Analysis
-
max time kernel
152s -
max time network
166s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
04-10-2022 02:59
Static task
static1
Behavioral task
behavioral1
Sample
e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe
Resource
win10v2004-20220812-en
General
-
Target
e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe
-
Size
927KB
-
MD5
6d5416776bd0f3854a271722098d719e
-
SHA1
ff6876a938916d3010963136ef8b084f0d703b5d
-
SHA256
e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9
-
SHA512
3fb3335b5f22bd29373d83bede4fb9764f7f3699d43f9339ec4f24e25e07dfdb7b8666fcd223a8ac0bc11b56219c933a29db6a50f9a5105cdb229fb3a0ffd3fb
-
SSDEEP
24576:NZPMSPOdEDGD8Xa6x4LqKMg1tXykjBUyNts4cPq:DOv8XFKLx1tisNFh
Malware Config
Extracted
darkcomet
Guest16
109.104.87.142:2039
DC_MUTEX-X2C2Y2U
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
FcUN6bdTNYgc
-
install
true
-
offline_keylogger
true
-
persistence
true
-
reg_key
MicroUpdate
Extracted
darkcomet
CryptService
bezerkmedia.no-ip.biz:1606
DCMIN_MUTEX-97A2GT7
-
gencode
0n1bb6xQeSjV
-
install
false
-
offline_keylogger
true
-
persistence
false
Signatures
-
Modifies WinLogon for persistence 2 TTPs 3 IoCs
Processes:
reg.exee82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exereg.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Users\\Admin\\AppData\\Roaming\\G9hdquLc\\VHExTPh.exe,explorer.exe" reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\Documents\\MSDCSC\\msdcsc.exe" e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Users\\Admin\\AppData\\Roaming\\G9hdquLc\\VHExTPh.exe,explorer.exe" reg.exe -
Modifies firewall policy service 2 TTPs 64 IoCs
Processes:
msdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exee82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exedescription ioc process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile msdcsc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile msdcsc.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" msdcsc.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" msdcsc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile msdcsc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile msdcsc.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "0" msdcsc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile msdcsc.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "0" msdcsc.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "0" msdcsc.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "0" msdcsc.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" msdcsc.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "0" msdcsc.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "0" msdcsc.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" msdcsc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile msdcsc.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "0" msdcsc.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" msdcsc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" msdcsc.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" msdcsc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile msdcsc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile msdcsc.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" msdcsc.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "0" msdcsc.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" msdcsc.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "0" msdcsc.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "0" msdcsc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile msdcsc.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" msdcsc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile msdcsc.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "0" msdcsc.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" msdcsc.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" msdcsc.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "0" msdcsc.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "0" msdcsc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile msdcsc.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "0" msdcsc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile msdcsc.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "0" msdcsc.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "0" msdcsc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile msdcsc.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" msdcsc.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "0" msdcsc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile msdcsc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile msdcsc.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "0" msdcsc.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" msdcsc.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "0" msdcsc.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" msdcsc.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "0" e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile msdcsc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile msdcsc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile msdcsc.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "0" msdcsc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile msdcsc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile msdcsc.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" msdcsc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile msdcsc.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" msdcsc.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" msdcsc.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" msdcsc.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" msdcsc.exe -
Modifies security service 2 TTPs 22 IoCs
Processes:
msdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exee82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" msdcsc.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" msdcsc.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" msdcsc.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" msdcsc.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" msdcsc.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" msdcsc.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" msdcsc.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" msdcsc.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" msdcsc.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" msdcsc.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" msdcsc.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" msdcsc.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" msdcsc.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" msdcsc.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" msdcsc.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" msdcsc.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" msdcsc.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" msdcsc.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" msdcsc.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" msdcsc.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" msdcsc.exe -
Processes:
e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" msdcsc.exe -
Executes dropped EXE 36 IoCs
Processes:
CryptService.exe.exemsdcsc.exee82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exemsdcsc.exeCryptService.exe.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exepid process 3944 CryptService.exe.exe 3200 msdcsc.exe 2872 e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe 4924 msdcsc.exe 3508 CryptService.exe.exe 1432 msdcsc.exe 4836 msdcsc.exe 1100 msdcsc.exe 908 msdcsc.exe 4608 msdcsc.exe 5076 msdcsc.exe 3020 msdcsc.exe 4964 msdcsc.exe 1864 msdcsc.exe 4528 msdcsc.exe 2688 msdcsc.exe 3540 msdcsc.exe 3256 msdcsc.exe 2844 msdcsc.exe 2192 msdcsc.exe 1040 msdcsc.exe 3984 msdcsc.exe 3956 msdcsc.exe 1672 msdcsc.exe 376 msdcsc.exe 1420 msdcsc.exe 100 msdcsc.exe 3656 msdcsc.exe 3660 msdcsc.exe 3972 msdcsc.exe 4508 msdcsc.exe 3732 msdcsc.exe 2016 msdcsc.exe 4364 msdcsc.exe 2080 msdcsc.exe 1712 msdcsc.exe -
Sets file to hidden 1 TTPs 2 IoCs
Modifies file attributes to stop it showing in Explorer etc.
Processes:
attrib.exeattrib.exepid process 532 attrib.exe 4348 attrib.exe -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\CryptService.exe.exe upx C:\Users\Admin\AppData\Local\Temp\CryptService.exe.exe upx behavioral2/memory/3944-145-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/3944-160-0x0000000000400000-0x00000000004B7000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\CryptService.exe.exe upx behavioral2/memory/3508-180-0x0000000000400000-0x00000000004B7000-memory.dmp upx -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exee82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exemsdcsc.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation msdcsc.exe -
Processes:
msdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exee82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" msdcsc.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
msdcsc.exee82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exee82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exemsdcsc.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Users\\Admin\\Documents\\MSDCSC\\msdcsc.exe" msdcsc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Users\\Admin\\Documents\\MSDCSC\\msdcsc.exe" e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Users\\Admin\\Documents\\MSDCSC\\msdcsc.exe" e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Users\\Admin\\Documents\\MSDCSC\\msdcsc.exe" msdcsc.exe -
Suspicious use of SetThreadContext 34 IoCs
Processes:
e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exemsdcsc.exedescription pid process target process PID 1244 set thread context of 4132 1244 e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe PID 1244 set thread context of 2872 1244 e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe PID 3200 set thread context of 4924 3200 msdcsc.exe msdcsc.exe PID 3200 set thread context of 1432 3200 msdcsc.exe msdcsc.exe PID 3200 set thread context of 4836 3200 msdcsc.exe msdcsc.exe PID 3200 set thread context of 1100 3200 msdcsc.exe msdcsc.exe PID 3200 set thread context of 908 3200 msdcsc.exe msdcsc.exe PID 3200 set thread context of 4608 3200 msdcsc.exe msdcsc.exe PID 3200 set thread context of 5076 3200 msdcsc.exe msdcsc.exe PID 3200 set thread context of 3020 3200 msdcsc.exe msdcsc.exe PID 3200 set thread context of 4964 3200 msdcsc.exe msdcsc.exe PID 3200 set thread context of 1864 3200 msdcsc.exe msdcsc.exe PID 3200 set thread context of 4528 3200 msdcsc.exe msdcsc.exe PID 3200 set thread context of 2688 3200 msdcsc.exe msdcsc.exe PID 3200 set thread context of 3540 3200 msdcsc.exe msdcsc.exe PID 3200 set thread context of 3256 3200 msdcsc.exe msdcsc.exe PID 3200 set thread context of 2844 3200 msdcsc.exe msdcsc.exe PID 3200 set thread context of 2192 3200 msdcsc.exe msdcsc.exe PID 3200 set thread context of 1040 3200 msdcsc.exe msdcsc.exe PID 3200 set thread context of 3984 3200 msdcsc.exe msdcsc.exe PID 3200 set thread context of 3956 3200 msdcsc.exe msdcsc.exe PID 3200 set thread context of 1672 3200 msdcsc.exe msdcsc.exe PID 3200 set thread context of 376 3200 msdcsc.exe msdcsc.exe PID 3200 set thread context of 1420 3200 msdcsc.exe msdcsc.exe PID 3200 set thread context of 100 3200 msdcsc.exe msdcsc.exe PID 3200 set thread context of 3656 3200 msdcsc.exe msdcsc.exe PID 3200 set thread context of 3660 3200 msdcsc.exe msdcsc.exe PID 3200 set thread context of 3972 3200 msdcsc.exe msdcsc.exe PID 3200 set thread context of 4508 3200 msdcsc.exe msdcsc.exe PID 3200 set thread context of 3732 3200 msdcsc.exe msdcsc.exe PID 3200 set thread context of 2016 3200 msdcsc.exe msdcsc.exe PID 3200 set thread context of 4364 3200 msdcsc.exe msdcsc.exe PID 3200 set thread context of 2080 3200 msdcsc.exe msdcsc.exe PID 3200 set thread context of 1712 3200 msdcsc.exe msdcsc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 12 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 4580 1864 WerFault.exe msdcsc.exe 4348 1864 WerFault.exe msdcsc.exe 3056 2688 WerFault.exe msdcsc.exe 748 3256 WerFault.exe msdcsc.exe 3184 3956 WerFault.exe msdcsc.exe 3500 1672 WerFault.exe msdcsc.exe 4304 3660 WerFault.exe msdcsc.exe 3536 3972 WerFault.exe msdcsc.exe 2292 3732 WerFault.exe msdcsc.exe 1732 2016 WerFault.exe msdcsc.exe 3728 2080 WerFault.exe msdcsc.exe 4632 2080 WerFault.exe msdcsc.exe -
Modifies registry class 1 IoCs
Processes:
e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exemsdcsc.exepid process 1244 e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe 1244 e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe 1244 e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe 1244 e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe 3200 msdcsc.exe 3200 msdcsc.exe 3200 msdcsc.exe 3200 msdcsc.exe 3200 msdcsc.exe 3200 msdcsc.exe 3200 msdcsc.exe 3200 msdcsc.exe 3200 msdcsc.exe 3200 msdcsc.exe 3200 msdcsc.exe 3200 msdcsc.exe 3200 msdcsc.exe 3200 msdcsc.exe 3200 msdcsc.exe 3200 msdcsc.exe 3200 msdcsc.exe 3200 msdcsc.exe 3200 msdcsc.exe 3200 msdcsc.exe 3200 msdcsc.exe 3200 msdcsc.exe 3200 msdcsc.exe 3200 msdcsc.exe 3200 msdcsc.exe 3200 msdcsc.exe 3200 msdcsc.exe 3200 msdcsc.exe 3200 msdcsc.exe 3200 msdcsc.exe 3200 msdcsc.exe 3200 msdcsc.exe 3200 msdcsc.exe 3200 msdcsc.exe 3200 msdcsc.exe 3200 msdcsc.exe 3200 msdcsc.exe 3200 msdcsc.exe 3200 msdcsc.exe 3200 msdcsc.exe 3200 msdcsc.exe 3200 msdcsc.exe 3200 msdcsc.exe 3200 msdcsc.exe 3200 msdcsc.exe 3200 msdcsc.exe 3200 msdcsc.exe 3200 msdcsc.exe 3200 msdcsc.exe 3200 msdcsc.exe 3200 msdcsc.exe 3200 msdcsc.exe 3200 msdcsc.exe 3200 msdcsc.exe 3200 msdcsc.exe 3200 msdcsc.exe 3200 msdcsc.exe 3200 msdcsc.exe 3200 msdcsc.exe 3200 msdcsc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exepid process 2872 e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exeCryptService.exe.exee82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exee82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exedescription pid process Token: SeDebugPrivilege 1244 e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe Token: SeIncreaseQuotaPrivilege 3944 CryptService.exe.exe Token: SeIncreaseQuotaPrivilege 4132 e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe Token: SeSecurityPrivilege 3944 CryptService.exe.exe Token: SeSecurityPrivilege 4132 e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe Token: SeTakeOwnershipPrivilege 4132 e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe Token: SeLoadDriverPrivilege 4132 e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe Token: SeTakeOwnershipPrivilege 3944 CryptService.exe.exe Token: SeSystemProfilePrivilege 4132 e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe Token: SeLoadDriverPrivilege 3944 CryptService.exe.exe Token: SeSystemProfilePrivilege 3944 CryptService.exe.exe Token: SeSystemtimePrivilege 3944 CryptService.exe.exe Token: SeProfSingleProcessPrivilege 3944 CryptService.exe.exe Token: SeIncBasePriorityPrivilege 3944 CryptService.exe.exe Token: SeCreatePagefilePrivilege 3944 CryptService.exe.exe Token: SeBackupPrivilege 3944 CryptService.exe.exe Token: SeRestorePrivilege 3944 CryptService.exe.exe Token: SeShutdownPrivilege 3944 CryptService.exe.exe Token: SeDebugPrivilege 3944 CryptService.exe.exe Token: SeSystemEnvironmentPrivilege 3944 CryptService.exe.exe Token: SeChangeNotifyPrivilege 3944 CryptService.exe.exe Token: SeRemoteShutdownPrivilege 3944 CryptService.exe.exe Token: SeUndockPrivilege 3944 CryptService.exe.exe Token: SeManageVolumePrivilege 3944 CryptService.exe.exe Token: SeImpersonatePrivilege 3944 CryptService.exe.exe Token: SeCreateGlobalPrivilege 3944 CryptService.exe.exe Token: 33 3944 CryptService.exe.exe Token: 34 3944 CryptService.exe.exe Token: 35 3944 CryptService.exe.exe Token: 36 3944 CryptService.exe.exe Token: SeSystemtimePrivilege 4132 e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe Token: SeProfSingleProcessPrivilege 4132 e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe Token: SeIncBasePriorityPrivilege 4132 e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe Token: SeCreatePagefilePrivilege 4132 e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe Token: SeBackupPrivilege 4132 e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe Token: SeRestorePrivilege 4132 e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe Token: SeShutdownPrivilege 4132 e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe Token: SeDebugPrivilege 4132 e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe Token: SeSystemEnvironmentPrivilege 4132 e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe Token: SeChangeNotifyPrivilege 4132 e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe Token: SeRemoteShutdownPrivilege 4132 e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe Token: SeUndockPrivilege 4132 e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe Token: SeManageVolumePrivilege 4132 e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe Token: SeImpersonatePrivilege 4132 e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe Token: SeCreateGlobalPrivilege 4132 e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe Token: 33 4132 e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe Token: 34 4132 e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe Token: 35 4132 e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe Token: 36 4132 e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe Token: SeIncreaseQuotaPrivilege 2872 e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe Token: SeSecurityPrivilege 2872 e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe Token: SeTakeOwnershipPrivilege 2872 e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe Token: SeLoadDriverPrivilege 2872 e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe Token: SeSystemProfilePrivilege 2872 e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe Token: SeSystemtimePrivilege 2872 e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe Token: SeProfSingleProcessPrivilege 2872 e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe Token: SeIncBasePriorityPrivilege 2872 e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe Token: SeCreatePagefilePrivilege 2872 e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe Token: SeBackupPrivilege 2872 e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe Token: SeRestorePrivilege 2872 e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe Token: SeShutdownPrivilege 2872 e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe Token: SeDebugPrivilege 2872 e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe Token: SeSystemEnvironmentPrivilege 2872 e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe Token: SeChangeNotifyPrivilege 2872 e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
CryptService.exe.exee82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exepid process 3944 CryptService.exe.exe 2872 e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.execmd.exee82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.execmd.execmd.exee82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exedescription pid process target process PID 1244 wrote to memory of 4412 1244 e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe cmd.exe PID 1244 wrote to memory of 4412 1244 e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe cmd.exe PID 1244 wrote to memory of 4412 1244 e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe cmd.exe PID 4412 wrote to memory of 3028 4412 cmd.exe reg.exe PID 4412 wrote to memory of 3028 4412 cmd.exe reg.exe PID 4412 wrote to memory of 3028 4412 cmd.exe reg.exe PID 1244 wrote to memory of 4132 1244 e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe PID 1244 wrote to memory of 4132 1244 e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe PID 1244 wrote to memory of 4132 1244 e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe PID 1244 wrote to memory of 4132 1244 e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe PID 1244 wrote to memory of 4132 1244 e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe PID 1244 wrote to memory of 4132 1244 e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe PID 1244 wrote to memory of 4132 1244 e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe PID 1244 wrote to memory of 4132 1244 e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe PID 1244 wrote to memory of 4132 1244 e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe PID 1244 wrote to memory of 4132 1244 e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe PID 1244 wrote to memory of 4132 1244 e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe PID 1244 wrote to memory of 4132 1244 e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe PID 1244 wrote to memory of 3944 1244 e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe CryptService.exe.exe PID 1244 wrote to memory of 3944 1244 e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe CryptService.exe.exe PID 1244 wrote to memory of 3944 1244 e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe CryptService.exe.exe PID 4132 wrote to memory of 4992 4132 e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe cmd.exe PID 4132 wrote to memory of 4992 4132 e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe cmd.exe PID 4132 wrote to memory of 4992 4132 e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe cmd.exe PID 4132 wrote to memory of 5016 4132 e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe cmd.exe PID 4132 wrote to memory of 5016 4132 e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe cmd.exe PID 4132 wrote to memory of 5016 4132 e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe cmd.exe PID 4992 wrote to memory of 532 4992 cmd.exe attrib.exe PID 4992 wrote to memory of 532 4992 cmd.exe attrib.exe PID 4992 wrote to memory of 532 4992 cmd.exe attrib.exe PID 5016 wrote to memory of 4348 5016 cmd.exe attrib.exe PID 5016 wrote to memory of 4348 5016 cmd.exe attrib.exe PID 5016 wrote to memory of 4348 5016 cmd.exe attrib.exe PID 4132 wrote to memory of 3200 4132 e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe msdcsc.exe PID 4132 wrote to memory of 3200 4132 e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe msdcsc.exe PID 4132 wrote to memory of 3200 4132 e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe msdcsc.exe PID 1244 wrote to memory of 2872 1244 e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe PID 1244 wrote to memory of 2872 1244 e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe PID 1244 wrote to memory of 2872 1244 e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe PID 1244 wrote to memory of 2872 1244 e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe PID 1244 wrote to memory of 2872 1244 e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe PID 1244 wrote to memory of 2872 1244 e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe PID 1244 wrote to memory of 2872 1244 e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe PID 1244 wrote to memory of 2872 1244 e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe PID 1244 wrote to memory of 2872 1244 e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe PID 1244 wrote to memory of 2872 1244 e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe PID 1244 wrote to memory of 2872 1244 e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe PID 1244 wrote to memory of 2872 1244 e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe PID 2872 wrote to memory of 4004 2872 e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe notepad.exe PID 2872 wrote to memory of 4004 2872 e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe notepad.exe PID 2872 wrote to memory of 4004 2872 e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe notepad.exe PID 2872 wrote to memory of 4004 2872 e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe notepad.exe PID 2872 wrote to memory of 4004 2872 e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe notepad.exe PID 2872 wrote to memory of 4004 2872 e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe notepad.exe PID 2872 wrote to memory of 4004 2872 e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe notepad.exe PID 2872 wrote to memory of 4004 2872 e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe notepad.exe PID 2872 wrote to memory of 4004 2872 e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe notepad.exe PID 2872 wrote to memory of 4004 2872 e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe notepad.exe PID 2872 wrote to memory of 4004 2872 e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe notepad.exe PID 2872 wrote to memory of 4004 2872 e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe notepad.exe PID 2872 wrote to memory of 4004 2872 e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe notepad.exe PID 2872 wrote to memory of 4004 2872 e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe notepad.exe PID 2872 wrote to memory of 4004 2872 e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe notepad.exe PID 2872 wrote to memory of 4004 2872 e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe notepad.exe -
System policy modification 1 TTPs 64 IoCs
Processes:
msdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exee82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\CurrentVersion\Explorern\NoControlPanel = "1" msdcsc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\CurrentVersion msdcsc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\CurrentVersion\Explorern msdcsc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\CurrentVersion msdcsc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\CurrentVersion msdcsc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\CurrentVersion msdcsc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\CurrentVersion\Explorern msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\CurrentVersion\Explorern\NoControlPanel = "1" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\CurrentVersion\Explorern\NoControlPanel = "1" msdcsc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\CurrentVersion\Explorern msdcsc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\CurrentVersion\Explorern msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\CurrentVersion\Explorern\NoControlPanel = "1" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\CurrentVersion\Explorern\NoControlPanel = "1" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\CurrentVersion\Explorern\NoControlPanel = "1" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\CurrentVersion\Explorern\NoControlPanel = "1" msdcsc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\CurrentVersion\Explorern msdcsc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\CurrentVersion\Explorern msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\CurrentVersion\Explorern\NoControlPanel = "1" msdcsc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\CurrentVersion msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\CurrentVersion\Explorern\NoControlPanel = "1" msdcsc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\CurrentVersion msdcsc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\CurrentVersion msdcsc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\CurrentVersion\Explorern msdcsc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\CurrentVersion msdcsc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\CurrentVersion e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\CurrentVersion\Explorern\NoControlPanel = "1" msdcsc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\CurrentVersion\Explorern msdcsc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\CurrentVersion msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\CurrentVersion\Explorern\NoControlPanel = "1" msdcsc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\CurrentVersion\Explorern msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\CurrentVersion\Explorern\NoControlPanel = "1" msdcsc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\CurrentVersion msdcsc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\CurrentVersion\Explorern msdcsc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\CurrentVersion\Explorern msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\CurrentVersion\Explorern\NoControlPanel = "1" e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\CurrentVersion msdcsc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\CurrentVersion msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\CurrentVersion\Explorern\NoControlPanel = "1" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\CurrentVersion\Explorern\NoControlPanel = "1" msdcsc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\CurrentVersion\Explorern msdcsc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\CurrentVersion\Explorern msdcsc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\CurrentVersion msdcsc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\CurrentVersion\Explorern msdcsc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\CurrentVersion msdcsc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\CurrentVersion msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\CurrentVersion\Explorern\NoControlPanel = "1" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\CurrentVersion\Explorern\NoControlPanel = "1" msdcsc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\CurrentVersion msdcsc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\CurrentVersion\Explorern msdcsc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\CurrentVersion msdcsc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\CurrentVersion\Explorern msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\CurrentVersion\Explorern\NoControlPanel = "1" msdcsc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\CurrentVersion msdcsc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\CurrentVersion\Explorern msdcsc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\CurrentVersion msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\CurrentVersion\Explorern\NoControlPanel = "1" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\CurrentVersion\Explorern\NoControlPanel = "1" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\CurrentVersion\Explorern\NoControlPanel = "1" msdcsc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\CurrentVersion\Explorern msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\CurrentVersion\Explorern\NoControlPanel = "1" msdcsc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\CurrentVersion msdcsc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\CurrentVersion msdcsc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\CurrentVersion\Explorern msdcsc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\CurrentVersion\Explorern e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe -
Views/modifies file attributes 1 TTPs 2 IoCs
Processes:
attrib.exeattrib.exepid process 532 attrib.exe 4348 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe"C:\Users\Admin\AppData\Local\Temp\e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c reg add "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon" /f /v shell /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\G9hdquLc\VHExTPh.exe,explorer.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon" /f /v shell /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\G9hdquLc\VHExTPh.exe,explorer.exe"3⤵
- Modifies WinLogon for persistence
-
C:\Users\Admin\AppData\Local\Temp\e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe"C:\Users\Admin\AppData\Local\Temp\e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe"2⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Adds Run key to start application
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp\e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe" +s +h3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Local\Temp\e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe" +s +h4⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp" +s +h3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Local\Temp" +s +h4⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"3⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c reg add "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon" /f /v shell /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\G9hdquLc\VHExTPh.exe,explorer.exe"4⤵
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon" /f /v shell /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\G9hdquLc\VHExTPh.exe,explorer.exe"5⤵
- Modifies WinLogon for persistence
-
C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"4⤵
- Modifies firewall policy service
- Modifies security service
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- System policy modification
-
C:\Users\Admin\AppData\Local\Temp\CryptService.exe.exe"C:\Users\Admin\AppData\Local\Temp\CryptService.exe.exe"4⤵
- Executes dropped EXE
-
C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"4⤵
- Modifies firewall policy service
- Modifies security service
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- System policy modification
-
C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"4⤵
- Modifies firewall policy service
- Modifies security service
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- System policy modification
-
C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"4⤵
- Modifies firewall policy service
- Modifies security service
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- System policy modification
-
C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"4⤵
- Modifies firewall policy service
- Modifies security service
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- System policy modification
-
C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"4⤵
- Modifies firewall policy service
- Modifies security service
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- System policy modification
-
C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"4⤵
- Modifies firewall policy service
- Modifies security service
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- System policy modification
-
C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"4⤵
- Modifies firewall policy service
- Modifies security service
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- System policy modification
-
C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"4⤵
- Modifies firewall policy service
- Modifies security service
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- System policy modification
-
C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"4⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1864 -s 5285⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1864 -s 5285⤵
- Program crash
-
C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"4⤵
- Modifies firewall policy service
- Modifies security service
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- System policy modification
-
C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"4⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2688 -s 5205⤵
- Program crash
-
C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"4⤵
- Modifies firewall policy service
- Modifies security service
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- System policy modification
-
C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"4⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3256 -s 5205⤵
- Program crash
-
C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"4⤵
- Modifies firewall policy service
- Modifies security service
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- System policy modification
-
C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"4⤵
- Modifies firewall policy service
- Modifies security service
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- System policy modification
-
C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"4⤵
- Modifies firewall policy service
- Modifies security service
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- System policy modification
-
C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"4⤵
- Modifies firewall policy service
- Modifies security service
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- System policy modification
-
C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"4⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3956 -s 5205⤵
- Program crash
-
C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"4⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1672 -s 5205⤵
- Program crash
-
C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"4⤵
- Modifies firewall policy service
- Modifies security service
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- System policy modification
-
C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"4⤵
- Modifies firewall policy service
- Modifies security service
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- System policy modification
-
C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"4⤵
- Modifies firewall policy service
- Modifies security service
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- System policy modification
-
C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"4⤵
- Modifies firewall policy service
- Modifies security service
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- System policy modification
-
C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"4⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3660 -s 5205⤵
- Program crash
-
C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"4⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3972 -s 5205⤵
- Program crash
-
C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"4⤵
- Modifies firewall policy service
- Modifies security service
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- System policy modification
-
C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"4⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3732 -s 5205⤵
- Program crash
-
C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"4⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2016 -s 5205⤵
- Program crash
-
C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"4⤵
- Modifies firewall policy service
- Modifies security service
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- System policy modification
-
C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"4⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2080 -s 5205⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2080 -s 5245⤵
- Program crash
-
C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"4⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\CryptService.exe.exe"C:\Users\Admin\AppData\Local\Temp\CryptService.exe.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Temp\e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe"C:\Users\Admin\AppData\Local\Temp\e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exe"2⤵
- Modifies firewall policy service
- Modifies security service
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
-
C:\Windows\SysWOW64\notepad.exenotepad3⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1864 -ip 18641⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 2688 -ip 26881⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 3256 -ip 32561⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 3956 -ip 39561⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 1672 -ip 16721⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 3660 -ip 36601⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 3972 -ip 39721⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 3732 -ip 37321⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 2016 -ip 20161⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 2080 -ip 20801⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 2080 -ip 20801⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\CryptService.exe.exeFilesize
232KB
MD5b8c99b673301955465e5e7169dba945c
SHA1541f4719f945d9091ef5d24268c0642efa110759
SHA2561fdc072a210cf84642dfa0cc670820d5b11d060783f8c714a284f4c79d01dda4
SHA51265323893af70c369866ab4a8b5fb735cb8297648354bd93fbd1e2b713cfb1119fc37860634907f2e2e0b0f570d2d160ddb1e03c2462439b1471488151eb07ced
-
C:\Users\Admin\AppData\Local\Temp\CryptService.exe.exeFilesize
232KB
MD5b8c99b673301955465e5e7169dba945c
SHA1541f4719f945d9091ef5d24268c0642efa110759
SHA2561fdc072a210cf84642dfa0cc670820d5b11d060783f8c714a284f4c79d01dda4
SHA51265323893af70c369866ab4a8b5fb735cb8297648354bd93fbd1e2b713cfb1119fc37860634907f2e2e0b0f570d2d160ddb1e03c2462439b1471488151eb07ced
-
C:\Users\Admin\AppData\Local\Temp\CryptService.exe.exeFilesize
232KB
MD5b8c99b673301955465e5e7169dba945c
SHA1541f4719f945d9091ef5d24268c0642efa110759
SHA2561fdc072a210cf84642dfa0cc670820d5b11d060783f8c714a284f4c79d01dda4
SHA51265323893af70c369866ab4a8b5fb735cb8297648354bd93fbd1e2b713cfb1119fc37860634907f2e2e0b0f570d2d160ddb1e03c2462439b1471488151eb07ced
-
C:\Users\Admin\AppData\Local\Temp\e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9.exeFilesize
927KB
MD56d5416776bd0f3854a271722098d719e
SHA1ff6876a938916d3010963136ef8b084f0d703b5d
SHA256e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9
SHA5123fb3335b5f22bd29373d83bede4fb9764f7f3699d43f9339ec4f24e25e07dfdb7b8666fcd223a8ac0bc11b56219c933a29db6a50f9a5105cdb229fb3a0ffd3fb
-
C:\Users\Admin\AppData\Roaming\G9hdquLc\VHExTPh.exeFilesize
927KB
MD56d5416776bd0f3854a271722098d719e
SHA1ff6876a938916d3010963136ef8b084f0d703b5d
SHA256e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9
SHA5123fb3335b5f22bd29373d83bede4fb9764f7f3699d43f9339ec4f24e25e07dfdb7b8666fcd223a8ac0bc11b56219c933a29db6a50f9a5105cdb229fb3a0ffd3fb
-
C:\Users\Admin\AppData\Roaming\G9hdquLc\VHExTPh.exe.lnkFilesize
926B
MD5699e5f67ada332068e0802c25b244f56
SHA1bdd84ac94307ebca5df0f05219f515eca5c9e7ff
SHA2564ca276cfb84fbf2665460a86afe2171aed0cbf1a4c51f1ee4c946ec9a9a1a297
SHA5129abcab60c9ab58ee0278bd4051b07d6490ac43772b0782f66cdf5041d7a2b7270c0998636800caaaa438088b86d9be3de4a6a7b37c459679b0db7809675d9695
-
C:\Users\Admin\Documents\MSDCSC\msdcsc.exeFilesize
927KB
MD56d5416776bd0f3854a271722098d719e
SHA1ff6876a938916d3010963136ef8b084f0d703b5d
SHA256e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9
SHA5123fb3335b5f22bd29373d83bede4fb9764f7f3699d43f9339ec4f24e25e07dfdb7b8666fcd223a8ac0bc11b56219c933a29db6a50f9a5105cdb229fb3a0ffd3fb
-
C:\Users\Admin\Documents\MSDCSC\msdcsc.exeFilesize
927KB
MD56d5416776bd0f3854a271722098d719e
SHA1ff6876a938916d3010963136ef8b084f0d703b5d
SHA256e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9
SHA5123fb3335b5f22bd29373d83bede4fb9764f7f3699d43f9339ec4f24e25e07dfdb7b8666fcd223a8ac0bc11b56219c933a29db6a50f9a5105cdb229fb3a0ffd3fb
-
C:\Users\Admin\Documents\MSDCSC\msdcsc.exeFilesize
927KB
MD56d5416776bd0f3854a271722098d719e
SHA1ff6876a938916d3010963136ef8b084f0d703b5d
SHA256e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9
SHA5123fb3335b5f22bd29373d83bede4fb9764f7f3699d43f9339ec4f24e25e07dfdb7b8666fcd223a8ac0bc11b56219c933a29db6a50f9a5105cdb229fb3a0ffd3fb
-
C:\Users\Admin\Documents\MSDCSC\msdcsc.exeFilesize
927KB
MD56d5416776bd0f3854a271722098d719e
SHA1ff6876a938916d3010963136ef8b084f0d703b5d
SHA256e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9
SHA5123fb3335b5f22bd29373d83bede4fb9764f7f3699d43f9339ec4f24e25e07dfdb7b8666fcd223a8ac0bc11b56219c933a29db6a50f9a5105cdb229fb3a0ffd3fb
-
C:\Users\Admin\Documents\MSDCSC\msdcsc.exeFilesize
927KB
MD56d5416776bd0f3854a271722098d719e
SHA1ff6876a938916d3010963136ef8b084f0d703b5d
SHA256e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9
SHA5123fb3335b5f22bd29373d83bede4fb9764f7f3699d43f9339ec4f24e25e07dfdb7b8666fcd223a8ac0bc11b56219c933a29db6a50f9a5105cdb229fb3a0ffd3fb
-
C:\Users\Admin\Documents\MSDCSC\msdcsc.exeFilesize
927KB
MD56d5416776bd0f3854a271722098d719e
SHA1ff6876a938916d3010963136ef8b084f0d703b5d
SHA256e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9
SHA5123fb3335b5f22bd29373d83bede4fb9764f7f3699d43f9339ec4f24e25e07dfdb7b8666fcd223a8ac0bc11b56219c933a29db6a50f9a5105cdb229fb3a0ffd3fb
-
C:\Users\Admin\Documents\MSDCSC\msdcsc.exeFilesize
927KB
MD56d5416776bd0f3854a271722098d719e
SHA1ff6876a938916d3010963136ef8b084f0d703b5d
SHA256e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9
SHA5123fb3335b5f22bd29373d83bede4fb9764f7f3699d43f9339ec4f24e25e07dfdb7b8666fcd223a8ac0bc11b56219c933a29db6a50f9a5105cdb229fb3a0ffd3fb
-
C:\Users\Admin\Documents\MSDCSC\msdcsc.exeFilesize
927KB
MD56d5416776bd0f3854a271722098d719e
SHA1ff6876a938916d3010963136ef8b084f0d703b5d
SHA256e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9
SHA5123fb3335b5f22bd29373d83bede4fb9764f7f3699d43f9339ec4f24e25e07dfdb7b8666fcd223a8ac0bc11b56219c933a29db6a50f9a5105cdb229fb3a0ffd3fb
-
C:\Users\Admin\Documents\MSDCSC\msdcsc.exeFilesize
927KB
MD56d5416776bd0f3854a271722098d719e
SHA1ff6876a938916d3010963136ef8b084f0d703b5d
SHA256e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9
SHA5123fb3335b5f22bd29373d83bede4fb9764f7f3699d43f9339ec4f24e25e07dfdb7b8666fcd223a8ac0bc11b56219c933a29db6a50f9a5105cdb229fb3a0ffd3fb
-
C:\Users\Admin\Documents\MSDCSC\msdcsc.exeFilesize
927KB
MD56d5416776bd0f3854a271722098d719e
SHA1ff6876a938916d3010963136ef8b084f0d703b5d
SHA256e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9
SHA5123fb3335b5f22bd29373d83bede4fb9764f7f3699d43f9339ec4f24e25e07dfdb7b8666fcd223a8ac0bc11b56219c933a29db6a50f9a5105cdb229fb3a0ffd3fb
-
C:\Users\Admin\Documents\MSDCSC\msdcsc.exeFilesize
927KB
MD56d5416776bd0f3854a271722098d719e
SHA1ff6876a938916d3010963136ef8b084f0d703b5d
SHA256e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9
SHA5123fb3335b5f22bd29373d83bede4fb9764f7f3699d43f9339ec4f24e25e07dfdb7b8666fcd223a8ac0bc11b56219c933a29db6a50f9a5105cdb229fb3a0ffd3fb
-
C:\Users\Admin\Documents\MSDCSC\msdcsc.exeFilesize
927KB
MD56d5416776bd0f3854a271722098d719e
SHA1ff6876a938916d3010963136ef8b084f0d703b5d
SHA256e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9
SHA5123fb3335b5f22bd29373d83bede4fb9764f7f3699d43f9339ec4f24e25e07dfdb7b8666fcd223a8ac0bc11b56219c933a29db6a50f9a5105cdb229fb3a0ffd3fb
-
C:\Users\Admin\Documents\MSDCSC\msdcsc.exeFilesize
927KB
MD56d5416776bd0f3854a271722098d719e
SHA1ff6876a938916d3010963136ef8b084f0d703b5d
SHA256e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9
SHA5123fb3335b5f22bd29373d83bede4fb9764f7f3699d43f9339ec4f24e25e07dfdb7b8666fcd223a8ac0bc11b56219c933a29db6a50f9a5105cdb229fb3a0ffd3fb
-
C:\Users\Admin\Documents\MSDCSC\msdcsc.exeFilesize
927KB
MD56d5416776bd0f3854a271722098d719e
SHA1ff6876a938916d3010963136ef8b084f0d703b5d
SHA256e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9
SHA5123fb3335b5f22bd29373d83bede4fb9764f7f3699d43f9339ec4f24e25e07dfdb7b8666fcd223a8ac0bc11b56219c933a29db6a50f9a5105cdb229fb3a0ffd3fb
-
C:\Users\Admin\Documents\MSDCSC\msdcsc.exeFilesize
927KB
MD56d5416776bd0f3854a271722098d719e
SHA1ff6876a938916d3010963136ef8b084f0d703b5d
SHA256e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9
SHA5123fb3335b5f22bd29373d83bede4fb9764f7f3699d43f9339ec4f24e25e07dfdb7b8666fcd223a8ac0bc11b56219c933a29db6a50f9a5105cdb229fb3a0ffd3fb
-
C:\Users\Admin\Documents\MSDCSC\msdcsc.exeFilesize
927KB
MD56d5416776bd0f3854a271722098d719e
SHA1ff6876a938916d3010963136ef8b084f0d703b5d
SHA256e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9
SHA5123fb3335b5f22bd29373d83bede4fb9764f7f3699d43f9339ec4f24e25e07dfdb7b8666fcd223a8ac0bc11b56219c933a29db6a50f9a5105cdb229fb3a0ffd3fb
-
C:\Users\Admin\Documents\MSDCSC\msdcsc.exeFilesize
927KB
MD56d5416776bd0f3854a271722098d719e
SHA1ff6876a938916d3010963136ef8b084f0d703b5d
SHA256e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9
SHA5123fb3335b5f22bd29373d83bede4fb9764f7f3699d43f9339ec4f24e25e07dfdb7b8666fcd223a8ac0bc11b56219c933a29db6a50f9a5105cdb229fb3a0ffd3fb
-
C:\Users\Admin\Documents\MSDCSC\msdcsc.exeFilesize
927KB
MD56d5416776bd0f3854a271722098d719e
SHA1ff6876a938916d3010963136ef8b084f0d703b5d
SHA256e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9
SHA5123fb3335b5f22bd29373d83bede4fb9764f7f3699d43f9339ec4f24e25e07dfdb7b8666fcd223a8ac0bc11b56219c933a29db6a50f9a5105cdb229fb3a0ffd3fb
-
C:\Users\Admin\Documents\MSDCSC\msdcsc.exeFilesize
927KB
MD56d5416776bd0f3854a271722098d719e
SHA1ff6876a938916d3010963136ef8b084f0d703b5d
SHA256e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9
SHA5123fb3335b5f22bd29373d83bede4fb9764f7f3699d43f9339ec4f24e25e07dfdb7b8666fcd223a8ac0bc11b56219c933a29db6a50f9a5105cdb229fb3a0ffd3fb
-
C:\Users\Admin\Documents\MSDCSC\msdcsc.exeFilesize
927KB
MD56d5416776bd0f3854a271722098d719e
SHA1ff6876a938916d3010963136ef8b084f0d703b5d
SHA256e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9
SHA5123fb3335b5f22bd29373d83bede4fb9764f7f3699d43f9339ec4f24e25e07dfdb7b8666fcd223a8ac0bc11b56219c933a29db6a50f9a5105cdb229fb3a0ffd3fb
-
C:\Users\Admin\Documents\MSDCSC\msdcsc.exeFilesize
927KB
MD56d5416776bd0f3854a271722098d719e
SHA1ff6876a938916d3010963136ef8b084f0d703b5d
SHA256e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9
SHA5123fb3335b5f22bd29373d83bede4fb9764f7f3699d43f9339ec4f24e25e07dfdb7b8666fcd223a8ac0bc11b56219c933a29db6a50f9a5105cdb229fb3a0ffd3fb
-
C:\Users\Admin\Documents\MSDCSC\msdcsc.exeFilesize
927KB
MD56d5416776bd0f3854a271722098d719e
SHA1ff6876a938916d3010963136ef8b084f0d703b5d
SHA256e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9
SHA5123fb3335b5f22bd29373d83bede4fb9764f7f3699d43f9339ec4f24e25e07dfdb7b8666fcd223a8ac0bc11b56219c933a29db6a50f9a5105cdb229fb3a0ffd3fb
-
C:\Users\Admin\Documents\MSDCSC\msdcsc.exeFilesize
927KB
MD56d5416776bd0f3854a271722098d719e
SHA1ff6876a938916d3010963136ef8b084f0d703b5d
SHA256e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9
SHA5123fb3335b5f22bd29373d83bede4fb9764f7f3699d43f9339ec4f24e25e07dfdb7b8666fcd223a8ac0bc11b56219c933a29db6a50f9a5105cdb229fb3a0ffd3fb
-
C:\Users\Admin\Documents\MSDCSC\msdcsc.exeFilesize
927KB
MD56d5416776bd0f3854a271722098d719e
SHA1ff6876a938916d3010963136ef8b084f0d703b5d
SHA256e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9
SHA5123fb3335b5f22bd29373d83bede4fb9764f7f3699d43f9339ec4f24e25e07dfdb7b8666fcd223a8ac0bc11b56219c933a29db6a50f9a5105cdb229fb3a0ffd3fb
-
C:\Users\Admin\Documents\MSDCSC\msdcsc.exeFilesize
927KB
MD56d5416776bd0f3854a271722098d719e
SHA1ff6876a938916d3010963136ef8b084f0d703b5d
SHA256e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9
SHA5123fb3335b5f22bd29373d83bede4fb9764f7f3699d43f9339ec4f24e25e07dfdb7b8666fcd223a8ac0bc11b56219c933a29db6a50f9a5105cdb229fb3a0ffd3fb
-
C:\Users\Admin\Documents\MSDCSC\msdcsc.exeFilesize
927KB
MD56d5416776bd0f3854a271722098d719e
SHA1ff6876a938916d3010963136ef8b084f0d703b5d
SHA256e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9
SHA5123fb3335b5f22bd29373d83bede4fb9764f7f3699d43f9339ec4f24e25e07dfdb7b8666fcd223a8ac0bc11b56219c933a29db6a50f9a5105cdb229fb3a0ffd3fb
-
C:\Users\Admin\Documents\MSDCSC\msdcsc.exeFilesize
927KB
MD56d5416776bd0f3854a271722098d719e
SHA1ff6876a938916d3010963136ef8b084f0d703b5d
SHA256e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9
SHA5123fb3335b5f22bd29373d83bede4fb9764f7f3699d43f9339ec4f24e25e07dfdb7b8666fcd223a8ac0bc11b56219c933a29db6a50f9a5105cdb229fb3a0ffd3fb
-
C:\Users\Admin\Documents\MSDCSC\msdcsc.exeFilesize
927KB
MD56d5416776bd0f3854a271722098d719e
SHA1ff6876a938916d3010963136ef8b084f0d703b5d
SHA256e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9
SHA5123fb3335b5f22bd29373d83bede4fb9764f7f3699d43f9339ec4f24e25e07dfdb7b8666fcd223a8ac0bc11b56219c933a29db6a50f9a5105cdb229fb3a0ffd3fb
-
C:\Users\Admin\Documents\MSDCSC\msdcsc.exeFilesize
927KB
MD56d5416776bd0f3854a271722098d719e
SHA1ff6876a938916d3010963136ef8b084f0d703b5d
SHA256e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9
SHA5123fb3335b5f22bd29373d83bede4fb9764f7f3699d43f9339ec4f24e25e07dfdb7b8666fcd223a8ac0bc11b56219c933a29db6a50f9a5105cdb229fb3a0ffd3fb
-
C:\Users\Admin\Documents\MSDCSC\msdcsc.exeFilesize
927KB
MD56d5416776bd0f3854a271722098d719e
SHA1ff6876a938916d3010963136ef8b084f0d703b5d
SHA256e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9
SHA5123fb3335b5f22bd29373d83bede4fb9764f7f3699d43f9339ec4f24e25e07dfdb7b8666fcd223a8ac0bc11b56219c933a29db6a50f9a5105cdb229fb3a0ffd3fb
-
C:\Users\Admin\Documents\MSDCSC\msdcsc.exeFilesize
927KB
MD56d5416776bd0f3854a271722098d719e
SHA1ff6876a938916d3010963136ef8b084f0d703b5d
SHA256e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9
SHA5123fb3335b5f22bd29373d83bede4fb9764f7f3699d43f9339ec4f24e25e07dfdb7b8666fcd223a8ac0bc11b56219c933a29db6a50f9a5105cdb229fb3a0ffd3fb
-
C:\Users\Admin\Documents\MSDCSC\msdcsc.exeFilesize
927KB
MD56d5416776bd0f3854a271722098d719e
SHA1ff6876a938916d3010963136ef8b084f0d703b5d
SHA256e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9
SHA5123fb3335b5f22bd29373d83bede4fb9764f7f3699d43f9339ec4f24e25e07dfdb7b8666fcd223a8ac0bc11b56219c933a29db6a50f9a5105cdb229fb3a0ffd3fb
-
C:\Users\Admin\Documents\MSDCSC\msdcsc.exeFilesize
927KB
MD56d5416776bd0f3854a271722098d719e
SHA1ff6876a938916d3010963136ef8b084f0d703b5d
SHA256e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9
SHA5123fb3335b5f22bd29373d83bede4fb9764f7f3699d43f9339ec4f24e25e07dfdb7b8666fcd223a8ac0bc11b56219c933a29db6a50f9a5105cdb229fb3a0ffd3fb
-
C:\Users\Admin\Documents\MSDCSC\msdcsc.exeFilesize
927KB
MD56d5416776bd0f3854a271722098d719e
SHA1ff6876a938916d3010963136ef8b084f0d703b5d
SHA256e82aee5ef07a580114f739b15249703f2147dbc05fa03ba55b5a0abd3e15c9c9
SHA5123fb3335b5f22bd29373d83bede4fb9764f7f3699d43f9339ec4f24e25e07dfdb7b8666fcd223a8ac0bc11b56219c933a29db6a50f9a5105cdb229fb3a0ffd3fb
-
memory/100-349-0x0000000000000000-mapping.dmp
-
memory/100-356-0x0000000000400000-0x00000000004B2000-memory.dmpFilesize
712KB
-
memory/100-428-0x0000000000400000-0x00000000004B2000-memory.dmpFilesize
712KB
-
memory/376-344-0x0000000000400000-0x00000000004B2000-memory.dmpFilesize
712KB
-
memory/376-338-0x0000000000000000-mapping.dmp
-
memory/532-147-0x0000000000000000-mapping.dmp
-
memory/908-202-0x0000000000400000-0x00000000004B2000-memory.dmpFilesize
712KB
-
memory/908-193-0x0000000000000000-mapping.dmp
-
memory/908-199-0x0000000000400000-0x00000000004B2000-memory.dmpFilesize
712KB
-
memory/1040-295-0x0000000000000000-mapping.dmp
-
memory/1040-302-0x0000000000400000-0x00000000004B2000-memory.dmpFilesize
712KB
-
memory/1100-187-0x0000000000000000-mapping.dmp
-
memory/1100-194-0x0000000000400000-0x00000000004B2000-memory.dmpFilesize
712KB
-
memory/1244-132-0x00000000745F0000-0x0000000074BA1000-memory.dmpFilesize
5.7MB
-
memory/1244-133-0x00000000745F0000-0x0000000074BA1000-memory.dmpFilesize
5.7MB
-
memory/1420-343-0x0000000000000000-mapping.dmp
-
memory/1420-350-0x0000000000400000-0x00000000004B2000-memory.dmpFilesize
712KB
-
memory/1432-175-0x0000000000000000-mapping.dmp
-
memory/1432-181-0x0000000000400000-0x00000000004B2000-memory.dmpFilesize
712KB
-
memory/1672-323-0x0000000000000000-mapping.dmp
-
memory/1712-450-0x0000000000000000-mapping.dmp
-
memory/1864-225-0x0000000000000000-mapping.dmp
-
memory/1864-239-0x0000000000740000-0x00000000007F2000-memory.dmpFilesize
712KB
-
memory/1864-240-0x0000000000740000-0x00000000007F2000-memory.dmpFilesize
712KB
-
memory/1864-234-0x0000000000740000-0x00000000007F2000-memory.dmpFilesize
712KB
-
memory/2016-413-0x0000000000000000-mapping.dmp
-
memory/2080-434-0x0000000000000000-mapping.dmp
-
memory/2192-296-0x0000000000400000-0x00000000004B2000-memory.dmpFilesize
712KB
-
memory/2192-289-0x0000000000000000-mapping.dmp
-
memory/2688-248-0x0000000000000000-mapping.dmp
-
memory/2688-256-0x0000000000700000-0x00000000007B2000-memory.dmpFilesize
712KB
-
memory/2688-261-0x0000000000700000-0x00000000007B2000-memory.dmpFilesize
712KB
-
memory/2688-262-0x0000000000700000-0x00000000007B2000-memory.dmpFilesize
712KB
-
memory/2844-290-0x0000000000400000-0x00000000004B2000-memory.dmpFilesize
712KB
-
memory/2844-284-0x0000000000000000-mapping.dmp
-
memory/2872-172-0x0000000000400000-0x00000000004B2000-memory.dmpFilesize
712KB
-
memory/2872-158-0x0000000000400000-0x00000000004B2000-memory.dmpFilesize
712KB
-
memory/2872-153-0x0000000000000000-mapping.dmp
-
memory/3016-164-0x0000000000000000-mapping.dmp
-
memory/3020-213-0x0000000000000000-mapping.dmp
-
memory/3020-220-0x0000000000400000-0x00000000004B2000-memory.dmpFilesize
712KB
-
memory/3028-135-0x0000000000000000-mapping.dmp
-
memory/3200-170-0x00000000745F0000-0x0000000074BA1000-memory.dmpFilesize
5.7MB
-
memory/3200-149-0x0000000000000000-mapping.dmp
-
memory/3200-152-0x00000000745F0000-0x0000000074BA1000-memory.dmpFilesize
5.7MB
-
memory/3256-269-0x0000000000000000-mapping.dmp
-
memory/3508-180-0x0000000000400000-0x00000000004B7000-memory.dmpFilesize
732KB
-
memory/3508-173-0x0000000000000000-mapping.dmp
-
memory/3540-263-0x0000000000000000-mapping.dmp
-
memory/3540-268-0x0000000000400000-0x00000000004B2000-memory.dmpFilesize
712KB
-
memory/3656-355-0x0000000000000000-mapping.dmp
-
memory/3656-361-0x0000000000400000-0x00000000004B2000-memory.dmpFilesize
712KB
-
memory/3660-362-0x0000000000000000-mapping.dmp
-
memory/3732-397-0x0000000000000000-mapping.dmp
-
memory/3944-145-0x0000000000400000-0x00000000004B7000-memory.dmpFilesize
732KB
-
memory/3944-160-0x0000000000400000-0x00000000004B7000-memory.dmpFilesize
732KB
-
memory/3944-139-0x0000000000000000-mapping.dmp
-
memory/3956-308-0x0000000000000000-mapping.dmp
-
memory/3972-377-0x0000000000000000-mapping.dmp
-
memory/3984-307-0x0000000000400000-0x00000000004B2000-memory.dmpFilesize
712KB
-
memory/3984-301-0x0000000000000000-mapping.dmp
-
memory/4004-159-0x0000000000000000-mapping.dmp
-
memory/4132-138-0x0000000000400000-0x00000000004B2000-memory.dmpFilesize
712KB
-
memory/4132-140-0x0000000000400000-0x00000000004B2000-memory.dmpFilesize
712KB
-
memory/4132-136-0x0000000000000000-mapping.dmp
-
memory/4132-137-0x0000000000400000-0x00000000004B2000-memory.dmpFilesize
712KB
-
memory/4132-146-0x0000000000400000-0x00000000004B2000-memory.dmpFilesize
712KB
-
memory/4348-148-0x0000000000000000-mapping.dmp
-
memory/4364-429-0x0000000000000000-mapping.dmp
-
memory/4364-435-0x0000000000400000-0x00000000004B2000-memory.dmpFilesize
712KB
-
memory/4412-134-0x0000000000000000-mapping.dmp
-
memory/4508-401-0x0000000000400000-0x00000000004B2000-memory.dmpFilesize
712KB
-
memory/4508-392-0x0000000000000000-mapping.dmp
-
memory/4528-242-0x0000000000000000-mapping.dmp
-
memory/4528-247-0x0000000000400000-0x00000000004B2000-memory.dmpFilesize
712KB
-
memory/4580-241-0x0000000000000000-mapping.dmp
-
memory/4608-200-0x0000000000000000-mapping.dmp
-
memory/4608-206-0x0000000000400000-0x00000000004B2000-memory.dmpFilesize
712KB
-
memory/4836-182-0x0000000000000000-mapping.dmp
-
memory/4836-188-0x0000000000400000-0x00000000004B2000-memory.dmpFilesize
712KB
-
memory/4924-165-0x0000000000000000-mapping.dmp
-
memory/4924-171-0x0000000000400000-0x00000000004B2000-memory.dmpFilesize
712KB
-
memory/4964-219-0x0000000000000000-mapping.dmp
-
memory/4964-226-0x0000000000400000-0x00000000004B2000-memory.dmpFilesize
712KB
-
memory/4992-143-0x0000000000000000-mapping.dmp
-
memory/5016-144-0x0000000000000000-mapping.dmp
-
memory/5076-215-0x0000000000400000-0x00000000004B2000-memory.dmpFilesize
712KB
-
memory/5076-212-0x0000000000400000-0x00000000004B2000-memory.dmpFilesize
712KB
-
memory/5076-207-0x0000000000000000-mapping.dmp
-
memory/5104-163-0x0000000000000000-mapping.dmp