Analysis
-
max time kernel
151s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
25-11-2022 09:24
Static task
static1
Behavioral task
behavioral1
Sample
593ac271c4d72ad2ce3b5093d9801abd5603369b595d1292b39bb251a7e3e651.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
593ac271c4d72ad2ce3b5093d9801abd5603369b595d1292b39bb251a7e3e651.exe
Resource
win10v2004-20221111-en
General
-
Target
593ac271c4d72ad2ce3b5093d9801abd5603369b595d1292b39bb251a7e3e651.exe
-
Size
244KB
-
MD5
9ced6af933a6d0da83eaaab328ab8c54
-
SHA1
890a26d745ef6aee4fb5b5589262b97e5d50487b
-
SHA256
593ac271c4d72ad2ce3b5093d9801abd5603369b595d1292b39bb251a7e3e651
-
SHA512
47f9f37a0d47cc12b234efdb09122e2c9be4d5124fd43a4250b79ab87243e60c89479467c149f905e331efea4d67cec8df7b6cd27ab960f2b8f6b7f847f29a02
-
SSDEEP
3072:Wo8L5tpV+Ag1AAPoCpxW5ATBfUNlRsvkTVC9FieYTTLprx/m3qT4S826guKqhowN:atpB2oCpcNlRjQdi
Malware Config
Signatures
-
Modifies system executable filetype association 2 TTPs 8 IoCs
Processes:
system.exe593ac271c4d72ad2ce3b5093d9801abd5603369b595d1292b39bb251a7e3e651.exeGlobal.exesvchost.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt = "1" system.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\NeverShowExt = "1" system.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt = "1" 593ac271c4d72ad2ce3b5093d9801abd5603369b595d1292b39bb251a7e3e651.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\NeverShowExt = "1" 593ac271c4d72ad2ce3b5093d9801abd5603369b595d1292b39bb251a7e3e651.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt = "1" Global.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\NeverShowExt = "1" Global.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt = "1" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\NeverShowExt = "1" svchost.exe -
Adds policy Run key to start application 2 TTPs 8 IoCs
Processes:
system.exe593ac271c4d72ad2ce3b5093d9801abd5603369b595d1292b39bb251a7e3e651.exeGlobal.exesvchost.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\sys = "C:\\WINDOWS\\Fonts\\Fonts.exe" system.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 593ac271c4d72ad2ce3b5093d9801abd5603369b595d1292b39bb251a7e3e651.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\sys = "C:\\WINDOWS\\Fonts\\Fonts.exe" 593ac271c4d72ad2ce3b5093d9801abd5603369b595d1292b39bb251a7e3e651.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run Global.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\sys = "C:\\WINDOWS\\Fonts\\Fonts.exe" Global.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\sys = "C:\\WINDOWS\\Fonts\\Fonts.exe" svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run system.exe -
Drops file in Drivers directory 4 IoCs
Processes:
593ac271c4d72ad2ce3b5093d9801abd5603369b595d1292b39bb251a7e3e651.exeGlobal.exesvchost.exesystem.exedescription ioc process File created C:\WINDOWS\SysWOW64\drivers\drivers.cab.exe 593ac271c4d72ad2ce3b5093d9801abd5603369b595d1292b39bb251a7e3e651.exe File opened for modification C:\WINDOWS\SysWOW64\drivers\drivers.cab.exe Global.exe File created C:\WINDOWS\SysWOW64\drivers\drivers.cab.exe svchost.exe File created C:\WINDOWS\SysWOW64\drivers\drivers.cab.exe system.exe -
Executes dropped EXE 3 IoCs
Processes:
Global.exesvchost.exesystem.exepid process 900 Global.exe 1032 svchost.exe 984 system.exe -
Sets file execution options in registry 2 TTPs 64 IoCs
Processes:
system.exe593ac271c4d72ad2ce3b5093d9801abd5603369b595d1292b39bb251a7e3e651.exeGlobal.exesvchost.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ctfmon.exe\Debugger = "C:\\WINDOWS\\Fonts\\Fonts.exe" system.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe\Debugger = "C:\\WINDOWS\\Media\\rndll32.pif" 593ac271c4d72ad2ce3b5093d9801abd5603369b595d1292b39bb251a7e3e651.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\autorun.exe Global.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\autoruns.exe svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\procexp.exe svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe\Debugger = "C:\\WINDOWS\\Fonts\\tskmgr.exe" 593ac271c4d72ad2ce3b5093d9801abd5603369b595d1292b39bb251a7e3e651.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\procexp.exe\Debugger = "C:\\WINDOWS\\pchealth\\helpctr\\binaries\\HelpHost.com" system.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe Global.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\autorun.exe 593ac271c4d72ad2ce3b5093d9801abd5603369b595d1292b39bb251a7e3e651.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\autoruns.exe Global.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe\Debugger = "C:\\WINDOWS\\Fonts\\tskmgr.exe" system.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe system.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ctfmon.exe\Debugger = "C:\\WINDOWS\\Fonts\\Fonts.exe" Global.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\auto.exe system.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\procexp.exe system.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ctfmon.exe\Debugger = "C:\\WINDOWS\\Fonts\\Fonts.exe" 593ac271c4d72ad2ce3b5093d9801abd5603369b595d1292b39bb251a7e3e651.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\procexp.exe\Debugger = "C:\\WINDOWS\\pchealth\\helpctr\\binaries\\HelpHost.com" Global.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\auto.exe\Debugger = "C:\\WINDOWS\\system32\\drivers\\drivers.cab.exe" 593ac271c4d72ad2ce3b5093d9801abd5603369b595d1292b39bb251a7e3e651.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\boot.exe Global.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\auto.exe\Debugger = "C:\\WINDOWS\\system32\\drivers\\drivers.cab.exe" Global.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\auto.exe\Debugger = "C:\\WINDOWS\\system32\\drivers\\drivers.cab.exe" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\boot.exe\Debugger = "C:\\WINDOWS\\Fonts\\fonts.exe" system.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\autorun.exe\Debugger = "C:\\WINDOWS\\system32\\drivers\\drivers.cab.exe" 593ac271c4d72ad2ce3b5093d9801abd5603369b595d1292b39bb251a7e3e651.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\boot.exe\Debugger = "C:\\WINDOWS\\Fonts\\fonts.exe" Global.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe\Debugger = "C:\\WINDOWS\\Media\\rndll32.pif" Global.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ctfmon.exe svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\boot.exe svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\autorun.exe svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\boot.exe 593ac271c4d72ad2ce3b5093d9801abd5603369b595d1292b39bb251a7e3e651.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\autoruns.exe\Debugger = "C:\\WINDOWS\\system32\\drivers\\drivers.cab.exe" 593ac271c4d72ad2ce3b5093d9801abd5603369b595d1292b39bb251a7e3e651.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\autorun.exe\Debugger = "C:\\WINDOWS\\system32\\drivers\\drivers.cab.exe" Global.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\procexp.exe Global.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ctfmon.exe 593ac271c4d72ad2ce3b5093d9801abd5603369b595d1292b39bb251a7e3e651.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe 593ac271c4d72ad2ce3b5093d9801abd5603369b595d1292b39bb251a7e3e651.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\procexp.exe 593ac271c4d72ad2ce3b5093d9801abd5603369b595d1292b39bb251a7e3e651.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe Global.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\autorun.exe\Debugger = "C:\\WINDOWS\\system32\\drivers\\drivers.cab.exe" system.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe 593ac271c4d72ad2ce3b5093d9801abd5603369b595d1292b39bb251a7e3e651.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\procexp.exe\Debugger = "C:\\WINDOWS\\pchealth\\helpctr\\binaries\\HelpHost.com" 593ac271c4d72ad2ce3b5093d9801abd5603369b595d1292b39bb251a7e3e651.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ctfmon.exe Global.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\autoruns.exe\Debugger = "C:\\WINDOWS\\system32\\drivers\\drivers.cab.exe" Global.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\autoruns.exe 593ac271c4d72ad2ce3b5093d9801abd5603369b595d1292b39bb251a7e3e651.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe\Debugger = "C:\\WINDOWS\\Fonts\\tskmgr.exe" Global.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\boot.exe\Debugger = "C:\\WINDOWS\\Fonts\\fonts.exe" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\autorun.exe\Debugger = "C:\\WINDOWS\\system32\\drivers\\drivers.cab.exe" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\procexp.exe\Debugger = "C:\\WINDOWS\\pchealth\\helpctr\\binaries\\HelpHost.com" svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ctfmon.exe system.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe system.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\boot.exe system.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\auto.exe Global.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ctfmon.exe\Debugger = "C:\\WINDOWS\\Fonts\\Fonts.exe" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe\Debugger = "C:\\WINDOWS\\Fonts\\tskmgr.exe" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe\Debugger = "C:\\WINDOWS\\Media\\rndll32.pif" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\autoruns.exe\Debugger = "C:\\WINDOWS\\system32\\drivers\\drivers.cab.exe" system.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\auto.exe\Debugger = "C:\\WINDOWS\\system32\\drivers\\drivers.cab.exe" system.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe\Debugger = "C:\\WINDOWS\\Media\\rndll32.pif" system.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\boot.exe\Debugger = "C:\\WINDOWS\\Fonts\\fonts.exe" 593ac271c4d72ad2ce3b5093d9801abd5603369b595d1292b39bb251a7e3e651.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\auto.exe 593ac271c4d72ad2ce3b5093d9801abd5603369b595d1292b39bb251a7e3e651.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\autoruns.exe system.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\autoruns.exe\Debugger = "C:\\WINDOWS\\system32\\drivers\\drivers.cab.exe" svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\auto.exe svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\autorun.exe system.exe -
Loads dropped DLL 6 IoCs
Processes:
593ac271c4d72ad2ce3b5093d9801abd5603369b595d1292b39bb251a7e3e651.exeGlobal.exesvchost.exepid process 1524 593ac271c4d72ad2ce3b5093d9801abd5603369b595d1292b39bb251a7e3e651.exe 1524 593ac271c4d72ad2ce3b5093d9801abd5603369b595d1292b39bb251a7e3e651.exe 900 Global.exe 900 Global.exe 1032 svchost.exe 1032 svchost.exe -
Adds Run key to start application 2 TTPs 24 IoCs
Processes:
593ac271c4d72ad2ce3b5093d9801abd5603369b595d1292b39bb251a7e3e651.exeGlobal.exesvchost.exesystem.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\ = "C:\\WINDOWS\\system32\\dllcache\\Default.exe" 593ac271c4d72ad2ce3b5093d9801abd5603369b595d1292b39bb251a7e3e651.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ = "C:\\WINDOWS\\system\\KEYBOARD.exe" 593ac271c4d72ad2ce3b5093d9801abd5603369b595d1292b39bb251a7e3e651.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce Global.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ = "C:\\WINDOWS\\system\\KEYBOARD.exe" Global.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\ = "C:\\WINDOWS\\system32\\dllcache\\Default.exe" system.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce system.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce 593ac271c4d72ad2ce3b5093d9801abd5603369b595d1292b39bb251a7e3e651.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run 593ac271c4d72ad2ce3b5093d9801abd5603369b595d1292b39bb251a7e3e651.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\ = "C:\\WINDOWS\\system32\\dllcache\\Default.exe" Global.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\ = "C:\\WINDOWS\\system32\\dllcache\\Default.exe" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\ = "C:\\WINDOWS\\system32\\dllcache\\Default.exe" svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce system.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run system.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce Global.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\ = "C:\\WINDOWS\\system32\\dllcache\\Default.exe" system.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ = "C:\\WINDOWS\\system\\KEYBOARD.exe" system.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 593ac271c4d72ad2ce3b5093d9801abd5603369b595d1292b39bb251a7e3e651.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\ = "C:\\WINDOWS\\system32\\dllcache\\Default.exe" 593ac271c4d72ad2ce3b5093d9801abd5603369b595d1292b39bb251a7e3e651.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\ = "C:\\WINDOWS\\system32\\dllcache\\Default.exe" Global.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run Global.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ = "C:\\WINDOWS\\system\\KEYBOARD.exe" svchost.exe -
Drops autorun.inf file 1 TTPs 9 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
Processes:
593ac271c4d72ad2ce3b5093d9801abd5603369b595d1292b39bb251a7e3e651.exesvchost.exesystem.exeGlobal.exedescription ioc process File opened for modification C:\WINDOWS\SysWOW64\dllcache\autorun.inf 593ac271c4d72ad2ce3b5093d9801abd5603369b595d1292b39bb251a7e3e651.exe File opened for modification C:\WINDOWS\SysWOW64\dllcache\autorun.inf svchost.exe File opened for modification C:\WINDOWS\SysWOW64\dllcache\autorun.inf system.exe File created D:\autorun.inf Global.exe File created C:\WINDOWS\SysWOW64\dllcache\autorun.inf 593ac271c4d72ad2ce3b5093d9801abd5603369b595d1292b39bb251a7e3e651.exe File opened for modification C:\WINDOWS\SysWOW64\dllcache\autorun.inf Global.exe File opened for modification C:\autorun.inf Global.exe File created C:\autorun.inf Global.exe File opened for modification D:\autorun.inf Global.exe -
Drops file in System32 directory 54 IoCs
Processes:
593ac271c4d72ad2ce3b5093d9801abd5603369b595d1292b39bb251a7e3e651.exesvchost.exesystem.exeGlobal.exedescription ioc process File created C:\WINDOWS\SysWOW64\dllcache\Recycler.{645FF040-5081-101B-9F08-00AA002F954E}\system.exe 593ac271c4d72ad2ce3b5093d9801abd5603369b595d1292b39bb251a7e3e651.exe File opened for modification C:\WINDOWS\SysWOW64\dllcache\ svchost.exe File created C:\WINDOWS\SysWOW64\dllcache\Default.exe 593ac271c4d72ad2ce3b5093d9801abd5603369b595d1292b39bb251a7e3e651.exe File created C:\WINDOWS\SysWOW64\dllcache\Recycler.{645FF040-5081-101B-9F08-00AA002F954E}\Global.exe svchost.exe File opened for modification C:\WINDOWS\SysWOW64\dllcache system.exe File opened for modification C:\WINDOWS\SysWOW64\dllcache\autorun.inf 593ac271c4d72ad2ce3b5093d9801abd5603369b595d1292b39bb251a7e3e651.exe File opened for modification C:\WINDOWS\SysWOW64\dllcache\autorun.inf svchost.exe File created C:\WINDOWS\SysWOW64\dllcache\tskmgr.exe 593ac271c4d72ad2ce3b5093d9801abd5603369b595d1292b39bb251a7e3e651.exe File opened for modification C:\WINDOWS\SysWOW64\dllcache 593ac271c4d72ad2ce3b5093d9801abd5603369b595d1292b39bb251a7e3e651.exe File created C:\WINDOWS\SysWOW64\dllcache\Recycler.{645FF040-5081-101B-9F08-00AA002F954E}\Global.exe 593ac271c4d72ad2ce3b5093d9801abd5603369b595d1292b39bb251a7e3e651.exe File created C:\WINDOWS\SysWOW64\regedit.exe system.exe File opened for modification C:\WINDOWS\SysWOW64\dllcache\Recycler.{645FF040-5081-101B-9F08-00AA002F954E)\svchost.exe 593ac271c4d72ad2ce3b5093d9801abd5603369b595d1292b39bb251a7e3e651.exe File created C:\WINDOWS\SysWOW64\dllcache\Recycler.{645FF040-5081-101B-9F08-00AA002F954E}\svchost.exe svchost.exe File created C:\WINDOWS\SysWOW64\dllcache\Default.exe system.exe File created C:\WINDOWS\SysWOW64\dllcache\Recycler.{645FF040-5081-101B-9F08-00AA002F954E}\Global.exe system.exe File created C:\WINDOWS\SysWOW64\dllcache\svchost.exe system.exe File created C:\WINDOWS\SysWOW64\regedit.exe 593ac271c4d72ad2ce3b5093d9801abd5603369b595d1292b39bb251a7e3e651.exe File opened for modification C:\WINDOWS\SysWOW64\dllcache\Recycler.{645FF040-5081-101B-9F08-00AA002F954E}\Global.exe svchost.exe File opened for modification C:\WINDOWS\SysWOW64\dllcache\Recycler.{645FF040-5081-101B-9F08-00AA002F954E}\svchost.exe svchost.exe File created C:\WINDOWS\SysWOW64\dllcache\Recycler.{645FF040-5081-101B-9F08-00AA002F954E}\svchost.exe system.exe File opened for modification C:\WINDOWS\SysWOW64\dllcache\Recycler.{645FF040-5081-101B-9F08-00AA002F954E}\Global.exe system.exe File created C:\WINDOWS\SysWOW64\dllcache\Global.exe svchost.exe File created C:\WINDOWS\SysWOW64\dllcache\svchost.exe svchost.exe File created C:\WINDOWS\SysWOW64\regedit.exe svchost.exe File opened for modification C:\WINDOWS\SysWOW64\dllcache\ system.exe File created C:\WINDOWS\SysWOW64\dllcache\Global.exe 593ac271c4d72ad2ce3b5093d9801abd5603369b595d1292b39bb251a7e3e651.exe File opened for modification C:\WINDOWS\SysWOW64\dllcache\Recycler.{645FF040-5081-101B-9F08-00AA002F954E}\system.exe Global.exe File opened for modification C:\WINDOWS\SysWOW64\dllcache\svchost.exe Global.exe File opened for modification C:\WINDOWS\SysWOW64\dllcache\ Global.exe File opened for modification C:\WINDOWS\SysWOW64\dllcache\autorun.inf Global.exe File opened for modification C:\WINDOWS\SysWOW64\dllcache svchost.exe File created C:\WINDOWS\SysWOW64\dllcache\Default.exe svchost.exe File opened for modification C:\WINDOWS\SysWOW64\dllcache\Recycler.{645FF040-5081-101B-9F08-00AA002F954E}\svchost.exe system.exe File opened for modification C:\WINDOWS\SysWOW64\dllcache\autorun.inf system.exe File opened for modification C:\WINDOWS\SysWOW64\dllcache\ 593ac271c4d72ad2ce3b5093d9801abd5603369b595d1292b39bb251a7e3e651.exe File opened for modification C:\WINDOWS\SysWOW64\dllcache\tskmgr.exe Global.exe File created C:\WINDOWS\SysWOW64\regedit.exe Global.exe File opened for modification C:\WINDOWS\SysWOW64\dllcache\Recycler.{645FF040-5081-101B-9F08-00AA002F954E}\system.exe 593ac271c4d72ad2ce3b5093d9801abd5603369b595d1292b39bb251a7e3e651.exe File opened for modification C:\WINDOWS\SysWOW64\dllcache Global.exe File opened for modification C:\WINDOWS\SysWOW64\dllcache\Recycler.{645FF040-5081-101B-9F08-00AA002F954E}\svchost.exe Global.exe File created C:\WINDOWS\SysWOW64\dllcache\Recycler.{645FF040-5081-101B-9F08-00AA002F954E}\Global.exe Global.exe File opened for modification C:\WINDOWS\SysWOW64\dllcache\Recycler.{645FF040-5081-101B-9F08-00AA002F954E}\Global.exe Global.exe File opened for modification C:\WINDOWS\SysWOW64\dllcache\Recycler.{645FF040-5081-101B-9F08-00AA002F954E)\Global.exe 593ac271c4d72ad2ce3b5093d9801abd5603369b595d1292b39bb251a7e3e651.exe File created C:\WINDOWS\SysWOW64\dllcache\svchost.exe 593ac271c4d72ad2ce3b5093d9801abd5603369b595d1292b39bb251a7e3e651.exe File created C:\WINDOWS\SysWOW64\dllcache\tskmgr.exe Global.exe File created C:\WINDOWS\SysWOW64\dllcache\Global.exe system.exe File opened for modification C:\WINDOWS\SysWOW64\dllcache\Recycler.{645FF040-5081-101B-9F08-00AA002F954E} 593ac271c4d72ad2ce3b5093d9801abd5603369b595d1292b39bb251a7e3e651.exe File created C:\WINDOWS\SysWOW64\dllcache\autorun.inf 593ac271c4d72ad2ce3b5093d9801abd5603369b595d1292b39bb251a7e3e651.exe File opened for modification C:\WINDOWS\SysWOW64\dllcache\Default.exe Global.exe File created C:\WINDOWS\SysWOW64\dllcache\Recycler.{645FF040-5081-101B-9F08-00AA002F954E}\system.exe svchost.exe File created C:\WINDOWS\SysWOW64\dllcache\Recycler.{645FF040-5081-101B-9F08-00AA002F954E}\system.exe system.exe File created C:\WINDOWS\SysWOW64\dllcache\Recycler.{645FF040-5081-101B-9F08-00AA002F954E}\svchost.exe 593ac271c4d72ad2ce3b5093d9801abd5603369b595d1292b39bb251a7e3e651.exe File opened for modification C:\WINDOWS\SysWOW64\dllcache\Recycler.{645FF040-5081-101B-9F08-00AA002F954E}\svchost.exe 593ac271c4d72ad2ce3b5093d9801abd5603369b595d1292b39bb251a7e3e651.exe File opened for modification C:\WINDOWS\SysWOW64\dllcache\Global.exe Global.exe -
Drops file in Windows directory 38 IoCs
Processes:
593ac271c4d72ad2ce3b5093d9801abd5603369b595d1292b39bb251a7e3e651.exeGlobal.exesystem.exesvchost.exedescription ioc process File created C:\WINDOWS\pchealth\helpctr\binaries\HelpHost.com 593ac271c4d72ad2ce3b5093d9801abd5603369b595d1292b39bb251a7e3e651.exe File created C:\WINDOWS\pchealth\Global.exe 593ac271c4d72ad2ce3b5093d9801abd5603369b595d1292b39bb251a7e3e651.exe File created C:\WINDOWS\pchealth\helpctr\binaries\HelpHost.com Global.exe File opened for modification C:\WINDOWS\Fonts\wav.wav 593ac271c4d72ad2ce3b5093d9801abd5603369b595d1292b39bb251a7e3e651.exe File created C:\WINDOWS\Media\rndll32.pif 593ac271c4d72ad2ce3b5093d9801abd5603369b595d1292b39bb251a7e3e651.exe File created C:\WINDOWS\Fonts\Fonts.exe system.exe File created C:\WINDOWS\system\KEYBOARD.exe 593ac271c4d72ad2ce3b5093d9801abd5603369b595d1292b39bb251a7e3e651.exe File created C:\WINDOWS\pchealth\helpctr\binaries\HelpHost.com svchost.exe File created C:\WINDOWS\Fonts\tskmgr.exe svchost.exe File created C:\WINDOWS\Fonts\tskmgr.exe 593ac271c4d72ad2ce3b5093d9801abd5603369b595d1292b39bb251a7e3e651.exe File created C:\WINDOWS\Cursors\Boom.vbs 593ac271c4d72ad2ce3b5093d9801abd5603369b595d1292b39bb251a7e3e651.exe File opened for modification C:\WINDOWS\system\KEYBOARD.exe Global.exe File created C:\WINDOWS\pchealth\helpctr\binaries\HelpHost.com system.exe File created C:\WINDOWS\pchealth\Global.exe system.exe File created C:\WINDOWS\Fonts\wav.wav 593ac271c4d72ad2ce3b5093d9801abd5603369b595d1292b39bb251a7e3e651.exe File opened for modification C:\WINDOWS\Fonts\tskmgr.exe Global.exe File created C:\WINDOWS\system\KEYBOARD.exe svchost.exe File opened for modification C:\WINDOWS\Cursors\Boom.vbs svchost.exe File created C:\WINDOWS\Media\rndll32.pif system.exe File opened for modification C:\WINDOWS\Cursors\Boom.vbs system.exe File created C:\WINDOWS\Fonts\Fonts.exe 593ac271c4d72ad2ce3b5093d9801abd5603369b595d1292b39bb251a7e3e651.exe File opened for modification C:\WINDOWS\Help\microsoft.hlp Global.exe File created C:\WINDOWS\Media\rndll32.pif svchost.exe File created C:\WINDOWS\Cursors\Boom.vbs system.exe File opened for modification C:\WINDOWS\pchealth\Global.exe Global.exe File opened for modification C:\WINDOWS\Cursors\Boom.vbs Global.exe File created C:\WINDOWS\Help\microsoft.hlp svchost.exe File created C:\WINDOWS\Cursors\Boom.vbs svchost.exe File created C:\WINDOWS\system\KEYBOARD.exe system.exe File created C:\WINDOWS\Fonts\tskmgr.exe system.exe File created C:\WINDOWS\Help\microsoft.hlp 593ac271c4d72ad2ce3b5093d9801abd5603369b595d1292b39bb251a7e3e651.exe File opened for modification C:\WINDOWS\Cursors\Boom.vbs 593ac271c4d72ad2ce3b5093d9801abd5603369b595d1292b39bb251a7e3e651.exe File opened for modification C:\WINDOWS\Fonts\Fonts.exe Global.exe File opened for modification C:\WINDOWS\Media\rndll32.pif Global.exe File created C:\WINDOWS\Cursors\Boom.vbs Global.exe File created C:\WINDOWS\Fonts\Fonts.exe svchost.exe File created C:\WINDOWS\pchealth\Global.exe svchost.exe File created C:\WINDOWS\Help\microsoft.hlp system.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies Control Panel 16 IoCs
Processes:
593ac271c4d72ad2ce3b5093d9801abd5603369b595d1292b39bb251a7e3e651.exesvchost.exesystem.exeGlobal.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\WINDOWS\\pchealth\\helpctr\\binaries\\HelpHost.com" 593ac271c4d72ad2ce3b5093d9801abd5603369b595d1292b39bb251a7e3e651.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Control Panel\Desktop\AutoEndTasks = "1" 593ac271c4d72ad2ce3b5093d9801abd5603369b595d1292b39bb251a7e3e651.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Control Panel\Desktop\AutoEndTasks = "1" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\WINDOWS\\pchealth\\helpctr\\binaries\\HelpHost.com" system.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Control Panel\Desktop\ScreenSaveTimeOut = "30" system.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\WINDOWS\\pchealth\\helpctr\\binaries\\HelpHost.com" Global.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Control Panel\Desktop\ScreenSaveTimeOut = "30" Global.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Control Panel\Desktop system.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Control Panel\Desktop\AutoEndTasks = "1" system.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Control Panel\Desktop 593ac271c4d72ad2ce3b5093d9801abd5603369b595d1292b39bb251a7e3e651.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Control Panel\Desktop\AutoEndTasks = "1" Global.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\WINDOWS\\pchealth\\helpctr\\binaries\\HelpHost.com" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Control Panel\Desktop\ScreenSaveTimeOut = "30" 593ac271c4d72ad2ce3b5093d9801abd5603369b595d1292b39bb251a7e3e651.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Control Panel\Desktop Global.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Control Panel\Desktop svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Control Panel\Desktop\ScreenSaveTimeOut = "30" svchost.exe -
Modifies registry class 44 IoCs
Processes:
593ac271c4d72ad2ce3b5093d9801abd5603369b595d1292b39bb251a7e3e651.exeGlobal.exesvchost.exesystem.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mscfile\shell\open\command\ = "C:\\WINDOWS\\pchealth\\Global.exe" 593ac271c4d72ad2ce3b5093d9801abd5603369b595d1292b39bb251a7e3e651.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\regfile\Shell\Open\Command 593ac271c4d72ad2ce3b5093d9801abd5603369b595d1292b39bb251a7e3e651.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\regfile\shell\open\command\ = "C:\\WINDOWS\\pchealth\\Global.exe" Global.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile system.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile 593ac271c4d72ad2ce3b5093d9801abd5603369b595d1292b39bb251a7e3e651.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MSCFile\Shell\Open\Command Global.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile Global.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "VBSFile" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mscfile\shell\open\command\ = "C:\\WINDOWS\\pchealth\\Global.exe" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\regfile\shell\open\command\ = "C:\\WINDOWS\\pchealth\\Global.exe" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mscfile\shell\open\command\ = "C:\\WINDOWS\\pchealth\\Global.exe" system.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile system.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "VBSFile" 593ac271c4d72ad2ce3b5093d9801abd5603369b595d1292b39bb251a7e3e651.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mscfile\shell\open\command\ = "C:\\WINDOWS\\Fonts\\Fonts.exe" 593ac271c4d72ad2ce3b5093d9801abd5603369b595d1292b39bb251a7e3e651.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt = "1" 593ac271c4d72ad2ce3b5093d9801abd5603369b595d1292b39bb251a7e3e651.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mscfile\shell\open\command\ = "C:\\WINDOWS\\pchealth\\Global.exe" Global.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt = "1" Global.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt = "1" svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs system.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MSCFile\Shell\Open\Command 593ac271c4d72ad2ce3b5093d9801abd5603369b595d1292b39bb251a7e3e651.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\regfile\shell\open\command\ = "C:\\WINDOWS\\pchealth\\Global.exe" 593ac271c4d72ad2ce3b5093d9801abd5603369b595d1292b39bb251a7e3e651.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mscfile\shell\open\command\ = "C:\\WINDOWS\\Fonts\\Fonts.exe" Global.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile Global.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\regfile\Shell\Open\Command svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\NeverShowExt = "1" system.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MSCFile\Shell\Open\Command system.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs 593ac271c4d72ad2ce3b5093d9801abd5603369b595d1292b39bb251a7e3e651.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile 593ac271c4d72ad2ce3b5093d9801abd5603369b595d1292b39bb251a7e3e651.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\NeverShowExt = "1" 593ac271c4d72ad2ce3b5093d9801abd5603369b595d1292b39bb251a7e3e651.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs Global.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\NeverShowExt = "1" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "VBSFile" system.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\regfile\Shell\Open\Command system.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\regfile\Shell\Open\Command Global.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MSCFile\Shell\Open\Command svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mscfile\shell\open\command\ = "C:\\WINDOWS\\Fonts\\Fonts.exe" system.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt = "1" system.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "VBSFile" Global.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\NeverShowExt = "1" Global.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mscfile\shell\open\command\ = "C:\\WINDOWS\\Fonts\\Fonts.exe" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\regfile\shell\open\command\ = "C:\\WINDOWS\\pchealth\\Global.exe" system.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
593ac271c4d72ad2ce3b5093d9801abd5603369b595d1292b39bb251a7e3e651.exeGlobal.exesvchost.exesystem.exepid process 1524 593ac271c4d72ad2ce3b5093d9801abd5603369b595d1292b39bb251a7e3e651.exe 900 Global.exe 1032 svchost.exe 984 system.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
593ac271c4d72ad2ce3b5093d9801abd5603369b595d1292b39bb251a7e3e651.exeGlobal.exesvchost.exedescription pid process target process PID 1524 wrote to memory of 900 1524 593ac271c4d72ad2ce3b5093d9801abd5603369b595d1292b39bb251a7e3e651.exe Global.exe PID 1524 wrote to memory of 900 1524 593ac271c4d72ad2ce3b5093d9801abd5603369b595d1292b39bb251a7e3e651.exe Global.exe PID 1524 wrote to memory of 900 1524 593ac271c4d72ad2ce3b5093d9801abd5603369b595d1292b39bb251a7e3e651.exe Global.exe PID 1524 wrote to memory of 900 1524 593ac271c4d72ad2ce3b5093d9801abd5603369b595d1292b39bb251a7e3e651.exe Global.exe PID 900 wrote to memory of 1032 900 Global.exe svchost.exe PID 900 wrote to memory of 1032 900 Global.exe svchost.exe PID 900 wrote to memory of 1032 900 Global.exe svchost.exe PID 900 wrote to memory of 1032 900 Global.exe svchost.exe PID 1032 wrote to memory of 984 1032 svchost.exe system.exe PID 1032 wrote to memory of 984 1032 svchost.exe system.exe PID 1032 wrote to memory of 984 1032 svchost.exe system.exe PID 1032 wrote to memory of 984 1032 svchost.exe system.exe -
System policy modification 1 TTPs 8 IoCs
Processes:
Global.exesvchost.exesystem.exe593ac271c4d72ad2ce3b5093d9801abd5603369b595d1292b39bb251a7e3e651.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Global.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableStatusMessages = "1" Global.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System svchost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableStatusMessages = "1" svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System system.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableStatusMessages = "1" system.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 593ac271c4d72ad2ce3b5093d9801abd5603369b595d1292b39bb251a7e3e651.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableStatusMessages = "1" 593ac271c4d72ad2ce3b5093d9801abd5603369b595d1292b39bb251a7e3e651.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\593ac271c4d72ad2ce3b5093d9801abd5603369b595d1292b39bb251a7e3e651.exe"C:\Users\Admin\AppData\Local\Temp\593ac271c4d72ad2ce3b5093d9801abd5603369b595d1292b39bb251a7e3e651.exe"1⤵
- Modifies system executable filetype association
- Adds policy Run key to start application
- Drops file in Drivers directory
- Sets file execution options in registry
- Loads dropped DLL
- Adds Run key to start application
- Drops autorun.inf file
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Control Panel
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1524 -
C:\WINDOWS\SysWOW64\dllcache\Recycler.{645FF040-5081-101B-9F08-00AA002F954E}\Global.exe"C:\WINDOWS\system32\dllcache\Recycler.{645FF040-5081-101B-9F08-00AA002F954E}\Global.exe"2⤵
- Modifies system executable filetype association
- Adds policy Run key to start application
- Drops file in Drivers directory
- Executes dropped EXE
- Sets file execution options in registry
- Loads dropped DLL
- Adds Run key to start application
- Drops autorun.inf file
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Control Panel
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:900 -
C:\WINDOWS\SysWOW64\dllcache\Recycler.{645FF040-5081-101B-9F08-00AA002F954E}\svchost.exe"C:\WINDOWS\system32\dllcache\Recycler.{645FF040-5081-101B-9F08-00AA002F954E}\svchost.exe"3⤵
- Modifies system executable filetype association
- Adds policy Run key to start application
- Drops file in Drivers directory
- Executes dropped EXE
- Sets file execution options in registry
- Loads dropped DLL
- Adds Run key to start application
- Drops autorun.inf file
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Control Panel
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1032 -
C:\WINDOWS\SysWOW64\dllcache\Recycler.{645FF040-5081-101B-9F08-00AA002F954E}\system.exe"C:\WINDOWS\system32\dllcache\Recycler.{645FF040-5081-101B-9F08-00AA002F954E}\system.exe"4⤵
- Modifies system executable filetype association
- Adds policy Run key to start application
- Drops file in Drivers directory
- Executes dropped EXE
- Sets file execution options in registry
- Adds Run key to start application
- Drops autorun.inf file
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Control Panel
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:984
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\WINDOWS\Cursors\Boom.vbsFilesize
4KB
MD5e72c9789ac7232e3b36766eb2a8f8da6
SHA1a37a9f18e227d103bb4e1ecac0834c2cdf99d112
SHA2567b03603cbc56105470b4bfb250d0ef18fa93126475e2872d63dc52c35866d2a9
SHA512666a2592c5303a1f42a8bbddc2a8e5d3289c612be7401e3530a3afd70d8243276645bad00a82f3254674307583dabae49c16204e790200a34b0707813265f6d0
-
C:\WINDOWS\Fonts\Fonts.exeFilesize
244KB
MD59ced6af933a6d0da83eaaab328ab8c54
SHA1890a26d745ef6aee4fb5b5589262b97e5d50487b
SHA256593ac271c4d72ad2ce3b5093d9801abd5603369b595d1292b39bb251a7e3e651
SHA51247f9f37a0d47cc12b234efdb09122e2c9be4d5124fd43a4250b79ab87243e60c89479467c149f905e331efea4d67cec8df7b6cd27ab960f2b8f6b7f847f29a02
-
C:\WINDOWS\Fonts\tskmgr.exeFilesize
244KB
MD59ced6af933a6d0da83eaaab328ab8c54
SHA1890a26d745ef6aee4fb5b5589262b97e5d50487b
SHA256593ac271c4d72ad2ce3b5093d9801abd5603369b595d1292b39bb251a7e3e651
SHA51247f9f37a0d47cc12b234efdb09122e2c9be4d5124fd43a4250b79ab87243e60c89479467c149f905e331efea4d67cec8df7b6cd27ab960f2b8f6b7f847f29a02
-
C:\WINDOWS\Help\microsoft.hlpFilesize
244KB
MD59ced6af933a6d0da83eaaab328ab8c54
SHA1890a26d745ef6aee4fb5b5589262b97e5d50487b
SHA256593ac271c4d72ad2ce3b5093d9801abd5603369b595d1292b39bb251a7e3e651
SHA51247f9f37a0d47cc12b234efdb09122e2c9be4d5124fd43a4250b79ab87243e60c89479467c149f905e331efea4d67cec8df7b6cd27ab960f2b8f6b7f847f29a02
-
C:\WINDOWS\Media\rndll32.pifFilesize
244KB
MD59ced6af933a6d0da83eaaab328ab8c54
SHA1890a26d745ef6aee4fb5b5589262b97e5d50487b
SHA256593ac271c4d72ad2ce3b5093d9801abd5603369b595d1292b39bb251a7e3e651
SHA51247f9f37a0d47cc12b234efdb09122e2c9be4d5124fd43a4250b79ab87243e60c89479467c149f905e331efea4d67cec8df7b6cd27ab960f2b8f6b7f847f29a02
-
C:\WINDOWS\SysWOW64\dllcache\Default.exeFilesize
244KB
MD59ced6af933a6d0da83eaaab328ab8c54
SHA1890a26d745ef6aee4fb5b5589262b97e5d50487b
SHA256593ac271c4d72ad2ce3b5093d9801abd5603369b595d1292b39bb251a7e3e651
SHA51247f9f37a0d47cc12b234efdb09122e2c9be4d5124fd43a4250b79ab87243e60c89479467c149f905e331efea4d67cec8df7b6cd27ab960f2b8f6b7f847f29a02
-
C:\WINDOWS\SysWOW64\dllcache\Global.exeFilesize
244KB
MD59ced6af933a6d0da83eaaab328ab8c54
SHA1890a26d745ef6aee4fb5b5589262b97e5d50487b
SHA256593ac271c4d72ad2ce3b5093d9801abd5603369b595d1292b39bb251a7e3e651
SHA51247f9f37a0d47cc12b234efdb09122e2c9be4d5124fd43a4250b79ab87243e60c89479467c149f905e331efea4d67cec8df7b6cd27ab960f2b8f6b7f847f29a02
-
C:\WINDOWS\SysWOW64\dllcache\Recycler.{645FF040-5081-101B-9F08-00AA002F954E}\Global.exeFilesize
244KB
MD59ced6af933a6d0da83eaaab328ab8c54
SHA1890a26d745ef6aee4fb5b5589262b97e5d50487b
SHA256593ac271c4d72ad2ce3b5093d9801abd5603369b595d1292b39bb251a7e3e651
SHA51247f9f37a0d47cc12b234efdb09122e2c9be4d5124fd43a4250b79ab87243e60c89479467c149f905e331efea4d67cec8df7b6cd27ab960f2b8f6b7f847f29a02
-
C:\WINDOWS\SysWOW64\dllcache\Recycler.{645FF040-5081-101B-9F08-00AA002F954E}\svchost.exeFilesize
244KB
MD5d7c50b15adc662b417cf20192a4176a9
SHA1d1361fbed3b65c633785b0ba0c32eb739852767b
SHA256abca57cda8d2f76e58d281f3202c52c3a090ec28b4d2a2fd47ed4e1f327f716b
SHA512eb0449aca4a12950b7c8d8d22c9fa00cb4b6115f07c500a635c43197bf5244041c8fbbe5d4f1d862b92e808e8b2be035171b362e72d3faf06b8d74be216b6083
-
C:\WINDOWS\SysWOW64\dllcache\Recycler.{645FF040-5081-101B-9F08-00AA002F954E}\svchost.exeFilesize
244KB
MD59ced6af933a6d0da83eaaab328ab8c54
SHA1890a26d745ef6aee4fb5b5589262b97e5d50487b
SHA256593ac271c4d72ad2ce3b5093d9801abd5603369b595d1292b39bb251a7e3e651
SHA51247f9f37a0d47cc12b234efdb09122e2c9be4d5124fd43a4250b79ab87243e60c89479467c149f905e331efea4d67cec8df7b6cd27ab960f2b8f6b7f847f29a02
-
C:\WINDOWS\SysWOW64\dllcache\Recycler.{645FF040-5081-101B-9F08-00AA002F954E}\system.exeFilesize
244KB
MD59ced6af933a6d0da83eaaab328ab8c54
SHA1890a26d745ef6aee4fb5b5589262b97e5d50487b
SHA256593ac271c4d72ad2ce3b5093d9801abd5603369b595d1292b39bb251a7e3e651
SHA51247f9f37a0d47cc12b234efdb09122e2c9be4d5124fd43a4250b79ab87243e60c89479467c149f905e331efea4d67cec8df7b6cd27ab960f2b8f6b7f847f29a02
-
C:\WINDOWS\SysWOW64\dllcache\Recycler.{645FF040-5081-101B-9F08-00AA002F954E}\system.exeFilesize
244KB
MD59ced6af933a6d0da83eaaab328ab8c54
SHA1890a26d745ef6aee4fb5b5589262b97e5d50487b
SHA256593ac271c4d72ad2ce3b5093d9801abd5603369b595d1292b39bb251a7e3e651
SHA51247f9f37a0d47cc12b234efdb09122e2c9be4d5124fd43a4250b79ab87243e60c89479467c149f905e331efea4d67cec8df7b6cd27ab960f2b8f6b7f847f29a02
-
C:\WINDOWS\SysWOW64\dllcache\autorun.infFilesize
118B
MD54eb846be89a1520b7d0181f0736f9a96
SHA1869a156f9bd21b06d896cafa66db628f7b5e9679
SHA2565bf2d22daa1c82872df820f2e5d12fdc60e131f20782cc5e566a04343bfdf6d8
SHA512ee444365384528857a68672a0b1ae1a3b62f7a4b05038d894bc33f603291defdc03a2a3a2849054aa13f4f2def783fdce8f88a5896fd64f11a3f7c9b19c4008c
-
C:\WINDOWS\SysWOW64\dllcache\autorun.infFilesize
118B
MD54eb846be89a1520b7d0181f0736f9a96
SHA1869a156f9bd21b06d896cafa66db628f7b5e9679
SHA2565bf2d22daa1c82872df820f2e5d12fdc60e131f20782cc5e566a04343bfdf6d8
SHA512ee444365384528857a68672a0b1ae1a3b62f7a4b05038d894bc33f603291defdc03a2a3a2849054aa13f4f2def783fdce8f88a5896fd64f11a3f7c9b19c4008c
-
C:\WINDOWS\SysWOW64\dllcache\autorun.infFilesize
118B
MD54eb846be89a1520b7d0181f0736f9a96
SHA1869a156f9bd21b06d896cafa66db628f7b5e9679
SHA2565bf2d22daa1c82872df820f2e5d12fdc60e131f20782cc5e566a04343bfdf6d8
SHA512ee444365384528857a68672a0b1ae1a3b62f7a4b05038d894bc33f603291defdc03a2a3a2849054aa13f4f2def783fdce8f88a5896fd64f11a3f7c9b19c4008c
-
C:\WINDOWS\SysWOW64\dllcache\autorun.infFilesize
118B
MD54eb846be89a1520b7d0181f0736f9a96
SHA1869a156f9bd21b06d896cafa66db628f7b5e9679
SHA2565bf2d22daa1c82872df820f2e5d12fdc60e131f20782cc5e566a04343bfdf6d8
SHA512ee444365384528857a68672a0b1ae1a3b62f7a4b05038d894bc33f603291defdc03a2a3a2849054aa13f4f2def783fdce8f88a5896fd64f11a3f7c9b19c4008c
-
C:\WINDOWS\SysWOW64\dllcache\svchost.exeFilesize
244KB
MD59ced6af933a6d0da83eaaab328ab8c54
SHA1890a26d745ef6aee4fb5b5589262b97e5d50487b
SHA256593ac271c4d72ad2ce3b5093d9801abd5603369b595d1292b39bb251a7e3e651
SHA51247f9f37a0d47cc12b234efdb09122e2c9be4d5124fd43a4250b79ab87243e60c89479467c149f905e331efea4d67cec8df7b6cd27ab960f2b8f6b7f847f29a02
-
C:\WINDOWS\SysWOW64\drivers\drivers.cab.exeFilesize
244KB
MD59ced6af933a6d0da83eaaab328ab8c54
SHA1890a26d745ef6aee4fb5b5589262b97e5d50487b
SHA256593ac271c4d72ad2ce3b5093d9801abd5603369b595d1292b39bb251a7e3e651
SHA51247f9f37a0d47cc12b234efdb09122e2c9be4d5124fd43a4250b79ab87243e60c89479467c149f905e331efea4d67cec8df7b6cd27ab960f2b8f6b7f847f29a02
-
C:\WINDOWS\pchealth\Global.exeFilesize
244KB
MD59ced6af933a6d0da83eaaab328ab8c54
SHA1890a26d745ef6aee4fb5b5589262b97e5d50487b
SHA256593ac271c4d72ad2ce3b5093d9801abd5603369b595d1292b39bb251a7e3e651
SHA51247f9f37a0d47cc12b234efdb09122e2c9be4d5124fd43a4250b79ab87243e60c89479467c149f905e331efea4d67cec8df7b6cd27ab960f2b8f6b7f847f29a02
-
C:\WINDOWS\system\KEYBOARD.exeFilesize
244KB
MD59ced6af933a6d0da83eaaab328ab8c54
SHA1890a26d745ef6aee4fb5b5589262b97e5d50487b
SHA256593ac271c4d72ad2ce3b5093d9801abd5603369b595d1292b39bb251a7e3e651
SHA51247f9f37a0d47cc12b234efdb09122e2c9be4d5124fd43a4250b79ab87243e60c89479467c149f905e331efea4d67cec8df7b6cd27ab960f2b8f6b7f847f29a02
-
C:\Windows\SysWOW64\dllcache\Recycler.{645FF040-5081-101B-9F08-00AA002F954E}\Global.exeFilesize
244KB
MD59ced6af933a6d0da83eaaab328ab8c54
SHA1890a26d745ef6aee4fb5b5589262b97e5d50487b
SHA256593ac271c4d72ad2ce3b5093d9801abd5603369b595d1292b39bb251a7e3e651
SHA51247f9f37a0d47cc12b234efdb09122e2c9be4d5124fd43a4250b79ab87243e60c89479467c149f905e331efea4d67cec8df7b6cd27ab960f2b8f6b7f847f29a02
-
C:\Windows\SysWOW64\dllcache\Recycler.{645FF040-5081-101B-9F08-00AA002F954E}\svchost.exeFilesize
244KB
MD59ced6af933a6d0da83eaaab328ab8c54
SHA1890a26d745ef6aee4fb5b5589262b97e5d50487b
SHA256593ac271c4d72ad2ce3b5093d9801abd5603369b595d1292b39bb251a7e3e651
SHA51247f9f37a0d47cc12b234efdb09122e2c9be4d5124fd43a4250b79ab87243e60c89479467c149f905e331efea4d67cec8df7b6cd27ab960f2b8f6b7f847f29a02
-
C:\Windows\SysWOW64\dllcache\Recycler.{645FF040-5081-101B-9F08-00AA002F954E}\system.exeFilesize
244KB
MD59ced6af933a6d0da83eaaab328ab8c54
SHA1890a26d745ef6aee4fb5b5589262b97e5d50487b
SHA256593ac271c4d72ad2ce3b5093d9801abd5603369b595d1292b39bb251a7e3e651
SHA51247f9f37a0d47cc12b234efdb09122e2c9be4d5124fd43a4250b79ab87243e60c89479467c149f905e331efea4d67cec8df7b6cd27ab960f2b8f6b7f847f29a02
-
\Windows\SysWOW64\dllcache\Recycler.{645FF040-5081-101B-9F08-00AA002F954E}\Global.exeFilesize
244KB
MD59ced6af933a6d0da83eaaab328ab8c54
SHA1890a26d745ef6aee4fb5b5589262b97e5d50487b
SHA256593ac271c4d72ad2ce3b5093d9801abd5603369b595d1292b39bb251a7e3e651
SHA51247f9f37a0d47cc12b234efdb09122e2c9be4d5124fd43a4250b79ab87243e60c89479467c149f905e331efea4d67cec8df7b6cd27ab960f2b8f6b7f847f29a02
-
\Windows\SysWOW64\dllcache\Recycler.{645FF040-5081-101B-9F08-00AA002F954E}\Global.exeFilesize
244KB
MD59ced6af933a6d0da83eaaab328ab8c54
SHA1890a26d745ef6aee4fb5b5589262b97e5d50487b
SHA256593ac271c4d72ad2ce3b5093d9801abd5603369b595d1292b39bb251a7e3e651
SHA51247f9f37a0d47cc12b234efdb09122e2c9be4d5124fd43a4250b79ab87243e60c89479467c149f905e331efea4d67cec8df7b6cd27ab960f2b8f6b7f847f29a02
-
\Windows\SysWOW64\dllcache\Recycler.{645FF040-5081-101B-9F08-00AA002F954E}\svchost.exeFilesize
244KB
MD59ced6af933a6d0da83eaaab328ab8c54
SHA1890a26d745ef6aee4fb5b5589262b97e5d50487b
SHA256593ac271c4d72ad2ce3b5093d9801abd5603369b595d1292b39bb251a7e3e651
SHA51247f9f37a0d47cc12b234efdb09122e2c9be4d5124fd43a4250b79ab87243e60c89479467c149f905e331efea4d67cec8df7b6cd27ab960f2b8f6b7f847f29a02
-
\Windows\SysWOW64\dllcache\Recycler.{645FF040-5081-101B-9F08-00AA002F954E}\svchost.exeFilesize
244KB
MD59ced6af933a6d0da83eaaab328ab8c54
SHA1890a26d745ef6aee4fb5b5589262b97e5d50487b
SHA256593ac271c4d72ad2ce3b5093d9801abd5603369b595d1292b39bb251a7e3e651
SHA51247f9f37a0d47cc12b234efdb09122e2c9be4d5124fd43a4250b79ab87243e60c89479467c149f905e331efea4d67cec8df7b6cd27ab960f2b8f6b7f847f29a02
-
\Windows\SysWOW64\dllcache\Recycler.{645FF040-5081-101B-9F08-00AA002F954E}\system.exeFilesize
244KB
MD59ced6af933a6d0da83eaaab328ab8c54
SHA1890a26d745ef6aee4fb5b5589262b97e5d50487b
SHA256593ac271c4d72ad2ce3b5093d9801abd5603369b595d1292b39bb251a7e3e651
SHA51247f9f37a0d47cc12b234efdb09122e2c9be4d5124fd43a4250b79ab87243e60c89479467c149f905e331efea4d67cec8df7b6cd27ab960f2b8f6b7f847f29a02
-
\Windows\SysWOW64\dllcache\Recycler.{645FF040-5081-101B-9F08-00AA002F954E}\system.exeFilesize
244KB
MD59ced6af933a6d0da83eaaab328ab8c54
SHA1890a26d745ef6aee4fb5b5589262b97e5d50487b
SHA256593ac271c4d72ad2ce3b5093d9801abd5603369b595d1292b39bb251a7e3e651
SHA51247f9f37a0d47cc12b234efdb09122e2c9be4d5124fd43a4250b79ab87243e60c89479467c149f905e331efea4d67cec8df7b6cd27ab960f2b8f6b7f847f29a02
-
memory/900-61-0x0000000000000000-mapping.dmp
-
memory/900-92-0x00000000039A0000-0x00000000039E0000-memory.dmpFilesize
256KB
-
memory/900-93-0x00000000039A0000-0x00000000039E0000-memory.dmpFilesize
256KB
-
memory/900-109-0x00000000039A0000-0x00000000039E0000-memory.dmpFilesize
256KB
-
memory/900-82-0x0000000000400000-0x0000000000440000-memory.dmpFilesize
256KB
-
memory/900-108-0x00000000039A0000-0x00000000039E0000-memory.dmpFilesize
256KB
-
memory/984-98-0x0000000000000000-mapping.dmp
-
memory/984-105-0x0000000000400000-0x0000000000440000-memory.dmpFilesize
256KB
-
memory/984-103-0x00000000034E0000-0x0000000003F9A000-memory.dmpFilesize
10.7MB
-
memory/1032-94-0x0000000000400000-0x0000000000440000-memory.dmpFilesize
256KB
-
memory/1032-85-0x0000000000000000-mapping.dmp
-
memory/1032-104-0x0000000004120000-0x0000000004160000-memory.dmpFilesize
256KB
-
memory/1524-56-0x0000000000400000-0x0000000000440000-memory.dmpFilesize
256KB
-
memory/1524-58-0x0000000074001000-0x0000000074003000-memory.dmpFilesize
8KB
-
memory/1524-81-0x0000000000400000-0x0000000000440000-memory.dmpFilesize
256KB
-
memory/1524-57-0x0000000075B51000-0x0000000075B53000-memory.dmpFilesize
8KB