Analysis
-
max time kernel
207s -
max time network
216s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2022 06:53
Static task
static1
Behavioral task
behavioral1
Sample
e606ebb8d01184c9bb6f684b03acae1f54b8f4faafcbf6c8f0be404b32a61441.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
e606ebb8d01184c9bb6f684b03acae1f54b8f4faafcbf6c8f0be404b32a61441.exe
Resource
win10v2004-20221111-en
General
-
Target
e606ebb8d01184c9bb6f684b03acae1f54b8f4faafcbf6c8f0be404b32a61441.exe
-
Size
1.2MB
-
MD5
6ed29f629da1a85b7b854aafda1e369a
-
SHA1
25cdd05e00d1900aabca3e8a7d11f1a9e4547e3a
-
SHA256
e606ebb8d01184c9bb6f684b03acae1f54b8f4faafcbf6c8f0be404b32a61441
-
SHA512
75833a06204dc1d763105ccd427d667cfab5f060e310ab329d243e71f00ae0aa65ecc322ff35291a6ddfcea912a84506d6a99c62d4c38dc4a1958d0b31bd176b
-
SSDEEP
24576:0tb20pkaCqT5TBWgNQ7ar3YKEBCd1s31LgABGkoyXtkcnO16A:dVg5tQ7ar3GB+1eLFtvnG5
Malware Config
Extracted
njrat
0.7d
A0AYFJ0PJtXGl9PaJat
193.0.200.131:35689
0dcfc9e55379c2e16a422bb33c97d277
-
reg_key
0dcfc9e55379c2e16a422bb33c97d277
-
splitter
|'|'|
Signatures
-
Modifies WinLogon for persistence 2 TTPs 3 IoCs
Processes:
wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exeucsvc.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "explorer.exe" wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe" wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Local\\temp\\WINDOWS\\TEMPARCHIVE\\taskeng.exe" ucsvc.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
Processes:
taskeng.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" taskeng.exe -
Blocks application from running via registry modification 64 IoCs
Adds application to list of disallowed applications.
Processes:
wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\sTz = "PrivateMailReader.exe" wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\VMp = "BTStack.exe" wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\EUD = "dial.exe" wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\ABD = "ssupdate.exe" wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\fvF = "navapp.exe" wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\X3O = "prt.exe" wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\CCL = "SpywareStormer.exe" wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\jMA = "systtray.exe" wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\yfR = "pcacmes.exe" wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\C6Q = "dodrrr.exe" wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\O3D = "Mupdate.exe" wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\rER = "dllhost32.exe" wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\7ZZ = "3D Text.scr" wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\yqN = "msnsrv.exe" wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\zLi = "spoolsv.exe" wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\qsU = "eabh.dll" wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\2lR = "w32downloader-ggs.exe" wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\5xv = "winlivemsnmessenger.exe" wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\W55 = "acefilesearch.exe" wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\oyE = "em2.exe" wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\W5z = "FireWalker.exe" wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\Scf = "showbar.exe" wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\VkX = "ProtectPcs.exe" wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\xFb = "KeyLover21.exe" wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\766 = "wincp.exe" wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\0DI = "vbc.exe" wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\hm2 = "svhost32.exe" wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\Jue = "WorldAntiSpy.exe" wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\73s = "air89.exe" wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\imC = "flash-player.exe" wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\aMc = "pnpsrv.exe" wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\mob = "DSUpdate.ts3" wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\B7B = "xpsp2Update.exe" wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\rCV = "dho.exe" wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\7z4 = "dpcproxy.exe" wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\p4t = "GrabBurn.exe" wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\oUn = "magiclink.exe" wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\awx = "SpyViperProDemo.exe" wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\Oac = "485E.exe" wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\H9V = "dwin0016.dll" wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\WxM = "wmiaqsrv.exe" wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\GQD = "Security iGuard.exe" wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\wDj = "SmileySource.exe" wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\B7n = "air58F9.exe" wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\Dwb = "block-checker.exe" wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\i90 = "pyHeal.exe" wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\YkH = "gah95on6.exe" wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\7uM = "EEXPLORER.EXE" wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\G74 = "RfwSrv.exe" wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\yEI = "escorcher.exe" wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\1Xw = "csrdeu32.exe" wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\5NR = "localsrv.exe" wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\N2h = "Svchosts.exe" wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\2S0 = "winsrv.exe" wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\84S = "cseraser.exe" wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\s0c = "HitVirus.exe" wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\1GJ = "iwnvod.exe" wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\8YX = "service32.exe" wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\eqI = "oleupdate.exe" wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\bXF = "sbchost.exe" wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\4NX = "srv.exe" wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\5u6 = "uptask.exe" wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\2zt = "MalwareDestroyer.exe" wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\5HE = "pctptt.exe" wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe -
Drops file in Drivers directory 13 IoCs
Processes:
attrib.exeattrib.exewtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exeattrib.exeattrib.exedescription ioc process File opened for modification C:\Windows\System32\drivers\etc\lmhosts.sam attrib.exe File opened for modification C:\Windows\System32\drivers\etc\hosts attrib.exe File opened for modification C:\Windows\System32\drivers\etc\lmhosts.sam attrib.exe File opened for modification C:\Windows\System32\drivers\etc\networks attrib.exe File opened for modification C:\Windows\System32\drivers\etc\protocol attrib.exe File opened for modification C:\Windows\system32\drivers\etc\hosts wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe File opened for modification C:\Windows\System32\drivers\etc\networks attrib.exe File opened for modification C:\Windows\System32\drivers\etc\protocol attrib.exe File opened for modification C:\Windows\System32\drivers\etc\services attrib.exe File opened for modification C:\Windows\System32\drivers\etc\services attrib.exe File opened for modification C:\Windows\System32\drivers\etc attrib.exe File opened for modification C:\Windows\System32\drivers\etc attrib.exe File opened for modification C:\Windows\System32\drivers\etc\hosts attrib.exe -
Executes dropped EXE 7 IoCs
Processes:
wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exetaskeng.exeucsvc.exewksprt.exewksprt.exewksprt.exewksprt.exepid process 2072 wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe 3328 taskeng.exe 3384 ucsvc.exe 4184 wksprt.exe 4572 wksprt.exe 1868 wksprt.exe 884 wksprt.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
-
Sets file to hidden 1 TTPs 16 IoCs
Modifies file attributes to stop it showing in Explorer etc.
Processes:
attrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exepid process 3436 attrib.exe 1832 attrib.exe 3732 attrib.exe 640 attrib.exe 972 attrib.exe 3008 attrib.exe 2224 attrib.exe 2960 attrib.exe 2352 attrib.exe 1156 attrib.exe 1236 attrib.exe 4576 attrib.exe 3472 attrib.exe 1032 attrib.exe 1844 attrib.exe 2588 attrib.exe -
Checks computer location settings 2 TTPs 5 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
taskeng.exewtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exeucsvc.execmd.exeWScript.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation taskeng.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation ucsvc.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation WScript.exe -
Adds Run key to start application 2 TTPs 8 IoCs
Processes:
ucsvc.exewtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\*Boot Service Utility = "C:\\Users\\Admin\\AppData\\Local\\temp\\WINDOWS\\TEMPARCHIVE\\ucsvc.exe" ucsvc.exe Key deleted \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe Key deleted \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe -
Drops desktop.ini file(s) 3 IoCs
Processes:
taskeng.exewtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exedescription ioc process File created C:\Windows\assembly\Desktop.ini taskeng.exe File opened for modification C:\Windows\assembly\Desktop.ini taskeng.exe File opened for modification C:\Windows\assembly\Desktop.ini wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
wksprt.exewksprt.exedescription pid process target process PID 4184 set thread context of 4572 4184 wksprt.exe wksprt.exe PID 1868 set thread context of 884 1868 wksprt.exe wksprt.exe -
Drops file in Windows directory 5 IoCs
Processes:
taskeng.exewtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exedescription ioc process File opened for modification C:\Windows\assembly taskeng.exe File created C:\Windows\assembly\Desktop.ini taskeng.exe File opened for modification C:\Windows\assembly\Desktop.ini taskeng.exe File opened for modification C:\Windows\assembly wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe File opened for modification C:\Windows\assembly\Desktop.ini wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Processes:
wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exeucsvc.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\Download\DisallowRun = "1" wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\Download\CheckExeSignatures = "no" wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\Download\CheckExeSignatures = "no" ucsvc.exe -
Modifies registry class 1 IoCs
Processes:
cmd.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings cmd.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
taskeng.exeucsvc.exepid process 3328 taskeng.exe 3328 taskeng.exe 3328 taskeng.exe 3328 taskeng.exe 3328 taskeng.exe 3328 taskeng.exe 3328 taskeng.exe 3328 taskeng.exe 3328 taskeng.exe 3328 taskeng.exe 3328 taskeng.exe 3328 taskeng.exe 3328 taskeng.exe 3328 taskeng.exe 3328 taskeng.exe 3328 taskeng.exe 3328 taskeng.exe 3328 taskeng.exe 3328 taskeng.exe 3328 taskeng.exe 3328 taskeng.exe 3328 taskeng.exe 3328 taskeng.exe 3328 taskeng.exe 3328 taskeng.exe 3328 taskeng.exe 3328 taskeng.exe 3328 taskeng.exe 3328 taskeng.exe 3328 taskeng.exe 3328 taskeng.exe 3328 taskeng.exe 3328 taskeng.exe 3328 taskeng.exe 3328 taskeng.exe 3328 taskeng.exe 3328 taskeng.exe 3328 taskeng.exe 3328 taskeng.exe 3328 taskeng.exe 3328 taskeng.exe 3328 taskeng.exe 3328 taskeng.exe 3328 taskeng.exe 3328 taskeng.exe 3328 taskeng.exe 3328 taskeng.exe 3328 taskeng.exe 3328 taskeng.exe 3328 taskeng.exe 3328 taskeng.exe 3328 taskeng.exe 3328 taskeng.exe 3328 taskeng.exe 3328 taskeng.exe 3384 ucsvc.exe 3328 taskeng.exe 3328 taskeng.exe 3328 taskeng.exe 3328 taskeng.exe 3328 taskeng.exe 3328 taskeng.exe 3328 taskeng.exe 3328 taskeng.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
Processes:
taskeng.exeucsvc.exewksprt.exewksprt.exewksprt.exedescription pid process Token: SeDebugPrivilege 3328 taskeng.exe Token: SeDebugPrivilege 3384 ucsvc.exe Token: SeDebugPrivilege 4184 wksprt.exe Token: SeDebugPrivilege 1868 wksprt.exe Token: SeDebugPrivilege 884 wksprt.exe Token: 33 884 wksprt.exe Token: SeIncBasePriorityPrivilege 884 wksprt.exe Token: 33 884 wksprt.exe Token: SeIncBasePriorityPrivilege 884 wksprt.exe -
Suspicious use of FindShellTrayWindow 9 IoCs
Processes:
e606ebb8d01184c9bb6f684b03acae1f54b8f4faafcbf6c8f0be404b32a61441.exepid process 1400 e606ebb8d01184c9bb6f684b03acae1f54b8f4faafcbf6c8f0be404b32a61441.exe 1400 e606ebb8d01184c9bb6f684b03acae1f54b8f4faafcbf6c8f0be404b32a61441.exe 1400 e606ebb8d01184c9bb6f684b03acae1f54b8f4faafcbf6c8f0be404b32a61441.exe 1400 e606ebb8d01184c9bb6f684b03acae1f54b8f4faafcbf6c8f0be404b32a61441.exe 1400 e606ebb8d01184c9bb6f684b03acae1f54b8f4faafcbf6c8f0be404b32a61441.exe 1400 e606ebb8d01184c9bb6f684b03acae1f54b8f4faafcbf6c8f0be404b32a61441.exe 1400 e606ebb8d01184c9bb6f684b03acae1f54b8f4faafcbf6c8f0be404b32a61441.exe 1400 e606ebb8d01184c9bb6f684b03acae1f54b8f4faafcbf6c8f0be404b32a61441.exe 1400 e606ebb8d01184c9bb6f684b03acae1f54b8f4faafcbf6c8f0be404b32a61441.exe -
Suspicious use of SendNotifyMessage 9 IoCs
Processes:
e606ebb8d01184c9bb6f684b03acae1f54b8f4faafcbf6c8f0be404b32a61441.exepid process 1400 e606ebb8d01184c9bb6f684b03acae1f54b8f4faafcbf6c8f0be404b32a61441.exe 1400 e606ebb8d01184c9bb6f684b03acae1f54b8f4faafcbf6c8f0be404b32a61441.exe 1400 e606ebb8d01184c9bb6f684b03acae1f54b8f4faafcbf6c8f0be404b32a61441.exe 1400 e606ebb8d01184c9bb6f684b03acae1f54b8f4faafcbf6c8f0be404b32a61441.exe 1400 e606ebb8d01184c9bb6f684b03acae1f54b8f4faafcbf6c8f0be404b32a61441.exe 1400 e606ebb8d01184c9bb6f684b03acae1f54b8f4faafcbf6c8f0be404b32a61441.exe 1400 e606ebb8d01184c9bb6f684b03acae1f54b8f4faafcbf6c8f0be404b32a61441.exe 1400 e606ebb8d01184c9bb6f684b03acae1f54b8f4faafcbf6c8f0be404b32a61441.exe 1400 e606ebb8d01184c9bb6f684b03acae1f54b8f4faafcbf6c8f0be404b32a61441.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
e606ebb8d01184c9bb6f684b03acae1f54b8f4faafcbf6c8f0be404b32a61441.execmd.exeWScript.exetaskeng.execmd.exewtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.execmd.exeucsvc.exewksprt.exedescription pid process target process PID 1400 wrote to memory of 2072 1400 e606ebb8d01184c9bb6f684b03acae1f54b8f4faafcbf6c8f0be404b32a61441.exe wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe PID 1400 wrote to memory of 2072 1400 e606ebb8d01184c9bb6f684b03acae1f54b8f4faafcbf6c8f0be404b32a61441.exe wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe PID 1400 wrote to memory of 3328 1400 e606ebb8d01184c9bb6f684b03acae1f54b8f4faafcbf6c8f0be404b32a61441.exe taskeng.exe PID 1400 wrote to memory of 3328 1400 e606ebb8d01184c9bb6f684b03acae1f54b8f4faafcbf6c8f0be404b32a61441.exe taskeng.exe PID 1400 wrote to memory of 3376 1400 e606ebb8d01184c9bb6f684b03acae1f54b8f4faafcbf6c8f0be404b32a61441.exe cmd.exe PID 1400 wrote to memory of 3376 1400 e606ebb8d01184c9bb6f684b03acae1f54b8f4faafcbf6c8f0be404b32a61441.exe cmd.exe PID 1400 wrote to memory of 3376 1400 e606ebb8d01184c9bb6f684b03acae1f54b8f4faafcbf6c8f0be404b32a61441.exe cmd.exe PID 3376 wrote to memory of 3692 3376 cmd.exe WScript.exe PID 3376 wrote to memory of 3692 3376 cmd.exe WScript.exe PID 3376 wrote to memory of 3692 3376 cmd.exe WScript.exe PID 3692 wrote to memory of 484 3692 WScript.exe regini.exe PID 3692 wrote to memory of 484 3692 WScript.exe regini.exe PID 3692 wrote to memory of 484 3692 WScript.exe regini.exe PID 3328 wrote to memory of 3384 3328 taskeng.exe ucsvc.exe PID 3328 wrote to memory of 3384 3328 taskeng.exe ucsvc.exe PID 3328 wrote to memory of 1756 3328 taskeng.exe cmd.exe PID 3328 wrote to memory of 1756 3328 taskeng.exe cmd.exe PID 1756 wrote to memory of 2352 1756 cmd.exe attrib.exe PID 1756 wrote to memory of 2352 1756 cmd.exe attrib.exe PID 2072 wrote to memory of 2996 2072 wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe cmd.exe PID 2072 wrote to memory of 2996 2072 wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe cmd.exe PID 2996 wrote to memory of 2504 2996 cmd.exe cacls.exe PID 2996 wrote to memory of 2504 2996 cmd.exe cacls.exe PID 2996 wrote to memory of 812 2996 cmd.exe cacls.exe PID 2996 wrote to memory of 812 2996 cmd.exe cacls.exe PID 2996 wrote to memory of 4428 2996 cmd.exe cacls.exe PID 2996 wrote to memory of 4428 2996 cmd.exe cacls.exe PID 2996 wrote to memory of 3436 2996 cmd.exe attrib.exe PID 2996 wrote to memory of 3436 2996 cmd.exe attrib.exe PID 2996 wrote to memory of 1832 2996 cmd.exe attrib.exe PID 2996 wrote to memory of 1832 2996 cmd.exe attrib.exe PID 1756 wrote to memory of 1156 1756 cmd.exe attrib.exe PID 1756 wrote to memory of 1156 1756 cmd.exe attrib.exe PID 2996 wrote to memory of 3732 2996 cmd.exe attrib.exe PID 2996 wrote to memory of 3732 2996 cmd.exe attrib.exe PID 1756 wrote to memory of 4576 1756 cmd.exe attrib.exe PID 1756 wrote to memory of 4576 1756 cmd.exe attrib.exe PID 1756 wrote to memory of 3472 1756 cmd.exe attrib.exe PID 1756 wrote to memory of 3472 1756 cmd.exe attrib.exe PID 2996 wrote to memory of 3008 2996 cmd.exe attrib.exe PID 2996 wrote to memory of 3008 2996 cmd.exe attrib.exe PID 1756 wrote to memory of 1236 1756 cmd.exe attrib.exe PID 1756 wrote to memory of 1236 1756 cmd.exe attrib.exe PID 2996 wrote to memory of 640 2996 cmd.exe attrib.exe PID 2996 wrote to memory of 640 2996 cmd.exe attrib.exe PID 1756 wrote to memory of 1032 1756 cmd.exe attrib.exe PID 1756 wrote to memory of 1032 1756 cmd.exe attrib.exe PID 2996 wrote to memory of 2224 2996 cmd.exe attrib.exe PID 2996 wrote to memory of 2224 2996 cmd.exe attrib.exe PID 1756 wrote to memory of 1844 1756 cmd.exe attrib.exe PID 1756 wrote to memory of 1844 1756 cmd.exe attrib.exe PID 2996 wrote to memory of 972 2996 cmd.exe attrib.exe PID 2996 wrote to memory of 972 2996 cmd.exe attrib.exe PID 1756 wrote to memory of 2588 1756 cmd.exe attrib.exe PID 1756 wrote to memory of 2588 1756 cmd.exe attrib.exe PID 2996 wrote to memory of 2960 2996 cmd.exe attrib.exe PID 2996 wrote to memory of 2960 2996 cmd.exe attrib.exe PID 3384 wrote to memory of 4184 3384 ucsvc.exe wksprt.exe PID 3384 wrote to memory of 4184 3384 ucsvc.exe wksprt.exe PID 3384 wrote to memory of 4184 3384 ucsvc.exe wksprt.exe PID 4184 wrote to memory of 4572 4184 wksprt.exe wksprt.exe PID 4184 wrote to memory of 4572 4184 wksprt.exe wksprt.exe PID 4184 wrote to memory of 4572 4184 wksprt.exe wksprt.exe PID 4184 wrote to memory of 4572 4184 wksprt.exe wksprt.exe -
Views/modifies file attributes 1 TTPs 16 IoCs
Processes:
attrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exepid process 1844 attrib.exe 972 attrib.exe 2960 attrib.exe 2352 attrib.exe 3436 attrib.exe 4576 attrib.exe 3008 attrib.exe 1032 attrib.exe 2588 attrib.exe 2224 attrib.exe 1832 attrib.exe 1156 attrib.exe 3732 attrib.exe 3472 attrib.exe 1236 attrib.exe 640 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e606ebb8d01184c9bb6f684b03acae1f54b8f4faafcbf6c8f0be404b32a61441.exe"C:\Users\Admin\AppData\Local\Temp\e606ebb8d01184c9bb6f684b03acae1f54b8f4faafcbf6c8f0be404b32a61441.exe"1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\WINDOWS\TEMPARCHIVE\wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exeC:\Users\Admin\AppData\Local\Temp\WINDOWS\TEMPARCHIVE\wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe2⤵
- Modifies WinLogon for persistence
- Blocks application from running via registry modification
- Drops file in Drivers directory
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Drops desktop.ini file(s)
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\IyQoe.bat" "3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cacls.execacls C:\Users\Admin\AppData\Local\Temp\WINDOWS\TEMPARCHIVE /E /P everyone:n4⤵
-
C:\Windows\system32\cacls.execacls C:\Users\Admin\AppData\Local\Temp\WINDOWS /E /P everyone:n4⤵
-
C:\Windows\system32\cacls.execacls C:\Users\Admin\AppData\Local\Temp\WorkspaceRuntime /E /P everyone:n4⤵
-
C:\Windows\system32\attrib.exeattrib +a +h +s +r "C:\Windows\System32\drivers\etc\*.*"4⤵
- Drops file in Drivers directory
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\system32\attrib.exeattrib +a +h +s +r "C:\Windows\System32\drivers\etc"4⤵
- Drops file in Drivers directory
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\system32\attrib.exeattrib +a +h +s +r "C:\Users\Admin\AppData\Local\Temp\WINDOWS\TEMPARCHIVE\*.*"4⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\system32\attrib.exeattrib +a +h +s +r "C:\Users\Admin\AppData\Local\Temp\WINDOWS\TEMPARCHIVE"4⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\system32\attrib.exeattrib +a +h +s +r "C:\Users\Admin\AppData\Local\Temp\WINDOWS\*.*"4⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\system32\attrib.exeattrib +a +h +s +r "C:\Users\Admin\AppData\Local\Temp\WINDOWS"4⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\system32\attrib.exeattrib +a +h +s +r "C:\Users\Admin\AppData\Local\Temp\WorkspaceRuntime\*.*"4⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\system32\attrib.exeattrib +a +h +s +r "C:\Users\Admin\AppData\Local\Temp\WorkspaceRuntime"4⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Users\Admin\AppData\Local\Temp\WINDOWS\TEMPARCHIVE\taskeng.exeC:\Users\Admin\AppData\Local\Temp\WINDOWS\TEMPARCHIVE\taskeng.exe2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Checks computer location settings
- Drops desktop.ini file(s)
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\temp\WINDOWS\TEMPARCHIVE\ucsvc.exe"C:\Users\Admin\AppData\Local\temp\WINDOWS\TEMPARCHIVE\ucsvc.exe"3⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\temp\WorkspaceRuntime\wksprt.exe"C:\Users\Admin\AppData\Local\temp\WorkspaceRuntime\wksprt.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\temp\WorkspaceRuntime\wksprt.exeC:\Users\Admin\AppData\Local\temp\WorkspaceRuntime\wksprt.exe5⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\temp\WorkspaceRuntime\wksprt.exe"C:\Users\Admin\AppData\Local\temp\WorkspaceRuntime\wksprt.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\temp\WorkspaceRuntime\wksprt.exeC:\Users\Admin\AppData\Local\temp\WorkspaceRuntime\wksprt.exe5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\temp\WorkspaceRuntime\wksprt.exe" "wksprt.exe" ENABLE6⤵
- Modifies Windows Firewall
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\v.bat" "3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\attrib.exeattrib +a +h +s +r "C:\Windows\System32\drivers\etc\*.*"4⤵
- Drops file in Drivers directory
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\system32\attrib.exeattrib +a +h +s +r "C:\Windows\System32\drivers\etc"4⤵
- Drops file in Drivers directory
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\system32\attrib.exeattrib +a +h +s +r "C:\Users\Admin\AppData\Local\Temp\WINDOWS\TEMPARCHIVE\*.*"4⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\system32\attrib.exeattrib +a +h +s +r "C:\Users\Admin\AppData\Local\Temp\WINDOWS\TEMPARCHIVE"4⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\system32\attrib.exeattrib +a +h +s +r "C:\Users\Admin\AppData\Local\Temp\WINDOWS\*.*"4⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\system32\attrib.exeattrib +a +h +s +r "C:\Users\Admin\AppData\Local\Temp\WINDOWS"4⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\system32\attrib.exeattrib +a +h +s +r "C:\Users\Admin\AppData\Local\Temp\WorkspaceRuntime\*.*"4⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\system32\attrib.exeattrib +a +h +s +r "C:\Users\Admin\AppData\Local\Temp\WorkspaceRuntime"4⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c %temp%\WINDOWS\TEMPARCHIVE\kFUh8z3gTk3.vbs2⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\WINDOWS\TEMPARCHIVE\kFUh8z3gTk3.vbs"3⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\regini.exe"C:\Windows\System32\regini.exe" rad1B6EA.tmp4⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4572 -ip 45721⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\wksprt.exe.logFilesize
224B
MD5c19eb8c8e7a40e6b987f9d2ee952996e
SHA16fc3049855bc9100643e162511673c6df0f28bfb
SHA256677e9e30350df17e2bc20fa9f7d730e9f7cc6e870d6520a345f5f7dc5b31f58a
SHA512860713b4a787c2189ed12a47d4b68b60ac00c7a253cae52dd4eb9276dacafeae3a81906b6d0742c8ecfdfaa255777c445beb7c2a532f3c677a9903237ac97596
-
C:\Users\Admin\AppData\Local\Temp\IyQoe.batFilesize
522B
MD5254160d9b9287bff589b6246f99d8eec
SHA1876310cdd302898f5c8f4041037f18bacf07bcbe
SHA25616e99344bda2b1338204f4e89c3c6b6a8efbb168a76ed624cba9f4d1ad3fd9a4
SHA512002d0415387e60b9ef11a6e95787f03ec34c571676d7e5cafd54b6352855ca24e9099d1faa970a5cabdaa1f26620676cbb56e028cfdc54045119e0535a70444a
-
C:\Users\Admin\AppData\Local\Temp\WINDOWS\TEMPARCHIVE\kFUh8z3gTk3.vbsFilesize
348B
MD5a0926bc919989b99c9e0a6b4ce4aa30e
SHA192d4f4352f8779b9b3d027ecaa3bbfc1a3490714
SHA256fe2cb98959883d7523f401652fe2e60b691fb4d79cd14d7e02602df0eda8edc0
SHA5122fc1533fa9a77e80f266e88ecafd9de501705f3b8ae50d4994517c0aececb8d7609fb644772e4d9b9e5fa2b6f23ccf3a9181c03217a59b90d94f002b4cf8415f
-
C:\Users\Admin\AppData\Local\Temp\WINDOWS\TEMPARCHIVE\taskeng.exeFilesize
59KB
MD53aa31ccc52e5f05188e5ac84f55fb06f
SHA1b334aeff292fec54909810e44cfdf6d9fa6c4fb6
SHA256155e963480151497924d5220e5a373e37a4298d9399e551e0694a5f2be930282
SHA5124f294a1c76ad0b720791ee93c0e91ce3acc7128a30c521e106adbffe5ee9ce679533d887a2437478c2f51bafde9e2e15658165440fa4fa590d6b14ed14c3ab11
-
C:\Users\Admin\AppData\Local\Temp\WINDOWS\TEMPARCHIVE\taskeng.exeFilesize
59KB
MD53aa31ccc52e5f05188e5ac84f55fb06f
SHA1b334aeff292fec54909810e44cfdf6d9fa6c4fb6
SHA256155e963480151497924d5220e5a373e37a4298d9399e551e0694a5f2be930282
SHA5124f294a1c76ad0b720791ee93c0e91ce3acc7128a30c521e106adbffe5ee9ce679533d887a2437478c2f51bafde9e2e15658165440fa4fa590d6b14ed14c3ab11
-
C:\Users\Admin\AppData\Local\Temp\WINDOWS\TEMPARCHIVE\ucsvc.exeFilesize
70KB
MD56b4f12869c822faff28fe9377531655b
SHA1784fb31f33a92695e4dc6eefeaccc13086ae277f
SHA25606688797d34750928fc847a12db9d2c747d97ea514b1f7d077d6620b160ac958
SHA5125a65c6e30903790ed4c557ffa3ccae0c1a177b0a3b7cacade93faf84c8e7f20f410b5a710ebfd58e0e23e57addf9dc96391254db660f74618f7057204baafae3
-
C:\Users\Admin\AppData\Local\Temp\WINDOWS\TEMPARCHIVE\wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exeFilesize
126KB
MD5aedddd810b0fbb4b5346be5a71d6b8dc
SHA191e567a984004e467c8067eb334b010531354681
SHA2560fa8e108788bc2b65e9b524de5b198261f5cd1503d53f390cdb5c75a83e524ff
SHA512a67786b66aab1b2ccbd19269349e5b5ca82858936b1f5ba970f851ddb750e1f87041eae5b7a014fbba516984061022726a897e28ab1b489381bc0223d4b9495a
-
C:\Users\Admin\AppData\Local\Temp\WINDOWS\TEMPARCHIVE\wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exeFilesize
126KB
MD5aedddd810b0fbb4b5346be5a71d6b8dc
SHA191e567a984004e467c8067eb334b010531354681
SHA2560fa8e108788bc2b65e9b524de5b198261f5cd1503d53f390cdb5c75a83e524ff
SHA512a67786b66aab1b2ccbd19269349e5b5ca82858936b1f5ba970f851ddb750e1f87041eae5b7a014fbba516984061022726a897e28ab1b489381bc0223d4b9495a
-
C:\Users\Admin\AppData\Local\Temp\WorkspaceRuntime\wksprt.exeFilesize
173KB
MD5c3e0b61d64ccdb38323478d58beee899
SHA160a31e51017f6e1a860b0144562662672765fcee
SHA256c345e50343e02438fe02fada1fea45caa2901b774f5d1bd3ab228f605b874c7c
SHA51279530f1b91e6400cd02fe9e51d1b6620550a4df24604e323e755126fc527ee2e67e5278e87a4fd8e79096bb6eab398d882cef5d5524fe420db5b068ccd978dbc
-
C:\Users\Admin\AppData\Local\Temp\WorkspaceRuntime\wksprt.exeFilesize
173KB
MD5c3e0b61d64ccdb38323478d58beee899
SHA160a31e51017f6e1a860b0144562662672765fcee
SHA256c345e50343e02438fe02fada1fea45caa2901b774f5d1bd3ab228f605b874c7c
SHA51279530f1b91e6400cd02fe9e51d1b6620550a4df24604e323e755126fc527ee2e67e5278e87a4fd8e79096bb6eab398d882cef5d5524fe420db5b068ccd978dbc
-
C:\Users\Admin\AppData\Local\Temp\WorkspaceRuntime\wksprt.exeFilesize
173KB
MD5c3e0b61d64ccdb38323478d58beee899
SHA160a31e51017f6e1a860b0144562662672765fcee
SHA256c345e50343e02438fe02fada1fea45caa2901b774f5d1bd3ab228f605b874c7c
SHA51279530f1b91e6400cd02fe9e51d1b6620550a4df24604e323e755126fc527ee2e67e5278e87a4fd8e79096bb6eab398d882cef5d5524fe420db5b068ccd978dbc
-
C:\Users\Admin\AppData\Local\Temp\WorkspaceRuntime\wksprt.exeFilesize
173KB
MD5c3e0b61d64ccdb38323478d58beee899
SHA160a31e51017f6e1a860b0144562662672765fcee
SHA256c345e50343e02438fe02fada1fea45caa2901b774f5d1bd3ab228f605b874c7c
SHA51279530f1b91e6400cd02fe9e51d1b6620550a4df24604e323e755126fc527ee2e67e5278e87a4fd8e79096bb6eab398d882cef5d5524fe420db5b068ccd978dbc
-
C:\Users\Admin\AppData\Local\Temp\rad1B6EA.tmpFilesize
68B
MD5036fe9e90e1573c91f9f99bcf8170df0
SHA171009f2ea2955bd48c602d9c76c35b93ba141565
SHA256562c327100cf8ebbe415fa3aff9ff7c7ec8ce8c3bb680cfc0315e7d677469648
SHA512ddb09e217f812527568a959695976b3c1812b0015a3600cf1bec87bd6e9a20bea50c44b72e76702e75af340bfdaa88eee386c7081952372ffab16ac2bc03a820
-
C:\Users\Admin\AppData\Local\Temp\v.batFilesize
384B
MD52ec56e11d99afad1e6fba39be82df172
SHA18ace61da9bf03dfa3f05e4a2eee2311ade93040f
SHA256fe08f1f73ef0636a84ff7b757a04f2f99c417b4c0d63d9da8952c4154830b929
SHA5125fb85766c7ae10f5839fcdb02518caabb9cc44012ea8cc108c0c4ee78f0a04549cf4a2e0d33ce03a00748baa79f25f63e288513d869d967658fa222fbd11cc21
-
C:\Users\Admin\AppData\Local\temp\WINDOWS\TEMPARCHIVE\ucsvc.exeFilesize
70KB
MD56b4f12869c822faff28fe9377531655b
SHA1784fb31f33a92695e4dc6eefeaccc13086ae277f
SHA25606688797d34750928fc847a12db9d2c747d97ea514b1f7d077d6620b160ac958
SHA5125a65c6e30903790ed4c557ffa3ccae0c1a177b0a3b7cacade93faf84c8e7f20f410b5a710ebfd58e0e23e57addf9dc96391254db660f74618f7057204baafae3
-
C:\Users\Admin\AppData\Local\temp\WorkspaceRuntime\wksprt.exeFilesize
173KB
MD5c3e0b61d64ccdb38323478d58beee899
SHA160a31e51017f6e1a860b0144562662672765fcee
SHA256c345e50343e02438fe02fada1fea45caa2901b774f5d1bd3ab228f605b874c7c
SHA51279530f1b91e6400cd02fe9e51d1b6620550a4df24604e323e755126fc527ee2e67e5278e87a4fd8e79096bb6eab398d882cef5d5524fe420db5b068ccd978dbc
-
C:\Windows\System32\drivers\etc\hostsFilesize
1KB
MD501ae587c73cd331fd2da4caeca584612
SHA1ee2f06eba879af91442b137c36861c131f9fbc26
SHA256464da2c16792622be63fb6e5795853c24d84473080d7090948147dc1c1c27e68
SHA512650e69fa28985a4fd79a530f4fd5f08ae0590160e9db25872f0d3ea50a612674c076090e9d1f8ec7335a2473fa51088577436a2ec8e702e9402f16d467fbb1e5
-
C:\Windows\assembly\Desktop.iniFilesize
227B
MD5f7f759a5cd40bc52172e83486b6de404
SHA1d74930f354a56cfd03dc91aa96d8ae9657b1ee54
SHA256a709c2551b8818d7849d31a65446dc2f8c4cca2dcbbc5385604286f49cfdaf1c
SHA512a50b7826bfe72506019e4b1148a214c71c6f4743c09e809ef15cd0e0223f3078b683d203200910b07b5e1e34b94f0fe516ac53527311e2943654bfceade53298
-
memory/484-144-0x0000000000000000-mapping.dmp
-
memory/640-167-0x0000000000000000-mapping.dmp
-
memory/812-156-0x0000000000000000-mapping.dmp
-
memory/876-191-0x0000000000000000-mapping.dmp
-
memory/884-186-0x0000000000400000-0x000000000040C000-memory.dmpFilesize
48KB
-
memory/884-189-0x0000000074C00000-0x00000000751B1000-memory.dmpFilesize
5.7MB
-
memory/884-185-0x0000000000000000-mapping.dmp
-
memory/884-190-0x0000000074C00000-0x00000000751B1000-memory.dmpFilesize
5.7MB
-
memory/972-171-0x0000000000000000-mapping.dmp
-
memory/1032-168-0x0000000000000000-mapping.dmp
-
memory/1156-161-0x0000000000000000-mapping.dmp
-
memory/1236-166-0x0000000000000000-mapping.dmp
-
memory/1756-150-0x0000000000000000-mapping.dmp
-
memory/1832-160-0x0000000000000000-mapping.dmp
-
memory/1844-170-0x0000000000000000-mapping.dmp
-
memory/1868-188-0x0000000074C00000-0x00000000751B1000-memory.dmpFilesize
5.7MB
-
memory/1868-182-0x0000000000000000-mapping.dmp
-
memory/2072-141-0x00007FFC5BD60000-0x00007FFC5C796000-memory.dmpFilesize
10.2MB
-
memory/2072-132-0x0000000000000000-mapping.dmp
-
memory/2224-169-0x0000000000000000-mapping.dmp
-
memory/2352-152-0x0000000000000000-mapping.dmp
-
memory/2504-155-0x0000000000000000-mapping.dmp
-
memory/2588-172-0x0000000000000000-mapping.dmp
-
memory/2960-173-0x0000000000000000-mapping.dmp
-
memory/2996-153-0x0000000000000000-mapping.dmp
-
memory/3008-165-0x0000000000000000-mapping.dmp
-
memory/3328-135-0x0000000000000000-mapping.dmp
-
memory/3328-140-0x00007FFC5BD60000-0x00007FFC5C796000-memory.dmpFilesize
10.2MB
-
memory/3376-138-0x0000000000000000-mapping.dmp
-
memory/3384-147-0x0000000000000000-mapping.dmp
-
memory/3384-149-0x00007FFC5BD60000-0x00007FFC5C796000-memory.dmpFilesize
10.2MB
-
memory/3436-158-0x0000000000000000-mapping.dmp
-
memory/3472-164-0x0000000000000000-mapping.dmp
-
memory/3692-142-0x0000000000000000-mapping.dmp
-
memory/3732-162-0x0000000000000000-mapping.dmp
-
memory/4184-181-0x0000000074B60000-0x0000000075111000-memory.dmpFilesize
5.7MB
-
memory/4184-177-0x0000000074B60000-0x0000000075111000-memory.dmpFilesize
5.7MB
-
memory/4184-175-0x0000000000000000-mapping.dmp
-
memory/4428-157-0x0000000000000000-mapping.dmp
-
memory/4572-178-0x0000000000000000-mapping.dmp
-
memory/4576-163-0x0000000000000000-mapping.dmp