Analysis

  • max time kernel
    147s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    15-04-2024 22:28

General

  • Target

    tmp.exe

  • Size

    384KB

  • MD5

    3170aed3eb44bd638cce6f67650d4b50

  • SHA1

    22519afd371ed56fe6b4b4565534e09d0dd20453

  • SHA256

    d562b3b44859f761645676e0c0e7daad1226c5b90f53b4fe5e5395bf77454ec7

  • SHA512

    7e7c6289de619d06a7ca36fdb11d3d1a04e0913dffcfabac7af71213e2e8c54bb367ecf318b07e40b8734d3a7db92cb5de6f73e99caa9c254eec876130c93f36

  • SSDEEP

    6144:F9b8+wW/Wco9GZbOHqYCGwYyX9Y1J3yVA3Upzm88TKmIImK4E7AjEwYM/vYZu6Yj:Tb8+/hbOHsG46Xx6mWIFNOYM/h8cvB

Malware Config

Signatures

  • Detect ZGRat V1 3 IoCs
  • Glupteba

    Glupteba is a modular loader written in Golang with various components.

  • Glupteba payload 17 IoCs
  • Modifies firewall policy service 2 TTPs 1 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Windows security bypass 2 TTPs 8 IoCs
  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Modifies boot configuration data using bcdedit 1 TTPs 14 IoCs
  • Downloads MZ/PE file
  • Drops file in Drivers directory 1 IoCs
  • Modifies Windows Firewall 2 TTPs 2 IoCs
  • Possible attempt to disable PatchGuard 2 TTPs

    Rootkits can use kernel patching to embed themselves in an operating system.

  • Drops startup file 7 IoCs
  • Executes dropped EXE 14 IoCs
  • Loads dropped DLL 32 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Windows security modification 2 TTPs 8 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Looks up external IP address via web service 4 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Manipulates WinMon driver. 1 IoCs

    Roottkits write to WinMon to hide PIDs from being detected.

  • Manipulates WinMonFS driver. 1 IoCs

    Roottkits write to WinMonFS to hide directories/files from being detected.

  • Drops file in System32 directory 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 2 IoCs

    Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.

  • Drops file in Windows directory 7 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies system certificate store 2 TTPs 9 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 10 IoCs
  • Suspicious use of FindShellTrayWindow 7 IoCs
  • Suspicious use of SendNotifyMessage 7 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\tmp.exe
    "C:\Users\Admin\AppData\Local\Temp\tmp.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2784
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe"
      2⤵
        PID:2932
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"
        2⤵
        • Drops startup file
        • Loads dropped DLL
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2556
        • C:\Users\Admin\Pictures\ziAqY1m0wr81plnCLXSiem8N.exe
          "C:\Users\Admin\Pictures\ziAqY1m0wr81plnCLXSiem8N.exe"
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:2224
          • C:\Users\Admin\AppData\Local\Temp\u1ps.0.exe
            "C:\Users\Admin\AppData\Local\Temp\u1ps.0.exe"
            4⤵
            • Executes dropped EXE
            • Checks processor information in registry
            • Suspicious behavior: EnumeratesProcesses
            PID:1448
          • C:\Users\Admin\AppData\Local\Temp\u1ps.1.exe
            "C:\Users\Admin\AppData\Local\Temp\u1ps.1.exe"
            4⤵
            • Executes dropped EXE
            • Checks SCSI registry key(s)
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of WriteProcessMemory
            PID:348
            • C:\Users\Admin\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe
              "C:\Users\Admin\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe" /eieci=11A12794-499E-4FA0-A281-A9A9AA8B2685 /eipi=5488CB36-BE62-4606-B07B-2EE938868BD1
              5⤵
              • Loads dropped DLL
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1552
        • C:\Users\Admin\Pictures\1FKC5WIg7TzO5fvmTzVtgcpn.exe
          "C:\Users\Admin\Pictures\1FKC5WIg7TzO5fvmTzVtgcpn.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2240
          • C:\Users\Admin\Pictures\1FKC5WIg7TzO5fvmTzVtgcpn.exe
            "C:\Users\Admin\Pictures\1FKC5WIg7TzO5fvmTzVtgcpn.exe"
            4⤵
            • Windows security bypass
            • Executes dropped EXE
            • Windows security modification
            • Adds Run key to start application
            • Checks for VirtualBox DLLs, possible anti-VM trick
            • Drops file in Windows directory
            • Modifies data under HKEY_USERS
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:2764
            • C:\Windows\system32\cmd.exe
              C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
              5⤵
                PID:2332
                • C:\Windows\system32\netsh.exe
                  netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
                  6⤵
                  • Modifies Windows Firewall
                  • Modifies data under HKEY_USERS
                  PID:3068
          • C:\Users\Admin\Pictures\xzDQnTWOMS4aAi0om7eTYDZX.exe
            "C:\Users\Admin\Pictures\xzDQnTWOMS4aAi0om7eTYDZX.exe"
            3⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1544
            • C:\Users\Admin\Pictures\xzDQnTWOMS4aAi0om7eTYDZX.exe
              "C:\Users\Admin\Pictures\xzDQnTWOMS4aAi0om7eTYDZX.exe"
              4⤵
              • Windows security bypass
              • Executes dropped EXE
              • Loads dropped DLL
              • Windows security modification
              • Adds Run key to start application
              • Checks for VirtualBox DLLs, possible anti-VM trick
              • Drops file in Windows directory
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:1572
              • C:\Windows\system32\cmd.exe
                C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
                5⤵
                • Suspicious use of WriteProcessMemory
                PID:2512
                • C:\Windows\system32\netsh.exe
                  netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
                  6⤵
                  • Modifies Windows Firewall
                  • Modifies data under HKEY_USERS
                  PID:1728
              • C:\Windows\rss\csrss.exe
                C:\Windows\rss\csrss.exe
                5⤵
                • Drops file in Drivers directory
                • Executes dropped EXE
                • Loads dropped DLL
                • Adds Run key to start application
                • Manipulates WinMon driver.
                • Manipulates WinMonFS driver.
                • Drops file in Windows directory
                • Modifies system certificate store
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:2692
                • C:\Windows\system32\schtasks.exe
                  schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
                  6⤵
                  • Creates scheduled task(s)
                  PID:496
                • C:\Windows\system32\schtasks.exe
                  schtasks /delete /tn ScheduledUpdate /f
                  6⤵
                    PID:884
                  • C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe
                    "C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe"
                    6⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Modifies system certificate store
                    • Suspicious use of WriteProcessMemory
                    PID:2068
                    • C:\Windows\system32\bcdedit.exe
                      C:\Windows\system32\bcdedit.exe -create {71A3C7FC-F751-4982-AEC1-E958357E6813} -d "Windows Fast Mode" -application OSLOADER
                      7⤵
                      • Modifies boot configuration data using bcdedit
                      PID:1556
                    • C:\Windows\system32\bcdedit.exe
                      C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} device partition=C:
                      7⤵
                      • Modifies boot configuration data using bcdedit
                      PID:112
                    • C:\Windows\system32\bcdedit.exe
                      C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} osdevice partition=C:
                      7⤵
                      • Modifies boot configuration data using bcdedit
                      PID:3064
                    • C:\Windows\system32\bcdedit.exe
                      C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} systemroot \Windows
                      7⤵
                      • Modifies boot configuration data using bcdedit
                      PID:2680
                    • C:\Windows\system32\bcdedit.exe
                      C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} path \Windows\system32\osloader.exe
                      7⤵
                      • Modifies boot configuration data using bcdedit
                      PID:2960
                    • C:\Windows\system32\bcdedit.exe
                      C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} kernel ntkrnlmp.exe
                      7⤵
                      • Modifies boot configuration data using bcdedit
                      PID:3044
                    • C:\Windows\system32\bcdedit.exe
                      C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} recoveryenabled 0
                      7⤵
                      • Modifies boot configuration data using bcdedit
                      PID:2332
                    • C:\Windows\system32\bcdedit.exe
                      C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} nx OptIn
                      7⤵
                      • Modifies boot configuration data using bcdedit
                      PID:2576
                    • C:\Windows\system32\bcdedit.exe
                      C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} nointegritychecks 1
                      7⤵
                      • Modifies boot configuration data using bcdedit
                      PID:2496
                    • C:\Windows\system32\bcdedit.exe
                      C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} inherit {bootloadersettings}
                      7⤵
                      • Modifies boot configuration data using bcdedit
                      PID:1524
                    • C:\Windows\system32\bcdedit.exe
                      C:\Windows\system32\bcdedit.exe -displayorder {71A3C7FC-F751-4982-AEC1-E958357E6813} -addlast
                      7⤵
                      • Modifies boot configuration data using bcdedit
                      PID:2636
                    • C:\Windows\system32\bcdedit.exe
                      C:\Windows\system32\bcdedit.exe -timeout 0
                      7⤵
                      • Modifies boot configuration data using bcdedit
                      PID:2132
                    • C:\Windows\system32\bcdedit.exe
                      C:\Windows\system32\bcdedit.exe -default {71A3C7FC-F751-4982-AEC1-E958357E6813}
                      7⤵
                      • Modifies boot configuration data using bcdedit
                      PID:2492
                  • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
                    C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll
                    6⤵
                    • Executes dropped EXE
                    • Suspicious behavior: EnumeratesProcesses
                    PID:2524
                  • C:\Windows\system32\bcdedit.exe
                    C:\Windows\Sysnative\bcdedit.exe /v
                    6⤵
                    • Modifies boot configuration data using bcdedit
                    PID:2536
                  • C:\Users\Admin\AppData\Local\Temp\csrss\dsefix.exe
                    C:\Users\Admin\AppData\Local\Temp\csrss\dsefix.exe
                    6⤵
                    • Executes dropped EXE
                    PID:2392
                  • C:\Windows\system32\schtasks.exe
                    schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
                    6⤵
                    • Creates scheduled task(s)
                    PID:2360
                  • C:\Windows\windefender.exe
                    "C:\Windows\windefender.exe"
                    6⤵
                    • Executes dropped EXE
                    PID:2764
                    • C:\Windows\SysWOW64\cmd.exe
                      cmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
                      7⤵
                        PID:2180
                        • C:\Windows\SysWOW64\sc.exe
                          sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
                          8⤵
                          • Launches sc.exe
                          • Suspicious use of AdjustPrivilegeToken
                          PID:1544
              • C:\Users\Admin\Pictures\OxaWabUOSbloODKW0LBk3xxV.exe
                "C:\Users\Admin\Pictures\OxaWabUOSbloODKW0LBk3xxV.exe"
                3⤵
                • Modifies firewall policy service
                • Executes dropped EXE
                • Drops file in System32 directory
                PID:704
            • C:\Windows\system32\WerFault.exe
              C:\Windows\system32\WerFault.exe -u -p 2784 -s 664
              2⤵
                PID:2676
            • C:\Windows\system32\makecab.exe
              "C:\Windows\system32\makecab.exe" C:\Windows\Logs\CBS\CbsPersist_20240415222822.log C:\Windows\Logs\CBS\CbsPersist_20240415222822.cab
              1⤵
              • Drops file in Windows directory
              PID:1816
            • C:\Windows\system32\conhost.exe
              \??\C:\Windows\system32\conhost.exe "3913915775033649031233971871-1791207238205973123-18583384097101018861361498261"
              1⤵
                PID:2240
              • C:\Windows\windefender.exe
                C:\Windows\windefender.exe
                1⤵
                • Executes dropped EXE
                • Modifies data under HKEY_USERS
                PID:2224

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

                Filesize

                68KB

                MD5

                29f65ba8e88c063813cc50a4ea544e93

                SHA1

                05a7040d5c127e68c25d81cc51271ffb8bef3568

                SHA256

                1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

                SHA512

                e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                Filesize

                344B

                MD5

                56c0df4f3ca0ae42b40c9b4cebec6d55

                SHA1

                98747060726d9cf9a54b570a4d049b09170f6912

                SHA256

                5d78ff0cf24fa57c064693f9faf4155d30296b25cbf709de6ef50901cbdbfe08

                SHA512

                3d40988ecbdfff48a81c646229a49289df91b015eb0f9d174c42844616d08b3835e13dd6fed7c0e9e968f251bc0b5e2dbc109f5a1bb1c2ac9d2cfabb19fa6b83

              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                Filesize

                344B

                MD5

                92c9acfe1d7f9c39bae9abb5bd2d32f5

                SHA1

                310c5019e69e5b8509e7dc17a5380595d8bee8a0

                SHA256

                7745152c58e54cf4d337e2bc51e77e60e28203b880611704c3ed807d90556754

                SHA512

                4e8f81137a86026517e8706619d99075bea8e9749dbd45ded0e2c9f065ed111e01921c3a853eaaccd00fb669a3f9fdbdccdf68ae257fe648a80db3b284d0d227

              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                Filesize

                344B

                MD5

                4bbff9694f78c6b03fc0e952c5c54b32

                SHA1

                2f8622f75f3f3d5f404b7d5fd8eb171aefcbc44a

                SHA256

                c515cd2bc4e0e4bee742f5758e560bd61a6b26a00fdd50a3639adae93ed3d038

                SHA512

                36a75f794345381a71757ba8abe4fa4b0725a0c3d652457263cfc8eb8bc9319fac9f6246ec4d0b5d36670b6141a17552dbb179594e6fc67027b1a192a5ebd1aa

              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                Filesize

                344B

                MD5

                01118bc9b153c3f22ac06279f7fe7090

                SHA1

                5945d11fa36029842dee173c0daee9e0e883feac

                SHA256

                01a0f16c20d411cf1ed935520efba854b738fbe4e76454115ef5846f7f7ed772

                SHA512

                736197a43eaad59c00b2cc2f5ab5f39cd9468e3ba8d82c44156e810e6cd0966488ee7259002ab84833a13084d86ba21859240b3e4362db3d71c7a1abe7fb697a

              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                Filesize

                344B

                MD5

                1c8ed1d0e40511b2c8d3afeac61b3f09

                SHA1

                b997dc6a5b65f685d11c2d31f034bbfc4571e10b

                SHA256

                049ceb923d88ab2af2bf7c31a350ac2cf72088a46db292d1b7960d9de143b64d

                SHA512

                ce178433b0e4bc989473f02d62746c6073eb243c353045d70f061d487445e440a74e8a75e1d9a537ee36f19074f5d87ef05ad41ab43d68311d39e0ca2f1ebc5a

              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                Filesize

                344B

                MD5

                2df60ae9af49f29685797b362447c83d

                SHA1

                64697b57a5779864c8c1c1a2d2ff43264979aa85

                SHA256

                a55d9373ee58c54ab28e9ec016a03e37047772eb24bdaaaa721a9bb19fe2f7ca

                SHA512

                0130f26b6cd0698c8c24373a7afd53cbbe4ed3aed06c313c9b27ed7a61bbd7f355ce40ea4141de6ce7c7252b93a6c733f0007baa3f1a1193fbe2ca8be7cda8c8

              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                Filesize

                344B

                MD5

                e7aa84c57e6bb23d2367ba4c526e29e2

                SHA1

                0f066accff2d17d3d96c5f8ae7f7b01847bafb02

                SHA256

                77630cc454e823665ceb2046112fbe20093d1e586ff285968252829d9b6f4272

                SHA512

                f260a3541b2e3d5502dd22dea5306a8b39e5d0c175b0c099c93abe08d34be4e127a3ea2ef2c5c454e1b48480babe8e4359a29ee95daa62d880d85071cb2e897d

              • C:\Users\Admin\AppData\Local\Microsoft\ApplicationInsights\a34b5051478c01d83934dd5b0120757f7e5ff041b03ce291cb3621788d299269\1941f51e58e64dc9b3e671f5e6aa4740.tmp

                Filesize

                1KB

                MD5

                c01f2b5e172b1808555ef32659c8c014

                SHA1

                85935a8a25fcbe889bba7cd5e857b7d503ba8433

                SHA256

                ad13cefb9963c8cbad837196d9820e5723246eaf7cddccf33a880da3b97b556e

                SHA512

                2177480a85853ca82542603d4c959bf23d8415d52d9543a3b4fcce0f0a546b3e7b7806df8c1c1937619e7bec83fa2d9f5892db40e51b5c67c1688fbe4111509f

              • C:\Users\Admin\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\AAF33CF37E194E98957768CF9C02DE8E2\download.error

                Filesize

                8.3MB

                MD5

                fd2727132edd0b59fa33733daa11d9ef

                SHA1

                63e36198d90c4c2b9b09dd6786b82aba5f03d29a

                SHA256

                3a72dbedc490773f90e241c8b3b839383a63ce36426a4f330a0f754b14b4d23e

                SHA512

                3e251be7d0e8db92d50092a4c4be3c74f42f3d564c72981f43a8e0fe06427513bfa0f67821a61a503a4f85741f0b150280389f8f4b4f01cdfd98edce5af29e6e

              • C:\Users\Admin\AppData\Local\Temp\Symbols\winload_prod.pdb\768283CA443847FB8822F9DB1F36ECC51\download.error

                Filesize

                492KB

                MD5

                fafbf2197151d5ce947872a4b0bcbe16

                SHA1

                a86eaa2dd9fc6d36fcfb41df7ead8d1166aea020

                SHA256

                feb122b7916a1e62a7a6ae8d25ea48a2efc86f6e6384f5526e18ffbfc5f5ff71

                SHA512

                acbd49a111704d001a4ae44d1a071d566452f92311c5c0099d57548eddc9b3393224792c602022df5c3dd19b0a1fb4eff965bf038c8783ae109336699f9d13f6

              • C:\Users\Admin\AppData\Local\Temp\Tar28AD.tmp

                Filesize

                177KB

                MD5

                435a9ac180383f9fa094131b173a2f7b

                SHA1

                76944ea657a9db94f9a4bef38f88c46ed4166983

                SHA256

                67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

                SHA512

                1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

              • C:\Users\Admin\AppData\Local\Temp\csrss\dsefix.exe

                Filesize

                94KB

                MD5

                d98e78fd57db58a11f880b45bb659767

                SHA1

                ab70c0d3bd9103c07632eeecee9f51d198ed0e76

                SHA256

                414035cc96d8bcc87ed173852a839ffbb45882a98c7a6f7b821e1668891deef0

                SHA512

                aafbd3eee102d0b682c4c854d69d50bac077e48f7f0dd8a5f913c6c73027aed7231d99fc9d716511759800da8c4f0f394b318821e9e47f6e62e436c8725a7831

              • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

                Filesize

                281KB

                MD5

                d98e33b66343e7c96158444127a117f6

                SHA1

                bb716c5509a2bf345c6c1152f6e3e1452d39d50d

                SHA256

                5de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1

                SHA512

                705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5

              • C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe

                Filesize

                1.7MB

                MD5

                13aaafe14eb60d6a718230e82c671d57

                SHA1

                e039dd924d12f264521b8e689426fb7ca95a0a7b

                SHA256

                f44a7deb678ae7bbaaadf88e4c620d7cdf7e6831a1656c456545b1c06feb4ef3

                SHA512

                ade02218c0fd1ef9290c3113cf993dd89e87d4fb66fa1b34afdc73c84876123cd742d2a36d8daa95e2a573d2aa7e880f3c8ba0c5c91916ed15e7c4f6ff847de3

              • C:\Users\Admin\AppData\Local\Temp\iolo\dm\ioloDMLog.txt

                Filesize

                2KB

                MD5

                bd8b16ca7fe4c90e0f63d8da03664558

                SHA1

                277a58f6cadfd2350713052ec9fb3850d43c368e

                SHA256

                eaae9c62c1120ee15c6709172a750fd1cddb805d16a451c4ffa0e3de98824fbe

                SHA512

                7a62bdc22d2f63eadcc987a0985eee60875b96baa7fd74d6ed34a28e6a9f97ed46d3124d11ee7190e4f6412ce3ca4a4396f2cfee8ef1459245cbfe9ec809bda2

              • C:\Users\Admin\AppData\Local\Temp\ntkrnlmp.exe

                Filesize

                5.3MB

                MD5

                1afff8d5352aecef2ecd47ffa02d7f7d

                SHA1

                8b115b84efdb3a1b87f750d35822b2609e665bef

                SHA256

                c41acc53cde89b94d55d6932ddd55a212ba910e1fade3da138670bb5b18ae4e1

                SHA512

                e5dc54c60be702e11772dc729eec5ec7140f293545aa3d57282adacddf686483393b0c940bbd397a9d50a6cda093865b143ae00c51ce3bf5d6b00241f97b3cdb

              • C:\Users\Admin\AppData\Local\Temp\u1ps.1.exe

                Filesize

                4.6MB

                MD5

                397926927bca55be4a77839b1c44de6e

                SHA1

                e10f3434ef3021c399dbba047832f02b3c898dbd

                SHA256

                4f07e1095cc915b2d46eb149d1c3be14f3f4b4bd2742517265947fd23bdca5a7

                SHA512

                cf54136b977fc8af7e8746d78676d0d464362a8cfa2213e392487003b5034562ee802e6911760b98a847bddd36ad664f32d849af84d7e208d4648bd97a2fa954

              • C:\Users\Admin\Pictures\1FKC5WIg7TzO5fvmTzVtgcpn.exe

                Filesize

                4.2MB

                MD5

                469ace49eafd4a129726477ab11ea293

                SHA1

                3b39f6be2721a02162a173fb7c9bd4708e9133c0

                SHA256

                25007f40b1804a744f3f48d581465e2b622ca57889a23379923eb992c6f6f4d0

                SHA512

                65b087a3f56f3621811818fb39bbaa072fadc1fc3a21636c2dbad79e28c9cd69113af30534ab3234912642f2feb60bf17d5caf0515fbef400a74aaeefada71dd

              • C:\Windows\System32\GroupPolicy\gpt.ini

                Filesize

                127B

                MD5

                8ef9853d1881c5fe4d681bfb31282a01

                SHA1

                a05609065520e4b4e553784c566430ad9736f19f

                SHA256

                9228f13d82c3dc96b957769f6081e5bac53cffca4ffde0ba1e102d9968f184a2

                SHA512

                5ddee931a08cfea5bb9d1c36355d47155a24d617c2a11d08364ffc54e593064011dee4fea8ac5b67029cab515d3071f0ba0422bb76af492a3115272ba8feb005

              • C:\Windows\windefender.exe

                Filesize

                2.0MB

                MD5

                8e67f58837092385dcf01e8a2b4f5783

                SHA1

                012c49cfd8c5d06795a6f67ea2baf2a082cf8625

                SHA256

                166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa

                SHA512

                40d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec

              • \Users\Admin\AppData\Local\Temp\dbghelp.dll

                Filesize

                1.5MB

                MD5

                f0616fa8bc54ece07e3107057f74e4db

                SHA1

                b33995c4f9a004b7d806c4bb36040ee844781fca

                SHA256

                6e58fcf4d763022b1f79a3c448eb2ebd8ad1c15df3acf58416893f1cbc699026

                SHA512

                15242e3f5652d7f1d0e31cebadfe2f238ca3222f0e927eb7feb644ab2b3d33132cf2316ee5089324f20f72f1650ad5bb8dd82b96518386ce5b319fb5ceb8313c

              • \Users\Admin\AppData\Local\Temp\osloader.exe

                Filesize

                591KB

                MD5

                e2f68dc7fbd6e0bf031ca3809a739346

                SHA1

                9c35494898e65c8a62887f28e04c0359ab6f63f5

                SHA256

                b74cd24cef07f0226e7b777f7862943faee4cf288178b423d5344b0769dc15d4

                SHA512

                26256a12b5b8b3a40b34f18e081cdb45ea11845589c9d458a79385a4b8178f32164b417ddc9346fab8299bc6d4b9fedb620274c4edf9321424f37a2e2a6de579

              • \Users\Admin\AppData\Local\Temp\symsrv.dll

                Filesize

                163KB

                MD5

                5c399d34d8dc01741269ff1f1aca7554

                SHA1

                e0ceed500d3cef5558f3f55d33ba9c3a709e8f55

                SHA256

                e11e0f7804bfc485b19103a940be3d382f31c1378caca0c63076e27797d7553f

                SHA512

                8ff9d38b22d73c595cc417427b59f5ca8e1fb7b47a2fa6aef25322bf6e614d6b71339a752d779bd736b4c1057239100ac8cc62629fd5d6556785a69bcdc3d73d

              • \Users\Admin\AppData\Local\Temp\u1ps.0.exe

                Filesize

                361KB

                MD5

                734b17e8c2eea84385e6766b2082bf05

                SHA1

                7c0d0b3e7691e5aedda0bc846368e41d2548ef61

                SHA256

                e8fb9b60192a6464947d0a921c06e9ce6e1b3c6796bbe2d55fdbca4457b892f7

                SHA512

                95b8c0fc0058f13eb742004a0ecab79f7c2ca755a74a57accb8dcd733f8fcb08b47ac8a016d027ba3b36a2c4ceb5d8e50f7cf363791ca417c748e4e7bb946857

              • \Users\Admin\Pictures\OxaWabUOSbloODKW0LBk3xxV.exe

                Filesize

                5.0MB

                MD5

                5111c44e0409c72968f79ca056e3fcfb

                SHA1

                7bcc5651b0143ea7df58ea521ab9c6b283666765

                SHA256

                7d308f38489962f4594dcd26e74f3404431cb79019a07194fbe9d27f39bcff6a

                SHA512

                0a17998f99bef19cc6936e19dc0e42df893d623ab53cd72ddf572ad13e8a7057de41e03b9e1854e137c1012af4d40d448b47ac1a8d8ea179f9de07f46374b828

              • \Users\Admin\Pictures\ziAqY1m0wr81plnCLXSiem8N.exe

                Filesize

                461KB

                MD5

                c3fefdfe50fa8faa402a547b38132dad

                SHA1

                d0ffef80bcfbf2e1e8345252fe3af39661e3fbff

                SHA256

                d6bcf44f79672c7a1e3ea4b9cf1e64135e0c6ece1f72dcabdee781fe64386d8c

                SHA512

                c9fa8f303ad284766955268803816adb86c5e1ae917a0f7cef1743ab3a0566105be2a5ba08772b024537c14e06b1ae40a311e551c1e7ef3df88f564430771171

              • memory/348-617-0x0000000000400000-0x00000000008AD000-memory.dmp

                Filesize

                4.7MB

              • memory/348-603-0x00000000001C0000-0x00000000001C1000-memory.dmp

                Filesize

                4KB

              • memory/348-489-0x00000000001C0000-0x00000000001C1000-memory.dmp

                Filesize

                4KB

              • memory/348-598-0x0000000000400000-0x00000000008AD000-memory.dmp

                Filesize

                4.7MB

              • memory/704-447-0x000000013F2E0000-0x000000013FE66000-memory.dmp

                Filesize

                11.5MB

              • memory/704-476-0x000000013F2E0000-0x000000013FE66000-memory.dmp

                Filesize

                11.5MB

              • memory/1448-433-0x0000000000220000-0x0000000000247000-memory.dmp

                Filesize

                156KB

              • memory/1448-437-0x0000000000400000-0x0000000002D38000-memory.dmp

                Filesize

                41.2MB

              • memory/1448-674-0x0000000000400000-0x0000000002D38000-memory.dmp

                Filesize

                41.2MB

              • memory/1448-559-0x0000000002EC0000-0x0000000002FC0000-memory.dmp

                Filesize

                1024KB

              • memory/1448-557-0x0000000000400000-0x0000000002D38000-memory.dmp

                Filesize

                41.2MB

              • memory/1448-432-0x0000000002EC0000-0x0000000002FC0000-memory.dmp

                Filesize

                1024KB

              • memory/1448-620-0x0000000061E00000-0x0000000061EF3000-memory.dmp

                Filesize

                972KB

              • memory/1544-438-0x0000000004A80000-0x0000000004E78000-memory.dmp

                Filesize

                4.0MB

              • memory/1544-441-0x0000000004A80000-0x0000000004E78000-memory.dmp

                Filesize

                4.0MB

              • memory/1544-442-0x0000000000400000-0x000000000311B000-memory.dmp

                Filesize

                45.1MB

              • memory/1544-485-0x0000000000400000-0x000000000311B000-memory.dmp

                Filesize

                45.1MB

              • memory/1552-673-0x000000001EB50000-0x000000001EB5C000-memory.dmp

                Filesize

                48KB

              • memory/1552-631-0x000000001EA10000-0x000000001EA90000-memory.dmp

                Filesize

                512KB

              • memory/1552-657-0x000000001E980000-0x000000001E9FA000-memory.dmp

                Filesize

                488KB

              • memory/1552-655-0x00000000058E0000-0x000000000590A000-memory.dmp

                Filesize

                168KB

              • memory/1552-668-0x000000001EC60000-0x000000001EC82000-memory.dmp

                Filesize

                136KB

              • memory/1552-669-0x000000001EA10000-0x000000001EA90000-memory.dmp

                Filesize

                512KB

              • memory/1552-640-0x000000001EFD0000-0x000000001F0E0000-memory.dmp

                Filesize

                1.1MB

              • memory/1552-656-0x000000001F4B0000-0x000000001F562000-memory.dmp

                Filesize

                712KB

              • memory/1552-679-0x000000001EA10000-0x000000001EA90000-memory.dmp

                Filesize

                512KB

              • memory/1552-659-0x00000000004D0000-0x00000000004DA000-memory.dmp

                Filesize

                40KB

              • memory/1552-663-0x000000001FB20000-0x000000001FE20000-memory.dmp

                Filesize

                3.0MB

              • memory/1552-619-0x0000000000BB0000-0x00000000044A8000-memory.dmp

                Filesize

                57.0MB

              • memory/1552-618-0x000007FEF5660000-0x000007FEF604C000-memory.dmp

                Filesize

                9.9MB

              • memory/1552-658-0x000000001EAE0000-0x000000001EB42000-memory.dmp

                Filesize

                392KB

              • memory/1552-672-0x000000001EA10000-0x000000001EA90000-memory.dmp

                Filesize

                512KB

              • memory/1552-684-0x000000001EA10000-0x000000001EA90000-memory.dmp

                Filesize

                512KB

              • memory/1552-654-0x00000000004C0000-0x00000000004CA000-memory.dmp

                Filesize

                40KB

              • memory/1552-644-0x000000001EAC0000-0x000000001EAE4000-memory.dmp

                Filesize

                144KB

              • memory/1552-643-0x0000000000A30000-0x0000000000A44000-memory.dmp

                Filesize

                80KB

              • memory/1552-642-0x000000001DFB0000-0x000000001DFBC000-memory.dmp

                Filesize

                48KB

              • memory/1552-683-0x000000001EA10000-0x000000001EA90000-memory.dmp

                Filesize

                512KB

              • memory/1552-665-0x0000000005920000-0x000000000592A000-memory.dmp

                Filesize

                40KB

              • memory/1552-667-0x000000001EB40000-0x000000001EB4A000-memory.dmp

                Filesize

                40KB

              • memory/1552-641-0x0000000000360000-0x0000000000370000-memory.dmp

                Filesize

                64KB

              • memory/1552-681-0x0000000005920000-0x000000000592A000-memory.dmp

                Filesize

                40KB

              • memory/1552-680-0x0000000005920000-0x000000000592A000-memory.dmp

                Filesize

                40KB

              • memory/1552-666-0x000000001EA10000-0x000000001EA90000-memory.dmp

                Filesize

                512KB

              • memory/1552-678-0x000007FEF5660000-0x000007FEF604C000-memory.dmp

                Filesize

                9.9MB

              • memory/1572-505-0x0000000000400000-0x000000000311B000-memory.dmp

                Filesize

                45.1MB

              • memory/1572-532-0x0000000000400000-0x000000000311B000-memory.dmp

                Filesize

                45.1MB

              • memory/1572-491-0x0000000004A60000-0x0000000004E58000-memory.dmp

                Filesize

                4.0MB

              • memory/1572-490-0x0000000004A60000-0x0000000004E58000-memory.dmp

                Filesize

                4.0MB

              • memory/2068-579-0x0000000140000000-0x00000001405E8000-memory.dmp

                Filesize

                5.9MB

              • memory/2068-563-0x0000000140000000-0x00000001405E8000-memory.dmp

                Filesize

                5.9MB

              • memory/2224-209-0x0000000002E00000-0x0000000002F00000-memory.dmp

                Filesize

                1024KB

              • memory/2224-225-0x0000000000320000-0x000000000038C000-memory.dmp

                Filesize

                432KB

              • memory/2224-307-0x0000000000400000-0x0000000002D51000-memory.dmp

                Filesize

                41.3MB

              • memory/2224-486-0x0000000002E00000-0x0000000002F00000-memory.dmp

                Filesize

                1024KB

              • memory/2224-475-0x0000000000400000-0x0000000002D51000-memory.dmp

                Filesize

                41.3MB

              • memory/2240-403-0x0000000004F00000-0x00000000057EB000-memory.dmp

                Filesize

                8.9MB

              • memory/2240-459-0x0000000004B00000-0x0000000004EF8000-memory.dmp

                Filesize

                4.0MB

              • memory/2240-399-0x0000000004B00000-0x0000000004EF8000-memory.dmp

                Filesize

                4.0MB

              • memory/2240-400-0x0000000004B00000-0x0000000004EF8000-memory.dmp

                Filesize

                4.0MB

              • memory/2240-402-0x0000000000400000-0x000000000311B000-memory.dmp

                Filesize

                45.1MB

              • memory/2240-452-0x0000000000400000-0x000000000311B000-memory.dmp

                Filesize

                45.1MB

              • memory/2556-12-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

                Filesize

                4KB

              • memory/2556-19-0x0000000004620000-0x0000000004660000-memory.dmp

                Filesize

                256KB

              • memory/2556-17-0x0000000000400000-0x0000000000408000-memory.dmp

                Filesize

                32KB

              • memory/2556-15-0x0000000000400000-0x0000000000408000-memory.dmp

                Filesize

                32KB

              • memory/2556-13-0x0000000000400000-0x0000000000408000-memory.dmp

                Filesize

                32KB

              • memory/2556-456-0x0000000004620000-0x0000000004660000-memory.dmp

                Filesize

                256KB

              • memory/2556-10-0x0000000000400000-0x0000000000408000-memory.dmp

                Filesize

                32KB

              • memory/2556-8-0x0000000000400000-0x0000000000408000-memory.dmp

                Filesize

                32KB

              • memory/2556-446-0x00000000749E0000-0x00000000750CE000-memory.dmp

                Filesize

                6.9MB

              • memory/2556-6-0x0000000000400000-0x0000000000408000-memory.dmp

                Filesize

                32KB

              • memory/2556-4-0x0000000000400000-0x0000000000408000-memory.dmp

                Filesize

                32KB

              • memory/2556-18-0x00000000749E0000-0x00000000750CE000-memory.dmp

                Filesize

                6.9MB

              • memory/2692-539-0x00000000049B0000-0x0000000004DA8000-memory.dmp

                Filesize

                4.0MB

              • memory/2692-633-0x0000000000400000-0x000000000311B000-memory.dmp

                Filesize

                45.1MB

              • memory/2692-629-0x0000000000400000-0x000000000311B000-memory.dmp

                Filesize

                45.1MB

              • memory/2692-537-0x00000000049B0000-0x0000000004DA8000-memory.dmp

                Filesize

                4.0MB

              • memory/2692-682-0x0000000000400000-0x000000000311B000-memory.dmp

                Filesize

                45.1MB

              • memory/2692-602-0x0000000000400000-0x000000000311B000-memory.dmp

                Filesize

                45.1MB

              • memory/2692-731-0x0000000000400000-0x000000000311B000-memory.dmp

                Filesize

                45.1MB

              • memory/2692-702-0x0000000000400000-0x000000000311B000-memory.dmp

                Filesize

                45.1MB

              • memory/2692-695-0x0000000000400000-0x000000000311B000-memory.dmp

                Filesize

                45.1MB

              • memory/2692-544-0x0000000000400000-0x000000000311B000-memory.dmp

                Filesize

                45.1MB

              • memory/2764-538-0x0000000000400000-0x000000000311B000-memory.dmp

                Filesize

                45.1MB

              • memory/2764-457-0x0000000004BB0000-0x0000000004FA8000-memory.dmp

                Filesize

                4.0MB

              • memory/2764-454-0x0000000004BB0000-0x0000000004FA8000-memory.dmp

                Filesize

                4.0MB

              • memory/2764-458-0x0000000000400000-0x000000000311B000-memory.dmp

                Filesize

                45.1MB

              • memory/2784-431-0x000007FEF5660000-0x000007FEF604C000-memory.dmp

                Filesize

                9.9MB

              • memory/2784-3-0x0000000002080000-0x00000000020DE000-memory.dmp

                Filesize

                376KB

              • memory/2784-2-0x000000001B0E0000-0x000000001B160000-memory.dmp

                Filesize

                512KB

              • memory/2784-1-0x000007FEF5660000-0x000007FEF604C000-memory.dmp

                Filesize

                9.9MB

              • memory/2784-440-0x000000001B0E0000-0x000000001B160000-memory.dmp

                Filesize

                512KB

              • memory/2784-0-0x00000000009C0000-0x00000000009CA000-memory.dmp

                Filesize

                40KB