Analysis
-
max time kernel
149s -
max time network
131s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
08-06-2023 12:57
Static task
static1
General
-
Target
694c763fe4bc19f7a362803ab8fadceec929ef3b2416889b8fcaee427134e9aa.exe
-
Size
4.2MB
-
MD5
46d5112c720eec82bdc6d7d51bd89953
-
SHA1
a499dac5694bdcdc44846b8aba778e1c353fa5ee
-
SHA256
694c763fe4bc19f7a362803ab8fadceec929ef3b2416889b8fcaee427134e9aa
-
SHA512
e2e8ecd7a36a8d7bb52a614cf41581f813dc0d21b2c3e9fac94cbbf8788b2e4fbf0bead205d8bf47ccf91d2f38e56eaa26ad41fcffbba7531df85a11c6f125ed
-
SSDEEP
98304:14Oukmwozu5N1sjvc6C5HzAFpDV4v2Gff887WFFSEVpe1l6UqT5uNl:Mxw0u5Xsj06C5HzAFtV4vjftWfSDTd4M
Malware Config
Signatures
-
Glupteba payload 16 IoCs
Processes:
resource yara_rule behavioral1/memory/2160-122-0x0000000005490000-0x0000000005D7B000-memory.dmp family_glupteba behavioral1/memory/2160-268-0x0000000000400000-0x00000000030DE000-memory.dmp family_glupteba behavioral1/memory/2160-416-0x0000000000400000-0x00000000030DE000-memory.dmp family_glupteba behavioral1/memory/1048-620-0x0000000000400000-0x00000000030DE000-memory.dmp family_glupteba behavioral1/memory/1048-791-0x0000000000400000-0x00000000030DE000-memory.dmp family_glupteba behavioral1/memory/1048-1142-0x0000000000400000-0x00000000030DE000-memory.dmp family_glupteba behavioral1/memory/1048-1152-0x0000000000400000-0x00000000030DE000-memory.dmp family_glupteba behavioral1/memory/32-1155-0x0000000005600000-0x0000000005EEB000-memory.dmp family_glupteba behavioral1/memory/32-1177-0x0000000000400000-0x00000000030DE000-memory.dmp family_glupteba behavioral1/memory/32-1505-0x0000000000400000-0x00000000030DE000-memory.dmp family_glupteba behavioral1/memory/32-1888-0x0000000000400000-0x00000000030DE000-memory.dmp family_glupteba behavioral1/memory/32-1898-0x0000000000400000-0x00000000030DE000-memory.dmp family_glupteba behavioral1/memory/32-1903-0x0000000000400000-0x00000000030DE000-memory.dmp family_glupteba behavioral1/memory/32-1905-0x0000000000400000-0x00000000030DE000-memory.dmp family_glupteba behavioral1/memory/32-1907-0x0000000000400000-0x00000000030DE000-memory.dmp family_glupteba behavioral1/memory/32-1916-0x0000000000400000-0x00000000030DE000-memory.dmp family_glupteba -
Processes:
694c763fe4bc19f7a362803ab8fadceec929ef3b2416889b8fcaee427134e9aa.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" 694c763fe4bc19f7a362803ab8fadceec929ef3b2416889b8fcaee427134e9aa.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\csrss.exe = "0" 694c763fe4bc19f7a362803ab8fadceec929ef3b2416889b8fcaee427134e9aa.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\windefender.exe = "0" 694c763fe4bc19f7a362803ab8fadceec929ef3b2416889b8fcaee427134e9aa.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\694c763fe4bc19f7a362803ab8fadceec929ef3b2416889b8fcaee427134e9aa.exe = "0" 694c763fe4bc19f7a362803ab8fadceec929ef3b2416889b8fcaee427134e9aa.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" 694c763fe4bc19f7a362803ab8fadceec929ef3b2416889b8fcaee427134e9aa.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" 694c763fe4bc19f7a362803ab8fadceec929ef3b2416889b8fcaee427134e9aa.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" 694c763fe4bc19f7a362803ab8fadceec929ef3b2416889b8fcaee427134e9aa.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
-
Executes dropped EXE 5 IoCs
Processes:
csrss.exeinjector.exewindefender.exewindefender.exef801950a962ddba14caaa44bf084b55c.exepid process 32 csrss.exe 4580 injector.exe 2904 windefender.exe 4848 windefender.exe 5092 f801950a962ddba14caaa44bf084b55c.exe -
Processes:
resource yara_rule C:\Windows\windefender.exe upx C:\Windows\windefender.exe upx behavioral1/memory/2904-1899-0x0000000000400000-0x00000000008DF000-memory.dmp upx C:\Windows\windefender.exe upx behavioral1/memory/4848-1901-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral1/memory/2904-1902-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral1/memory/4848-1904-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral1/memory/4848-1908-0x0000000000400000-0x00000000008DF000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\csrss\f801950a962ddba14caaa44bf084b55c.exe upx C:\Users\Admin\AppData\Local\Temp\csrss\f801950a962ddba14caaa44bf084b55c.exe upx behavioral1/memory/5092-1914-0x0000000000400000-0x0000000000C25000-memory.dmp upx behavioral1/memory/4848-1915-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral1/memory/5092-1917-0x0000000000400000-0x0000000000C25000-memory.dmp upx -
Processes:
694c763fe4bc19f7a362803ab8fadceec929ef3b2416889b8fcaee427134e9aa.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" 694c763fe4bc19f7a362803ab8fadceec929ef3b2416889b8fcaee427134e9aa.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" 694c763fe4bc19f7a362803ab8fadceec929ef3b2416889b8fcaee427134e9aa.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" 694c763fe4bc19f7a362803ab8fadceec929ef3b2416889b8fcaee427134e9aa.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" 694c763fe4bc19f7a362803ab8fadceec929ef3b2416889b8fcaee427134e9aa.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\csrss.exe = "0" 694c763fe4bc19f7a362803ab8fadceec929ef3b2416889b8fcaee427134e9aa.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\windefender.exe = "0" 694c763fe4bc19f7a362803ab8fadceec929ef3b2416889b8fcaee427134e9aa.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\694c763fe4bc19f7a362803ab8fadceec929ef3b2416889b8fcaee427134e9aa.exe = "0" 694c763fe4bc19f7a362803ab8fadceec929ef3b2416889b8fcaee427134e9aa.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
694c763fe4bc19f7a362803ab8fadceec929ef3b2416889b8fcaee427134e9aa.execsrss.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1311743041-1167936498-546579926-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 694c763fe4bc19f7a362803ab8fadceec929ef3b2416889b8fcaee427134e9aa.exe Set value (str) \REGISTRY\USER\S-1-5-21-1311743041-1167936498-546579926-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
Processes:
csrss.exedescription ioc process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 7 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exedescription ioc process File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
Processes:
694c763fe4bc19f7a362803ab8fadceec929ef3b2416889b8fcaee427134e9aa.exedescription ioc process File opened (read-only) \??\VBoxMiniRdrDN 694c763fe4bc19f7a362803ab8fadceec929ef3b2416889b8fcaee427134e9aa.exe -
Drops file in Windows directory 4 IoCs
Processes:
694c763fe4bc19f7a362803ab8fadceec929ef3b2416889b8fcaee427134e9aa.execsrss.exedescription ioc process File opened for modification C:\Windows\rss 694c763fe4bc19f7a362803ab8fadceec929ef3b2416889b8fcaee427134e9aa.exe File created C:\Windows\rss\csrss.exe 694c763fe4bc19f7a362803ab8fadceec929ef3b2416889b8fcaee427134e9aa.exe File created C:\Windows\windefender.exe csrss.exe File opened for modification C:\Windows\windefender.exe csrss.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 1292 sc.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 4932 schtasks.exe 1300 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
Processes:
powershell.exewindefender.exe694c763fe4bc19f7a362803ab8fadceec929ef3b2416889b8fcaee427134e9aa.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-2001 = "Cabo Verde Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2061 = "North Korea Daylight Time" 694c763fe4bc19f7a362803ab8fadceec929ef3b2416889b8fcaee427134e9aa.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-532 = "Sri Lanka Standard Time" 694c763fe4bc19f7a362803ab8fadceec929ef3b2416889b8fcaee427134e9aa.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-2061 = "North Korea Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-91 = "Pacific SA Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-451 = "Caucasus Daylight Time" 694c763fe4bc19f7a362803ab8fadceec929ef3b2416889b8fcaee427134e9aa.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-435 = "Georgian Standard Time" 694c763fe4bc19f7a362803ab8fadceec929ef3b2416889b8fcaee427134e9aa.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-502 = "Nepal Standard Time" 694c763fe4bc19f7a362803ab8fadceec929ef3b2416889b8fcaee427134e9aa.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-572 = "China Standard Time" 694c763fe4bc19f7a362803ab8fadceec929ef3b2416889b8fcaee427134e9aa.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2631 = "Norfolk Daylight Time" 694c763fe4bc19f7a362803ab8fadceec929ef3b2416889b8fcaee427134e9aa.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-792 = "SA Western Standard Time" 694c763fe4bc19f7a362803ab8fadceec929ef3b2416889b8fcaee427134e9aa.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-221 = "Alaskan Daylight Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-252 = "Dateline Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-262 = "GMT Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-2752 = "Tomsk Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-491 = "India Daylight Time" 694c763fe4bc19f7a362803ab8fadceec929ef3b2416889b8fcaee427134e9aa.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-911 = "Mauritius Daylight Time" 694c763fe4bc19f7a362803ab8fadceec929ef3b2416889b8fcaee427134e9aa.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-752 = "Tonga Standard Time" 694c763fe4bc19f7a362803ab8fadceec929ef3b2416889b8fcaee427134e9aa.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-441 = "Arabian Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-1721 = "Libya Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-2571 = "Turks and Caicos Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1021 = "Bangladesh Daylight Time" 694c763fe4bc19f7a362803ab8fadceec929ef3b2416889b8fcaee427134e9aa.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2532 = "Chatham Islands Standard Time" 694c763fe4bc19f7a362803ab8fadceec929ef3b2416889b8fcaee427134e9aa.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2042 = "Eastern Standard Time (Mexico)" 694c763fe4bc19f7a362803ab8fadceec929ef3b2416889b8fcaee427134e9aa.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-591 = "Malay Peninsula Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-532 = "Sri Lanka Standard Time" windefender.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-2392 = "Aleutian Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-104 = "Central Brazilian Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-911 = "Mauritius Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-792 = "SA Western Standard Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-2751 = "Tomsk Daylight Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-142 = "Canada Central Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-721 = "Central Pacific Daylight Time" 694c763fe4bc19f7a362803ab8fadceec929ef3b2416889b8fcaee427134e9aa.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-342 = "Egypt Standard Time" 694c763fe4bc19f7a362803ab8fadceec929ef3b2416889b8fcaee427134e9aa.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-212 = "Pacific Standard Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-2002 = "Cabo Verde Standard Time" windefender.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
powershell.exe694c763fe4bc19f7a362803ab8fadceec929ef3b2416889b8fcaee427134e9aa.exepowershell.exe694c763fe4bc19f7a362803ab8fadceec929ef3b2416889b8fcaee427134e9aa.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exeinjector.execsrss.exepid process 3180 powershell.exe 3180 powershell.exe 3180 powershell.exe 2160 694c763fe4bc19f7a362803ab8fadceec929ef3b2416889b8fcaee427134e9aa.exe 2160 694c763fe4bc19f7a362803ab8fadceec929ef3b2416889b8fcaee427134e9aa.exe 2176 powershell.exe 2176 powershell.exe 2176 powershell.exe 1048 694c763fe4bc19f7a362803ab8fadceec929ef3b2416889b8fcaee427134e9aa.exe 1048 694c763fe4bc19f7a362803ab8fadceec929ef3b2416889b8fcaee427134e9aa.exe 1048 694c763fe4bc19f7a362803ab8fadceec929ef3b2416889b8fcaee427134e9aa.exe 1048 694c763fe4bc19f7a362803ab8fadceec929ef3b2416889b8fcaee427134e9aa.exe 1048 694c763fe4bc19f7a362803ab8fadceec929ef3b2416889b8fcaee427134e9aa.exe 1048 694c763fe4bc19f7a362803ab8fadceec929ef3b2416889b8fcaee427134e9aa.exe 1048 694c763fe4bc19f7a362803ab8fadceec929ef3b2416889b8fcaee427134e9aa.exe 1048 694c763fe4bc19f7a362803ab8fadceec929ef3b2416889b8fcaee427134e9aa.exe 1048 694c763fe4bc19f7a362803ab8fadceec929ef3b2416889b8fcaee427134e9aa.exe 1048 694c763fe4bc19f7a362803ab8fadceec929ef3b2416889b8fcaee427134e9aa.exe 5092 powershell.exe 5092 powershell.exe 5092 powershell.exe 4952 powershell.exe 4952 powershell.exe 4952 powershell.exe 1856 powershell.exe 1856 powershell.exe 1856 powershell.exe 4900 powershell.exe 4900 powershell.exe 4900 powershell.exe 4748 powershell.exe 4748 powershell.exe 4748 powershell.exe 4580 injector.exe 4580 injector.exe 4580 injector.exe 4580 injector.exe 4580 injector.exe 4580 injector.exe 4580 injector.exe 4580 injector.exe 32 csrss.exe 32 csrss.exe 4580 injector.exe 4580 injector.exe 4580 injector.exe 4580 injector.exe 4580 injector.exe 4580 injector.exe 32 csrss.exe 32 csrss.exe 4580 injector.exe 4580 injector.exe 32 csrss.exe 32 csrss.exe 4580 injector.exe 4580 injector.exe 4580 injector.exe 4580 injector.exe 4580 injector.exe 4580 injector.exe 4580 injector.exe 4580 injector.exe 4580 injector.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
Processes:
powershell.exe694c763fe4bc19f7a362803ab8fadceec929ef3b2416889b8fcaee427134e9aa.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.execsrss.exesc.exedescription pid process Token: SeDebugPrivilege 3180 powershell.exe Token: SeDebugPrivilege 2160 694c763fe4bc19f7a362803ab8fadceec929ef3b2416889b8fcaee427134e9aa.exe Token: SeImpersonatePrivilege 2160 694c763fe4bc19f7a362803ab8fadceec929ef3b2416889b8fcaee427134e9aa.exe Token: SeDebugPrivilege 2176 powershell.exe Token: SeDebugPrivilege 5092 powershell.exe Token: SeDebugPrivilege 4952 powershell.exe Token: SeDebugPrivilege 1856 powershell.exe Token: SeDebugPrivilege 4900 powershell.exe Token: SeDebugPrivilege 4748 powershell.exe Token: SeSystemEnvironmentPrivilege 32 csrss.exe Token: SeSecurityPrivilege 1292 sc.exe Token: SeSecurityPrivilege 1292 sc.exe -
Suspicious use of WriteProcessMemory 39 IoCs
Processes:
694c763fe4bc19f7a362803ab8fadceec929ef3b2416889b8fcaee427134e9aa.exe694c763fe4bc19f7a362803ab8fadceec929ef3b2416889b8fcaee427134e9aa.execmd.execsrss.exewindefender.execmd.exedescription pid process target process PID 2160 wrote to memory of 3180 2160 694c763fe4bc19f7a362803ab8fadceec929ef3b2416889b8fcaee427134e9aa.exe powershell.exe PID 2160 wrote to memory of 3180 2160 694c763fe4bc19f7a362803ab8fadceec929ef3b2416889b8fcaee427134e9aa.exe powershell.exe PID 2160 wrote to memory of 3180 2160 694c763fe4bc19f7a362803ab8fadceec929ef3b2416889b8fcaee427134e9aa.exe powershell.exe PID 1048 wrote to memory of 2176 1048 694c763fe4bc19f7a362803ab8fadceec929ef3b2416889b8fcaee427134e9aa.exe powershell.exe PID 1048 wrote to memory of 2176 1048 694c763fe4bc19f7a362803ab8fadceec929ef3b2416889b8fcaee427134e9aa.exe powershell.exe PID 1048 wrote to memory of 2176 1048 694c763fe4bc19f7a362803ab8fadceec929ef3b2416889b8fcaee427134e9aa.exe powershell.exe PID 1048 wrote to memory of 4280 1048 694c763fe4bc19f7a362803ab8fadceec929ef3b2416889b8fcaee427134e9aa.exe cmd.exe PID 1048 wrote to memory of 4280 1048 694c763fe4bc19f7a362803ab8fadceec929ef3b2416889b8fcaee427134e9aa.exe cmd.exe PID 4280 wrote to memory of 980 4280 cmd.exe netsh.exe PID 4280 wrote to memory of 980 4280 cmd.exe netsh.exe PID 1048 wrote to memory of 5092 1048 694c763fe4bc19f7a362803ab8fadceec929ef3b2416889b8fcaee427134e9aa.exe powershell.exe PID 1048 wrote to memory of 5092 1048 694c763fe4bc19f7a362803ab8fadceec929ef3b2416889b8fcaee427134e9aa.exe powershell.exe PID 1048 wrote to memory of 5092 1048 694c763fe4bc19f7a362803ab8fadceec929ef3b2416889b8fcaee427134e9aa.exe powershell.exe PID 1048 wrote to memory of 4952 1048 694c763fe4bc19f7a362803ab8fadceec929ef3b2416889b8fcaee427134e9aa.exe powershell.exe PID 1048 wrote to memory of 4952 1048 694c763fe4bc19f7a362803ab8fadceec929ef3b2416889b8fcaee427134e9aa.exe powershell.exe PID 1048 wrote to memory of 4952 1048 694c763fe4bc19f7a362803ab8fadceec929ef3b2416889b8fcaee427134e9aa.exe powershell.exe PID 1048 wrote to memory of 32 1048 694c763fe4bc19f7a362803ab8fadceec929ef3b2416889b8fcaee427134e9aa.exe csrss.exe PID 1048 wrote to memory of 32 1048 694c763fe4bc19f7a362803ab8fadceec929ef3b2416889b8fcaee427134e9aa.exe csrss.exe PID 1048 wrote to memory of 32 1048 694c763fe4bc19f7a362803ab8fadceec929ef3b2416889b8fcaee427134e9aa.exe csrss.exe PID 32 wrote to memory of 1856 32 csrss.exe powershell.exe PID 32 wrote to memory of 1856 32 csrss.exe powershell.exe PID 32 wrote to memory of 1856 32 csrss.exe powershell.exe PID 32 wrote to memory of 4900 32 csrss.exe powershell.exe PID 32 wrote to memory of 4900 32 csrss.exe powershell.exe PID 32 wrote to memory of 4900 32 csrss.exe powershell.exe PID 32 wrote to memory of 4748 32 csrss.exe powershell.exe PID 32 wrote to memory of 4748 32 csrss.exe powershell.exe PID 32 wrote to memory of 4748 32 csrss.exe powershell.exe PID 32 wrote to memory of 4580 32 csrss.exe injector.exe PID 32 wrote to memory of 4580 32 csrss.exe injector.exe PID 2904 wrote to memory of 4012 2904 windefender.exe cmd.exe PID 2904 wrote to memory of 4012 2904 windefender.exe cmd.exe PID 2904 wrote to memory of 4012 2904 windefender.exe cmd.exe PID 4012 wrote to memory of 1292 4012 cmd.exe sc.exe PID 4012 wrote to memory of 1292 4012 cmd.exe sc.exe PID 4012 wrote to memory of 1292 4012 cmd.exe sc.exe PID 32 wrote to memory of 5092 32 csrss.exe f801950a962ddba14caaa44bf084b55c.exe PID 32 wrote to memory of 5092 32 csrss.exe f801950a962ddba14caaa44bf084b55c.exe PID 32 wrote to memory of 5092 32 csrss.exe f801950a962ddba14caaa44bf084b55c.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\694c763fe4bc19f7a362803ab8fadceec929ef3b2416889b8fcaee427134e9aa.exe"C:\Users\Admin\AppData\Local\Temp\694c763fe4bc19f7a362803ab8fadceec929ef3b2416889b8fcaee427134e9aa.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\694c763fe4bc19f7a362803ab8fadceec929ef3b2416889b8fcaee427134e9aa.exe"C:\Users\Admin\AppData\Local\Temp\694c763fe4bc19f7a362803ab8fadceec929ef3b2416889b8fcaee427134e9aa.exe"2⤵
- Windows security bypass
- Windows security modification
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f4⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)5⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)6⤵
- Launches sc.exe
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\csrss\f801950a962ddba14caaa44bf084b55c.exeC:\Users\Admin\AppData\Local\Temp\csrss\f801950a962ddba14caaa44bf084b55c.exe4⤵
- Executes dropped EXE
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_lznyksks.brf.ps1Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
C:\Users\Admin\AppData\Local\Temp\csrss\f801950a962ddba14caaa44bf084b55c.exeFilesize
3.2MB
MD5f801950a962ddba14caaa44bf084b55c
SHA17cadc9076121297428442785536ba0df2d4ae996
SHA256c3946ec89e15b24b743c46f9acacb58cff47da63f3ce2799d71ed90496b8891f
SHA5124183bc76bdc84fb779e2e573d9a63d7de47096b63b945f9e335bee95ae28eb208f5ee15f6501ac59623b97c5b77f3455ca313512e7d9803e1704ae22a52459c5
-
C:\Users\Admin\AppData\Local\Temp\csrss\f801950a962ddba14caaa44bf084b55c.exeFilesize
3.2MB
MD5f801950a962ddba14caaa44bf084b55c
SHA17cadc9076121297428442785536ba0df2d4ae996
SHA256c3946ec89e15b24b743c46f9acacb58cff47da63f3ce2799d71ed90496b8891f
SHA5124183bc76bdc84fb779e2e573d9a63d7de47096b63b945f9e335bee95ae28eb208f5ee15f6501ac59623b97c5b77f3455ca313512e7d9803e1704ae22a52459c5
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeFilesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeFilesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.logFilesize
2KB
MD51c19c16e21c97ed42d5beabc93391fc5
SHA18ad83f8e0b3acf8dfbbf87931e41f0d664c4df68
SHA2561bcd97396c83babfe6c5068ba590d7a3f8b70e72955a9d1e4070648e404cbf05
SHA5127d18776d8f649b3d29c182ff03efc6cea8b527542ee55304980f24577aae8b64e37044407776e220984346c3998ace5f8853afa58c8b38407482a728e9495e0c
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-InteractiveFilesize
18KB
MD5981378eef32ab949fdf6278f33cd9782
SHA12c8723dd5b88ea14c0d48d725e7562e14202ac57
SHA256b5969219f6d12c29de7e688dd945b9b936eb83fbc2e7e4eec4ca9b3bde53d146
SHA5123c856eaa016fef8cee84ee8bda44487793442c31b5d98295d40d5c59048149ecfc61143770f26115b9207b294853d777eed311e335821d5de56a0534ca483bf8
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-InteractiveFilesize
18KB
MD521a301d136087d6133ca495971f9a033
SHA19c032ffe2722c71f99a6e3fd753880e5e099635e
SHA2561c339a954d5f28ce6137552b5b7f1444beffdc7a4b2b741a444c065f9d3e2d9f
SHA512e130dce80e215342f154ca1b2514c0054f31cf70afe438be8e7dc0595a3b95b108153712697521a6f65f6d0342c5cfc20f2c9dad12490727b8435b9c632e9fdd
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-InteractiveFilesize
18KB
MD5f0ac9e0871aea073602eb67aa13c84eb
SHA1eefe0731d187489facdb6bd9c2a01973f73f13a4
SHA2561b7f74bd4f11e4f42ab20d212f0690ec2656fa10a687cb3fbe2af38877ae78c8
SHA512d3d93a5fd416f41835c6cb7a953a0b6d86612c72dbffa38e40a9e3089fb225741db0fec81508a4c5be3139167787046b6155ebcb6dc65469a774bf3648ae086a
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-InteractiveFilesize
18KB
MD5fdc701cca1d0a0e1ff4b23e011b348ca
SHA1fa1759b4d89dce8a7b4d423f69fa943c48fb46e9
SHA256d4eb653265e0d03ec8963a224c243d86c3d9fdbae1374ff74391f89919747e9c
SHA512ed698844d4050b6b5bf52ea1a3267c12f0573207fd9918b8ef7e781c06d41983fd23aecd197f13333488f6d7b6fb9b2d1b880da38ebdce8a0244c571e792b9cb
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-InteractiveFilesize
18KB
MD59188a62952bd6f03aa9e4c60b27c1e81
SHA1a5ff8440a6f2c24aa31c9c586f3886f206b53298
SHA2560b4aaaf627c42c79f13f1d66861482c19ee5388f79b9a0b145a85d2a79899f74
SHA5123e8aa5b43752be5fd70bd580da330d86f0dee840b7980e8764f105589725b57b576f4cfb20396abe7eca660df7c904b635640aca540a1ff6b30758b55715667b
-
C:\Windows\rss\csrss.exeFilesize
4.2MB
MD546d5112c720eec82bdc6d7d51bd89953
SHA1a499dac5694bdcdc44846b8aba778e1c353fa5ee
SHA256694c763fe4bc19f7a362803ab8fadceec929ef3b2416889b8fcaee427134e9aa
SHA512e2e8ecd7a36a8d7bb52a614cf41581f813dc0d21b2c3e9fac94cbbf8788b2e4fbf0bead205d8bf47ccf91d2f38e56eaa26ad41fcffbba7531df85a11c6f125ed
-
C:\Windows\rss\csrss.exeFilesize
4.2MB
MD546d5112c720eec82bdc6d7d51bd89953
SHA1a499dac5694bdcdc44846b8aba778e1c353fa5ee
SHA256694c763fe4bc19f7a362803ab8fadceec929ef3b2416889b8fcaee427134e9aa
SHA512e2e8ecd7a36a8d7bb52a614cf41581f813dc0d21b2c3e9fac94cbbf8788b2e4fbf0bead205d8bf47ccf91d2f38e56eaa26ad41fcffbba7531df85a11c6f125ed
-
C:\Windows\windefender.exeFilesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec
-
C:\Windows\windefender.exeFilesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec
-
C:\Windows\windefender.exeFilesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec
-
memory/32-1903-0x0000000000400000-0x00000000030DE000-memory.dmpFilesize
44.9MB
-
memory/32-1888-0x0000000000400000-0x00000000030DE000-memory.dmpFilesize
44.9MB
-
memory/32-1898-0x0000000000400000-0x00000000030DE000-memory.dmpFilesize
44.9MB
-
memory/32-1505-0x0000000000400000-0x00000000030DE000-memory.dmpFilesize
44.9MB
-
memory/32-1905-0x0000000000400000-0x00000000030DE000-memory.dmpFilesize
44.9MB
-
memory/32-1177-0x0000000000400000-0x00000000030DE000-memory.dmpFilesize
44.9MB
-
memory/32-1155-0x0000000005600000-0x0000000005EEB000-memory.dmpFilesize
8.9MB
-
memory/32-1907-0x0000000000400000-0x00000000030DE000-memory.dmpFilesize
44.9MB
-
memory/32-1916-0x0000000000400000-0x00000000030DE000-memory.dmpFilesize
44.9MB
-
memory/1048-1142-0x0000000000400000-0x00000000030DE000-memory.dmpFilesize
44.9MB
-
memory/1048-791-0x0000000000400000-0x00000000030DE000-memory.dmpFilesize
44.9MB
-
memory/1048-620-0x0000000000400000-0x00000000030DE000-memory.dmpFilesize
44.9MB
-
memory/1048-1152-0x0000000000400000-0x00000000030DE000-memory.dmpFilesize
44.9MB
-
memory/1856-1191-0x000000007EAA0000-0x000000007EAB0000-memory.dmpFilesize
64KB
-
memory/1856-1158-0x00000000082C0000-0x0000000008610000-memory.dmpFilesize
3.3MB
-
memory/1856-1160-0x0000000007230000-0x0000000007240000-memory.dmpFilesize
64KB
-
memory/1856-1162-0x0000000007230000-0x0000000007240000-memory.dmpFilesize
64KB
-
memory/1856-1161-0x00000000086F0000-0x000000000873B000-memory.dmpFilesize
300KB
-
memory/1856-1186-0x0000000009B60000-0x0000000009C05000-memory.dmpFilesize
660KB
-
memory/1856-1193-0x0000000007230000-0x0000000007240000-memory.dmpFilesize
64KB
-
memory/2160-122-0x0000000005490000-0x0000000005D7B000-memory.dmpFilesize
8.9MB
-
memory/2160-416-0x0000000000400000-0x00000000030DE000-memory.dmpFilesize
44.9MB
-
memory/2160-268-0x0000000000400000-0x00000000030DE000-memory.dmpFilesize
44.9MB
-
memory/2176-421-0x00000000081B0000-0x0000000008500000-memory.dmpFilesize
3.3MB
-
memory/2176-517-0x00000000073D0000-0x00000000073E0000-memory.dmpFilesize
64KB
-
memory/2176-422-0x00000000073D0000-0x00000000073E0000-memory.dmpFilesize
64KB
-
memory/2176-423-0x00000000073D0000-0x00000000073E0000-memory.dmpFilesize
64KB
-
memory/2176-424-0x0000000008880000-0x00000000088CB000-memory.dmpFilesize
300KB
-
memory/2176-443-0x000000007E560000-0x000000007E570000-memory.dmpFilesize
64KB
-
memory/2176-448-0x0000000009BD0000-0x0000000009C75000-memory.dmpFilesize
660KB
-
memory/2904-1902-0x0000000000400000-0x00000000008DF000-memory.dmpFilesize
4.9MB
-
memory/2904-1899-0x0000000000400000-0x00000000008DF000-memory.dmpFilesize
4.9MB
-
memory/3180-196-0x000000000A070000-0x000000000A115000-memory.dmpFilesize
660KB
-
memory/3180-191-0x000000000A010000-0x000000000A02E000-memory.dmpFilesize
120KB
-
memory/3180-125-0x0000000004BE0000-0x0000000004C16000-memory.dmpFilesize
216KB
-
memory/3180-126-0x0000000004C50000-0x0000000004C60000-memory.dmpFilesize
64KB
-
memory/3180-127-0x00000000073C0000-0x00000000079E8000-memory.dmpFilesize
6.2MB
-
memory/3180-128-0x0000000007210000-0x0000000007232000-memory.dmpFilesize
136KB
-
memory/3180-398-0x0000000006F50000-0x0000000006F58000-memory.dmpFilesize
32KB
-
memory/3180-393-0x0000000008440000-0x000000000845A000-memory.dmpFilesize
104KB
-
memory/3180-205-0x000000007F5B0000-0x000000007F5C0000-memory.dmpFilesize
64KB
-
memory/3180-129-0x00000000079F0000-0x0000000007A56000-memory.dmpFilesize
408KB
-
memory/3180-207-0x0000000004C50000-0x0000000004C60000-memory.dmpFilesize
64KB
-
memory/3180-130-0x0000000007A60000-0x0000000007AC6000-memory.dmpFilesize
408KB
-
memory/3180-131-0x0000000007DD0000-0x0000000008120000-memory.dmpFilesize
3.3MB
-
memory/3180-132-0x0000000007D40000-0x0000000007D5C000-memory.dmpFilesize
112KB
-
memory/3180-133-0x0000000008510000-0x000000000855B000-memory.dmpFilesize
300KB
-
memory/3180-152-0x0000000008560000-0x000000000859C000-memory.dmpFilesize
240KB
-
memory/3180-183-0x0000000009200000-0x0000000009276000-memory.dmpFilesize
472KB
-
memory/3180-197-0x000000000A250000-0x000000000A2E4000-memory.dmpFilesize
592KB
-
memory/3180-190-0x000000000A030000-0x000000000A063000-memory.dmpFilesize
204KB
-
memory/4748-1740-0x000000007F7F0000-0x000000007F800000-memory.dmpFilesize
64KB
-
memory/4748-1648-0x0000000007DC0000-0x0000000008110000-memory.dmpFilesize
3.3MB
-
memory/4748-1651-0x0000000004DA0000-0x0000000004DB0000-memory.dmpFilesize
64KB
-
memory/4748-1743-0x0000000004DA0000-0x0000000004DB0000-memory.dmpFilesize
64KB
-
memory/4748-1650-0x0000000004DA0000-0x0000000004DB0000-memory.dmpFilesize
64KB
-
memory/4848-1908-0x0000000000400000-0x00000000008DF000-memory.dmpFilesize
4.9MB
-
memory/4848-1904-0x0000000000400000-0x00000000008DF000-memory.dmpFilesize
4.9MB
-
memory/4848-1915-0x0000000000400000-0x00000000008DF000-memory.dmpFilesize
4.9MB
-
memory/4848-1901-0x0000000000400000-0x00000000008DF000-memory.dmpFilesize
4.9MB
-
memory/4900-1474-0x000000007F3F0000-0x000000007F400000-memory.dmpFilesize
64KB
-
memory/4900-1476-0x0000000004520000-0x0000000004530000-memory.dmpFilesize
64KB
-
memory/4900-1430-0x0000000008F00000-0x0000000008FA5000-memory.dmpFilesize
660KB
-
memory/4900-1407-0x0000000004520000-0x0000000004530000-memory.dmpFilesize
64KB
-
memory/4900-1405-0x0000000007A30000-0x0000000007A7B000-memory.dmpFilesize
300KB
-
memory/4900-1403-0x00000000075A0000-0x00000000078F0000-memory.dmpFilesize
3.3MB
-
memory/4900-1406-0x0000000004520000-0x0000000004530000-memory.dmpFilesize
64KB
-
memory/4952-934-0x000000007EB90000-0x000000007EBA0000-memory.dmpFilesize
64KB
-
memory/4952-935-0x0000000004E10000-0x0000000004E20000-memory.dmpFilesize
64KB
-
memory/4952-910-0x0000000004E10000-0x0000000004E20000-memory.dmpFilesize
64KB
-
memory/4952-911-0x0000000004E10000-0x0000000004E20000-memory.dmpFilesize
64KB
-
memory/5092-667-0x0000000004940000-0x0000000004950000-memory.dmpFilesize
64KB
-
memory/5092-761-0x0000000004940000-0x0000000004950000-memory.dmpFilesize
64KB
-
memory/5092-760-0x000000007ED70000-0x000000007ED80000-memory.dmpFilesize
64KB
-
memory/5092-1914-0x0000000000400000-0x0000000000C25000-memory.dmpFilesize
8.1MB
-
memory/5092-668-0x0000000004940000-0x0000000004950000-memory.dmpFilesize
64KB
-
memory/5092-1917-0x0000000000400000-0x0000000000C25000-memory.dmpFilesize
8.1MB