Analysis

  • max time kernel
    149s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231020-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/11/2023, 20:44

General

  • Target

    tmp.exe

  • Size

    6.4MB

  • MD5

    faa78f58b4f091f8c56ea622d8576703

  • SHA1

    2bd05e7cf298f79bc7408f400e2f2fd37fc8bdf1

  • SHA256

    464c7ab944886103d617e334c94320344761a543de5395c6b541ae386b448ea0

  • SHA512

    3037aef0866b9957fd9f56691baa0e6557a9f46cd3695016dc3c829fc270393360b05e39fba19dc10cac06c2f51998716b3c15c57c3f0afe8c11b2a3709d467b

  • SSDEEP

    196608:AR4ERFw+DIaY5cI1CmjxOSdKk7lpv3/4AkRKM:ARxR9Y5cI1CmVtVpvgL

Malware Config

Signatures

  • Glupteba

    Glupteba is a modular loader written in Golang with various components.

  • Glupteba payload 20 IoCs
  • Modifies Windows Firewall 1 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 9 IoCs
  • UPX packed file 11 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Manipulates WinMonFS driver. 1 IoCs

    Roottkits write to WinMonFS to hide directories/files from being detected.

  • Drops file in System32 directory 8 IoCs
  • Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs

    Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.

  • Drops file in Windows directory 4 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 13 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 51 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\tmp.exe
    "C:\Users\Admin\AppData\Local\Temp\tmp.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4464
    • C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe
      "C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4036
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -nologo -noprofile
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2232
      • C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe
        "C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe"
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Checks for VirtualBox DLLs, possible anti-VM trick
        • Drops file in Windows directory
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:4268
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell -nologo -noprofile
          4⤵
          • Drops file in System32 directory
          • Modifies data under HKEY_USERS
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3796
        • C:\Windows\system32\cmd.exe
          C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2216
          • C:\Windows\system32\netsh.exe
            netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
            5⤵
            • Modifies Windows Firewall
            PID:4104
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell -nologo -noprofile
          4⤵
          • Drops file in System32 directory
          • Modifies data under HKEY_USERS
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2028
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell -nologo -noprofile
          4⤵
          • Drops file in System32 directory
          • Modifies data under HKEY_USERS
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2172
        • C:\Windows\rss\csrss.exe
          C:\Windows\rss\csrss.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Manipulates WinMonFS driver.
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:3008
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell -nologo -noprofile
            5⤵
            • Drops file in System32 directory
            • Modifies data under HKEY_USERS
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2444
          • C:\Windows\SYSTEM32\schtasks.exe
            schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
            5⤵
            • Creates scheduled task(s)
            PID:4152
          • C:\Windows\SYSTEM32\schtasks.exe
            schtasks /delete /tn ScheduledUpdate /f
            5⤵
              PID:4848
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              powershell -nologo -noprofile
              5⤵
              • Drops file in System32 directory
              • Modifies data under HKEY_USERS
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:4044
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              powershell -nologo -noprofile
              5⤵
              • Drops file in System32 directory
              • Modifies data under HKEY_USERS
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:3292
            • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
              C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll
              5⤵
              • Executes dropped EXE
              • Suspicious behavior: EnumeratesProcesses
              PID:3108
            • C:\Windows\SYSTEM32\schtasks.exe
              schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
              5⤵
              • Creates scheduled task(s)
              PID:3876
            • C:\Windows\windefender.exe
              "C:\Windows\windefender.exe"
              5⤵
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:3016
              • C:\Windows\SysWOW64\cmd.exe
                cmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
                6⤵
                • Suspicious use of WriteProcessMemory
                PID:1732
                • C:\Windows\SysWOW64\sc.exe
                  sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
                  7⤵
                  • Launches sc.exe
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2088
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              powershell -nologo -noprofile
              5⤵
              • Drops file in System32 directory
              • Modifies data under HKEY_USERS
              • Suspicious use of AdjustPrivilegeToken
              PID:4836
            • C:\Users\Admin\AppData\Local\Temp\csrss\f801950a962ddba14caaa44bf084b55c.exe
              C:\Users\Admin\AppData\Local\Temp\csrss\f801950a962ddba14caaa44bf084b55c.exe
              5⤵
              • Executes dropped EXE
              PID:2684
              • C:\Windows\SYSTEM32\schtasks.exe
                schtasks /delete /tn "csrss" /f
                6⤵
                  PID:1728
                • C:\Windows\SYSTEM32\schtasks.exe
                  schtasks /delete /tn "ScheduledUpdate" /f
                  6⤵
                    PID:3276
          • C:\Users\Admin\AppData\Local\Temp\InstallSetup8.exe
            "C:\Users\Admin\AppData\Local\Temp\InstallSetup8.exe"
            2⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:3360
            • C:\Users\Admin\AppData\Local\Temp\Broom.exe
              C:\Users\Admin\AppData\Local\Temp\Broom.exe
              3⤵
              • Executes dropped EXE
              • Suspicious use of SetWindowsHookEx
              PID:4672
        • C:\Windows\windefender.exe
          C:\Windows\windefender.exe
          1⤵
          • Executes dropped EXE
          • Modifies data under HKEY_USERS
          PID:1020

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe

          Filesize

          4.2MB

          MD5

          890bfdf3c7eecbb505c0fdc415f466b3

          SHA1

          90889e27be89519f23d85915956d989b75793c8d

          SHA256

          e617e19dce9f15496c331be6daf2006a03573d50e42b34f2ae9ee4aee2bc8c72

          SHA512

          e08f327a03ede89a8e8df0a50244458095ed8afd132be8f21323cb81cfe5fb09d18266d0f5186dfd12d48649ffbb2dd1c8ec35951702f2b99adb1075fd776ece

        • C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe

          Filesize

          4.2MB

          MD5

          890bfdf3c7eecbb505c0fdc415f466b3

          SHA1

          90889e27be89519f23d85915956d989b75793c8d

          SHA256

          e617e19dce9f15496c331be6daf2006a03573d50e42b34f2ae9ee4aee2bc8c72

          SHA512

          e08f327a03ede89a8e8df0a50244458095ed8afd132be8f21323cb81cfe5fb09d18266d0f5186dfd12d48649ffbb2dd1c8ec35951702f2b99adb1075fd776ece

        • C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe

          Filesize

          4.2MB

          MD5

          890bfdf3c7eecbb505c0fdc415f466b3

          SHA1

          90889e27be89519f23d85915956d989b75793c8d

          SHA256

          e617e19dce9f15496c331be6daf2006a03573d50e42b34f2ae9ee4aee2bc8c72

          SHA512

          e08f327a03ede89a8e8df0a50244458095ed8afd132be8f21323cb81cfe5fb09d18266d0f5186dfd12d48649ffbb2dd1c8ec35951702f2b99adb1075fd776ece

        • C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe

          Filesize

          4.2MB

          MD5

          890bfdf3c7eecbb505c0fdc415f466b3

          SHA1

          90889e27be89519f23d85915956d989b75793c8d

          SHA256

          e617e19dce9f15496c331be6daf2006a03573d50e42b34f2ae9ee4aee2bc8c72

          SHA512

          e08f327a03ede89a8e8df0a50244458095ed8afd132be8f21323cb81cfe5fb09d18266d0f5186dfd12d48649ffbb2dd1c8ec35951702f2b99adb1075fd776ece

        • C:\Users\Admin\AppData\Local\Temp\Broom.exe

          Filesize

          5.3MB

          MD5

          00e93456aa5bcf9f60f84b0c0760a212

          SHA1

          6096890893116e75bd46fea0b8c3921ceb33f57d

          SHA256

          ff3025f9cf19323c5972d14f00f01296d6d7a71547eca7e4016bfd0e1f27b504

          SHA512

          abd2be819c7d93bd6097155cf84eaf803e3133a7e0ca71f9d9cbc3c65e4e4a26415d2523a36adafdd19b0751e25ea1a99b8d060cad61cdfd1f79adf9cd4b4eca

        • C:\Users\Admin\AppData\Local\Temp\InstallSetup8.exe

          Filesize

          2.3MB

          MD5

          d56df2995b539368495f3300e48d8e18

          SHA1

          8d2d02923afb5fb5e09ce1592104db17a3128246

          SHA256

          b87fd3c98383089618d2f66cbbecd2b0ed91db6923135235eb52a671f8dd7cb6

          SHA512

          2b25f9b2ff56abafcd8aa0a5fbae4ea78e9e95cec3d4cb832a7a3c5ec13af7d9ecf3ef26ec5c7144805868801aacb8de4113490c3bd665fda4e23ec05b9d8008

        • C:\Users\Admin\AppData\Local\Temp\InstallSetup8.exe

          Filesize

          2.3MB

          MD5

          d56df2995b539368495f3300e48d8e18

          SHA1

          8d2d02923afb5fb5e09ce1592104db17a3128246

          SHA256

          b87fd3c98383089618d2f66cbbecd2b0ed91db6923135235eb52a671f8dd7cb6

          SHA512

          2b25f9b2ff56abafcd8aa0a5fbae4ea78e9e95cec3d4cb832a7a3c5ec13af7d9ecf3ef26ec5c7144805868801aacb8de4113490c3bd665fda4e23ec05b9d8008

        • C:\Users\Admin\AppData\Local\Temp\InstallSetup8.exe

          Filesize

          2.3MB

          MD5

          d56df2995b539368495f3300e48d8e18

          SHA1

          8d2d02923afb5fb5e09ce1592104db17a3128246

          SHA256

          b87fd3c98383089618d2f66cbbecd2b0ed91db6923135235eb52a671f8dd7cb6

          SHA512

          2b25f9b2ff56abafcd8aa0a5fbae4ea78e9e95cec3d4cb832a7a3c5ec13af7d9ecf3ef26ec5c7144805868801aacb8de4113490c3bd665fda4e23ec05b9d8008

        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_mo120bmq.p1y.ps1

          Filesize

          60B

          MD5

          d17fe0a3f47be24a6453e9ef58c94641

          SHA1

          6ab83620379fc69f80c0242105ddffd7d98d5d9d

          SHA256

          96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

          SHA512

          5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

        • C:\Users\Admin\AppData\Local\Temp\csrss\f801950a962ddba14caaa44bf084b55c.exe

          Filesize

          3.2MB

          MD5

          f801950a962ddba14caaa44bf084b55c

          SHA1

          7cadc9076121297428442785536ba0df2d4ae996

          SHA256

          c3946ec89e15b24b743c46f9acacb58cff47da63f3ce2799d71ed90496b8891f

          SHA512

          4183bc76bdc84fb779e2e573d9a63d7de47096b63b945f9e335bee95ae28eb208f5ee15f6501ac59623b97c5b77f3455ca313512e7d9803e1704ae22a52459c5

        • C:\Users\Admin\AppData\Local\Temp\csrss\f801950a962ddba14caaa44bf084b55c.exe

          Filesize

          3.2MB

          MD5

          f801950a962ddba14caaa44bf084b55c

          SHA1

          7cadc9076121297428442785536ba0df2d4ae996

          SHA256

          c3946ec89e15b24b743c46f9acacb58cff47da63f3ce2799d71ed90496b8891f

          SHA512

          4183bc76bdc84fb779e2e573d9a63d7de47096b63b945f9e335bee95ae28eb208f5ee15f6501ac59623b97c5b77f3455ca313512e7d9803e1704ae22a52459c5

        • C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll

          Filesize

          99KB

          MD5

          09031a062610d77d685c9934318b4170

          SHA1

          880f744184e7774f3d14c1bb857e21cc7fe89a6d

          SHA256

          778bd69af403df3c4e074c31b3850d71bf0e64524bea4272a802ca9520b379dd

          SHA512

          9a276e1f0f55d35f2bf38eb093464f7065bdd30a660e6d1c62eed5e76d1fb2201567b89d9ae65d2d89dc99b142159e36fb73be8d5e08252a975d50544a7cda27

        • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

          Filesize

          281KB

          MD5

          d98e33b66343e7c96158444127a117f6

          SHA1

          bb716c5509a2bf345c6c1152f6e3e1452d39d50d

          SHA256

          5de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1

          SHA512

          705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5

        • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

          Filesize

          281KB

          MD5

          d98e33b66343e7c96158444127a117f6

          SHA1

          bb716c5509a2bf345c6c1152f6e3e1452d39d50d

          SHA256

          5de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1

          SHA512

          705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5

        • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

          Filesize

          2KB

          MD5

          968cb9309758126772781b83adb8a28f

          SHA1

          8da30e71accf186b2ba11da1797cf67f8f78b47c

          SHA256

          92099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a

          SHA512

          4bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3

        • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

          Filesize

          19KB

          MD5

          123dc7c1c140757cdc5372530a537491

          SHA1

          c9e23b8ef937ae5a7ec984262317c832793f6f1a

          SHA256

          13eb7c2c9524bfd2cc8b4b523714ac624dcdbf671d102a08eaf82993491df0aa

          SHA512

          2fd1253d3ace249d371a3208370e9b46d418b072c621afbfb7815ca395e7ba9827599dcc8e5f8df6fb309a86daf3f1cfe3fe155bf8f7873507dcd3f6ec2b72fc

        • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

          Filesize

          19KB

          MD5

          53dde59d7d57c7cee135f8b85ef9ba56

          SHA1

          874fa931c04f8cb91fac9749cf2c24ff77af310f

          SHA256

          5eee7732d47682d470f00e89f8e06e0b3c0bbf4532517b858d55ba807ec1aea3

          SHA512

          cf1a855e99f2efe2e1f2b218fe250934b47a21d2f6ee696fb8e4a0d6981921da77b42ad6a00a6302524929e3e254fb23662e73c7c79695eea887ce31244da787

        • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

          Filesize

          19KB

          MD5

          606a8236c157a6dcdedb3f6ac7dfbdff

          SHA1

          d2c0a50bd664dc4550f10f4c1cb9ae13fe4a3a78

          SHA256

          d78c8700253257badfe4b54b4b561f12536b11626118b0ba1bb01a40e99a3869

          SHA512

          80c72bf181cbdeaeb4c8ed3701740c8ce02d36c1009d4e5a9b9e534b5ee0c356fef6c94d1a294f1be710abc974f10078c41ddd5c1ab86aafc89c868fc826addc

        • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

          Filesize

          19KB

          MD5

          bda6070d4a559c30fa780038c1c4e407

          SHA1

          a4e9c2dff0554c368a735967d5f5e93de84c6da8

          SHA256

          12b41179d59a1458163e333db32b9b18529a2c713621e518a030a001b3c1092a

          SHA512

          1b50f7fc093baf51529cc8eadf82a3599fddf1a027384682e53426aa419d54581024601b0e9606806048c958dfc962ad08b71d45dcfb68b8f6d6ace199022d44

        • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

          Filesize

          19KB

          MD5

          03014b440f9fe748a6d50cbf46bfb70e

          SHA1

          adac713f4b41ec9bbc3237d1a098a18ba7e1c4f9

          SHA256

          fa65267b43f08ab5a0cc20f8d4ee6dcc90f3fbcdf47abe8297d06255c9c24b02

          SHA512

          687a6a6fa9e4a7c3856f1cb2ce86e2af771fbf82301cce96d7e355a6bac5d38bcdf5c49442d15dfda0872ebba562f7a903f1eca2169b4f648e0a3e4ed931c044

        • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

          Filesize

          19KB

          MD5

          3ce5b0dfcdb1740584c87875f3b8626d

          SHA1

          d1719edee3c0f00ff765a9e26ebeb9e06be3eafd

          SHA256

          436dce93e50ec8714a9ba184a5ece06d91d1caaa1132c45f660b0da3a1f30649

          SHA512

          ba0d3e6e047f234dfd19db6dda9759f419fcd005273ae47c7c07ff8959223f41889db4973fdc2ffa9b70827bf582ef4c62319bd7ddcb7210f867e3d3fe2e6d67

        • C:\Windows\rss\csrss.exe

          Filesize

          4.2MB

          MD5

          890bfdf3c7eecbb505c0fdc415f466b3

          SHA1

          90889e27be89519f23d85915956d989b75793c8d

          SHA256

          e617e19dce9f15496c331be6daf2006a03573d50e42b34f2ae9ee4aee2bc8c72

          SHA512

          e08f327a03ede89a8e8df0a50244458095ed8afd132be8f21323cb81cfe5fb09d18266d0f5186dfd12d48649ffbb2dd1c8ec35951702f2b99adb1075fd776ece

        • C:\Windows\rss\csrss.exe

          Filesize

          4.2MB

          MD5

          890bfdf3c7eecbb505c0fdc415f466b3

          SHA1

          90889e27be89519f23d85915956d989b75793c8d

          SHA256

          e617e19dce9f15496c331be6daf2006a03573d50e42b34f2ae9ee4aee2bc8c72

          SHA512

          e08f327a03ede89a8e8df0a50244458095ed8afd132be8f21323cb81cfe5fb09d18266d0f5186dfd12d48649ffbb2dd1c8ec35951702f2b99adb1075fd776ece

        • C:\Windows\windefender.exe

          Filesize

          2.0MB

          MD5

          8e67f58837092385dcf01e8a2b4f5783

          SHA1

          012c49cfd8c5d06795a6f67ea2baf2a082cf8625

          SHA256

          166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa

          SHA512

          40d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec

        • C:\Windows\windefender.exe

          Filesize

          2.0MB

          MD5

          8e67f58837092385dcf01e8a2b4f5783

          SHA1

          012c49cfd8c5d06795a6f67ea2baf2a082cf8625

          SHA256

          166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa

          SHA512

          40d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec

        • C:\Windows\windefender.exe

          Filesize

          2.0MB

          MD5

          8e67f58837092385dcf01e8a2b4f5783

          SHA1

          012c49cfd8c5d06795a6f67ea2baf2a082cf8625

          SHA256

          166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa

          SHA512

          40d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec

        • memory/1020-364-0x0000000000400000-0x00000000008DF000-memory.dmp

          Filesize

          4.9MB

        • memory/1020-309-0x0000000000400000-0x00000000008DF000-memory.dmp

          Filesize

          4.9MB

        • memory/1020-316-0x0000000000400000-0x00000000008DF000-memory.dmp

          Filesize

          4.9MB

        • memory/2028-154-0x0000000074130000-0x00000000748E0000-memory.dmp

          Filesize

          7.7MB

        • memory/2028-142-0x0000000071CE0000-0x0000000072034000-memory.dmp

          Filesize

          3.3MB

        • memory/2028-140-0x000000007F4E0000-0x000000007F4F0000-memory.dmp

          Filesize

          64KB

        • memory/2028-141-0x0000000071AE0000-0x0000000071B2C000-memory.dmp

          Filesize

          304KB

        • memory/2028-139-0x0000000002C70000-0x0000000002C80000-memory.dmp

          Filesize

          64KB

        • memory/2028-126-0x0000000002C70000-0x0000000002C80000-memory.dmp

          Filesize

          64KB

        • memory/2028-127-0x0000000002C70000-0x0000000002C80000-memory.dmp

          Filesize

          64KB

        • memory/2028-125-0x0000000074130000-0x00000000748E0000-memory.dmp

          Filesize

          7.7MB

        • memory/2232-50-0x0000000006440000-0x0000000006484000-memory.dmp

          Filesize

          272KB

        • memory/2232-47-0x00000000059A0000-0x0000000005CF4000-memory.dmp

          Filesize

          3.3MB

        • memory/2232-70-0x0000000007580000-0x000000000758A000-memory.dmp

          Filesize

          40KB

        • memory/2232-71-0x0000000007690000-0x0000000007726000-memory.dmp

          Filesize

          600KB

        • memory/2232-72-0x0000000007590000-0x00000000075A1000-memory.dmp

          Filesize

          68KB

        • memory/2232-73-0x00000000075D0000-0x00000000075DE000-memory.dmp

          Filesize

          56KB

        • memory/2232-74-0x00000000075F0000-0x0000000007604000-memory.dmp

          Filesize

          80KB

        • memory/2232-75-0x0000000007640000-0x000000000765A000-memory.dmp

          Filesize

          104KB

        • memory/2232-58-0x00000000715E0000-0x0000000071934000-memory.dmp

          Filesize

          3.3MB

        • memory/2232-77-0x0000000007630000-0x0000000007638000-memory.dmp

          Filesize

          32KB

        • memory/2232-80-0x0000000074130000-0x00000000748E0000-memory.dmp

          Filesize

          7.7MB

        • memory/2232-68-0x0000000007440000-0x000000000745E000-memory.dmp

          Filesize

          120KB

        • memory/2232-56-0x0000000007460000-0x0000000007492000-memory.dmp

          Filesize

          200KB

        • memory/2232-29-0x0000000002580000-0x00000000025B6000-memory.dmp

          Filesize

          216KB

        • memory/2232-30-0x0000000074130000-0x00000000748E0000-memory.dmp

          Filesize

          7.7MB

        • memory/2232-69-0x00000000074A0000-0x0000000007543000-memory.dmp

          Filesize

          652KB

        • memory/2232-33-0x00000000050E0000-0x0000000005708000-memory.dmp

          Filesize

          6.2MB

        • memory/2232-34-0x0000000004AA0000-0x0000000004AB0000-memory.dmp

          Filesize

          64KB

        • memory/2232-32-0x0000000004AA0000-0x0000000004AB0000-memory.dmp

          Filesize

          64KB

        • memory/2232-35-0x0000000004EE0000-0x0000000004F02000-memory.dmp

          Filesize

          136KB

        • memory/2232-36-0x0000000005710000-0x0000000005776000-memory.dmp

          Filesize

          408KB

        • memory/2232-37-0x0000000005830000-0x0000000005896000-memory.dmp

          Filesize

          408KB

        • memory/2232-57-0x0000000071C10000-0x0000000071C5C000-memory.dmp

          Filesize

          304KB

        • memory/2232-48-0x0000000005ED0000-0x0000000005EEE000-memory.dmp

          Filesize

          120KB

        • memory/2232-49-0x0000000005F10000-0x0000000005F5C000-memory.dmp

          Filesize

          304KB

        • memory/2232-51-0x0000000004AA0000-0x0000000004AB0000-memory.dmp

          Filesize

          64KB

        • memory/2232-52-0x0000000007200000-0x0000000007276000-memory.dmp

          Filesize

          472KB

        • memory/2232-53-0x0000000007900000-0x0000000007F7A000-memory.dmp

          Filesize

          6.5MB

        • memory/2232-54-0x00000000072A0000-0x00000000072BA000-memory.dmp

          Filesize

          104KB

        • memory/2232-55-0x000000007FB60000-0x000000007FB70000-memory.dmp

          Filesize

          64KB

        • memory/2684-368-0x0000000000400000-0x0000000000C25000-memory.dmp

          Filesize

          8.1MB

        • memory/2684-370-0x0000000000400000-0x0000000000C25000-memory.dmp

          Filesize

          8.1MB

        • memory/3008-299-0x0000000000400000-0x0000000000D1C000-memory.dmp

          Filesize

          9.1MB

        • memory/3008-315-0x0000000000400000-0x0000000000D1C000-memory.dmp

          Filesize

          9.1MB

        • memory/3008-365-0x0000000000400000-0x0000000000D1C000-memory.dmp

          Filesize

          9.1MB

        • memory/3008-288-0x0000000000400000-0x0000000000D1C000-memory.dmp

          Filesize

          9.1MB

        • memory/3008-323-0x0000000000400000-0x0000000000D1C000-memory.dmp

          Filesize

          9.1MB

        • memory/3008-223-0x0000000000400000-0x0000000000D1C000-memory.dmp

          Filesize

          9.1MB

        • memory/3008-307-0x0000000000400000-0x0000000000D1C000-memory.dmp

          Filesize

          9.1MB

        • memory/3008-319-0x0000000000400000-0x0000000000D1C000-memory.dmp

          Filesize

          9.1MB

        • memory/3008-311-0x0000000000400000-0x0000000000D1C000-memory.dmp

          Filesize

          9.1MB

        • memory/3016-304-0x0000000000400000-0x00000000008DF000-memory.dmp

          Filesize

          4.9MB

        • memory/3796-116-0x0000000007840000-0x0000000007851000-memory.dmp

          Filesize

          68KB

        • memory/3796-105-0x0000000071CE0000-0x0000000072034000-memory.dmp

          Filesize

          3.3MB

        • memory/3796-104-0x0000000071AE0000-0x0000000071B2C000-memory.dmp

          Filesize

          304KB

        • memory/3796-103-0x0000000002E20000-0x0000000002E30000-memory.dmp

          Filesize

          64KB

        • memory/3796-115-0x0000000007530000-0x00000000075D3000-memory.dmp

          Filesize

          652KB

        • memory/3796-102-0x0000000006810000-0x000000000685C000-memory.dmp

          Filesize

          304KB

        • memory/3796-97-0x0000000005CD0000-0x0000000006024000-memory.dmp

          Filesize

          3.3MB

        • memory/3796-117-0x0000000007890000-0x00000000078A4000-memory.dmp

          Filesize

          80KB

        • memory/3796-91-0x0000000002E20000-0x0000000002E30000-memory.dmp

          Filesize

          64KB

        • memory/3796-90-0x0000000002E20000-0x0000000002E30000-memory.dmp

          Filesize

          64KB

        • memory/3796-121-0x0000000074130000-0x00000000748E0000-memory.dmp

          Filesize

          7.7MB

        • memory/3796-89-0x0000000074130000-0x00000000748E0000-memory.dmp

          Filesize

          7.7MB

        • memory/4036-27-0x0000000000400000-0x0000000000D1C000-memory.dmp

          Filesize

          9.1MB

        • memory/4036-84-0x0000000002A70000-0x0000000002E74000-memory.dmp

          Filesize

          4.0MB

        • memory/4036-82-0x0000000000400000-0x0000000000D1C000-memory.dmp

          Filesize

          9.1MB

        • memory/4036-25-0x0000000002A70000-0x0000000002E74000-memory.dmp

          Filesize

          4.0MB

        • memory/4036-86-0x0000000002E80000-0x000000000376B000-memory.dmp

          Filesize

          8.9MB

        • memory/4036-28-0x0000000000400000-0x0000000000D1C000-memory.dmp

          Filesize

          9.1MB

        • memory/4036-26-0x0000000002E80000-0x000000000376B000-memory.dmp

          Filesize

          8.9MB

        • memory/4268-88-0x0000000000400000-0x0000000000D1C000-memory.dmp

          Filesize

          9.1MB

        • memory/4268-87-0x0000000002BB0000-0x0000000002FB2000-memory.dmp

          Filesize

          4.0MB

        • memory/4268-191-0x0000000000400000-0x0000000000D1C000-memory.dmp

          Filesize

          9.1MB

        • memory/4268-157-0x0000000000400000-0x0000000000D1C000-memory.dmp

          Filesize

          9.1MB

        • memory/4268-156-0x0000000000400000-0x0000000000D1C000-memory.dmp

          Filesize

          9.1MB

        • memory/4268-123-0x0000000000400000-0x0000000000D1C000-memory.dmp

          Filesize

          9.1MB

        • memory/4268-138-0x0000000002BB0000-0x0000000002FB2000-memory.dmp

          Filesize

          4.0MB

        • memory/4464-0-0x0000000074FE0000-0x0000000075790000-memory.dmp

          Filesize

          7.7MB

        • memory/4464-18-0x0000000074FE0000-0x0000000075790000-memory.dmp

          Filesize

          7.7MB

        • memory/4464-1-0x0000000000BB0000-0x0000000001224000-memory.dmp

          Filesize

          6.5MB

        • memory/4672-295-0x0000000000400000-0x0000000000965000-memory.dmp

          Filesize

          5.4MB

        • memory/4672-310-0x0000000000400000-0x0000000000965000-memory.dmp

          Filesize

          5.4MB

        • memory/4672-23-0x0000000000B40000-0x0000000000B41000-memory.dmp

          Filesize

          4KB

        • memory/4672-122-0x0000000000400000-0x0000000000965000-memory.dmp

          Filesize

          5.4MB

        • memory/4672-367-0x0000000000400000-0x0000000000965000-memory.dmp

          Filesize

          5.4MB

        • memory/4672-31-0x0000000000400000-0x0000000000965000-memory.dmp

          Filesize

          5.4MB

        • memory/4672-76-0x0000000000B40000-0x0000000000B41000-memory.dmp

          Filesize

          4KB