Analysis
-
max time kernel
187s -
max time network
191s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 10:41
Static task
static1
Behavioral task
behavioral1
Sample
3db145a70f75ceea54337275315ac77dcd61e7ae9cf38f240d17e196194b57cb.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
3db145a70f75ceea54337275315ac77dcd61e7ae9cf38f240d17e196194b57cb.exe
Resource
win10v2004-20220812-en
General
-
Target
3db145a70f75ceea54337275315ac77dcd61e7ae9cf38f240d17e196194b57cb.exe
-
Size
127KB
-
MD5
8786c0e7879e8351899954722ac3b2db
-
SHA1
d26fbd63cc89fcd387e1bb3710dc66a00764a679
-
SHA256
3db145a70f75ceea54337275315ac77dcd61e7ae9cf38f240d17e196194b57cb
-
SHA512
2b6ee48a70dd1b86f4219c9791c26842ce1ac87269f17547818fc8ea29f5d9562528cef52c003cdfe0f5b005c9c542625444db67be4c42611a3c31c55c643931
-
SSDEEP
1536:snqdu3rbBGy3G8V0iuoKYMUYU6U5jUdPQc+n35KZg8/nouy8Iu:sqYMPsLMYjUtQl78vout
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 6 IoCs
Processes:
csrss.exe services.exe winlogon.exe lsass.exe smss.exe 3db145a70f75ceea54337275315ac77dcd61e7ae9cf38f240d17e196194b57cb.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe, C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~\\winlogon.exe" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe, C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~\\winlogon.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe, C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~\\winlogon.exe" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe, C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~\\winlogon.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe, C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~\\winlogon.exe" smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe, C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~\\winlogon.exe" 3db145a70f75ceea54337275315ac77dcd61e7ae9cf38f240d17e196194b57cb.exe -
Modifies system executable filetype association 2 TTPs 8 IoCs
Processes:
csrss.exe services.exe winlogon.exe lsass.exe smss.exe csrss.exeizha.exe3db145a70f75ceea54337275315ac77dcd61e7ae9cf38f240d17e196194b57cb.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt izha.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt 3db145a70f75ceea54337275315ac77dcd61e7ae9cf38f240d17e196194b57cb.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 8 IoCs
Processes:
izha.exe3db145a70f75ceea54337275315ac77dcd61e7ae9cf38f240d17e196194b57cb.exe csrss.exe services.exe winlogon.exe lsass.exe smss.exe csrss.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" izha.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 3db145a70f75ceea54337275315ac77dcd61e7ae9cf38f240d17e196194b57cb.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" csrss.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" services.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" winlogon.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" lsass.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" smss.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" csrss.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 8 IoCs
Processes:
izha.exe3db145a70f75ceea54337275315ac77dcd61e7ae9cf38f240d17e196194b57cb.exe csrss.exe services.exe winlogon.exe lsass.exe smss.exe csrss.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" izha.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 3db145a70f75ceea54337275315ac77dcd61e7ae9cf38f240d17e196194b57cb.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" csrss.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" services.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" winlogon.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" lsass.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" smss.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" csrss.exe -
Processes:
csrss.exe services.exe winlogon.exe lsass.exe smss.exe 3db145a70f75ceea54337275315ac77dcd61e7ae9cf38f240d17e196194b57cb.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" csrss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" services.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" lsass.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" smss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 3db145a70f75ceea54337275315ac77dcd61e7ae9cf38f240d17e196194b57cb.exe -
Disables RegEdit via registry modification 6 IoCs
Processes:
smss.exe 3db145a70f75ceea54337275315ac77dcd61e7ae9cf38f240d17e196194b57cb.exe csrss.exe services.exe winlogon.exe lsass.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" smss.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 3db145a70f75ceea54337275315ac77dcd61e7ae9cf38f240d17e196194b57cb.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" csrss.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" services.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" winlogon.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" lsass.exe -
Disables use of System Restore points 1 TTPs
-
Executes dropped EXE 64 IoCs
Processes:
3db145a70f75ceea54337275315ac77dcd61e7ae9cf38f240d17e196194b57cb.exe csrss.execsrss.exe csrss.execsrss.exe izha.exesmss.exesmss.exe csrss.execsrss.exe smss.exesmss.exe lsass.exelsass.exe csrss.execsrss.exe smss.exesmss.exe lsass.exelsass.exe smss.exesmss.exe lsass.exelsass.exeservices.exeservices.exelsass.exe services.exe winlogon.exe services.exe csrss.exewinlogon.exeservices.execsrss.exe services.exewinlogon.exe services.exe services.exe csrss.exesmss.exewinlogon.exewinlogon.exewinlogon.exe smss.exe csrss.exe Conhost.exeParaysutki_VM_Communitysmss.exelsass.exeParaysutki_VM_Communitylsass.exe smss.exe services.exelsass.exeservices.exe lsass.exe winlogon.exeservices.exeservices.exe winlogon.exe winlogon.exeParaysutki_VM_Communitywinlogon.exe Paraysutki_VM_Communitypid process 4468 3db145a70f75ceea54337275315ac77dcd61e7ae9cf38f240d17e196194b57cb.exe 2576 csrss.exe 3840 csrss.exe 2596 csrss.exe 4396 csrss.exe 612 izha.exe 3012 smss.exe 4384 smss.exe 2124 csrss.exe 3820 csrss.exe 3608 smss.exe 4576 smss.exe 2164 lsass.exe 2188 lsass.exe 1936 csrss.exe 2184 csrss.exe 2740 smss.exe 5036 smss.exe 1472 lsass.exe 4228 lsass.exe 5008 smss.exe 3460 smss.exe 4208 lsass.exe 3480 lsass.exe 2748 services.exe 3128 services.exe 1028 lsass.exe 4744 services.exe 4232 winlogon.exe 4492 services.exe 4996 csrss.exe 4400 winlogon.exe 2200 services.exe 1436 csrss.exe 1912 services.exe 4888 winlogon.exe 4448 services.exe 3372 services.exe 2808 csrss.exe 4408 smss.exe 1412 winlogon.exe 3248 winlogon.exe 780 winlogon.exe 3424 smss.exe 2592 csrss.exe 2104 Conhost.exe 3684 Paraysutki_VM_Community 2904 smss.exe 3468 lsass.exe 2480 Paraysutki_VM_Community 4856 lsass.exe 1204 smss.exe 4004 services.exe 1780 lsass.exe 3540 services.exe 4592 lsass.exe 4212 winlogon.exe 2980 services.exe 3188 services.exe 4016 winlogon.exe 2092 winlogon.exe 1508 Paraysutki_VM_Community 2664 winlogon.exe 4912 Paraysutki_VM_Community -
Sets file execution options in registry 2 TTPs 64 IoCs
Processes:
3db145a70f75ceea54337275315ac77dcd61e7ae9cf38f240d17e196194b57cb.exe winlogon.exe lsass.exe smss.exe csrss.exe services.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kspoold.exe\Debugger = "cmd.exe /c del" 3db145a70f75ceea54337275315ac77dcd61e7ae9cf38f240d17e196194b57cb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\tasklist.exe\Debugger = "rundll32.exe" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kspool.exe\Debugger = "cmd.exe /c del" lsass.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kspoold.exe lsass.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\HokageFile.exe smss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\procexp.exe smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cmd.exe\Debugger = "rundll32.exe" smss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rstrui.exe\Debugger = "rundll32.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Obito.exe\Debugger = "cmd.exe /c del" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kspoold.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Ansav.exe\Debugger = "cmd.exe /c del" lsass.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kspoold.exe smss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe smss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Setup.exe 3db145a70f75ceea54337275315ac77dcd61e7ae9cf38f240d17e196194b57cb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\tasklist.exe\Debugger = "rundll32.exe" 3db145a70f75ceea54337275315ac77dcd61e7ae9cf38f240d17e196194b57cb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe\Debugger = "rundll32.exe" 3db145a70f75ceea54337275315ac77dcd61e7ae9cf38f240d17e196194b57cb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mmc.exe services.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Ansav.exe services.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rstrui.exe lsass.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe 3db145a70f75ceea54337275315ac77dcd61e7ae9cf38f240d17e196194b57cb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\HokageFile.exe 3db145a70f75ceea54337275315ac77dcd61e7ae9cf38f240d17e196194b57cb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Install.exe\Debugger = "cmd.exe /c del" 3db145a70f75ceea54337275315ac77dcd61e7ae9cf38f240d17e196194b57cb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe\Debugger = "rundll32.exe" services.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rstrui.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Setup.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rstrui.exe\Debugger = "rundll32.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe\Debugger = "rundll32.exe" csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mmc.exe csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SMP.exe services.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rstrui.exe smss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msiexec.exe smss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\PCMAV-CLN.exe services.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SMP.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Ansavgd.exe lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\HokageFile.exe\Debugger = "cmd.exe /c del" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Ansavgd.exe\Debugger = "cmd.exe /c del" lsass.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cmd.exe lsass.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SETUP.exe smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\PCMAV-RTP.exe\Debugger = "cmd.exe /c del" 3db145a70f75ceea54337275315ac77dcd61e7ae9cf38f240d17e196194b57cb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Install.exe 3db145a70f75ceea54337275315ac77dcd61e7ae9cf38f240d17e196194b57cb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kspool.exe csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Rin.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\PCMAV-RTP.exe 3db145a70f75ceea54337275315ac77dcd61e7ae9cf38f240d17e196194b57cb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\boot.exe csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KakashiHatake.exe services.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KakashiHatake.exe lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Ansav.exe\Debugger = "cmd.exe /c del" smss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Obito.exe 3db145a70f75ceea54337275315ac77dcd61e7ae9cf38f240d17e196194b57cb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\boot.exe\Debugger = "cmd.exe /c del" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cmd.exe\Debugger = "rundll32.exe" csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Instal.exe csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SMP.exe\Debugger = "cmd.exe /c del" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Ansav.exe\Debugger = "cmd.exe /c del" services.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\HokageFile.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\procexp.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kspool.exe\Debugger = "cmd.exe /c del" smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Rin.exe\Debugger = "cmd.exe /c del" smss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\PCMAV-CLN.exe smss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kspool.exe 3db145a70f75ceea54337275315ac77dcd61e7ae9cf38f240d17e196194b57cb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KakashiHatake.exe\Debugger = "cmd.exe /c del" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Install.exe\Debugger = "cmd.exe /c del" services.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\HokageFile.exe csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SETUP.exe csrss.exe -
Loads dropped DLL 64 IoCs
Processes:
csrss.execsrss.exe csrss.execsrss.exe smss.exesmss.exe csrss.execsrss.exe smss.exesmss.exe lsass.exelsass.exe csrss.execsrss.exe smss.exesmss.exe lsass.exelsass.exe smss.exesmss.exe lsass.exelsass.exeservices.exeservices.exelsass.exe services.exe winlogon.exe services.exe csrss.exewinlogon.exeservices.execsrss.exe services.exeservices.exe winlogon.exe services.exe csrss.exewinlogon.exesmss.exewinlogon.exewinlogon.exe smss.exe csrss.exe Conhost.exeParaysutki_VM_Communitysmss.exelsass.exeParaysutki_VM_Communitylsass.exe smss.exe services.exelsass.exeservices.exe lsass.exe winlogon.exeservices.exeservices.exe winlogon.exe winlogon.exeParaysutki_VM_Communitywinlogon.exe Paraysutki_VM_Communitywinlogon.exepid process 2576 csrss.exe 3840 csrss.exe 2596 csrss.exe 4396 csrss.exe 3012 smss.exe 4384 smss.exe 2124 csrss.exe 3820 csrss.exe 3608 smss.exe 4576 smss.exe 2164 lsass.exe 2188 lsass.exe 1936 csrss.exe 2184 csrss.exe 2740 smss.exe 5036 smss.exe 1472 lsass.exe 4228 lsass.exe 5008 smss.exe 3460 smss.exe 4208 lsass.exe 3480 lsass.exe 2748 services.exe 3128 services.exe 1028 lsass.exe 4744 services.exe 4232 winlogon.exe 4492 services.exe 4996 csrss.exe 4400 winlogon.exe 2200 services.exe 1436 csrss.exe 1912 services.exe 4448 services.exe 4888 winlogon.exe 3372 services.exe 2808 csrss.exe 1412 winlogon.exe 4408 smss.exe 3248 winlogon.exe 780 winlogon.exe 3424 smss.exe 2592 csrss.exe 2104 Conhost.exe 3684 Paraysutki_VM_Community 2904 smss.exe 3468 lsass.exe 2480 Paraysutki_VM_Community 4856 lsass.exe 1204 smss.exe 4004 services.exe 1780 lsass.exe 3540 services.exe 4592 lsass.exe 4212 winlogon.exe 2980 services.exe 3188 services.exe 4016 winlogon.exe 2092 winlogon.exe 1508 Paraysutki_VM_Community 2664 winlogon.exe 4912 Paraysutki_VM_Community 4144 winlogon.exe 4232 winlogon.exe -
Adds Run key to start application 2 TTPs 38 IoCs
Processes:
csrss.exe lsass.exe winlogon.exe izha.exe3db145a70f75ceea54337275315ac77dcd61e7ae9cf38f240d17e196194b57cb.exe services.exe smss.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\AVManager = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~\\csrss.exe" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\PaRaY_VM = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~\\winlogon.exe" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\AVManager = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~\\csrss.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\AVManager = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~\\csrss.exe" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\VisualStyle = "c:\\windows\\system32\\Desktop.sysm" izha.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run 3db145a70f75ceea54337275315ac77dcd61e7ae9cf38f240d17e196194b57cb.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\NarmonVirusAnti = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~\\smss.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ConfigVir = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\PaRaY_VM = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~\\winlogon.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\AVManager = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~\\csrss.exe" smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\NarmonVirusAnti = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~\\smss.exe" smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ConfigVir = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~\\services.exe" 3db145a70f75ceea54337275315ac77dcd61e7ae9cf38f240d17e196194b57cb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\NviDiaGT = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~\\lsass.exe" csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run services.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ConfigVir = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~\\services.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\NviDiaGT = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~\\lsass.exe" smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\NviDiaGT = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~\\lsass.exe" 3db145a70f75ceea54337275315ac77dcd61e7ae9cf38f240d17e196194b57cb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\PaRaY_VM = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~\\winlogon.exe" 3db145a70f75ceea54337275315ac77dcd61e7ae9cf38f240d17e196194b57cb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\NarmonVirusAnti = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~\\smss.exe" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\NviDiaGT = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~\\lsass.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ConfigVir = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~\\services.exe" smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\AVManager = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~\\csrss.exe" 3db145a70f75ceea54337275315ac77dcd61e7ae9cf38f240d17e196194b57cb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ConfigVir = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~\\services.exe" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\PaRaY_VM = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~\\winlogon.exe" smss.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run izha.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\AVManager = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~\\csrss.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\PaRaY_VM = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~\\winlogon.exe" services.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\NviDiaGT = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~\\lsass.exe" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ConfigVir = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~\\services.exe" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\NviDiaGT = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~\\lsass.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\NarmonVirusAnti = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~\\smss.exe" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\NarmonVirusAnti = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~\\smss.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\NarmonVirusAnti = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~\\smss.exe" 3db145a70f75ceea54337275315ac77dcd61e7ae9cf38f240d17e196194b57cb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\PaRaY_VM = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~\\winlogon.exe" winlogon.exe -
Processes:
3db145a70f75ceea54337275315ac77dcd61e7ae9cf38f240d17e196194b57cb.exe csrss.exe services.exe winlogon.exe lsass.exe smss.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 3db145a70f75ceea54337275315ac77dcd61e7ae9cf38f240d17e196194b57cb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" csrss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" services.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" lsass.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" smss.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
izha.exedescription ioc process File opened (read-only) \??\M: izha.exe File opened (read-only) \??\Q: izha.exe File opened (read-only) \??\Z: izha.exe File opened (read-only) \??\G: izha.exe File opened (read-only) \??\J: izha.exe File opened (read-only) \??\W: izha.exe File opened (read-only) \??\X: izha.exe File opened (read-only) \??\Y: izha.exe File opened (read-only) \??\I: izha.exe File opened (read-only) \??\F: izha.exe File opened (read-only) \??\H: izha.exe File opened (read-only) \??\L: izha.exe File opened (read-only) \??\R: izha.exe File opened (read-only) \??\S: izha.exe File opened (read-only) \??\T: izha.exe File opened (read-only) \??\B: izha.exe File opened (read-only) \??\K: izha.exe File opened (read-only) \??\N: izha.exe File opened (read-only) \??\O: izha.exe File opened (read-only) \??\P: izha.exe File opened (read-only) \??\U: izha.exe File opened (read-only) \??\V: izha.exe File opened (read-only) \??\E: izha.exe -
Drops file in System32 directory 64 IoCs
Processes:
csrss.exe csrss.exewinlogon.exe3db145a70f75ceea54337275315ac77dcd61e7ae9cf38f240d17e196194b57cb.exe services.exe lsass.exe Paraysutki_VM_CommunityParaysutki_VM_Communityizha.exeservices.exewinlogon.exe smss.exe smss.exeservices.execsrss.exeservices.exeParaysutki_VM_Communityservices.exelsass.exesmss.exesmss.exewinlogon.exeParaysutki_VM_Communitydescription ioc process File opened for modification C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\Paraysutki_VM_Community csrss.exe File created \??\c:\windows\SysWOW64\Windows 3D.scr csrss.exe File opened for modification \??\c:\windows\SysWOW64\maxtrox.txt winlogon.exe File created C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\lsass.exe 3db145a70f75ceea54337275315ac77dcd61e7ae9cf38f240d17e196194b57cb.exe File created C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\services.exe csrss.exe File created C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\services.exe services.exe File opened for modification C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\smss.exe csrss.exe File opened for modification C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~ lsass.exe File opened for modification C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\services.exe services.exe File opened for modification \??\c:\windows\SysWOW64\maxtrox.txt Paraysutki_VM_Community File opened for modification \??\c:\windows\SysWOW64\maxtrox.txt Paraysutki_VM_Community File opened for modification C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\smss.exe 3db145a70f75ceea54337275315ac77dcd61e7ae9cf38f240d17e196194b57cb.exe File created \??\c:\windows\SysWOW64\CommandPrompt.Sysm izha.exe File opened for modification C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\smss.exe lsass.exe File opened for modification \??\c:\windows\SysWOW64\maxtrox.txt services.exe File created C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\csrss.exe winlogon.exe File opened for modification C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\msvbvm60.dll csrss.exe File created C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\msvbvm60.dll smss.exe File opened for modification \??\c:\windows\SysWOW64\maxtrox.txt smss.exe File created C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\winlogon.exe winlogon.exe File created C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\lsass.exe smss.exe File opened for modification C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~ smss.exe File created C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\services.exe lsass.exe File opened for modification C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\lsass.exe winlogon.exe File opened for modification C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\winlogon.exe winlogon.exe File opened for modification \??\c:\windows\SysWOW64\maxtrox.txt services.exe File opened for modification \??\c:\windows\SysWOW64\maxtrox.txt csrss.exe File opened for modification C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\services.exe lsass.exe File created C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\Paraysutki_VM_Community lsass.exe File opened for modification \??\c:\windows\SysWOW64\maxtrox.txt services.exe File opened for modification \??\c:\windows\SysWOW64\maxtrox.txt Paraysutki_VM_Community File opened for modification C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\services.exe 3db145a70f75ceea54337275315ac77dcd61e7ae9cf38f240d17e196194b57cb.exe File created C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\winlogon.exe csrss.exe File opened for modification \??\c:\windows\SysWOW64\Windows 3D.scr izha.exe File opened for modification C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\lsass.exe lsass.exe File opened for modification \??\c:\windows\SysWOW64\maxtrox.txt services.exe File opened for modification C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~ winlogon.exe File opened for modification \??\c:\windows\SysWOW64\maxtrox.txt lsass.exe File opened for modification C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\smss.exe smss.exe File opened for modification C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\smss.exe smss.exe File opened for modification C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\csrss.exe services.exe File created C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\winlogon.exe services.exe File opened for modification C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\Paraysutki_VM_Community services.exe File opened for modification \??\c:\windows\SysWOW64\maxtrox.txt smss.exe File opened for modification C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\csrss.exe 3db145a70f75ceea54337275315ac77dcd61e7ae9cf38f240d17e196194b57cb.exe File created C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\lsass.exe services.exe File opened for modification C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\winlogon.exe winlogon.exe File created C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\Paraysutki_VM_Community winlogon.exe File created \??\c:\windows\SysWOW64\Desktop.sysm izha.exe File created C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\winlogon.exe smss.exe File opened for modification C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\lsass.exe services.exe File opened for modification \??\c:\windows\SysWOW64\maxtrox.txt Paraysutki_VM_Community File opened for modification C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\csrss.exe smss.exe File opened for modification C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\Paraysutki_VM_Community lsass.exe File created C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\lsass.exe winlogon.exe File opened for modification C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\csrss.exe services.exe File opened for modification C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\Paraysutki_VM_Community 3db145a70f75ceea54337275315ac77dcd61e7ae9cf38f240d17e196194b57cb.exe File opened for modification C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\msvbvm60.dll 3db145a70f75ceea54337275315ac77dcd61e7ae9cf38f240d17e196194b57cb.exe File created C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\smss.exe csrss.exe File opened for modification C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\lsass.exe csrss.exe File opened for modification \??\c:\windows\SysWOW64\maxtrox.txt izha.exe File opened for modification C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\services.exe smss.exe File created C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\smss.exe winlogon.exe File created C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\services.exe winlogon.exe -
Drops file in Program Files directory 27 IoCs
Processes:
izha.exedescription ioc process File opened for modification \??\c:\Program Files\7-Zip\7zFM.exe izha.exe File opened for modification \??\c:\Program Files\Windows Media Player\wmpnscfg.exe izha.exe File opened for modification \??\c:\Program Files\Internet Explorer\ielowutil.exe izha.exe File opened for modification \??\c:\Program Files\Mozilla Firefox\minidump-analyzer.exe izha.exe File opened for modification \??\c:\Program Files\Windows Media Player\wmpnetwk.exe izha.exe File opened for modification \??\c:\Program Files\Windows Media Player\wmprph.exe izha.exe File opened for modification \??\c:\Program Files\Internet Explorer\iediagcmd.exe izha.exe File opened for modification \??\c:\Program Files\Internet Explorer\iexplore.exe izha.exe File opened for modification \??\c:\Program Files\Mozilla Firefox\crashreporter.exe izha.exe File opened for modification \??\c:\Program Files\Mozilla Firefox\updater.exe izha.exe File opened for modification \??\c:\Program Files\Windows Mail\wabmig.exe izha.exe File opened for modification \??\c:\Program Files\7-Zip\Uninstall.exe izha.exe File opened for modification \??\c:\Program Files\Mozilla Firefox\maintenanceservice.exe izha.exe File opened for modification \??\c:\Program Files\Mozilla Firefox\pingsender.exe izha.exe File opened for modification \??\c:\Program Files\Mozilla Firefox\plugin-container.exe izha.exe File opened for modification \??\c:\Program Files\Windows Media Player\wmlaunch.exe izha.exe File opened for modification \??\c:\Program Files\Windows Media Player\wmpshare.exe izha.exe File opened for modification \??\c:\Program Files\7-Zip\7z.exe izha.exe File opened for modification \??\c:\Program Files\Mozilla Firefox\default-browser-agent.exe izha.exe File opened for modification \??\c:\Program Files\Mozilla Firefox\firefox.exe izha.exe File opened for modification \??\c:\Program Files\Windows Media Player\wmpconfig.exe izha.exe File opened for modification \??\c:\Program Files\7-Zip\7zG.exe izha.exe File opened for modification \??\c:\Program Files\Mozilla Firefox\maintenanceservice_installer.exe izha.exe File opened for modification \??\c:\Program Files\Mozilla Firefox\plugin-hang-ui.exe izha.exe File opened for modification \??\c:\Program Files\Windows Media Player\wmplayer.exe izha.exe File opened for modification \??\c:\Program Files\Internet Explorer\ieinstal.exe izha.exe File opened for modification \??\c:\Program Files\Windows Media Player\setup_wm.exe izha.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Processes:
winlogon.exe lsass.exe smss.exe 3db145a70f75ceea54337275315ac77dcd61e7ae9cf38f240d17e196194b57cb.exe csrss.exe services.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window Title = "++++ Hey, Hokage/babon (Anbu*Team*Sampit), Is this My places, Wanna start a War ++++" winlogon.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\Main lsass.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\Main smss.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window Title = "++++ Hey, Hokage/babon (Anbu*Team*Sampit), Is this My places, Wanna start a War ++++" 3db145a70f75ceea54337275315ac77dcd61e7ae9cf38f240d17e196194b57cb.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\Main csrss.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window Title = "++++ Hey, Hokage/babon (Anbu*Team*Sampit), Is this My places, Wanna start a War ++++" csrss.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\Main services.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window Title = "++++ Hey, Hokage/babon (Anbu*Team*Sampit), Is this My places, Wanna start a War ++++" services.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window Title = "++++ Hey, Hokage/babon (Anbu*Team*Sampit), Is this My places, Wanna start a War ++++" smss.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\Main 3db145a70f75ceea54337275315ac77dcd61e7ae9cf38f240d17e196194b57cb.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\Main winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window Title = "++++ Hey, Hokage/babon (Anbu*Team*Sampit), Is this My places, Wanna start a War ++++" lsass.exe -
Modifies registry class 48 IoCs
Processes:
csrss.exeizha.exeservices.exe smss.exe winlogon.exe csrss.exe 3db145a70f75ceea54337275315ac77dcd61e7ae9cf38f240d17e196194b57cb.exe lsass.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\Shell\Open\Command izha.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt services.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile smss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\DefaultIcon csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\DefaultIcon\ = "c:\\windows\\SysWow64\\rasphone.exe" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\DefaultIcon\ = "c:\\windows\\SysWow64\\netsetup.exe" izha.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt smss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\Shell csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\ = "System Mechanic" csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\Shell\Open csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\NeverShowExt izha.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\DefaultIcon izha.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\Shell\Open\Command\ = "%1" izha.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\ = "Microsoft System Direct" csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\DefaultIcon csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\Shell\Open\Command\ = "%1" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt izha.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd izha.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile services.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\NeverShowExt csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\Shell\Open\Command csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\Shell csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\ = "System Mechanic" izha.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile 3db145a70f75ceea54337275315ac77dcd61e7ae9cf38f240d17e196194b57cb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt lsass.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm izha.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile lsass.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\Shell\Open csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\Shell\Open\Command\ = "%1" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\DefaultIcon\ = "c:\\windows\\SysWow64\\netsetup.exe" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\ = "Microsoft System Direct" izha.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\Shell\Open\Command csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\DefaultIcon izha.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\NeverShowExt izha.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\Shell\Open\Command izha.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt 3db145a70f75ceea54337275315ac77dcd61e7ae9cf38f240d17e196194b57cb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\NeverShowExt csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile izha.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\DefaultIcon\ = "c:\\windows\\SysWow64\\rasphone.exe" izha.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\Shell\Open\Command\ = "%1" izha.exe -
Runs ping.exe 1 TTPs 18 IoCs
Processes:
ping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exepid process 2460 ping.exe 5084 ping.exe 2244 ping.exe 4200 ping.exe 3648 ping.exe 4348 ping.exe 3504 ping.exe 1804 ping.exe 3288 ping.exe 3496 ping.exe 4436 ping.exe 3916 ping.exe 3796 ping.exe 2164 ping.exe 520 ping.exe 2120 ping.exe 444 ping.exe 2416 ping.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
csrss.exesmss.exelsass.exepid process 2576 csrss.exe 2576 csrss.exe 2576 csrss.exe 2576 csrss.exe 2576 csrss.exe 2576 csrss.exe 2576 csrss.exe 2576 csrss.exe 2576 csrss.exe 2576 csrss.exe 2576 csrss.exe 2576 csrss.exe 3012 smss.exe 3012 smss.exe 3012 smss.exe 3012 smss.exe 3012 smss.exe 3012 smss.exe 3012 smss.exe 3012 smss.exe 3012 smss.exe 3012 smss.exe 3012 smss.exe 3012 smss.exe 2164 lsass.exe 2164 lsass.exe 2164 lsass.exe 2164 lsass.exe 2164 lsass.exe 2164 lsass.exe 2164 lsass.exe 2164 lsass.exe 2164 lsass.exe 2164 lsass.exe 2164 lsass.exe 2164 lsass.exe 2576 csrss.exe 2576 csrss.exe 2576 csrss.exe 2576 csrss.exe 2576 csrss.exe 2576 csrss.exe 2576 csrss.exe 2576 csrss.exe 2576 csrss.exe 2576 csrss.exe 2576 csrss.exe 2576 csrss.exe 2164 lsass.exe 2164 lsass.exe 2164 lsass.exe 2164 lsass.exe 2164 lsass.exe 2164 lsass.exe 2164 lsass.exe 2164 lsass.exe 2164 lsass.exe 2164 lsass.exe 2164 lsass.exe 2164 lsass.exe 3012 smss.exe 3012 smss.exe 3012 smss.exe 3012 smss.exe -
Suspicious use of FindShellTrayWindow 5 IoCs
Processes:
rundll32.exerundll32.exerundll32.exerundll32.exerundll32.exepid process 432 rundll32.exe 1556 rundll32.exe 1136 rundll32.exe 2612 rundll32.exe 936 rundll32.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
Processes:
3db145a70f75ceea54337275315ac77dcd61e7ae9cf38f240d17e196194b57cb.exe3db145a70f75ceea54337275315ac77dcd61e7ae9cf38f240d17e196194b57cb.exe csrss.execsrss.exe csrss.execsrss.exe izha.exesmss.exesmss.exe csrss.execsrss.exe smss.exesmss.exe lsass.exelsass.exe csrss.execsrss.exe smss.exesmss.exe lsass.exelsass.exe smss.exesmss.exe lsass.exeservices.exelsass.exeservices.exeservices.exe lsass.exe services.exe winlogon.exe csrss.exewinlogon.exeservices.exeservices.exeservices.exe winlogon.exe csrss.exe services.exe winlogon.exesmss.execsrss.exewinlogon.exewinlogon.exe smss.exe csrss.exe Conhost.exelsass.exeParaysutki_VM_Communitysmss.exeParaysutki_VM_Communitylsass.exe smss.exe services.exelsass.exeservices.exe lsass.exe winlogon.exeservices.exeservices.exe winlogon.exe winlogon.exewinlogon.exe Paraysutki_VM_Communitypid process 344 3db145a70f75ceea54337275315ac77dcd61e7ae9cf38f240d17e196194b57cb.exe 4468 3db145a70f75ceea54337275315ac77dcd61e7ae9cf38f240d17e196194b57cb.exe 2576 csrss.exe 3840 csrss.exe 2596 csrss.exe 4396 csrss.exe 612 izha.exe 3012 smss.exe 4384 smss.exe 2124 csrss.exe 3820 csrss.exe 3608 smss.exe 4576 smss.exe 2164 lsass.exe 2188 lsass.exe 1936 csrss.exe 2184 csrss.exe 2740 smss.exe 5036 smss.exe 1472 lsass.exe 4228 lsass.exe 5008 smss.exe 3460 smss.exe 4208 lsass.exe 2748 services.exe 3480 lsass.exe 3128 services.exe 4744 services.exe 1028 lsass.exe 4492 services.exe 4232 winlogon.exe 4996 csrss.exe 4400 winlogon.exe 2200 services.exe 1912 services.exe 4448 services.exe 4888 winlogon.exe 1436 csrss.exe 3372 services.exe 1412 winlogon.exe 4408 smss.exe 2808 csrss.exe 3248 winlogon.exe 780 winlogon.exe 3424 smss.exe 2592 csrss.exe 2104 Conhost.exe 3468 lsass.exe 3684 Paraysutki_VM_Community 2904 smss.exe 2480 Paraysutki_VM_Community 4856 lsass.exe 1204 smss.exe 4004 services.exe 1780 lsass.exe 3540 services.exe 4592 lsass.exe 4212 winlogon.exe 2980 services.exe 3188 services.exe 4016 winlogon.exe 2092 winlogon.exe 2664 winlogon.exe 1508 Paraysutki_VM_Community -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
3db145a70f75ceea54337275315ac77dcd61e7ae9cf38f240d17e196194b57cb.exe3db145a70f75ceea54337275315ac77dcd61e7ae9cf38f240d17e196194b57cb.exe csrss.execsrss.exe csrss.exesmss.exesmss.exe csrss.exesmss.exelsass.exelsass.exe csrss.exesmss.exelsass.exesmss.exedescription pid process target process PID 344 wrote to memory of 4468 344 3db145a70f75ceea54337275315ac77dcd61e7ae9cf38f240d17e196194b57cb.exe 3db145a70f75ceea54337275315ac77dcd61e7ae9cf38f240d17e196194b57cb.exe PID 344 wrote to memory of 4468 344 3db145a70f75ceea54337275315ac77dcd61e7ae9cf38f240d17e196194b57cb.exe 3db145a70f75ceea54337275315ac77dcd61e7ae9cf38f240d17e196194b57cb.exe PID 344 wrote to memory of 4468 344 3db145a70f75ceea54337275315ac77dcd61e7ae9cf38f240d17e196194b57cb.exe 3db145a70f75ceea54337275315ac77dcd61e7ae9cf38f240d17e196194b57cb.exe PID 4468 wrote to memory of 2576 4468 3db145a70f75ceea54337275315ac77dcd61e7ae9cf38f240d17e196194b57cb.exe csrss.exe PID 4468 wrote to memory of 2576 4468 3db145a70f75ceea54337275315ac77dcd61e7ae9cf38f240d17e196194b57cb.exe csrss.exe PID 4468 wrote to memory of 2576 4468 3db145a70f75ceea54337275315ac77dcd61e7ae9cf38f240d17e196194b57cb.exe csrss.exe PID 2576 wrote to memory of 3840 2576 csrss.exe csrss.exe PID 2576 wrote to memory of 3840 2576 csrss.exe csrss.exe PID 2576 wrote to memory of 3840 2576 csrss.exe csrss.exe PID 3840 wrote to memory of 2596 3840 csrss.exe csrss.exe PID 3840 wrote to memory of 2596 3840 csrss.exe csrss.exe PID 3840 wrote to memory of 2596 3840 csrss.exe csrss.exe PID 2596 wrote to memory of 4396 2596 csrss.exe csrss.exe PID 2596 wrote to memory of 4396 2596 csrss.exe csrss.exe PID 2596 wrote to memory of 4396 2596 csrss.exe csrss.exe PID 2596 wrote to memory of 612 2596 csrss.exe izha.exe PID 2596 wrote to memory of 612 2596 csrss.exe izha.exe PID 2596 wrote to memory of 612 2596 csrss.exe izha.exe PID 3840 wrote to memory of 3012 3840 csrss.exe smss.exe PID 3840 wrote to memory of 3012 3840 csrss.exe smss.exe PID 3840 wrote to memory of 3012 3840 csrss.exe smss.exe PID 3012 wrote to memory of 4384 3012 smss.exe smss.exe PID 3012 wrote to memory of 4384 3012 smss.exe smss.exe PID 3012 wrote to memory of 4384 3012 smss.exe smss.exe PID 4384 wrote to memory of 2124 4384 smss.exe csrss.exe PID 4384 wrote to memory of 2124 4384 smss.exe csrss.exe PID 4384 wrote to memory of 2124 4384 smss.exe csrss.exe PID 2124 wrote to memory of 3820 2124 csrss.exe csrss.exe PID 2124 wrote to memory of 3820 2124 csrss.exe csrss.exe PID 2124 wrote to memory of 3820 2124 csrss.exe csrss.exe PID 4384 wrote to memory of 3608 4384 smss.exe smss.exe PID 4384 wrote to memory of 3608 4384 smss.exe smss.exe PID 4384 wrote to memory of 3608 4384 smss.exe smss.exe PID 3608 wrote to memory of 4576 3608 smss.exe smss.exe PID 3608 wrote to memory of 4576 3608 smss.exe smss.exe PID 3608 wrote to memory of 4576 3608 smss.exe smss.exe PID 4384 wrote to memory of 2164 4384 smss.exe lsass.exe PID 4384 wrote to memory of 2164 4384 smss.exe lsass.exe PID 4384 wrote to memory of 2164 4384 smss.exe lsass.exe PID 2164 wrote to memory of 2188 2164 lsass.exe lsass.exe PID 2164 wrote to memory of 2188 2164 lsass.exe lsass.exe PID 2164 wrote to memory of 2188 2164 lsass.exe lsass.exe PID 2188 wrote to memory of 1936 2188 lsass.exe csrss.exe PID 2188 wrote to memory of 1936 2188 lsass.exe csrss.exe PID 2188 wrote to memory of 1936 2188 lsass.exe csrss.exe PID 1936 wrote to memory of 2184 1936 csrss.exe csrss.exe PID 1936 wrote to memory of 2184 1936 csrss.exe csrss.exe PID 1936 wrote to memory of 2184 1936 csrss.exe csrss.exe PID 2188 wrote to memory of 2740 2188 lsass.exe smss.exe PID 2188 wrote to memory of 2740 2188 lsass.exe smss.exe PID 2188 wrote to memory of 2740 2188 lsass.exe smss.exe PID 2740 wrote to memory of 5036 2740 smss.exe smss.exe PID 2740 wrote to memory of 5036 2740 smss.exe smss.exe PID 2740 wrote to memory of 5036 2740 smss.exe smss.exe PID 2188 wrote to memory of 1472 2188 lsass.exe lsass.exe PID 2188 wrote to memory of 1472 2188 lsass.exe lsass.exe PID 2188 wrote to memory of 1472 2188 lsass.exe lsass.exe PID 1472 wrote to memory of 4228 1472 lsass.exe lsass.exe PID 1472 wrote to memory of 4228 1472 lsass.exe lsass.exe PID 1472 wrote to memory of 4228 1472 lsass.exe lsass.exe PID 4468 wrote to memory of 5008 4468 3db145a70f75ceea54337275315ac77dcd61e7ae9cf38f240d17e196194b57cb.exe smss.exe PID 4468 wrote to memory of 5008 4468 3db145a70f75ceea54337275315ac77dcd61e7ae9cf38f240d17e196194b57cb.exe smss.exe PID 4468 wrote to memory of 5008 4468 3db145a70f75ceea54337275315ac77dcd61e7ae9cf38f240d17e196194b57cb.exe smss.exe PID 5008 wrote to memory of 3460 5008 smss.exe smss.exe -
System policy modification 1 TTPs 12 IoCs
Processes:
services.exe winlogon.exe smss.exe 3db145a70f75ceea54337275315ac77dcd61e7ae9cf38f240d17e196194b57cb.exe csrss.exe lsass.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" services.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" smss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 3db145a70f75ceea54337275315ac77dcd61e7ae9cf38f240d17e196194b57cb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 3db145a70f75ceea54337275315ac77dcd61e7ae9cf38f240d17e196194b57cb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System csrss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System services.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System lsass.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" lsass.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System smss.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3db145a70f75ceea54337275315ac77dcd61e7ae9cf38f240d17e196194b57cb.exe"C:\Users\Admin\AppData\Local\Temp\3db145a70f75ceea54337275315ac77dcd61e7ae9cf38f240d17e196194b57cb.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\3db145a70f75ceea54337275315ac77dcd61e7ae9cf38f240d17e196194b57cb.exeC:\Users\Admin\AppData\Local\Temp\3db145a70f75ceea54337275315ac77dcd61e7ae9cf38f240d17e196194b57cb.exe2⤵
- Modifies WinLogon for persistence
- Modifies system executable filetype association
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- UAC bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Sets file execution options in registry
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\csrss.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~\csrss.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\csrss.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\csrss.exe4⤵
- Modifies WinLogon for persistence
- Modifies system executable filetype association
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- UAC bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Sets file execution options in registry
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\csrss.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~\csrss.exe5⤵
- Modifies system executable filetype association
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\csrss.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\csrss.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
-
\??\c:\Documents and Settings\Admin\Application Data\Microsoft\izha.exe"c:\Documents and Settings\Admin\Application Data\Microsoft\izha.exe" csrss6⤵
- Modifies system executable filetype association
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\smss.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~\smss.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\smss.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\smss.exe6⤵
- Modifies WinLogon for persistence
- Modifies system executable filetype association
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- UAC bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Sets file execution options in registry
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\csrss.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~\csrss.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\csrss.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\csrss.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\smss.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~\smss.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\smss.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\smss.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\lsass.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~\lsass.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\lsass.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\lsass.exe8⤵
- Modifies WinLogon for persistence
- Modifies system executable filetype association
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- UAC bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Sets file execution options in registry
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\csrss.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~\csrss.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\csrss.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\csrss.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\smss.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~\smss.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\smss.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\smss.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\lsass.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~\lsass.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\lsass.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\lsass.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\services.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~\services.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\services.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\services.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\winlogon.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~\winlogon.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\winlogon.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\winlogon.exe10⤵
- Modifies WinLogon for persistence
- Modifies system executable filetype association
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- UAC bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Sets file execution options in registry
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- System policy modification
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\csrss.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~\csrss.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\csrss.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\csrss.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\smss.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~\smss.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\smss.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\smss.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\lsass.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~\lsass.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\lsass.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\lsass.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\services.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~\services.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\services.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\services.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\winlogon.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~\winlogon.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\winlogon.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\winlogon.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\Paraysutki_VM_CommunityC:\Windows\System32\~A~m~B~u~R~a~D~u~L~\Paraysutki_VM_Community11⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Windows\System32\shimgvw.dll, ImageView_Fullscreen11⤵
- Suspicious use of FindShellTrayWindow
-
C:\Windows\SysWOW64\ping.exeping www.rasasayang.com.my -n 65500 -l 134011⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\ping.exeping www.data0.net -n 65500 -l 134011⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\ping.exeping www.duniasex.com -n 65500 -l 134011⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\Paraysutki_VM_CommunityC:\Windows\System32\~A~m~B~u~R~a~D~u~L~\Paraysutki_VM_Community9⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Windows\System32\shimgvw.dll, ImageView_Fullscreen9⤵
- Suspicious use of FindShellTrayWindow
-
C:\Windows\SysWOW64\ping.exeping www.rasasayang.com.my -n 65500 -l 13409⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\ping.exeping www.data0.net -n 65500 -l 13409⤵
- Runs ping.exe
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV110⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\ping.exeping www.duniasex.com -n 65500 -l 13409⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\services.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~\services.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\services.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\services.exe8⤵
- Modifies WinLogon for persistence
- Modifies system executable filetype association
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- UAC bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Sets file execution options in registry
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- System policy modification
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\csrss.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~\csrss.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\csrss.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\csrss.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\smss.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~\smss.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\smss.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\smss.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\lsass.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~\lsass.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\lsass.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\lsass.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\services.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~\services.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\services.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\services.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\winlogon.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~\winlogon.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\winlogon.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\winlogon.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\Paraysutki_VM_CommunityC:\Windows\System32\~A~m~B~u~R~a~D~u~L~\Paraysutki_VM_Community9⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Windows\System32\shimgvw.dll, ImageView_Fullscreen9⤵
- Suspicious use of FindShellTrayWindow
-
C:\Windows\SysWOW64\ping.exeping www.rasasayang.com.my -n 65500 -l 13409⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\ping.exeping www.data0.net -n 65500 -l 13409⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\ping.exeping www.duniasex.com -n 65500 -l 13409⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\winlogon.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~\winlogon.exe7⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\winlogon.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\winlogon.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\Paraysutki_VM_CommunityC:\Windows\System32\~A~m~B~u~R~a~D~u~L~\Paraysutki_VM_Community7⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Windows\System32\shimgvw.dll, ImageView_Fullscreen7⤵
- Suspicious use of FindShellTrayWindow
-
C:\Windows\SysWOW64\ping.exeping www.duniasex.com -n 65500 -l 13407⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\ping.exeping www.data0.net -n 65500 -l 13407⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\ping.exeping www.rasasayang.com.my -n 65500 -l 13407⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\lsass.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~\lsass.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\lsass.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\lsass.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\services.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~\services.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\services.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\services.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\winlogon.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~\winlogon.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\winlogon.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\winlogon.exe6⤵
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\Paraysutki_VM_CommunityC:\Windows\System32\~A~m~B~u~R~a~D~u~L~\Paraysutki_VM_Community5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Windows\System32\shimgvw.dll, ImageView_Fullscreen5⤵
-
C:\Windows\SysWOW64\ping.exeping www.duniasex.com -n 65500 -l 13405⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\ping.exeping www.rasasayang.com.my -n 65500 -l 13405⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\ping.exeping www.data0.net -n 65500 -l 13405⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\smss.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~\smss.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\smss.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\smss.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\lsass.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~\lsass.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\lsass.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\lsass.exe4⤵
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\services.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~\services.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\services.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\services.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\winlogon.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~\winlogon.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\winlogon.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\winlogon.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\Paraysutki_VM_CommunityC:\Windows\System32\~A~m~B~u~R~a~D~u~L~\Paraysutki_VM_Community3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Windows\System32\shimgvw.dll, ImageView_Fullscreen3⤵
- Suspicious use of FindShellTrayWindow
-
C:\Windows\SysWOW64\ping.exeping www.duniasex.com -n 65500 -l 13403⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\ping.exeping www.data0.net -n 65500 -l 13403⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\ping.exeping www.rasasayang.com.my -n 65500 -l 13403⤵
- Runs ping.exe
Network
MITRE ATT&CK Matrix ATT&CK v6
Persistence
Winlogon Helper DLL
1Change Default File Association
1Hidden Files and Directories
2Registry Run Keys / Startup Folder
2Defense Evasion
Modify Registry
9Hidden Files and Directories
2Bypass User Account Control
1Disabling Security Tools
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\3db145a70f75ceea54337275315ac77dcd61e7ae9cf38f240d17e196194b57cb.exeFilesize
50KB
MD5940d24de51296709ead002014ae37c40
SHA17cebaccaa9a213585f71d2a845ca7fd7d2c1cb7d
SHA256d9afef82aafa6709ca6879cdd7915e76999bc5b150301b3ccd73d7a8ef14c3b6
SHA5126646e85234e44185762d30705a2baf591241ae25459700f4699f3931f72d9138723aa52da6a479c72d8e9b0366892584f660b9b14f54d8672279cce7c44e7c64
-
C:\Users\Admin\AppData\Local\Temp\3db145a70f75ceea54337275315ac77dcd61e7ae9cf38f240d17e196194b57cb.exeFilesize
50KB
MD5940d24de51296709ead002014ae37c40
SHA17cebaccaa9a213585f71d2a845ca7fd7d2c1cb7d
SHA256d9afef82aafa6709ca6879cdd7915e76999bc5b150301b3ccd73d7a8ef14c3b6
SHA5126646e85234e44185762d30705a2baf591241ae25459700f4699f3931f72d9138723aa52da6a479c72d8e9b0366892584f660b9b14f54d8672279cce7c44e7c64
-
C:\Users\Admin\AppData\Roaming\Microsoft\izha.exeFilesize
76KB
MD55d1fc77d939653384382582c648d3a0b
SHA196150f6ee0c1a98e005219848f5a56c79bc154f8
SHA256079865c253287714c6f2f5355a727585ca572a5beafd65fe5914b272147e1097
SHA5126291924b680fca01dd6761f24ea379adfcb0afeec601cfc98e9f4d6fe5c4aeb1082bc276631c2942cb09ec8669c9c06814c46c273474afb5fd5fcfe191aed3c6
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\MSVBVM60.DLLFilesize
1.4MB
MD525f62c02619174b35851b0e0455b3d94
SHA14e8ee85157f1769f6e3f61c0acbe59072209da71
SHA256898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2
SHA512f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\Paraysutki_VM_CommunityFilesize
127KB
MD5b7422f357cba2a1d521f2e8ecf5fca73
SHA16352ec6ac218a362fe5b100f630d4783be28a8f6
SHA2561b33b350eb0ee9ddb53ddce1f371300c795b1519f4c1b430ba8d7abcf1f1ea65
SHA512e3badf35a7dcba5cc261005f35c30be0fa369612db9458a92c60878dac6e8d2d4858011c63a1a6cc2493344f594549c7737dd1a4be2921f73fdfb7234926538c
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\csrss.exeFilesize
127KB
MD5b7422f357cba2a1d521f2e8ecf5fca73
SHA16352ec6ac218a362fe5b100f630d4783be28a8f6
SHA2561b33b350eb0ee9ddb53ddce1f371300c795b1519f4c1b430ba8d7abcf1f1ea65
SHA512e3badf35a7dcba5cc261005f35c30be0fa369612db9458a92c60878dac6e8d2d4858011c63a1a6cc2493344f594549c7737dd1a4be2921f73fdfb7234926538c
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\csrss.exeFilesize
127KB
MD5b7422f357cba2a1d521f2e8ecf5fca73
SHA16352ec6ac218a362fe5b100f630d4783be28a8f6
SHA2561b33b350eb0ee9ddb53ddce1f371300c795b1519f4c1b430ba8d7abcf1f1ea65
SHA512e3badf35a7dcba5cc261005f35c30be0fa369612db9458a92c60878dac6e8d2d4858011c63a1a6cc2493344f594549c7737dd1a4be2921f73fdfb7234926538c
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\csrss.exeFilesize
127KB
MD5b7422f357cba2a1d521f2e8ecf5fca73
SHA16352ec6ac218a362fe5b100f630d4783be28a8f6
SHA2561b33b350eb0ee9ddb53ddce1f371300c795b1519f4c1b430ba8d7abcf1f1ea65
SHA512e3badf35a7dcba5cc261005f35c30be0fa369612db9458a92c60878dac6e8d2d4858011c63a1a6cc2493344f594549c7737dd1a4be2921f73fdfb7234926538c
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\csrss.exeFilesize
127KB
MD5b7422f357cba2a1d521f2e8ecf5fca73
SHA16352ec6ac218a362fe5b100f630d4783be28a8f6
SHA2561b33b350eb0ee9ddb53ddce1f371300c795b1519f4c1b430ba8d7abcf1f1ea65
SHA512e3badf35a7dcba5cc261005f35c30be0fa369612db9458a92c60878dac6e8d2d4858011c63a1a6cc2493344f594549c7737dd1a4be2921f73fdfb7234926538c
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\csrss.exeFilesize
127KB
MD5b7422f357cba2a1d521f2e8ecf5fca73
SHA16352ec6ac218a362fe5b100f630d4783be28a8f6
SHA2561b33b350eb0ee9ddb53ddce1f371300c795b1519f4c1b430ba8d7abcf1f1ea65
SHA512e3badf35a7dcba5cc261005f35c30be0fa369612db9458a92c60878dac6e8d2d4858011c63a1a6cc2493344f594549c7737dd1a4be2921f73fdfb7234926538c
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\csrss.exeFilesize
50KB
MD5940d24de51296709ead002014ae37c40
SHA17cebaccaa9a213585f71d2a845ca7fd7d2c1cb7d
SHA256d9afef82aafa6709ca6879cdd7915e76999bc5b150301b3ccd73d7a8ef14c3b6
SHA5126646e85234e44185762d30705a2baf591241ae25459700f4699f3931f72d9138723aa52da6a479c72d8e9b0366892584f660b9b14f54d8672279cce7c44e7c64
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\csrss.exeFilesize
50KB
MD5940d24de51296709ead002014ae37c40
SHA17cebaccaa9a213585f71d2a845ca7fd7d2c1cb7d
SHA256d9afef82aafa6709ca6879cdd7915e76999bc5b150301b3ccd73d7a8ef14c3b6
SHA5126646e85234e44185762d30705a2baf591241ae25459700f4699f3931f72d9138723aa52da6a479c72d8e9b0366892584f660b9b14f54d8672279cce7c44e7c64
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\csrss.exeFilesize
50KB
MD5940d24de51296709ead002014ae37c40
SHA17cebaccaa9a213585f71d2a845ca7fd7d2c1cb7d
SHA256d9afef82aafa6709ca6879cdd7915e76999bc5b150301b3ccd73d7a8ef14c3b6
SHA5126646e85234e44185762d30705a2baf591241ae25459700f4699f3931f72d9138723aa52da6a479c72d8e9b0366892584f660b9b14f54d8672279cce7c44e7c64
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\csrss.exeFilesize
50KB
MD5940d24de51296709ead002014ae37c40
SHA17cebaccaa9a213585f71d2a845ca7fd7d2c1cb7d
SHA256d9afef82aafa6709ca6879cdd7915e76999bc5b150301b3ccd73d7a8ef14c3b6
SHA5126646e85234e44185762d30705a2baf591241ae25459700f4699f3931f72d9138723aa52da6a479c72d8e9b0366892584f660b9b14f54d8672279cce7c44e7c64
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\csrss.exeFilesize
50KB
MD5940d24de51296709ead002014ae37c40
SHA17cebaccaa9a213585f71d2a845ca7fd7d2c1cb7d
SHA256d9afef82aafa6709ca6879cdd7915e76999bc5b150301b3ccd73d7a8ef14c3b6
SHA5126646e85234e44185762d30705a2baf591241ae25459700f4699f3931f72d9138723aa52da6a479c72d8e9b0366892584f660b9b14f54d8672279cce7c44e7c64
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\lsass.exeFilesize
127KB
MD5b7422f357cba2a1d521f2e8ecf5fca73
SHA16352ec6ac218a362fe5b100f630d4783be28a8f6
SHA2561b33b350eb0ee9ddb53ddce1f371300c795b1519f4c1b430ba8d7abcf1f1ea65
SHA512e3badf35a7dcba5cc261005f35c30be0fa369612db9458a92c60878dac6e8d2d4858011c63a1a6cc2493344f594549c7737dd1a4be2921f73fdfb7234926538c
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\lsass.exeFilesize
127KB
MD5b7422f357cba2a1d521f2e8ecf5fca73
SHA16352ec6ac218a362fe5b100f630d4783be28a8f6
SHA2561b33b350eb0ee9ddb53ddce1f371300c795b1519f4c1b430ba8d7abcf1f1ea65
SHA512e3badf35a7dcba5cc261005f35c30be0fa369612db9458a92c60878dac6e8d2d4858011c63a1a6cc2493344f594549c7737dd1a4be2921f73fdfb7234926538c
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\lsass.exeFilesize
127KB
MD5b7422f357cba2a1d521f2e8ecf5fca73
SHA16352ec6ac218a362fe5b100f630d4783be28a8f6
SHA2561b33b350eb0ee9ddb53ddce1f371300c795b1519f4c1b430ba8d7abcf1f1ea65
SHA512e3badf35a7dcba5cc261005f35c30be0fa369612db9458a92c60878dac6e8d2d4858011c63a1a6cc2493344f594549c7737dd1a4be2921f73fdfb7234926538c
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\lsass.exeFilesize
50KB
MD5940d24de51296709ead002014ae37c40
SHA17cebaccaa9a213585f71d2a845ca7fd7d2c1cb7d
SHA256d9afef82aafa6709ca6879cdd7915e76999bc5b150301b3ccd73d7a8ef14c3b6
SHA5126646e85234e44185762d30705a2baf591241ae25459700f4699f3931f72d9138723aa52da6a479c72d8e9b0366892584f660b9b14f54d8672279cce7c44e7c64
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\lsass.exeFilesize
50KB
MD5940d24de51296709ead002014ae37c40
SHA17cebaccaa9a213585f71d2a845ca7fd7d2c1cb7d
SHA256d9afef82aafa6709ca6879cdd7915e76999bc5b150301b3ccd73d7a8ef14c3b6
SHA5126646e85234e44185762d30705a2baf591241ae25459700f4699f3931f72d9138723aa52da6a479c72d8e9b0366892584f660b9b14f54d8672279cce7c44e7c64
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\lsass.exeFilesize
50KB
MD5940d24de51296709ead002014ae37c40
SHA17cebaccaa9a213585f71d2a845ca7fd7d2c1cb7d
SHA256d9afef82aafa6709ca6879cdd7915e76999bc5b150301b3ccd73d7a8ef14c3b6
SHA5126646e85234e44185762d30705a2baf591241ae25459700f4699f3931f72d9138723aa52da6a479c72d8e9b0366892584f660b9b14f54d8672279cce7c44e7c64
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\msvbvm60.dllFilesize
1.4MB
MD525f62c02619174b35851b0e0455b3d94
SHA14e8ee85157f1769f6e3f61c0acbe59072209da71
SHA256898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2
SHA512f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\msvbvm60.dllFilesize
1.4MB
MD525f62c02619174b35851b0e0455b3d94
SHA14e8ee85157f1769f6e3f61c0acbe59072209da71
SHA256898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2
SHA512f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\msvbvm60.dllFilesize
1.4MB
MD525f62c02619174b35851b0e0455b3d94
SHA14e8ee85157f1769f6e3f61c0acbe59072209da71
SHA256898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2
SHA512f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\msvbvm60.dllFilesize
1.4MB
MD525f62c02619174b35851b0e0455b3d94
SHA14e8ee85157f1769f6e3f61c0acbe59072209da71
SHA256898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2
SHA512f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\msvbvm60.dllFilesize
1.4MB
MD525f62c02619174b35851b0e0455b3d94
SHA14e8ee85157f1769f6e3f61c0acbe59072209da71
SHA256898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2
SHA512f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\msvbvm60.dllFilesize
1.4MB
MD525f62c02619174b35851b0e0455b3d94
SHA14e8ee85157f1769f6e3f61c0acbe59072209da71
SHA256898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2
SHA512f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\msvbvm60.dllFilesize
1.4MB
MD525f62c02619174b35851b0e0455b3d94
SHA14e8ee85157f1769f6e3f61c0acbe59072209da71
SHA256898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2
SHA512f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\msvbvm60.dllFilesize
1.4MB
MD525f62c02619174b35851b0e0455b3d94
SHA14e8ee85157f1769f6e3f61c0acbe59072209da71
SHA256898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2
SHA512f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\msvbvm60.dllFilesize
1.4MB
MD525f62c02619174b35851b0e0455b3d94
SHA14e8ee85157f1769f6e3f61c0acbe59072209da71
SHA256898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2
SHA512f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\msvbvm60.dllFilesize
1.4MB
MD525f62c02619174b35851b0e0455b3d94
SHA14e8ee85157f1769f6e3f61c0acbe59072209da71
SHA256898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2
SHA512f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\msvbvm60.dllFilesize
1.4MB
MD525f62c02619174b35851b0e0455b3d94
SHA14e8ee85157f1769f6e3f61c0acbe59072209da71
SHA256898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2
SHA512f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\msvbvm60.dllFilesize
1.4MB
MD525f62c02619174b35851b0e0455b3d94
SHA14e8ee85157f1769f6e3f61c0acbe59072209da71
SHA256898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2
SHA512f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\msvbvm60.dllFilesize
1.4MB
MD525f62c02619174b35851b0e0455b3d94
SHA14e8ee85157f1769f6e3f61c0acbe59072209da71
SHA256898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2
SHA512f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\msvbvm60.dllFilesize
1.4MB
MD525f62c02619174b35851b0e0455b3d94
SHA14e8ee85157f1769f6e3f61c0acbe59072209da71
SHA256898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2
SHA512f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\msvbvm60.dllFilesize
1.4MB
MD525f62c02619174b35851b0e0455b3d94
SHA14e8ee85157f1769f6e3f61c0acbe59072209da71
SHA256898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2
SHA512f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\msvbvm60.dllFilesize
1.4MB
MD525f62c02619174b35851b0e0455b3d94
SHA14e8ee85157f1769f6e3f61c0acbe59072209da71
SHA256898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2
SHA512f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\msvbvm60.dllFilesize
1.4MB
MD525f62c02619174b35851b0e0455b3d94
SHA14e8ee85157f1769f6e3f61c0acbe59072209da71
SHA256898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2
SHA512f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\msvbvm60.dllFilesize
1.4MB
MD525f62c02619174b35851b0e0455b3d94
SHA14e8ee85157f1769f6e3f61c0acbe59072209da71
SHA256898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2
SHA512f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\msvbvm60.dllFilesize
1.4MB
MD525f62c02619174b35851b0e0455b3d94
SHA14e8ee85157f1769f6e3f61c0acbe59072209da71
SHA256898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2
SHA512f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\services.exeFilesize
127KB
MD5b7422f357cba2a1d521f2e8ecf5fca73
SHA16352ec6ac218a362fe5b100f630d4783be28a8f6
SHA2561b33b350eb0ee9ddb53ddce1f371300c795b1519f4c1b430ba8d7abcf1f1ea65
SHA512e3badf35a7dcba5cc261005f35c30be0fa369612db9458a92c60878dac6e8d2d4858011c63a1a6cc2493344f594549c7737dd1a4be2921f73fdfb7234926538c
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\smss.exeFilesize
127KB
MD5b7422f357cba2a1d521f2e8ecf5fca73
SHA16352ec6ac218a362fe5b100f630d4783be28a8f6
SHA2561b33b350eb0ee9ddb53ddce1f371300c795b1519f4c1b430ba8d7abcf1f1ea65
SHA512e3badf35a7dcba5cc261005f35c30be0fa369612db9458a92c60878dac6e8d2d4858011c63a1a6cc2493344f594549c7737dd1a4be2921f73fdfb7234926538c
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\smss.exeFilesize
127KB
MD5b7422f357cba2a1d521f2e8ecf5fca73
SHA16352ec6ac218a362fe5b100f630d4783be28a8f6
SHA2561b33b350eb0ee9ddb53ddce1f371300c795b1519f4c1b430ba8d7abcf1f1ea65
SHA512e3badf35a7dcba5cc261005f35c30be0fa369612db9458a92c60878dac6e8d2d4858011c63a1a6cc2493344f594549c7737dd1a4be2921f73fdfb7234926538c
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\smss.exeFilesize
127KB
MD5b7422f357cba2a1d521f2e8ecf5fca73
SHA16352ec6ac218a362fe5b100f630d4783be28a8f6
SHA2561b33b350eb0ee9ddb53ddce1f371300c795b1519f4c1b430ba8d7abcf1f1ea65
SHA512e3badf35a7dcba5cc261005f35c30be0fa369612db9458a92c60878dac6e8d2d4858011c63a1a6cc2493344f594549c7737dd1a4be2921f73fdfb7234926538c
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\smss.exeFilesize
127KB
MD5b7422f357cba2a1d521f2e8ecf5fca73
SHA16352ec6ac218a362fe5b100f630d4783be28a8f6
SHA2561b33b350eb0ee9ddb53ddce1f371300c795b1519f4c1b430ba8d7abcf1f1ea65
SHA512e3badf35a7dcba5cc261005f35c30be0fa369612db9458a92c60878dac6e8d2d4858011c63a1a6cc2493344f594549c7737dd1a4be2921f73fdfb7234926538c
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\smss.exeFilesize
127KB
MD5b7422f357cba2a1d521f2e8ecf5fca73
SHA16352ec6ac218a362fe5b100f630d4783be28a8f6
SHA2561b33b350eb0ee9ddb53ddce1f371300c795b1519f4c1b430ba8d7abcf1f1ea65
SHA512e3badf35a7dcba5cc261005f35c30be0fa369612db9458a92c60878dac6e8d2d4858011c63a1a6cc2493344f594549c7737dd1a4be2921f73fdfb7234926538c
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\smss.exeFilesize
50KB
MD5940d24de51296709ead002014ae37c40
SHA17cebaccaa9a213585f71d2a845ca7fd7d2c1cb7d
SHA256d9afef82aafa6709ca6879cdd7915e76999bc5b150301b3ccd73d7a8ef14c3b6
SHA5126646e85234e44185762d30705a2baf591241ae25459700f4699f3931f72d9138723aa52da6a479c72d8e9b0366892584f660b9b14f54d8672279cce7c44e7c64
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\smss.exeFilesize
50KB
MD5940d24de51296709ead002014ae37c40
SHA17cebaccaa9a213585f71d2a845ca7fd7d2c1cb7d
SHA256d9afef82aafa6709ca6879cdd7915e76999bc5b150301b3ccd73d7a8ef14c3b6
SHA5126646e85234e44185762d30705a2baf591241ae25459700f4699f3931f72d9138723aa52da6a479c72d8e9b0366892584f660b9b14f54d8672279cce7c44e7c64
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\smss.exeFilesize
50KB
MD5940d24de51296709ead002014ae37c40
SHA17cebaccaa9a213585f71d2a845ca7fd7d2c1cb7d
SHA256d9afef82aafa6709ca6879cdd7915e76999bc5b150301b3ccd73d7a8ef14c3b6
SHA5126646e85234e44185762d30705a2baf591241ae25459700f4699f3931f72d9138723aa52da6a479c72d8e9b0366892584f660b9b14f54d8672279cce7c44e7c64
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\smss.exeFilesize
50KB
MD5940d24de51296709ead002014ae37c40
SHA17cebaccaa9a213585f71d2a845ca7fd7d2c1cb7d
SHA256d9afef82aafa6709ca6879cdd7915e76999bc5b150301b3ccd73d7a8ef14c3b6
SHA5126646e85234e44185762d30705a2baf591241ae25459700f4699f3931f72d9138723aa52da6a479c72d8e9b0366892584f660b9b14f54d8672279cce7c44e7c64
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\winlogon.exeFilesize
127KB
MD5b7422f357cba2a1d521f2e8ecf5fca73
SHA16352ec6ac218a362fe5b100f630d4783be28a8f6
SHA2561b33b350eb0ee9ddb53ddce1f371300c795b1519f4c1b430ba8d7abcf1f1ea65
SHA512e3badf35a7dcba5cc261005f35c30be0fa369612db9458a92c60878dac6e8d2d4858011c63a1a6cc2493344f594549c7737dd1a4be2921f73fdfb7234926538c
-
\??\c:\Documents and Settings\Admin\Application Data\Microsoft\izha.exeFilesize
76KB
MD55d1fc77d939653384382582c648d3a0b
SHA196150f6ee0c1a98e005219848f5a56c79bc154f8
SHA256079865c253287714c6f2f5355a727585ca572a5beafd65fe5914b272147e1097
SHA5126291924b680fca01dd6761f24ea379adfcb0afeec601cfc98e9f4d6fe5c4aeb1082bc276631c2942cb09ec8669c9c06814c46c273474afb5fd5fcfe191aed3c6
-
\??\c:\windows\SysWOW64\Windows 3D.scrFilesize
76KB
MD5fcdedd3fafb1c8b4a0ded75067d75b98
SHA1af5f50f71c6b868e41ff732ba039fb179d11ba7f
SHA25638cb7cd67ffccee3f0577a9b6dc7a1e860036d32f527f45aece2fb4bd8e68299
SHA5120bceecc62255acbd460c195f36227b4abceed54c9e06d791aae51ee6f81ec3cad7eac9ab1494f161fd592e6e7018192d2b63c84213adbaced5e75134b064b33a
-
\??\c:\windows\SysWOW64\maxtrox.txtFilesize
8B
MD524865ca220aa1936cbac0a57685217c5
SHA137f687cafe79e91eae6cbdffbf2f7ad3975f5e83
SHA256841e95fa333ed89085bfbab19bb658d96ed0c837d25721411233fa55c860c743
SHA512c8d3f514c72f48fed5de9582c4252cf5466a9d32866d8df3631ba9274ed734bb95139e4909e8116a10947fc1afa1dbeb33809da6ec050e6e4eb83d5241aeb062
-
\??\c:\windows\SysWOW64\maxtrox.txtFilesize
8B
MD524865ca220aa1936cbac0a57685217c5
SHA137f687cafe79e91eae6cbdffbf2f7ad3975f5e83
SHA256841e95fa333ed89085bfbab19bb658d96ed0c837d25721411233fa55c860c743
SHA512c8d3f514c72f48fed5de9582c4252cf5466a9d32866d8df3631ba9274ed734bb95139e4909e8116a10947fc1afa1dbeb33809da6ec050e6e4eb83d5241aeb062
-
\??\c:\windows\SysWOW64\maxtrox.txtFilesize
8B
MD524865ca220aa1936cbac0a57685217c5
SHA137f687cafe79e91eae6cbdffbf2f7ad3975f5e83
SHA256841e95fa333ed89085bfbab19bb658d96ed0c837d25721411233fa55c860c743
SHA512c8d3f514c72f48fed5de9582c4252cf5466a9d32866d8df3631ba9274ed734bb95139e4909e8116a10947fc1afa1dbeb33809da6ec050e6e4eb83d5241aeb062
-
\??\c:\windows\SysWOW64\maxtrox.txtFilesize
8B
MD524865ca220aa1936cbac0a57685217c5
SHA137f687cafe79e91eae6cbdffbf2f7ad3975f5e83
SHA256841e95fa333ed89085bfbab19bb658d96ed0c837d25721411233fa55c860c743
SHA512c8d3f514c72f48fed5de9582c4252cf5466a9d32866d8df3631ba9274ed734bb95139e4909e8116a10947fc1afa1dbeb33809da6ec050e6e4eb83d5241aeb062
-
\??\c:\windows\SysWOW64\maxtrox.txtFilesize
8B
MD524865ca220aa1936cbac0a57685217c5
SHA137f687cafe79e91eae6cbdffbf2f7ad3975f5e83
SHA256841e95fa333ed89085bfbab19bb658d96ed0c837d25721411233fa55c860c743
SHA512c8d3f514c72f48fed5de9582c4252cf5466a9d32866d8df3631ba9274ed734bb95139e4909e8116a10947fc1afa1dbeb33809da6ec050e6e4eb83d5241aeb062
-
\??\c:\windows\SysWOW64\maxtrox.txtFilesize
8B
MD524865ca220aa1936cbac0a57685217c5
SHA137f687cafe79e91eae6cbdffbf2f7ad3975f5e83
SHA256841e95fa333ed89085bfbab19bb658d96ed0c837d25721411233fa55c860c743
SHA512c8d3f514c72f48fed5de9582c4252cf5466a9d32866d8df3631ba9274ed734bb95139e4909e8116a10947fc1afa1dbeb33809da6ec050e6e4eb83d5241aeb062
-
\??\c:\windows\SysWOW64\maxtrox.txtFilesize
8B
MD524865ca220aa1936cbac0a57685217c5
SHA137f687cafe79e91eae6cbdffbf2f7ad3975f5e83
SHA256841e95fa333ed89085bfbab19bb658d96ed0c837d25721411233fa55c860c743
SHA512c8d3f514c72f48fed5de9582c4252cf5466a9d32866d8df3631ba9274ed734bb95139e4909e8116a10947fc1afa1dbeb33809da6ec050e6e4eb83d5241aeb062
-
\??\c:\windows\SysWOW64\maxtrox.txtFilesize
8B
MD524865ca220aa1936cbac0a57685217c5
SHA137f687cafe79e91eae6cbdffbf2f7ad3975f5e83
SHA256841e95fa333ed89085bfbab19bb658d96ed0c837d25721411233fa55c860c743
SHA512c8d3f514c72f48fed5de9582c4252cf5466a9d32866d8df3631ba9274ed734bb95139e4909e8116a10947fc1afa1dbeb33809da6ec050e6e4eb83d5241aeb062
-
\??\c:\windows\SysWOW64\maxtrox.txtFilesize
8B
MD524865ca220aa1936cbac0a57685217c5
SHA137f687cafe79e91eae6cbdffbf2f7ad3975f5e83
SHA256841e95fa333ed89085bfbab19bb658d96ed0c837d25721411233fa55c860c743
SHA512c8d3f514c72f48fed5de9582c4252cf5466a9d32866d8df3631ba9274ed734bb95139e4909e8116a10947fc1afa1dbeb33809da6ec050e6e4eb83d5241aeb062
-
\??\c:\windows\SysWOW64\maxtrox.txtFilesize
8B
MD524865ca220aa1936cbac0a57685217c5
SHA137f687cafe79e91eae6cbdffbf2f7ad3975f5e83
SHA256841e95fa333ed89085bfbab19bb658d96ed0c837d25721411233fa55c860c743
SHA512c8d3f514c72f48fed5de9582c4252cf5466a9d32866d8df3631ba9274ed734bb95139e4909e8116a10947fc1afa1dbeb33809da6ec050e6e4eb83d5241aeb062
-
\??\c:\windows\SysWOW64\maxtrox.txtFilesize
8B
MD524865ca220aa1936cbac0a57685217c5
SHA137f687cafe79e91eae6cbdffbf2f7ad3975f5e83
SHA256841e95fa333ed89085bfbab19bb658d96ed0c837d25721411233fa55c860c743
SHA512c8d3f514c72f48fed5de9582c4252cf5466a9d32866d8df3631ba9274ed734bb95139e4909e8116a10947fc1afa1dbeb33809da6ec050e6e4eb83d5241aeb062
-
memory/432-377-0x0000000000000000-mapping.dmp
-
memory/612-173-0x0000000000000000-mapping.dmp
-
memory/780-344-0x0000000000000000-mapping.dmp
-
memory/780-357-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/1028-303-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/1028-290-0x0000000000000000-mapping.dmp
-
memory/1204-387-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/1204-374-0x0000000000000000-mapping.dmp
-
memory/1412-333-0x0000000000000000-mapping.dmp
-
memory/1436-316-0x0000000000000000-mapping.dmp
-
memory/1436-335-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/1472-253-0x0000000000000000-mapping.dmp
-
memory/1780-386-0x0000000000000000-mapping.dmp
-
memory/1912-315-0x0000000000000000-mapping.dmp
-
memory/1936-229-0x0000000000000000-mapping.dmp
-
memory/2104-353-0x0000000000000000-mapping.dmp
-
memory/2104-365-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/2120-410-0x0000000000000000-mapping.dmp
-
memory/2124-193-0x0000000000000000-mapping.dmp
-
memory/2164-217-0x0000000000000000-mapping.dmp
-
memory/2184-235-0x0000000000000000-mapping.dmp
-
memory/2184-240-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/2188-223-0x0000000000000000-mapping.dmp
-
memory/2188-437-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/2188-277-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/2200-308-0x0000000000000000-mapping.dmp
-
memory/2480-367-0x0000000000000000-mapping.dmp
-
memory/2516-384-0x0000000000000000-mapping.dmp
-
memory/2576-140-0x0000000000000000-mapping.dmp
-
memory/2592-348-0x0000000000000000-mapping.dmp
-
memory/2592-363-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/2596-159-0x0000000000000000-mapping.dmp
-
memory/2664-423-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/2740-241-0x0000000000000000-mapping.dmp
-
memory/2748-279-0x0000000000000000-mapping.dmp
-
memory/2808-331-0x0000000000000000-mapping.dmp
-
memory/2904-361-0x0000000000000000-mapping.dmp
-
memory/2980-399-0x0000000000000000-mapping.dmp
-
memory/3012-180-0x0000000000000000-mapping.dmp
-
memory/3128-281-0x0000000000000000-mapping.dmp
-
memory/3188-413-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/3188-405-0x0000000000000000-mapping.dmp
-
memory/3248-342-0x0000000000000000-mapping.dmp
-
memory/3372-327-0x0000000000000000-mapping.dmp
-
memory/3372-341-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/3424-362-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/3424-346-0x0000000000000000-mapping.dmp
-
memory/3460-285-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/3460-271-0x0000000000000000-mapping.dmp
-
memory/3460-274-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/3468-364-0x0000000000000000-mapping.dmp
-
memory/3480-280-0x0000000000000000-mapping.dmp
-
memory/3540-397-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/3540-391-0x0000000000000000-mapping.dmp
-
memory/3608-205-0x0000000000000000-mapping.dmp
-
memory/3684-358-0x0000000000000000-mapping.dmp
-
memory/3820-199-0x0000000000000000-mapping.dmp
-
memory/3820-204-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/3840-418-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/3840-168-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/3840-148-0x0000000000000000-mapping.dmp
-
memory/4004-383-0x0000000000000000-mapping.dmp
-
memory/4016-406-0x0000000000000000-mapping.dmp
-
memory/4016-416-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/4208-276-0x0000000000000000-mapping.dmp
-
memory/4212-400-0x0000000000000000-mapping.dmp
-
memory/4228-259-0x0000000000000000-mapping.dmp
-
memory/4228-286-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/4228-264-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/4232-432-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/4232-305-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/4232-293-0x0000000000000000-mapping.dmp
-
memory/4384-275-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/4384-186-0x0000000000000000-mapping.dmp
-
memory/4384-190-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/4384-438-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/4396-165-0x0000000000000000-mapping.dmp
-
memory/4396-172-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/4396-169-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/4400-307-0x0000000000000000-mapping.dmp
-
memory/4408-334-0x0000000000000000-mapping.dmp
-
memory/4436-412-0x0000000000000000-mapping.dmp
-
memory/4448-330-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/4448-317-0x0000000000000000-mapping.dmp
-
memory/4468-134-0x0000000000000000-mapping.dmp
-
memory/4468-415-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/4468-139-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/4492-306-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/4492-294-0x0000000000000000-mapping.dmp
-
memory/4576-211-0x0000000000000000-mapping.dmp
-
memory/4576-216-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/4592-398-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/4592-392-0x0000000000000000-mapping.dmp
-
memory/4744-324-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/4744-426-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/4744-292-0x0000000000000000-mapping.dmp
-
memory/4856-373-0x0000000000000000-mapping.dmp
-
memory/4856-382-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/4888-328-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/4888-318-0x0000000000000000-mapping.dmp
-
memory/4888-431-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/4996-304-0x0000000000000000-mapping.dmp
-
memory/5008-265-0x0000000000000000-mapping.dmp
-
memory/5036-252-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/5036-247-0x0000000000000000-mapping.dmp