Analysis
-
max time kernel
103s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 10:40
Static task
static1
Behavioral task
behavioral1
Sample
de5374a3411efdbcad59a2c7defac4e6c17bf174da19c5d020f7765748c61c20.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
de5374a3411efdbcad59a2c7defac4e6c17bf174da19c5d020f7765748c61c20.exe
Resource
win10v2004-20220901-en
General
-
Target
de5374a3411efdbcad59a2c7defac4e6c17bf174da19c5d020f7765748c61c20.exe
-
Size
127KB
-
MD5
63897d764fdc60d9112bb9285a76ac8d
-
SHA1
41ca888d4d9e9b3f1d280372af0947ab682c3be7
-
SHA256
de5374a3411efdbcad59a2c7defac4e6c17bf174da19c5d020f7765748c61c20
-
SHA512
cd7b961d0a74363a845a6f34a04d2c9fb0b6e9c42e1306d29c13f6ce0819fa0117ed78abb2f748cb19ff7f4d646d2f194e5bc5847205e377e1390de29316e2f2
-
SSDEEP
1536:/nqdu3rbBGy3G8V0iuoKYMUYU6U5jUdPQc+n35KZg8/nouy8Iu:/qYMPsLMYjUtQl78vout
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 7 IoCs
Processes:
csrss.exe lsass.exe smss.exe de5374a3411efdbcad59a2c7defac4e6c17bf174da19c5d020f7765748c61c20.exe csrss.exe services.exe services.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe, C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~\\winlogon.exe" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe, C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~\\winlogon.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe, C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~\\winlogon.exe" smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe, C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~\\winlogon.exe" de5374a3411efdbcad59a2c7defac4e6c17bf174da19c5d020f7765748c61c20.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe, C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~\\winlogon.exe" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe, C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~\\winlogon.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe, C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~\\winlogon.exe" services.exe -
Modifies system executable filetype association 2 TTPs 10 IoCs
Processes:
csrss.exe services.exe de5374a3411efdbcad59a2c7defac4e6c17bf174da19c5d020f7765748c61c20.exe nscp.exewinlogon.exelsass.exe smss.exe services.exe csrss.exe csrss.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt de5374a3411efdbcad59a2c7defac4e6c17bf174da19c5d020f7765748c61c20.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt nscp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt csrss.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 10 IoCs
Processes:
lsass.exe smss.exe de5374a3411efdbcad59a2c7defac4e6c17bf174da19c5d020f7765748c61c20.exe csrss.exe csrss.exe csrss.exenscp.exeservices.exe winlogon.exeservices.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" lsass.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" smss.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" de5374a3411efdbcad59a2c7defac4e6c17bf174da19c5d020f7765748c61c20.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" csrss.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" csrss.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" csrss.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" nscp.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" services.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" winlogon.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" services.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 10 IoCs
Processes:
smss.exe de5374a3411efdbcad59a2c7defac4e6c17bf174da19c5d020f7765748c61c20.exe services.exe csrss.exe csrss.exenscp.exewinlogon.exelsass.exe csrss.exe services.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" smss.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" de5374a3411efdbcad59a2c7defac4e6c17bf174da19c5d020f7765748c61c20.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" services.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" csrss.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" csrss.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" nscp.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" winlogon.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" lsass.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" csrss.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" services.exe -
Processes:
lsass.exe smss.exe de5374a3411efdbcad59a2c7defac4e6c17bf174da19c5d020f7765748c61c20.exe csrss.exe services.exe services.exe csrss.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" lsass.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" smss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" de5374a3411efdbcad59a2c7defac4e6c17bf174da19c5d020f7765748c61c20.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" csrss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" services.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" services.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" csrss.exe -
Disables RegEdit via registry modification 7 IoCs
Processes:
services.exe services.exe csrss.exe lsass.exe smss.exe de5374a3411efdbcad59a2c7defac4e6c17bf174da19c5d020f7765748c61c20.exe csrss.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" services.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" services.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" csrss.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" lsass.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" smss.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" de5374a3411efdbcad59a2c7defac4e6c17bf174da19c5d020f7765748c61c20.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" csrss.exe -
Disables use of System Restore points 1 TTPs
-
Executes dropped EXE 64 IoCs
Processes:
de5374a3411efdbcad59a2c7defac4e6c17bf174da19c5d020f7765748c61c20.exe csrss.execsrss.exe csrss.execsrss.exe nscp.exesmss.exesmss.exe csrss.execsrss.exe smss.exesmss.exe lsass.exelsass.exe csrss.execsrss.exe smss.exesmss.exe lsass.exelsass.exe services.exeservices.exe csrss.execsrss.exe smss.exesmss.exe lsass.exelsass.exe services.exeservices.exe smss.exelsass.exeservices.exesmss.exe winlogon.exewinlogon.exelsass.exe winlogon.exe winlogon.exe lsass.exeservices.exe lsass.exe Paraysutki_VM_Communityservices.exewinlogon.exeservices.exe winlogon.exe services.exenizw.exeservices.exe winlogon.exewinlogon.exe Paraysutki_VM_Communitywinlogon.exewinlogon.exe Paraysutki_VM_Communitycsrss.exeParaysutki_VM_Communitycsrss.exe Paraysutki_VM_Communitysmss.exesmss.exe lsass.exelsass.exepid process 572 de5374a3411efdbcad59a2c7defac4e6c17bf174da19c5d020f7765748c61c20.exe 564 csrss.exe 1948 csrss.exe 1524 csrss.exe 1544 csrss.exe 868 nscp.exe 1980 smss.exe 980 smss.exe 1100 csrss.exe 432 csrss.exe 1988 smss.exe 1644 smss.exe 1360 lsass.exe 584 lsass.exe 864 csrss.exe 1672 csrss.exe 760 smss.exe 676 smss.exe 1488 lsass.exe 516 lsass.exe 1780 services.exe 964 services.exe 744 csrss.exe 396 csrss.exe 992 smss.exe 1816 smss.exe 1284 lsass.exe 1844 lsass.exe 1892 services.exe 1252 services.exe 1440 smss.exe 1144 lsass.exe 1100 services.exe 1912 smss.exe 1676 winlogon.exe 616 winlogon.exe 1128 lsass.exe 1596 winlogon.exe 1588 winlogon.exe 1592 lsass.exe 1712 services.exe 1800 lsass.exe 1412 Paraysutki_VM_Community 1652 services.exe 1344 winlogon.exe 1300 services.exe 1472 winlogon.exe 1052 services.exe 1812 nizw.exe 1336 services.exe 1624 winlogon.exe 740 winlogon.exe 816 Paraysutki_VM_Community 1876 winlogon.exe 1988 winlogon.exe 1680 Paraysutki_VM_Community 1912 csrss.exe 1716 Paraysutki_VM_Community 760 csrss.exe 1528 Paraysutki_VM_Community 1440 smss.exe 1808 smss.exe 940 lsass.exe 664 lsass.exe -
Sets file execution options in registry 2 TTPs 64 IoCs
Processes:
lsass.exe smss.exe csrss.exe services.exe csrss.exe de5374a3411efdbcad59a2c7defac4e6c17bf174da19c5d020f7765748c61c20.exe services.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kspoold.exe lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\HokageFile.exe\Debugger = "cmd.exe /c del" lsass.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Obito.exe smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\tasklist.exe\Debugger = "rundll32.exe" csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\HOKAGE4.exe services.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KakashiHatake.exe csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SETUP.exe lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe\Debugger = "rundll32.exe" de5374a3411efdbcad59a2c7defac4e6c17bf174da19c5d020f7765748c61c20.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe\Debugger = "rundll32.exe" de5374a3411efdbcad59a2c7defac4e6c17bf174da19c5d020f7765748c61c20.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe\Debugger = "rundll32.exe" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe\Debugger = "rundll32.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\HokageFile.exe\Debugger = "cmd.exe /c del" csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe smss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\HokageFile.exe services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Ansav.exe\Debugger = "cmd.exe /c del" services.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Install.exe services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\PCMAV-RTP.exe\Debugger = "cmd.exe /c del" services.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msiexec.exe services.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Install.exe csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\procexp.exe\Debugger = "cmd.exe /c del" de5374a3411efdbcad59a2c7defac4e6c17bf174da19c5d020f7765748c61c20.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SETUP.exe csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe\Debugger = "rundll32.exe" services.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\boot.exe services.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Ansavgd.exe services.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\HokageFile.exe lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Obito.exe\Debugger = "cmd.exe /c del" lsass.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\procexp.exe de5374a3411efdbcad59a2c7defac4e6c17bf174da19c5d020f7765748c61c20.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mmc.exe\Debugger = "rundll32.exe" csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KakashiHatake.exe services.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\tasklist.exe csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Obito.exe\Debugger = "cmd.exe /c del" de5374a3411efdbcad59a2c7defac4e6c17bf174da19c5d020f7765748c61c20.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KakashiHatake.exe de5374a3411efdbcad59a2c7defac4e6c17bf174da19c5d020f7765748c61c20.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Instal.exe\Debugger = "cmd.exe /c del" de5374a3411efdbcad59a2c7defac4e6c17bf174da19c5d020f7765748c61c20.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\HokageFile.exe\Debugger = "cmd.exe /c del" csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cmd.exe lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kspoold.exe\Debugger = "cmd.exe /c del" smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\PCMAV-CLN.exe\Debugger = "cmd.exe /c del" smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\HokageFile.exe\Debugger = "cmd.exe /c del" de5374a3411efdbcad59a2c7defac4e6c17bf174da19c5d020f7765748c61c20.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KakashiHatake.exe\Debugger = "cmd.exe /c del" services.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Install.exe lsass.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\boot.exe csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\HOKAGE4.exe\Debugger = "cmd.exe /c del" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\boot.exe\Debugger = "cmd.exe /c del" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe\Debugger = "rundll32.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe\Debugger = "rundll32.exe" csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe de5374a3411efdbcad59a2c7defac4e6c17bf174da19c5d020f7765748c61c20.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mmc.exe de5374a3411efdbcad59a2c7defac4e6c17bf174da19c5d020f7765748c61c20.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\HOKAGE4.exe csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kspoold.exe\Debugger = "cmd.exe /c del" services.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Instal.exe services.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\tasklist.exe de5374a3411efdbcad59a2c7defac4e6c17bf174da19c5d020f7765748c61c20.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mmc.exe csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Ansav.exe services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Ansavgd.exe\Debugger = "cmd.exe /c del" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Setup.exe\Debugger = "cmd.exe /c del" services.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Ansav.exe csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe\Debugger = "rundll32.exe" csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Ansavgd.exe lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cmd.exe\Debugger = "rundll32.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\boot.exe\Debugger = "cmd.exe /c del" smss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\HOKAGE4.exe de5374a3411efdbcad59a2c7defac4e6c17bf174da19c5d020f7765748c61c20.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\procexp.exe services.exe -
Loads dropped DLL 64 IoCs
Processes:
de5374a3411efdbcad59a2c7defac4e6c17bf174da19c5d020f7765748c61c20.exede5374a3411efdbcad59a2c7defac4e6c17bf174da19c5d020f7765748c61c20.exe csrss.execsrss.exe csrss.execsrss.exe smss.exesmss.exe csrss.execsrss.exe smss.exesmss.exe lsass.exelsass.exe csrss.execsrss.exe smss.exesmss.exe lsass.exelsass.exe services.exeservices.exe csrss.execsrss.exepid process 308 de5374a3411efdbcad59a2c7defac4e6c17bf174da19c5d020f7765748c61c20.exe 308 de5374a3411efdbcad59a2c7defac4e6c17bf174da19c5d020f7765748c61c20.exe 572 de5374a3411efdbcad59a2c7defac4e6c17bf174da19c5d020f7765748c61c20.exe 572 de5374a3411efdbcad59a2c7defac4e6c17bf174da19c5d020f7765748c61c20.exe 564 csrss.exe 564 csrss.exe 564 csrss.exe 1948 csrss.exe 1948 csrss.exe 1948 csrss.exe 1524 csrss.exe 1524 csrss.exe 1544 csrss.exe 1524 csrss.exe 1524 csrss.exe 1948 csrss.exe 1948 csrss.exe 1980 smss.exe 1980 smss.exe 1980 smss.exe 980 smss.exe 980 smss.exe 980 smss.exe 1100 csrss.exe 1100 csrss.exe 432 csrss.exe 980 smss.exe 980 smss.exe 1988 smss.exe 1988 smss.exe 1644 smss.exe 980 smss.exe 980 smss.exe 1360 lsass.exe 1360 lsass.exe 1360 lsass.exe 584 lsass.exe 584 lsass.exe 584 lsass.exe 864 csrss.exe 864 csrss.exe 1672 csrss.exe 584 lsass.exe 584 lsass.exe 760 smss.exe 760 smss.exe 676 smss.exe 584 lsass.exe 584 lsass.exe 1488 lsass.exe 1488 lsass.exe 516 lsass.exe 584 lsass.exe 584 lsass.exe 1780 services.exe 1780 services.exe 1780 services.exe 964 services.exe 964 services.exe 964 services.exe 744 csrss.exe 744 csrss.exe 396 csrss.exe 964 services.exe -
Adds Run key to start application 2 TTPs 46 IoCs
Processes:
winlogon.exelsass.exe smss.exe de5374a3411efdbcad59a2c7defac4e6c17bf174da19c5d020f7765748c61c20.exe services.exe csrss.exe csrss.exe services.exe nscp.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\VisualStyle = "c:\\windows\\system32\\Desktop.sysm" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\NviDiaGT = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~\\lsass.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\AVManager = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~\\csrss.exe" smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\AVManager = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~\\csrss.exe" de5374a3411efdbcad59a2c7defac4e6c17bf174da19c5d020f7765748c61c20.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\NviDiaGT = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~\\lsass.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\NviDiaGT = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~\\lsass.exe" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ConfigVir = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~\\services.exe" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\PaRaY_VM = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~\\winlogon.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\NarmonVirusAnti = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~\\smss.exe" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\PaRaY_VM = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~\\winlogon.exe" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ConfigVir = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\NviDiaGT = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~\\lsass.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\NarmonVirusAnti = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~\\smss.exe" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\AVManager = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~\\csrss.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\NarmonVirusAnti = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~\\smss.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\VisualStyle = "c:\\windows\\system32\\Desktop.sysm" nscp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\NarmonVirusAnti = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~\\smss.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ConfigVir = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~\\services.exe" lsass.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\NviDiaGT = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~\\lsass.exe" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\PaRaY_VM = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~\\winlogon.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\NarmonVirusAnti = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~\\smss.exe" smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\NviDiaGT = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~\\lsass.exe" smss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run de5374a3411efdbcad59a2c7defac4e6c17bf174da19c5d020f7765748c61c20.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ConfigVir = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~\\services.exe" de5374a3411efdbcad59a2c7defac4e6c17bf174da19c5d020f7765748c61c20.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ConfigVir = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~\\services.exe" csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ConfigVir = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~\\services.exe" smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\NarmonVirusAnti = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~\\smss.exe" services.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\AVManager = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~\\csrss.exe" services.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run nscp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\AVManager = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~\\csrss.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\NarmonVirusAnti = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~\\smss.exe" de5374a3411efdbcad59a2c7defac4e6c17bf174da19c5d020f7765748c61c20.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\PaRaY_VM = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~\\winlogon.exe" de5374a3411efdbcad59a2c7defac4e6c17bf174da19c5d020f7765748c61c20.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\PaRaY_VM = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~\\winlogon.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\AVManager = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~\\csrss.exe" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\PaRaY_VM = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~\\winlogon.exe" smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\NviDiaGT = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~\\lsass.exe" de5374a3411efdbcad59a2c7defac4e6c17bf174da19c5d020f7765748c61c20.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\PaRaY_VM = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~\\winlogon.exe" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\AVManager = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~\\csrss.exe" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ConfigVir = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~\\services.exe" services.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run csrss.exe -
Processes:
lsass.exe smss.exe de5374a3411efdbcad59a2c7defac4e6c17bf174da19c5d020f7765748c61c20.exe csrss.exe services.exe services.exe csrss.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" lsass.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" smss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" de5374a3411efdbcad59a2c7defac4e6c17bf174da19c5d020f7765748c61c20.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" csrss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" services.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" services.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" csrss.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
nscp.exedescription ioc process File opened (read-only) \??\Q: nscp.exe File opened (read-only) \??\R: nscp.exe File opened (read-only) \??\T: nscp.exe File opened (read-only) \??\V: nscp.exe File opened (read-only) \??\Y: nscp.exe File opened (read-only) \??\B: nscp.exe File opened (read-only) \??\I: nscp.exe File opened (read-only) \??\J: nscp.exe File opened (read-only) \??\S: nscp.exe File opened (read-only) \??\U: nscp.exe File opened (read-only) \??\W: nscp.exe File opened (read-only) \??\X: nscp.exe File opened (read-only) \??\Z: nscp.exe File opened (read-only) \??\E: nscp.exe File opened (read-only) \??\G: nscp.exe File opened (read-only) \??\O: nscp.exe File opened (read-only) \??\M: nscp.exe File opened (read-only) \??\P: nscp.exe File opened (read-only) \??\L: nscp.exe File opened (read-only) \??\N: nscp.exe File opened (read-only) \??\F: nscp.exe File opened (read-only) \??\H: nscp.exe File opened (read-only) \??\K: nscp.exe -
Drops file in System32 directory 64 IoCs
Processes:
csrss.exe lsass.exe services.exe smss.exe de5374a3411efdbcad59a2c7defac4e6c17bf174da19c5d020f7765748c61c20.exewinlogon.exede5374a3411efdbcad59a2c7defac4e6c17bf174da19c5d020f7765748c61c20.exe lsass.exesmss.exe services.exe services.exe winlogon.exe csrss.exenscp.exelsass.exeservices.exelsass.exeParaysutki_VM_Communitycsrss.exelsass.exewinlogon.exelsass.exe csrss.exesmss.exewinlogon.exesmss.exeservices.exewinlogon.exedescription ioc process File opened for modification C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\Paraysutki_VM_Community csrss.exe File opened for modification C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\services.exe lsass.exe File created C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\Paraysutki_VM_Community services.exe File created C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\Paraysutki_VM_Community smss.exe File created \??\c:\windows\SysWOW64\maxtrox.txt de5374a3411efdbcad59a2c7defac4e6c17bf174da19c5d020f7765748c61c20.exe File opened for modification C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\msvbvm60.dll services.exe File opened for modification \??\c:\windows\SysWOW64\maxtrox.txt winlogon.exe File opened for modification C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\Paraysutki_VM_Community de5374a3411efdbcad59a2c7defac4e6c17bf174da19c5d020f7765748c61c20.exe File opened for modification \??\c:\windows\SysWOW64\maxtrox.txt lsass.exe File created C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\winlogon.exe smss.exe File opened for modification C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\smss.exe services.exe File created C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\lsass.exe smss.exe File created C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\msvbvm60.dll services.exe File created C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\Paraysutki_VM_Community services.exe File opened for modification C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\lsass.exe csrss.exe File created C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\smss.exe csrss.exe File created C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\services.exe services.exe File created C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\Paraysutki_VM_Community de5374a3411efdbcad59a2c7defac4e6c17bf174da19c5d020f7765748c61c20.exe File created C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\smss.exe winlogon.exe File opened for modification \??\c:\windows\SysWOW64\maxtrox.txt csrss.exe File created C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\winlogon.exe csrss.exe File opened for modification C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\msvbvm60.dll services.exe File opened for modification \??\c:\windows\SysWOW64\maxtrox.txt nscp.exe File opened for modification \??\c:\windows\SysWOW64\maxtrox.txt lsass.exe File opened for modification \??\c:\windows\SysWOW64\maxtrox.txt services.exe File created C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\lsass.exe lsass.exe File opened for modification \??\c:\windows\SysWOW64\maxtrox.txt lsass.exe File created C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\msvbvm60.dll services.exe File opened for modification \??\c:\windows\SysWOW64\maxtrox.txt Paraysutki_VM_Community File opened for modification C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\msvbvm60.dll smss.exe File opened for modification \??\c:\windows\SysWOW64\maxtrox.txt csrss.exe File opened for modification \??\c:\windows\SysWOW64\maxtrox.txt lsass.exe File created C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\csrss.exe de5374a3411efdbcad59a2c7defac4e6c17bf174da19c5d020f7765748c61c20.exe File opened for modification C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~ smss.exe File opened for modification \??\c:\windows\SysWOW64\maxtrox.txt winlogon.exe File created C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\msvbvm60.dll lsass.exe File opened for modification C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\Paraysutki_VM_Community lsass.exe File created C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\csrss.exe lsass.exe File opened for modification \??\c:\windows\SysWOW64\maxtrox.txt csrss.exe File opened for modification \??\c:\windows\SysWOW64\maxtrox.txt smss.exe File created C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\Paraysutki_VM_Community lsass.exe File opened for modification C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\csrss.exe de5374a3411efdbcad59a2c7defac4e6c17bf174da19c5d020f7765748c61c20.exe File created C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\lsass.exe winlogon.exe File created C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\smss.exe services.exe File opened for modification \??\c:\windows\SysWOW64\maxtrox.txt winlogon.exe File opened for modification C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\Paraysutki_VM_Community smss.exe File opened for modification C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\winlogon.exe lsass.exe File opened for modification \??\c:\windows\SysWOW64\maxtrox.txt smss.exe File opened for modification C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\csrss.exe services.exe File opened for modification \??\c:\windows\SysWOW64\maxtrox.txt services.exe File opened for modification C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\winlogon.exe services.exe File opened for modification C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\csrss.exe smss.exe File opened for modification C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\services.exe smss.exe File opened for modification C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\lsass.exe services.exe File created C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\winlogon.exe lsass.exe File created C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\msvbvm60.dll de5374a3411efdbcad59a2c7defac4e6c17bf174da19c5d020f7765748c61c20.exe File created C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\winlogon.exe winlogon.exe File created C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\msvbvm60.dll winlogon.exe File opened for modification C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\Paraysutki_VM_Community services.exe File opened for modification C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~ lsass.exe File created C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\csrss.exe smss.exe File opened for modification \??\c:\windows\SysWOW64\maxtrox.txt winlogon.exe File opened for modification \??\c:\windows\SysWOW64\Windows 3D.scr winlogon.exe File opened for modification C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~ winlogon.exe -
Drops file in Program Files directory 34 IoCs
Processes:
nscp.exedescription ioc process File opened for modification \??\c:\Program Files\Mozilla Firefox\firefox.exe nscp.exe File opened for modification \??\c:\Program Files\Windows Mail\wab.exe nscp.exe File opened for modification \??\c:\Program Files\7-Zip\7zFM.exe nscp.exe File opened for modification \??\c:\Program Files\Windows Defender\MSASCui.exe nscp.exe File opened for modification \??\c:\Program Files\Windows Journal\PDIALOG.exe nscp.exe File opened for modification \??\c:\Program Files\Windows Media Player\WMPDMC.exe nscp.exe File opened for modification \??\c:\Program Files\Windows Media Player\wmplayer.exe nscp.exe File opened for modification \??\c:\Program Files\Windows Media Player\wmpnscfg.exe nscp.exe File opened for modification \??\c:\Program Files\Internet Explorer\iediagcmd.exe nscp.exe File opened for modification \??\c:\Program Files\Mozilla Firefox\default-browser-agent.exe nscp.exe File opened for modification \??\c:\Program Files\Mozilla Firefox\plugin-container.exe nscp.exe File opened for modification \??\c:\Program Files\7-Zip\Uninstall.exe nscp.exe File opened for modification \??\c:\Program Files\7-Zip\7zG.exe nscp.exe File opened for modification \??\c:\Program Files\Mozilla Firefox\maintenanceservice_installer.exe nscp.exe File opened for modification \??\c:\Program Files\Mozilla Firefox\minidump-analyzer.exe nscp.exe File opened for modification \??\c:\Program Files\Mozilla Firefox\pingsender.exe nscp.exe File opened for modification \??\c:\Program Files\Mozilla Firefox\updater.exe nscp.exe File opened for modification \??\c:\Program Files\Windows Sidebar\sidebar.exe nscp.exe File opened for modification \??\c:\Program Files\7-Zip\7z.exe nscp.exe File opened for modification \??\c:\Program Files\Internet Explorer\ielowutil.exe nscp.exe File opened for modification \??\c:\Program Files\Internet Explorer\iexplore.exe nscp.exe File opened for modification \??\c:\Program Files\Mozilla Firefox\maintenanceservice.exe nscp.exe File opened for modification \??\c:\Program Files\Mozilla Firefox\plugin-hang-ui.exe nscp.exe File opened for modification \??\c:\Program Files\Windows Media Player\wmlaunch.exe nscp.exe File opened for modification \??\c:\Program Files\Windows Media Player\wmpconfig.exe nscp.exe File opened for modification \??\c:\Program Files\Windows Media Player\wmpenc.exe nscp.exe File opened for modification \??\c:\Program Files\Internet Explorer\ieinstal.exe nscp.exe File opened for modification \??\c:\Program Files\Windows Media Player\wmpnetwk.exe nscp.exe File opened for modification \??\c:\Program Files\Windows Mail\wabmig.exe nscp.exe File opened for modification \??\c:\Program Files\Windows Media Player\wmprph.exe nscp.exe File opened for modification \??\c:\Program Files\Windows Defender\MpCmdRun.exe nscp.exe File opened for modification \??\c:\Program Files\Windows Media Player\wmpshare.exe nscp.exe File opened for modification \??\c:\Program Files\Windows Media Player\WMPSideShowGadget.exe nscp.exe File opened for modification \??\c:\Program Files\Mozilla Firefox\crashreporter.exe nscp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Processes:
de5374a3411efdbcad59a2c7defac4e6c17bf174da19c5d020f7765748c61c20.exe csrss.exe csrss.exe lsass.exe smss.exe services.exe services.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main de5374a3411efdbcad59a2c7defac4e6c17bf174da19c5d020f7765748c61c20.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\Window Title = "++++ Hey, Hokage/babon (Anbu*Team*Sampit), Is this My places, Wanna start a War ++++" csrss.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main csrss.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\Window Title = "++++ Hey, Hokage/babon (Anbu*Team*Sampit), Is this My places, Wanna start a War ++++" lsass.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main smss.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\Window Title = "++++ Hey, Hokage/babon (Anbu*Team*Sampit), Is this My places, Wanna start a War ++++" services.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main lsass.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\Window Title = "++++ Hey, Hokage/babon (Anbu*Team*Sampit), Is this My places, Wanna start a War ++++" smss.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\Window Title = "++++ Hey, Hokage/babon (Anbu*Team*Sampit), Is this My places, Wanna start a War ++++" de5374a3411efdbcad59a2c7defac4e6c17bf174da19c5d020f7765748c61c20.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main csrss.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main services.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\Window Title = "++++ Hey, Hokage/babon (Anbu*Team*Sampit), Is this My places, Wanna start a War ++++" csrss.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main services.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\Window Title = "++++ Hey, Hokage/babon (Anbu*Team*Sampit), Is this My places, Wanna start a War ++++" services.exe -
Modifies registry class 64 IoCs
Processes:
csrss.exewinlogon.exeservices.exe nscp.exeservices.exe csrss.exe lsass.exe de5374a3411efdbcad59a2c7defac4e6c17bf174da19c5d020f7765748c61c20.exe csrss.exe smss.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\Shell\Open\Command winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\Shell\Open\Command\ = "%1" nscp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\ = "System Mechanic" nscp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\DefaultIcon\ = "c:\\windows\\SysWow64\\netsetup.exe" nscp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\DefaultIcon winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt services.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile services.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\Shell\Open csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\DefaultIcon\ = "c:\\windows\\SysWow64\\rasphone.exe" nscp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\Shell\Open\Command winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\ = "System Mechanic" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\Shell\Open\Command\ = "%1" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\DefaultIcon\ = "c:\\windows\\SysWow64\\netsetup.exe" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\Shell csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\NeverShowExt csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\Shell csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt de5374a3411efdbcad59a2c7defac4e6c17bf174da19c5d020f7765748c61c20.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\DefaultIcon\ = "c:\\windows\\SysWow64\\rasphone.exe" csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\NeverShowExt winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\DefaultIcon winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\Shell\Open\Command\ = "%1" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\DefaultIcon csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt nscp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\NeverShowExt winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\DefaultIcon nscp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\Shell\Open\Command csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\Shell\Open csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\NeverShowExt nscp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\DefaultIcon\ = "c:\\windows\\SysWow64\\rasphone.exe" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\NeverShowExt csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\DefaultIcon csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\Shell\Open\Command nscp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\Shell\Open\Command\ = "%1" nscp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\Shell\Open\Command\ = "%1" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\ = "System Mechanic" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\DefaultIcon\ = "c:\\windows\\SysWow64\\netsetup.exe" csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile nscp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm nscp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile de5374a3411efdbcad59a2c7defac4e6c17bf174da19c5d020f7765748c61c20.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\ = "Microsoft System Direct" csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\Shell\Open\Command nscp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\Shell\Open\Command\ = "%1" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\NeverShowExt nscp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt services.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\Shell\Open\Command csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd nscp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\ = "Microsoft System Direct" nscp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\DefaultIcon nscp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\ = "Microsoft System Direct" winlogon.exe -
Runs ping.exe 1 TTPs 27 IoCs
Processes:
ping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exepid process 1564 ping.exe 1884 ping.exe 1300 ping.exe 580 ping.exe 2328 ping.exe 2772 ping.exe 2300 ping.exe 2980 ping.exe 3064 ping.exe 2764 ping.exe 992 ping.exe 956 ping.exe 864 ping.exe 1668 ping.exe 2288 ping.exe 1816 ping.exe 292 ping.exe 2788 ping.exe 268 ping.exe 2060 ping.exe 2780 ping.exe 2456 ping.exe 1652 ping.exe 2016 ping.exe 2292 ping.exe 432 ping.exe 2312 ping.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
csrss.exesmss.exelsass.exepid process 564 csrss.exe 564 csrss.exe 564 csrss.exe 564 csrss.exe 564 csrss.exe 564 csrss.exe 564 csrss.exe 564 csrss.exe 564 csrss.exe 564 csrss.exe 564 csrss.exe 564 csrss.exe 564 csrss.exe 564 csrss.exe 564 csrss.exe 564 csrss.exe 564 csrss.exe 564 csrss.exe 564 csrss.exe 564 csrss.exe 564 csrss.exe 564 csrss.exe 564 csrss.exe 564 csrss.exe 564 csrss.exe 564 csrss.exe 564 csrss.exe 564 csrss.exe 564 csrss.exe 564 csrss.exe 1980 smss.exe 1980 smss.exe 1980 smss.exe 1980 smss.exe 1980 smss.exe 1980 smss.exe 1980 smss.exe 1980 smss.exe 1980 smss.exe 1980 smss.exe 1980 smss.exe 1980 smss.exe 1980 smss.exe 1980 smss.exe 1980 smss.exe 1980 smss.exe 1980 smss.exe 1980 smss.exe 1980 smss.exe 1980 smss.exe 1980 smss.exe 1980 smss.exe 1980 smss.exe 1980 smss.exe 1980 smss.exe 1980 smss.exe 1980 smss.exe 1980 smss.exe 1980 smss.exe 1980 smss.exe 1360 lsass.exe 1360 lsass.exe 1360 lsass.exe 1360 lsass.exe -
Suspicious use of FindShellTrayWindow 6 IoCs
Processes:
rundll32.exerundll32.exerundll32.exerundll32.exerundll32.exerundll32.exepid process 792 rundll32.exe 1672 rundll32.exe 680 rundll32.exe 1328 rundll32.exe 1644 rundll32.exe 2724 rundll32.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
Processes:
de5374a3411efdbcad59a2c7defac4e6c17bf174da19c5d020f7765748c61c20.exede5374a3411efdbcad59a2c7defac4e6c17bf174da19c5d020f7765748c61c20.exe csrss.execsrss.exe csrss.execsrss.exe nscp.exesmss.exesmss.exe csrss.execsrss.exe smss.exesmss.exe lsass.exelsass.exe csrss.execsrss.exe smss.exesmss.exe lsass.exelsass.exe services.exeservices.exe csrss.execsrss.exe smss.exesmss.exe lsass.exelsass.exe services.exeservices.exe smss.exelsass.exeservices.exewinlogon.exewinlogon.exesmss.exe winlogon.exe lsass.exe services.exe lsass.exelsass.exe services.exewinlogon.exeParaysutki_VM_Communitywinlogon.exe services.exe services.exeservices.exe nizw.exewinlogon.exewinlogon.exe winlogon.exeParaysutki_VM_Communitywinlogon.exe Paraysutki_VM_Communitywinlogon.exe csrss.exeParaysutki_VM_Communitycsrss.exe Paraysutki_VM_Communitysmss.exesmss.exe lsass.exepid process 308 de5374a3411efdbcad59a2c7defac4e6c17bf174da19c5d020f7765748c61c20.exe 572 de5374a3411efdbcad59a2c7defac4e6c17bf174da19c5d020f7765748c61c20.exe 564 csrss.exe 1948 csrss.exe 1524 csrss.exe 1544 csrss.exe 868 nscp.exe 1980 smss.exe 980 smss.exe 1100 csrss.exe 432 csrss.exe 1988 smss.exe 1644 smss.exe 1360 lsass.exe 584 lsass.exe 864 csrss.exe 1672 csrss.exe 760 smss.exe 676 smss.exe 1488 lsass.exe 516 lsass.exe 1780 services.exe 964 services.exe 744 csrss.exe 396 csrss.exe 992 smss.exe 1816 smss.exe 1284 lsass.exe 1844 lsass.exe 1892 services.exe 1252 services.exe 1440 smss.exe 1144 lsass.exe 1100 services.exe 616 winlogon.exe 1676 winlogon.exe 1912 smss.exe 1588 winlogon.exe 1128 lsass.exe 1712 services.exe 1592 lsass.exe 1800 lsass.exe 1652 services.exe 1344 winlogon.exe 1412 Paraysutki_VM_Community 1472 winlogon.exe 1300 services.exe 1052 services.exe 1336 services.exe 1812 nizw.exe 1624 winlogon.exe 740 winlogon.exe 1876 winlogon.exe 816 Paraysutki_VM_Community 1988 winlogon.exe 1680 Paraysutki_VM_Community 1596 winlogon.exe 1912 csrss.exe 1716 Paraysutki_VM_Community 760 csrss.exe 1528 Paraysutki_VM_Community 1440 smss.exe 1808 smss.exe 940 lsass.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
de5374a3411efdbcad59a2c7defac4e6c17bf174da19c5d020f7765748c61c20.exede5374a3411efdbcad59a2c7defac4e6c17bf174da19c5d020f7765748c61c20.exe csrss.execsrss.exe csrss.exesmss.exesmss.exe csrss.exesmss.exelsass.exelsass.exe csrss.exedescription pid process target process PID 308 wrote to memory of 572 308 de5374a3411efdbcad59a2c7defac4e6c17bf174da19c5d020f7765748c61c20.exe de5374a3411efdbcad59a2c7defac4e6c17bf174da19c5d020f7765748c61c20.exe PID 308 wrote to memory of 572 308 de5374a3411efdbcad59a2c7defac4e6c17bf174da19c5d020f7765748c61c20.exe de5374a3411efdbcad59a2c7defac4e6c17bf174da19c5d020f7765748c61c20.exe PID 308 wrote to memory of 572 308 de5374a3411efdbcad59a2c7defac4e6c17bf174da19c5d020f7765748c61c20.exe de5374a3411efdbcad59a2c7defac4e6c17bf174da19c5d020f7765748c61c20.exe PID 308 wrote to memory of 572 308 de5374a3411efdbcad59a2c7defac4e6c17bf174da19c5d020f7765748c61c20.exe de5374a3411efdbcad59a2c7defac4e6c17bf174da19c5d020f7765748c61c20.exe PID 572 wrote to memory of 564 572 de5374a3411efdbcad59a2c7defac4e6c17bf174da19c5d020f7765748c61c20.exe csrss.exe PID 572 wrote to memory of 564 572 de5374a3411efdbcad59a2c7defac4e6c17bf174da19c5d020f7765748c61c20.exe csrss.exe PID 572 wrote to memory of 564 572 de5374a3411efdbcad59a2c7defac4e6c17bf174da19c5d020f7765748c61c20.exe csrss.exe PID 572 wrote to memory of 564 572 de5374a3411efdbcad59a2c7defac4e6c17bf174da19c5d020f7765748c61c20.exe csrss.exe PID 564 wrote to memory of 1948 564 csrss.exe csrss.exe PID 564 wrote to memory of 1948 564 csrss.exe csrss.exe PID 564 wrote to memory of 1948 564 csrss.exe csrss.exe PID 564 wrote to memory of 1948 564 csrss.exe csrss.exe PID 1948 wrote to memory of 1524 1948 csrss.exe csrss.exe PID 1948 wrote to memory of 1524 1948 csrss.exe csrss.exe PID 1948 wrote to memory of 1524 1948 csrss.exe csrss.exe PID 1948 wrote to memory of 1524 1948 csrss.exe csrss.exe PID 1524 wrote to memory of 1544 1524 csrss.exe csrss.exe PID 1524 wrote to memory of 1544 1524 csrss.exe csrss.exe PID 1524 wrote to memory of 1544 1524 csrss.exe csrss.exe PID 1524 wrote to memory of 1544 1524 csrss.exe csrss.exe PID 1524 wrote to memory of 868 1524 csrss.exe nscp.exe PID 1524 wrote to memory of 868 1524 csrss.exe nscp.exe PID 1524 wrote to memory of 868 1524 csrss.exe nscp.exe PID 1524 wrote to memory of 868 1524 csrss.exe nscp.exe PID 1948 wrote to memory of 1980 1948 csrss.exe smss.exe PID 1948 wrote to memory of 1980 1948 csrss.exe smss.exe PID 1948 wrote to memory of 1980 1948 csrss.exe smss.exe PID 1948 wrote to memory of 1980 1948 csrss.exe smss.exe PID 1980 wrote to memory of 980 1980 smss.exe smss.exe PID 1980 wrote to memory of 980 1980 smss.exe smss.exe PID 1980 wrote to memory of 980 1980 smss.exe smss.exe PID 1980 wrote to memory of 980 1980 smss.exe smss.exe PID 980 wrote to memory of 1100 980 smss.exe csrss.exe PID 980 wrote to memory of 1100 980 smss.exe csrss.exe PID 980 wrote to memory of 1100 980 smss.exe csrss.exe PID 980 wrote to memory of 1100 980 smss.exe csrss.exe PID 1100 wrote to memory of 432 1100 csrss.exe csrss.exe PID 1100 wrote to memory of 432 1100 csrss.exe csrss.exe PID 1100 wrote to memory of 432 1100 csrss.exe csrss.exe PID 1100 wrote to memory of 432 1100 csrss.exe csrss.exe PID 980 wrote to memory of 1988 980 smss.exe smss.exe PID 980 wrote to memory of 1988 980 smss.exe smss.exe PID 980 wrote to memory of 1988 980 smss.exe smss.exe PID 980 wrote to memory of 1988 980 smss.exe smss.exe PID 1988 wrote to memory of 1644 1988 smss.exe smss.exe PID 1988 wrote to memory of 1644 1988 smss.exe smss.exe PID 1988 wrote to memory of 1644 1988 smss.exe smss.exe PID 1988 wrote to memory of 1644 1988 smss.exe smss.exe PID 980 wrote to memory of 1360 980 smss.exe lsass.exe PID 980 wrote to memory of 1360 980 smss.exe lsass.exe PID 980 wrote to memory of 1360 980 smss.exe lsass.exe PID 980 wrote to memory of 1360 980 smss.exe lsass.exe PID 1360 wrote to memory of 584 1360 lsass.exe lsass.exe PID 1360 wrote to memory of 584 1360 lsass.exe lsass.exe PID 1360 wrote to memory of 584 1360 lsass.exe lsass.exe PID 1360 wrote to memory of 584 1360 lsass.exe lsass.exe PID 584 wrote to memory of 864 584 lsass.exe csrss.exe PID 584 wrote to memory of 864 584 lsass.exe csrss.exe PID 584 wrote to memory of 864 584 lsass.exe csrss.exe PID 584 wrote to memory of 864 584 lsass.exe csrss.exe PID 864 wrote to memory of 1672 864 csrss.exe csrss.exe PID 864 wrote to memory of 1672 864 csrss.exe csrss.exe PID 864 wrote to memory of 1672 864 csrss.exe csrss.exe PID 864 wrote to memory of 1672 864 csrss.exe csrss.exe -
System policy modification 1 TTPs 14 IoCs
Processes:
services.exe csrss.exe lsass.exe smss.exe de5374a3411efdbcad59a2c7defac4e6c17bf174da19c5d020f7765748c61c20.exe services.exe csrss.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System services.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System csrss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" lsass.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" smss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" services.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System smss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" de5374a3411efdbcad59a2c7defac4e6c17bf174da19c5d020f7765748c61c20.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" services.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System services.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System lsass.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System de5374a3411efdbcad59a2c7defac4e6c17bf174da19c5d020f7765748c61c20.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System csrss.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\de5374a3411efdbcad59a2c7defac4e6c17bf174da19c5d020f7765748c61c20.exe"C:\Users\Admin\AppData\Local\Temp\de5374a3411efdbcad59a2c7defac4e6c17bf174da19c5d020f7765748c61c20.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\de5374a3411efdbcad59a2c7defac4e6c17bf174da19c5d020f7765748c61c20.exeC:\Users\Admin\AppData\Local\Temp\de5374a3411efdbcad59a2c7defac4e6c17bf174da19c5d020f7765748c61c20.exe2⤵
- Modifies WinLogon for persistence
- Modifies system executable filetype association
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- UAC bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Sets file execution options in registry
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\csrss.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~\csrss.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\csrss.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\csrss.exe4⤵
- Modifies WinLogon for persistence
- Modifies system executable filetype association
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- UAC bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Sets file execution options in registry
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\csrss.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~\csrss.exe5⤵
- Modifies system executable filetype association
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\csrss.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\csrss.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
-
\??\c:\Documents and Settings\Admin\Application Data\Microsoft\nscp.exe"c:\Documents and Settings\Admin\Application Data\Microsoft\nscp.exe" csrss6⤵
- Modifies system executable filetype association
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\smss.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~\smss.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\smss.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\smss.exe6⤵
- Modifies WinLogon for persistence
- Modifies system executable filetype association
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- UAC bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Sets file execution options in registry
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\csrss.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~\csrss.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\csrss.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\csrss.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\smss.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~\smss.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\smss.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\smss.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\lsass.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~\lsass.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\lsass.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\lsass.exe8⤵
- Modifies WinLogon for persistence
- Modifies system executable filetype association
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- UAC bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Sets file execution options in registry
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\csrss.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~\csrss.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\csrss.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\csrss.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\smss.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~\smss.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\smss.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\smss.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\lsass.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~\lsass.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\lsass.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\lsass.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\services.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~\services.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\services.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\services.exe10⤵
- Modifies WinLogon for persistence
- Modifies system executable filetype association
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- UAC bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Sets file execution options in registry
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- System policy modification
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\csrss.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~\csrss.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\csrss.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\csrss.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\smss.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~\smss.exe11⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\smss.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\smss.exe12⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\lsass.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~\lsass.exe11⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\lsass.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\lsass.exe12⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\services.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~\services.exe11⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\services.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\services.exe12⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\winlogon.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~\winlogon.exe11⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\winlogon.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\winlogon.exe12⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\csrss.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~\csrss.exe13⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\csrss.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\csrss.exe14⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\smss.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~\smss.exe13⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\smss.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\smss.exe14⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\lsass.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~\lsass.exe13⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\lsass.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\lsass.exe14⤵
- Executes dropped EXE
- Drops file in System32 directory
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\csrss.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~\csrss.exe15⤵
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\csrss.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\csrss.exe16⤵
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\smss.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~\smss.exe15⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\smss.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\smss.exe16⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\csrss.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~\csrss.exe17⤵
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\csrss.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\csrss.exe18⤵
- Modifies WinLogon for persistence
- Modifies system executable filetype association
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- UAC bypass
- Disables RegEdit via registry modification
- Sets file execution options in registry
- Adds Run key to start application
- Checks whether UAC is enabled
- Modifies Internet Explorer settings
- Modifies registry class
- System policy modification
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\csrss.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~\csrss.exe19⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\csrss.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\csrss.exe20⤵
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\smss.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~\smss.exe19⤵
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\smss.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\smss.exe20⤵
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\lsass.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~\lsass.exe19⤵
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\lsass.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\lsass.exe20⤵
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\services.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~\services.exe19⤵
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\services.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\services.exe20⤵
- Modifies WinLogon for persistence
- Modifies system executable filetype association
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- UAC bypass
- Disables RegEdit via registry modification
- Sets file execution options in registry
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Modifies Internet Explorer settings
- Modifies registry class
- System policy modification
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\csrss.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~\csrss.exe21⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\csrss.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\csrss.exe22⤵
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\smss.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~\smss.exe21⤵
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\smss.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\smss.exe22⤵
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\lsass.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~\lsass.exe21⤵
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\lsass.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\lsass.exe22⤵
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\services.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~\services.exe21⤵
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\services.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\services.exe22⤵
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\winlogon.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~\winlogon.exe21⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\winlogon.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\winlogon.exe22⤵
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\Paraysutki_VM_CommunityC:\Windows\System32\~A~m~B~u~R~a~D~u~L~\Paraysutki_VM_Community21⤵
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Windows\System32\shimgvw.dll, ImageView_Fullscreen21⤵
- Suspicious use of FindShellTrayWindow
-
C:\Windows\SysWOW64\ping.exeping www.rasasayang.com.my -n 65500 -l 134021⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\ping.exeping www.data0.net -n 65500 -l 134021⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\ping.exeping www.duniasex.com -n 65500 -l 134021⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\winlogon.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~\winlogon.exe19⤵
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\winlogon.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\winlogon.exe20⤵
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\Paraysutki_VM_CommunityC:\Windows\System32\~A~m~B~u~R~a~D~u~L~\Paraysutki_VM_Community19⤵
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Windows\System32\shimgvw.dll, ImageView_Fullscreen19⤵
-
C:\Windows\SysWOW64\ping.exeping www.rasasayang.com.my -n 65500 -l 134019⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\ping.exeping www.data0.net -n 65500 -l 134019⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\ping.exeping www.duniasex.com -n 65500 -l 134019⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\smss.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~\smss.exe17⤵
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\lsass.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~\lsass.exe17⤵
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\lsass.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\lsass.exe18⤵
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\services.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~\services.exe17⤵
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\services.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\services.exe18⤵
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\winlogon.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~\winlogon.exe17⤵
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\winlogon.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\winlogon.exe18⤵
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\Paraysutki_VM_CommunityC:\Windows\System32\~A~m~B~u~R~a~D~u~L~\Paraysutki_VM_Community17⤵
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Windows\System32\shimgvw.dll, ImageView_Fullscreen17⤵
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\lsass.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~\lsass.exe15⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\lsass.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\lsass.exe16⤵
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\services.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~\services.exe15⤵
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\winlogon.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~\winlogon.exe15⤵
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\winlogon.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\winlogon.exe16⤵
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\Paraysutki_VM_CommunityC:\Windows\System32\~A~m~B~u~R~a~D~u~L~\Paraysutki_VM_Community15⤵
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Windows\System32\shimgvw.dll, ImageView_Fullscreen15⤵
-
C:\Windows\SysWOW64\ping.exeping www.rasasayang.com.my -n 65500 -l 134015⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\ping.exeping www.data0.net -n 65500 -l 134015⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\ping.exeping www.duniasex.com -n 65500 -l 134015⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\services.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~\services.exe13⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\services.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\services.exe14⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\csrss.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~\csrss.exe15⤵
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\csrss.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\csrss.exe16⤵
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\smss.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~\smss.exe15⤵
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\smss.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\smss.exe16⤵
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\lsass.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~\lsass.exe15⤵
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\lsass.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\lsass.exe16⤵
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\services.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~\services.exe15⤵
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\services.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\services.exe16⤵
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\winlogon.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~\winlogon.exe15⤵
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\winlogon.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\winlogon.exe16⤵
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\Paraysutki_VM_CommunityC:\Windows\System32\~A~m~B~u~R~a~D~u~L~\Paraysutki_VM_Community15⤵
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Windows\System32\shimgvw.dll, ImageView_Fullscreen15⤵
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\winlogon.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~\winlogon.exe13⤵
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\winlogon.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\winlogon.exe14⤵
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\Paraysutki_VM_CommunityC:\Windows\System32\~A~m~B~u~R~a~D~u~L~\Paraysutki_VM_Community13⤵
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Windows\System32\shimgvw.dll, ImageView_Fullscreen13⤵
-
C:\Windows\SysWOW64\ping.exeping www.rasasayang.com.my -n 65500 -l 134013⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\ping.exeping www.data0.net -n 65500 -l 134013⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\ping.exeping www.duniasex.com -n 65500 -l 134013⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\Paraysutki_VM_CommunityC:\Windows\System32\~A~m~B~u~R~a~D~u~L~\Paraysutki_VM_Community11⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Windows\System32\shimgvw.dll, ImageView_Fullscreen11⤵
- Suspicious use of FindShellTrayWindow
-
C:\Windows\SysWOW64\ping.exeping www.data0.net -n 65500 -l 134011⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\ping.exeping www.duniasex.com -n 65500 -l 134011⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\ping.exeping www.rasasayang.com.my -n 65500 -l 134011⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\winlogon.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~\winlogon.exe9⤵
- Modifies system executable filetype association
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\winlogon.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\winlogon.exe10⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
\??\c:\Documents and Settings\Admin\Application Data\Microsoft\nizw.exe"c:\Documents and Settings\Admin\Application Data\Microsoft\nizw.exe" winlogon10⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\Paraysutki_VM_CommunityC:\Windows\System32\~A~m~B~u~R~a~D~u~L~\Paraysutki_VM_Community9⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Windows\System32\shimgvw.dll, ImageView_Fullscreen9⤵
- Suspicious use of FindShellTrayWindow
-
C:\Windows\SysWOW64\ping.exeping www.rasasayang.com.my -n 65500 -l 13409⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\ping.exeping www.data0.net -n 65500 -l 13409⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\ping.exeping www.duniasex.com -n 65500 -l 13409⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\services.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~\services.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\services.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\services.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\winlogon.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~\winlogon.exe7⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\winlogon.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\winlogon.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\Paraysutki_VM_CommunityC:\Windows\System32\~A~m~B~u~R~a~D~u~L~\Paraysutki_VM_Community7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Windows\System32\shimgvw.dll, ImageView_Fullscreen7⤵
- Suspicious use of FindShellTrayWindow
-
C:\Windows\SysWOW64\ping.exeping www.duniasex.com -n 65500 -l 13407⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\ping.exeping www.rasasayang.com.my -n 65500 -l 13407⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\ping.exeping www.data0.net -n 65500 -l 13407⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\lsass.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~\lsass.exe5⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\lsass.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\lsass.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\services.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~\services.exe5⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\services.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\services.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\winlogon.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~\winlogon.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\winlogon.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\winlogon.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\Paraysutki_VM_CommunityC:\Windows\System32\~A~m~B~u~R~a~D~u~L~\Paraysutki_VM_Community5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Windows\System32\shimgvw.dll, ImageView_Fullscreen5⤵
- Suspicious use of FindShellTrayWindow
-
C:\Windows\SysWOW64\ping.exeping www.duniasex.com -n 65500 -l 13405⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\ping.exeping www.rasasayang.com.my -n 65500 -l 13405⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\ping.exeping www.data0.net -n 65500 -l 13405⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\smss.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~\smss.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\smss.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\smss.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\lsass.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~\lsass.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\lsass.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\lsass.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\services.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~\services.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\services.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\services.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\winlogon.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~\winlogon.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\winlogon.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\winlogon.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\Paraysutki_VM_CommunityC:\Windows\System32\~A~m~B~u~R~a~D~u~L~\Paraysutki_VM_Community3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Windows\System32\shimgvw.dll, ImageView_Fullscreen3⤵
- Suspicious use of FindShellTrayWindow
-
C:\Windows\SysWOW64\ping.exeping www.rasasayang.com.my -n 65500 -l 13403⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\ping.exeping www.data0.net -n 65500 -l 13403⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\ping.exeping www.duniasex.com -n 65500 -l 13403⤵
- Runs ping.exe
Network
MITRE ATT&CK Matrix ATT&CK v6
Persistence
Winlogon Helper DLL
1Change Default File Association
1Hidden Files and Directories
2Registry Run Keys / Startup Folder
2Defense Evasion
Modify Registry
9Hidden Files and Directories
2Bypass User Account Control
1Disabling Security Tools
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\de5374a3411efdbcad59a2c7defac4e6c17bf174da19c5d020f7765748c61c20.exeFilesize
50KB
MD5940d24de51296709ead002014ae37c40
SHA17cebaccaa9a213585f71d2a845ca7fd7d2c1cb7d
SHA256d9afef82aafa6709ca6879cdd7915e76999bc5b150301b3ccd73d7a8ef14c3b6
SHA5126646e85234e44185762d30705a2baf591241ae25459700f4699f3931f72d9138723aa52da6a479c72d8e9b0366892584f660b9b14f54d8672279cce7c44e7c64
-
C:\Users\Admin\AppData\Roaming\Microsoft\nscp.exeFilesize
76KB
MD53f19943409c852e0a4dad30f50dccefd
SHA1a4214a7706849fc05c9e1572cafdc77006abd0e9
SHA2568f0fa9b701a9a3f54ad27ce56d9756c4f93460a47c65a6ec25aaf04733245f48
SHA512e852c6dd557013d12c7a0bc394074cb1bf6f89142486c68d704efb599521a5f18c514b9959a984d2b93164aacfbe5c5666d0383f2794cbdf1f6526914a87e517
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\MSVBVM60.DLLFilesize
1.3MB
MD55343a19c618bc515ceb1695586c6c137
SHA14dedae8cbde066f31c8e6b52c0baa3f8b1117742
SHA2562246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce
SHA512708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\Paraysutki_VM_CommunityFilesize
127KB
MD5f0ad7d62b35e10c88e59639550de21b2
SHA12017b28ad5cf5e4fdf697873b0a5f92690366a9e
SHA25681066623350d16f76cc5533d87abb8d550dd8269dd99559d48a47875056ed812
SHA512184421b11acee798edfc8727619e4a8331f2dfcfbe500903676b5d87960d2ecb533e465c9a159c15a039d535a8d0e3d0b04c2433530ae81dbe6f1467677223c3
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\csrss.exeFilesize
127KB
MD5f0ad7d62b35e10c88e59639550de21b2
SHA12017b28ad5cf5e4fdf697873b0a5f92690366a9e
SHA25681066623350d16f76cc5533d87abb8d550dd8269dd99559d48a47875056ed812
SHA512184421b11acee798edfc8727619e4a8331f2dfcfbe500903676b5d87960d2ecb533e465c9a159c15a039d535a8d0e3d0b04c2433530ae81dbe6f1467677223c3
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\csrss.exeFilesize
127KB
MD5f0ad7d62b35e10c88e59639550de21b2
SHA12017b28ad5cf5e4fdf697873b0a5f92690366a9e
SHA25681066623350d16f76cc5533d87abb8d550dd8269dd99559d48a47875056ed812
SHA512184421b11acee798edfc8727619e4a8331f2dfcfbe500903676b5d87960d2ecb533e465c9a159c15a039d535a8d0e3d0b04c2433530ae81dbe6f1467677223c3
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\csrss.exeFilesize
127KB
MD5f0ad7d62b35e10c88e59639550de21b2
SHA12017b28ad5cf5e4fdf697873b0a5f92690366a9e
SHA25681066623350d16f76cc5533d87abb8d550dd8269dd99559d48a47875056ed812
SHA512184421b11acee798edfc8727619e4a8331f2dfcfbe500903676b5d87960d2ecb533e465c9a159c15a039d535a8d0e3d0b04c2433530ae81dbe6f1467677223c3
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\csrss.exeFilesize
127KB
MD5f0ad7d62b35e10c88e59639550de21b2
SHA12017b28ad5cf5e4fdf697873b0a5f92690366a9e
SHA25681066623350d16f76cc5533d87abb8d550dd8269dd99559d48a47875056ed812
SHA512184421b11acee798edfc8727619e4a8331f2dfcfbe500903676b5d87960d2ecb533e465c9a159c15a039d535a8d0e3d0b04c2433530ae81dbe6f1467677223c3
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\csrss.exeFilesize
50KB
MD5940d24de51296709ead002014ae37c40
SHA17cebaccaa9a213585f71d2a845ca7fd7d2c1cb7d
SHA256d9afef82aafa6709ca6879cdd7915e76999bc5b150301b3ccd73d7a8ef14c3b6
SHA5126646e85234e44185762d30705a2baf591241ae25459700f4699f3931f72d9138723aa52da6a479c72d8e9b0366892584f660b9b14f54d8672279cce7c44e7c64
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\csrss.exeFilesize
50KB
MD5940d24de51296709ead002014ae37c40
SHA17cebaccaa9a213585f71d2a845ca7fd7d2c1cb7d
SHA256d9afef82aafa6709ca6879cdd7915e76999bc5b150301b3ccd73d7a8ef14c3b6
SHA5126646e85234e44185762d30705a2baf591241ae25459700f4699f3931f72d9138723aa52da6a479c72d8e9b0366892584f660b9b14f54d8672279cce7c44e7c64
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\csrss.exeFilesize
50KB
MD5940d24de51296709ead002014ae37c40
SHA17cebaccaa9a213585f71d2a845ca7fd7d2c1cb7d
SHA256d9afef82aafa6709ca6879cdd7915e76999bc5b150301b3ccd73d7a8ef14c3b6
SHA5126646e85234e44185762d30705a2baf591241ae25459700f4699f3931f72d9138723aa52da6a479c72d8e9b0366892584f660b9b14f54d8672279cce7c44e7c64
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\csrss.exeFilesize
50KB
MD5940d24de51296709ead002014ae37c40
SHA17cebaccaa9a213585f71d2a845ca7fd7d2c1cb7d
SHA256d9afef82aafa6709ca6879cdd7915e76999bc5b150301b3ccd73d7a8ef14c3b6
SHA5126646e85234e44185762d30705a2baf591241ae25459700f4699f3931f72d9138723aa52da6a479c72d8e9b0366892584f660b9b14f54d8672279cce7c44e7c64
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\lsass.exeFilesize
127KB
MD5f0ad7d62b35e10c88e59639550de21b2
SHA12017b28ad5cf5e4fdf697873b0a5f92690366a9e
SHA25681066623350d16f76cc5533d87abb8d550dd8269dd99559d48a47875056ed812
SHA512184421b11acee798edfc8727619e4a8331f2dfcfbe500903676b5d87960d2ecb533e465c9a159c15a039d535a8d0e3d0b04c2433530ae81dbe6f1467677223c3
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\lsass.exeFilesize
127KB
MD5f0ad7d62b35e10c88e59639550de21b2
SHA12017b28ad5cf5e4fdf697873b0a5f92690366a9e
SHA25681066623350d16f76cc5533d87abb8d550dd8269dd99559d48a47875056ed812
SHA512184421b11acee798edfc8727619e4a8331f2dfcfbe500903676b5d87960d2ecb533e465c9a159c15a039d535a8d0e3d0b04c2433530ae81dbe6f1467677223c3
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\services.exeFilesize
127KB
MD5f0ad7d62b35e10c88e59639550de21b2
SHA12017b28ad5cf5e4fdf697873b0a5f92690366a9e
SHA25681066623350d16f76cc5533d87abb8d550dd8269dd99559d48a47875056ed812
SHA512184421b11acee798edfc8727619e4a8331f2dfcfbe500903676b5d87960d2ecb533e465c9a159c15a039d535a8d0e3d0b04c2433530ae81dbe6f1467677223c3
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\smss.exeFilesize
127KB
MD5f0ad7d62b35e10c88e59639550de21b2
SHA12017b28ad5cf5e4fdf697873b0a5f92690366a9e
SHA25681066623350d16f76cc5533d87abb8d550dd8269dd99559d48a47875056ed812
SHA512184421b11acee798edfc8727619e4a8331f2dfcfbe500903676b5d87960d2ecb533e465c9a159c15a039d535a8d0e3d0b04c2433530ae81dbe6f1467677223c3
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\smss.exeFilesize
127KB
MD5f0ad7d62b35e10c88e59639550de21b2
SHA12017b28ad5cf5e4fdf697873b0a5f92690366a9e
SHA25681066623350d16f76cc5533d87abb8d550dd8269dd99559d48a47875056ed812
SHA512184421b11acee798edfc8727619e4a8331f2dfcfbe500903676b5d87960d2ecb533e465c9a159c15a039d535a8d0e3d0b04c2433530ae81dbe6f1467677223c3
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\smss.exeFilesize
127KB
MD5f0ad7d62b35e10c88e59639550de21b2
SHA12017b28ad5cf5e4fdf697873b0a5f92690366a9e
SHA25681066623350d16f76cc5533d87abb8d550dd8269dd99559d48a47875056ed812
SHA512184421b11acee798edfc8727619e4a8331f2dfcfbe500903676b5d87960d2ecb533e465c9a159c15a039d535a8d0e3d0b04c2433530ae81dbe6f1467677223c3
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\smss.exeFilesize
50KB
MD5940d24de51296709ead002014ae37c40
SHA17cebaccaa9a213585f71d2a845ca7fd7d2c1cb7d
SHA256d9afef82aafa6709ca6879cdd7915e76999bc5b150301b3ccd73d7a8ef14c3b6
SHA5126646e85234e44185762d30705a2baf591241ae25459700f4699f3931f72d9138723aa52da6a479c72d8e9b0366892584f660b9b14f54d8672279cce7c44e7c64
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\smss.exeFilesize
50KB
MD5940d24de51296709ead002014ae37c40
SHA17cebaccaa9a213585f71d2a845ca7fd7d2c1cb7d
SHA256d9afef82aafa6709ca6879cdd7915e76999bc5b150301b3ccd73d7a8ef14c3b6
SHA5126646e85234e44185762d30705a2baf591241ae25459700f4699f3931f72d9138723aa52da6a479c72d8e9b0366892584f660b9b14f54d8672279cce7c44e7c64
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\smss.exeFilesize
50KB
MD5940d24de51296709ead002014ae37c40
SHA17cebaccaa9a213585f71d2a845ca7fd7d2c1cb7d
SHA256d9afef82aafa6709ca6879cdd7915e76999bc5b150301b3ccd73d7a8ef14c3b6
SHA5126646e85234e44185762d30705a2baf591241ae25459700f4699f3931f72d9138723aa52da6a479c72d8e9b0366892584f660b9b14f54d8672279cce7c44e7c64
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\winlogon.exeFilesize
127KB
MD5f0ad7d62b35e10c88e59639550de21b2
SHA12017b28ad5cf5e4fdf697873b0a5f92690366a9e
SHA25681066623350d16f76cc5533d87abb8d550dd8269dd99559d48a47875056ed812
SHA512184421b11acee798edfc8727619e4a8331f2dfcfbe500903676b5d87960d2ecb533e465c9a159c15a039d535a8d0e3d0b04c2433530ae81dbe6f1467677223c3
-
\??\c:\Documents and Settings\Admin\Application Data\Microsoft\nscp.exeFilesize
76KB
MD53f19943409c852e0a4dad30f50dccefd
SHA1a4214a7706849fc05c9e1572cafdc77006abd0e9
SHA2568f0fa9b701a9a3f54ad27ce56d9756c4f93460a47c65a6ec25aaf04733245f48
SHA512e852c6dd557013d12c7a0bc394074cb1bf6f89142486c68d704efb599521a5f18c514b9959a984d2b93164aacfbe5c5666d0383f2794cbdf1f6526914a87e517
-
\??\c:\windows\SysWOW64\Windows 3D.scrMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
\??\c:\windows\SysWOW64\maxtrox.txtFilesize
8B
MD524865ca220aa1936cbac0a57685217c5
SHA137f687cafe79e91eae6cbdffbf2f7ad3975f5e83
SHA256841e95fa333ed89085bfbab19bb658d96ed0c837d25721411233fa55c860c743
SHA512c8d3f514c72f48fed5de9582c4252cf5466a9d32866d8df3631ba9274ed734bb95139e4909e8116a10947fc1afa1dbeb33809da6ec050e6e4eb83d5241aeb062
-
\??\c:\windows\SysWOW64\maxtrox.txtFilesize
8B
MD524865ca220aa1936cbac0a57685217c5
SHA137f687cafe79e91eae6cbdffbf2f7ad3975f5e83
SHA256841e95fa333ed89085bfbab19bb658d96ed0c837d25721411233fa55c860c743
SHA512c8d3f514c72f48fed5de9582c4252cf5466a9d32866d8df3631ba9274ed734bb95139e4909e8116a10947fc1afa1dbeb33809da6ec050e6e4eb83d5241aeb062
-
\??\c:\windows\SysWOW64\maxtrox.txtFilesize
8B
MD524865ca220aa1936cbac0a57685217c5
SHA137f687cafe79e91eae6cbdffbf2f7ad3975f5e83
SHA256841e95fa333ed89085bfbab19bb658d96ed0c837d25721411233fa55c860c743
SHA512c8d3f514c72f48fed5de9582c4252cf5466a9d32866d8df3631ba9274ed734bb95139e4909e8116a10947fc1afa1dbeb33809da6ec050e6e4eb83d5241aeb062
-
\??\c:\windows\SysWOW64\maxtrox.txtFilesize
8B
MD524865ca220aa1936cbac0a57685217c5
SHA137f687cafe79e91eae6cbdffbf2f7ad3975f5e83
SHA256841e95fa333ed89085bfbab19bb658d96ed0c837d25721411233fa55c860c743
SHA512c8d3f514c72f48fed5de9582c4252cf5466a9d32866d8df3631ba9274ed734bb95139e4909e8116a10947fc1afa1dbeb33809da6ec050e6e4eb83d5241aeb062
-
\??\c:\windows\SysWOW64\maxtrox.txtFilesize
8B
MD524865ca220aa1936cbac0a57685217c5
SHA137f687cafe79e91eae6cbdffbf2f7ad3975f5e83
SHA256841e95fa333ed89085bfbab19bb658d96ed0c837d25721411233fa55c860c743
SHA512c8d3f514c72f48fed5de9582c4252cf5466a9d32866d8df3631ba9274ed734bb95139e4909e8116a10947fc1afa1dbeb33809da6ec050e6e4eb83d5241aeb062
-
\??\c:\windows\SysWOW64\maxtrox.txtFilesize
8B
MD524865ca220aa1936cbac0a57685217c5
SHA137f687cafe79e91eae6cbdffbf2f7ad3975f5e83
SHA256841e95fa333ed89085bfbab19bb658d96ed0c837d25721411233fa55c860c743
SHA512c8d3f514c72f48fed5de9582c4252cf5466a9d32866d8df3631ba9274ed734bb95139e4909e8116a10947fc1afa1dbeb33809da6ec050e6e4eb83d5241aeb062
-
\Users\Admin\AppData\Local\Temp\de5374a3411efdbcad59a2c7defac4e6c17bf174da19c5d020f7765748c61c20.exeFilesize
50KB
MD5940d24de51296709ead002014ae37c40
SHA17cebaccaa9a213585f71d2a845ca7fd7d2c1cb7d
SHA256d9afef82aafa6709ca6879cdd7915e76999bc5b150301b3ccd73d7a8ef14c3b6
SHA5126646e85234e44185762d30705a2baf591241ae25459700f4699f3931f72d9138723aa52da6a479c72d8e9b0366892584f660b9b14f54d8672279cce7c44e7c64
-
\Users\Admin\AppData\Local\Temp\de5374a3411efdbcad59a2c7defac4e6c17bf174da19c5d020f7765748c61c20.exeFilesize
50KB
MD5940d24de51296709ead002014ae37c40
SHA17cebaccaa9a213585f71d2a845ca7fd7d2c1cb7d
SHA256d9afef82aafa6709ca6879cdd7915e76999bc5b150301b3ccd73d7a8ef14c3b6
SHA5126646e85234e44185762d30705a2baf591241ae25459700f4699f3931f72d9138723aa52da6a479c72d8e9b0366892584f660b9b14f54d8672279cce7c44e7c64
-
\Users\Admin\AppData\Roaming\Microsoft\nscp.exeFilesize
76KB
MD53f19943409c852e0a4dad30f50dccefd
SHA1a4214a7706849fc05c9e1572cafdc77006abd0e9
SHA2568f0fa9b701a9a3f54ad27ce56d9756c4f93460a47c65a6ec25aaf04733245f48
SHA512e852c6dd557013d12c7a0bc394074cb1bf6f89142486c68d704efb599521a5f18c514b9959a984d2b93164aacfbe5c5666d0383f2794cbdf1f6526914a87e517
-
\Users\Admin\AppData\Roaming\Microsoft\nscp.exeFilesize
76KB
MD53f19943409c852e0a4dad30f50dccefd
SHA1a4214a7706849fc05c9e1572cafdc77006abd0e9
SHA2568f0fa9b701a9a3f54ad27ce56d9756c4f93460a47c65a6ec25aaf04733245f48
SHA512e852c6dd557013d12c7a0bc394074cb1bf6f89142486c68d704efb599521a5f18c514b9959a984d2b93164aacfbe5c5666d0383f2794cbdf1f6526914a87e517
-
\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\csrss.exeFilesize
127KB
MD5f0ad7d62b35e10c88e59639550de21b2
SHA12017b28ad5cf5e4fdf697873b0a5f92690366a9e
SHA25681066623350d16f76cc5533d87abb8d550dd8269dd99559d48a47875056ed812
SHA512184421b11acee798edfc8727619e4a8331f2dfcfbe500903676b5d87960d2ecb533e465c9a159c15a039d535a8d0e3d0b04c2433530ae81dbe6f1467677223c3
-
\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\csrss.exeFilesize
127KB
MD5f0ad7d62b35e10c88e59639550de21b2
SHA12017b28ad5cf5e4fdf697873b0a5f92690366a9e
SHA25681066623350d16f76cc5533d87abb8d550dd8269dd99559d48a47875056ed812
SHA512184421b11acee798edfc8727619e4a8331f2dfcfbe500903676b5d87960d2ecb533e465c9a159c15a039d535a8d0e3d0b04c2433530ae81dbe6f1467677223c3
-
\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\csrss.exeFilesize
127KB
MD5f0ad7d62b35e10c88e59639550de21b2
SHA12017b28ad5cf5e4fdf697873b0a5f92690366a9e
SHA25681066623350d16f76cc5533d87abb8d550dd8269dd99559d48a47875056ed812
SHA512184421b11acee798edfc8727619e4a8331f2dfcfbe500903676b5d87960d2ecb533e465c9a159c15a039d535a8d0e3d0b04c2433530ae81dbe6f1467677223c3
-
\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\csrss.exeFilesize
127KB
MD5f0ad7d62b35e10c88e59639550de21b2
SHA12017b28ad5cf5e4fdf697873b0a5f92690366a9e
SHA25681066623350d16f76cc5533d87abb8d550dd8269dd99559d48a47875056ed812
SHA512184421b11acee798edfc8727619e4a8331f2dfcfbe500903676b5d87960d2ecb533e465c9a159c15a039d535a8d0e3d0b04c2433530ae81dbe6f1467677223c3
-
\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\csrss.exeFilesize
127KB
MD5f0ad7d62b35e10c88e59639550de21b2
SHA12017b28ad5cf5e4fdf697873b0a5f92690366a9e
SHA25681066623350d16f76cc5533d87abb8d550dd8269dd99559d48a47875056ed812
SHA512184421b11acee798edfc8727619e4a8331f2dfcfbe500903676b5d87960d2ecb533e465c9a159c15a039d535a8d0e3d0b04c2433530ae81dbe6f1467677223c3
-
\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\csrss.exeFilesize
127KB
MD5f0ad7d62b35e10c88e59639550de21b2
SHA12017b28ad5cf5e4fdf697873b0a5f92690366a9e
SHA25681066623350d16f76cc5533d87abb8d550dd8269dd99559d48a47875056ed812
SHA512184421b11acee798edfc8727619e4a8331f2dfcfbe500903676b5d87960d2ecb533e465c9a159c15a039d535a8d0e3d0b04c2433530ae81dbe6f1467677223c3
-
\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\csrss.exeFilesize
50KB
MD5940d24de51296709ead002014ae37c40
SHA17cebaccaa9a213585f71d2a845ca7fd7d2c1cb7d
SHA256d9afef82aafa6709ca6879cdd7915e76999bc5b150301b3ccd73d7a8ef14c3b6
SHA5126646e85234e44185762d30705a2baf591241ae25459700f4699f3931f72d9138723aa52da6a479c72d8e9b0366892584f660b9b14f54d8672279cce7c44e7c64
-
\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\csrss.exeFilesize
50KB
MD5940d24de51296709ead002014ae37c40
SHA17cebaccaa9a213585f71d2a845ca7fd7d2c1cb7d
SHA256d9afef82aafa6709ca6879cdd7915e76999bc5b150301b3ccd73d7a8ef14c3b6
SHA5126646e85234e44185762d30705a2baf591241ae25459700f4699f3931f72d9138723aa52da6a479c72d8e9b0366892584f660b9b14f54d8672279cce7c44e7c64
-
\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\csrss.exeFilesize
50KB
MD5940d24de51296709ead002014ae37c40
SHA17cebaccaa9a213585f71d2a845ca7fd7d2c1cb7d
SHA256d9afef82aafa6709ca6879cdd7915e76999bc5b150301b3ccd73d7a8ef14c3b6
SHA5126646e85234e44185762d30705a2baf591241ae25459700f4699f3931f72d9138723aa52da6a479c72d8e9b0366892584f660b9b14f54d8672279cce7c44e7c64
-
\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\csrss.exeFilesize
50KB
MD5940d24de51296709ead002014ae37c40
SHA17cebaccaa9a213585f71d2a845ca7fd7d2c1cb7d
SHA256d9afef82aafa6709ca6879cdd7915e76999bc5b150301b3ccd73d7a8ef14c3b6
SHA5126646e85234e44185762d30705a2baf591241ae25459700f4699f3931f72d9138723aa52da6a479c72d8e9b0366892584f660b9b14f54d8672279cce7c44e7c64
-
\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\lsass.exeFilesize
127KB
MD5f0ad7d62b35e10c88e59639550de21b2
SHA12017b28ad5cf5e4fdf697873b0a5f92690366a9e
SHA25681066623350d16f76cc5533d87abb8d550dd8269dd99559d48a47875056ed812
SHA512184421b11acee798edfc8727619e4a8331f2dfcfbe500903676b5d87960d2ecb533e465c9a159c15a039d535a8d0e3d0b04c2433530ae81dbe6f1467677223c3
-
\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\lsass.exeFilesize
127KB
MD5f0ad7d62b35e10c88e59639550de21b2
SHA12017b28ad5cf5e4fdf697873b0a5f92690366a9e
SHA25681066623350d16f76cc5533d87abb8d550dd8269dd99559d48a47875056ed812
SHA512184421b11acee798edfc8727619e4a8331f2dfcfbe500903676b5d87960d2ecb533e465c9a159c15a039d535a8d0e3d0b04c2433530ae81dbe6f1467677223c3
-
\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\msvbvm60.dllFilesize
1.3MB
MD55343a19c618bc515ceb1695586c6c137
SHA14dedae8cbde066f31c8e6b52c0baa3f8b1117742
SHA2562246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce
SHA512708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606
-
\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\msvbvm60.dllFilesize
1.3MB
MD55343a19c618bc515ceb1695586c6c137
SHA14dedae8cbde066f31c8e6b52c0baa3f8b1117742
SHA2562246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce
SHA512708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606
-
\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\msvbvm60.dllFilesize
1.3MB
MD55343a19c618bc515ceb1695586c6c137
SHA14dedae8cbde066f31c8e6b52c0baa3f8b1117742
SHA2562246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce
SHA512708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606
-
\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\msvbvm60.dllFilesize
1.3MB
MD55343a19c618bc515ceb1695586c6c137
SHA14dedae8cbde066f31c8e6b52c0baa3f8b1117742
SHA2562246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce
SHA512708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606
-
\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\msvbvm60.dllFilesize
1.3MB
MD55343a19c618bc515ceb1695586c6c137
SHA14dedae8cbde066f31c8e6b52c0baa3f8b1117742
SHA2562246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce
SHA512708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606
-
\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\msvbvm60.dllFilesize
1.3MB
MD55343a19c618bc515ceb1695586c6c137
SHA14dedae8cbde066f31c8e6b52c0baa3f8b1117742
SHA2562246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce
SHA512708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606
-
\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\msvbvm60.dllFilesize
1.3MB
MD55343a19c618bc515ceb1695586c6c137
SHA14dedae8cbde066f31c8e6b52c0baa3f8b1117742
SHA2562246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce
SHA512708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606
-
\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\msvbvm60.dllFilesize
1.3MB
MD55343a19c618bc515ceb1695586c6c137
SHA14dedae8cbde066f31c8e6b52c0baa3f8b1117742
SHA2562246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce
SHA512708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606
-
\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\msvbvm60.dllFilesize
1.3MB
MD55343a19c618bc515ceb1695586c6c137
SHA14dedae8cbde066f31c8e6b52c0baa3f8b1117742
SHA2562246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce
SHA512708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606
-
\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\msvbvm60.dllFilesize
1.3MB
MD55343a19c618bc515ceb1695586c6c137
SHA14dedae8cbde066f31c8e6b52c0baa3f8b1117742
SHA2562246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce
SHA512708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606
-
\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\msvbvm60.dllFilesize
1.3MB
MD55343a19c618bc515ceb1695586c6c137
SHA14dedae8cbde066f31c8e6b52c0baa3f8b1117742
SHA2562246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce
SHA512708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606
-
\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\smss.exeFilesize
127KB
MD5f0ad7d62b35e10c88e59639550de21b2
SHA12017b28ad5cf5e4fdf697873b0a5f92690366a9e
SHA25681066623350d16f76cc5533d87abb8d550dd8269dd99559d48a47875056ed812
SHA512184421b11acee798edfc8727619e4a8331f2dfcfbe500903676b5d87960d2ecb533e465c9a159c15a039d535a8d0e3d0b04c2433530ae81dbe6f1467677223c3
-
\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\smss.exeFilesize
127KB
MD5f0ad7d62b35e10c88e59639550de21b2
SHA12017b28ad5cf5e4fdf697873b0a5f92690366a9e
SHA25681066623350d16f76cc5533d87abb8d550dd8269dd99559d48a47875056ed812
SHA512184421b11acee798edfc8727619e4a8331f2dfcfbe500903676b5d87960d2ecb533e465c9a159c15a039d535a8d0e3d0b04c2433530ae81dbe6f1467677223c3
-
\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\smss.exeFilesize
127KB
MD5f0ad7d62b35e10c88e59639550de21b2
SHA12017b28ad5cf5e4fdf697873b0a5f92690366a9e
SHA25681066623350d16f76cc5533d87abb8d550dd8269dd99559d48a47875056ed812
SHA512184421b11acee798edfc8727619e4a8331f2dfcfbe500903676b5d87960d2ecb533e465c9a159c15a039d535a8d0e3d0b04c2433530ae81dbe6f1467677223c3
-
\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\smss.exeFilesize
127KB
MD5f0ad7d62b35e10c88e59639550de21b2
SHA12017b28ad5cf5e4fdf697873b0a5f92690366a9e
SHA25681066623350d16f76cc5533d87abb8d550dd8269dd99559d48a47875056ed812
SHA512184421b11acee798edfc8727619e4a8331f2dfcfbe500903676b5d87960d2ecb533e465c9a159c15a039d535a8d0e3d0b04c2433530ae81dbe6f1467677223c3
-
\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\smss.exeFilesize
50KB
MD5940d24de51296709ead002014ae37c40
SHA17cebaccaa9a213585f71d2a845ca7fd7d2c1cb7d
SHA256d9afef82aafa6709ca6879cdd7915e76999bc5b150301b3ccd73d7a8ef14c3b6
SHA5126646e85234e44185762d30705a2baf591241ae25459700f4699f3931f72d9138723aa52da6a479c72d8e9b0366892584f660b9b14f54d8672279cce7c44e7c64
-
\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\smss.exeFilesize
50KB
MD5940d24de51296709ead002014ae37c40
SHA17cebaccaa9a213585f71d2a845ca7fd7d2c1cb7d
SHA256d9afef82aafa6709ca6879cdd7915e76999bc5b150301b3ccd73d7a8ef14c3b6
SHA5126646e85234e44185762d30705a2baf591241ae25459700f4699f3931f72d9138723aa52da6a479c72d8e9b0366892584f660b9b14f54d8672279cce7c44e7c64
-
\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\smss.exeFilesize
50KB
MD5940d24de51296709ead002014ae37c40
SHA17cebaccaa9a213585f71d2a845ca7fd7d2c1cb7d
SHA256d9afef82aafa6709ca6879cdd7915e76999bc5b150301b3ccd73d7a8ef14c3b6
SHA5126646e85234e44185762d30705a2baf591241ae25459700f4699f3931f72d9138723aa52da6a479c72d8e9b0366892584f660b9b14f54d8672279cce7c44e7c64
-
memory/308-99-0x0000000000290000-0x00000000002B9000-memory.dmpFilesize
164KB
-
memory/308-100-0x0000000000290000-0x00000000002B9000-memory.dmpFilesize
164KB
-
memory/396-203-0x0000000000000000-mapping.dmp
-
memory/396-206-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/432-138-0x0000000000000000-mapping.dmp
-
memory/516-193-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/516-190-0x0000000000000000-mapping.dmp
-
memory/564-102-0x0000000000230000-0x0000000000259000-memory.dmpFilesize
164KB
-
memory/564-64-0x0000000000000000-mapping.dmp
-
memory/572-58-0x0000000000000000-mapping.dmp
-
memory/572-101-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/572-364-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/584-222-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/584-363-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/584-169-0x0000000000000000-mapping.dmp
-
memory/584-315-0x0000000075C81000-0x0000000075C83000-memory.dmpFilesize
8KB
-
memory/616-238-0x0000000000000000-mapping.dmp
-
memory/616-269-0x00000000003C0000-0x00000000003E9000-memory.dmpFilesize
164KB
-
memory/664-371-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/676-186-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/676-183-0x0000000000000000-mapping.dmp
-
memory/740-311-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/740-314-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/740-306-0x0000000000000000-mapping.dmp
-
memory/744-200-0x0000000000000000-mapping.dmp
-
memory/748-376-0x00000000003D0000-0x00000000003F9000-memory.dmpFilesize
164KB
-
memory/748-394-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/760-347-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/760-342-0x0000000000000000-mapping.dmp
-
memory/760-180-0x0000000000000000-mapping.dmp
-
memory/760-352-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/816-313-0x0000000000000000-mapping.dmp
-
memory/864-172-0x0000000000000000-mapping.dmp
-
memory/864-179-0x0000000000230000-0x0000000000236000-memory.dmpFilesize
24KB
-
memory/868-107-0x0000000000000000-mapping.dmp
-
memory/964-223-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/964-197-0x0000000000000000-mapping.dmp
-
memory/980-365-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/980-124-0x0000000000000000-mapping.dmp
-
memory/980-157-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/992-207-0x0000000000000000-mapping.dmp
-
memory/1052-312-0x00000000001C0000-0x00000000001E9000-memory.dmpFilesize
164KB
-
memory/1052-288-0x0000000000000000-mapping.dmp
-
memory/1100-131-0x0000000000000000-mapping.dmp
-
memory/1100-234-0x0000000000000000-mapping.dmp
-
memory/1108-393-0x0000000001B70000-0x0000000001B99000-memory.dmpFilesize
164KB
-
memory/1128-242-0x0000000000000000-mapping.dmp
-
memory/1128-290-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/1144-254-0x0000000000230000-0x0000000000259000-memory.dmpFilesize
164KB
-
memory/1144-233-0x0000000000000000-mapping.dmp
-
memory/1252-231-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/1252-230-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/1252-227-0x0000000000000000-mapping.dmp
-
memory/1284-214-0x0000000000000000-mapping.dmp
-
memory/1300-282-0x0000000000000000-mapping.dmp
-
memory/1300-297-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/1328-339-0x0000000000000000-mapping.dmp
-
memory/1336-295-0x0000000000000000-mapping.dmp
-
memory/1336-309-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/1344-276-0x0000000000000000-mapping.dmp
-
memory/1360-221-0x00000000003D0000-0x00000000003F9000-memory.dmpFilesize
164KB
-
memory/1360-164-0x0000000000000000-mapping.dmp
-
memory/1412-274-0x0000000000000000-mapping.dmp
-
memory/1440-351-0x0000000000000000-mapping.dmp
-
memory/1440-359-0x0000000000230000-0x0000000000259000-memory.dmpFilesize
164KB
-
memory/1440-232-0x0000000000000000-mapping.dmp
-
memory/1440-268-0x0000000000260000-0x0000000000289000-memory.dmpFilesize
164KB
-
memory/1472-303-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/1472-285-0x0000000000000000-mapping.dmp
-
memory/1488-187-0x0000000000000000-mapping.dmp
-
memory/1524-86-0x0000000000000000-mapping.dmp
-
memory/1528-348-0x0000000000000000-mapping.dmp
-
memory/1544-94-0x0000000000000000-mapping.dmp
-
memory/1544-104-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/1588-264-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/1588-256-0x0000000000000000-mapping.dmp
-
memory/1592-260-0x0000000000000000-mapping.dmp
-
memory/1596-362-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/1596-255-0x0000000000000000-mapping.dmp
-
memory/1624-302-0x0000000000000000-mapping.dmp
-
memory/1624-310-0x00000000005B0000-0x00000000005D9000-memory.dmpFilesize
164KB
-
memory/1644-158-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/1644-161-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/1644-153-0x0000000000000000-mapping.dmp
-
memory/1644-320-0x0000000000000000-mapping.dmp
-
memory/1652-275-0x0000000000000000-mapping.dmp
-
memory/1672-178-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/1672-175-0x0000000000000000-mapping.dmp
-
memory/1672-331-0x0000000000000000-mapping.dmp
-
memory/1676-239-0x0000000000000000-mapping.dmp
-
memory/1680-325-0x0000000000000000-mapping.dmp
-
memory/1712-267-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/1712-246-0x0000000000000000-mapping.dmp
-
memory/1712-278-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/1716-336-0x0000000000000000-mapping.dmp
-
memory/1756-378-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/1756-377-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/1780-194-0x0000000000000000-mapping.dmp
-
memory/1800-277-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/1800-271-0x0000000000000000-mapping.dmp
-
memory/1812-296-0x0000000000000000-mapping.dmp
-
memory/1816-213-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/1816-210-0x0000000000000000-mapping.dmp
-
memory/1844-220-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/1844-217-0x0000000000000000-mapping.dmp
-
memory/1876-316-0x0000000000000000-mapping.dmp
-
memory/1892-224-0x0000000000000000-mapping.dmp
-
memory/1912-346-0x0000000000250000-0x0000000000279000-memory.dmpFilesize
164KB
-
memory/1912-366-0x0000000000250000-0x0000000000279000-memory.dmpFilesize
164KB
-
memory/1912-253-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/1912-261-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/1912-237-0x0000000000000000-mapping.dmp
-
memory/1912-333-0x0000000000000000-mapping.dmp
-
memory/1920-383-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/1948-384-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/1948-103-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/1948-74-0x0000000000000000-mapping.dmp
-
memory/1980-116-0x0000000000000000-mapping.dmp
-
memory/1980-156-0x00000000001C0000-0x00000000001E9000-memory.dmpFilesize
164KB
-
memory/1988-332-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/1988-145-0x0000000000000000-mapping.dmp
-
memory/1988-322-0x0000000000000000-mapping.dmp
-
memory/2252-395-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/2300-400-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/2336-405-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/2356-423-0x0000000000290000-0x00000000002B9000-memory.dmpFilesize
164KB
-
memory/2372-424-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/2436-418-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/2472-425-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB