Analysis

  • max time kernel
    148s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-04-2023 11:45

General

  • Target

    tmpw1impcfu.exe

  • Size

    1.5MB

  • MD5

    26d46c2c07d584f1a04280f47182e909

  • SHA1

    381ec91ba5c4206be19a10a1cb0d2328a9385d71

  • SHA256

    295ebe6ba820bb813c6e9dd5526bf194a8da0268085ba0fc805f19c1ae3c6186

  • SHA512

    3cd2e063ed27a84cfa2513e76a77f6ed8a7987ff42f1e5e9ab9400491b1cfc0b407945ca09ab1a839807ac850a44a0521aa5fa2f9a90c9bd2df1ee0eefc3c8c0

  • SSDEEP

    24576:D1fkORzjCc1R7CIPVQ/NcnBZuSAszPeo28pW4NiocXtWLezho6OrHRYfDz:Dabc7nyNgqSHzPj3zDYt8EhuWf

Malware Config

Extracted

Family

blustealer

C2

https://api.telegram.org/bot5797428905:AAGaRRXGZN1d9GGFd3sE5x4uSpCGF0PU4m4/sendMessage?chat_id=1251788325

Signatures

  • BluStealer

    A Modular information stealer written in Visual Basic.

  • Executes dropped EXE 22 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Drops file in System32 directory 31 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 64 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 64 IoCs
  • Script User-Agent 1 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: EnumeratesProcesses 35 IoCs
  • Suspicious behavior: LoadsDriver 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 43 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\tmpw1impcfu.exe
    "C:\Users\Admin\AppData\Local\Temp\tmpw1impcfu.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1908
    • C:\Users\Admin\AppData\Local\Temp\tmpw1impcfu.exe
      "C:\Users\Admin\AppData\Local\Temp\tmpw1impcfu.exe"
      2⤵
      • Drops file in System32 directory
      • Suspicious use of SetThreadContext
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4636
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
        3⤵
        • Accesses Microsoft Outlook profiles
        • outlook_office_path
        • outlook_win_path
        PID:3576
  • C:\Windows\System32\alg.exe
    C:\Windows\System32\alg.exe
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    PID:1516
  • C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe
    C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe
    1⤵
    • Executes dropped EXE
    PID:4456
  • C:\Windows\System32\svchost.exe
    C:\Windows\System32\svchost.exe -k NetworkService -p -s TapiSrv
    1⤵
      PID:4060
    • C:\Windows\system32\fxssvc.exe
      C:\Windows\system32\fxssvc.exe
      1⤵
      • Executes dropped EXE
      • Modifies data under HKEY_USERS
      • Suspicious use of AdjustPrivilegeToken
      PID:4644
    • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
      "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
      1⤵
      • Executes dropped EXE
      PID:4800
    • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"
      1⤵
      • Executes dropped EXE
      PID:1304
    • C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe
      "C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"
      1⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      PID:2912
    • C:\Windows\System32\msdtc.exe
      C:\Windows\System32\msdtc.exe
      1⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Drops file in Windows directory
      PID:4996
    • \??\c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE
      "c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"
      1⤵
      • Executes dropped EXE
      PID:1992
    • C:\Windows\system32\PerceptionSimulation\PerceptionSimulationService.exe
      C:\Windows\system32\PerceptionSimulation\PerceptionSimulationService.exe
      1⤵
      • Executes dropped EXE
      PID:4248
    • C:\Windows\SysWow64\perfhost.exe
      C:\Windows\SysWow64\perfhost.exe
      1⤵
      • Executes dropped EXE
      PID:4176
    • C:\Windows\system32\locator.exe
      C:\Windows\system32\locator.exe
      1⤵
      • Executes dropped EXE
      PID:1744
    • C:\Windows\System32\SensorDataService.exe
      C:\Windows\System32\SensorDataService.exe
      1⤵
      • Executes dropped EXE
      • Checks SCSI registry key(s)
      PID:2088
    • C:\Windows\System32\snmptrap.exe
      C:\Windows\System32\snmptrap.exe
      1⤵
      • Executes dropped EXE
      PID:4156
    • C:\Windows\system32\spectrum.exe
      C:\Windows\system32\spectrum.exe
      1⤵
      • Executes dropped EXE
      • Checks SCSI registry key(s)
      PID:3084
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k LocalService -p -s SharedRealitySvc
      1⤵
        PID:4412
      • C:\Windows\System32\OpenSSH\ssh-agent.exe
        C:\Windows\System32\OpenSSH\ssh-agent.exe
        1⤵
        • Executes dropped EXE
        PID:4820
      • C:\Windows\system32\TieringEngineService.exe
        C:\Windows\system32\TieringEngineService.exe
        1⤵
        • Executes dropped EXE
        • Checks processor information in registry
        • Suspicious use of AdjustPrivilegeToken
        PID:4124
      • C:\Windows\system32\AgentService.exe
        C:\Windows\system32\AgentService.exe
        1⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:3908
      • C:\Windows\System32\vds.exe
        C:\Windows\System32\vds.exe
        1⤵
        • Executes dropped EXE
        PID:432
      • C:\Windows\system32\vssvc.exe
        C:\Windows\system32\vssvc.exe
        1⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:5040
      • C:\Windows\system32\wbengine.exe
        "C:\Windows\system32\wbengine.exe"
        1⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:5052
      • C:\Windows\system32\wbem\WmiApSrv.exe
        C:\Windows\system32\wbem\WmiApSrv.exe
        1⤵
        • Executes dropped EXE
        PID:5076
      • C:\Windows\system32\SearchIndexer.exe
        C:\Windows\system32\SearchIndexer.exe /Embedding
        1⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1796
        • C:\Windows\system32\SearchProtocolHost.exe
          "C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe1_ Global\UsGthrCtrlFltPipeMssGthrPipe1 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon"
          2⤵
          • Modifies data under HKEY_USERS
          PID:4528
        • C:\Windows\system32\SearchFilterHost.exe
          "C:\Windows\system32\SearchFilterHost.exe" 0 912 916 924 8192 920 896
          2⤵
          • Modifies data under HKEY_USERS
          PID:3724

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe

        Filesize

        2.1MB

        MD5

        2b3adf4f1d6ccf97d0d727796d77fbab

        SHA1

        f83a1ff40417acac6f6e7510e411622fe0a854af

        SHA256

        6a1ea8cdd94a25589f0fa226909be34e715c7f85274aec38260663e3edc31e83

        SHA512

        1900b316e500100a3c1c9c09827e85dad33f449078abf5393a41da624161c1beac1371bd4136bc9ece062741e6f4b88f8fd012c8341122e6a7f708202a3c9eae

      • C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe

        Filesize

        1.4MB

        MD5

        b0002f4dd7c3f52a060bdcab8fbd07e6

        SHA1

        4d055e5c61e5b842d70bea053220400f367e307f

        SHA256

        656dd62045fc6d2ca86e5d4dd41b56bfcb764321db7e87028bba5971b8990ca1

        SHA512

        bb584b1abf24e0002c1810ed830106f6682b1416ccd1ff0e1956057776de9fc0c30e0786e9f619f549923f396eea2bacf1d01d61079a6071c657821d1de91aa6

      • C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe

        Filesize

        1.4MB

        MD5

        b0002f4dd7c3f52a060bdcab8fbd07e6

        SHA1

        4d055e5c61e5b842d70bea053220400f367e307f

        SHA256

        656dd62045fc6d2ca86e5d4dd41b56bfcb764321db7e87028bba5971b8990ca1

        SHA512

        bb584b1abf24e0002c1810ed830106f6682b1416ccd1ff0e1956057776de9fc0c30e0786e9f619f549923f396eea2bacf1d01d61079a6071c657821d1de91aa6

      • C:\Program Files\7-Zip\7z.exe

        Filesize

        1.7MB

        MD5

        eb71ec226bb9714bd06bf364f09815a3

        SHA1

        7e3040c5960897156968e6f9009437847a42a3ff

        SHA256

        47a56dfc955a453d47f7420d7b942beedcc7509ba606b30915d33f87a77d1d9b

        SHA512

        24a18ecd51288178303d92cfa7839aaeb7dea5dc78f1b0b045ee91d448c00159a3433ce1b8152217690095630bf76b80dbeb671d4a81ad4f34832fa7970f8b60

      • C:\Program Files\7-Zip\7zFM.exe

        Filesize

        1.4MB

        MD5

        341c5d7296f796a299edbcc351ed23ce

        SHA1

        f5ab3cb9f8ba32994b5aaf1d1eee6c35094269be

        SHA256

        c844fae0526ed1fee2669e5151c97fdbfacf2d590b99e5a853db805b80954fbf

        SHA512

        840c986b7a9eba53e928de74daa9b49a212246c0f2ffa5a870e981d660584a7110f80ca24f5fb56632d4d2e66df9681f58bae7e4e315fa1fa21da2b21431ac3a

      • C:\Program Files\7-Zip\7zG.exe

        Filesize

        1.1MB

        MD5

        83f69f39158ac9c5fa3e130c320116ed

        SHA1

        2288a407898b1cf7e78128c9b27810da5b80bf2b

        SHA256

        a721cd2003ee40355dff2883adc8e786febfafbc8e7caa08788cc4c659054409

        SHA512

        ebb5f181db0a64341204dd8a22fbf13230d1a9be1445b521d3e1a52c865db32e56c46bc2bb0b106cea8208ebf479d846612540f1375c066d3e57d599899dff6a

      • C:\Program Files\7-Zip\Uninstall.exe

        Filesize

        1.2MB

        MD5

        124c25cc6622daf2c3237db297dd86f0

        SHA1

        9ecf8f36077551e3b305853b9f1652b913e07994

        SHA256

        a4759df8f94d25bf75427ca640320098a8dca94dac9ff699fb9e87fa4402ccfb

        SHA512

        ae71d432b9adcdbfbfdc080c456e8fe3726154cba9338933bb603ad95321e8f95949085d01a53e963b8a5f610f51f2b80057e05a03281744ac5d1d63c4732dc7

      • C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVShNotify.exe

        Filesize

        1.5MB

        MD5

        674bdd67d641a4041d09fe46c2167126

        SHA1

        d6292115dfe0fd4881a6e3e265428a42387e0616

        SHA256

        d90f75d4523727140b13f554d184a7d098bf0c67b5ecfaf88fc106bfb1f17c0c

        SHA512

        8ac7853af1696e588c0b27074a2768057bc130fb694e92befdb81fbe9a63c57d3b854ee9fa0b689b531ea7e977c18949630fff9c06c7c0759923639b584beac1

      • C:\Program Files\Common Files\microsoft shared\ClickToRun\IntegratedOffice.exe

        Filesize

        4.6MB

        MD5

        f8f99a89589d41d4eda39dd4594a1875

        SHA1

        ec0f89e113aed99f3e474c50f5ce33d57ff107e0

        SHA256

        58d4370ef8b198aa7cad675a980f5923353bf4ba6efc1bb8f7a01ac078a5bb4d

        SHA512

        aa0c57c0441ee65b783f0a106ff736f8554b9a7443596f021e628983c5f4e3a6d1dadb6953a41179d3b1b85964df7e60ed5f512629331eb657c8f85417227e2b

      • C:\Program Files\Common Files\microsoft shared\ClickToRun\MavInject32.exe

        Filesize

        1.6MB

        MD5

        fcc9b73eac6ff14936f89e3f4e7430da

        SHA1

        76ab4a01d56b9917292695d07295aa924fb9a72c

        SHA256

        9825eff475c30007eef733c66c0b32a12d62cdac520081ba688a8785c2f3cf7b

        SHA512

        37ead2a3d38f9378594e5462564c3375bd0199e9d2bcec00d7ace8a6057efd8355961ebba58f6f70bee5b4f658a30b1bd74f1d7403d29d95a51f385da5f273ed

      • C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeC2RClient.exe

        Filesize

        5.9MB

        MD5

        d94ccf4d21c16f98a2d65653543be534

        SHA1

        f527f4108c98e26361bca8f24782a74d5b7e18e5

        SHA256

        e60dd98aab134f62636e0f1b94cca18759a07a01b2982230d76c558833880bda

        SHA512

        3932d54ece124b610a58b01b75abad12f4639cee98aed4cf2d4553f6bad06f69bf8f167ff71099130a1c997281ecafe6540a743beea406a2cac81bb6a1f5e512

      • C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe

        Filesize

        2.7MB

        MD5

        2877454ec3140a3da99c91832815ec69

        SHA1

        f0aa10c26968a72607693a3778673cfdfb41ade6

        SHA256

        9194972e10d9a78870e3f511fb6cafdaf5b22288ccda27385db0a5f60601efd5

        SHA512

        98ac876c465d172608f4158101fdd5b337cd46b6e67ce68c59b910c99c80b8f8ef2b8ae16706c8a601ab9ea90addc47e23622d77cef88775eb081fa9ac503e2e

      • C:\Program Files\Common Files\microsoft shared\Source Engine\OSE.EXE

        Filesize

        1.5MB

        MD5

        d69d13e60914d526221f542387af8735

        SHA1

        3cbff914cb4f3296ced02a13602152d7a1b0ad7a

        SHA256

        91449467409e11738b9da2a992e294135b1092ed72aca6b68da89de782087f5f

        SHA512

        d3b072724bcdeeba050215bf4c70d96bae94b73416bbf57745998457a65c1df6cd960cf61b26af37b91480b754c98b16ac83e54380b671b15b24b9515a6d3eac

      • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe

        Filesize

        2.1MB

        MD5

        6745ad7a8d5b83b6132a55ea5123dbde

        SHA1

        bab811e86df4d18638a8bb2975068a5f42f009c8

        SHA256

        7b4fc7aed52a666a813f115b4cd564bad4f0d2180c88b102e290a6f5212d1c1e

        SHA512

        cc1bb271cd49d29fe1fe20432d989142bb2fef2755a664d59679294475f5c14a32d7b02f87695bdf02b94d0753575ed0f00474bdf52c94f83bc5946671a3f245

      • C:\Program Files\Windows Media Player\wmpnetwk.exe

        Filesize

        1.5MB

        MD5

        62e1a4d04a1dc776b7f5ae459a360b0a

        SHA1

        7240d2df63cdba68af8f435cd469545c24707d7f

        SHA256

        6c12a511a145f14b1dbe34b9efd6c2e8ab041d6b3ba476f8de6abc961832275f

        SHA512

        f855040fe29dde28930d699f0303d6790bd9ebbfbce4f860c7a95ac9543a9f435abce5781277b85e23a002cc11e524a1c41a6de4680633c875543da502b75e69

      • C:\Windows\SysWOW64\perfhost.exe

        Filesize

        1.2MB

        MD5

        8ed182ce85edd421da31c17d7eb568c2

        SHA1

        6c9132080d2fc35b71e918271daf8d187e31bd5d

        SHA256

        4b812d6c678cab9bb298a8817a21b91b5c6c9ebced1f2b2a21b50ab81f73a04b

        SHA512

        7a0f3121ca85242de35e39d8a1ebfa5ac6bae7b1ed215e3c1808a57d05e040be8faad46a798fddde06fd8e621302e34ca78f5025ee0fa199f2eab7eaab5a5634

      • C:\Windows\System32\AgentService.exe

        Filesize

        1.7MB

        MD5

        3e19287a8a536af070866fc8fdff7424

        SHA1

        d53da7c134021a721346d0c6db19e5887fad2928

        SHA256

        19e2e1b4cec391ec2c6d37903a88de1bbca1ca3b0f20f158cee2c940d46b5096

        SHA512

        9906bdda44138f67bb254d209ddb86f09730b6b6f761e257faec82447017e3a8556590d096bf32eedc8fbda16ab2ea2179cedbb35fbc22d66916b390fb668dfe

      • C:\Windows\System32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe

        Filesize

        1.3MB

        MD5

        85637a3c70f50fc768cd8c09fdccdf74

        SHA1

        1a255092a78819a3adfdab42e183df48362e0c0c

        SHA256

        96a07468263ee9ef312c63886e2ed540dc8fdb9158762482aca430d1aac4bc79

        SHA512

        50e765df24579d8efada3c6c45b29c2ccd3b134a2cc5f08e7d6813e340f3c7d8933bfe78552d2207060b4c21a13fbcf47a7e6b66b89c4735ef208ee52e86d42e

      • C:\Windows\System32\FXSSVC.exe

        Filesize

        1.2MB

        MD5

        f8d43031d8a8f3078da4192fbe2969e6

        SHA1

        7e68e03b6a0ee08c5960214e30cd8c171db430f3

        SHA256

        e79eb49a828d0459e3016308d2fd9a6bffb0d3162c37a3901cb9d75150a6a3bb

        SHA512

        caffe251bc0cb3690b1bd167540231f24e37796cae780665700b6d953cde21879394a28db35da9ab34a4f100afad9d0048e516e4d60fab5279d8e92b7b874c06

      • C:\Windows\System32\Locator.exe

        Filesize

        1.2MB

        MD5

        b69c678ed0216f42834b5f147cdad20d

        SHA1

        f9ad519f880ece79f0bb25b8abbce8170bb9efeb

        SHA256

        646f2774e31a45c63144730266383b05be73b40d7121e67fc53c9b185ea83478

        SHA512

        13f40cd701efddc9f6ca18755b9b44046e8a43240f268e864129443a1f695c33cdab9a22a87491b5c10f36f8bc2075d354a6f4f2e88cb3cf29993c67f4df69ca

      • C:\Windows\System32\OpenSSH\ssh-agent.exe

        Filesize

        1.6MB

        MD5

        0f6c83bd6ecbc5c915c0754c523af24e

        SHA1

        d11d0d9a8794364fa7adf829299f418f8384fc84

        SHA256

        e730cb7bfbebef400efd407d66334bae07236903b03fc20dee32b4082048b12f

        SHA512

        b6bf27de83b0e3fa5e252edfc17025a414a9e55a7ccd841c2c09b8f38434b53c858393c52d813d0e684fc731d95cb7a7ede4f19e50f71dedc88a4d0aa22a0983

      • C:\Windows\System32\OpenSSH\ssh-agent.exe

        Filesize

        1.6MB

        MD5

        0f6c83bd6ecbc5c915c0754c523af24e

        SHA1

        d11d0d9a8794364fa7adf829299f418f8384fc84

        SHA256

        e730cb7bfbebef400efd407d66334bae07236903b03fc20dee32b4082048b12f

        SHA512

        b6bf27de83b0e3fa5e252edfc17025a414a9e55a7ccd841c2c09b8f38434b53c858393c52d813d0e684fc731d95cb7a7ede4f19e50f71dedc88a4d0aa22a0983

      • C:\Windows\System32\PerceptionSimulation\PerceptionSimulationService.exe

        Filesize

        1.3MB

        MD5

        fca28c431f547bd3c82ec982d5eba239

        SHA1

        f280b986cd2a306eac842de6c38b5854eeb704fa

        SHA256

        851c9bc9a05a61497cf73a8bb05aa3d055d1e705222b6894c067e44c76f748c2

        SHA512

        0d033bd567a0a9c6378200c697cf29bba14b67df03e66b65bbb45e019ed88266a53cdd936cfe8cb31ba7f5b48fa95ea662e6bfaadef807158894f9fedd77c62e

      • C:\Windows\System32\SearchIndexer.exe

        Filesize

        1.4MB

        MD5

        594d3c52d42f2e75c82b2adec36b3993

        SHA1

        b5702a85b28e282ec96416bb9b91966c094d920f

        SHA256

        619f6d6b19a9386a858f4a72437a1599a58f6a3e309eaa24e142de61a3d59a09

        SHA512

        5a8f36a6db1f367322cf28aabb40ebe72d1de5603c6db0170d29a243fdaf30bff0982adc502d6c4106800557c84db2322d1e2d29f6d9d1521d9c79f5e5e13453

      • C:\Windows\System32\SensorDataService.exe

        Filesize

        1.8MB

        MD5

        5034f503eaa9a824013564d1b42512ad

        SHA1

        8f667467b518bf3d74405328cac2a8c4de5d68cc

        SHA256

        eddfaa4537091c0bb6d514ba0e04458e97b5c18d3668c5e0391e992fd047e1be

        SHA512

        47bac5a9b527184661b13bfca577958e359843297a1e377d1cc5414dec09bc8d1af0bbbb6d5ae6b629d8a6cfe6307ac06ac51be623c4d50cf068a2739a7ba732

      • C:\Windows\System32\SensorDataService.exe

        Filesize

        1.8MB

        MD5

        5034f503eaa9a824013564d1b42512ad

        SHA1

        8f667467b518bf3d74405328cac2a8c4de5d68cc

        SHA256

        eddfaa4537091c0bb6d514ba0e04458e97b5c18d3668c5e0391e992fd047e1be

        SHA512

        47bac5a9b527184661b13bfca577958e359843297a1e377d1cc5414dec09bc8d1af0bbbb6d5ae6b629d8a6cfe6307ac06ac51be623c4d50cf068a2739a7ba732

      • C:\Windows\System32\Spectrum.exe

        Filesize

        1.4MB

        MD5

        b3dadba8277ca0fed046e4f4dcac0aad

        SHA1

        77fca897f6bcb2ae3760993b2ae57c94057e68be

        SHA256

        b18b6bf777a63b04b6f360d83c40c02a490dfb417bce918db6c5ec8ee485f5f2

        SHA512

        f363952709e32ff305655470286f78b4874428b54c392d634623c89206c7e69047eb1adb9289581c6d18bb8705ee9e8efd49ab6eb9e3217ec3d91e37eba2f17e

      • C:\Windows\System32\TieringEngineService.exe

        Filesize

        1.5MB

        MD5

        fa3642bdf18cec6b75298fa38b1e7e41

        SHA1

        2cf625ee01d92e40b743e95e61c7b7c62a4df095

        SHA256

        b33ee7666ae24add60403fbe69fb7ba10857523877fd1ba37acabe4318016f6c

        SHA512

        b4689b568a2afd0caf967401323dacad549f27e5761cea75104f7eb85af2aa367d45b1e757ea2f09151dfad80bf5ac1d9ca0f1b07c59e5e7b87196fafcd7f61f

      • C:\Windows\System32\VSSVC.exe

        Filesize

        2.0MB

        MD5

        e8fee7bedcf30d5d7d4f2011e593adb0

        SHA1

        0602aac7ae79d7de73b40ca6ddbaf84c41244874

        SHA256

        8fe60db9d7974b1626ca28317ee6d729249144551441fedcb81b0ab2f3bbf260

        SHA512

        02abb3911829d1c9de4d85991b25291fac988bb2e64fab6bdee98c2ddd91e791e3e0dc3b55fd3024beda564fe7d52dffe4efdeaab21db82ee8df878bf7f2dcc8

      • C:\Windows\System32\alg.exe

        Filesize

        1.3MB

        MD5

        f3be384b261d7242ec0d280890598567

        SHA1

        8f63ed40c9b2c05dff883b42b5ecb1db58a5dff2

        SHA256

        2e091a843398b18f50059eb5e82040799633adc8add4a322ef443371a2438174

        SHA512

        f94259fcbe406b6d6fb3fd05e28cf9df704546911484c1d4ac6e2cf670ebc5afeae38f16d83e260547518c7eda3516de91a55cd0483f85dd2a202ee961d00fdf

      • C:\Windows\System32\msdtc.exe

        Filesize

        1.4MB

        MD5

        0065766f6c3ec135bb334649ecd19e4b

        SHA1

        bab84aa9357c6596869082566a8afd7129b62a51

        SHA256

        6510a2c67eb53bbbd49ffa4023e48494fd7ae020066053df6f04d6b2aa60a58c

        SHA512

        1f7699a903f6eb555ddc962100f3b542f948d673fc21fc7c8d975fa35897d54d978b675c4529f7cd54c01a2a711aaf115918eb41f6eea5d48f557c8710e937e5

      • C:\Windows\System32\snmptrap.exe

        Filesize

        1.2MB

        MD5

        bc7520768d4e80c6404d2d44ef59974f

        SHA1

        6488715e90cc57017e465a81db49c3b87e257036

        SHA256

        010a7681548e0b708e42d0b72cbdc8b10dd0a03e18fac0df371898ad68800b53

        SHA512

        00568005623164ff84657e1901641e5f675ff3bae616a59724ec413dacd569a57695222b59b2598c6a6253ff1edca17948f0c4fe30e595a82da6ca58acf411e3

      • C:\Windows\System32\vds.exe

        Filesize

        1.3MB

        MD5

        de3afd82ccd8dd3be710bc4c1846e9b3

        SHA1

        1410d9ec0f3245891e1bb87ee627591576b2c681

        SHA256

        fd9a1a7259439729672b8719131b4f501ed9226abf23e04d192230ee74412185

        SHA512

        34701597ddf67c77abb98615ebeedaefbaaa4c7f81d7a2e0288c83af307371cc732d6ef71cad34b57191888f4172d87215386e7a830fb82ae05c372fc7a09337

      • C:\Windows\System32\wbem\WmiApSrv.exe

        Filesize

        1.4MB

        MD5

        8d2fdc653ab8ba0139bdc14472f2a339

        SHA1

        c4b601a1d8a5e68581354db5f67f423b38e19981

        SHA256

        d54591fd4098aa7ce94b7a1d484f84c0e47c24669f1ba0d5405d58379fbe61d5

        SHA512

        736367c83e095f3bde4604b54500c661c6f410b381704d3f69f2afde8b466aff23e920fb841d8825240979fa62bec8bc2d5877ae3e1aa7c1d50904e589e0606b

      • C:\Windows\System32\wbengine.exe

        Filesize

        2.1MB

        MD5

        3f975cec81cf7f54c163d45bf4b204f9

        SHA1

        bb2e51d4695f379803422c4113abc8e9f8e520e1

        SHA256

        2f6639b20688dfa31699d545eb8037347a49c292ec1b64b626f5ffd5abc5f3cc

        SHA512

        e3682a5d26f6806b0ff2a9da975b65485a693e54b12f0d50bfd43520e84ba9000bb1c6ade3e4c60ac2b3ae628cda483c701b435741d3d4ddd652da1d2f133441

      • C:\Windows\system32\AgentService.exe

        Filesize

        1.7MB

        MD5

        3e19287a8a536af070866fc8fdff7424

        SHA1

        d53da7c134021a721346d0c6db19e5887fad2928

        SHA256

        19e2e1b4cec391ec2c6d37903a88de1bbca1ca3b0f20f158cee2c940d46b5096

        SHA512

        9906bdda44138f67bb254d209ddb86f09730b6b6f761e257faec82447017e3a8556590d096bf32eedc8fbda16ab2ea2179cedbb35fbc22d66916b390fb668dfe

      • C:\Windows\system32\AppVClient.exe

        Filesize

        1.3MB

        MD5

        1fa253a0d0a35df3fc731be8633ad08b

        SHA1

        283aa29aac6bd710a2150ec554d0727333dd42cb

        SHA256

        91eee6249120bf6a662a707e599ca9971456325c6f3a9e7356d74be35fc4c8d9

        SHA512

        46fce707ea90adc525fd89739c3f92807c739ae91b52a9ef3ed7160050b3d931522c3bb7ff1720ec44eb96b69e9b6ae93356c0eb1ef238a07b4edce2e47a7692

      • C:\Windows\system32\SgrmBroker.exe

        Filesize

        1.5MB

        MD5

        0f1918294643e7b2e8855a0a6c7759c9

        SHA1

        e3606293ad30be3f1ada109e3efffc4f48f07bc3

        SHA256

        e0dd39c0a7de975ce2ca25946d335fba5ae2c69b2fb9896eb93dc16b611e1cf8

        SHA512

        c81d02e3a0e092f25145b5a83abb99c168043b2f975bc6d50c559acd898fb112390e660cdcb93c4bb41a6c80ebfff246a6d77044f99901286086ca07c40a2871

      • C:\Windows\system32\fxssvc.exe

        Filesize

        1.2MB

        MD5

        f8d43031d8a8f3078da4192fbe2969e6

        SHA1

        7e68e03b6a0ee08c5960214e30cd8c171db430f3

        SHA256

        e79eb49a828d0459e3016308d2fd9a6bffb0d3162c37a3901cb9d75150a6a3bb

        SHA512

        caffe251bc0cb3690b1bd167540231f24e37796cae780665700b6d953cde21879394a28db35da9ab34a4f100afad9d0048e516e4d60fab5279d8e92b7b874c06

      • C:\Windows\system32\msiexec.exe

        Filesize

        1.3MB

        MD5

        86cf4b309425fcb444821a6adb5df778

        SHA1

        a49c145c9b8e9ddc00f8160f8aa7870289422786

        SHA256

        1cb2807881de0651791e208b808d0aaa859da42a25ea9bd1f2fa3ff934102b42

        SHA512

        6921e05c69ec71ec591111d4e25ce852861d93270666eeb219a367b794401b4ceb71f29771d5ed56e11840166a8de7cf872990c53cb8dc5f480982eaef44fc86

      • C:\odt\office2016setup.exe

        Filesize

        5.6MB

        MD5

        c0a1ba51b4fdd970cbf328c1a7b81aaf

        SHA1

        13361f53257970627b6940c1bb30928564218e60

        SHA256

        ebd5cfed497c3e932cdf965c83bdfbe662cc68b8e86de24ff0a1e34cadef3859

        SHA512

        69a312167ee50082b43e7572f0f0568c8d2b2544bcef800d71228bc722b6d5be487c1484642ede2c3598e58ee3e3dbddd45b4b572805a7370401ab67f0711480

      • memory/432-369-0x0000000140000000-0x0000000140147000-memory.dmp

        Filesize

        1.3MB

      • memory/432-605-0x0000000140000000-0x0000000140147000-memory.dmp

        Filesize

        1.3MB

      • memory/1304-212-0x0000000000190000-0x00000000001F0000-memory.dmp

        Filesize

        384KB

      • memory/1304-230-0x0000000140000000-0x000000014022B000-memory.dmp

        Filesize

        2.2MB

      • memory/1304-491-0x0000000140000000-0x000000014022B000-memory.dmp

        Filesize

        2.2MB

      • memory/1304-206-0x0000000000190000-0x00000000001F0000-memory.dmp

        Filesize

        384KB

      • memory/1516-163-0x00000000006D0000-0x0000000000730000-memory.dmp

        Filesize

        384KB

      • memory/1516-171-0x0000000140000000-0x0000000140201000-memory.dmp

        Filesize

        2.0MB

      • memory/1516-157-0x00000000006D0000-0x0000000000730000-memory.dmp

        Filesize

        384KB

      • memory/1744-571-0x0000000140000000-0x00000001401EC000-memory.dmp

        Filesize

        1.9MB

      • memory/1744-281-0x0000000140000000-0x00000001401EC000-memory.dmp

        Filesize

        1.9MB

      • memory/1796-627-0x0000000140000000-0x0000000140179000-memory.dmp

        Filesize

        1.5MB

      • memory/1796-409-0x0000000140000000-0x0000000140179000-memory.dmp

        Filesize

        1.5MB

      • memory/1908-138-0x0000000005680000-0x0000000005690000-memory.dmp

        Filesize

        64KB

      • memory/1908-134-0x0000000005BA0000-0x0000000006144000-memory.dmp

        Filesize

        5.6MB

      • memory/1908-135-0x00000000056D0000-0x0000000005762000-memory.dmp

        Filesize

        584KB

      • memory/1908-133-0x0000000000BC0000-0x0000000000D3A000-memory.dmp

        Filesize

        1.5MB

      • memory/1908-136-0x00000000057F0000-0x00000000057FA000-memory.dmp

        Filesize

        40KB

      • memory/1908-137-0x0000000005680000-0x0000000005690000-memory.dmp

        Filesize

        64KB

      • memory/1908-139-0x0000000006770000-0x000000000680C000-memory.dmp

        Filesize

        624KB

      • memory/1992-260-0x0000000140000000-0x0000000140226000-memory.dmp

        Filesize

        2.1MB

      • memory/2088-309-0x0000000140000000-0x00000001401D7000-memory.dmp

        Filesize

        1.8MB

      • memory/2088-554-0x0000000140000000-0x00000001401D7000-memory.dmp

        Filesize

        1.8MB

      • memory/2912-217-0x0000000000CD0000-0x0000000000D30000-memory.dmp

        Filesize

        384KB

      • memory/2912-223-0x0000000000CD0000-0x0000000000D30000-memory.dmp

        Filesize

        384KB

      • memory/2912-227-0x0000000000CD0000-0x0000000000D30000-memory.dmp

        Filesize

        384KB

      • memory/2912-229-0x0000000140000000-0x0000000140221000-memory.dmp

        Filesize

        2.1MB

      • memory/3084-334-0x0000000140000000-0x0000000140169000-memory.dmp

        Filesize

        1.4MB

      • memory/3576-202-0x00000000005B0000-0x0000000000616000-memory.dmp

        Filesize

        408KB

      • memory/3724-606-0x0000000000400000-0x0000000000654000-memory.dmp

        Filesize

        2.3MB

      • memory/3724-624-0x0000026DAFB50000-0x0000026DAFB51000-memory.dmp

        Filesize

        4KB

      • memory/3724-669-0x0000026DAFB50000-0x0000026DAFB51000-memory.dmp

        Filesize

        4KB

      • memory/3724-668-0x0000000000400000-0x0000000000654000-memory.dmp

        Filesize

        2.3MB

      • memory/3724-658-0x0000026DAFB70000-0x0000026DAFB81000-memory.dmp

        Filesize

        68KB

      • memory/3724-625-0x0000026DAFB70000-0x0000026DAFB80000-memory.dmp

        Filesize

        64KB

      • memory/3908-357-0x0000000140000000-0x00000001401C0000-memory.dmp

        Filesize

        1.8MB

      • memory/4124-368-0x0000000140000000-0x0000000140239000-memory.dmp

        Filesize

        2.2MB

      • memory/4156-310-0x0000000140000000-0x00000001401ED000-memory.dmp

        Filesize

        1.9MB

      • memory/4156-587-0x0000000140000000-0x00000001401ED000-memory.dmp

        Filesize

        1.9MB

      • memory/4176-279-0x0000000000400000-0x00000000005EE000-memory.dmp

        Filesize

        1.9MB

      • memory/4248-263-0x0000000140000000-0x0000000140202000-memory.dmp

        Filesize

        2.0MB

      • memory/4248-545-0x0000000140000000-0x0000000140202000-memory.dmp

        Filesize

        2.0MB

      • memory/4456-177-0x0000000000550000-0x00000000005B0000-memory.dmp

        Filesize

        384KB

      • memory/4456-169-0x0000000000550000-0x00000000005B0000-memory.dmp

        Filesize

        384KB

      • memory/4456-173-0x0000000140000000-0x0000000140200000-memory.dmp

        Filesize

        2.0MB

      • memory/4456-458-0x0000000140000000-0x0000000140200000-memory.dmp

        Filesize

        2.0MB

      • memory/4636-144-0x0000000000400000-0x0000000000654000-memory.dmp

        Filesize

        2.3MB

      • memory/4636-140-0x0000000000400000-0x0000000000654000-memory.dmp

        Filesize

        2.3MB

      • memory/4636-150-0x0000000002900000-0x0000000002966000-memory.dmp

        Filesize

        408KB

      • memory/4636-404-0x0000000000400000-0x0000000000654000-memory.dmp

        Filesize

        2.3MB

      • memory/4636-145-0x0000000002900000-0x0000000002966000-memory.dmp

        Filesize

        408KB

      • memory/4636-143-0x0000000000400000-0x0000000000654000-memory.dmp

        Filesize

        2.3MB

      • memory/4644-195-0x0000000140000000-0x0000000140135000-memory.dmp

        Filesize

        1.2MB

      • memory/4644-193-0x00000000008C0000-0x0000000000920000-memory.dmp

        Filesize

        384KB

      • memory/4644-187-0x00000000008C0000-0x0000000000920000-memory.dmp

        Filesize

        384KB

      • memory/4644-181-0x00000000008C0000-0x0000000000920000-memory.dmp

        Filesize

        384KB

      • memory/4800-201-0x0000000000BF0000-0x0000000000C50000-memory.dmp

        Filesize

        384KB

      • memory/4800-197-0x0000000140000000-0x0000000140237000-memory.dmp

        Filesize

        2.2MB

      • memory/4800-490-0x0000000140000000-0x0000000140237000-memory.dmp

        Filesize

        2.2MB

      • memory/4800-191-0x0000000000BF0000-0x0000000000C50000-memory.dmp

        Filesize

        384KB

      • memory/4820-335-0x0000000140000000-0x0000000140259000-memory.dmp

        Filesize

        2.3MB

      • memory/4996-257-0x0000000140000000-0x0000000140210000-memory.dmp

        Filesize

        2.1MB

      • memory/5040-382-0x0000000140000000-0x00000001401FC000-memory.dmp

        Filesize

        2.0MB

      • memory/5040-622-0x0000000140000000-0x00000001401FC000-memory.dmp

        Filesize

        2.0MB

      • memory/5052-384-0x0000000140000000-0x0000000140216000-memory.dmp

        Filesize

        2.1MB

      • memory/5052-623-0x0000000140000000-0x0000000140216000-memory.dmp

        Filesize

        2.1MB

      • memory/5076-626-0x0000000140000000-0x000000014021D000-memory.dmp

        Filesize

        2.1MB

      • memory/5076-406-0x0000000140000000-0x000000014021D000-memory.dmp

        Filesize

        2.1MB