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation 3fbd38a88a5302483a14d8fa2510faf9.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation xckjkc.pif Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation RegSvcs.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation xckjkc.pif Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation xckjkc.pif Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation xckjkc.pif Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation xckjkc.pif Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation xckjkc.pif Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation xckjkc.pif Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation RegSvcs.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation xckjkc.pif Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation RegSvcs.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation xckjkc.pif Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation RegSvcs.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation RegSvcs.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation xckjkc.pif Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation RegSvcs.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation xckjkc.pif Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation RegSvcs.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation xckjkc.pif Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation xckjkc.pif Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation RegSvcs.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation RegSvcs.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation xckjkc.pif Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation xckjkc.pif -
Adds Run key to start application 2 TTPs 56 IoCs
Processes:
xckjkc.pifxckjkc.pifxckjkc.pifxckjkc.pifxckjkc.pifxckjkc.pifxckjkc.pifxckjkc.pifxckjkc.pifxckjkc.pifxckjkc.pifxckjkc.pifxckjkc.pifxckjkc.pifxckjkc.pifxckjkc.pifxckjkc.pifxckjkc.pifxckjkc.pifxckjkc.pifxckjkc.pifxckjkc.pifxckjkc.pifxckjkc.pifxckjkc.pifxckjkc.pifxckjkc.pifxckjkc.pifdescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run xckjkc.pif Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WindowsUpdate = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2_92\\xckjkc.pif C:\\Users\\Admin\\AppData\\Local\\Temp\\2_92\\MURCQF~1.SWK" xckjkc.pif Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WindowsUpdate = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2_92\\xckjkc.pif C:\\Users\\Admin\\AppData\\Local\\Temp\\2_92\\MURCQF~1.SWK" xckjkc.pif Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run xckjkc.pif Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WindowsUpdate = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2_92\\xckjkc.pif C:\\Users\\Admin\\AppData\\Local\\Temp\\2_92\\MURCQF~1.SWK" xckjkc.pif Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WindowsUpdate = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2_92\\xckjkc.pif C:\\Users\\Admin\\AppData\\Local\\Temp\\2_92\\MURCQF~1.SWK" xckjkc.pif Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run xckjkc.pif Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run xckjkc.pif Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WindowsUpdate = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2_92\\xckjkc.pif C:\\Users\\Admin\\AppData\\Local\\Temp\\2_92\\MURCQF~1.SWK" xckjkc.pif Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WindowsUpdate = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2_92\\xckjkc.pif C:\\Users\\Admin\\AppData\\Local\\Temp\\2_92\\MURCQF~1.SWK" xckjkc.pif Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WindowsUpdate = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2_92\\xckjkc.pif C:\\Users\\Admin\\AppData\\Local\\Temp\\2_92\\MURCQF~1.SWK" xckjkc.pif Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run xckjkc.pif Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WindowsUpdate = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2_92\\xckjkc.pif C:\\Users\\Admin\\AppData\\Local\\Temp\\2_92\\MURCQF~1.SWK" xckjkc.pif Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run xckjkc.pif Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run xckjkc.pif Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WindowsUpdate = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2_92\\xckjkc.pif C:\\Users\\Admin\\AppData\\Local\\Temp\\2_92\\MURCQF~1.SWK" xckjkc.pif Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run xckjkc.pif Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WindowsUpdate = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2_92\\xckjkc.pif C:\\Users\\Admin\\AppData\\Local\\Temp\\2_92\\MURCQF~1.SWK" xckjkc.pif Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run xckjkc.pif Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run xckjkc.pif Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run xckjkc.pif Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run xckjkc.pif Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run xckjkc.pif Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run xckjkc.pif Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run xckjkc.pif Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run xckjkc.pif Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WindowsUpdate = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2_92\\xckjkc.pif C:\\Users\\Admin\\AppData\\Local\\Temp\\2_92\\MURCQF~1.SWK" xckjkc.pif Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WindowsUpdate = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2_92\\xckjkc.pif C:\\Users\\Admin\\AppData\\Local\\Temp\\2_92\\MURCQF~1.SWK" xckjkc.pif Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WindowsUpdate = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2_92\\xckjkc.pif C:\\Users\\Admin\\AppData\\Local\\Temp\\2_92\\MURCQF~1.SWK" xckjkc.pif Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WindowsUpdate = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2_92\\xckjkc.pif C:\\Users\\Admin\\AppData\\Local\\Temp\\2_92\\MURCQF~1.SWK" xckjkc.pif Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run xckjkc.pif Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run xckjkc.pif Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WindowsUpdate = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2_92\\xckjkc.pif C:\\Users\\Admin\\AppData\\Local\\Temp\\2_92\\MURCQF~1.SWK" xckjkc.pif Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WindowsUpdate = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2_92\\xckjkc.pif C:\\Users\\Admin\\AppData\\Local\\Temp\\2_92\\MURCQF~1.SWK" xckjkc.pif Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run xckjkc.pif Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run xckjkc.pif Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run xckjkc.pif Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WindowsUpdate = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2_92\\xckjkc.pif C:\\Users\\Admin\\AppData\\Local\\Temp\\2_92\\MURCQF~1.SWK" xckjkc.pif Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WindowsUpdate = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2_92\\xckjkc.pif C:\\Users\\Admin\\AppData\\Local\\Temp\\2_92\\MURCQF~1.SWK" xckjkc.pif Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WindowsUpdate = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2_92\\xckjkc.pif C:\\Users\\Admin\\AppData\\Local\\Temp\\2_92\\MURCQF~1.SWK" xckjkc.pif Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run xckjkc.pif Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WindowsUpdate = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2_92\\xckjkc.pif C:\\Users\\Admin\\AppData\\Local\\Temp\\2_92\\MURCQF~1.SWK" xckjkc.pif Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WindowsUpdate = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2_92\\xckjkc.pif C:\\Users\\Admin\\AppData\\Local\\Temp\\2_92\\MURCQF~1.SWK" xckjkc.pif Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WindowsUpdate = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2_92\\xckjkc.pif C:\\Users\\Admin\\AppData\\Local\\Temp\\2_92\\MURCQF~1.SWK" xckjkc.pif Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WindowsUpdate = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2_92\\xckjkc.pif C:\\Users\\Admin\\AppData\\Local\\Temp\\2_92\\MURCQF~1.SWK" xckjkc.pif Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run xckjkc.pif Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run xckjkc.pif Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run xckjkc.pif Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WindowsUpdate = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2_92\\xckjkc.pif C:\\Users\\Admin\\AppData\\Local\\Temp\\2_92\\MURCQF~1.SWK" xckjkc.pif Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run xckjkc.pif Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WindowsUpdate = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2_92\\xckjkc.pif C:\\Users\\Admin\\AppData\\Local\\Temp\\2_92\\MURCQF~1.SWK" xckjkc.pif Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WindowsUpdate = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2_92\\xckjkc.pif C:\\Users\\Admin\\AppData\\Local\\Temp\\2_92\\MURCQF~1.SWK" xckjkc.pif Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WindowsUpdate = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2_92\\xckjkc.pif C:\\Users\\Admin\\AppData\\Local\\Temp\\2_92\\MURCQF~1.SWK" xckjkc.pif Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WindowsUpdate = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2_92\\xckjkc.pif C:\\Users\\Admin\\AppData\\Local\\Temp\\2_92\\MURCQF~1.SWK" xckjkc.pif Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run xckjkc.pif Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run xckjkc.pif -
Suspicious use of SetThreadContext 28 IoCs
Processes:
xckjkc.pifxckjkc.pifxckjkc.pifxckjkc.pifxckjkc.pifxckjkc.pifxckjkc.pifxckjkc.pifxckjkc.pifxckjkc.pifxckjkc.pifxckjkc.pifxckjkc.pifxckjkc.pifxckjkc.pifxckjkc.pifxckjkc.pifxckjkc.pifxckjkc.pifxckjkc.pifxckjkc.pifxckjkc.pifxckjkc.pifxckjkc.pifxckjkc.pifxckjkc.pifxckjkc.pifxckjkc.pifdescription pid process target process PID 3756 set thread context of 1052 3756 xckjkc.pif RegSvcs.exe PID 2656 set thread context of 4028 2656 xckjkc.pif RegSvcs.exe PID 4288 set thread context of 544 4288 xckjkc.pif RegSvcs.exe PID 1880 set thread context of 4224 1880 xckjkc.pif RegSvcs.exe PID 4868 set thread context of 1864 4868 xckjkc.pif RegSvcs.exe PID 4464 set thread context of 1820 4464 xckjkc.pif RegSvcs.exe PID 1040 set thread context of 1260 1040 xckjkc.pif RegSvcs.exe PID 4956 set thread context of 2464 4956 xckjkc.pif RegSvcs.exe PID 1484 set thread context of 4172 1484 xckjkc.pif RegSvcs.exe PID 4320 set thread context of 1496 4320 xckjkc.pif RegSvcs.exe PID 4624 set thread context of 2272 4624 xckjkc.pif RegSvcs.exe PID 3948 set thread context of 2292 3948 xckjkc.pif RegSvcs.exe PID 4152 set thread context of 3048 4152 xckjkc.pif RegSvcs.exe PID 2544 set thread context of 3492 2544 xckjkc.pif RegSvcs.exe PID 2128 set thread context of 2492 2128 xckjkc.pif RegSvcs.exe PID 4200 set thread context of 5016 4200 xckjkc.pif RegSvcs.exe PID 4160 set thread context of 2800 4160 xckjkc.pif RegSvcs.exe PID 1520 set thread context of 1800 1520 xckjkc.pif RegSvcs.exe PID 4140 set thread context of 2884 4140 xckjkc.pif RegSvcs.exe PID 3896 set thread context of 2104 3896 xckjkc.pif RegSvcs.exe PID 4864 set thread context of 664 4864 xckjkc.pif RegSvcs.exe PID 4620 set thread context of 4904 4620 xckjkc.pif RegSvcs.exe PID 2588 set thread context of 2372 2588 xckjkc.pif RegSvcs.exe PID 1980 set thread context of 228 1980 xckjkc.pif RegSvcs.exe PID 1020 set thread context of 380 1020 xckjkc.pif RegSvcs.exe PID 4956 set thread context of 4432 4956 xckjkc.pif RegSvcs.exe PID 3468 set thread context of 1772 3468 xckjkc.pif RegSvcs.exe PID 2672 set thread context of 3300 2672 xckjkc.pif RegSvcs.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 27 IoCs
Processes:
xckjkc.pifxckjkc.pifxckjkc.pifxckjkc.pifxckjkc.pifxckjkc.pifxckjkc.pifxckjkc.pifxckjkc.pifxckjkc.pifxckjkc.pifxckjkc.pifxckjkc.pifxckjkc.pifxckjkc.pifxckjkc.pifxckjkc.pifxckjkc.pifxckjkc.pifxckjkc.pifxckjkc.pifxckjkc.pifxckjkc.pifxckjkc.pifxckjkc.pifxckjkc.pifxckjkc.pifdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings xckjkc.pif Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings xckjkc.pif Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings xckjkc.pif Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings xckjkc.pif Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings xckjkc.pif Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings xckjkc.pif Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings xckjkc.pif Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings xckjkc.pif Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings xckjkc.pif Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings xckjkc.pif Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings xckjkc.pif Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings xckjkc.pif Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings xckjkc.pif Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings xckjkc.pif Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings xckjkc.pif Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings xckjkc.pif Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings xckjkc.pif Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings xckjkc.pif Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings xckjkc.pif Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings xckjkc.pif Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings xckjkc.pif Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings xckjkc.pif Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings xckjkc.pif Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings xckjkc.pif Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings xckjkc.pif Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings xckjkc.pif Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings xckjkc.pif -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
xckjkc.pifxckjkc.pifxckjkc.pifxckjkc.pifxckjkc.pifpid process 3756 xckjkc.pif 3756 xckjkc.pif 3756 xckjkc.pif 3756 xckjkc.pif 3756 xckjkc.pif 3756 xckjkc.pif 3756 xckjkc.pif 3756 xckjkc.pif 3756 xckjkc.pif 3756 xckjkc.pif 3756 xckjkc.pif 3756 xckjkc.pif 3756 xckjkc.pif 3756 xckjkc.pif 2656 xckjkc.pif 2656 xckjkc.pif 2656 xckjkc.pif 2656 xckjkc.pif 2656 xckjkc.pif 2656 xckjkc.pif 2656 xckjkc.pif 2656 xckjkc.pif 2656 xckjkc.pif 2656 xckjkc.pif 2656 xckjkc.pif 2656 xckjkc.pif 2656 xckjkc.pif 2656 xckjkc.pif 4288 xckjkc.pif 4288 xckjkc.pif 4288 xckjkc.pif 4288 xckjkc.pif 4288 xckjkc.pif 4288 xckjkc.pif 4288 xckjkc.pif 4288 xckjkc.pif 4288 xckjkc.pif 4288 xckjkc.pif 4288 xckjkc.pif 4288 xckjkc.pif 4288 xckjkc.pif 4288 xckjkc.pif 1880 xckjkc.pif 1880 xckjkc.pif 1880 xckjkc.pif 1880 xckjkc.pif 1880 xckjkc.pif 1880 xckjkc.pif 1880 xckjkc.pif 1880 xckjkc.pif 1880 xckjkc.pif 1880 xckjkc.pif 1880 xckjkc.pif 1880 xckjkc.pif 4868 xckjkc.pif 4868 xckjkc.pif 4868 xckjkc.pif 4868 xckjkc.pif 4868 xckjkc.pif 4868 xckjkc.pif 4868 xckjkc.pif 4868 xckjkc.pif 4868 xckjkc.pif 4868 xckjkc.pif -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
3fbd38a88a5302483a14d8fa2510faf9.exexckjkc.pifRegSvcs.exeWScript.exexckjkc.pifRegSvcs.exeWScript.exexckjkc.pifRegSvcs.exeWScript.exexckjkc.pifRegSvcs.exeWScript.exexckjkc.pifdescription pid process target process PID 4540 wrote to memory of 3756 4540 3fbd38a88a5302483a14d8fa2510faf9.exe xckjkc.pif PID 4540 wrote to memory of 3756 4540 3fbd38a88a5302483a14d8fa2510faf9.exe xckjkc.pif PID 4540 wrote to memory of 3756 4540 3fbd38a88a5302483a14d8fa2510faf9.exe xckjkc.pif PID 3756 wrote to memory of 1052 3756 xckjkc.pif RegSvcs.exe PID 3756 wrote to memory of 1052 3756 xckjkc.pif RegSvcs.exe PID 3756 wrote to memory of 1052 3756 xckjkc.pif RegSvcs.exe PID 3756 wrote to memory of 1052 3756 xckjkc.pif RegSvcs.exe PID 3756 wrote to memory of 1052 3756 xckjkc.pif RegSvcs.exe PID 1052 wrote to memory of 1060 1052 RegSvcs.exe Host.exe PID 1052 wrote to memory of 1060 1052 RegSvcs.exe Host.exe PID 1052 wrote to memory of 1060 1052 RegSvcs.exe Host.exe PID 3756 wrote to memory of 4420 3756 xckjkc.pif WScript.exe PID 3756 wrote to memory of 4420 3756 xckjkc.pif WScript.exe PID 3756 wrote to memory of 4420 3756 xckjkc.pif WScript.exe PID 4420 wrote to memory of 2656 4420 WScript.exe xckjkc.pif PID 4420 wrote to memory of 2656 4420 WScript.exe xckjkc.pif PID 4420 wrote to memory of 2656 4420 WScript.exe xckjkc.pif PID 2656 wrote to memory of 4028 2656 xckjkc.pif RegSvcs.exe PID 2656 wrote to memory of 4028 2656 xckjkc.pif RegSvcs.exe PID 2656 wrote to memory of 4028 2656 xckjkc.pif RegSvcs.exe PID 2656 wrote to memory of 4028 2656 xckjkc.pif RegSvcs.exe PID 2656 wrote to memory of 4028 2656 xckjkc.pif RegSvcs.exe PID 4028 wrote to memory of 2812 4028 RegSvcs.exe Host.exe PID 4028 wrote to memory of 2812 4028 RegSvcs.exe Host.exe PID 4028 wrote to memory of 2812 4028 RegSvcs.exe Host.exe PID 2656 wrote to memory of 1848 2656 xckjkc.pif WScript.exe PID 2656 wrote to memory of 1848 2656 xckjkc.pif WScript.exe PID 2656 wrote to memory of 1848 2656 xckjkc.pif WScript.exe PID 1848 wrote to memory of 4288 1848 WScript.exe xckjkc.pif PID 1848 wrote to memory of 4288 1848 WScript.exe xckjkc.pif PID 1848 wrote to memory of 4288 1848 WScript.exe xckjkc.pif PID 4288 wrote to memory of 544 4288 xckjkc.pif RegSvcs.exe PID 4288 wrote to memory of 544 4288 xckjkc.pif RegSvcs.exe PID 4288 wrote to memory of 544 4288 xckjkc.pif RegSvcs.exe PID 4288 wrote to memory of 544 4288 xckjkc.pif RegSvcs.exe PID 4288 wrote to memory of 544 4288 xckjkc.pif RegSvcs.exe PID 544 wrote to memory of 736 544 RegSvcs.exe Host.exe PID 544 wrote to memory of 736 544 RegSvcs.exe Host.exe PID 544 wrote to memory of 736 544 RegSvcs.exe Host.exe PID 4288 wrote to memory of 3300 4288 xckjkc.pif WScript.exe PID 4288 wrote to memory of 3300 4288 xckjkc.pif WScript.exe PID 4288 wrote to memory of 3300 4288 xckjkc.pif WScript.exe PID 3300 wrote to memory of 1880 3300 WScript.exe xckjkc.pif PID 3300 wrote to memory of 1880 3300 WScript.exe xckjkc.pif PID 3300 wrote to memory of 1880 3300 WScript.exe xckjkc.pif PID 1880 wrote to memory of 4224 1880 xckjkc.pif RegSvcs.exe PID 1880 wrote to memory of 4224 1880 xckjkc.pif RegSvcs.exe PID 1880 wrote to memory of 4224 1880 xckjkc.pif RegSvcs.exe PID 1880 wrote to memory of 4224 1880 xckjkc.pif RegSvcs.exe PID 1880 wrote to memory of 4224 1880 xckjkc.pif RegSvcs.exe PID 4224 wrote to memory of 3500 4224 RegSvcs.exe Host.exe PID 4224 wrote to memory of 3500 4224 RegSvcs.exe Host.exe PID 4224 wrote to memory of 3500 4224 RegSvcs.exe Host.exe PID 1880 wrote to memory of 3860 1880 xckjkc.pif WScript.exe PID 1880 wrote to memory of 3860 1880 xckjkc.pif WScript.exe PID 1880 wrote to memory of 3860 1880 xckjkc.pif WScript.exe PID 3860 wrote to memory of 4868 3860 WScript.exe xckjkc.pif PID 3860 wrote to memory of 4868 3860 WScript.exe xckjkc.pif PID 3860 wrote to memory of 4868 3860 WScript.exe xckjkc.pif PID 4868 wrote to memory of 1864 4868 xckjkc.pif RegSvcs.exe PID 4868 wrote to memory of 1864 4868 xckjkc.pif RegSvcs.exe PID 4868 wrote to memory of 1864 4868 xckjkc.pif RegSvcs.exe PID 4868 wrote to memory of 1864 4868 xckjkc.pif RegSvcs.exe PID 4868 wrote to memory of 1864 4868 xckjkc.pif RegSvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3fbd38a88a5302483a14d8fa2510faf9.exe"C:\Users\Admin\AppData\Local\Temp\3fbd38a88a5302483a14d8fa2510faf9.exe"
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\2_92\xckjkc.pif"C:\Users\Admin\AppData\Local\Temp\2_92\xckjkc.pif" murcqfuubq.swk
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"
- Executes dropped EXE
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\2_92\run.vbs"
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\2_92\xckjkc.pif"C:\Users\Admin\AppData\Local\Temp\2_92\xckjkc.pif" MURCQF~1.SWK
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"
- Executes dropped EXE
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\2_92\run.vbs"
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\2_92\xckjkc.pif"C:\Users\Admin\AppData\Local\Temp\2_92\xckjkc.pif" MURCQF~1.SWK
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"
- Executes dropped EXE
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\2_92\run.vbs"
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\2_92\xckjkc.pif"C:\Users\Admin\AppData\Local\Temp\2_92\xckjkc.pif" MURCQF~1.SWK
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"
- Executes dropped EXE
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\2_92\run.vbs"
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\2_92\xckjkc.pif"C:\Users\Admin\AppData\Local\Temp\2_92\xckjkc.pif" MURCQF~1.SWK
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"
- Executes dropped EXE
-
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"
- Executes dropped EXE
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\2_92\run.vbs"
- Checks computer location settings
-
C:\Users\Admin\AppData\Local\Temp\2_92\xckjkc.pif"C:\Users\Admin\AppData\Local\Temp\2_92\xckjkc.pif" MURCQF~1.SWK
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Modifies registry class
-
C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"
- Executes dropped EXE
- Checks computer location settings
-
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"
- Executes dropped EXE
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\2_92\run.vbs"
- Checks computer location settings
-
C:\Users\Admin\AppData\Local\Temp\2_92\xckjkc.pif"C:\Users\Admin\AppData\Local\Temp\2_92\xckjkc.pif" MURCQF~1.SWK
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Modifies registry class
-
C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"
- Executes dropped EXE
- Checks computer location settings
-
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"
- Executes dropped EXE
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\2_92\run.vbs"
-
C:\Users\Admin\AppData\Local\Temp\2_92\xckjkc.pif"C:\Users\Admin\AppData\Local\Temp\2_92\xckjkc.pif" MURCQF~1.SWK
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Modifies registry class
-
C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"
- Executes dropped EXE
- Checks computer location settings
-
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"
- Executes dropped EXE
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\2_92\run.vbs"
- Checks computer location settings
-
C:\Users\Admin\AppData\Local\Temp\2_92\xckjkc.pif"C:\Users\Admin\AppData\Local\Temp\2_92\xckjkc.pif" MURCQF~1.SWK
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Modifies registry class
-
C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"
- Executes dropped EXE
- Checks computer location settings
-
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"
- Executes dropped EXE
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\2_92\run.vbs"
- Checks computer location settings
-
C:\Users\Admin\AppData\Local\Temp\2_92\xckjkc.pif"C:\Users\Admin\AppData\Local\Temp\2_92\xckjkc.pif" MURCQF~1.SWK
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Modifies registry class
-
C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"
- Executes dropped EXE
- Checks computer location settings
-
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"
- Executes dropped EXE
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\2_92\run.vbs"
- Checks computer location settings
-
C:\Users\Admin\AppData\Local\Temp\2_92\xckjkc.pif"C:\Users\Admin\AppData\Local\Temp\2_92\xckjkc.pif" MURCQF~1.SWK
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Modifies registry class
-
C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"
- Executes dropped EXE
- Checks computer location settings
-
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"
- Executes dropped EXE
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\2_92\run.vbs"
- Checks computer location settings
-
C:\Users\Admin\AppData\Local\Temp\2_92\xckjkc.pif"C:\Users\Admin\AppData\Local\Temp\2_92\xckjkc.pif" MURCQF~1.SWK
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Modifies registry class
-
C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"
- Executes dropped EXE
- Checks computer location settings
-
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"
- Executes dropped EXE
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\2_92\run.vbs"
- Checks computer location settings
-
C:\Users\Admin\AppData\Local\Temp\2_92\xckjkc.pif"C:\Users\Admin\AppData\Local\Temp\2_92\xckjkc.pif" MURCQF~1.SWK
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Modifies registry class
-
C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"
- Executes dropped EXE
- Checks computer location settings
-
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"
- Executes dropped EXE
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\2_92\run.vbs"
- Checks computer location settings
-
C:\Users\Admin\AppData\Local\Temp\2_92\xckjkc.pif"C:\Users\Admin\AppData\Local\Temp\2_92\xckjkc.pif" MURCQF~1.SWK
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Modifies registry class
-
C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"
- Executes dropped EXE
-
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"
- Executes dropped EXE
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\2_92\run.vbs"
- Checks computer location settings
-
C:\Users\Admin\AppData\Local\Temp\2_92\xckjkc.pif"C:\Users\Admin\AppData\Local\Temp\2_92\xckjkc.pif" MURCQF~1.SWK
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Modifies registry class
-
C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"
- Executes dropped EXE
- Checks computer location settings
-
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"
- Executes dropped EXE
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\2_92\run.vbs"
- Checks computer location settings
-
C:\Users\Admin\AppData\Local\Temp\2_92\xckjkc.pif"C:\Users\Admin\AppData\Local\Temp\2_92\xckjkc.pif" MURCQF~1.SWK
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Modifies registry class
-
C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"
- Executes dropped EXE
- Checks computer location settings
-
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"
- Executes dropped EXE
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\2_92\run.vbs"
- Checks computer location settings
-
C:\Users\Admin\AppData\Local\Temp\2_92\xckjkc.pif"C:\Users\Admin\AppData\Local\Temp\2_92\xckjkc.pif" MURCQF~1.SWK
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Modifies registry class
-
C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"
- Executes dropped EXE
-
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"
- Executes dropped EXE
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\2_92\run.vbs"
-
C:\Users\Admin\AppData\Local\Temp\2_92\xckjkc.pif"C:\Users\Admin\AppData\Local\Temp\2_92\xckjkc.pif" MURCQF~1.SWK
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Modifies registry class
-
C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"
- Executes dropped EXE
- Checks computer location settings
-
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"
- Executes dropped EXE
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\2_92\run.vbs"
-
C:\Users\Admin\AppData\Local\Temp\2_92\xckjkc.pif"C:\Users\Admin\AppData\Local\Temp\2_92\xckjkc.pif" MURCQF~1.SWK
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Modifies registry class
-
C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"
- Executes dropped EXE
- Checks computer location settings
-
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"
- Executes dropped EXE
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\2_92\run.vbs"
-
C:\Users\Admin\AppData\Local\Temp\2_92\xckjkc.pif"C:\Users\Admin\AppData\Local\Temp\2_92\xckjkc.pif" MURCQF~1.SWK
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Modifies registry class
-
C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"
- Executes dropped EXE
-
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"
- Executes dropped EXE
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\2_92\run.vbs"
- Checks computer location settings
-
C:\Users\Admin\AppData\Local\Temp\2_92\xckjkc.pif"C:\Users\Admin\AppData\Local\Temp\2_92\xckjkc.pif" MURCQF~1.SWK
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Modifies registry class
-
C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"
- Executes dropped EXE
-
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"
- Executes dropped EXE
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\2_92\run.vbs"
- Checks computer location settings
-
C:\Users\Admin\AppData\Local\Temp\2_92\xckjkc.pif"C:\Users\Admin\AppData\Local\Temp\2_92\xckjkc.pif" MURCQF~1.SWK
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Modifies registry class
-
C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"
- Checks computer location settings
-
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\2_92\run.vbs"
- Checks computer location settings
-
C:\Users\Admin\AppData\Local\Temp\2_92\xckjkc.pif"C:\Users\Admin\AppData\Local\Temp\2_92\xckjkc.pif" MURCQF~1.SWK
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Modifies registry class
-
C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"
-
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\2_92\run.vbs"
- Checks computer location settings
-
C:\Users\Admin\AppData\Local\Temp\2_92\xckjkc.pif"C:\Users\Admin\AppData\Local\Temp\2_92\xckjkc.pif" MURCQF~1.SWK
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Modifies registry class
-
C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"
- Checks computer location settings
-
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\2_92\run.vbs"
- Checks computer location settings
-
C:\Users\Admin\AppData\Local\Temp\2_92\xckjkc.pif"C:\Users\Admin\AppData\Local\Temp\2_92\xckjkc.pif" MURCQF~1.SWK
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Modifies registry class
-
C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"
-
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\2_92\run.vbs"
-
C:\Users\Admin\AppData\Local\Temp\2_92\xckjkc.pif"C:\Users\Admin\AppData\Local\Temp\2_92\xckjkc.pif" MURCQF~1.SWK
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Modifies registry class
-
C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"
- Checks computer location settings
-
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\2_92\run.vbs"
- Checks computer location settings
-
C:\Users\Admin\AppData\Local\Temp\2_92\xckjkc.pif"C:\Users\Admin\AppData\Local\Temp\2_92\xckjkc.pif" MURCQF~1.SWK
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Modifies registry class
-
C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"
- Checks computer location settings
-
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\2_92\run.vbs"
- Checks computer location settings
-
C:\Users\Admin\AppData\Local\Temp\2_92\xckjkc.pif"C:\Users\Admin\AppData\Local\Temp\2_92\xckjkc.pif" MURCQF~1.SWK
- Adds Run key to start application
- Suspicious use of SetThreadContext
-
C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Host.exe.logFilesize
142B
MD58c0458bb9ea02d50565175e38d577e35
SHA1f0b50702cd6470f3c17d637908f83212fdbdb2f2
SHA256c578e86db701b9afa3626e804cf434f9d32272ff59fb32fa9a51835e5a148b53
SHA512804a47494d9a462ffa6f39759480700ecbe5a7f3a15ec3a6330176ed9c04695d2684bf6bf85ab86286d52e7b727436d0bb2e8da96e20d47740b5ce3f856b5d0f
-
C:\Users\Admin\AppData\Local\Temp\2_92\murcqfuubq.swkFilesize
159MB
MD522d7f4d3b1978cb2578357748b304b1f
SHA1ff421d4585f434ac10d8f580b30af4e3c24a5a47
SHA256638acd438935e740a086738ea8758be983c2bd4cfeaedf761e39aec7ceabdfe1
SHA512fab8b70160b06f2e6c102564b1a22801aa9053cdb8a4188e74b64104319e79d0bc735d0417b6c07c75e276d831fec1ceeffc7edddf005d0762eed5e525768215
-
C:\Users\Admin\AppData\Local\Temp\2_92\mwghanevcv.cplFilesize
55KB
MD5b7e12759d7875eb5a0b4f8098084e180
SHA1057eb45ee662fcfa885538ea98f179516e2992b5
SHA256942a4068b017964d5c48244ba37f2580e231c31f68cf0809ae8d36987f4a5592
SHA51274fae86f94f7b74b2451e78e44154844b0362e7fe5e55827004adc22dc7d4e8e90b7e410fdafc3c179cf202c23c6ce6cc8b1e6bd719b2c913a02cb7e726551fa
-
C:\Users\Admin\AppData\Local\Temp\2_92\run.vbsFilesize
130B
MD5b97491a92619d2e72e66db172d996434
SHA15764121230da2bf1677564a3018ae0f112aa4adb
SHA256335bdbb5c818c1d88ef152daa73a9fc8480cacafe5b41e23c1c4fa2038bf121f
SHA512b28b13cf67d17b66b53250e86eec57f13bcd7eceddc702f4d402a35f735a2d9427db054667be39da8549e187c4bece62a2aceb23fe80007ba35b34394f9dbefb
-
C:\Users\Admin\AppData\Local\Temp\2_92\vaphlv.fwoFilesize
321KB
MD5e3e028ff79d82e2d2e178a19bc0321d3
SHA1a32c1c22a60a04b170f296de36dd4207367a705d
SHA2564ebe8964c0606c2e56df8706682558665bd45ee63b004299e880433c266c27b8
SHA51288617fb7d1244896fde88b49bb8bc07be65dfc02fc696a30457c771338471e2539a4b99bc557a0c72f9dde1fcc7d2013f1116edd8e98a14dc2e50126d065c217
-
C:\Users\Admin\AppData\Local\Temp\2_92\xckjkc.pifFilesize
801KB
MD5dae073ff3ec1441bd6dd60a1c84bca94
SHA1ffe7f1c111bd4e52877b6fa7cf078b3c7487b95a
SHA2563dc837914c42318fc2133b9d8455e14a86981b67898080791d1dcdc7b31b28d5
SHA512104fd5255b5716887eb510469626c9b1613e8a66f24b32c22ff26c190243658bf1ac6699ac04b9a903f2cd192719eb84c0c34b2143ba4206bf1f0874dfd33466
-
C:\Users\Admin\AppData\Local\Temp\2_92\xckjkc.pifFilesize
801KB
MD5dae073ff3ec1441bd6dd60a1c84bca94
SHA1ffe7f1c111bd4e52877b6fa7cf078b3c7487b95a
SHA2563dc837914c42318fc2133b9d8455e14a86981b67898080791d1dcdc7b31b28d5
SHA512104fd5255b5716887eb510469626c9b1613e8a66f24b32c22ff26c190243658bf1ac6699ac04b9a903f2cd192719eb84c0c34b2143ba4206bf1f0874dfd33466
-
C:\Users\Admin\AppData\Local\Temp\2_92\xckjkc.pifFilesize
801KB
MD5dae073ff3ec1441bd6dd60a1c84bca94
SHA1ffe7f1c111bd4e52877b6fa7cf078b3c7487b95a
SHA2563dc837914c42318fc2133b9d8455e14a86981b67898080791d1dcdc7b31b28d5
SHA512104fd5255b5716887eb510469626c9b1613e8a66f24b32c22ff26c190243658bf1ac6699ac04b9a903f2cd192719eb84c0c34b2143ba4206bf1f0874dfd33466
-
C:\Users\Admin\AppData\Local\Temp\2_92\xckjkc.pifFilesize
801KB
MD5dae073ff3ec1441bd6dd60a1c84bca94
SHA1ffe7f1c111bd4e52877b6fa7cf078b3c7487b95a
SHA2563dc837914c42318fc2133b9d8455e14a86981b67898080791d1dcdc7b31b28d5
SHA512104fd5255b5716887eb510469626c9b1613e8a66f24b32c22ff26c190243658bf1ac6699ac04b9a903f2cd192719eb84c0c34b2143ba4206bf1f0874dfd33466
-
C:\Users\Admin\AppData\Local\Temp\2_92\xckjkc.pifFilesize
801KB
MD5dae073ff3ec1441bd6dd60a1c84bca94
SHA1ffe7f1c111bd4e52877b6fa7cf078b3c7487b95a
SHA2563dc837914c42318fc2133b9d8455e14a86981b67898080791d1dcdc7b31b28d5
SHA512104fd5255b5716887eb510469626c9b1613e8a66f24b32c22ff26c190243658bf1ac6699ac04b9a903f2cd192719eb84c0c34b2143ba4206bf1f0874dfd33466
-
C:\Users\Admin\AppData\Local\Temp\2_92\xckjkc.pifFilesize
801KB
MD5dae073ff3ec1441bd6dd60a1c84bca94
SHA1ffe7f1c111bd4e52877b6fa7cf078b3c7487b95a
SHA2563dc837914c42318fc2133b9d8455e14a86981b67898080791d1dcdc7b31b28d5
SHA512104fd5255b5716887eb510469626c9b1613e8a66f24b32c22ff26c190243658bf1ac6699ac04b9a903f2cd192719eb84c0c34b2143ba4206bf1f0874dfd33466
-
C:\Users\Admin\AppData\Local\Temp\2_92\xckjkc.pifFilesize
801KB
MD5dae073ff3ec1441bd6dd60a1c84bca94
SHA1ffe7f1c111bd4e52877b6fa7cf078b3c7487b95a
SHA2563dc837914c42318fc2133b9d8455e14a86981b67898080791d1dcdc7b31b28d5
SHA512104fd5255b5716887eb510469626c9b1613e8a66f24b32c22ff26c190243658bf1ac6699ac04b9a903f2cd192719eb84c0c34b2143ba4206bf1f0874dfd33466
-
C:\Users\Admin\AppData\Local\Temp\2_92\xckjkc.pifFilesize
801KB
MD5dae073ff3ec1441bd6dd60a1c84bca94
SHA1ffe7f1c111bd4e52877b6fa7cf078b3c7487b95a
SHA2563dc837914c42318fc2133b9d8455e14a86981b67898080791d1dcdc7b31b28d5
SHA512104fd5255b5716887eb510469626c9b1613e8a66f24b32c22ff26c190243658bf1ac6699ac04b9a903f2cd192719eb84c0c34b2143ba4206bf1f0874dfd33466
-
C:\Users\Admin\AppData\Local\Temp\2_92\xckjkc.pifFilesize
801KB
MD5dae073ff3ec1441bd6dd60a1c84bca94
SHA1ffe7f1c111bd4e52877b6fa7cf078b3c7487b95a
SHA2563dc837914c42318fc2133b9d8455e14a86981b67898080791d1dcdc7b31b28d5
SHA512104fd5255b5716887eb510469626c9b1613e8a66f24b32c22ff26c190243658bf1ac6699ac04b9a903f2cd192719eb84c0c34b2143ba4206bf1f0874dfd33466
-
C:\Users\Admin\AppData\Local\Temp\2_92\xckjkc.pifFilesize
801KB
MD5dae073ff3ec1441bd6dd60a1c84bca94
SHA1ffe7f1c111bd4e52877b6fa7cf078b3c7487b95a
SHA2563dc837914c42318fc2133b9d8455e14a86981b67898080791d1dcdc7b31b28d5
SHA512104fd5255b5716887eb510469626c9b1613e8a66f24b32c22ff26c190243658bf1ac6699ac04b9a903f2cd192719eb84c0c34b2143ba4206bf1f0874dfd33466
-
C:\Users\Admin\AppData\Local\Temp\2_92\xckjkc.pifFilesize
801KB
MD5dae073ff3ec1441bd6dd60a1c84bca94
SHA1ffe7f1c111bd4e52877b6fa7cf078b3c7487b95a
SHA2563dc837914c42318fc2133b9d8455e14a86981b67898080791d1dcdc7b31b28d5
SHA512104fd5255b5716887eb510469626c9b1613e8a66f24b32c22ff26c190243658bf1ac6699ac04b9a903f2cd192719eb84c0c34b2143ba4206bf1f0874dfd33466
-
C:\Users\Admin\AppData\Local\Temp\2_92\xckjkc.pifFilesize
801KB
MD5dae073ff3ec1441bd6dd60a1c84bca94
SHA1ffe7f1c111bd4e52877b6fa7cf078b3c7487b95a
SHA2563dc837914c42318fc2133b9d8455e14a86981b67898080791d1dcdc7b31b28d5
SHA512104fd5255b5716887eb510469626c9b1613e8a66f24b32c22ff26c190243658bf1ac6699ac04b9a903f2cd192719eb84c0c34b2143ba4206bf1f0874dfd33466
-
C:\Users\Admin\AppData\Local\Temp\2_92\xckjkc.pifFilesize
801KB
MD5dae073ff3ec1441bd6dd60a1c84bca94
SHA1ffe7f1c111bd4e52877b6fa7cf078b3c7487b95a
SHA2563dc837914c42318fc2133b9d8455e14a86981b67898080791d1dcdc7b31b28d5
SHA512104fd5255b5716887eb510469626c9b1613e8a66f24b32c22ff26c190243658bf1ac6699ac04b9a903f2cd192719eb84c0c34b2143ba4206bf1f0874dfd33466
-
C:\Users\Admin\AppData\Local\Temp\RegSvcs.exeFilesize
44KB
MD59d352bc46709f0cb5ec974633a0c3c94
SHA11969771b2f022f9a86d77ac4d4d239becdf08d07
SHA2562c1eeb7097023c784c2bd040a2005a5070ed6f3a4abf13929377a9e39fab1390
SHA51213c714244ec56beeb202279e4109d59c2a43c3cf29f90a374a751c04fd472b45228ca5a0178f41109ed863dbd34e0879e4a21f5e38ae3d89559c57e6be990a9b
-
C:\Users\Admin\AppData\Local\Temp\RegSvcs.exeFilesize
44KB
MD59d352bc46709f0cb5ec974633a0c3c94
SHA11969771b2f022f9a86d77ac4d4d239becdf08d07
SHA2562c1eeb7097023c784c2bd040a2005a5070ed6f3a4abf13929377a9e39fab1390
SHA51213c714244ec56beeb202279e4109d59c2a43c3cf29f90a374a751c04fd472b45228ca5a0178f41109ed863dbd34e0879e4a21f5e38ae3d89559c57e6be990a9b
-
C:\Users\Admin\AppData\Local\Temp\RegSvcs.exeFilesize
44KB
MD59d352bc46709f0cb5ec974633a0c3c94
SHA11969771b2f022f9a86d77ac4d4d239becdf08d07
SHA2562c1eeb7097023c784c2bd040a2005a5070ed6f3a4abf13929377a9e39fab1390
SHA51213c714244ec56beeb202279e4109d59c2a43c3cf29f90a374a751c04fd472b45228ca5a0178f41109ed863dbd34e0879e4a21f5e38ae3d89559c57e6be990a9b
-
C:\Users\Admin\AppData\Local\Temp\RegSvcs.exeFilesize
44KB
MD59d352bc46709f0cb5ec974633a0c3c94
SHA11969771b2f022f9a86d77ac4d4d239becdf08d07
SHA2562c1eeb7097023c784c2bd040a2005a5070ed6f3a4abf13929377a9e39fab1390
SHA51213c714244ec56beeb202279e4109d59c2a43c3cf29f90a374a751c04fd472b45228ca5a0178f41109ed863dbd34e0879e4a21f5e38ae3d89559c57e6be990a9b
-
C:\Users\Admin\AppData\Local\Temp\RegSvcs.exeFilesize
44KB
MD59d352bc46709f0cb5ec974633a0c3c94
SHA11969771b2f022f9a86d77ac4d4d239becdf08d07
SHA2562c1eeb7097023c784c2bd040a2005a5070ed6f3a4abf13929377a9e39fab1390
SHA51213c714244ec56beeb202279e4109d59c2a43c3cf29f90a374a751c04fd472b45228ca5a0178f41109ed863dbd34e0879e4a21f5e38ae3d89559c57e6be990a9b
-
C:\Users\Admin\AppData\Local\Temp\RegSvcs.exeFilesize
44KB
MD59d352bc46709f0cb5ec974633a0c3c94
SHA11969771b2f022f9a86d77ac4d4d239becdf08d07
SHA2562c1eeb7097023c784c2bd040a2005a5070ed6f3a4abf13929377a9e39fab1390
SHA51213c714244ec56beeb202279e4109d59c2a43c3cf29f90a374a751c04fd472b45228ca5a0178f41109ed863dbd34e0879e4a21f5e38ae3d89559c57e6be990a9b
-
C:\Users\Admin\AppData\Local\Temp\RegSvcs.exeFilesize
44KB
MD59d352bc46709f0cb5ec974633a0c3c94
SHA11969771b2f022f9a86d77ac4d4d239becdf08d07
SHA2562c1eeb7097023c784c2bd040a2005a5070ed6f3a4abf13929377a9e39fab1390
SHA51213c714244ec56beeb202279e4109d59c2a43c3cf29f90a374a751c04fd472b45228ca5a0178f41109ed863dbd34e0879e4a21f5e38ae3d89559c57e6be990a9b
-
C:\Users\Admin\AppData\Local\Temp\RegSvcs.exeFilesize
44KB
MD59d352bc46709f0cb5ec974633a0c3c94
SHA11969771b2f022f9a86d77ac4d4d239becdf08d07
SHA2562c1eeb7097023c784c2bd040a2005a5070ed6f3a4abf13929377a9e39fab1390
SHA51213c714244ec56beeb202279e4109d59c2a43c3cf29f90a374a751c04fd472b45228ca5a0178f41109ed863dbd34e0879e4a21f5e38ae3d89559c57e6be990a9b
-
C:\Users\Admin\AppData\Local\Temp\RegSvcs.exeFilesize
44KB
MD59d352bc46709f0cb5ec974633a0c3c94
SHA11969771b2f022f9a86d77ac4d4d239becdf08d07
SHA2562c1eeb7097023c784c2bd040a2005a5070ed6f3a4abf13929377a9e39fab1390
SHA51213c714244ec56beeb202279e4109d59c2a43c3cf29f90a374a751c04fd472b45228ca5a0178f41109ed863dbd34e0879e4a21f5e38ae3d89559c57e6be990a9b
-
C:\Users\Admin\AppData\Local\Temp\RegSvcs.exeFilesize
44KB
MD59d352bc46709f0cb5ec974633a0c3c94
SHA11969771b2f022f9a86d77ac4d4d239becdf08d07
SHA2562c1eeb7097023c784c2bd040a2005a5070ed6f3a4abf13929377a9e39fab1390
SHA51213c714244ec56beeb202279e4109d59c2a43c3cf29f90a374a751c04fd472b45228ca5a0178f41109ed863dbd34e0879e4a21f5e38ae3d89559c57e6be990a9b
-
C:\Users\Admin\AppData\Local\Temp\RegSvcs.exeFilesize
44KB
MD59d352bc46709f0cb5ec974633a0c3c94
SHA11969771b2f022f9a86d77ac4d4d239becdf08d07
SHA2562c1eeb7097023c784c2bd040a2005a5070ed6f3a4abf13929377a9e39fab1390
SHA51213c714244ec56beeb202279e4109d59c2a43c3cf29f90a374a751c04fd472b45228ca5a0178f41109ed863dbd34e0879e4a21f5e38ae3d89559c57e6be990a9b
-
C:\Users\Admin\AppData\Local\Temp\RegSvcs.exeFilesize
44KB
MD59d352bc46709f0cb5ec974633a0c3c94
SHA11969771b2f022f9a86d77ac4d4d239becdf08d07
SHA2562c1eeb7097023c784c2bd040a2005a5070ed6f3a4abf13929377a9e39fab1390
SHA51213c714244ec56beeb202279e4109d59c2a43c3cf29f90a374a751c04fd472b45228ca5a0178f41109ed863dbd34e0879e4a21f5e38ae3d89559c57e6be990a9b
-
C:\Users\Admin\AppData\Local\Temp\RegSvcs.exeFilesize
44KB
MD59d352bc46709f0cb5ec974633a0c3c94
SHA11969771b2f022f9a86d77ac4d4d239becdf08d07
SHA2562c1eeb7097023c784c2bd040a2005a5070ed6f3a4abf13929377a9e39fab1390
SHA51213c714244ec56beeb202279e4109d59c2a43c3cf29f90a374a751c04fd472b45228ca5a0178f41109ed863dbd34e0879e4a21f5e38ae3d89559c57e6be990a9b
-
C:\Users\Admin\AppData\Local\Temp\RegSvcs.exeFilesize
44KB
MD59d352bc46709f0cb5ec974633a0c3c94
SHA11969771b2f022f9a86d77ac4d4d239becdf08d07
SHA2562c1eeb7097023c784c2bd040a2005a5070ed6f3a4abf13929377a9e39fab1390
SHA51213c714244ec56beeb202279e4109d59c2a43c3cf29f90a374a751c04fd472b45228ca5a0178f41109ed863dbd34e0879e4a21f5e38ae3d89559c57e6be990a9b
-
C:\Users\Admin\AppData\Local\Temp\RegSvcs.exeFilesize
44KB
MD59d352bc46709f0cb5ec974633a0c3c94
SHA11969771b2f022f9a86d77ac4d4d239becdf08d07
SHA2562c1eeb7097023c784c2bd040a2005a5070ed6f3a4abf13929377a9e39fab1390
SHA51213c714244ec56beeb202279e4109d59c2a43c3cf29f90a374a751c04fd472b45228ca5a0178f41109ed863dbd34e0879e4a21f5e38ae3d89559c57e6be990a9b
-
C:\Users\Admin\AppData\Local\Temp\RegSvcs.exeFilesize
44KB
MD59d352bc46709f0cb5ec974633a0c3c94
SHA11969771b2f022f9a86d77ac4d4d239becdf08d07
SHA2562c1eeb7097023c784c2bd040a2005a5070ed6f3a4abf13929377a9e39fab1390
SHA51213c714244ec56beeb202279e4109d59c2a43c3cf29f90a374a751c04fd472b45228ca5a0178f41109ed863dbd34e0879e4a21f5e38ae3d89559c57e6be990a9b
-
C:\Users\Admin\AppData\Local\Temp\RegSvcs.exeFilesize
44KB
MD59d352bc46709f0cb5ec974633a0c3c94
SHA11969771b2f022f9a86d77ac4d4d239becdf08d07
SHA2562c1eeb7097023c784c2bd040a2005a5070ed6f3a4abf13929377a9e39fab1390
SHA51213c714244ec56beeb202279e4109d59c2a43c3cf29f90a374a751c04fd472b45228ca5a0178f41109ed863dbd34e0879e4a21f5e38ae3d89559c57e6be990a9b
-
C:\Users\Admin\AppData\Local\Temp\RegSvcs.exeFilesize
44KB
MD59d352bc46709f0cb5ec974633a0c3c94
SHA11969771b2f022f9a86d77ac4d4d239becdf08d07
SHA2562c1eeb7097023c784c2bd040a2005a5070ed6f3a4abf13929377a9e39fab1390
SHA51213c714244ec56beeb202279e4109d59c2a43c3cf29f90a374a751c04fd472b45228ca5a0178f41109ed863dbd34e0879e4a21f5e38ae3d89559c57e6be990a9b
-
C:\Users\Admin\AppData\Local\Temp\RegSvcs.exeFilesize
44KB
MD59d352bc46709f0cb5ec974633a0c3c94
SHA11969771b2f022f9a86d77ac4d4d239becdf08d07
SHA2562c1eeb7097023c784c2bd040a2005a5070ed6f3a4abf13929377a9e39fab1390
SHA51213c714244ec56beeb202279e4109d59c2a43c3cf29f90a374a751c04fd472b45228ca5a0178f41109ed863dbd34e0879e4a21f5e38ae3d89559c57e6be990a9b
-
C:\Users\Admin\AppData\Local\Temp\RegSvcs.exeFilesize
44KB
MD59d352bc46709f0cb5ec974633a0c3c94
SHA11969771b2f022f9a86d77ac4d4d239becdf08d07
SHA2562c1eeb7097023c784c2bd040a2005a5070ed6f3a4abf13929377a9e39fab1390
SHA51213c714244ec56beeb202279e4109d59c2a43c3cf29f90a374a751c04fd472b45228ca5a0178f41109ed863dbd34e0879e4a21f5e38ae3d89559c57e6be990a9b
-
C:\Users\Admin\AppData\Local\Temp\RegSvcs.exeFilesize
44KB
MD59d352bc46709f0cb5ec974633a0c3c94
SHA11969771b2f022f9a86d77ac4d4d239becdf08d07
SHA2562c1eeb7097023c784c2bd040a2005a5070ed6f3a4abf13929377a9e39fab1390
SHA51213c714244ec56beeb202279e4109d59c2a43c3cf29f90a374a751c04fd472b45228ca5a0178f41109ed863dbd34e0879e4a21f5e38ae3d89559c57e6be990a9b
-
C:\Users\Admin\AppData\Local\Temp\RegSvcs.exeFilesize
44KB
MD59d352bc46709f0cb5ec974633a0c3c94
SHA11969771b2f022f9a86d77ac4d4d239becdf08d07
SHA2562c1eeb7097023c784c2bd040a2005a5070ed6f3a4abf13929377a9e39fab1390
SHA51213c714244ec56beeb202279e4109d59c2a43c3cf29f90a374a751c04fd472b45228ca5a0178f41109ed863dbd34e0879e4a21f5e38ae3d89559c57e6be990a9b
-
C:\Users\Admin\AppData\Local\Temp\RegSvcs.exeFilesize
44KB
MD59d352bc46709f0cb5ec974633a0c3c94
SHA11969771b2f022f9a86d77ac4d4d239becdf08d07
SHA2562c1eeb7097023c784c2bd040a2005a5070ed6f3a4abf13929377a9e39fab1390
SHA51213c714244ec56beeb202279e4109d59c2a43c3cf29f90a374a751c04fd472b45228ca5a0178f41109ed863dbd34e0879e4a21f5e38ae3d89559c57e6be990a9b
-
C:\Users\Admin\AppData\Local\Temp\RegSvcs.exeFilesize
44KB
MD59d352bc46709f0cb5ec974633a0c3c94
SHA11969771b2f022f9a86d77ac4d4d239becdf08d07
SHA2562c1eeb7097023c784c2bd040a2005a5070ed6f3a4abf13929377a9e39fab1390
SHA51213c714244ec56beeb202279e4109d59c2a43c3cf29f90a374a751c04fd472b45228ca5a0178f41109ed863dbd34e0879e4a21f5e38ae3d89559c57e6be990a9b
-
C:\Users\Admin\AppData\Roaming\Install\Host.exeFilesize
44KB
MD59d352bc46709f0cb5ec974633a0c3c94
SHA11969771b2f022f9a86d77ac4d4d239becdf08d07
SHA2562c1eeb7097023c784c2bd040a2005a5070ed6f3a4abf13929377a9e39fab1390
SHA51213c714244ec56beeb202279e4109d59c2a43c3cf29f90a374a751c04fd472b45228ca5a0178f41109ed863dbd34e0879e4a21f5e38ae3d89559c57e6be990a9b
-
C:\Users\Admin\AppData\Roaming\Install\Host.exeFilesize
44KB
MD59d352bc46709f0cb5ec974633a0c3c94
SHA11969771b2f022f9a86d77ac4d4d239becdf08d07
SHA2562c1eeb7097023c784c2bd040a2005a5070ed6f3a4abf13929377a9e39fab1390
SHA51213c714244ec56beeb202279e4109d59c2a43c3cf29f90a374a751c04fd472b45228ca5a0178f41109ed863dbd34e0879e4a21f5e38ae3d89559c57e6be990a9b
-
C:\Users\Admin\AppData\Roaming\Install\Host.exeFilesize
44KB
MD59d352bc46709f0cb5ec974633a0c3c94
SHA11969771b2f022f9a86d77ac4d4d239becdf08d07
SHA2562c1eeb7097023c784c2bd040a2005a5070ed6f3a4abf13929377a9e39fab1390
SHA51213c714244ec56beeb202279e4109d59c2a43c3cf29f90a374a751c04fd472b45228ca5a0178f41109ed863dbd34e0879e4a21f5e38ae3d89559c57e6be990a9b
-
C:\Users\Admin\AppData\Roaming\Install\Host.exeFilesize
44KB
MD59d352bc46709f0cb5ec974633a0c3c94
SHA11969771b2f022f9a86d77ac4d4d239becdf08d07
SHA2562c1eeb7097023c784c2bd040a2005a5070ed6f3a4abf13929377a9e39fab1390
SHA51213c714244ec56beeb202279e4109d59c2a43c3cf29f90a374a751c04fd472b45228ca5a0178f41109ed863dbd34e0879e4a21f5e38ae3d89559c57e6be990a9b
-
C:\Users\Admin\AppData\Roaming\Install\Host.exeFilesize
44KB
MD59d352bc46709f0cb5ec974633a0c3c94
SHA11969771b2f022f9a86d77ac4d4d239becdf08d07
SHA2562c1eeb7097023c784c2bd040a2005a5070ed6f3a4abf13929377a9e39fab1390
SHA51213c714244ec56beeb202279e4109d59c2a43c3cf29f90a374a751c04fd472b45228ca5a0178f41109ed863dbd34e0879e4a21f5e38ae3d89559c57e6be990a9b
-
C:\Users\Admin\AppData\Roaming\Install\Host.exeFilesize
44KB
MD59d352bc46709f0cb5ec974633a0c3c94
SHA11969771b2f022f9a86d77ac4d4d239becdf08d07
SHA2562c1eeb7097023c784c2bd040a2005a5070ed6f3a4abf13929377a9e39fab1390
SHA51213c714244ec56beeb202279e4109d59c2a43c3cf29f90a374a751c04fd472b45228ca5a0178f41109ed863dbd34e0879e4a21f5e38ae3d89559c57e6be990a9b
-
C:\Users\Admin\AppData\Roaming\Install\Host.exeFilesize
44KB
MD59d352bc46709f0cb5ec974633a0c3c94
SHA11969771b2f022f9a86d77ac4d4d239becdf08d07
SHA2562c1eeb7097023c784c2bd040a2005a5070ed6f3a4abf13929377a9e39fab1390
SHA51213c714244ec56beeb202279e4109d59c2a43c3cf29f90a374a751c04fd472b45228ca5a0178f41109ed863dbd34e0879e4a21f5e38ae3d89559c57e6be990a9b
-
C:\Users\Admin\AppData\Roaming\Install\Host.exeFilesize
44KB
MD59d352bc46709f0cb5ec974633a0c3c94
SHA11969771b2f022f9a86d77ac4d4d239becdf08d07
SHA2562c1eeb7097023c784c2bd040a2005a5070ed6f3a4abf13929377a9e39fab1390
SHA51213c714244ec56beeb202279e4109d59c2a43c3cf29f90a374a751c04fd472b45228ca5a0178f41109ed863dbd34e0879e4a21f5e38ae3d89559c57e6be990a9b
-
C:\Users\Admin\AppData\Roaming\Install\Host.exeFilesize
44KB
MD59d352bc46709f0cb5ec974633a0c3c94
SHA11969771b2f022f9a86d77ac4d4d239becdf08d07
SHA2562c1eeb7097023c784c2bd040a2005a5070ed6f3a4abf13929377a9e39fab1390
SHA51213c714244ec56beeb202279e4109d59c2a43c3cf29f90a374a751c04fd472b45228ca5a0178f41109ed863dbd34e0879e4a21f5e38ae3d89559c57e6be990a9b
-
C:\Users\Admin\AppData\Roaming\Install\Host.exeFilesize
44KB
MD59d352bc46709f0cb5ec974633a0c3c94
SHA11969771b2f022f9a86d77ac4d4d239becdf08d07
SHA2562c1eeb7097023c784c2bd040a2005a5070ed6f3a4abf13929377a9e39fab1390
SHA51213c714244ec56beeb202279e4109d59c2a43c3cf29f90a374a751c04fd472b45228ca5a0178f41109ed863dbd34e0879e4a21f5e38ae3d89559c57e6be990a9b
-
C:\Users\Admin\AppData\Roaming\Install\Host.exeFilesize
44KB
MD59d352bc46709f0cb5ec974633a0c3c94
SHA11969771b2f022f9a86d77ac4d4d239becdf08d07
SHA2562c1eeb7097023c784c2bd040a2005a5070ed6f3a4abf13929377a9e39fab1390
SHA51213c714244ec56beeb202279e4109d59c2a43c3cf29f90a374a751c04fd472b45228ca5a0178f41109ed863dbd34e0879e4a21f5e38ae3d89559c57e6be990a9b
-
C:\Users\Admin\AppData\Roaming\Install\Host.exeFilesize
44KB
MD59d352bc46709f0cb5ec974633a0c3c94
SHA11969771b2f022f9a86d77ac4d4d239becdf08d07
SHA2562c1eeb7097023c784c2bd040a2005a5070ed6f3a4abf13929377a9e39fab1390
SHA51213c714244ec56beeb202279e4109d59c2a43c3cf29f90a374a751c04fd472b45228ca5a0178f41109ed863dbd34e0879e4a21f5e38ae3d89559c57e6be990a9b
-
C:\Users\Admin\AppData\Roaming\Install\Host.exeFilesize
44KB
MD59d352bc46709f0cb5ec974633a0c3c94
SHA11969771b2f022f9a86d77ac4d4d239becdf08d07
SHA2562c1eeb7097023c784c2bd040a2005a5070ed6f3a4abf13929377a9e39fab1390
SHA51213c714244ec56beeb202279e4109d59c2a43c3cf29f90a374a751c04fd472b45228ca5a0178f41109ed863dbd34e0879e4a21f5e38ae3d89559c57e6be990a9b
-
C:\Users\Admin\AppData\Roaming\Install\Host.exeFilesize
44KB
MD59d352bc46709f0cb5ec974633a0c3c94
SHA11969771b2f022f9a86d77ac4d4d239becdf08d07
SHA2562c1eeb7097023c784c2bd040a2005a5070ed6f3a4abf13929377a9e39fab1390
SHA51213c714244ec56beeb202279e4109d59c2a43c3cf29f90a374a751c04fd472b45228ca5a0178f41109ed863dbd34e0879e4a21f5e38ae3d89559c57e6be990a9b
-
C:\Users\Admin\AppData\Roaming\Install\Host.exeFilesize
44KB
MD59d352bc46709f0cb5ec974633a0c3c94
SHA11969771b2f022f9a86d77ac4d4d239becdf08d07
SHA2562c1eeb7097023c784c2bd040a2005a5070ed6f3a4abf13929377a9e39fab1390
SHA51213c714244ec56beeb202279e4109d59c2a43c3cf29f90a374a751c04fd472b45228ca5a0178f41109ed863dbd34e0879e4a21f5e38ae3d89559c57e6be990a9b
-
C:\Users\Admin\AppData\Roaming\Install\Host.exeFilesize
44KB
MD59d352bc46709f0cb5ec974633a0c3c94
SHA11969771b2f022f9a86d77ac4d4d239becdf08d07
SHA2562c1eeb7097023c784c2bd040a2005a5070ed6f3a4abf13929377a9e39fab1390
SHA51213c714244ec56beeb202279e4109d59c2a43c3cf29f90a374a751c04fd472b45228ca5a0178f41109ed863dbd34e0879e4a21f5e38ae3d89559c57e6be990a9b
-
C:\Users\Admin\AppData\Roaming\Install\Host.exeFilesize
44KB
MD59d352bc46709f0cb5ec974633a0c3c94
SHA11969771b2f022f9a86d77ac4d4d239becdf08d07
SHA2562c1eeb7097023c784c2bd040a2005a5070ed6f3a4abf13929377a9e39fab1390
SHA51213c714244ec56beeb202279e4109d59c2a43c3cf29f90a374a751c04fd472b45228ca5a0178f41109ed863dbd34e0879e4a21f5e38ae3d89559c57e6be990a9b
-
C:\Users\Admin\AppData\Roaming\Install\Host.exeFilesize
44KB
MD59d352bc46709f0cb5ec974633a0c3c94
SHA11969771b2f022f9a86d77ac4d4d239becdf08d07
SHA2562c1eeb7097023c784c2bd040a2005a5070ed6f3a4abf13929377a9e39fab1390
SHA51213c714244ec56beeb202279e4109d59c2a43c3cf29f90a374a751c04fd472b45228ca5a0178f41109ed863dbd34e0879e4a21f5e38ae3d89559c57e6be990a9b
-
C:\Users\Admin\AppData\Roaming\Install\Host.exeFilesize
44KB
MD59d352bc46709f0cb5ec974633a0c3c94
SHA11969771b2f022f9a86d77ac4d4d239becdf08d07
SHA2562c1eeb7097023c784c2bd040a2005a5070ed6f3a4abf13929377a9e39fab1390
SHA51213c714244ec56beeb202279e4109d59c2a43c3cf29f90a374a751c04fd472b45228ca5a0178f41109ed863dbd34e0879e4a21f5e38ae3d89559c57e6be990a9b
-
C:\Users\Admin\AppData\Roaming\Install\Host.exeFilesize
44KB
MD59d352bc46709f0cb5ec974633a0c3c94
SHA11969771b2f022f9a86d77ac4d4d239becdf08d07
SHA2562c1eeb7097023c784c2bd040a2005a5070ed6f3a4abf13929377a9e39fab1390
SHA51213c714244ec56beeb202279e4109d59c2a43c3cf29f90a374a751c04fd472b45228ca5a0178f41109ed863dbd34e0879e4a21f5e38ae3d89559c57e6be990a9b
-
C:\Users\Admin\AppData\Roaming\Install\Host.exeFilesize
44KB
MD59d352bc46709f0cb5ec974633a0c3c94
SHA11969771b2f022f9a86d77ac4d4d239becdf08d07
SHA2562c1eeb7097023c784c2bd040a2005a5070ed6f3a4abf13929377a9e39fab1390
SHA51213c714244ec56beeb202279e4109d59c2a43c3cf29f90a374a751c04fd472b45228ca5a0178f41109ed863dbd34e0879e4a21f5e38ae3d89559c57e6be990a9b
-
C:\Users\Admin\AppData\Roaming\Install\Host.exeFilesize
44KB
MD59d352bc46709f0cb5ec974633a0c3c94
SHA11969771b2f022f9a86d77ac4d4d239becdf08d07
SHA2562c1eeb7097023c784c2bd040a2005a5070ed6f3a4abf13929377a9e39fab1390
SHA51213c714244ec56beeb202279e4109d59c2a43c3cf29f90a374a751c04fd472b45228ca5a0178f41109ed863dbd34e0879e4a21f5e38ae3d89559c57e6be990a9b
-
memory/8-301-0x0000000000000000-mapping.dmp
-
memory/220-310-0x0000000000000000-mapping.dmp
-
memory/228-359-0x00000000007A0000-0x0000000000D76000-memory.dmpFilesize
5MB
-
memory/380-239-0x0000000000000000-mapping.dmp
-
memory/380-363-0x0000000000770000-0x0000000000D66000-memory.dmpFilesize
5MB
-
memory/544-172-0x0000000000C20000-0x0000000001216000-memory.dmpFilesize
5MB
-
memory/544-169-0x0000000000C2242D-mapping.dmp
-
memory/544-168-0x0000000000C20000-0x0000000001216000-memory.dmpFilesize
5MB
-
memory/544-174-0x0000000000C20000-0x0000000001216000-memory.dmpFilesize
5MB
-
memory/620-318-0x0000000000000000-mapping.dmp
-
memory/664-346-0x0000000000600000-0x0000000000C8D000-memory.dmpFilesize
6MB
-
memory/664-345-0x0000000000600000-0x0000000000C8D000-memory.dmpFilesize
6MB
-
memory/664-355-0x0000000000600000-0x0000000000C8D000-memory.dmpFilesize
6MB
-
memory/664-343-0x0000000000600000-0x0000000000C8D000-memory.dmpFilesize
6MB
-
memory/736-175-0x0000000000000000-mapping.dmp
-
memory/768-243-0x0000000000000000-mapping.dmp
-
memory/820-278-0x0000000000000000-mapping.dmp
-
memory/1040-218-0x0000000000000000-mapping.dmp
-
memory/1052-139-0x0000000000D0242D-mapping.dmp
-
memory/1052-138-0x0000000000D00000-0x0000000001382000-memory.dmpFilesize
6MB
-
memory/1052-146-0x0000000000D00000-0x0000000001382000-memory.dmpFilesize
6MB
-
memory/1052-142-0x0000000000D00000-0x0000000001382000-memory.dmpFilesize
6MB
-
memory/1060-148-0x00000000003D0000-0x00000000003DE000-memory.dmpFilesize
56KB
-
memory/1060-144-0x0000000000000000-mapping.dmp
-
memory/1060-149-0x0000000004CA0000-0x0000000004CDC000-memory.dmpFilesize
240KB
-
memory/1216-226-0x0000000000000000-mapping.dmp
-
memory/1260-221-0x0000000000D0242D-mapping.dmp
-
memory/1260-220-0x0000000000D00000-0x00000000013A3000-memory.dmpFilesize
6MB
-
memory/1260-228-0x0000000000D00000-0x00000000013A3000-memory.dmpFilesize
6MB
-
memory/1260-224-0x0000000000D00000-0x00000000013A3000-memory.dmpFilesize
6MB
-
memory/1432-200-0x0000000000000000-mapping.dmp
-
memory/1440-309-0x0000000000000000-mapping.dmp
-
memory/1468-256-0x0000000000000000-mapping.dmp
-
memory/1484-244-0x0000000000000000-mapping.dmp
-
memory/1496-263-0x0000000000C00000-0x00000000010B0000-memory.dmpFilesize
4MB
-
memory/1496-259-0x0000000000C00000-0x00000000010B0000-memory.dmpFilesize
4MB
-
memory/1496-260-0x0000000000C0242D-mapping.dmp
-
memory/1496-265-0x0000000000C00000-0x00000000010B0000-memory.dmpFilesize
4MB
-
memory/1580-230-0x0000000000000000-mapping.dmp
-
memory/1720-213-0x0000000000000000-mapping.dmp
-
memory/1772-372-0x00000000009B0000-0x000000000109F000-memory.dmpFilesize
6MB
-
memory/1800-333-0x0000000001200000-0x0000000001747000-memory.dmpFilesize
5MB
-
memory/1800-331-0x0000000001200000-0x0000000001747000-memory.dmpFilesize
5MB
-
memory/1800-334-0x0000000001200000-0x0000000001747000-memory.dmpFilesize
5MB
-
memory/1820-207-0x0000000000710000-0x0000000000E19000-memory.dmpFilesize
7MB
-
memory/1820-211-0x0000000000710000-0x0000000000E19000-memory.dmpFilesize
7MB
-
memory/1820-208-0x000000000071242D-mapping.dmp
-
memory/1820-216-0x0000000000710000-0x0000000000E19000-memory.dmpFilesize
7MB
-
memory/1848-165-0x0000000000000000-mapping.dmp
-
memory/1864-194-0x0000000000700000-0x0000000000BCF000-memory.dmpFilesize
4MB
-
memory/1864-202-0x0000000000700000-0x0000000000BCF000-memory.dmpFilesize
4MB
-
memory/1864-195-0x000000000070242D-mapping.dmp
-
memory/1864-198-0x0000000000700000-0x0000000000BCF000-memory.dmpFilesize
4MB
-
memory/1880-179-0x0000000000000000-mapping.dmp
-
memory/2104-342-0x0000000000F80000-0x000000000165A000-memory.dmpFilesize
6MB
-
memory/2104-341-0x0000000000F80000-0x000000000165A000-memory.dmpFilesize
6MB
-
memory/2104-339-0x0000000000F80000-0x000000000165A000-memory.dmpFilesize
6MB
-
memory/2128-311-0x0000000000000000-mapping.dmp
-
memory/2220-293-0x0000000000000000-mapping.dmp
-
memory/2244-204-0x0000000000000000-mapping.dmp
-
memory/2272-299-0x0000000000BA0000-0x0000000001143000-memory.dmpFilesize
5MB
-
memory/2272-280-0x0000000000BA0000-0x0000000001143000-memory.dmpFilesize
5MB
-
memory/2272-276-0x0000000000BA0000-0x0000000001143000-memory.dmpFilesize
5MB
-
memory/2272-272-0x0000000000BA0000-0x0000000001143000-memory.dmpFilesize
5MB
-
memory/2272-273-0x0000000000BA242D-mapping.dmp
-
memory/2292-286-0x0000000000B0242D-mapping.dmp
-
memory/2292-285-0x0000000000B00000-0x0000000001220000-memory.dmpFilesize
7MB
-
memory/2292-291-0x0000000000B00000-0x0000000001220000-memory.dmpFilesize
7MB
-
memory/2292-289-0x0000000000B00000-0x0000000001220000-memory.dmpFilesize
7MB
-
memory/2372-364-0x0000000000600000-0x0000000000BA9000-memory.dmpFilesize
5MB
-
memory/2372-354-0x0000000000600000-0x0000000000BA9000-memory.dmpFilesize
5MB
-
memory/2464-237-0x0000000000500000-0x0000000000C2F000-memory.dmpFilesize
7MB
-
memory/2464-242-0x0000000000500000-0x0000000000C2F000-memory.dmpFilesize
7MB
-
memory/2464-234-0x000000000050242D-mapping.dmp
-
memory/2464-233-0x0000000000500000-0x0000000000C2F000-memory.dmpFilesize
7MB
-
memory/2492-315-0x0000000000C00000-0x00000000011BE000-memory.dmpFilesize
5MB
-
memory/2492-316-0x0000000000C00000-0x00000000011BE000-memory.dmpFilesize
5MB
-
memory/2492-312-0x0000000000C00000-0x00000000011BE000-memory.dmpFilesize
5MB
-
memory/2492-313-0x0000000000C0242D-mapping.dmp
-
memory/2544-303-0x0000000000000000-mapping.dmp
-
memory/2656-152-0x0000000000000000-mapping.dmp
-
memory/2800-330-0x0000000000900000-0x0000000000EEF000-memory.dmpFilesize
5MB
-
memory/2800-329-0x0000000000900000-0x0000000000EEF000-memory.dmpFilesize
5MB
-
memory/2800-327-0x0000000000900000-0x0000000000EEF000-memory.dmpFilesize
5MB
-
memory/2812-160-0x0000000000000000-mapping.dmp
-
memory/2884-337-0x0000000000760000-0x0000000000D6B000-memory.dmpFilesize
6MB
-
memory/2884-338-0x0000000000760000-0x0000000000D6B000-memory.dmpFilesize
6MB
-
memory/2884-335-0x0000000000760000-0x0000000000D6B000-memory.dmpFilesize
6MB
-
memory/3048-296-0x0000000000B2242D-mapping.dmp
-
memory/3048-295-0x0000000000B20000-0x0000000001216000-memory.dmpFilesize
6MB
-
memory/3048-300-0x0000000000B20000-0x0000000001216000-memory.dmpFilesize
6MB
-
memory/3048-298-0x0000000000B20000-0x0000000001216000-memory.dmpFilesize
6MB
-
memory/3300-178-0x0000000000000000-mapping.dmp
-
memory/3400-269-0x0000000000000000-mapping.dmp
-
memory/3492-308-0x0000000000700000-0x0000000000BD7000-memory.dmpFilesize
4MB
-
memory/3492-304-0x0000000000700000-0x0000000000BD7000-memory.dmpFilesize
4MB
-
memory/3492-305-0x000000000070242D-mapping.dmp
-
memory/3492-307-0x0000000000700000-0x0000000000BD7000-memory.dmpFilesize
4MB
-
memory/3500-187-0x0000000000000000-mapping.dmp
-
memory/3572-217-0x0000000000000000-mapping.dmp
-
memory/3756-132-0x0000000000000000-mapping.dmp
-
memory/3860-191-0x0000000000000000-mapping.dmp
-
memory/3896-282-0x0000000000000000-mapping.dmp
-
memory/3948-283-0x0000000000000000-mapping.dmp
-
memory/3956-325-0x0000000000000000-mapping.dmp
-
memory/4028-154-0x0000000000500000-0x0000000000B8A000-memory.dmpFilesize
6MB
-
memory/4028-162-0x0000000000500000-0x0000000000B8A000-memory.dmpFilesize
6MB
-
memory/4028-155-0x000000000050242D-mapping.dmp
-
memory/4028-158-0x0000000000500000-0x0000000000B8A000-memory.dmpFilesize
6MB
-
memory/4048-266-0x0000000000000000-mapping.dmp
-
memory/4152-294-0x0000000000000000-mapping.dmp
-
memory/4172-250-0x0000000000B00000-0x000000000122F000-memory.dmpFilesize
7MB
-
memory/4172-254-0x0000000000B00000-0x000000000122F000-memory.dmpFilesize
7MB
-
memory/4172-246-0x0000000000B00000-0x000000000122F000-memory.dmpFilesize
7MB
-
memory/4172-247-0x0000000000B0242D-mapping.dmp
-
memory/4200-319-0x0000000000000000-mapping.dmp
-
memory/4224-189-0x0000000000900000-0x0000000000E03000-memory.dmpFilesize
5MB
-
memory/4224-185-0x0000000000900000-0x0000000000E03000-memory.dmpFilesize
5MB
-
memory/4224-181-0x0000000000900000-0x0000000000E03000-memory.dmpFilesize
5MB
-
memory/4224-182-0x000000000090242D-mapping.dmp
-
memory/4288-166-0x0000000000000000-mapping.dmp
-
memory/4320-257-0x0000000000000000-mapping.dmp
-
memory/4344-317-0x0000000000000000-mapping.dmp
-
memory/4396-252-0x0000000000000000-mapping.dmp
-
memory/4420-150-0x0000000000000000-mapping.dmp
-
memory/4432-368-0x0000000001000000-0x0000000001586000-memory.dmpFilesize
5MB
-
memory/4464-205-0x0000000000000000-mapping.dmp
-
memory/4624-270-0x0000000000000000-mapping.dmp
-
memory/4676-326-0x0000000000000000-mapping.dmp
-
memory/4716-302-0x0000000000000000-mapping.dmp
-
memory/4868-192-0x0000000000000000-mapping.dmp
-
memory/4904-347-0x00000000005B0000-0x0000000000CA3000-memory.dmpFilesize
6MB
-
memory/4904-350-0x00000000005B0000-0x0000000000CA3000-memory.dmpFilesize
6MB
-
memory/4956-231-0x0000000000000000-mapping.dmp
-
memory/5016-324-0x0000000000630000-0x0000000000D5D000-memory.dmpFilesize
7MB
-
memory/5016-323-0x0000000000630000-0x0000000000D5D000-memory.dmpFilesize
7MB
-
memory/5016-320-0x0000000000630000-0x0000000000D5D000-memory.dmpFilesize
7MB
-
memory/5016-321-0x000000000063242D-mapping.dmp
-
memory/5096-292-0x0000000000000000-mapping.dmp