Resubmissions

01-02-2023 17:02

230201-vj6p3aah39 10

01-02-2023 17:00

230201-vjf5eacg4s 10

01-02-2023 16:57

230201-vgbrxacg2y 10

Analysis

  • max time kernel
    151s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    01-02-2023 17:00

General

  • Target

    Halkbank_Ekstre_20230129_075423_612150o.pdf..exe

  • Size

    461KB

  • MD5

    51505dd088beb3a3406dab4bcfc0090b

  • SHA1

    7efb628f6b348b0f19360241f3f0661419617bc7

  • SHA256

    5f16e8c1fef7f5f311b814b10f7b9e9b1ec3c204075fb8bb48ac207e256ea208

  • SHA512

    dc05dc73895114c6025c986d696a3a6044c26f2e6e2c5863c33a7806461033f99ae2dbae153cdf1c1d2b93ee9686bddf98d2b58759e13aef923dbf0635e3166c

  • SSDEEP

    12288:GENN+T5xYrllrU7QY62YrTNbwcD/xtDmpfJuB3:K5xolYQY62YrZ0nfs5

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot5801425382:AAG5b4PUEaqNDv5uP9ejZGeIHeuzzOD4IHY/sendMessage?chat_id=5812329204

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Snake Keylogger

    Keylogger and Infostealer first seen in November 2020.

  • Snake Keylogger payload 2 IoCs
  • Executes dropped EXE 8 IoCs
  • Modifies Installed Components in the registry 2 TTPs 8 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 14 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 14 IoCs
  • Suspicious use of WriteProcessMemory 45 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Halkbank_Ekstre_20230129_075423_612150o.pdf..exe
    "C:\Users\Admin\AppData\Local\Temp\Halkbank_Ekstre_20230129_075423_612150o.pdf..exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1280
    • \??\c:\users\admin\appdata\local\temp\halkbank_ekstre_20230129_075423_612150o.pdf..exe 
      c:\users\admin\appdata\local\temp\halkbank_ekstre_20230129_075423_612150o.pdf..exe 
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1108
      • C:\Users\Admin\AppData\Local\Temp\iauwp.exe
        "C:\Users\Admin\AppData\Local\Temp\iauwp.exe" C:\Users\Admin\AppData\Local\Temp\iqvpwdmb.c
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of WriteProcessMemory
        PID:520
        • C:\Users\Admin\AppData\Local\Temp\iauwp.exe
          "C:\Users\Admin\AppData\Local\Temp\iauwp.exe"
          4⤵
          • Executes dropped EXE
          • Accesses Microsoft Outlook profiles
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • outlook_office_path
          • outlook_win_path
          PID:1508
    • C:\Users\Admin\AppData\Local\icsys.icn.exe
      C:\Users\Admin\AppData\Local\icsys.icn.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:568
      • \??\c:\windows\system\explorer.exe
        c:\windows\system\explorer.exe
        3⤵
        • Modifies WinLogon for persistence
        • Modifies visiblity of hidden/system files in Explorer
        • Executes dropped EXE
        • Modifies Installed Components in the registry
        • Loads dropped DLL
        • Adds Run key to start application
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1764
        • \??\c:\windows\system\spoolsv.exe
          c:\windows\system\spoolsv.exe SE
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops file in Windows directory
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1568
          • \??\c:\windows\system\svchost.exe
            c:\windows\system\svchost.exe
            5⤵
            • Modifies WinLogon for persistence
            • Modifies visiblity of hidden/system files in Explorer
            • Executes dropped EXE
            • Modifies Installed Components in the registry
            • Loads dropped DLL
            • Adds Run key to start application
            • Drops file in Windows directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: GetForegroundWindowSpam
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:1652
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe PR
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetWindowsHookEx
              PID:796
            • C:\Windows\SysWOW64\at.exe
              at 18:04 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
              6⤵
                PID:1276
              • C:\Windows\SysWOW64\at.exe
                at 18:05 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
                6⤵
                  PID:1544
                • C:\Windows\SysWOW64\at.exe
                  at 18:06 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
                  6⤵
                    PID:1972

        Network

        MITRE ATT&CK Matrix ATT&CK v6

        Persistence

        Winlogon Helper DLL

        1
        T1004

        Hidden Files and Directories

        1
        T1158

        Registry Run Keys / Startup Folder

        2
        T1060

        Defense Evasion

        Modify Registry

        4
        T1112

        Hidden Files and Directories

        1
        T1158

        Credential Access

        Credentials in Files

        3
        T1081

        Discovery

        System Information Discovery

        1
        T1082

        Collection

        Data from Local System

        3
        T1005

        Email Collection

        1
        T1114

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\halkbank_ekstre_20230129_075423_612150o.pdf..exe 
          Filesize

          187KB

          MD5

          c742b622a88a10779fe1673d751dc622

          SHA1

          2e1de5d8dbe6ade1af87ce06c31172d8c0a9baa8

          SHA256

          480fb8507176e7ab166f14cdc41e7d2d887555a8327800e989a5b07ec4ac7a2b

          SHA512

          c639ad738805b21617169a34da91fbba7a2b3a296e87cde799c2bda0f169742e8842160dd2bb89da37cdecdd2b17713165e33383e9f92179f5df2624c9bb4e96

        • C:\Users\Admin\AppData\Local\Temp\iauwp.exe
          Filesize

          80KB

          MD5

          82d9274bf661ed3fdb3d7e7d66efb9ba

          SHA1

          5f98a0699b92d2db63e4baa3c71920561bc49838

          SHA256

          306c0a2b8efa7c76f69246bed00e98b1d8c012446abdf48f650d9d7343562c34

          SHA512

          caf704dc43e4976a15a0bccb3ac6a7501d07c6d3855b6b3a1c9a69e1a6e3402548d61119229cdb34526a574cb44b988ac409155e1e308cf87112590aa10228f3

        • C:\Users\Admin\AppData\Local\Temp\iauwp.exe
          Filesize

          80KB

          MD5

          82d9274bf661ed3fdb3d7e7d66efb9ba

          SHA1

          5f98a0699b92d2db63e4baa3c71920561bc49838

          SHA256

          306c0a2b8efa7c76f69246bed00e98b1d8c012446abdf48f650d9d7343562c34

          SHA512

          caf704dc43e4976a15a0bccb3ac6a7501d07c6d3855b6b3a1c9a69e1a6e3402548d61119229cdb34526a574cb44b988ac409155e1e308cf87112590aa10228f3

        • C:\Users\Admin\AppData\Local\Temp\iauwp.exe
          Filesize

          80KB

          MD5

          82d9274bf661ed3fdb3d7e7d66efb9ba

          SHA1

          5f98a0699b92d2db63e4baa3c71920561bc49838

          SHA256

          306c0a2b8efa7c76f69246bed00e98b1d8c012446abdf48f650d9d7343562c34

          SHA512

          caf704dc43e4976a15a0bccb3ac6a7501d07c6d3855b6b3a1c9a69e1a6e3402548d61119229cdb34526a574cb44b988ac409155e1e308cf87112590aa10228f3

        • C:\Users\Admin\AppData\Local\Temp\iqvpwdmb.c
          Filesize

          6KB

          MD5

          2dc8af96232838d201200a49b0efa632

          SHA1

          50bc216ff603fdfefbf0ab04ff7ffea362278eb7

          SHA256

          493f4e6b0acc7d4fe146d28857a37873ddaff27dba8b2491b4352db9a0eb9043

          SHA512

          972be1e52ce1f83f414cf3eee27887eb8ccc294f08ca628300236c0147735bdec3e75ed50c313eba20536e51e3485d303a0495ee8caae8dc548ecbc438ff818c

        • C:\Users\Admin\AppData\Local\Temp\robdkcso.dju
          Filesize

          104KB

          MD5

          c4a8e79b487d9f5076ba9235f17e7547

          SHA1

          1bf348776f2b90901abfaa9175a6effb4cd5954c

          SHA256

          b0fa484010127572ef9d688662423a027031012298d8da401597243fdcf54bd9

          SHA512

          d6543cae79e376e690225b3f0b1d3549c84d6c3eec2a8110186cc1e475640b0dd10b87421f8f40680f88210b4dd3d30a6b12c3398946c9245ab83e0848212d78

        • C:\Users\Admin\AppData\Local\icsys.icn.exe
          Filesize

          274KB

          MD5

          7bca1694aa035681f0ebd2b4f1ff1835

          SHA1

          c88a597f9beb5ce96708fa79ff1fd7d4a73b1582

          SHA256

          ee6f10c71ff99a3d2fea29a9992a8e30b8dd05acf7923d5072ecff6cad23d225

          SHA512

          aa934486b3b68041ffc09f87b65c548bda122966b58ae0f9d68bbbdbbb2d17c543e51a9545ad09eff30b65459e99446bb066d2ea556de27cc25206ea1b07d185

        • C:\Users\Admin\AppData\Roaming\mrsys.exe
          Filesize

          274KB

          MD5

          ded5e73780b89b7c4a420ce9b23a0ad5

          SHA1

          0140ae0390bbb0f267f8241835e731de689563c7

          SHA256

          003c9ed3b06babfac00e83e2cd75cb601884cc7b83f1663d52027af0c8e660b8

          SHA512

          0e63dc87e9bd0d3f61812cd0d9de4ae68bce9e6c0b501a231a0a3f872fa4fa81ee6a34661f967cb964327d45d3553924180dd96e7e2f1b235710dde901b90543

        • C:\Windows\system\explorer.exe
          Filesize

          274KB

          MD5

          e34f4a820a65916a22995b00aaadd861

          SHA1

          d9c228024982deea9820ebc3f84a1bfd83c384d5

          SHA256

          97836d9bdb20d85e9a6bdebf71dca846aa9ad9fd6927508b7922d0549c362d26

          SHA512

          a23a6b423fdeaa6ed6819f2e7cab242143f4af26372a867b8cdcb4ce48b0eaddec79fb0fa42e00a2946dc690582ce88e7d77d9bda33ab879389e71fc24d85cee

        • C:\Windows\system\spoolsv.exe
          Filesize

          274KB

          MD5

          9da1dd9c1e65cdbad9b80933c7ee4b0c

          SHA1

          84197207d1c11ae36576b149193da091b5d1630a

          SHA256

          d8c380a7ace3e54e81a9ace6fae1db6f20f8f54b86794956046f5b6e28320698

          SHA512

          0b2feb45f73f48946882d259f3e499a7988c8f5a3b19677803754376b1f48624fc705cad4a0a7ff1275d3f8ae7079400d03b5524fe75d4a84334ada86a891e1a

        • C:\Windows\system\spoolsv.exe
          Filesize

          274KB

          MD5

          9da1dd9c1e65cdbad9b80933c7ee4b0c

          SHA1

          84197207d1c11ae36576b149193da091b5d1630a

          SHA256

          d8c380a7ace3e54e81a9ace6fae1db6f20f8f54b86794956046f5b6e28320698

          SHA512

          0b2feb45f73f48946882d259f3e499a7988c8f5a3b19677803754376b1f48624fc705cad4a0a7ff1275d3f8ae7079400d03b5524fe75d4a84334ada86a891e1a

        • C:\Windows\system\svchost.exe
          Filesize

          274KB

          MD5

          a7f55a21c0c6a82fe67abf22a0e2e620

          SHA1

          3574286d5eef56265dcdb78bd6e49319d5801546

          SHA256

          46ce180f7ff11662e79b80fca00f1db241324b30acb58f5d4f1117749a48dcd8

          SHA512

          fd82cdbd7c13306a1de6ca5aceaccf4e5bb277b00893a74b48e8842ccaf5ef47e7d95b8430308860f322f90f4d0edcf9d075e401c5b910267cfad2f61a8ef3cc

        • \??\c:\users\admin\appdata\local\icsys.icn.exe
          Filesize

          274KB

          MD5

          7bca1694aa035681f0ebd2b4f1ff1835

          SHA1

          c88a597f9beb5ce96708fa79ff1fd7d4a73b1582

          SHA256

          ee6f10c71ff99a3d2fea29a9992a8e30b8dd05acf7923d5072ecff6cad23d225

          SHA512

          aa934486b3b68041ffc09f87b65c548bda122966b58ae0f9d68bbbdbbb2d17c543e51a9545ad09eff30b65459e99446bb066d2ea556de27cc25206ea1b07d185

        • \??\c:\users\admin\appdata\local\temp\halkbank_ekstre_20230129_075423_612150o.pdf..exe 
          Filesize

          187KB

          MD5

          c742b622a88a10779fe1673d751dc622

          SHA1

          2e1de5d8dbe6ade1af87ce06c31172d8c0a9baa8

          SHA256

          480fb8507176e7ab166f14cdc41e7d2d887555a8327800e989a5b07ec4ac7a2b

          SHA512

          c639ad738805b21617169a34da91fbba7a2b3a296e87cde799c2bda0f169742e8842160dd2bb89da37cdecdd2b17713165e33383e9f92179f5df2624c9bb4e96

        • \??\c:\windows\system\explorer.exe
          Filesize

          274KB

          MD5

          e34f4a820a65916a22995b00aaadd861

          SHA1

          d9c228024982deea9820ebc3f84a1bfd83c384d5

          SHA256

          97836d9bdb20d85e9a6bdebf71dca846aa9ad9fd6927508b7922d0549c362d26

          SHA512

          a23a6b423fdeaa6ed6819f2e7cab242143f4af26372a867b8cdcb4ce48b0eaddec79fb0fa42e00a2946dc690582ce88e7d77d9bda33ab879389e71fc24d85cee

        • \??\c:\windows\system\spoolsv.exe
          Filesize

          274KB

          MD5

          9da1dd9c1e65cdbad9b80933c7ee4b0c

          SHA1

          84197207d1c11ae36576b149193da091b5d1630a

          SHA256

          d8c380a7ace3e54e81a9ace6fae1db6f20f8f54b86794956046f5b6e28320698

          SHA512

          0b2feb45f73f48946882d259f3e499a7988c8f5a3b19677803754376b1f48624fc705cad4a0a7ff1275d3f8ae7079400d03b5524fe75d4a84334ada86a891e1a

        • \??\c:\windows\system\svchost.exe
          Filesize

          274KB

          MD5

          a7f55a21c0c6a82fe67abf22a0e2e620

          SHA1

          3574286d5eef56265dcdb78bd6e49319d5801546

          SHA256

          46ce180f7ff11662e79b80fca00f1db241324b30acb58f5d4f1117749a48dcd8

          SHA512

          fd82cdbd7c13306a1de6ca5aceaccf4e5bb277b00893a74b48e8842ccaf5ef47e7d95b8430308860f322f90f4d0edcf9d075e401c5b910267cfad2f61a8ef3cc

        • \Users\Admin\AppData\Local\Temp\halkbank_ekstre_20230129_075423_612150o.pdf..exe 
          Filesize

          187KB

          MD5

          c742b622a88a10779fe1673d751dc622

          SHA1

          2e1de5d8dbe6ade1af87ce06c31172d8c0a9baa8

          SHA256

          480fb8507176e7ab166f14cdc41e7d2d887555a8327800e989a5b07ec4ac7a2b

          SHA512

          c639ad738805b21617169a34da91fbba7a2b3a296e87cde799c2bda0f169742e8842160dd2bb89da37cdecdd2b17713165e33383e9f92179f5df2624c9bb4e96

        • \Users\Admin\AppData\Local\Temp\iauwp.exe
          Filesize

          80KB

          MD5

          82d9274bf661ed3fdb3d7e7d66efb9ba

          SHA1

          5f98a0699b92d2db63e4baa3c71920561bc49838

          SHA256

          306c0a2b8efa7c76f69246bed00e98b1d8c012446abdf48f650d9d7343562c34

          SHA512

          caf704dc43e4976a15a0bccb3ac6a7501d07c6d3855b6b3a1c9a69e1a6e3402548d61119229cdb34526a574cb44b988ac409155e1e308cf87112590aa10228f3

        • \Users\Admin\AppData\Local\Temp\iauwp.exe
          Filesize

          80KB

          MD5

          82d9274bf661ed3fdb3d7e7d66efb9ba

          SHA1

          5f98a0699b92d2db63e4baa3c71920561bc49838

          SHA256

          306c0a2b8efa7c76f69246bed00e98b1d8c012446abdf48f650d9d7343562c34

          SHA512

          caf704dc43e4976a15a0bccb3ac6a7501d07c6d3855b6b3a1c9a69e1a6e3402548d61119229cdb34526a574cb44b988ac409155e1e308cf87112590aa10228f3

        • \Users\Admin\AppData\Local\Temp\iauwp.exe
          Filesize

          80KB

          MD5

          82d9274bf661ed3fdb3d7e7d66efb9ba

          SHA1

          5f98a0699b92d2db63e4baa3c71920561bc49838

          SHA256

          306c0a2b8efa7c76f69246bed00e98b1d8c012446abdf48f650d9d7343562c34

          SHA512

          caf704dc43e4976a15a0bccb3ac6a7501d07c6d3855b6b3a1c9a69e1a6e3402548d61119229cdb34526a574cb44b988ac409155e1e308cf87112590aa10228f3

        • \Users\Admin\AppData\Local\icsys.icn.exe
          Filesize

          274KB

          MD5

          7bca1694aa035681f0ebd2b4f1ff1835

          SHA1

          c88a597f9beb5ce96708fa79ff1fd7d4a73b1582

          SHA256

          ee6f10c71ff99a3d2fea29a9992a8e30b8dd05acf7923d5072ecff6cad23d225

          SHA512

          aa934486b3b68041ffc09f87b65c548bda122966b58ae0f9d68bbbdbbb2d17c543e51a9545ad09eff30b65459e99446bb066d2ea556de27cc25206ea1b07d185

        • \Users\Admin\AppData\Local\icsys.icn.exe
          Filesize

          274KB

          MD5

          7bca1694aa035681f0ebd2b4f1ff1835

          SHA1

          c88a597f9beb5ce96708fa79ff1fd7d4a73b1582

          SHA256

          ee6f10c71ff99a3d2fea29a9992a8e30b8dd05acf7923d5072ecff6cad23d225

          SHA512

          aa934486b3b68041ffc09f87b65c548bda122966b58ae0f9d68bbbdbbb2d17c543e51a9545ad09eff30b65459e99446bb066d2ea556de27cc25206ea1b07d185

        • \Windows\system\explorer.exe
          Filesize

          274KB

          MD5

          e34f4a820a65916a22995b00aaadd861

          SHA1

          d9c228024982deea9820ebc3f84a1bfd83c384d5

          SHA256

          97836d9bdb20d85e9a6bdebf71dca846aa9ad9fd6927508b7922d0549c362d26

          SHA512

          a23a6b423fdeaa6ed6819f2e7cab242143f4af26372a867b8cdcb4ce48b0eaddec79fb0fa42e00a2946dc690582ce88e7d77d9bda33ab879389e71fc24d85cee

        • \Windows\system\explorer.exe
          Filesize

          274KB

          MD5

          e34f4a820a65916a22995b00aaadd861

          SHA1

          d9c228024982deea9820ebc3f84a1bfd83c384d5

          SHA256

          97836d9bdb20d85e9a6bdebf71dca846aa9ad9fd6927508b7922d0549c362d26

          SHA512

          a23a6b423fdeaa6ed6819f2e7cab242143f4af26372a867b8cdcb4ce48b0eaddec79fb0fa42e00a2946dc690582ce88e7d77d9bda33ab879389e71fc24d85cee

        • \Windows\system\spoolsv.exe
          Filesize

          274KB

          MD5

          9da1dd9c1e65cdbad9b80933c7ee4b0c

          SHA1

          84197207d1c11ae36576b149193da091b5d1630a

          SHA256

          d8c380a7ace3e54e81a9ace6fae1db6f20f8f54b86794956046f5b6e28320698

          SHA512

          0b2feb45f73f48946882d259f3e499a7988c8f5a3b19677803754376b1f48624fc705cad4a0a7ff1275d3f8ae7079400d03b5524fe75d4a84334ada86a891e1a

        • \Windows\system\spoolsv.exe
          Filesize

          274KB

          MD5

          9da1dd9c1e65cdbad9b80933c7ee4b0c

          SHA1

          84197207d1c11ae36576b149193da091b5d1630a

          SHA256

          d8c380a7ace3e54e81a9ace6fae1db6f20f8f54b86794956046f5b6e28320698

          SHA512

          0b2feb45f73f48946882d259f3e499a7988c8f5a3b19677803754376b1f48624fc705cad4a0a7ff1275d3f8ae7079400d03b5524fe75d4a84334ada86a891e1a

        • \Windows\system\spoolsv.exe
          Filesize

          274KB

          MD5

          9da1dd9c1e65cdbad9b80933c7ee4b0c

          SHA1

          84197207d1c11ae36576b149193da091b5d1630a

          SHA256

          d8c380a7ace3e54e81a9ace6fae1db6f20f8f54b86794956046f5b6e28320698

          SHA512

          0b2feb45f73f48946882d259f3e499a7988c8f5a3b19677803754376b1f48624fc705cad4a0a7ff1275d3f8ae7079400d03b5524fe75d4a84334ada86a891e1a

        • \Windows\system\spoolsv.exe
          Filesize

          274KB

          MD5

          9da1dd9c1e65cdbad9b80933c7ee4b0c

          SHA1

          84197207d1c11ae36576b149193da091b5d1630a

          SHA256

          d8c380a7ace3e54e81a9ace6fae1db6f20f8f54b86794956046f5b6e28320698

          SHA512

          0b2feb45f73f48946882d259f3e499a7988c8f5a3b19677803754376b1f48624fc705cad4a0a7ff1275d3f8ae7079400d03b5524fe75d4a84334ada86a891e1a

        • \Windows\system\svchost.exe
          Filesize

          274KB

          MD5

          a7f55a21c0c6a82fe67abf22a0e2e620

          SHA1

          3574286d5eef56265dcdb78bd6e49319d5801546

          SHA256

          46ce180f7ff11662e79b80fca00f1db241324b30acb58f5d4f1117749a48dcd8

          SHA512

          fd82cdbd7c13306a1de6ca5aceaccf4e5bb277b00893a74b48e8842ccaf5ef47e7d95b8430308860f322f90f4d0edcf9d075e401c5b910267cfad2f61a8ef3cc

        • \Windows\system\svchost.exe
          Filesize

          274KB

          MD5

          a7f55a21c0c6a82fe67abf22a0e2e620

          SHA1

          3574286d5eef56265dcdb78bd6e49319d5801546

          SHA256

          46ce180f7ff11662e79b80fca00f1db241324b30acb58f5d4f1117749a48dcd8

          SHA512

          fd82cdbd7c13306a1de6ca5aceaccf4e5bb277b00893a74b48e8842ccaf5ef47e7d95b8430308860f322f90f4d0edcf9d075e401c5b910267cfad2f61a8ef3cc

        • memory/520-66-0x0000000000000000-mapping.dmp
        • memory/568-126-0x0000000000400000-0x000000000043E000-memory.dmp
          Filesize

          248KB

        • memory/568-71-0x0000000000000000-mapping.dmp
        • memory/568-92-0x0000000000400000-0x000000000043E000-memory.dmp
          Filesize

          248KB

        • memory/796-124-0x0000000000400000-0x000000000043E000-memory.dmp
          Filesize

          248KB

        • memory/796-118-0x0000000000000000-mapping.dmp
        • memory/1108-60-0x0000000000000000-mapping.dmp
        • memory/1276-127-0x0000000000000000-mapping.dmp
        • memory/1280-57-0x0000000074FD1000-0x0000000074FD3000-memory.dmp
          Filesize

          8KB

        • memory/1280-59-0x0000000000400000-0x000000000043E000-memory.dmp
          Filesize

          248KB

        • memory/1280-87-0x00000000007B0000-0x00000000007EE000-memory.dmp
          Filesize

          248KB

        • memory/1280-125-0x0000000000400000-0x000000000043E000-memory.dmp
          Filesize

          248KB

        • memory/1280-89-0x00000000007B0000-0x00000000007EE000-memory.dmp
          Filesize

          248KB

        • memory/1508-131-0x0000000000400000-0x000000000043A000-memory.dmp
          Filesize

          232KB

        • memory/1508-123-0x0000000000440000-0x0000000000466000-memory.dmp
          Filesize

          152KB

        • memory/1508-102-0x0000000000438680-mapping.dmp
        • memory/1544-133-0x0000000000000000-mapping.dmp
        • memory/1568-91-0x0000000000000000-mapping.dmp
        • memory/1652-109-0x0000000000000000-mapping.dmp
        • memory/1652-132-0x0000000000400000-0x000000000043E000-memory.dmp
          Filesize

          248KB

        • memory/1764-96-0x0000000000400000-0x000000000043E000-memory.dmp
          Filesize

          248KB

        • memory/1764-80-0x0000000000000000-mapping.dmp
        • memory/1764-130-0x00000000026E0000-0x000000000271E000-memory.dmp
          Filesize

          248KB

        • memory/1764-137-0x0000000000400000-0x000000000043E000-memory.dmp
          Filesize

          248KB

        • memory/1764-138-0x00000000026E0000-0x000000000271E000-memory.dmp
          Filesize

          248KB

        • memory/1972-135-0x0000000000000000-mapping.dmp