Analysis

  • max time kernel
    153s
  • max time network
    176s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    01-05-2023 20:13

General

  • Target

    tmplhf3940d.exe

  • Size

    1.5MB

  • MD5

    13dc441ec2f9e3f9aa1f354a4b14d318

  • SHA1

    05b62c596ca78745d73514cd5d43434929955863

  • SHA256

    6f35bb0a7644cfda2468e984269f7febafcb672591a887a8029257dea0801a7c

  • SHA512

    30f4da77bf1ba35334fc1812a6792bb91396fdc8cc7b918f81c6395a48523079cccc89c7090b5c21c30ab62939fa8663cc695ad7d876f083773f7c85cffc5242

  • SSDEEP

    24576:TwMryIYPOfPFxgvnRnc215nETdxUA6p7GDHDCf0uEywBk1EM8Xzd:Md5PsPfgvRv0gA6pYC52lD

Malware Config

Extracted

Family

blustealer

C2

https://api.telegram.org/bot5797428905:AAGaRRXGZN1d9GGFd3sE5x4uSpCGF0PU4m4/sendMessage?chat_id=1251788325

Signatures

  • BluStealer

    A Modular information stealer written in Visual Basic.

  • Executes dropped EXE 21 IoCs
  • Loads dropped DLL 6 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Drops file in System32 directory 7 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 4 IoCs
  • Drops file in Windows directory 27 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies data under HKEY_USERS 7 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 50 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\tmplhf3940d.exe
    "C:\Users\Admin\AppData\Local\Temp\tmplhf3940d.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1708
    • C:\Users\Admin\AppData\Local\Temp\tmplhf3940d.exe
      "C:\Users\Admin\AppData\Local\Temp\tmplhf3940d.exe"
      2⤵
        PID:1160
      • C:\Users\Admin\AppData\Local\Temp\tmplhf3940d.exe
        "C:\Users\Admin\AppData\Local\Temp\tmplhf3940d.exe"
        2⤵
        • Drops file in System32 directory
        • Suspicious use of SetThreadContext
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:580
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
          C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
          3⤵
          • Accesses Microsoft Outlook profiles
          • outlook_office_path
          • outlook_win_path
          PID:1492
    • C:\Windows\System32\alg.exe
      C:\Windows\System32\alg.exe
      1⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      PID:828
    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe
      C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe
      1⤵
      • Executes dropped EXE
      PID:1788
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe
      1⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      PID:836
    • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe
      1⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      PID:1408
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      1⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1284
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1e8 -InterruptEvent 1d4 -NGENProcess 1d8 -Pipe 1e4 -Comment "NGen Worker Process"
        2⤵
        • Executes dropped EXE
        PID:1940
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1e0 -InterruptEvent 24c -NGENProcess 254 -Pipe 258 -Comment "NGen Worker Process"
        2⤵
        • Executes dropped EXE
        PID:2044
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 250 -InterruptEvent 24c -NGENProcess 254 -Pipe 258 -Comment "NGen Worker Process"
        2⤵
        • Executes dropped EXE
        PID:1784
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 23c -InterruptEvent 1e0 -NGENProcess 244 -Pipe 250 -Comment "NGen Worker Process"
        2⤵
        • Executes dropped EXE
        PID:1388
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 240 -InterruptEvent 1e0 -NGENProcess 23c -Pipe 254 -Comment "NGen Worker Process"
        2⤵
        • Executes dropped EXE
        PID:1832
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1e0 -InterruptEvent 23c -NGENProcess 248 -Pipe 25c -Comment "NGen Worker Process"
        2⤵
        • Executes dropped EXE
        PID:1912
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 248 -InterruptEvent 1d8 -NGENProcess 23c -Pipe 1e0 -Comment "NGen Worker Process"
        2⤵
        • Executes dropped EXE
        PID:2268
    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
      1⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      PID:988
    • C:\Windows\system32\dllhost.exe
      C:\Windows\system32\dllhost.exe /Processid:{02D4B3F1-FD88-11D1-960D-00805FC79235}
      1⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      PID:1512
    • C:\Windows\ehome\ehRecvr.exe
      C:\Windows\ehome\ehRecvr.exe
      1⤵
      • Executes dropped EXE
      • Modifies data under HKEY_USERS
      PID:1756
    • C:\Windows\ehome\ehsched.exe
      C:\Windows\ehome\ehsched.exe
      1⤵
      • Executes dropped EXE
      PID:1360
    • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
      "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
      1⤵
      • Executes dropped EXE
      PID:468
    • C:\Windows\eHome\EhTray.exe
      "C:\Windows\eHome\EhTray.exe" /nav:-2
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1680
    • C:\Windows\system32\IEEtwCollector.exe
      C:\Windows\system32\IEEtwCollector.exe /V
      1⤵
      • Executes dropped EXE
      PID:880
    • C:\Windows\ehome\ehRec.exe
      C:\Windows\ehome\ehRec.exe -Embedding
      1⤵
        PID:1092
      • C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE
        "C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE" /auditservice
        1⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Modifies data under HKEY_USERS
        PID:764
      • C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe
        "C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"
        1⤵
        • Executes dropped EXE
        • Drops file in Program Files directory
        PID:2176

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE

        Filesize

        30.1MB

        MD5

        9d44de9e2eff09e6dec5741f6d9579c8

        SHA1

        1f40793f851805140d8e9bc7349fa379a5171bb2

        SHA256

        1f79090c7e3abf4f0cebc7860ffbedf688e660290b923e43a7cfae2238be84e4

        SHA512

        b403622624c19e803c8cb9b81635ac8177e5890b45151180b292f746d5cd7d2dc676d5ddcac3b2802ca1e8626a5e5801ca06b95674f6a9d6c36d5d84f9d8ec99

      • C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe

        Filesize

        1.4MB

        MD5

        86ed8a6b8cf00b87bf5ab815b35e814e

        SHA1

        d1757ad80c0cf331d9a061a5ff82e71ea617740c

        SHA256

        74d6a150bd93d4f8f41d77f475a9a1297d7b031c21d4913b769585af2f8899cb

        SHA512

        bb9ec9223ee03214d2d80a4a915f246cadead8a54d2ec6ada97e9c0a5f3a6e20215eea527e636b750a4822fdb2d94711503ca9c2156788f57024edb666aa73bd

      • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe

        Filesize

        2.1MB

        MD5

        723f1b196d33087012b93c3887b5edf7

        SHA1

        2a23b0fc21dbbbde9e4b129d34950176e02a0e60

        SHA256

        351e5c27edd9e547deb92d6a5beda31670e2ea333c7370a7308ad3d1aaf317dd

        SHA512

        67feffa8f7a7a33bfe8a3ce5de1640da5cf8681a89e5bd095bec1bb65c5314176d15d33d52ef2826e82b1df6290bd2f89b917e0101c3b6d960bd6dcabf6c2159

      • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe

        Filesize

        1.3MB

        MD5

        896ec7c3af40667a3a4d315989586747

        SHA1

        c4d08ab314a68f356a6397d05eacc19cea9a55e7

        SHA256

        22b0c1b55acb781e9a254bf7a75d0be57ada4d673a88d38b3aeab66469c5daaa

        SHA512

        cdf5473c683e8c59e826cfbb7939c92cc364e51d7bd9b8b795d99d8769739069620dce900de3e1e0084ebadbcb0809aa68485a5da689d4056be51faeda679091

      • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe

        Filesize

        1.3MB

        MD5

        896ec7c3af40667a3a4d315989586747

        SHA1

        c4d08ab314a68f356a6397d05eacc19cea9a55e7

        SHA256

        22b0c1b55acb781e9a254bf7a75d0be57ada4d673a88d38b3aeab66469c5daaa

        SHA512

        cdf5473c683e8c59e826cfbb7939c92cc364e51d7bd9b8b795d99d8769739069620dce900de3e1e0084ebadbcb0809aa68485a5da689d4056be51faeda679091

      • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ngen_service.log

        Filesize

        872KB

        MD5

        fe4f67b8b40491e692adb318113aad86

        SHA1

        4484b3b10d087bb98f331bf308c5059510d3be45

        SHA256

        6428f0568c63f9b5e5c528c2dd708e4498d2a8d6ce053a00b6f4659b3c7f3537

        SHA512

        130aea5b50bfd9f285b5835921b157e4514a1ff75a3f91f89ab49f10b0e8af43fec2faf5a6b328aa6fcb5d8e487b8c852fc2f3ede4ae8fd8edcb617366ac18c8

      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe

        Filesize

        1.3MB

        MD5

        06f4e9b16ad317de4bd473baafb1bae2

        SHA1

        907152744f95a1471f84749b72afa4eddd76fb93

        SHA256

        a0485dbe5c36e40c4897ccab10fa86ce3bcc4394754d4af558357a3128987b49

        SHA512

        f279287f7dc3a838a98c7ebcfe5edcea9e924233f25466c7b44d612e4c96669a8323f1e99eec7ce992b4d5cc01ebc5974c8c62ed97f9afb2b22399f6a95a1396

      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe

        Filesize

        1.3MB

        MD5

        b0579edd296df837881dba6eb0c005c3

        SHA1

        4ee9b11ccbc424e0ea52bb53275d46e122877c32

        SHA256

        17558e35c1e6f3dc447dda8370186637c540f94e5dac3f052a03d07f3cf9f865

        SHA512

        f0b3ab699be1e06413e5255e57cc82efa4c651bab22c89e0a716bdc3fec9f2429f29a27e269307a2e71bcb3a0c40047a33ecd2a86d1482bb921d0d25e0d4b8d4

      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe

        Filesize

        1.3MB

        MD5

        b0579edd296df837881dba6eb0c005c3

        SHA1

        4ee9b11ccbc424e0ea52bb53275d46e122877c32

        SHA256

        17558e35c1e6f3dc447dda8370186637c540f94e5dac3f052a03d07f3cf9f865

        SHA512

        f0b3ab699be1e06413e5255e57cc82efa4c651bab22c89e0a716bdc3fec9f2429f29a27e269307a2e71bcb3a0c40047a33ecd2a86d1482bb921d0d25e0d4b8d4

      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe

        Filesize

        1.3MB

        MD5

        dc19f2453eeb7bf7daa7bb1211c22ac2

        SHA1

        e5a0426077dbf710445773bf28afcfdcdb312ad9

        SHA256

        854a002216a4d92eb029e136aa3236c15a16c4682e7ee30fafa68a77af1bf41e

        SHA512

        7062b9402ce738f665082af0e7b76d6805f5400282ba1bb94161f899cee1e82fdff8734fc708479bbb9b119507735275ea8ea4a9b07300032df4453488855364

      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe

        Filesize

        1.3MB

        MD5

        dc19f2453eeb7bf7daa7bb1211c22ac2

        SHA1

        e5a0426077dbf710445773bf28afcfdcdb312ad9

        SHA256

        854a002216a4d92eb029e136aa3236c15a16c4682e7ee30fafa68a77af1bf41e

        SHA512

        7062b9402ce738f665082af0e7b76d6805f5400282ba1bb94161f899cee1e82fdff8734fc708479bbb9b119507735275ea8ea4a9b07300032df4453488855364

      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\ngen_service.log

        Filesize

        1003KB

        MD5

        f5fb122b3ecdf47a0355407f2ae0ff30

        SHA1

        ca355baaf34721d117653576275507722e065f71

        SHA256

        6a470cc71337982e8f425bf84673e9f9ee7958f3bd73459098d16567fb50d4b8

        SHA512

        9f1430dbf3021d47f5cd9a47ecb651d62f84a0b362ae3d0e4de59ee43dad77d74ed1263e0f10448fb06a8b9f21b25bfc7eaa029e0626fe22d3fea517b1172b4e

      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe

        Filesize

        1.3MB

        MD5

        15e3fc4f4ea969fcfbf7356ac0a00160

        SHA1

        f260eb23651a95db43702e27baa1dd0cd745c113

        SHA256

        fc84491a2e42ad8626fc3b90cc80dd663814d088a711e0adbaa6dc3e84d9aeab

        SHA512

        5c662a68c6166458577c1a79ba9714ca14ab168b279cc5bb60e21f58ecf0de1600b2558a656a29ac9b0d294979faf1a1393d95c3936b280c2f538611ead20d3a

      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe

        Filesize

        1.3MB

        MD5

        15e3fc4f4ea969fcfbf7356ac0a00160

        SHA1

        f260eb23651a95db43702e27baa1dd0cd745c113

        SHA256

        fc84491a2e42ad8626fc3b90cc80dd663814d088a711e0adbaa6dc3e84d9aeab

        SHA512

        5c662a68c6166458577c1a79ba9714ca14ab168b279cc5bb60e21f58ecf0de1600b2558a656a29ac9b0d294979faf1a1393d95c3936b280c2f538611ead20d3a

      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe

        Filesize

        1.3MB

        MD5

        15e3fc4f4ea969fcfbf7356ac0a00160

        SHA1

        f260eb23651a95db43702e27baa1dd0cd745c113

        SHA256

        fc84491a2e42ad8626fc3b90cc80dd663814d088a711e0adbaa6dc3e84d9aeab

        SHA512

        5c662a68c6166458577c1a79ba9714ca14ab168b279cc5bb60e21f58ecf0de1600b2558a656a29ac9b0d294979faf1a1393d95c3936b280c2f538611ead20d3a

      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe

        Filesize

        1.3MB

        MD5

        15e3fc4f4ea969fcfbf7356ac0a00160

        SHA1

        f260eb23651a95db43702e27baa1dd0cd745c113

        SHA256

        fc84491a2e42ad8626fc3b90cc80dd663814d088a711e0adbaa6dc3e84d9aeab

        SHA512

        5c662a68c6166458577c1a79ba9714ca14ab168b279cc5bb60e21f58ecf0de1600b2558a656a29ac9b0d294979faf1a1393d95c3936b280c2f538611ead20d3a

      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe

        Filesize

        1.3MB

        MD5

        15e3fc4f4ea969fcfbf7356ac0a00160

        SHA1

        f260eb23651a95db43702e27baa1dd0cd745c113

        SHA256

        fc84491a2e42ad8626fc3b90cc80dd663814d088a711e0adbaa6dc3e84d9aeab

        SHA512

        5c662a68c6166458577c1a79ba9714ca14ab168b279cc5bb60e21f58ecf0de1600b2558a656a29ac9b0d294979faf1a1393d95c3936b280c2f538611ead20d3a

      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe

        Filesize

        1.3MB

        MD5

        15e3fc4f4ea969fcfbf7356ac0a00160

        SHA1

        f260eb23651a95db43702e27baa1dd0cd745c113

        SHA256

        fc84491a2e42ad8626fc3b90cc80dd663814d088a711e0adbaa6dc3e84d9aeab

        SHA512

        5c662a68c6166458577c1a79ba9714ca14ab168b279cc5bb60e21f58ecf0de1600b2558a656a29ac9b0d294979faf1a1393d95c3936b280c2f538611ead20d3a

      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe

        Filesize

        1.3MB

        MD5

        15e3fc4f4ea969fcfbf7356ac0a00160

        SHA1

        f260eb23651a95db43702e27baa1dd0cd745c113

        SHA256

        fc84491a2e42ad8626fc3b90cc80dd663814d088a711e0adbaa6dc3e84d9aeab

        SHA512

        5c662a68c6166458577c1a79ba9714ca14ab168b279cc5bb60e21f58ecf0de1600b2558a656a29ac9b0d294979faf1a1393d95c3936b280c2f538611ead20d3a

      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe

        Filesize

        1.3MB

        MD5

        15e3fc4f4ea969fcfbf7356ac0a00160

        SHA1

        f260eb23651a95db43702e27baa1dd0cd745c113

        SHA256

        fc84491a2e42ad8626fc3b90cc80dd663814d088a711e0adbaa6dc3e84d9aeab

        SHA512

        5c662a68c6166458577c1a79ba9714ca14ab168b279cc5bb60e21f58ecf0de1600b2558a656a29ac9b0d294979faf1a1393d95c3936b280c2f538611ead20d3a

      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe

        Filesize

        1.3MB

        MD5

        15e3fc4f4ea969fcfbf7356ac0a00160

        SHA1

        f260eb23651a95db43702e27baa1dd0cd745c113

        SHA256

        fc84491a2e42ad8626fc3b90cc80dd663814d088a711e0adbaa6dc3e84d9aeab

        SHA512

        5c662a68c6166458577c1a79ba9714ca14ab168b279cc5bb60e21f58ecf0de1600b2558a656a29ac9b0d294979faf1a1393d95c3936b280c2f538611ead20d3a

      • C:\Windows\System32\alg.exe

        Filesize

        1.3MB

        MD5

        7f765449c9300b066ddf33f97cd3fa56

        SHA1

        fd5c7b4838a18e41bb1f30cf0fc79e514669b460

        SHA256

        da9e0f16b4f586502527c8764fb0860f50076b59a2eaea1f4a4cb8ce996faccf

        SHA512

        a1b9fe6988d9c66f51503332b2556a3b694da346837c6f00c65b9e972703f8790d68ec5874c3219a6403b23b11527bb041a4b6e2ad22f7f9db31930573915e16

      • C:\Windows\System32\dllhost.exe

        Filesize

        1.2MB

        MD5

        a296a3fb7405abfdfae41ec735a12690

        SHA1

        5848fb1ab61887f78e76391071ae8901764e0fff

        SHA256

        a5f2fbe0c34fddb2e32d3d57aa5f3e8902c775f7a9353b8fa1e73716a88713f9

        SHA512

        17b7655f97d9fc2cb5f7f88125822f402a84ad49290baae0ebdf662dcc4b1e4b980239e6e600b0316435b67ad222272dd5f6fa2ecc01f5626940116da81a59d3

      • C:\Windows\System32\ieetwcollector.exe

        Filesize

        1.3MB

        MD5

        e01ce49c8751d5849f615dff1c33bd2c

        SHA1

        dd922d13f65beb3a4099fa2d2b53cbb9e8ebe4b8

        SHA256

        15bf5f9c4fb031a54d785d382eb8561d0198b257fc1b2523ed096df9eaa6abfd

        SHA512

        fdf605ed66fb2a97c9eb660ba8ad9b6a07e35f5185980b6a3e91b53e61f4fbe11e8767ef38a8d26b526b19c27a2db87db6c2d74ae30cc61d62ce412e9a3c8dd9

      • C:\Windows\ehome\ehrecvr.exe

        Filesize

        1.2MB

        MD5

        9d892e8066c10d4956009f54b005b91f

        SHA1

        8c972d115c848f25cf0aa9d5343143678c453585

        SHA256

        3e7ef203aea68ad6245c01e7d100a76bbce2a07ea3edc4233599cf60870b8e36

        SHA512

        657b990500fbb375e93d106293a583e7a539468c4f29edce55d26f32ec73ce0c1b6a0ead040965224f1c658c9fb4080b950c15c72852a1f0a019892c875d9a95

      • C:\Windows\ehome\ehsched.exe

        Filesize

        1.3MB

        MD5

        6c39a8c20adf92f891da437a41237833

        SHA1

        06c8388cb4c642a5d1a2960770272ac5a734e6b9

        SHA256

        febc7dc43fdea9037ae209afb805c923da5c5251be3ddc95f5204695c5fde75b

        SHA512

        5bab0c30267db7812735c52c5a82886718802f882bf433739f337effcab18c6946778dcd9502758b684397b2eecec300fc5bf3ba80781598b4d86f0c92c804b2

      • \Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe

        Filesize

        1.3MB

        MD5

        896ec7c3af40667a3a4d315989586747

        SHA1

        c4d08ab314a68f356a6397d05eacc19cea9a55e7

        SHA256

        22b0c1b55acb781e9a254bf7a75d0be57ada4d673a88d38b3aeab66469c5daaa

        SHA512

        cdf5473c683e8c59e826cfbb7939c92cc364e51d7bd9b8b795d99d8769739069620dce900de3e1e0084ebadbcb0809aa68485a5da689d4056be51faeda679091

      • \Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe

        Filesize

        1.3MB

        MD5

        06f4e9b16ad317de4bd473baafb1bae2

        SHA1

        907152744f95a1471f84749b72afa4eddd76fb93

        SHA256

        a0485dbe5c36e40c4897ccab10fa86ce3bcc4394754d4af558357a3128987b49

        SHA512

        f279287f7dc3a838a98c7ebcfe5edcea9e924233f25466c7b44d612e4c96669a8323f1e99eec7ce992b4d5cc01ebc5974c8c62ed97f9afb2b22399f6a95a1396

      • \Windows\System32\alg.exe

        Filesize

        1.3MB

        MD5

        7f765449c9300b066ddf33f97cd3fa56

        SHA1

        fd5c7b4838a18e41bb1f30cf0fc79e514669b460

        SHA256

        da9e0f16b4f586502527c8764fb0860f50076b59a2eaea1f4a4cb8ce996faccf

        SHA512

        a1b9fe6988d9c66f51503332b2556a3b694da346837c6f00c65b9e972703f8790d68ec5874c3219a6403b23b11527bb041a4b6e2ad22f7f9db31930573915e16

      • \Windows\System32\dllhost.exe

        Filesize

        1.2MB

        MD5

        a296a3fb7405abfdfae41ec735a12690

        SHA1

        5848fb1ab61887f78e76391071ae8901764e0fff

        SHA256

        a5f2fbe0c34fddb2e32d3d57aa5f3e8902c775f7a9353b8fa1e73716a88713f9

        SHA512

        17b7655f97d9fc2cb5f7f88125822f402a84ad49290baae0ebdf662dcc4b1e4b980239e6e600b0316435b67ad222272dd5f6fa2ecc01f5626940116da81a59d3

      • \Windows\System32\ieetwcollector.exe

        Filesize

        1.3MB

        MD5

        e01ce49c8751d5849f615dff1c33bd2c

        SHA1

        dd922d13f65beb3a4099fa2d2b53cbb9e8ebe4b8

        SHA256

        15bf5f9c4fb031a54d785d382eb8561d0198b257fc1b2523ed096df9eaa6abfd

        SHA512

        fdf605ed66fb2a97c9eb660ba8ad9b6a07e35f5185980b6a3e91b53e61f4fbe11e8767ef38a8d26b526b19c27a2db87db6c2d74ae30cc61d62ce412e9a3c8dd9

      • \Windows\ehome\ehrecvr.exe

        Filesize

        1.2MB

        MD5

        9d892e8066c10d4956009f54b005b91f

        SHA1

        8c972d115c848f25cf0aa9d5343143678c453585

        SHA256

        3e7ef203aea68ad6245c01e7d100a76bbce2a07ea3edc4233599cf60870b8e36

        SHA512

        657b990500fbb375e93d106293a583e7a539468c4f29edce55d26f32ec73ce0c1b6a0ead040965224f1c658c9fb4080b950c15c72852a1f0a019892c875d9a95

      • \Windows\ehome\ehsched.exe

        Filesize

        1.3MB

        MD5

        6c39a8c20adf92f891da437a41237833

        SHA1

        06c8388cb4c642a5d1a2960770272ac5a734e6b9

        SHA256

        febc7dc43fdea9037ae209afb805c923da5c5251be3ddc95f5204695c5fde75b

        SHA512

        5bab0c30267db7812735c52c5a82886718802f882bf433739f337effcab18c6946778dcd9502758b684397b2eecec300fc5bf3ba80781598b4d86f0c92c804b2

      • memory/468-242-0x0000000140000000-0x0000000140237000-memory.dmp

        Filesize

        2.2MB

      • memory/468-292-0x0000000140000000-0x0000000140237000-memory.dmp

        Filesize

        2.2MB

      • memory/580-145-0x0000000000400000-0x0000000000654000-memory.dmp

        Filesize

        2.3MB

      • memory/580-62-0x0000000000400000-0x0000000000654000-memory.dmp

        Filesize

        2.3MB

      • memory/580-61-0x0000000000400000-0x0000000000654000-memory.dmp

        Filesize

        2.3MB

      • memory/580-63-0x0000000000400000-0x0000000000654000-memory.dmp

        Filesize

        2.3MB

      • memory/580-65-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

        Filesize

        4KB

      • memory/580-66-0x0000000000400000-0x0000000000654000-memory.dmp

        Filesize

        2.3MB

      • memory/580-68-0x0000000000400000-0x0000000000654000-memory.dmp

        Filesize

        2.3MB

      • memory/580-69-0x0000000001F90000-0x0000000001FF6000-memory.dmp

        Filesize

        408KB

      • memory/580-74-0x0000000001F90000-0x0000000001FF6000-memory.dmp

        Filesize

        408KB

      • memory/580-95-0x0000000000400000-0x0000000000654000-memory.dmp

        Filesize

        2.3MB

      • memory/764-277-0x000000002E000000-0x000000002FE1E000-memory.dmp

        Filesize

        30.1MB

      • memory/828-82-0x0000000000830000-0x0000000000890000-memory.dmp

        Filesize

        384KB

      • memory/828-96-0x0000000100000000-0x00000001001FB000-memory.dmp

        Filesize

        2.0MB

      • memory/828-88-0x0000000000830000-0x0000000000890000-memory.dmp

        Filesize

        384KB

      • memory/836-129-0x0000000010000000-0x00000000101F6000-memory.dmp

        Filesize

        2.0MB

      • memory/880-267-0x0000000140000000-0x0000000140205000-memory.dmp

        Filesize

        2.0MB

      • memory/988-144-0x0000000140000000-0x0000000140205000-memory.dmp

        Filesize

        2.0MB

      • memory/1092-270-0x00000000008A0000-0x0000000000920000-memory.dmp

        Filesize

        512KB

      • memory/1284-127-0x0000000000710000-0x0000000000776000-memory.dmp

        Filesize

        408KB

      • memory/1284-121-0x0000000000710000-0x0000000000776000-memory.dmp

        Filesize

        408KB

      • memory/1284-131-0x0000000000400000-0x00000000005FF000-memory.dmp

        Filesize

        2.0MB

      • memory/1360-191-0x0000000000170000-0x00000000001D0000-memory.dmp

        Filesize

        384KB

      • memory/1360-194-0x0000000140000000-0x0000000140209000-memory.dmp

        Filesize

        2.0MB

      • memory/1360-185-0x0000000000170000-0x00000000001D0000-memory.dmp

        Filesize

        384KB

      • memory/1360-207-0x0000000140000000-0x0000000140209000-memory.dmp

        Filesize

        2.0MB

      • memory/1388-220-0x0000000000400000-0x00000000005FF000-memory.dmp

        Filesize

        2.0MB

      • memory/1388-227-0x0000000000400000-0x00000000005FF000-memory.dmp

        Filesize

        2.0MB

      • memory/1408-130-0x0000000010000000-0x00000000101FE000-memory.dmp

        Filesize

        2.0MB

      • memory/1492-115-0x0000000000090000-0x00000000000F6000-memory.dmp

        Filesize

        408KB

      • memory/1492-133-0x0000000002540000-0x0000000002580000-memory.dmp

        Filesize

        256KB

      • memory/1492-107-0x0000000000090000-0x00000000000F6000-memory.dmp

        Filesize

        408KB

      • memory/1492-125-0x0000000002400000-0x00000000024BC000-memory.dmp

        Filesize

        752KB

      • memory/1492-106-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

        Filesize

        4KB

      • memory/1492-105-0x0000000000090000-0x00000000000F6000-memory.dmp

        Filesize

        408KB

      • memory/1492-112-0x0000000000090000-0x00000000000F6000-memory.dmp

        Filesize

        408KB

      • memory/1512-169-0x0000000100000000-0x00000001001EC000-memory.dmp

        Filesize

        1.9MB

      • memory/1708-58-0x0000000000430000-0x000000000043C000-memory.dmp

        Filesize

        48KB

      • memory/1708-57-0x0000000004F80000-0x0000000004FC0000-memory.dmp

        Filesize

        256KB

      • memory/1708-59-0x0000000005B60000-0x0000000005C98000-memory.dmp

        Filesize

        1.2MB

      • memory/1708-56-0x0000000004F80000-0x0000000004FC0000-memory.dmp

        Filesize

        256KB

      • memory/1708-60-0x0000000005CA0000-0x0000000005E50000-memory.dmp

        Filesize

        1.7MB

      • memory/1708-55-0x00000000003F0000-0x0000000000402000-memory.dmp

        Filesize

        72KB

      • memory/1708-54-0x00000000001B0000-0x0000000000338000-memory.dmp

        Filesize

        1.5MB

      • memory/1756-291-0x00000000014B0000-0x00000000014B1000-memory.dmp

        Filesize

        4KB

      • memory/1756-198-0x0000000140000000-0x000000014013C000-memory.dmp

        Filesize

        1.2MB

      • memory/1756-173-0x0000000140000000-0x000000014013C000-memory.dmp

        Filesize

        1.2MB

      • memory/1756-180-0x00000000008A0000-0x0000000000900000-memory.dmp

        Filesize

        384KB

      • memory/1756-174-0x00000000008A0000-0x0000000000900000-memory.dmp

        Filesize

        384KB

      • memory/1756-221-0x00000000014B0000-0x00000000014B1000-memory.dmp

        Filesize

        4KB

      • memory/1784-219-0x0000000000400000-0x00000000005FF000-memory.dmp

        Filesize

        2.0MB

      • memory/1784-208-0x0000000000400000-0x00000000005FF000-memory.dmp

        Filesize

        2.0MB

      • memory/1788-97-0x0000000140000000-0x00000001401F4000-memory.dmp

        Filesize

        2.0MB

      • memory/1788-146-0x0000000140000000-0x00000001401F4000-memory.dmp

        Filesize

        2.0MB

      • memory/1832-254-0x0000000000400000-0x00000000005FF000-memory.dmp

        Filesize

        2.0MB

      • memory/1832-243-0x0000000000400000-0x00000000005FF000-memory.dmp

        Filesize

        2.0MB

      • memory/1912-255-0x0000000000400000-0x00000000005FF000-memory.dmp

        Filesize

        2.0MB

      • memory/1912-296-0x0000000000400000-0x00000000005FF000-memory.dmp

        Filesize

        2.0MB

      • memory/1940-168-0x0000000000400000-0x00000000005FF000-memory.dmp

        Filesize

        2.0MB

      • memory/1940-160-0x0000000000730000-0x0000000000796000-memory.dmp

        Filesize

        408KB

      • memory/1940-155-0x0000000000730000-0x0000000000796000-memory.dmp

        Filesize

        408KB

      • memory/2044-170-0x0000000000400000-0x00000000005FF000-memory.dmp

        Filesize

        2.0MB

      • memory/2044-164-0x0000000000230000-0x0000000000296000-memory.dmp

        Filesize

        408KB

      • memory/2176-290-0x0000000140000000-0x0000000140221000-memory.dmp

        Filesize

        2.1MB

      • memory/2268-304-0x0000000000400000-0x00000000005FF000-memory.dmp

        Filesize

        2.0MB