Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/02/2024, 02:31 UTC

General

  • Target

    0a5731f9d5584fe693c78b03d7a9dce42272f7e8d90993dba05591f0eda39c2e.exe

  • Size

    4.1MB

  • MD5

    9f67de870b45ac3c068593f86905284a

  • SHA1

    d468826f2ec199764672d6bc07d1e0c7be9aeb00

  • SHA256

    0a5731f9d5584fe693c78b03d7a9dce42272f7e8d90993dba05591f0eda39c2e

  • SHA512

    f676f1446c62ca4a7d9cfc277af363234e2a21db517946da047e46b7e75c2d78b9256988cc40c8dace9447907480b33ed847d2ff9123d9cd2771f1e77f308a7d

  • SSDEEP

    98304:Jpq1kLNOSvBdeCRYcr3PkTkkA3M3bAqdSAtocmULY5djQ:JpBLUSvBdfY2MIkYibr5ac

Malware Config

Signatures

  • Glupteba

    Glupteba is a modular loader written in Golang with various components.

  • Glupteba payload 19 IoCs
  • Detects Windows executables referencing non-Windows User-Agents 17 IoCs
  • Detects executables Discord URL observed in first stage droppers 17 IoCs
  • Detects executables containing URLs to raw contents of a Github gist 17 IoCs
  • Detects executables containing artifacts associated with disabling Widnows Defender 17 IoCs
  • Detects executables referencing many varying, potentially fake Windows User-Agents 17 IoCs
  • UPX dump on OEP (original entry point) 4 IoCs
  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Executes dropped EXE 4 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Manipulates WinMonFS driver. 1 IoCs

    Roottkits write to WinMonFS to hide directories/files from being detected.

  • Drops file in System32 directory 7 IoCs
  • Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs

    Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.

  • Drops file in Windows directory 4 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\0a5731f9d5584fe693c78b03d7a9dce42272f7e8d90993dba05591f0eda39c2e.exe
    "C:\Users\Admin\AppData\Local\Temp\0a5731f9d5584fe693c78b03d7a9dce42272f7e8d90993dba05591f0eda39c2e.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4644
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      powershell -nologo -noprofile
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2024
    • C:\Users\Admin\AppData\Local\Temp\0a5731f9d5584fe693c78b03d7a9dce42272f7e8d90993dba05591f0eda39c2e.exe
      "C:\Users\Admin\AppData\Local\Temp\0a5731f9d5584fe693c78b03d7a9dce42272f7e8d90993dba05591f0eda39c2e.exe"
      2⤵
      • Adds Run key to start application
      • Checks for VirtualBox DLLs, possible anti-VM trick
      • Drops file in Windows directory
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:4904
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -nologo -noprofile
        3⤵
        • Drops file in System32 directory
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3664
      • C:\Windows\system32\cmd.exe
        C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1700
        • C:\Windows\system32\netsh.exe
          netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
          4⤵
          • Modifies Windows Firewall
          PID:3364
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -nologo -noprofile
        3⤵
        • Drops file in System32 directory
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4876
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -nologo -noprofile
        3⤵
        • Drops file in System32 directory
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3512
      • C:\Windows\rss\csrss.exe
        C:\Windows\rss\csrss.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Manipulates WinMonFS driver.
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2264
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell -nologo -noprofile
          4⤵
          • Drops file in System32 directory
          • Modifies data under HKEY_USERS
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3492
        • C:\Windows\SYSTEM32\schtasks.exe
          schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
          4⤵
          • Creates scheduled task(s)
          PID:4420
        • C:\Windows\SYSTEM32\schtasks.exe
          schtasks /delete /tn ScheduledUpdate /f
          4⤵
            PID:4448
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell -nologo -noprofile
            4⤵
            • Drops file in System32 directory
            • Modifies data under HKEY_USERS
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2340
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell -nologo -noprofile
            4⤵
            • Drops file in System32 directory
            • Modifies data under HKEY_USERS
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1928
          • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
            C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll
            4⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            PID:2636
          • C:\Windows\SYSTEM32\schtasks.exe
            schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
            4⤵
            • Creates scheduled task(s)
            PID:3044
          • C:\Windows\windefender.exe
            "C:\Windows\windefender.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:2988
            • C:\Windows\SysWOW64\cmd.exe
              cmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
              5⤵
              • Suspicious use of WriteProcessMemory
              PID:1460
              • C:\Windows\SysWOW64\sc.exe
                sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
                6⤵
                • Launches sc.exe
                • Suspicious use of AdjustPrivilegeToken
                PID:4772
    • C:\Windows\windefender.exe
      C:\Windows\windefender.exe
      1⤵
      • Executes dropped EXE
      • Modifies data under HKEY_USERS
      PID:1656

    Network

    • flag-us
      DNS
      79.121.231.20.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      79.121.231.20.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      241.150.49.20.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      241.150.49.20.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      173.178.17.96.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      173.178.17.96.in-addr.arpa
      IN PTR
      Response
      173.178.17.96.in-addr.arpa
      IN PTR
      a96-17-178-173deploystaticakamaitechnologiescom
    • flag-us
      DNS
      64.159.190.20.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      64.159.190.20.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      95.221.229.192.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      95.221.229.192.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      217.106.137.52.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      217.106.137.52.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      133.211.185.52.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      133.211.185.52.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      25576252-a825-43a4-88e0-4401c64837ac.uuid.statstraffic.org
      csrss.exe
      Remote address:
      8.8.8.8:53
      Request
      25576252-a825-43a4-88e0-4401c64837ac.uuid.statstraffic.org
      IN TXT
      Response
    • flag-us
      DNS
      stun.ipfire.org
      csrss.exe
      Remote address:
      8.8.8.8:53
      Request
      stun.ipfire.org
      IN A
      Response
      stun.ipfire.org
      IN CNAME
      xmpp.ipfire.org
      xmpp.ipfire.org
      IN A
      81.3.27.44
    • flag-us
      DNS
      server7.statstraffic.org
      csrss.exe
      Remote address:
      8.8.8.8:53
      Request
      server7.statstraffic.org
      IN A
      Response
      server7.statstraffic.org
      IN A
      185.82.216.104
    • flag-us
      DNS
      cdn.discordapp.com
      csrss.exe
      Remote address:
      8.8.8.8:53
      Request
      cdn.discordapp.com
      IN A
      Response
      cdn.discordapp.com
      IN A
      162.159.133.233
      cdn.discordapp.com
      IN A
      162.159.134.233
      cdn.discordapp.com
      IN A
      162.159.135.233
      cdn.discordapp.com
      IN A
      162.159.130.233
      cdn.discordapp.com
      IN A
      162.159.129.233
    • flag-us
      DNS
      walkinglate.com
      csrss.exe
      Remote address:
      8.8.8.8:53
      Request
      walkinglate.com
      IN A
      Response
      walkinglate.com
      IN A
      104.21.23.184
      walkinglate.com
      IN A
      172.67.212.188
    • flag-us
      DNS
      44.27.3.81.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      44.27.3.81.in-addr.arpa
      IN PTR
      Response
      44.27.3.81.in-addr.arpa
      IN PTR
      xmppipfireorg
    • flag-us
      DNS
      233.133.159.162.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      233.133.159.162.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      104.216.82.185.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      104.216.82.185.in-addr.arpa
      IN PTR
      Response
      104.216.82.185.in-addr.arpa
      IN PTR
      dedic-mariadebommarez-1201693hosted-by-itldccom
    • flag-us
      DNS
      184.23.21.104.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      184.23.21.104.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      157.123.68.40.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      157.123.68.40.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      18.31.95.13.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      18.31.95.13.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      18.134.221.88.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      18.134.221.88.in-addr.arpa
      IN PTR
      Response
      18.134.221.88.in-addr.arpa
      IN PTR
      a88-221-134-18deploystaticakamaitechnologiescom
    • flag-us
      DNS
      194.178.17.96.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      194.178.17.96.in-addr.arpa
      IN PTR
      Response
      194.178.17.96.in-addr.arpa
      IN PTR
      a96-17-178-194deploystaticakamaitechnologiescom
    • 162.159.133.233:443
      cdn.discordapp.com
      tls
      csrss.exe
      1.4kB
      7.0kB
      18
      22
    • 185.82.216.104:443
      server7.statstraffic.org
      tls
      csrss.exe
      1.4kB
      5.1kB
      13
      14
    • 104.21.23.184:443
      walkinglate.com
      tls
      csrss.exe
      94.7kB
      2.2MB
      1607
      1634
    • 185.82.216.104:443
      server7.statstraffic.org
      tls
      csrss.exe
      1.3kB
      4.7kB
      11
      13
    • 185.82.216.104:443
      server7.statstraffic.org
      tls
      csrss.exe
      1.9kB
      4.7kB
      11
      13
    • 185.82.216.104:443
      server7.statstraffic.org
      tls
      csrss.exe
      1.7kB
      4.5kB
      8
      9
    • 127.0.0.1:31465
      csrss.exe
    • 8.8.8.8:53
      79.121.231.20.in-addr.arpa
      dns
      72 B
      158 B
      1
      1

      DNS Request

      79.121.231.20.in-addr.arpa

    • 8.8.8.8:53
      241.150.49.20.in-addr.arpa
      dns
      72 B
      158 B
      1
      1

      DNS Request

      241.150.49.20.in-addr.arpa

    • 8.8.8.8:53
      173.178.17.96.in-addr.arpa
      dns
      72 B
      137 B
      1
      1

      DNS Request

      173.178.17.96.in-addr.arpa

    • 8.8.8.8:53
      64.159.190.20.in-addr.arpa
      dns
      72 B
      158 B
      1
      1

      DNS Request

      64.159.190.20.in-addr.arpa

    • 8.8.8.8:53
      95.221.229.192.in-addr.arpa
      dns
      73 B
      144 B
      1
      1

      DNS Request

      95.221.229.192.in-addr.arpa

    • 8.8.8.8:53
      217.106.137.52.in-addr.arpa
      dns
      73 B
      147 B
      1
      1

      DNS Request

      217.106.137.52.in-addr.arpa

    • 8.8.8.8:53
      133.211.185.52.in-addr.arpa
      dns
      73 B
      147 B
      1
      1

      DNS Request

      133.211.185.52.in-addr.arpa

    • 8.8.8.8:53
      25576252-a825-43a4-88e0-4401c64837ac.uuid.statstraffic.org
      dns
      csrss.exe
      104 B
      165 B
      1
      1

      DNS Request

      25576252-a825-43a4-88e0-4401c64837ac.uuid.statstraffic.org

    • 8.8.8.8:53
      stun.ipfire.org
      dns
      csrss.exe
      61 B
      96 B
      1
      1

      DNS Request

      stun.ipfire.org

      DNS Response

      81.3.27.44

    • 8.8.8.8:53
      server7.statstraffic.org
      dns
      csrss.exe
      70 B
      86 B
      1
      1

      DNS Request

      server7.statstraffic.org

      DNS Response

      185.82.216.104

    • 8.8.8.8:53
      cdn.discordapp.com
      dns
      csrss.exe
      64 B
      144 B
      1
      1

      DNS Request

      cdn.discordapp.com

      DNS Response

      162.159.133.233
      162.159.134.233
      162.159.135.233
      162.159.130.233
      162.159.129.233

    • 81.3.27.44:3478
      stun.ipfire.org
      csrss.exe
      48 B
      80 B
      1
      1
    • 8.8.8.8:53
      walkinglate.com
      dns
      csrss.exe
      61 B
      93 B
      1
      1

      DNS Request

      walkinglate.com

      DNS Response

      104.21.23.184
      172.67.212.188

    • 8.8.8.8:53
      44.27.3.81.in-addr.arpa
      dns
      69 B
      98 B
      1
      1

      DNS Request

      44.27.3.81.in-addr.arpa

    • 8.8.8.8:53
      233.133.159.162.in-addr.arpa
      dns
      74 B
      136 B
      1
      1

      DNS Request

      233.133.159.162.in-addr.arpa

    • 8.8.8.8:53
      104.216.82.185.in-addr.arpa
      dns
      73 B
      136 B
      1
      1

      DNS Request

      104.216.82.185.in-addr.arpa

    • 8.8.8.8:53
      184.23.21.104.in-addr.arpa
      dns
      72 B
      134 B
      1
      1

      DNS Request

      184.23.21.104.in-addr.arpa

    • 8.8.8.8:53
      157.123.68.40.in-addr.arpa
      dns
      72 B
      146 B
      1
      1

      DNS Request

      157.123.68.40.in-addr.arpa

    • 8.8.8.8:53
      18.31.95.13.in-addr.arpa
      dns
      70 B
      144 B
      1
      1

      DNS Request

      18.31.95.13.in-addr.arpa

    • 8.8.8.8:53
      18.134.221.88.in-addr.arpa
      dns
      72 B
      137 B
      1
      1

      DNS Request

      18.134.221.88.in-addr.arpa

    • 8.8.8.8:53
      194.178.17.96.in-addr.arpa
      dns
      72 B
      137 B
      1
      1

      DNS Request

      194.178.17.96.in-addr.arpa

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_wo13mrzy.cbs.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

      Filesize

      281KB

      MD5

      d98e33b66343e7c96158444127a117f6

      SHA1

      bb716c5509a2bf345c6c1152f6e3e1452d39d50d

      SHA256

      5de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1

      SHA512

      705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5

    • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

      Filesize

      2KB

      MD5

      968cb9309758126772781b83adb8a28f

      SHA1

      8da30e71accf186b2ba11da1797cf67f8f78b47c

      SHA256

      92099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a

      SHA512

      4bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3

    • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

      Filesize

      19KB

      MD5

      fd8ecef20f42aecd630bee84235bc8b3

      SHA1

      fa02413fc3e37f5da636452065bb77c67b2ba946

      SHA256

      0f4a0a3402c9c75d552d97238b1f49feaae8960d026da5200d8f6c394c40278c

      SHA512

      57d6e1fff243fba8d19194dc408e21e7d965dbcf18247fd906a4ee6b72b0d6e333f691a34b52b254da727d64a399aee5ba2e57a580c5eb4ae9da04f47580701e

    • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

      Filesize

      19KB

      MD5

      dd707740115b5f776cf0851198846fbf

      SHA1

      cce8a897ea70565693c5bde48fa57c5c6a68e2b4

      SHA256

      07d6d5ed583527d8ba54351414383bcc3aac4de70e26d3e6b08628ed6a29109a

      SHA512

      c6bf6bf1c7f952872b996121424a61a8a763214b22666e7f9ed8d8529d7ae60d9977c6b7edaa21db98d948b881a27915424a135038d03a68089360a79870e9b6

    • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

      Filesize

      19KB

      MD5

      270e4bf07f93567a1eb01afe47e783f2

      SHA1

      ed699a71489592b71859291daa1fa0264c01c460

      SHA256

      dcdbd17ddae4b94d122622e2455796588014e169ffdd4aeece52d1899aec89fe

      SHA512

      69ac91516bc77216d849b518a84a2a09a5a7adcc1b822a81d130115d6c1ccfd67f25284539814e469d71572b4fb31287f6a7be8aa8c7d55d4a36be4a7fb152cc

    • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

      Filesize

      19KB

      MD5

      e89060f710ee2a4af90840c82d1f817d

      SHA1

      c7b5fc9b8556af9a028cbead4dff0f8f137f0e52

      SHA256

      e1ed3bf6c437322b441139b4b472276d9355cc0f936120824fc64b422c734053

      SHA512

      9d8fdeb20972cf2772b310b3333554ebc15e715734dc0d2797b55e47fffde7cb57b5f3a284c6629d8d3ae0de64cebc9cd4bbd6d9166ee315d0c663626abe1396

    • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

      Filesize

      19KB

      MD5

      a5f1df456304e0b8a64514b43e8d16a3

      SHA1

      12d5c6f4c41efa4337fa48fcfc49b8a636b099ee

      SHA256

      f3123c4e0fc119895118a07ac5b0d20ad98ee6b803191d269f0b87e7c993094d

      SHA512

      cbf96b64a71cf1ba744462b68c1251569a806d781200afc9b2546b22524436afc90185069f9f08ba1b02948d9d8611d32fefa05ce19551e8ed332045428bc2cf

    • C:\Windows\rss\csrss.exe

      Filesize

      4.0MB

      MD5

      9ef3abb4b328e58d3062119fd6f91196

      SHA1

      cd07cb183295b57c2562cf20d8f3e8d833abe1ce

      SHA256

      3b4d419ad603f3b57dfdb3e91e50732d7a9eb620825d76fec59711b88868f634

      SHA512

      062e2c74fb6f490884121ad514804be07f2f02a387a7f4a2fd738eed00d9ab82653927c5f85a3766b255b3d42f714176b2909c15910e38e23bfad07fdeee2382

    • C:\Windows\rss\csrss.exe

      Filesize

      2.1MB

      MD5

      5ffc3ea234fb485e7fe08b3bc5c51e32

      SHA1

      828b87bcd2b9c743dc6bd53dacafce2e4a73e7d3

      SHA256

      35aeecbd620dddc895cd2699bb5fc3e43e8e8987d453e65af230f768d2930e71

      SHA512

      d0f20621389802b9ffcb7b4ea7c37098100eb547d37d8db7c0a3a614e92e2d174e8e0c74d1e72fd4b3e7eec8c741ea3e81bfedc941b4099d767ab030a4b96b37

    • C:\Windows\windefender.exe

      Filesize

      2.0MB

      MD5

      8e67f58837092385dcf01e8a2b4f5783

      SHA1

      012c49cfd8c5d06795a6f67ea2baf2a082cf8625

      SHA256

      166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa

      SHA512

      40d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec

    • memory/1656-267-0x0000000000400000-0x00000000008DF000-memory.dmp

      Filesize

      4.9MB

    • memory/1656-273-0x0000000000400000-0x00000000008DF000-memory.dmp

      Filesize

      4.9MB

    • memory/2024-40-0x0000000007220000-0x000000000723E000-memory.dmp

      Filesize

      120KB

    • memory/2024-22-0x0000000005CA0000-0x0000000005CEC000-memory.dmp

      Filesize

      304KB

    • memory/2024-24-0x0000000006F80000-0x0000000006FF6000-memory.dmp

      Filesize

      472KB

    • memory/2024-25-0x0000000007680000-0x0000000007CFA000-memory.dmp

      Filesize

      6.5MB

    • memory/2024-26-0x0000000007020000-0x000000000703A000-memory.dmp

      Filesize

      104KB

    • memory/2024-27-0x000000007F730000-0x000000007F740000-memory.dmp

      Filesize

      64KB

    • memory/2024-28-0x00000000071E0000-0x0000000007212000-memory.dmp

      Filesize

      200KB

    • memory/2024-29-0x0000000070110000-0x000000007015C000-memory.dmp

      Filesize

      304KB

    • memory/2024-30-0x0000000070290000-0x00000000705E4000-memory.dmp

      Filesize

      3.3MB

    • memory/2024-41-0x00000000049D0000-0x00000000049E0000-memory.dmp

      Filesize

      64KB

    • memory/2024-8-0x0000000004C00000-0x0000000004C22000-memory.dmp

      Filesize

      136KB

    • memory/2024-42-0x0000000007240000-0x00000000072E3000-memory.dmp

      Filesize

      652KB

    • memory/2024-43-0x0000000007330000-0x000000000733A000-memory.dmp

      Filesize

      40KB

    • memory/2024-44-0x00000000073F0000-0x0000000007486000-memory.dmp

      Filesize

      600KB

    • memory/2024-45-0x0000000007350000-0x0000000007361000-memory.dmp

      Filesize

      68KB

    • memory/2024-46-0x0000000007390000-0x000000000739E000-memory.dmp

      Filesize

      56KB

    • memory/2024-47-0x00000000073A0000-0x00000000073B4000-memory.dmp

      Filesize

      80KB

    • memory/2024-48-0x0000000007490000-0x00000000074AA000-memory.dmp

      Filesize

      104KB

    • memory/2024-49-0x00000000073E0000-0x00000000073E8000-memory.dmp

      Filesize

      32KB

    • memory/2024-52-0x0000000074270000-0x0000000074A20000-memory.dmp

      Filesize

      7.7MB

    • memory/2024-9-0x0000000004DC0000-0x0000000004E26000-memory.dmp

      Filesize

      408KB

    • memory/2024-23-0x00000000061C0000-0x0000000006204000-memory.dmp

      Filesize

      272KB

    • memory/2024-15-0x0000000004F20000-0x0000000004F86000-memory.dmp

      Filesize

      408KB

    • memory/2024-6-0x00000000049D0000-0x00000000049E0000-memory.dmp

      Filesize

      64KB

    • memory/2024-20-0x0000000005770000-0x0000000005AC4000-memory.dmp

      Filesize

      3.3MB

    • memory/2024-4-0x0000000002290000-0x00000000022C6000-memory.dmp

      Filesize

      216KB

    • memory/2024-5-0x0000000074270000-0x0000000074A20000-memory.dmp

      Filesize

      7.7MB

    • memory/2024-7-0x0000000005010000-0x0000000005638000-memory.dmp

      Filesize

      6.2MB

    • memory/2024-21-0x0000000005C60000-0x0000000005C7E000-memory.dmp

      Filesize

      120KB

    • memory/2264-272-0x0000000000400000-0x0000000000D1C000-memory.dmp

      Filesize

      9.1MB

    • memory/2264-284-0x0000000000400000-0x0000000000D1C000-memory.dmp

      Filesize

      9.1MB

    • memory/2264-299-0x0000000000400000-0x0000000000D1C000-memory.dmp

      Filesize

      9.1MB

    • memory/2264-296-0x0000000000400000-0x0000000000D1C000-memory.dmp

      Filesize

      9.1MB

    • memory/2264-293-0x0000000000400000-0x0000000000D1C000-memory.dmp

      Filesize

      9.1MB

    • memory/2264-290-0x0000000000400000-0x0000000000D1C000-memory.dmp

      Filesize

      9.1MB

    • memory/2264-266-0x0000000000400000-0x0000000000D1C000-memory.dmp

      Filesize

      9.1MB

    • memory/2264-269-0x0000000000400000-0x0000000000D1C000-memory.dmp

      Filesize

      9.1MB

    • memory/2264-287-0x0000000000400000-0x0000000000D1C000-memory.dmp

      Filesize

      9.1MB

    • memory/2264-256-0x0000000000400000-0x0000000000D1C000-memory.dmp

      Filesize

      9.1MB

    • memory/2264-281-0x0000000000400000-0x0000000000D1C000-memory.dmp

      Filesize

      9.1MB

    • memory/2264-278-0x0000000000400000-0x0000000000D1C000-memory.dmp

      Filesize

      9.1MB

    • memory/2264-275-0x0000000000400000-0x0000000000D1C000-memory.dmp

      Filesize

      9.1MB

    • memory/2988-264-0x0000000000400000-0x00000000008DF000-memory.dmp

      Filesize

      4.9MB

    • memory/3512-123-0x0000000005380000-0x0000000005390000-memory.dmp

      Filesize

      64KB

    • memory/3512-122-0x0000000074270000-0x0000000074A20000-memory.dmp

      Filesize

      7.7MB

    • memory/3512-136-0x0000000070110000-0x000000007015C000-memory.dmp

      Filesize

      304KB

    • memory/3512-137-0x0000000070890000-0x0000000070BE4000-memory.dmp

      Filesize

      3.3MB

    • memory/3664-72-0x000000007F350000-0x000000007F360000-memory.dmp

      Filesize

      64KB

    • memory/3664-60-0x00000000061A0000-0x00000000064F4000-memory.dmp

      Filesize

      3.3MB

    • memory/3664-62-0x0000000002EB0000-0x0000000002EC0000-memory.dmp

      Filesize

      64KB

    • memory/3664-61-0x0000000002EB0000-0x0000000002EC0000-memory.dmp

      Filesize

      64KB

    • memory/3664-59-0x0000000074270000-0x0000000074A20000-memory.dmp

      Filesize

      7.7MB

    • memory/3664-73-0x0000000070110000-0x000000007015C000-memory.dmp

      Filesize

      304KB

    • memory/3664-90-0x0000000074270000-0x0000000074A20000-memory.dmp

      Filesize

      7.7MB

    • memory/3664-87-0x0000000007C40000-0x0000000007C54000-memory.dmp

      Filesize

      80KB

    • memory/3664-86-0x0000000007BF0000-0x0000000007C01000-memory.dmp

      Filesize

      68KB

    • memory/3664-84-0x00000000078C0000-0x0000000007963000-memory.dmp

      Filesize

      652KB

    • memory/3664-85-0x0000000002EB0000-0x0000000002EC0000-memory.dmp

      Filesize

      64KB

    • memory/3664-74-0x0000000070890000-0x0000000070BE4000-memory.dmp

      Filesize

      3.3MB

    • memory/4644-55-0x0000000002C20000-0x0000000003022000-memory.dmp

      Filesize

      4.0MB

    • memory/4644-3-0x0000000000400000-0x0000000000D1C000-memory.dmp

      Filesize

      9.1MB

    • memory/4644-1-0x0000000002C20000-0x0000000003022000-memory.dmp

      Filesize

      4.0MB

    • memory/4644-58-0x0000000000400000-0x0000000000D1C000-memory.dmp

      Filesize

      9.1MB

    • memory/4644-2-0x0000000003030000-0x000000000391B000-memory.dmp

      Filesize

      8.9MB

    • memory/4876-106-0x000000007F7B0000-0x000000007F7C0000-memory.dmp

      Filesize

      64KB

    • memory/4876-121-0x0000000074270000-0x0000000074A20000-memory.dmp

      Filesize

      7.7MB

    • memory/4876-118-0x0000000004F90000-0x0000000004FA0000-memory.dmp

      Filesize

      64KB

    • memory/4876-107-0x0000000070110000-0x000000007015C000-memory.dmp

      Filesize

      304KB

    • memory/4876-108-0x00000000708B0000-0x0000000070C04000-memory.dmp

      Filesize

      3.3MB

    • memory/4876-119-0x0000000004F90000-0x0000000004FA0000-memory.dmp

      Filesize

      64KB

    • memory/4876-100-0x0000000005E70000-0x00000000061C4000-memory.dmp

      Filesize

      3.3MB

    • memory/4876-92-0x0000000074270000-0x0000000074A20000-memory.dmp

      Filesize

      7.7MB

    • memory/4876-93-0x0000000004F90000-0x0000000004FA0000-memory.dmp

      Filesize

      64KB

    • memory/4876-94-0x0000000004F90000-0x0000000004FA0000-memory.dmp

      Filesize

      64KB

    • memory/4904-155-0x0000000000400000-0x0000000000D1C000-memory.dmp

      Filesize

      9.1MB

    • memory/4904-57-0x0000000000400000-0x0000000000D1C000-memory.dmp

      Filesize

      9.1MB

    • memory/4904-56-0x0000000002F80000-0x000000000386B000-memory.dmp

      Filesize

      8.9MB

    • memory/4904-54-0x0000000002B80000-0x0000000002F79000-memory.dmp

      Filesize

      4.0MB

    • memory/4904-124-0x0000000002B80000-0x0000000002F79000-memory.dmp

      Filesize

      4.0MB

    We care about your privacy.

    This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.