Analysis

  • max time kernel
    151s
  • max time network
    172s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    01-05-2023 20:08

General

  • Target

    RFQ 21032023.exe

  • Size

    1.5MB

  • MD5

    26d46c2c07d584f1a04280f47182e909

  • SHA1

    381ec91ba5c4206be19a10a1cb0d2328a9385d71

  • SHA256

    295ebe6ba820bb813c6e9dd5526bf194a8da0268085ba0fc805f19c1ae3c6186

  • SHA512

    3cd2e063ed27a84cfa2513e76a77f6ed8a7987ff42f1e5e9ab9400491b1cfc0b407945ca09ab1a839807ac850a44a0521aa5fa2f9a90c9bd2df1ee0eefc3c8c0

  • SSDEEP

    24576:D1fkORzjCc1R7CIPVQ/NcnBZuSAszPeo28pW4NiocXtWLezho6OrHRYfDz:Dabc7nyNgqSHzPj3zDYt8EhuWf

Malware Config

Extracted

Family

blustealer

C2

https://api.telegram.org/bot5797428905:AAGaRRXGZN1d9GGFd3sE5x4uSpCGF0PU4m4/sendMessage?chat_id=1251788325

Signatures

  • BluStealer

    A Modular information stealer written in Visual Basic.

  • Executes dropped EXE 17 IoCs
  • Loads dropped DLL 7 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Drops file in System32 directory 8 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 4 IoCs
  • Drops file in Windows directory 28 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies data under HKEY_USERS 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 14 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\RFQ 21032023.exe
    "C:\Users\Admin\AppData\Local\Temp\RFQ 21032023.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1320
    • C:\Users\Admin\AppData\Local\Temp\RFQ 21032023.exe
      "C:\Users\Admin\AppData\Local\Temp\RFQ 21032023.exe"
      2⤵
      • Drops file in System32 directory
      • Suspicious use of SetThreadContext
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:696
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
        3⤵
        • Accesses Microsoft Outlook profiles
        • outlook_office_path
        • outlook_win_path
        PID:1004
  • C:\Windows\System32\alg.exe
    C:\Windows\System32\alg.exe
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    PID:1928
  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe
    C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe
    1⤵
    • Executes dropped EXE
    PID:1628
  • C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe
    C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe
    1⤵
    • Executes dropped EXE
    • Drops file in Windows directory
    PID:896
  • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe
    C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe
    1⤵
    • Executes dropped EXE
    • Drops file in Windows directory
    PID:1496
  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
    C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
    1⤵
    • Executes dropped EXE
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:528
  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
    C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
    1⤵
    • Executes dropped EXE
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1000
    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 170 -InterruptEvent 15c -NGENProcess 160 -Pipe 16c -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:1776
    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 170 -InterruptEvent 1f0 -NGENProcess 1d0 -Pipe 1ec -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2148
  • C:\Windows\system32\dllhost.exe
    C:\Windows\system32\dllhost.exe /Processid:{02D4B3F1-FD88-11D1-960D-00805FC79235}
    1⤵
    • Executes dropped EXE
    • Drops file in Windows directory
    PID:1680
  • C:\Windows\ehome\ehRecvr.exe
    C:\Windows\ehome\ehRecvr.exe
    1⤵
    • Executes dropped EXE
    • Modifies data under HKEY_USERS
    PID:1204
  • C:\Windows\ehome\ehsched.exe
    C:\Windows\ehome\ehsched.exe
    1⤵
    • Executes dropped EXE
    PID:1796
  • C:\Windows\eHome\EhTray.exe
    "C:\Windows\eHome\EhTray.exe" /nav:-2
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2008
  • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
    "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
    1⤵
    • Executes dropped EXE
    PID:336
  • C:\Windows\ehome\ehRec.exe
    C:\Windows\ehome\ehRec.exe -Embedding
    1⤵
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1312
  • C:\Windows\system32\IEEtwCollector.exe
    C:\Windows\system32\IEEtwCollector.exe /V
    1⤵
    • Executes dropped EXE
    PID:1252
  • C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE" /auditservice
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Modifies data under HKEY_USERS
    PID:2056
  • C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe
    "C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"
    1⤵
    • Executes dropped EXE
    • Drops file in Program Files directory
    PID:2140
  • C:\Windows\System32\msdtc.exe
    C:\Windows\System32\msdtc.exe
    1⤵
    • Executes dropped EXE
    PID:2348

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE

    Filesize

    30.1MB

    MD5

    4e6af5e37810baa93b3d8ddad0a34140

    SHA1

    d1f9070385fd1d1a2c0374b4f72ba290682b946c

    SHA256

    3d63ecece6cfc768b8284f5aac56d95f37126661de303960b65311256c00508a

    SHA512

    c10fdc2c59df16449543584206372d3d4a449da7000462af9c27e947407cfb91c25294ea6e6b790360e2e1d8b19e9728c03c87f7cdb0061dada9f096be6634f1

  • C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe

    Filesize

    1.4MB

    MD5

    52273bf6940e88289195e848f7612d74

    SHA1

    72688c86f88687aeae007c96f0d6b1d92315c892

    SHA256

    94c59e966908f4ea587b3d0135bbc44f6a411371f2b696b4a6a969429248e651

    SHA512

    1e10a213af7fe4e73db401f9a24139141a7c6e1e6c67ced24fb785a27f69b7d1b7ba6eb1562c1c76f8d8d46007c73214751bc7d842ac6b1c6dd0a061c02ae8fc

  • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe

    Filesize

    2.1MB

    MD5

    51726df60b79d36d4b21c9b9dbe7ffc8

    SHA1

    41b32658e39d7b21f82ef6453bfc835edbdabb3b

    SHA256

    61186e175bbe9c62fd226c4c8f54b91df69b597168a98943c2399f64ba46e88e

    SHA512

    590f266c00eeeedbd9c23ac10758e3cbc39126a9c70e17fcfe5d5884fbec69ac9503c6bdacbe9714194c9fff5ed1528d1a6d23fb1ddb925aef07900500466429

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b91050d8b077a4e8.customDestinations-ms

    Filesize

    24B

    MD5

    b9bd716de6739e51c620f2086f9c31e4

    SHA1

    9733d94607a3cba277e567af584510edd9febf62

    SHA256

    7116ff028244a01f3d17f1d3bc2e1506bc9999c2e40e388458f0cccc4e117312

    SHA512

    cef609e54c7a81a646ad38dba7ac0b82401b220773b9c792cefac80c6564753229f0c011b34ffb56381dd3154a19aee2bf5f602c4d1af01f2cf0fbc1574e4478

  • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe

    Filesize

    1.3MB

    MD5

    2914e8ab528b865da3a9b14792537844

    SHA1

    f4a9e65c34b45c25d6618465577037299e206f0c

    SHA256

    35e58e151b5d196aaa95fdca9ac753da4a24e3ddca6564108f6ff229dde4c0fb

    SHA512

    bec09d221eba2925724c7e993ac62a2bf089e164d90267e4a85ad4790f514a0c7a8a2ab2526317ffec822d5ea46080f2f265f92510f6a8c816e7f3b47abd23e6

  • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe

    Filesize

    1.3MB

    MD5

    2914e8ab528b865da3a9b14792537844

    SHA1

    f4a9e65c34b45c25d6618465577037299e206f0c

    SHA256

    35e58e151b5d196aaa95fdca9ac753da4a24e3ddca6564108f6ff229dde4c0fb

    SHA512

    bec09d221eba2925724c7e993ac62a2bf089e164d90267e4a85ad4790f514a0c7a8a2ab2526317ffec822d5ea46080f2f265f92510f6a8c816e7f3b47abd23e6

  • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ngen_service.log

    Filesize

    872KB

    MD5

    4d969924ec379fc1ef3c846031017009

    SHA1

    4e18b7c780d2414b71a7e8e510017aab38bcd019

    SHA256

    e6e29070ebb567b5c57e1600e217d58f452b4c42da193cbdab56276dac89c0d3

    SHA512

    b3ea13b8d3d1715b2649a547dc762345f67251ed94d4b2d4b016d117a70e19465dd5608b31456dd0dbd5f0fb8c9f8ce00ed5879008d3f01587e4a7a39c507055

  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe

    Filesize

    1.3MB

    MD5

    815784eca2bdcd774b48158e58a70400

    SHA1

    57826043f04d4c67bb812c81536b327b3041218f

    SHA256

    3a04f47738cc45f5889d11c64697fec3d4fcfd90428ade2ba99d380362b56189

    SHA512

    312fd0bc3855cebe4f2d33c4f3cd5e1809458d6724e96355feee55bc83cb913ec6700e4fe87c8090046450e6ce90c35fa49faf16518b66b03cf62f2ab5e55528

  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe

    Filesize

    1.3MB

    MD5

    0a30780bc8b703384ba646c8f04879c9

    SHA1

    c7223f470cd93ad8a22c9d3bf4ef3de569752334

    SHA256

    2ea868b06a36b2cee5ff62fb22842b78f3948ddf12e1f03c2ea52b3b4306ba5a

    SHA512

    fa743fe5650f18102beb60085fc415082cb182ba6b0cfc097f8596aaa56567308447468b6327836c615292e6486d6ee0986e914f2c29897cb19834ebb225e06c

  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe

    Filesize

    1.3MB

    MD5

    0a30780bc8b703384ba646c8f04879c9

    SHA1

    c7223f470cd93ad8a22c9d3bf4ef3de569752334

    SHA256

    2ea868b06a36b2cee5ff62fb22842b78f3948ddf12e1f03c2ea52b3b4306ba5a

    SHA512

    fa743fe5650f18102beb60085fc415082cb182ba6b0cfc097f8596aaa56567308447468b6327836c615292e6486d6ee0986e914f2c29897cb19834ebb225e06c

  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe

    Filesize

    1.3MB

    MD5

    0a30780bc8b703384ba646c8f04879c9

    SHA1

    c7223f470cd93ad8a22c9d3bf4ef3de569752334

    SHA256

    2ea868b06a36b2cee5ff62fb22842b78f3948ddf12e1f03c2ea52b3b4306ba5a

    SHA512

    fa743fe5650f18102beb60085fc415082cb182ba6b0cfc097f8596aaa56567308447468b6327836c615292e6486d6ee0986e914f2c29897cb19834ebb225e06c

  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe

    Filesize

    1.3MB

    MD5

    0a30780bc8b703384ba646c8f04879c9

    SHA1

    c7223f470cd93ad8a22c9d3bf4ef3de569752334

    SHA256

    2ea868b06a36b2cee5ff62fb22842b78f3948ddf12e1f03c2ea52b3b4306ba5a

    SHA512

    fa743fe5650f18102beb60085fc415082cb182ba6b0cfc097f8596aaa56567308447468b6327836c615292e6486d6ee0986e914f2c29897cb19834ebb225e06c

  • C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe

    Filesize

    1.3MB

    MD5

    a79d9ba1ee781fcdfd43a3da37c7a844

    SHA1

    75361c21ee9b6a4e04d91628d97eef244949031a

    SHA256

    9ebbe3421d14e3696efd2c02637150ffe515086437a1584df581b611277930a4

    SHA512

    35b543ad55e3c31c1cb825f07b65a2a131c0bd3a65d8bd3639ed087ae045b00e2961a6d54cf1c300ece0bd5a805424994191251d911fa3b01daf3c85851e734e

  • C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe

    Filesize

    1.3MB

    MD5

    a79d9ba1ee781fcdfd43a3da37c7a844

    SHA1

    75361c21ee9b6a4e04d91628d97eef244949031a

    SHA256

    9ebbe3421d14e3696efd2c02637150ffe515086437a1584df581b611277930a4

    SHA512

    35b543ad55e3c31c1cb825f07b65a2a131c0bd3a65d8bd3639ed087ae045b00e2961a6d54cf1c300ece0bd5a805424994191251d911fa3b01daf3c85851e734e

  • C:\Windows\Microsoft.NET\Framework\v2.0.50727\ngen_service.log

    Filesize

    1003KB

    MD5

    8dd67a11080b13d0d0a4a4e9d25b34ed

    SHA1

    196ab250612275376f33aa3790714ac1e09955c5

    SHA256

    cca99e331ab920e373b7cf8682fdf57f05ec951ca40f38c706ab91f7a7928f66

    SHA512

    43ee82e7b3e7ac27e1a69484fc71e3c8c56eb2276ab91c6f74fbf312e0f9493e36c61083abe74b211cfc564bbb9dca3be7b087f115a958f59c10aba8f3b03f59

  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe

    Filesize

    1.3MB

    MD5

    bf3142733d824fbb2cdebc34dea4abbe

    SHA1

    a0a7b95005e00f08cd3e836306b475ff409739ce

    SHA256

    eab7c1ba0cf204c40544db99d55185817c34cb20cd11fb17bf2d6e2b89073b2a

    SHA512

    f4d95e2fa7463b1f291d9b39ac90b1c65b5b71bac94ada4bcd3c6352415a518fd4e98ce95a10995cf6e2756932246bcccfc7f0222d618a626d547c82530779e1

  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe

    Filesize

    1.3MB

    MD5

    bf3142733d824fbb2cdebc34dea4abbe

    SHA1

    a0a7b95005e00f08cd3e836306b475ff409739ce

    SHA256

    eab7c1ba0cf204c40544db99d55185817c34cb20cd11fb17bf2d6e2b89073b2a

    SHA512

    f4d95e2fa7463b1f291d9b39ac90b1c65b5b71bac94ada4bcd3c6352415a518fd4e98ce95a10995cf6e2756932246bcccfc7f0222d618a626d547c82530779e1

  • C:\Windows\System32\alg.exe

    Filesize

    1.3MB

    MD5

    d03b506ecb44c0113559f2fd91470ce3

    SHA1

    b4804420ca45f963648788265da0d89666d5e156

    SHA256

    4e755ebba0f30192cff6d6c716d70260ac8eeb4025ce11609cae77c742c58c8c

    SHA512

    6e48182663717497a932575ad2b2ae7fe5d65dcedf5e7613f5c6dc95936bf79531871d1c7e17e8ce97f7b0ba15e89111df0d41bf749841c9210d67721e017a58

  • C:\Windows\System32\dllhost.exe

    Filesize

    1.2MB

    MD5

    66674d6336e382806c717216e9d9bde1

    SHA1

    27bd97b574f00073eba0caefe6211208e39fa164

    SHA256

    bc916c9de3897079d6933eaf3905f5a40c34c5bf1918dba0164272942b04e6aa

    SHA512

    7a0d9d2c179dc44c39e72c6f9563d5d078618f577d68ca9e57994c0098145b79d3d581b51c3992fec3c523dddd1f503a3701b6865c437fd003afdd190b49a034

  • C:\Windows\System32\ieetwcollector.exe

    Filesize

    1.3MB

    MD5

    016d83127c4113bf5811ef5c042f31ae

    SHA1

    c0e83f41b68ccefb196907276e3bc772c30e01e7

    SHA256

    94c5d14d34572bbee36dfc2813d94ea6c26e341a3eec24ad7fafdb0ec6f91fdd

    SHA512

    0c4cea620331cbbd2a4c63715b24413c9aea86ea12123fdb66b799fb14dd1c02aa6dd48359fb5caa5e8029bb16e99791ec725c5343300332d6012807246aefb9

  • C:\Windows\System32\msdtc.exe

    Filesize

    1.4MB

    MD5

    98a8c2b38c897b5d0e82ab191266c7b2

    SHA1

    bd57e36634790465b17f5893dce2b0cfee646671

    SHA256

    d0090ced93fb77802f942f0f353c3b2f346662e603df1274a73881362f4c1185

    SHA512

    a49f38c9413a68b38d94fce2d6c15f1244f72c8ba37b39dfadcb2ee188b2c9ddc72e5ae7578f16e7ffdf05fbaf81df0b982909d0ebcf780b3bf16ee368c05f8b

  • C:\Windows\ehome\ehrecvr.exe

    Filesize

    1.2MB

    MD5

    c452637fcdaee0ec9d5dca1f4639bec5

    SHA1

    fe7ac08ebe94405147aa4ea0080fdf2f588c378a

    SHA256

    f614c9108c26728bbc095ff845ca5789e7b0e7ebf17591cdf5eae32ff6cca3a6

    SHA512

    ef563de33f4db8ee7a32fc021593e1e576ecff05fe0e42b41ced1968512f005a67d51204414eb9fdbf7f93f3773ec6bcb577c35ce3b0d3cfc5fbabbca69ced6c

  • C:\Windows\ehome\ehsched.exe

    Filesize

    1.3MB

    MD5

    e381806783198578b5fc990394e968fe

    SHA1

    dac8e2f251845f6a6159d3358a270acb482d1faf

    SHA256

    ff478a44f3e815d85fe46b0e048c04f39b67c2f6ee5c6bbd22c08c3f608ffa3c

    SHA512

    5e2ebc3f52faba8d818f26d28b572ecc8456d6bb3b6f81e5a9583db054107d40c471eb53dc944828061b3c7fc7ce6ebe19aea5b7f5ead260ebad0610b14ad8d2

  • \Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe

    Filesize

    1.3MB

    MD5

    2914e8ab528b865da3a9b14792537844

    SHA1

    f4a9e65c34b45c25d6618465577037299e206f0c

    SHA256

    35e58e151b5d196aaa95fdca9ac753da4a24e3ddca6564108f6ff229dde4c0fb

    SHA512

    bec09d221eba2925724c7e993ac62a2bf089e164d90267e4a85ad4790f514a0c7a8a2ab2526317ffec822d5ea46080f2f265f92510f6a8c816e7f3b47abd23e6

  • \Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe

    Filesize

    1.3MB

    MD5

    815784eca2bdcd774b48158e58a70400

    SHA1

    57826043f04d4c67bb812c81536b327b3041218f

    SHA256

    3a04f47738cc45f5889d11c64697fec3d4fcfd90428ade2ba99d380362b56189

    SHA512

    312fd0bc3855cebe4f2d33c4f3cd5e1809458d6724e96355feee55bc83cb913ec6700e4fe87c8090046450e6ce90c35fa49faf16518b66b03cf62f2ab5e55528

  • \Windows\System32\alg.exe

    Filesize

    1.3MB

    MD5

    d03b506ecb44c0113559f2fd91470ce3

    SHA1

    b4804420ca45f963648788265da0d89666d5e156

    SHA256

    4e755ebba0f30192cff6d6c716d70260ac8eeb4025ce11609cae77c742c58c8c

    SHA512

    6e48182663717497a932575ad2b2ae7fe5d65dcedf5e7613f5c6dc95936bf79531871d1c7e17e8ce97f7b0ba15e89111df0d41bf749841c9210d67721e017a58

  • \Windows\System32\dllhost.exe

    Filesize

    1.2MB

    MD5

    66674d6336e382806c717216e9d9bde1

    SHA1

    27bd97b574f00073eba0caefe6211208e39fa164

    SHA256

    bc916c9de3897079d6933eaf3905f5a40c34c5bf1918dba0164272942b04e6aa

    SHA512

    7a0d9d2c179dc44c39e72c6f9563d5d078618f577d68ca9e57994c0098145b79d3d581b51c3992fec3c523dddd1f503a3701b6865c437fd003afdd190b49a034

  • \Windows\System32\ieetwcollector.exe

    Filesize

    1.3MB

    MD5

    016d83127c4113bf5811ef5c042f31ae

    SHA1

    c0e83f41b68ccefb196907276e3bc772c30e01e7

    SHA256

    94c5d14d34572bbee36dfc2813d94ea6c26e341a3eec24ad7fafdb0ec6f91fdd

    SHA512

    0c4cea620331cbbd2a4c63715b24413c9aea86ea12123fdb66b799fb14dd1c02aa6dd48359fb5caa5e8029bb16e99791ec725c5343300332d6012807246aefb9

  • \Windows\System32\msdtc.exe

    Filesize

    1.4MB

    MD5

    98a8c2b38c897b5d0e82ab191266c7b2

    SHA1

    bd57e36634790465b17f5893dce2b0cfee646671

    SHA256

    d0090ced93fb77802f942f0f353c3b2f346662e603df1274a73881362f4c1185

    SHA512

    a49f38c9413a68b38d94fce2d6c15f1244f72c8ba37b39dfadcb2ee188b2c9ddc72e5ae7578f16e7ffdf05fbaf81df0b982909d0ebcf780b3bf16ee368c05f8b

  • \Windows\ehome\ehrecvr.exe

    Filesize

    1.2MB

    MD5

    c452637fcdaee0ec9d5dca1f4639bec5

    SHA1

    fe7ac08ebe94405147aa4ea0080fdf2f588c378a

    SHA256

    f614c9108c26728bbc095ff845ca5789e7b0e7ebf17591cdf5eae32ff6cca3a6

    SHA512

    ef563de33f4db8ee7a32fc021593e1e576ecff05fe0e42b41ced1968512f005a67d51204414eb9fdbf7f93f3773ec6bcb577c35ce3b0d3cfc5fbabbca69ced6c

  • \Windows\ehome\ehsched.exe

    Filesize

    1.3MB

    MD5

    e381806783198578b5fc990394e968fe

    SHA1

    dac8e2f251845f6a6159d3358a270acb482d1faf

    SHA256

    ff478a44f3e815d85fe46b0e048c04f39b67c2f6ee5c6bbd22c08c3f608ffa3c

    SHA512

    5e2ebc3f52faba8d818f26d28b572ecc8456d6bb3b6f81e5a9583db054107d40c471eb53dc944828061b3c7fc7ce6ebe19aea5b7f5ead260ebad0610b14ad8d2

  • memory/336-186-0x0000000000420000-0x0000000000480000-memory.dmp

    Filesize

    384KB

  • memory/336-180-0x0000000000420000-0x0000000000480000-memory.dmp

    Filesize

    384KB

  • memory/336-190-0x0000000140000000-0x0000000140237000-memory.dmp

    Filesize

    2.2MB

  • memory/528-124-0x0000000000850000-0x00000000008B6000-memory.dmp

    Filesize

    408KB

  • memory/528-143-0x0000000000400000-0x00000000005FF000-memory.dmp

    Filesize

    2.0MB

  • memory/528-129-0x0000000000850000-0x00000000008B6000-memory.dmp

    Filesize

    408KB

  • memory/696-91-0x0000000000400000-0x0000000000654000-memory.dmp

    Filesize

    2.3MB

  • memory/696-68-0x00000000001D0000-0x0000000000236000-memory.dmp

    Filesize

    408KB

  • memory/696-73-0x00000000001D0000-0x0000000000236000-memory.dmp

    Filesize

    408KB

  • memory/696-109-0x0000000000400000-0x0000000000654000-memory.dmp

    Filesize

    2.3MB

  • memory/696-67-0x0000000000400000-0x0000000000654000-memory.dmp

    Filesize

    2.3MB

  • memory/696-65-0x0000000000400000-0x0000000000654000-memory.dmp

    Filesize

    2.3MB

  • memory/696-64-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/696-62-0x0000000000400000-0x0000000000654000-memory.dmp

    Filesize

    2.3MB

  • memory/696-61-0x0000000000400000-0x0000000000654000-memory.dmp

    Filesize

    2.3MB

  • memory/696-60-0x0000000000400000-0x0000000000654000-memory.dmp

    Filesize

    2.3MB

  • memory/896-108-0x0000000010000000-0x00000000101F6000-memory.dmp

    Filesize

    2.0MB

  • memory/1000-142-0x0000000140000000-0x0000000140205000-memory.dmp

    Filesize

    2.0MB

  • memory/1004-98-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/1004-105-0x00000000007F0000-0x00000000008AC000-memory.dmp

    Filesize

    752KB

  • memory/1004-99-0x0000000000260000-0x00000000002C6000-memory.dmp

    Filesize

    408KB

  • memory/1004-101-0x0000000000260000-0x00000000002C6000-memory.dmp

    Filesize

    408KB

  • memory/1004-97-0x0000000000260000-0x00000000002C6000-memory.dmp

    Filesize

    408KB

  • memory/1004-103-0x0000000000260000-0x00000000002C6000-memory.dmp

    Filesize

    408KB

  • memory/1204-159-0x0000000000180000-0x00000000001E0000-memory.dmp

    Filesize

    384KB

  • memory/1204-163-0x0000000140000000-0x000000014013C000-memory.dmp

    Filesize

    1.2MB

  • memory/1204-189-0x0000000001430000-0x0000000001431000-memory.dmp

    Filesize

    4KB

  • memory/1204-192-0x0000000140000000-0x000000014013C000-memory.dmp

    Filesize

    1.2MB

  • memory/1204-175-0x0000000001380000-0x0000000001390000-memory.dmp

    Filesize

    64KB

  • memory/1204-176-0x0000000001390000-0x00000000013A0000-memory.dmp

    Filesize

    64KB

  • memory/1204-153-0x0000000000180000-0x00000000001E0000-memory.dmp

    Filesize

    384KB

  • memory/1252-207-0x0000000140000000-0x0000000140205000-memory.dmp

    Filesize

    2.0MB

  • memory/1312-191-0x0000000000CB0000-0x0000000000D30000-memory.dmp

    Filesize

    512KB

  • memory/1312-228-0x0000000000CB0000-0x0000000000D30000-memory.dmp

    Filesize

    512KB

  • memory/1312-277-0x0000000000CB0000-0x0000000000D30000-memory.dmp

    Filesize

    512KB

  • memory/1320-59-0x0000000007C60000-0x0000000007E10000-memory.dmp

    Filesize

    1.7MB

  • memory/1320-56-0x0000000005270000-0x00000000052B0000-memory.dmp

    Filesize

    256KB

  • memory/1320-58-0x0000000005770000-0x00000000058A8000-memory.dmp

    Filesize

    1.2MB

  • memory/1320-57-0x00000000003B0000-0x00000000003BC000-memory.dmp

    Filesize

    48KB

  • memory/1320-54-0x0000000000D20000-0x0000000000E9A000-memory.dmp

    Filesize

    1.5MB

  • memory/1320-55-0x0000000000390000-0x00000000003A4000-memory.dmp

    Filesize

    80KB

  • memory/1496-116-0x0000000010000000-0x00000000101FE000-memory.dmp

    Filesize

    2.0MB

  • memory/1628-113-0x0000000140000000-0x00000001401F4000-memory.dmp

    Filesize

    2.0MB

  • memory/1628-96-0x0000000140000000-0x00000001401F4000-memory.dmp

    Filesize

    2.0MB

  • memory/1680-161-0x0000000100000000-0x00000001001EC000-memory.dmp

    Filesize

    1.9MB

  • memory/1776-254-0x0000000140000000-0x0000000140205000-memory.dmp

    Filesize

    2.0MB

  • memory/1776-210-0x0000000140000000-0x0000000140205000-memory.dmp

    Filesize

    2.0MB

  • memory/1776-259-0x0000000140000000-0x0000000140205000-memory.dmp

    Filesize

    2.0MB

  • memory/1796-193-0x0000000140000000-0x0000000140209000-memory.dmp

    Filesize

    2.0MB

  • memory/1796-166-0x0000000000870000-0x00000000008D0000-memory.dmp

    Filesize

    384KB

  • memory/1796-172-0x0000000000870000-0x00000000008D0000-memory.dmp

    Filesize

    384KB

  • memory/1796-177-0x0000000140000000-0x0000000140209000-memory.dmp

    Filesize

    2.0MB

  • memory/1928-92-0x0000000100000000-0x00000001001FB000-memory.dmp

    Filesize

    2.0MB

  • memory/1928-110-0x0000000100000000-0x00000001001FB000-memory.dmp

    Filesize

    2.0MB

  • memory/1928-81-0x0000000000850000-0x00000000008B0000-memory.dmp

    Filesize

    384KB

  • memory/1928-87-0x0000000000850000-0x00000000008B0000-memory.dmp

    Filesize

    384KB

  • memory/2056-227-0x000000002E000000-0x000000002FE1E000-memory.dmp

    Filesize

    30.1MB

  • memory/2140-251-0x0000000140000000-0x0000000140221000-memory.dmp

    Filesize

    2.1MB

  • memory/2148-258-0x0000000140000000-0x0000000140205000-memory.dmp

    Filesize

    2.0MB

  • memory/2148-274-0x0000000140000000-0x0000000140205000-memory.dmp

    Filesize

    2.0MB

  • memory/2348-260-0x0000000140000000-0x000000014020D000-memory.dmp

    Filesize

    2.1MB