Analysis

  • max time kernel
    299s
  • max time network
    280s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    04-02-2024 03:58

General

  • Target

    d6627ec8cf84e242044b4f093ee28562cf49b22451c6c0f687a13733d42e4bad.exe

  • Size

    4.2MB

  • MD5

    2a078595bc7b06b6c0a40602c54655e5

  • SHA1

    9089522396d2f55532e3f4ecfd7a6c212e644d81

  • SHA256

    d6627ec8cf84e242044b4f093ee28562cf49b22451c6c0f687a13733d42e4bad

  • SHA512

    8404453e3da38a8c28d1b26c548e848002e608f935a9a12b66be91912f5ff44c496ab0b834c957d1dab9fa264d5c95b11a24db7ae7743e15e50dbdaa60d9299f

  • SSDEEP

    98304:kaNbqhCdxeFU4O1fE+zS7qSCmefXoHWeJEEWIG/KhNefuiDKg:katqhS4FIu+O7BChvI4KhEuiDP

Malware Config

Signatures

  • Glupteba

    Glupteba is a modular loader written in Golang with various components.

  • Glupteba payload 37 IoCs
  • Windows security bypass 2 TTPs 7 IoCs
  • Modifies boot configuration data using bcdedit 1 TTPs 14 IoCs
  • Drops file in Drivers directory 1 IoCs
  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Possible attempt to disable PatchGuard 2 TTPs

    Rootkits can use kernel patching to embed themselves in an operating system.

  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 13 IoCs
  • UPX packed file 8 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Windows security modification 2 TTPs 7 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Manipulates WinMon driver. 1 IoCs

    Roottkits write to WinMon to hide PIDs from being detected.

  • Manipulates WinMonFS driver. 1 IoCs

    Roottkits write to WinMonFS to hide directories/files from being detected.

  • Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs

    Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.

  • Drops file in Windows directory 5 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies system certificate store 2 TTPs 11 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\d6627ec8cf84e242044b4f093ee28562cf49b22451c6c0f687a13733d42e4bad.exe
    "C:\Users\Admin\AppData\Local\Temp\d6627ec8cf84e242044b4f093ee28562cf49b22451c6c0f687a13733d42e4bad.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1212
    • C:\Users\Admin\AppData\Local\Temp\d6627ec8cf84e242044b4f093ee28562cf49b22451c6c0f687a13733d42e4bad.exe
      "C:\Users\Admin\AppData\Local\Temp\d6627ec8cf84e242044b4f093ee28562cf49b22451c6c0f687a13733d42e4bad.exe"
      2⤵
      • Windows security bypass
      • Loads dropped DLL
      • Windows security modification
      • Adds Run key to start application
      • Checks for VirtualBox DLLs, possible anti-VM trick
      • Drops file in Windows directory
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2604
      • C:\Windows\system32\cmd.exe
        C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2656
        • C:\Windows\system32\netsh.exe
          netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
          4⤵
          • Modifies Windows Firewall
          • Modifies data under HKEY_USERS
          PID:1748
      • C:\Windows\rss\csrss.exe
        C:\Windows\rss\csrss.exe
        3⤵
        • Drops file in Drivers directory
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Manipulates WinMon driver.
        • Manipulates WinMonFS driver.
        • Drops file in Windows directory
        • Modifies system certificate store
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2552
        • C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe
          "C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Modifies system certificate store
          • Suspicious use of WriteProcessMemory
          PID:1476
          • C:\Windows\system32\bcdedit.exe
            C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} osdevice partition=C:
            5⤵
            • Modifies boot configuration data using bcdedit
            PID:968
          • C:\Windows\system32\bcdedit.exe
            C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} inherit {bootloadersettings}
            5⤵
            • Modifies boot configuration data using bcdedit
            PID:904
          • C:\Windows\system32\bcdedit.exe
            C:\Windows\system32\bcdedit.exe -default {71A3C7FC-F751-4982-AEC1-E958357E6813}
            5⤵
            • Modifies boot configuration data using bcdedit
            PID:2984
          • C:\Windows\system32\bcdedit.exe
            C:\Windows\system32\bcdedit.exe -timeout 0
            5⤵
            • Modifies boot configuration data using bcdedit
            PID:2940
          • C:\Windows\system32\bcdedit.exe
            C:\Windows\system32\bcdedit.exe -displayorder {71A3C7FC-F751-4982-AEC1-E958357E6813} -addlast
            5⤵
            • Modifies boot configuration data using bcdedit
            PID:1756
          • C:\Windows\system32\bcdedit.exe
            C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} nointegritychecks 1
            5⤵
            • Modifies boot configuration data using bcdedit
            PID:2268
          • C:\Windows\system32\bcdedit.exe
            C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} nx OptIn
            5⤵
            • Modifies boot configuration data using bcdedit
            PID:2012
          • C:\Windows\system32\bcdedit.exe
            C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} recoveryenabled 0
            5⤵
            • Modifies boot configuration data using bcdedit
            PID:280
          • C:\Windows\system32\bcdedit.exe
            C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} kernel ntkrnlmp.exe
            5⤵
            • Modifies boot configuration data using bcdedit
            PID:1776
          • C:\Windows\system32\bcdedit.exe
            C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} path \Windows\system32\osloader.exe
            5⤵
            • Modifies boot configuration data using bcdedit
            PID:848
          • C:\Windows\system32\bcdedit.exe
            C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} systemroot \Windows
            5⤵
            • Modifies boot configuration data using bcdedit
            PID:2108
          • C:\Windows\system32\bcdedit.exe
            C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} device partition=C:
            5⤵
            • Modifies boot configuration data using bcdedit
            PID:1400
          • C:\Windows\system32\bcdedit.exe
            C:\Windows\system32\bcdedit.exe -create {71A3C7FC-F751-4982-AEC1-E958357E6813} -d "Windows Fast Mode" -application OSLOADER
            5⤵
            • Modifies boot configuration data using bcdedit
            PID:1228
        • C:\Windows\system32\schtasks.exe
          schtasks /delete /tn ScheduledUpdate /f
          4⤵
            PID:2468
          • C:\Windows\system32\schtasks.exe
            schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
            4⤵
            • Creates scheduled task(s)
            PID:952
          • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
            C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll
            4⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            PID:2856
          • C:\Windows\system32\bcdedit.exe
            C:\Windows\Sysnative\bcdedit.exe /v
            4⤵
            • Modifies boot configuration data using bcdedit
            PID:1720
          • C:\Users\Admin\AppData\Local\Temp\csrss\dsefix.exe
            C:\Users\Admin\AppData\Local\Temp\csrss\dsefix.exe
            4⤵
            • Executes dropped EXE
            PID:2060
          • C:\Windows\system32\schtasks.exe
            schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
            4⤵
            • Creates scheduled task(s)
            PID:1840
          • C:\Windows\windefender.exe
            "C:\Windows\windefender.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:2840
            • C:\Windows\SysWOW64\cmd.exe
              cmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
              5⤵
                PID:2692
      • C:\Windows\system32\makecab.exe
        "C:\Windows\system32\makecab.exe" C:\Windows\Logs\CBS\CbsPersist_20240204035906.log C:\Windows\Logs\CBS\CbsPersist_20240204035906.cab
        1⤵
        • Drops file in Windows directory
        PID:2712
      • C:\Windows\windefender.exe
        C:\Windows\windefender.exe
        1⤵
        • Executes dropped EXE
        • Modifies data under HKEY_USERS
        PID:1764
      • C:\Windows\SysWOW64\sc.exe
        sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
        1⤵
        • Launches sc.exe
        • Suspicious use of AdjustPrivilegeToken
        PID:1952

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

        Filesize

        65KB

        MD5

        ac05d27423a85adc1622c714f2cb6184

        SHA1

        b0fe2b1abddb97837ea0195be70ab2ff14d43198

        SHA256

        c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

        SHA512

        6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

      • C:\Users\Admin\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\AAF33CF37E194E98957768CF9C02DE8E2\download.error

        Filesize

        1KB

        MD5

        d9732eb46709a405abb2f1f1122c98f5

        SHA1

        d04975472590ce87064fbe1567aba8f18209f735

        SHA256

        d0a28a4cf02bc2a9068dab3c2e27d0ae26ac8dcca86d8e825a79396e53467561

        SHA512

        bfb888c7e4ad8e75e0804761f3320a13a22e68b9a9671094d22ee7f09a949392d7dddfd92ef5e95877d86d202a46846c429c08ce0b9023d3af8ba90bbdaa22ca

      • C:\Users\Admin\AppData\Local\Temp\Symbols\winload_prod.pdb\768283CA443847FB8822F9DB1F36ECC51\download.error

        Filesize

        199KB

        MD5

        bc022c4381946412d3a3da0da43d81a8

        SHA1

        99109f1ca9d46e7e9ddcc24629996f21286737e9

        SHA256

        4ca841f772941cfbf891fa87a4d51e5d7b42798c10cbccd9eed4f7e65c9feaa2

        SHA512

        1e3c8ef7ff5a86bce79eed40ad536049a0053f05adb4b77e3ad17ac728b0c5edf5c4cfce0792f1b4bfc71a43ff1e2813a87b797a770b5c27d6f5938a0826abb8

      • C:\Users\Admin\AppData\Local\Temp\Tar44F1.tmp

        Filesize

        171KB

        MD5

        9c0c641c06238516f27941aa1166d427

        SHA1

        64cd549fb8cf014fcd9312aa7a5b023847b6c977

        SHA256

        4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

        SHA512

        936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

      • C:\Users\Admin\AppData\Local\Temp\csrss\dsefix.exe

        Filesize

        94KB

        MD5

        d98e78fd57db58a11f880b45bb659767

        SHA1

        ab70c0d3bd9103c07632eeecee9f51d198ed0e76

        SHA256

        414035cc96d8bcc87ed173852a839ffbb45882a98c7a6f7b821e1668891deef0

        SHA512

        aafbd3eee102d0b682c4c854d69d50bac077e48f7f0dd8a5f913c6c73027aed7231d99fc9d716511759800da8c4f0f394b318821e9e47f6e62e436c8725a7831

      • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

        Filesize

        171KB

        MD5

        d306f7d3735d2ca785df8cb3ca63e55b

        SHA1

        372bb59a0746f78f674435bc3775e3941dc301d1

        SHA256

        a7136e5388958a8bc97812a3ea9059d89bb0f3761a47036492f413333788742b

        SHA512

        d6d8bf6e4e24adff9fd5e5f0613fe2b34f5f485cd7b4172246d52b341a69fdf2ccdef934a5575b224337dbeb78e6267483cf373ddf13221775ab10d6a41eb4c7

      • C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe

        Filesize

        292KB

        MD5

        283ceea32fe539520f12247fd3b8562c

        SHA1

        b47fc3865e47f1c7d89d1d1cdcc88dcdf2e389d3

        SHA256

        fc252a0ed467599180ad450565130eb54bc5828bfa1991551b18e71ca8b50ae4

        SHA512

        c18ca636581f826d3b9c0c6c13681b7fc9567b599338b7558f9931acd8122112052d9ad377e5c4aabfee5d05c21ff1a94b3b2c09b6567ffa57f2cbfea5770844

      • C:\Users\Admin\AppData\Local\Temp\ntkrnlmp.exe

        Filesize

        236KB

        MD5

        78788fddef428a73500fe450d8880420

        SHA1

        1ecd643b6c413a8a866ecd8f533eec07ae5369b9

        SHA256

        d88f7658bcce871dc8e0fbabb4b099c79561354b06ab9a44a2f74d19c6b0223a

        SHA512

        fe6ab5deef0f28ce68ece15bfc827572e7b70cae97d1ede593f22b59d4f28b502788de24ede9c57f8df4622588a3c5ca18915994ec63a3b4f55e7e1fd4715376

      • C:\Users\Admin\AppData\Local\Temp\osloader.exe

        Filesize

        45KB

        MD5

        30fc985ba8ad6b6c395805976ec3e077

        SHA1

        682fec1a6cf95005baf52a74318e6f9244f4e151

        SHA256

        5cd11c6a6a1ac3666c75a46bf042d994febe356053a2482fed5f0ae11e0b04f9

        SHA512

        0b30a295f612b44a68b2a3c147b2846a7694c78495f6e96c09a8532d33dc5fd2f649f31958e5a00da17a95906d3aa2026d8ec672a8dd3f7f7ab32f1b109865a6

      • C:\Windows\rss\csrss.exe

        Filesize

        308KB

        MD5

        3640940845aa9e857883c2b49ee5fd2e

        SHA1

        4e639c1d5bb50c64d12e8b1743df44b6ffc87e34

        SHA256

        cdeb05ea304cd4ae721a30ee29667a4a73de4b41887a76708467e59aeeb39d4e

        SHA512

        e517b8fd6d4e892113152e4c5a14b5b85e52881c445284d4743970dd3d22a97db0d7e24079cd1ca4f419e86a530b0325e8b2f01ccf338ec14b4c8d9833ad7fd5

      • C:\Windows\rss\csrss.exe

        Filesize

        252KB

        MD5

        b95bd41ced87e4067a80d5573a928b8d

        SHA1

        8c8c4af10952404746131df3bf3d201132bbebc0

        SHA256

        c2b4f6df45523ba6c6d59794f14b9c1291e3739f9b089ed87833bb3c9e33095d

        SHA512

        5bb4751151a07a721372322f08dc29035fd4c433628f8a696a17d4a257936a69dbaecf94343bd6f71ba49305bfe21f47bb4401680efd6a4444bb729f64900fa9

      • C:\Windows\rss\csrss.exe

        Filesize

        102KB

        MD5

        bfbcd757c3be656b6addcf50c3f4e227

        SHA1

        76b2da95320b0a3f966aa250a8bd6f2a192ac426

        SHA256

        9a2115034419dde30d3dedfd2fc30033f3a80287b2164a0c0979dceddb2fc33c

        SHA512

        fa14dbadf9689a4195868c8f94c101b6a281ba56ff4298a72f5fdb1171abc1c0d8b536f871c06be3ace1925375120de1827bd0a42753babc5d3161da3e77ac88

      • C:\Windows\windefender.exe

        Filesize

        56KB

        MD5

        1df412a416412b37ab371b5e4882b37b

        SHA1

        30b858ba48e40ae658049c0d73aaab0c6e678e50

        SHA256

        ceb63e95e98713be83ee0a77eeb9918dd9d9a5f44fd5851d6b6298d2f19e067f

        SHA512

        e902fe0042cf210d54a3ad18b28de86e8c7b8dc0a9c5da571dd8031ea5608e4ff4a9f9db0d746481a667a3914d09b232fcff8301e383b19c74f80dee0584c8d4

      • C:\Windows\windefender.exe

        Filesize

        146KB

        MD5

        d695dcbeef99961668606b95fb0cf1b3

        SHA1

        f28efdd797cf43d56a1a53d45078274e1445f7e0

        SHA256

        811d447fa4835f1541554ab4e48e519dd33ca3bfdf9e3939ac2682a25f988df7

        SHA512

        1aea5a68315dbea75c360c8bf8a6f5da263a48ecf0892b628751cb5e284d6f82a5fb5579c1d6efdc18b37f417bae0dfce74528d2398e22c11a1654318dc6c064

      • C:\Windows\windefender.exe

        Filesize

        294KB

        MD5

        31cc5226abf55f755a3dc2302f4b79e8

        SHA1

        a504b394af0fe374fdf8172ed562526a71e1d020

        SHA256

        89c563472a22094c05bb906ad89e90e98fb0e5173f7450cc02bb3b47de35b764

        SHA512

        76775865fc73b9193a34dcc725bc3dbc8e44bfa4009dea677f24e0541ac310e299585470b6a7ea127c3be0d836e05067b0d9af73f0d00c2ccfd1c4ef94bcee3c

      • \Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

        Filesize

        281KB

        MD5

        d98e33b66343e7c96158444127a117f6

        SHA1

        bb716c5509a2bf345c6c1152f6e3e1452d39d50d

        SHA256

        5de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1

        SHA512

        705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5

      • \Users\Admin\AppData\Local\Temp\csrss\patch.exe

        Filesize

        395KB

        MD5

        ee38a6f92cef852619fcc4729f7ea3ba

        SHA1

        157e97d09566586f8a9c6eb5d16be2216f7705fd

        SHA256

        eaaba1cd0315f0e347f5c426d070fd52dae00f11b8f2fd3a271069e838bbe88e

        SHA512

        560785b39e1a4b02e648e6f3f9ade115c4dda171d443b8dbe5fd5790f3fcdaeaceb5acb14ae65ccae1d7b533575277bfdd5fb9c69634654869e532628ee5ce7a

      • \Users\Admin\AppData\Local\Temp\dbghelp.dll

        Filesize

        126KB

        MD5

        920a5b31513b5aabe40137f255dda293

        SHA1

        5f0ce33c81b7dcc941fde7eed1833d3bc21b0d14

        SHA256

        d2ce55b09afcf3ab1df85274ffd0c0b8f5bdd736476b518293bbbf46680a0f1d

        SHA512

        c48684ca1a4ab545141ad38f35281c3e9f18df8b7706081bce8f6af06ccaa73f00fd9708fdd3c4581fe428eb3f95352c9a258e7b0a7690b22a664bc2e6e08888

      • \Users\Admin\AppData\Local\Temp\ntkrnlmp.exe

        Filesize

        431KB

        MD5

        3e6026d0abbd9f66b821798f210ff61f

        SHA1

        39e860832435c120ad686e54d6a47eac74157b97

        SHA256

        ddcc9b9ed05d9db7081a09308aaf9d7a467f1a000b306451559e17d5f73134ae

        SHA512

        5bf5dae7e7311e18d689356960a691c11014c40eb8baf5a244cb2908ecda68ca15aa4dd9efe712a38ec452d5541487d36d7e94abefe3bdeb6ebb10143a66b145

      • \Users\Admin\AppData\Local\Temp\ntkrnlmp.exe

        Filesize

        337KB

        MD5

        4c80924b694c5e4b5ce0c8801fd6fe99

        SHA1

        f5b97900f53cfa370190a8d8971296f263058896

        SHA256

        d2c249707f5c11b8ee9f98e22cb45c62de4a250e657fd2d2c02ea740f0d31774

        SHA512

        a35bc0b92886f591b4154ebb5b3ab4fa26d59c8f23260f627af83ffa70e1eadbdcb24183a30f50eb0f145f517e710f736a0d687b120775ae94493eac992257af

      • \Users\Admin\AppData\Local\Temp\ntkrnlmp.exe

        Filesize

        361KB

        MD5

        3f1eeabaf7aa5e0f378f188dad39d72f

        SHA1

        415c545e7f603dcb2f4cc537716201952f032b6d

        SHA256

        346a3795b182dd128fce7e2db1854eb6a8b5b7867217a1968d8ea49c885592b1

        SHA512

        d93e432f5370ba64717e0dc50056f1cbd54968bca7fb7b8e83eb6842828e234a32fe633b40150ff7e34f94a645724dac86fd5eba5aa47ccd30c5ec10623f963b

      • \Users\Admin\AppData\Local\Temp\osloader.exe

        Filesize

        591KB

        MD5

        e2f68dc7fbd6e0bf031ca3809a739346

        SHA1

        9c35494898e65c8a62887f28e04c0359ab6f63f5

        SHA256

        b74cd24cef07f0226e7b777f7862943faee4cf288178b423d5344b0769dc15d4

        SHA512

        26256a12b5b8b3a40b34f18e081cdb45ea11845589c9d458a79385a4b8178f32164b417ddc9346fab8299bc6d4b9fedb620274c4edf9321424f37a2e2a6de579

      • \Users\Admin\AppData\Local\Temp\osloader.exe

        Filesize

        512KB

        MD5

        0791ad03b5d71e572fdcda613e60f59d

        SHA1

        5960ad5786117d07e21990339a62dd5c52ab19a8

        SHA256

        3fe0965e9006310a4816391b26fd4502bdfb8d1f8909b4ec876fc53875185437

        SHA512

        8d4154090d776905500121929266b54d5e96b7379bfc1fe134e7f70112dd9d8f1d184077cd5c5dfe97e6710b1ad0aa169710794bde70d4827dc1f6c4b9233f1b

      • \Users\Admin\AppData\Local\Temp\osloader.exe

        Filesize

        509KB

        MD5

        34dbf8657bc270de5b2ee45339c4d2b5

        SHA1

        94ee80022605ff85ad08b65ceefb3020c435b8ae

        SHA256

        faf3789f5fe381144256ec5a27127b1f1f7f5aa1a526158955531a0fd32dc239

        SHA512

        e2152f088f96fec7df1e87a1d4623a88aa5d5cf3fc69e535af8f4f8820051f9e902c3343db386cda07085bf7be3347f92dfd544628c27bd73fac1f42cb857b41

      • \Users\Admin\AppData\Local\Temp\symsrv.dll

        Filesize

        163KB

        MD5

        5c399d34d8dc01741269ff1f1aca7554

        SHA1

        e0ceed500d3cef5558f3f55d33ba9c3a709e8f55

        SHA256

        e11e0f7804bfc485b19103a940be3d382f31c1378caca0c63076e27797d7553f

        SHA512

        8ff9d38b22d73c595cc417427b59f5ca8e1fb7b47a2fa6aef25322bf6e614d6b71339a752d779bd736b4c1057239100ac8cc62629fd5d6556785a69bcdc3d73d

      • \Windows\rss\csrss.exe

        Filesize

        296KB

        MD5

        5a815cc8f75c5ee0a565db5c8f131068

        SHA1

        374f191dfd4a9f967c6e6a7183a88aba81d7f357

        SHA256

        f7c488a079b6fb2cea442ec7fb23189dab301abc30f21e6249ac3d8586c0e254

        SHA512

        d1e495ea86c6474529a7a78cb1a444eaf6ed8eae48d194dd10d6a853ff47723b0e9318abe9dc3ce8a9516f29b0e089414748f2f3c8b531f62d4e60260f60bffe

      • \Windows\rss\csrss.exe

        Filesize

        281KB

        MD5

        d5a4725405dfcde6468edc4453d3333a

        SHA1

        d731750ce7a4d9781c8efd58a878672c4c6b7a28

        SHA256

        20db80d2f2ab6975977b5acd9a1f1d3f7fa8d4797a814fa2eb16a781aeea7e1b

        SHA512

        941fa7a72d7da4bd2a45425c8a8017652cb832afc7890ebde6de3d48c00165ca340e3c411767a7e6ee1ffcc72444fafcf38f13f8a4e1703ec7da0fdc11b2ce01

      • memory/1212-4-0x0000000000400000-0x0000000000D1C000-memory.dmp

        Filesize

        9.1MB

      • memory/1212-1-0x00000000025D0000-0x00000000029C8000-memory.dmp

        Filesize

        4.0MB

      • memory/1212-2-0x00000000029D0000-0x00000000032BB000-memory.dmp

        Filesize

        8.9MB

      • memory/1212-3-0x0000000000400000-0x0000000000D1C000-memory.dmp

        Filesize

        9.1MB

      • memory/1212-5-0x00000000025D0000-0x00000000029C8000-memory.dmp

        Filesize

        4.0MB

      • memory/1212-6-0x00000000029D0000-0x00000000032BB000-memory.dmp

        Filesize

        8.9MB

      • memory/1212-0-0x00000000025D0000-0x00000000029C8000-memory.dmp

        Filesize

        4.0MB

      • memory/1476-47-0x00000000005B0000-0x0000000000B98000-memory.dmp

        Filesize

        5.9MB

      • memory/1476-55-0x00000000005B0000-0x0000000000B98000-memory.dmp

        Filesize

        5.9MB

      • memory/1764-149-0x0000000000400000-0x00000000008DF000-memory.dmp

        Filesize

        4.9MB

      • memory/1764-147-0x0000000000400000-0x00000000008DF000-memory.dmp

        Filesize

        4.9MB

      • memory/1764-153-0x0000000000400000-0x00000000008DF000-memory.dmp

        Filesize

        4.9MB

      • memory/2552-110-0x0000000000400000-0x0000000000D1C000-memory.dmp

        Filesize

        9.1MB

      • memory/2552-176-0x0000000000400000-0x0000000000D1C000-memory.dmp

        Filesize

        9.1MB

      • memory/2552-33-0x0000000002840000-0x0000000002C38000-memory.dmp

        Filesize

        4.0MB

      • memory/2552-196-0x0000000000400000-0x0000000000D1C000-memory.dmp

        Filesize

        9.1MB

      • memory/2552-111-0x0000000000400000-0x0000000000D1C000-memory.dmp

        Filesize

        9.1MB

      • memory/2552-107-0x0000000002840000-0x0000000002C38000-memory.dmp

        Filesize

        4.0MB

      • memory/2552-106-0x0000000000400000-0x0000000000D1C000-memory.dmp

        Filesize

        9.1MB

      • memory/2552-138-0x0000000000400000-0x0000000000D1C000-memory.dmp

        Filesize

        9.1MB

      • memory/2552-194-0x0000000000400000-0x0000000000D1C000-memory.dmp

        Filesize

        9.1MB

      • memory/2552-192-0x0000000000400000-0x0000000000D1C000-memory.dmp

        Filesize

        9.1MB

      • memory/2552-190-0x0000000000400000-0x0000000000D1C000-memory.dmp

        Filesize

        9.1MB

      • memory/2552-188-0x0000000000400000-0x0000000000D1C000-memory.dmp

        Filesize

        9.1MB

      • memory/2552-186-0x0000000000400000-0x0000000000D1C000-memory.dmp

        Filesize

        9.1MB

      • memory/2552-184-0x0000000000400000-0x0000000000D1C000-memory.dmp

        Filesize

        9.1MB

      • memory/2552-142-0x0000000000400000-0x0000000000D1C000-memory.dmp

        Filesize

        9.1MB

      • memory/2552-148-0x0000000000400000-0x0000000000D1C000-memory.dmp

        Filesize

        9.1MB

      • memory/2552-25-0x0000000002840000-0x0000000002C38000-memory.dmp

        Filesize

        4.0MB

      • memory/2552-150-0x0000000000400000-0x0000000000D1C000-memory.dmp

        Filesize

        9.1MB

      • memory/2552-152-0x0000000000400000-0x0000000000D1C000-memory.dmp

        Filesize

        9.1MB

      • memory/2552-34-0x0000000000400000-0x0000000000D1C000-memory.dmp

        Filesize

        9.1MB

      • memory/2552-154-0x0000000000400000-0x0000000000D1C000-memory.dmp

        Filesize

        9.1MB

      • memory/2552-156-0x0000000000400000-0x0000000000D1C000-memory.dmp

        Filesize

        9.1MB

      • memory/2552-158-0x0000000000400000-0x0000000000D1C000-memory.dmp

        Filesize

        9.1MB

      • memory/2552-160-0x0000000000400000-0x0000000000D1C000-memory.dmp

        Filesize

        9.1MB

      • memory/2552-162-0x0000000000400000-0x0000000000D1C000-memory.dmp

        Filesize

        9.1MB

      • memory/2552-164-0x0000000000400000-0x0000000000D1C000-memory.dmp

        Filesize

        9.1MB

      • memory/2552-166-0x0000000000400000-0x0000000000D1C000-memory.dmp

        Filesize

        9.1MB

      • memory/2552-168-0x0000000000400000-0x0000000000D1C000-memory.dmp

        Filesize

        9.1MB

      • memory/2552-170-0x0000000000400000-0x0000000000D1C000-memory.dmp

        Filesize

        9.1MB

      • memory/2552-172-0x0000000000400000-0x0000000000D1C000-memory.dmp

        Filesize

        9.1MB

      • memory/2552-174-0x0000000000400000-0x0000000000D1C000-memory.dmp

        Filesize

        9.1MB

      • memory/2552-182-0x0000000000400000-0x0000000000D1C000-memory.dmp

        Filesize

        9.1MB

      • memory/2552-178-0x0000000000400000-0x0000000000D1C000-memory.dmp

        Filesize

        9.1MB

      • memory/2552-180-0x0000000000400000-0x0000000000D1C000-memory.dmp

        Filesize

        9.1MB

      • memory/2604-7-0x0000000002610000-0x0000000002A08000-memory.dmp

        Filesize

        4.0MB

      • memory/2604-20-0x0000000002610000-0x0000000002A08000-memory.dmp

        Filesize

        4.0MB

      • memory/2604-19-0x0000000000400000-0x0000000000D1C000-memory.dmp

        Filesize

        9.1MB

      • memory/2604-10-0x0000000000400000-0x0000000000D1C000-memory.dmp

        Filesize

        9.1MB

      • memory/2604-9-0x0000000002A10000-0x00000000032FB000-memory.dmp

        Filesize

        8.9MB

      • memory/2604-8-0x0000000002610000-0x0000000002A08000-memory.dmp

        Filesize

        4.0MB

      • memory/2840-146-0x0000000000400000-0x00000000008DF000-memory.dmp

        Filesize

        4.9MB

      • memory/2840-143-0x0000000000400000-0x00000000008DF000-memory.dmp

        Filesize

        4.9MB