Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    39s
  • max time network
    85s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    11/12/2023, 14:37

General

  • Target

    0x0006000000023286-3800.exe

  • Size

    38KB

  • MD5

    f874f242a30d6873edb7eaf2db40cbdb

  • SHA1

    5a162d4052d569aebcff2432f62c43ffb2867fee

  • SHA256

    ffee6552e3258166c9ef418c12f67d1167cf7dc9abb29b8d4e49056607ff2c0f

  • SHA512

    a52e1f03ca548f3118f3a8b8c7bd2493f16358b6e6c6b7619f5cb05596f7c02fe178b150c7f558dce1a7f19327cf21b3cc85932ccdeab2ac5dda1f7192b608b0

  • SSDEEP

    768:d8n3N4JRqwg8UTB+8zx70f0PSuopLwlFFWO7:dmN4JRrg8ypxSKFFX

Malware Config

Extracted

Family

smokeloader

Version

2022

C2

http://81.19.131.34/fks/index.php

rc4.i32
rc4.i32

Extracted

Family

redline

Botnet

@oleh_ps

C2

176.123.7.190:32927

Extracted

Family

smokeloader

Botnet

up3

Extracted

Family

smokeloader

Version

2020

C2

http://host-file-host6.com/

http://host-host-file8.com/

rc4.i32
rc4.i32

Signatures

  • Detect ZGRat V1 3 IoCs
  • Glupteba

    Glupteba is a modular loader written in Golang with various components.

  • Glupteba payload 7 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 3 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Downloads MZ/PE file
  • Modifies Windows Firewall 1 TTPs 1 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0x0006000000023286-3800.exe
    "C:\Users\Admin\AppData\Local\Temp\0x0006000000023286-3800.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:3048
  • C:\Users\Admin\AppData\Local\Temp\8B2F.exe
    C:\Users\Admin\AppData\Local\Temp\8B2F.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    PID:2824
  • C:\Users\Admin\AppData\Local\Temp\CA81.exe
    C:\Users\Admin\AppData\Local\Temp\CA81.exe
    1⤵
    • Executes dropped EXE
    PID:2168
    • C:\Users\Admin\AppData\Local\Temp\InstallSetup9.exe
      "C:\Users\Admin\AppData\Local\Temp\InstallSetup9.exe"
      2⤵
        PID:2896
        • C:\Users\Admin\AppData\Local\Temp\Broom.exe
          C:\Users\Admin\AppData\Local\Temp\Broom.exe
          3⤵
            PID:1908
        • C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe
          "C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"
          2⤵
            PID:1056
            • C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe
              "C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"
              3⤵
                PID:1244
                • C:\Windows\system32\cmd.exe
                  C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
                  4⤵
                    PID:1276
                    • C:\Windows\system32\netsh.exe
                      netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
                      5⤵
                      • Modifies Windows Firewall
                      PID:844
                  • C:\Windows\rss\csrss.exe
                    C:\Windows\rss\csrss.exe
                    4⤵
                      PID:752
                      • C:\Windows\system32\schtasks.exe
                        schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
                        5⤵
                        • Creates scheduled task(s)
                        PID:2768
                      • C:\Windows\system32\schtasks.exe
                        schtasks /delete /tn ScheduledUpdate /f
                        5⤵
                          PID:2816
                        • C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe
                          "C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe"
                          5⤵
                            PID:2640
                          • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
                            C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll
                            5⤵
                              PID:2452
                      • C:\Users\Admin\AppData\Local\Temp\toolspub2.exe
                        "C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"
                        2⤵
                          PID:1980
                          • C:\Users\Admin\AppData\Local\Temp\toolspub2.exe
                            "C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"
                            3⤵
                              PID:2376
                          • C:\Users\Admin\AppData\Local\Temp\tuc3.exe
                            "C:\Users\Admin\AppData\Local\Temp\tuc3.exe"
                            2⤵
                              PID:1956
                              • C:\Users\Admin\AppData\Local\Temp\is-S1C7C.tmp\tuc3.tmp
                                "C:\Users\Admin\AppData\Local\Temp\is-S1C7C.tmp\tuc3.tmp" /SL5="$70124,8423542,54272,C:\Users\Admin\AppData\Local\Temp\tuc3.exe"
                                3⤵
                                  PID:584
                              • C:\Users\Admin\AppData\Local\Temp\latestX.exe
                                "C:\Users\Admin\AppData\Local\Temp\latestX.exe"
                                2⤵
                                  PID:1608
                              • C:\Users\Admin\AppData\Local\Temp\D155.exe
                                C:\Users\Admin\AppData\Local\Temp\D155.exe
                                1⤵
                                  PID:1868
                                • C:\Windows\system32\makecab.exe
                                  "C:\Windows\system32\makecab.exe" C:\Windows\Logs\CBS\CbsPersist_20231211143801.log C:\Windows\Logs\CBS\CbsPersist_20231211143801.cab
                                  1⤵
                                    PID:1792
                                  • C:\Users\Admin\AppData\Local\Temp\18E1.exe
                                    C:\Users\Admin\AppData\Local\Temp\18E1.exe
                                    1⤵
                                      PID:1996
                                    • C:\Users\Admin\AppData\Local\Temp\2B2A.exe
                                      C:\Users\Admin\AppData\Local\Temp\2B2A.exe
                                      1⤵
                                        PID:2804

                                      Network

                                      MITRE ATT&CK Enterprise v15

                                      Replay Monitor

                                      Loading Replay Monitor...

                                      Downloads

                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

                                        Filesize

                                        65KB

                                        MD5

                                        ac05d27423a85adc1622c714f2cb6184

                                        SHA1

                                        b0fe2b1abddb97837ea0195be70ab2ff14d43198

                                        SHA256

                                        c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

                                        SHA512

                                        6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

                                      • C:\Users\Admin\AppData\Local\Temp\18E1.exe

                                        Filesize

                                        211KB

                                        MD5

                                        522b93e2a9602217632f684f021b97af

                                        SHA1

                                        724e1f8a4e1df434457552304141e9c015326428

                                        SHA256

                                        860cd35fa0ed4342391e1c3ff4c9046beea03363d055244f12b1b222f732f7ce

                                        SHA512

                                        caccd3ec1f350f66d88d8d7b935d1d3b41638ab06dc1db033270f4f24812f28b23f6b7c7edaf96e3aa427f44bee255fd1924d5031726e6d29476e4ee0b2566b3

                                      • C:\Users\Admin\AppData\Local\Temp\18E1.exe

                                        Filesize

                                        137KB

                                        MD5

                                        87b6f67ab775bb6dbea9c6be43700668

                                        SHA1

                                        32478e1756c9993cce4cfe1302935244dd3acc1d

                                        SHA256

                                        f466b496e37db570fec5ab7b3014ac2bd92628ee680aae314457c7d7e4b33f30

                                        SHA512

                                        2db2a693f5d097ed9cd3922907959ba941cd1d5b4253c987ed07a1838f382e33cf20543b122cf588522bab72a01a7c7e59cf9921a1c88fd63d75178d9ab41681

                                      • C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe

                                        Filesize

                                        228KB

                                        MD5

                                        5dcf54a569b72f325911da9e8be1ff2b

                                        SHA1

                                        f5c9cd6151cf41fd4214aa0627ba363eff2e4865

                                        SHA256

                                        f85f37e683775ce7189c9014b913ba949a3571c489b743166fa6d768b3dbe159

                                        SHA512

                                        4536621f0cab0ba4f1a767ae660bbddbebbeb299cbbbb6fc8c9364d6f64c097bd4f46b05ec71185102c3f09804bff833e8e598aff0ff18055660c4b328ea26b2

                                      • C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe

                                        Filesize

                                        106KB

                                        MD5

                                        72ceb0f3bbf0975f38992e3fb75a59f5

                                        SHA1

                                        895f723e70a128b7a328e89e79f70c8b302970a2

                                        SHA256

                                        98cc4c48a05fac8dedec2747e5205cc146993a15f298b7457de01060797d3955

                                        SHA512

                                        80a2a58f9b827be2b43940b662f6b382c998a7c6d27bb433427068b9f0348d3f86c654d6bbd05d3ef0348c17c6e1515c9437d23d00b25e963612c3a0313af221

                                      • C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe

                                        Filesize

                                        350KB

                                        MD5

                                        e63b541de9320fb3bf7dc108bafd0cb4

                                        SHA1

                                        cc477a4da33c0c5d6f93c711de691c8e55324453

                                        SHA256

                                        ce45454860e9cf64d2b9a225d1c646cc75dc2137957b919e856d3e36165b80ab

                                        SHA512

                                        73044ef38eb5ad6e6400f5bc758550c2ed3d07794e5858b644c59bd01fa189456a84247643ca8e0fcd18b4ec3f7e62474ed524d738ac77d3c0db481478bf84cb

                                      • C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe

                                        Filesize

                                        294KB

                                        MD5

                                        1702663437d2b3d2746be5333fb5d374

                                        SHA1

                                        161ca793cfc8fd97dd738e856c44d24f3275f119

                                        SHA256

                                        646ed4b23dd3bd8c35ba159ee7b801c62698c2e84906f30abf68b8841e136b64

                                        SHA512

                                        b1b3864b09b2c73eedd3b722a2c786c13532b7f0791757af66a222cdee7c0df82ac2298d3cabd3f7becd1524ee384af2b4f0e8e34250a5f02ed0a19cfbd866de

                                      • C:\Users\Admin\AppData\Local\Temp\8B2F.exe

                                        Filesize

                                        356KB

                                        MD5

                                        a2eb6f87b27ed5a7633ee816c4281806

                                        SHA1

                                        33e27366e42771a205804849275f8242089087fe

                                        SHA256

                                        80e0d5206eeffe14eee28b0da01addcc16a4ed775b7dadaa62fb1978afb68a79

                                        SHA512

                                        d0714ca474dcb86e26a3ec7e9956cc4ab5f83e1049eb4e2c7b1eec1b0539620b6f75e6e08a06e8f1d77485d723623aa38fe98e1c5bd477eb4b1e903ed04e30b1

                                      • C:\Users\Admin\AppData\Local\Temp\Broom.exe

                                        Filesize

                                        114KB

                                        MD5

                                        eb6692d40ae99c802c47f8e24bd130b7

                                        SHA1

                                        a741b811409d9e8a8cc958a43311cf76f12205a6

                                        SHA256

                                        9d1e43b3ff28ae168edadfd12e1b31f005bd159e770b7f479b46c0cc241bb809

                                        SHA512

                                        667e022de607aa9afa33c2c351fb7a4b1fccde7670251dd0ccaa4263bb6df391795385723e007537131ccf8336fc7d3145923622cbf6dff8aa3cb4d113a348b1

                                      • C:\Users\Admin\AppData\Local\Temp\CA81.exe

                                        Filesize

                                        2.1MB

                                        MD5

                                        42db5e76c0b0fa11812a870a9f36604e

                                        SHA1

                                        08caba62fade3ae66628c055f36d95a63dc9fb9d

                                        SHA256

                                        ead2499b083c14586ad6a9edf46497b37e951ec71e68f1eace6b2defea1eea7c

                                        SHA512

                                        9e3f35e8aa552d283e12992baff74b3bba2f4d790188aca05ffd50bf1d22c02d0e20e6d7d7b505a0790ef201d5b2ed5af3be92c67ecf6b58a0857f5acd2422ec

                                      • C:\Users\Admin\AppData\Local\Temp\CA81.exe

                                        Filesize

                                        1.0MB

                                        MD5

                                        0669688c53ab5be5d1efc2b060b63697

                                        SHA1

                                        39ee634b17365215e10ac9a7a47b0c0a8b743f56

                                        SHA256

                                        0a252e11438ccbc11f27fa7bca8eb0435bd29c658bdc0d93cd477fd6d1bb1015

                                        SHA512

                                        68efc4077cb01ec4254deedf5b7ce8682db288090159bbbf02df72ef9c68b9634e3e2654f845bc99c06dbc179eb02bddbaf7f027384eca7371e5bb2a571c2581

                                      • C:\Users\Admin\AppData\Local\Temp\Cab149C.tmp

                                        Filesize

                                        61KB

                                        MD5

                                        f3441b8572aae8801c04f3060b550443

                                        SHA1

                                        4ef0a35436125d6821831ef36c28ffaf196cda15

                                        SHA256

                                        6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

                                        SHA512

                                        5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

                                      • C:\Users\Admin\AppData\Local\Temp\D155.exe

                                        Filesize

                                        219KB

                                        MD5

                                        91d23595c11c7ee4424b6267aabf3600

                                        SHA1

                                        ef161bb8e90cebdf81f4e53dfccb50c1f90a9a02

                                        SHA256

                                        d58937d468f6ca92b12ee903a16a4908de340f64f894cf7f1c594cd15c0c7e47

                                        SHA512

                                        cb9ed75c14e7b093cabab66c22d412371c639ace31fbe976c71ffec6007bf85b3d7d3e591fe5612e2a035298398d32e1aa7dc0d753f93328ebc2ce8e44fb8d2b

                                      • C:\Users\Admin\AppData\Local\Temp\D155.exe

                                        Filesize

                                        133KB

                                        MD5

                                        ff683e5d82caf977d15411adb71dfeb7

                                        SHA1

                                        cad910dbcfc7645dfd2a3d2d4cd560af1e2e1f2a

                                        SHA256

                                        2535b27d0aabaacfd8f8d0adf4f16e78c8bb553b11bd96d68b000385fb0c982f

                                        SHA512

                                        f98c399e1331274c2c47fa43936e9dd82e96c34406d0057ee82dfd30e1f407647af9a14e9c69cb4275725604ff4898e07513c5d33d86c1918985557dcc440be5

                                      • C:\Users\Admin\AppData\Local\Temp\InstallSetup9.exe

                                        Filesize

                                        111KB

                                        MD5

                                        bd191eccb1993136993eca2fe3ce851a

                                        SHA1

                                        2569264ac4747fea522c0eb3c6650f6f8c78b30b

                                        SHA256

                                        428d208d599509c75a69f12ce3c72a19bdd2ddc7abb176b715dfb63255925a68

                                        SHA512

                                        fc4a2c26d962eeb30eb61e42b8212d1b71bcc654c5fde7347744546cb58e674840c1a81560ccf3c6cbf5cac776c0c186572c658eb790d6e466dc2cc4f4e61510

                                      • C:\Users\Admin\AppData\Local\Temp\InstallSetup9.exe

                                        Filesize

                                        36KB

                                        MD5

                                        2d9638817f95dc132262a7d9d00cc4ae

                                        SHA1

                                        0cedfcc9d553f4dfa7075eb0d6903d2ea4791a13

                                        SHA256

                                        955000a0228339f801b91b95afc1aebf5ef9bf9d305fb2ce7f39fb7882219d5b

                                        SHA512

                                        bb099f61fa3cfa14541fc89f00de8999786a34ff496ece6f594a615c52dc8dee9ae4df3114be4be1e017422ed9108901662f75e9e390c860dc5080ea186393c3

                                      • C:\Users\Admin\AppData\Local\Temp\Tar159C.tmp

                                        Filesize

                                        171KB

                                        MD5

                                        9c0c641c06238516f27941aa1166d427

                                        SHA1

                                        64cd549fb8cf014fcd9312aa7a5b023847b6c977

                                        SHA256

                                        4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

                                        SHA512

                                        936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

                                      • C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe

                                        Filesize

                                        409KB

                                        MD5

                                        ce705953f8f13236c2c36dba13ecbaac

                                        SHA1

                                        98cb192555ca162756ee274294b864826b3e5840

                                        SHA256

                                        a891e5ef98effa7f75f790d5671d6256967831eeeb46bda827e34b6d60068d2e

                                        SHA512

                                        f8a22e3eb13963418527a0753ec8e6318d2def1b2b7f82dff89474d0c8a78d5c142fd22e9e5e9c9a7dcb9297ef4d72d5771d077e8f08569abb32beb6a5f20190

                                      • C:\Users\Admin\AppData\Local\Temp\is-S1C7C.tmp\tuc3.tmp

                                        Filesize

                                        234KB

                                        MD5

                                        778faf925d291ae9553a5bd6b0bbce9a

                                        SHA1

                                        575050575e267c904e4c267c295f6bed3427ee76

                                        SHA256

                                        76a99afe8ecf38fdc5945edaee9b7c0cf12d8840231d7612b5638c33f9380c25

                                        SHA512

                                        30a37b58c071808b5d7035b4f4311b326484b8fb0890631d7a581418ce9b41f840bf4e464f93a347a17b55519ba813889eef991c6d4e4a1ff6f55f98a8e5558b

                                      • C:\Users\Admin\AppData\Local\Temp\latestX.exe

                                        Filesize

                                        64KB

                                        MD5

                                        e77422fac1e9d2d11cf7f1c1d57071a4

                                        SHA1

                                        53e63414263dc20ea044c6cbb4fb4fc2c2be6140

                                        SHA256

                                        9d0cfbb7bb8da895a7f43758556217bf4c00b5c335c56b1f765c14069993e320

                                        SHA512

                                        d2b84dd99814d55c541f02452eac9c9344bfd838d1f8b73a07bcc3193b9122176ffee19a182712b0ea646fb9e4b306732940efb0f38f0903d98788ecf2495f53

                                      • C:\Users\Admin\AppData\Local\Temp\ntkrnlmp.exe

                                        Filesize

                                        491KB

                                        MD5

                                        b3513de214f923aba877cb6d44a66e47

                                        SHA1

                                        60cad1dbeb4fafc3c0da02ae87de8edfa959b3e4

                                        SHA256

                                        cda515bb6639ffd020f3cd8802baf31d0da61b95cc594ddb868f19acaa34df34

                                        SHA512

                                        8c2a17b131ad0ddeffe091a6b6e464c72b5fb61b0d179cded421bc6acbbc85ae3aa3fef447527d995fe7f72c0a2ba378b7419ba290cc5616f26f37fcbaef477c

                                      • C:\Users\Admin\AppData\Local\Temp\toolspub2.exe

                                        Filesize

                                        1KB

                                        MD5

                                        28723608bad04c4b3d370ceb46b6949a

                                        SHA1

                                        8f3d50b5e1eab8780208ebbdb9b601af77b32c99

                                        SHA256

                                        8623ba5b5103b9dbfe99a13c8f65660c3116084f903fb9d3722f8e9efc039786

                                        SHA512

                                        7a2b4ae3441507adbbbb217d906713c57b0e55642f546bf52965adf90db56647f5a460b501b66649a266de797874541af045e92fe2bb95bb684fad97003da105

                                      • C:\Users\Admin\AppData\Local\Temp\toolspub2.exe

                                        Filesize

                                        35KB

                                        MD5

                                        a90efea196c83b82ad14decb6b2209f5

                                        SHA1

                                        4382ace62057c760b4fffb0806bdec597196ff59

                                        SHA256

                                        fddf4c5b89725f1d2995c67519857a62ff8d21c455d378051f1a38846a08f427

                                        SHA512

                                        a89eaccd60034cb6aa98874d6b9f0f740160e67bd445611754a7423380f1744d05cc4913ed46be858d305238db81e20c77eb1dd4386fa8e4652285c3e0fa4996

                                      • C:\Users\Admin\AppData\Local\Temp\tuc3.exe

                                        Filesize

                                        220KB

                                        MD5

                                        1fb466f50ed7a6823a2509ecfaa57df1

                                        SHA1

                                        51a13870366eaccad2c386247fd50090893141d7

                                        SHA256

                                        e058e1ac7ff562ce520aa6dcf324cca44646b3536901934db907cea9e196cd32

                                        SHA512

                                        f88f54855291c8def19ed060b267c51e231be094e9ff87293dca1dbda5a6826786f4a922f3687ee3766f1f1d492f6a54f908543d5d17fd3193f5ab0116e9ba68

                                      • C:\Users\Admin\AppData\Local\Temp\tuc3.exe

                                        Filesize

                                        308KB

                                        MD5

                                        8c7c8f7fc42e0b6d83dad212475cf04b

                                        SHA1

                                        94d02362f7815d542adcb1b24bcf308d1b2773cb

                                        SHA256

                                        face741c611ee865997b0fa895cd00d04edbda875494ec12797df2c556070ade

                                        SHA512

                                        f49956822f7232b5c5e1752bd9ffb17984f30160aaf7db2244396772c790ea8c1daa5a792566393ab8091cc169399234a2bbf401f1d8777884d726519def5dc5

                                      • C:\Windows\rss\csrss.exe

                                        Filesize

                                        106KB

                                        MD5

                                        f0c3e5e20f53bc3d05cef15b59bf4d47

                                        SHA1

                                        6518a0484064dd798860cc4f2e7fe5eded7ba6e9

                                        SHA256

                                        ca5aeab68fd33b1502431303bfbf740d9d97178e65424d7c15b1dcc235a61580

                                        SHA512

                                        b3eecc20c3040a18dbcdb26d489070eead1986597c8c2c7b95f28a63ec99beed6e44b0a177428aa0f29877246ee6ff8f187c2da2149f9363118f461018240945

                                      • C:\Windows\rss\csrss.exe

                                        Filesize

                                        299KB

                                        MD5

                                        e339e1c8d1da1bb233678dc4a501e562

                                        SHA1

                                        60d7b72b33cd8295abcb491c7fd27d144ca32b48

                                        SHA256

                                        72cf7cafa69c76ce627eae284e1d0b2a4669004a7ec549478a8ecd42fc69acc7

                                        SHA512

                                        40bcc52dc1ea34f741562956d4ef53b5a14b9a7610eb613a4d98995f25e328c33b57b93e478ad9dfc29b17abfe9c43d64095c3d9f1cd3b94cfd989758d64ce4a

                                      • \??\c:\users\admin\appdata\local\temp\is-s1c7c.tmp\tuc3.tmp

                                        Filesize

                                        142KB

                                        MD5

                                        89487b9409c1a574b7dd244dae5f830e

                                        SHA1

                                        274bac9407f885ca45803d0c384378e63c89d139

                                        SHA256

                                        ddbc759a683ed35549c40e614dc07bae0f5ad713e90e2273b3913997358015ae

                                        SHA512

                                        f6daf6807448e6c607e5ec6f69889729308d61a2305e637b37a6174353142528175bdefc6f12e5af5d94ba224b483cc480a33d00ae27274df8b398f4d0bdbd06

                                      • \Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe

                                        Filesize

                                        577KB

                                        MD5

                                        0c029803a75087ddb3b47c3179a34c40

                                        SHA1

                                        a8f3e7a733ee8b7e6c43c697d0b44eed5b2d8865

                                        SHA256

                                        1b19eee644c83ff6e707128f6a9866111444f44e8ec304e7200034162edc1608

                                        SHA512

                                        23addbbba993036e2fd72ffe7f03fcb48c02a90bbd79fa7a48e8ec67b30808f6c9540b2acf4eae9993e246df9788d68fb51f3dfeac51b530c916773c514334c5

                                      • \Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe

                                        Filesize

                                        414KB

                                        MD5

                                        b8b05cd92d40c30d4dec11472eac91e7

                                        SHA1

                                        7947ddb52f5e198db5114528046651d81dc3dc78

                                        SHA256

                                        c59a9353660f4a4ebb86da168ca53b6591c397c13e74df40b84386aab348f3c4

                                        SHA512

                                        be71b0854799befd1ca707ce3971279985150f7b27ecd69c379545077cef9f959727bca12e285fa7ef0adde109b7883fef8c2a3d3fba564c5292d6f77a7c566c

                                      • \Users\Admin\AppData\Local\Temp\Broom.exe

                                        Filesize

                                        110KB

                                        MD5

                                        0d451bf07e471bcdaa63b9b8b52e8ee1

                                        SHA1

                                        98ce197223b3ecfc17ab36958695609d99dd7afc

                                        SHA256

                                        517080a2ac463f5b00e23ab823a5de1f72c6432f0c7327da9176f1939b9cf324

                                        SHA512

                                        e887f206c4c4486eeebe0dc5e0322f21ef99c1a0c6de39319788c5bf520283df81c190c89c384fca638484578052b3f44efcc9bcce7fd5f6c032dd78fb651496

                                      • \Users\Admin\AppData\Local\Temp\InstallSetup9.exe

                                        Filesize

                                        277KB

                                        MD5

                                        5d38d4a5257fbcb99e271957c160386a

                                        SHA1

                                        05079dc8c25fe42e2ec3b7018a027b916bec9b61

                                        SHA256

                                        b60cb92a5112bd3d17a110014ea34523a655362f22f0f93a776937fbab0387f0

                                        SHA512

                                        5a1990be51c13cd626cd4278a970f04928a26998d09593b45f57c63a0a3998dae0f421702901a0102950f4366390a0c1a66864eee3f7572e87172e9801510e83

                                      • \Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

                                        Filesize

                                        281KB

                                        MD5

                                        d98e33b66343e7c96158444127a117f6

                                        SHA1

                                        bb716c5509a2bf345c6c1152f6e3e1452d39d50d

                                        SHA256

                                        5de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1

                                        SHA512

                                        705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5

                                      • \Users\Admin\AppData\Local\Temp\csrss\patch.exe

                                        Filesize

                                        414KB

                                        MD5

                                        8e2f56bd09bd7ed8494df703079e816f

                                        SHA1

                                        9b5341b7a137fcf12cbb70a87184906c50cc38d7

                                        SHA256

                                        267e873d8e91e27b579e3ca6fcbfeb7f70c992e0dee6593ecc1363f35bef669c

                                        SHA512

                                        7b18ace9a8a453cbe7ab9a8acc04643703a2f89f3151bc5e3b5cd711aebe056ad2d3def9d258497bf4e658a21386aad5da869d8206f30b242fc77232b811c92b

                                      • \Users\Admin\AppData\Local\Temp\dbghelp.dll

                                        Filesize

                                        439KB

                                        MD5

                                        d02f248aa0f2258252a07a4ea81abc23

                                        SHA1

                                        7333c1c9c95fc7d270119287e05b8b556858c56e

                                        SHA256

                                        08ebc64e1cba73cbf32420c5890ecec3c519b2ac0e2ed7a81f3762090329ce52

                                        SHA512

                                        a2cda395932e93fef4aadc42660295296ab0842f3387ee77ca997e6f292398d5785437ef12a88f6a5110a4d3694f9b2b5d9cca10dcd8d3ec7192467b3c327c5b

                                      • \Users\Admin\AppData\Local\Temp\is-DOH3U.tmp\_isetup\_iscrypt.dll

                                        Filesize

                                        2KB

                                        MD5

                                        a69559718ab506675e907fe49deb71e9

                                        SHA1

                                        bc8f404ffdb1960b50c12ff9413c893b56f2e36f

                                        SHA256

                                        2f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc

                                        SHA512

                                        e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63

                                      • \Users\Admin\AppData\Local\Temp\is-DOH3U.tmp\_isetup\_isdecmp.dll

                                        Filesize

                                        13KB

                                        MD5

                                        a813d18268affd4763dde940246dc7e5

                                        SHA1

                                        c7366e1fd925c17cc6068001bd38eaef5b42852f

                                        SHA256

                                        e19781aabe466dd8779cb9c8fa41bbb73375447066bb34e876cf388a6ed63c64

                                        SHA512

                                        b310ed4cd2e94381c00a6a370fcb7cc867ebe425d705b69caaaaffdafbab91f72d357966916053e72e68ecf712f2af7585500c58bb53ec3e1d539179fcb45fb4

                                      • \Users\Admin\AppData\Local\Temp\is-DOH3U.tmp\_isetup\_shfoldr.dll

                                        Filesize

                                        22KB

                                        MD5

                                        92dc6ef532fbb4a5c3201469a5b5eb63

                                        SHA1

                                        3e89ff837147c16b4e41c30d6c796374e0b8e62c

                                        SHA256

                                        9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

                                        SHA512

                                        9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

                                      • \Users\Admin\AppData\Local\Temp\is-S1C7C.tmp\tuc3.tmp

                                        Filesize

                                        317KB

                                        MD5

                                        76b1abea2baf4386c901a11d5d72a1ed

                                        SHA1

                                        117db3206f336c7aba0c96df8cb4e8f20320239a

                                        SHA256

                                        dd15c2b477fdb9dedefa19cc81563c19a3ae51a418ad2efef78a0cbbeb5ddbcc

                                        SHA512

                                        6a71a4956a5655e03e4bbe4fbf635df4abb24cae4fbcd66d3657f920e7b7cd9ce1f8dfd1b30308538fab0b90fc3367ef6f3ca7406bbab55ccc660739dea472f9

                                      • \Users\Admin\AppData\Local\Temp\latestX.exe

                                        Filesize

                                        64KB

                                        MD5

                                        ed495c0e32b5870f386d38c4f4dcbd5e

                                        SHA1

                                        a956be33a9b8d8e7a5f6d8ab39ceb8887837fcb8

                                        SHA256

                                        3ed38eb997c8b46d4ff80da8cef45b4ceb13a2be53626230d7308ec8181e0457

                                        SHA512

                                        49ed8c1f75a174d57b5b58a015011800e864c8c9afeaca8e80ce4c67e7ebc52d39b0092908ba7605f03d1711bb4da861f9f7ee08c129da4011bf822ee16f6116

                                      • \Users\Admin\AppData\Local\Temp\ntkrnlmp.exe

                                        Filesize

                                        386KB

                                        MD5

                                        e6c08a7fd14098880039a1e7d793ed23

                                        SHA1

                                        1e90d4c125ef68077a15d3b6705a1260c9bd8e46

                                        SHA256

                                        d127ec06d2497c96c315bd87f84884c0843a4d422efa74c34d53735733206d1b

                                        SHA512

                                        f87fcab642f3aa8843a84fedb2f63334abf98fee04ed48cb6901884b0a7f8aaa153c6520bb7a0911ded283fe253f2ba8a450bcb3027bf8943377ac0b4cf2f7b0

                                      • \Users\Admin\AppData\Local\Temp\ntkrnlmp.exe

                                        Filesize

                                        561KB

                                        MD5

                                        4e86a6de8dd74b56cb2b5f18607158f8

                                        SHA1

                                        da974822e0d681d945a104cabd232cc881cbb272

                                        SHA256

                                        bffc36e4117d6f0a11061dce12de1bd1ebac4b76d7e37013e929306793168cfa

                                        SHA512

                                        2007053c9fbb80a57e22fe7cfe2405018aff83e03ebbacdc6b3c05dadce8441b8137454c195fe46e8aa93a88bed6d477b3a2b3d2a39105a1b8d57094e836f45e

                                      • \Users\Admin\AppData\Local\Temp\ntkrnlmp.exe

                                        Filesize

                                        362KB

                                        MD5

                                        d11e447c152d72820166a060eaee4315

                                        SHA1

                                        1c875222e53eb5942e28edec246079101ae51022

                                        SHA256

                                        74bddd5fde9ddb633cd84ee7061d033da1204b8df84c27212f032c2bba2d042d

                                        SHA512

                                        be3aae87b4e8df4c1e6afd114c5b624a73abdaac66505a254fdade96caa56ca3c7d049e9adf8aab7cd9ad0449e5bfc81737fe387e2d6e0a76892f3a80318f2b4

                                      • \Users\Admin\AppData\Local\Temp\symsrv.dll

                                        Filesize

                                        163KB

                                        MD5

                                        5c399d34d8dc01741269ff1f1aca7554

                                        SHA1

                                        e0ceed500d3cef5558f3f55d33ba9c3a709e8f55

                                        SHA256

                                        e11e0f7804bfc485b19103a940be3d382f31c1378caca0c63076e27797d7553f

                                        SHA512

                                        8ff9d38b22d73c595cc417427b59f5ca8e1fb7b47a2fa6aef25322bf6e614d6b71339a752d779bd736b4c1057239100ac8cc62629fd5d6556785a69bcdc3d73d

                                      • \Users\Admin\AppData\Local\Temp\toolspub2.exe

                                        Filesize

                                        291KB

                                        MD5

                                        cde750f39f58f1ec80ef41ce2f4f1db9

                                        SHA1

                                        942ea40349b0e5af7583fd34f4d913398a9c3b96

                                        SHA256

                                        0a434be25f55f27ce0adbdfb08efeac1da01125b3e9194a94669bc7e9c6fe094

                                        SHA512

                                        c181faacbef70f8a91606943470af50cfd443958c48601051371ff5d9bf66bb9ec794571b05a347a7f5776f06484dc007f535591d2f5e1c57e3c0ee04f3e9580

                                      • \Users\Admin\AppData\Local\Temp\tuc3.exe

                                        Filesize

                                        287KB

                                        MD5

                                        719015fea5e71d54b3282809904cb309

                                        SHA1

                                        c9a384609b3784dbe53b41dc36ff720acd523e4d

                                        SHA256

                                        e519925a2965ee389d60f41bc95052f9c12413beb1d1fdbaab2fba281dfa9422

                                        SHA512

                                        cd0b645451a14a8485862e6f1822f7dbc37498fde287505471ea033d0ffe66fdcd260435306e89a7f57eeb2307abf028daee09d6dcf9b65b44451c19c2d0e637

                                      • \Windows\rss\csrss.exe

                                        Filesize

                                        45KB

                                        MD5

                                        e9ad100185218c9d8d07478f1ade00f2

                                        SHA1

                                        d3248f4f7209628f2b49cf1d2ba5e2a36d820fea

                                        SHA256

                                        3cc9f4b6bb4afd6a998b9be024578bb6444d261a5e667c320cf2b90d47876051

                                        SHA512

                                        729555a9a7d913af29bbd8ae5bcd4ac6b6489e6229fd611029ba9c59acfbbae70b1ff9f76d8b3866e7c2dd7c5472c77edd6461b59b2983085a76fa8862bd9c8c

                                      • \Windows\rss\csrss.exe

                                        Filesize

                                        26KB

                                        MD5

                                        2e4036a54933e00e9bb2296d3cc14c55

                                        SHA1

                                        2a0910102b60a6d29ff13c7aa2f15dc07f6e6adb

                                        SHA256

                                        bfab0726c2a4e0ae631818dddc7fb80212fdd83e872701e0e0f8bdc7e4de102b

                                        SHA512

                                        9a0bb8050ae8afd0961d36d54c0f0f216d63a1cba7057e4ca0791cc132046b7c6a2fb305d815e1d83dfc160adeba2fc3af76e7ddae5410c4edebd73454a659f4

                                      • memory/584-98-0x0000000000240000-0x0000000000241000-memory.dmp

                                        Filesize

                                        4KB

                                      • memory/584-166-0x0000000000400000-0x00000000004BD000-memory.dmp

                                        Filesize

                                        756KB

                                      • memory/584-154-0x0000000000240000-0x0000000000241000-memory.dmp

                                        Filesize

                                        4KB

                                      • memory/752-171-0x0000000002840000-0x0000000002C38000-memory.dmp

                                        Filesize

                                        4.0MB

                                      • memory/752-266-0x0000000000400000-0x0000000000D1C000-memory.dmp

                                        Filesize

                                        9.1MB

                                      • memory/752-172-0x0000000000400000-0x0000000000D1C000-memory.dmp

                                        Filesize

                                        9.1MB

                                      • memory/752-165-0x0000000002840000-0x0000000002C38000-memory.dmp

                                        Filesize

                                        4.0MB

                                      • memory/1056-126-0x0000000002BA0000-0x000000000348B000-memory.dmp

                                        Filesize

                                        8.9MB

                                      • memory/1056-127-0x0000000000400000-0x0000000000D1C000-memory.dmp

                                        Filesize

                                        9.1MB

                                      • memory/1056-125-0x00000000027A0000-0x0000000002B98000-memory.dmp

                                        Filesize

                                        4.0MB

                                      • memory/1056-130-0x0000000000400000-0x0000000000D1C000-memory.dmp

                                        Filesize

                                        9.1MB

                                      • memory/1056-113-0x00000000027A0000-0x0000000002B98000-memory.dmp

                                        Filesize

                                        4.0MB

                                      • memory/1056-132-0x0000000002BA0000-0x000000000348B000-memory.dmp

                                        Filesize

                                        8.9MB

                                      • memory/1244-163-0x0000000000400000-0x0000000000D1C000-memory.dmp

                                        Filesize

                                        9.1MB

                                      • memory/1244-164-0x0000000002650000-0x0000000002A48000-memory.dmp

                                        Filesize

                                        4.0MB

                                      • memory/1244-140-0x0000000002650000-0x0000000002A48000-memory.dmp

                                        Filesize

                                        4.0MB

                                      • memory/1244-153-0x0000000000400000-0x0000000000D1C000-memory.dmp

                                        Filesize

                                        9.1MB

                                      • memory/1244-131-0x0000000002650000-0x0000000002A48000-memory.dmp

                                        Filesize

                                        4.0MB

                                      • memory/1296-134-0x0000000002B10000-0x0000000002B26000-memory.dmp

                                        Filesize

                                        88KB

                                      • memory/1296-1-0x0000000002A10000-0x0000000002A26000-memory.dmp

                                        Filesize

                                        88KB

                                      • memory/1608-168-0x000000013FC20000-0x00000001401C1000-memory.dmp

                                        Filesize

                                        5.6MB

                                      • memory/1868-170-0x0000000007110000-0x0000000007150000-memory.dmp

                                        Filesize

                                        256KB

                                      • memory/1868-261-0x0000000074660000-0x0000000074D4E000-memory.dmp

                                        Filesize

                                        6.9MB

                                      • memory/1868-70-0x0000000074660000-0x0000000074D4E000-memory.dmp

                                        Filesize

                                        6.9MB

                                      • memory/1868-137-0x0000000074660000-0x0000000074D4E000-memory.dmp

                                        Filesize

                                        6.9MB

                                      • memory/1868-72-0x0000000000C70000-0x0000000000CAC000-memory.dmp

                                        Filesize

                                        240KB

                                      • memory/1868-121-0x0000000007110000-0x0000000007150000-memory.dmp

                                        Filesize

                                        256KB

                                      • memory/1908-111-0x0000000000240000-0x0000000000241000-memory.dmp

                                        Filesize

                                        4KB

                                      • memory/1908-167-0x0000000000400000-0x0000000000965000-memory.dmp

                                        Filesize

                                        5.4MB

                                      • memory/1908-169-0x0000000000240000-0x0000000000241000-memory.dmp

                                        Filesize

                                        4KB

                                      • memory/1956-133-0x0000000000400000-0x0000000000414000-memory.dmp

                                        Filesize

                                        80KB

                                      • memory/1956-62-0x0000000000400000-0x0000000000414000-memory.dmp

                                        Filesize

                                        80KB

                                      • memory/1980-119-0x0000000000230000-0x0000000000239000-memory.dmp

                                        Filesize

                                        36KB

                                      • memory/1980-116-0x0000000000980000-0x0000000000A80000-memory.dmp

                                        Filesize

                                        1024KB

                                      • memory/1996-258-0x0000000074660000-0x0000000074D4E000-memory.dmp

                                        Filesize

                                        6.9MB

                                      • memory/1996-260-0x00000000050E0000-0x0000000005120000-memory.dmp

                                        Filesize

                                        256KB

                                      • memory/1996-259-0x0000000000A90000-0x0000000000F84000-memory.dmp

                                        Filesize

                                        5.0MB

                                      • memory/2168-26-0x0000000074660000-0x0000000074D4E000-memory.dmp

                                        Filesize

                                        6.9MB

                                      • memory/2168-100-0x0000000074660000-0x0000000074D4E000-memory.dmp

                                        Filesize

                                        6.9MB

                                      • memory/2168-27-0x0000000000BD0000-0x0000000002086000-memory.dmp

                                        Filesize

                                        20.7MB

                                      • memory/2376-135-0x0000000000400000-0x0000000000409000-memory.dmp

                                        Filesize

                                        36KB

                                      • memory/2376-124-0x0000000000400000-0x0000000000409000-memory.dmp

                                        Filesize

                                        36KB

                                      • memory/2376-120-0x0000000000400000-0x0000000000409000-memory.dmp

                                        Filesize

                                        36KB

                                      • memory/2376-117-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

                                        Filesize

                                        4KB

                                      • memory/2376-123-0x0000000000400000-0x0000000000409000-memory.dmp

                                        Filesize

                                        36KB

                                      • memory/2640-193-0x0000000140000000-0x00000001405E8000-memory.dmp

                                        Filesize

                                        5.9MB

                                      • memory/2640-179-0x0000000140000000-0x00000001405E8000-memory.dmp

                                        Filesize

                                        5.9MB

                                      • memory/2824-20-0x0000000074690000-0x0000000074D7E000-memory.dmp

                                        Filesize

                                        6.9MB

                                      • memory/2824-12-0x00000000003E0000-0x0000000000410000-memory.dmp

                                        Filesize

                                        192KB

                                      • memory/2824-17-0x0000000074690000-0x0000000074D7E000-memory.dmp

                                        Filesize

                                        6.9MB

                                      • memory/2824-18-0x0000000004E10000-0x0000000004E50000-memory.dmp

                                        Filesize

                                        256KB

                                      • memory/3048-0-0x0000000000400000-0x000000000040B000-memory.dmp

                                        Filesize

                                        44KB

                                      • memory/3048-2-0x0000000000400000-0x000000000040B000-memory.dmp

                                        Filesize

                                        44KB