Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    151s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/05/2023, 14:29

General

  • Target

    Technical Spec.exe

  • Size

    1.5MB

  • MD5

    ebf99fc11603d1ec4706b4330761df32

  • SHA1

    c560ca5ae10593d7861701654d839d1071515866

  • SHA256

    693c258cb5620f7e8714d4afc7215e2c7dc16872265148341db23b639906eecb

  • SHA512

    d31c699f201343bd02c07bbf5d41e00df8368b81bfbb1d037fb4b1e1894fd3b8232e80b065845745fa6dab7f23d47efbb1d8b6a9143f5b7db0fb4a57395c4f4a

  • SSDEEP

    49152:NQh9Nn3uFcWIY2YZGIUtNlMpovD2i9c2:0/37Wp2YPUtNlMG7N

Malware Config

Extracted

Family

blustealer

C2

https://api.telegram.org/bot5797428905:AAGaRRXGZN1d9GGFd3sE5x4uSpCGF0PU4m4/sendMessage?chat_id=1251788325

Signatures

  • BluStealer

    A Modular information stealer written in Visual Basic.

  • Executes dropped EXE 22 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Drops file in System32 directory 29 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 64 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 64 IoCs
  • Script User-Agent 1 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: EnumeratesProcesses 39 IoCs
  • Suspicious behavior: LoadsDriver 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 44 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Technical Spec.exe
    "C:\Users\Admin\AppData\Local\Temp\Technical Spec.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4352
    • C:\Users\Admin\AppData\Local\Temp\Technical Spec.exe
      "C:\Users\Admin\AppData\Local\Temp\Technical Spec.exe"
      2⤵
        PID:4116
      • C:\Users\Admin\AppData\Local\Temp\Technical Spec.exe
        "C:\Users\Admin\AppData\Local\Temp\Technical Spec.exe"
        2⤵
          PID:4508
        • C:\Users\Admin\AppData\Local\Temp\Technical Spec.exe
          "C:\Users\Admin\AppData\Local\Temp\Technical Spec.exe"
          2⤵
          • Drops file in System32 directory
          • Suspicious use of SetThreadContext
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:3676
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
            C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
            3⤵
            • Accesses Microsoft Outlook profiles
            • outlook_office_path
            • outlook_win_path
            PID:3584
      • C:\Windows\System32\alg.exe
        C:\Windows\System32\alg.exe
        1⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        PID:2704
      • C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe
        C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe
        1⤵
        • Executes dropped EXE
        PID:2884
      • C:\Windows\System32\svchost.exe
        C:\Windows\System32\svchost.exe -k NetworkService -p -s TapiSrv
        1⤵
          PID:1116
        • C:\Windows\system32\fxssvc.exe
          C:\Windows\system32\fxssvc.exe
          1⤵
          • Executes dropped EXE
          • Modifies data under HKEY_USERS
          • Suspicious use of AdjustPrivilegeToken
          PID:5104
        • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
          "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
          1⤵
          • Executes dropped EXE
          PID:1360
        • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"
          1⤵
          • Executes dropped EXE
          PID:2328
        • C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe
          "C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"
          1⤵
          • Executes dropped EXE
          PID:3796
        • C:\Windows\System32\msdtc.exe
          C:\Windows\System32\msdtc.exe
          1⤵
          • Executes dropped EXE
          • Drops file in System32 directory
          • Drops file in Windows directory
          PID:3352
        • \??\c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE
          "c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"
          1⤵
          • Executes dropped EXE
          PID:1676
        • C:\Windows\system32\PerceptionSimulation\PerceptionSimulationService.exe
          C:\Windows\system32\PerceptionSimulation\PerceptionSimulationService.exe
          1⤵
          • Executes dropped EXE
          PID:2336
        • C:\Windows\SysWow64\perfhost.exe
          C:\Windows\SysWow64\perfhost.exe
          1⤵
          • Executes dropped EXE
          PID:2732
        • C:\Windows\system32\locator.exe
          C:\Windows\system32\locator.exe
          1⤵
          • Executes dropped EXE
          PID:5100
        • C:\Windows\System32\SensorDataService.exe
          C:\Windows\System32\SensorDataService.exe
          1⤵
          • Executes dropped EXE
          • Checks SCSI registry key(s)
          PID:2004
        • C:\Windows\System32\snmptrap.exe
          C:\Windows\System32\snmptrap.exe
          1⤵
          • Executes dropped EXE
          PID:2800
        • C:\Windows\system32\spectrum.exe
          C:\Windows\system32\spectrum.exe
          1⤵
          • Executes dropped EXE
          • Checks SCSI registry key(s)
          PID:5108
        • C:\Windows\System32\OpenSSH\ssh-agent.exe
          C:\Windows\System32\OpenSSH\ssh-agent.exe
          1⤵
          • Executes dropped EXE
          PID:4652
        • C:\Windows\system32\svchost.exe
          C:\Windows\system32\svchost.exe -k LocalService -p -s SharedRealitySvc
          1⤵
            PID:1744
          • C:\Windows\system32\TieringEngineService.exe
            C:\Windows\system32\TieringEngineService.exe
            1⤵
            • Executes dropped EXE
            • Checks processor information in registry
            • Suspicious use of AdjustPrivilegeToken
            PID:3092
          • C:\Windows\system32\AgentService.exe
            C:\Windows\system32\AgentService.exe
            1⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            PID:4396
          • C:\Windows\System32\vds.exe
            C:\Windows\System32\vds.exe
            1⤵
            • Executes dropped EXE
            PID:2964
          • C:\Windows\system32\vssvc.exe
            C:\Windows\system32\vssvc.exe
            1⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            PID:3960
          • C:\Windows\system32\wbengine.exe
            "C:\Windows\system32\wbengine.exe"
            1⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            PID:2820
          • C:\Windows\system32\wbem\WmiApSrv.exe
            C:\Windows\system32\wbem\WmiApSrv.exe
            1⤵
            • Executes dropped EXE
            PID:2936
          • C:\Windows\system32\SearchIndexer.exe
            C:\Windows\system32\SearchIndexer.exe /Embedding
            1⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:736
            • C:\Windows\system32\SearchProtocolHost.exe
              "C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe1_ Global\UsGthrCtrlFltPipeMssGthrPipe1 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon"
              2⤵
              • Modifies data under HKEY_USERS
              PID:1124
            • C:\Windows\system32\SearchFilterHost.exe
              "C:\Windows\system32\SearchFilterHost.exe" 0 916 920 928 8192 924 900
              2⤵
              • Modifies data under HKEY_USERS
              PID:2736

          Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe

            Filesize

            2.1MB

            MD5

            922dec213b3817e94eb9a2d2814f04c7

            SHA1

            9b1fa044613c2a657bf2ba657bc6e8342f912f50

            SHA256

            e37a76a01a99312b42edd34b7121a3d4317e56fb1619c0b9a9e90bf65a1fecb4

            SHA512

            edbe2ec911fa03b9ab783985fda314d77d70d8850bc6653b6e25d7bc558c73ac9d77f5cb5d0a499b7cf3b3c569ec3f28366718ddb6db73c84848d264d0d4724b

          • C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe

            Filesize

            1.4MB

            MD5

            7b895b3eb64d81a2f08d3c5c1f407ef8

            SHA1

            c123311199f0b16fac7fc4d4bf7513d1ef01ff24

            SHA256

            6ff7f2cb16de201104bacd58a42c1bad99ab7f3833bc4b7ad3dcda7b6c8515ac

            SHA512

            50e24f9117ac1b30427d354f2f147b2214b84d0040cc436008f33bbc03a31dd3c0799644f6079f269460ba31f62745299b7729978cedb1a0d402f5acadd81a75

          • C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe

            Filesize

            1.4MB

            MD5

            7b895b3eb64d81a2f08d3c5c1f407ef8

            SHA1

            c123311199f0b16fac7fc4d4bf7513d1ef01ff24

            SHA256

            6ff7f2cb16de201104bacd58a42c1bad99ab7f3833bc4b7ad3dcda7b6c8515ac

            SHA512

            50e24f9117ac1b30427d354f2f147b2214b84d0040cc436008f33bbc03a31dd3c0799644f6079f269460ba31f62745299b7729978cedb1a0d402f5acadd81a75

          • C:\Program Files\Common Files\microsoft shared\Source Engine\OSE.EXE

            Filesize

            1.5MB

            MD5

            bfb840ee259e8e39c8f2ebd164a3dd29

            SHA1

            3f0456c28e0da59ef220440d92e3592330e999b5

            SHA256

            94d655f6c33f3986f96e24002fd5e0b873aaecc314a7f64d15d63aaec55d143e

            SHA512

            1cc21a58bc4bda19202392bfd858c7599cabcf50acd8d9595a549174eb901aeaf84954ef224c3b88226607feeff9d664679703aa2f407df2b457435fca07e1a8

          • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe

            Filesize

            2.1MB

            MD5

            c295ff9ef3432a11460781f712b11554

            SHA1

            f0fa497d9726c2021bec5291e9140a2048ab0418

            SHA256

            4dc0f3499637a7c9f73f1cb7d019a9cefb8afd12a7d89588a247625d5f3db829

            SHA512

            1f7cc61d3437f9ad4bb2cff3d822011d432c71baf9b1f655c9ef4c725c6556000bd3afe96e0e3b0e5f4ca9fdedb08fc17859e102f5224abdaa72678dcde1ac53

          • C:\Windows\SysWOW64\perfhost.exe

            Filesize

            1.2MB

            MD5

            8a14fb572708de33c367e2e47c4b0ae6

            SHA1

            ca8d7c77b222c30c93aab6b43516082fb014138a

            SHA256

            5aeca3483856a0bd3897714f00f938216803165e5c407080fa29f8cc05ff5e1d

            SHA512

            7d439c4f80a6b642cf2ff6cde9d4f5c421fecbfaa909c626f6248a9dd5ad1d438bd5885cb6be345c319283a49811f3446026119cdf49175ff783600d926ef45f

          • C:\Windows\System32\AgentService.exe

            Filesize

            1.7MB

            MD5

            6be07c07536d28348e6b4b4bbdf7bda5

            SHA1

            7c857d235889ab1efb060a6f08882d77b1fa72b8

            SHA256

            8541655c2e8cedb21c7b70be0f88c6b6cb4146cd38c80e12d258e116dd57224f

            SHA512

            7ec319c10149699b3acc93cd7ffdf8478a86816bd6cc70a0124a0abb31a884e3630e42a2bdb310ea5ef84d7bae7b5168a114822a863c0ce882f0aa2f31fc05d7

          • C:\Windows\System32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe

            Filesize

            1.3MB

            MD5

            8414b7acac435abe5561f42ca7b9fc8b

            SHA1

            d575383c80c30f352899feb32ed363fb43af761a

            SHA256

            88a22065a445c57187a14a09ca2d1d11bc737b2d4978a5d664ab7c877baad115

            SHA512

            72a55592b033996b1fa7b3ce2a4d2ff82a13c76a84b2e585ba22634145e81b781a82d097422b2c02bed99ac06c4c1b377a532f502b22f690608bb2b82763a7ad

          • C:\Windows\System32\FXSSVC.exe

            Filesize

            1.2MB

            MD5

            dd0c59deaa5cf3d507b30e79eb7c6fca

            SHA1

            309e5ec2719471780ad3ddeb4f0c428997cf8429

            SHA256

            99387ab10974d19bf726be00409f77e8d313e1fc40191f09b518f0e800b1016c

            SHA512

            7e0075e7c644f6975947fbf961ea52947ac9e1adb9aeffbc1c2e2ec2174b9063606225249d4bf529a213fe3aa6bc5c11c4bd071def5dc19c187bded3b1edaeaa

          • C:\Windows\System32\Locator.exe

            Filesize

            1.2MB

            MD5

            2f5c33564d7a6637e17c0a13312000ab

            SHA1

            33d6703165c3f13f1d4be79a9d30e3b043a6bae3

            SHA256

            2197473286b506f330ac397433dda73a3d79d0be707a84bf279bc9c5bdd8caf7

            SHA512

            94c664349f0515bb293a0deee5b777de06f417a7135dd32cf5be31ba5f3387d57811a40b6fa2c2f07d82aaeda17a528babc7ddb4712fb2723822b9ab01040331

          • C:\Windows\System32\OpenSSH\ssh-agent.exe

            Filesize

            1.6MB

            MD5

            50dc799415c72de4198e9e20387e8ccd

            SHA1

            b480bcc19574d4283dd2e720d31f330c27af23de

            SHA256

            47241094a68d9c0c88166b047d8bc835aa36ecb07721e5db616e8e4dabe25492

            SHA512

            73ff51a20a6edb0de6578cf1d8549eabf9b5ab7371a961d6145554f780c4a8a4753fe372933ea526dacfc0903a4d9c9a871991def0dcb84d8139d657e7c1b0a3

          • C:\Windows\System32\OpenSSH\ssh-agent.exe

            Filesize

            1.6MB

            MD5

            50dc799415c72de4198e9e20387e8ccd

            SHA1

            b480bcc19574d4283dd2e720d31f330c27af23de

            SHA256

            47241094a68d9c0c88166b047d8bc835aa36ecb07721e5db616e8e4dabe25492

            SHA512

            73ff51a20a6edb0de6578cf1d8549eabf9b5ab7371a961d6145554f780c4a8a4753fe372933ea526dacfc0903a4d9c9a871991def0dcb84d8139d657e7c1b0a3

          • C:\Windows\System32\PerceptionSimulation\PerceptionSimulationService.exe

            Filesize

            1.3MB

            MD5

            c0b239111253286e4983ad040e05f20a

            SHA1

            8773c5febabd50240f744e08ac6bfd7ac12455d7

            SHA256

            53582b4b38b6280fb5d55ddb3ebff6cd026383018efd45604d1e7fa5389356d2

            SHA512

            d19f73a3e1f69734f8c99c28b53b339e13c80f74f1d428e61b20fd172602346291053b4cede1313af8d45ffadb2ddcee9d2fd1a9875b8d5717cd83673b9ca681

          • C:\Windows\System32\SearchIndexer.exe

            Filesize

            1.4MB

            MD5

            1c91cd64e0d28fd9612a75b6e3a59650

            SHA1

            55e749789ac0109cab3c315b6d6bf288a7230b5a

            SHA256

            d462242c213414250d67576b9f9d7899f08b5f303829d5d5e802861a99dfea6f

            SHA512

            8e58356b67b41df6f46bbb2f06f1c9316ec2e1ac65ca0028aa1bb3aa5b14ec6b48c5be3cc43ff62bc4606954ac740f855a5cd567f01fbb67d49fd58c36364b37

          • C:\Windows\System32\SensorDataService.exe

            Filesize

            1.8MB

            MD5

            9a518c616bbd6c3e00b4f1b4d1600bba

            SHA1

            d2bf063368092897f3191c3c0a88162d325ddd57

            SHA256

            00c9df5b4b9c2097a9f1d1cd66f33d3e04128b087195149660c8141edbe3ef91

            SHA512

            6145b8e09fe0e65661483e7d8231d9ddfb7a0372ee29fd9db72f6f0489ffce669706890b3f727a10dde9a63fcd8f50a5fd05e149dbc161fda129e78bf778352e

          • C:\Windows\System32\SensorDataService.exe

            Filesize

            1.6MB

            MD5

            a5124edd0a70bf3ae9e02aee5ee012d5

            SHA1

            26e226102cda63403ef9d6c7c303f30e4f5da1eb

            SHA256

            ac6cc39b1be219fe8a60f13112bd8ceccbd862eb3b542d34fff9c1e060598527

            SHA512

            373546ee20e285a53af4e06236ccb48d408ec41f7bfee3fb42c37f16e14c853b99e320fe5e3e18b9238e3391f9f1d88f642cacb9754409b5c2a18de4dded1c52

          • C:\Windows\System32\Spectrum.exe

            Filesize

            1.4MB

            MD5

            2a8d7de9ceaad4afcaa8ec395bda919d

            SHA1

            c866bf28d414e6e360207474cd250f62492e86a8

            SHA256

            4f3b3c6868e8e095e87b231707d466f910829108db552146f933a34b8cb15128

            SHA512

            0c3025a6b01ee8b1fb354050a228cf3111ff261d16f0d68ddb16258cc6828a4071963d7edcf17a32537e6ea2d1f734c3833130eb5cd692dcc2fe65e3c8dc7bc7

          • C:\Windows\System32\TieringEngineService.exe

            Filesize

            1.5MB

            MD5

            c390fea7b7d1f2485a4bcf34068cfbcb

            SHA1

            90cb86bd7fb3f6e60e53d89877af1536a04c2655

            SHA256

            02f8043f42fb8cc2ebf1956ec8e133b5b44e54d2a1a904eac38d2322897f8d19

            SHA512

            a333a6d76b7f50a7ea41d043be70a3f9fee8efd2a2831d1771203ed38cacd04964ad182559d1c338ca971bde5d3e41895666e3b3bc3b359f9f35e6998e1c9a00

          • C:\Windows\System32\VSSVC.exe

            Filesize

            2.0MB

            MD5

            31de51a5f02d0de5fd6427cb6b411b9f

            SHA1

            1d4d5b9100207f737486fd4f1c4cbb76a4580f21

            SHA256

            41dd969b4d13326719eb853f4fa2d5e29e0d9a05f3ddea1ae7f2cb350eaa6d31

            SHA512

            79dd6715287a10bf0532689d0fdcdb6ce04301d5bfc711b16eb0f51b2a5de7e607af0970b129e0231eabb3b2178031be95b7009bd84b6ff546280e482d82e990

          • C:\Windows\System32\alg.exe

            Filesize

            1.3MB

            MD5

            cc4790450fb1692fbe9fcaf23fcadb3c

            SHA1

            e4fd87d924e264ed5a504b3f5f1bef7e57638ac1

            SHA256

            f1f8af55f1ee62c977748233e6bafdaf0f2b1a778fea0b1dd383b0d114ade6e0

            SHA512

            0e954e66ae76d4a33b65ad1358d7177844a8f27dda97959d52596252337b27bcfa9e247359b74cc84092c0834da945720951a35f7a78bb718972fefa1abcd8df

          • C:\Windows\System32\msdtc.exe

            Filesize

            1.4MB

            MD5

            380b31989254d08719d075fc522a9af3

            SHA1

            d3215017868ab1a14334ecb7845b8a35912c463c

            SHA256

            ca54c44c64a8f0371c109dc706cb8b36e66cb4d56c4452f3923e012ba5b3c50c

            SHA512

            404bf4049260bde32bc70547ee1dd25860be37fdfbb2405e0dad6f3f181613b2cda5c40a5f08f48accdbac5509303ed3f01b77fb0ca73f277ed1f74cf5be9a14

          • C:\Windows\System32\snmptrap.exe

            Filesize

            1.2MB

            MD5

            1de337d9e58e3232140cecedf46f4d1f

            SHA1

            08c79c116933c85c0a0c312edb89517985bee9f9

            SHA256

            23f3cd8923aaf2d0c11ac74ef48c316878b03ec8ed234e75f45c8db2e28c07f1

            SHA512

            d2c762c83f86f79c0b4d5815e74018f0e0f7a1b8006e0e31ebaabb0bf19476fb9254d6cccef46a346ff70acc15513eaecd2153b826a6fe9badcba9cd1689db0f

          • C:\Windows\System32\vds.exe

            Filesize

            1.3MB

            MD5

            5c56781413d90bd1e280733591150a90

            SHA1

            fa4f06e975a9e40437a82ec6af3591b9e1920535

            SHA256

            21ee59f41a0ee2d0f9d640f3848f135ed25b30f006c29bac56bd54b4bee1f2cd

            SHA512

            6bb4a1f16b84f7065557e3a9cf599baac8c08641e8f4fcdf57967c0d2ff1b4d9c74bbba405e3db4f34a77a305dedbafe85e731c0ed883b79ee902994f6cec681

          • C:\Windows\System32\wbem\WmiApSrv.exe

            Filesize

            1.4MB

            MD5

            87aec108d9c6c183a49372ab48aeeca0

            SHA1

            bc51c3e4647823cbeb39c955d9c20fd034ab6a46

            SHA256

            44317f1ba1e07d125ab64fc58593166f17307db6f28d20d392d6939b50eb8fe9

            SHA512

            b51135709927b7a90bc6fd63b71c998ed352bbd260e034ea58978b12c1b930697049ce75536e26d2f92821522096937a4d4750c1efa901a522660c715d873dd9

          • C:\Windows\System32\wbengine.exe

            Filesize

            2.1MB

            MD5

            d8fa7fe6a33485ebd2724936647a46cc

            SHA1

            59bf0f82e8515fe18af8f146b0c43bcbc5322f48

            SHA256

            626ff528ad69e9760e46782b61a20e51094cfafe54cc06cdf5dbb90bd486ac90

            SHA512

            cd6121d63f0919fb5113252f683bd07f66a50743a11304b886e4fdcb1a406d2a52fb1024b94bc67a45a1b2c7a536f79b01b2bb91b607b0a2d92515315a9408d7

          • C:\Windows\system32\AppVClient.exe

            Filesize

            1.3MB

            MD5

            6797acff1cf4539fbd0c538021e5557f

            SHA1

            738c277759be82971273e3a4aacd973bbe6bdbee

            SHA256

            bbb5ec50a057b62095cb210cff0cdf807a6ac6d64047b0e5f75a82d927e3f51c

            SHA512

            68eb1d1335798cd72e9ce778e41eb703456b63dc27a8986ae16c540f765f0c7b24f181326d98af0a6befa91c493009d9a5560e7890845a2526a53036b03c2195

          • C:\Windows\system32\SgrmBroker.exe

            Filesize

            1.5MB

            MD5

            6e5be8227c47ccf9b63da12504f7e782

            SHA1

            3939be385518c58dbec32a28db97494cc5fd5526

            SHA256

            9b0ed4b1c2d4ac4f1040950da732cb29960807c83e6e48421a4ffb737f3c294c

            SHA512

            0daa1e17843aa01f1469e14d7ab3985356a7dc1898c790018cfd23a8006b361a45732ce70097674e3eb638b51cf9f73e5d18b533b0ebe311e04035f751081d77

          • C:\Windows\system32\fxssvc.exe

            Filesize

            1.2MB

            MD5

            dd0c59deaa5cf3d507b30e79eb7c6fca

            SHA1

            309e5ec2719471780ad3ddeb4f0c428997cf8429

            SHA256

            99387ab10974d19bf726be00409f77e8d313e1fc40191f09b518f0e800b1016c

            SHA512

            7e0075e7c644f6975947fbf961ea52947ac9e1adb9aeffbc1c2e2ec2174b9063606225249d4bf529a213fe3aa6bc5c11c4bd071def5dc19c187bded3b1edaeaa

          • C:\Windows\system32\msiexec.exe

            Filesize

            1.3MB

            MD5

            3689c3589850aba935460124cc87c51e

            SHA1

            1cdf060c45097f04ee342e688c2a569be4ef526e

            SHA256

            8d55204a654df68befb149652ae5d7bf802e63bc3b330e2734e7993bf4d4d9e1

            SHA512

            bb65aa748e6fabd2b876e962f5501edc15bc98b319c7910c0413bd8bf945c198a34f2a4216445f0d015650a05667b13ac10abbcb438028fdc07490bf4a246874

          • memory/736-702-0x0000000140000000-0x0000000140179000-memory.dmp

            Filesize

            1.5MB

          • memory/736-436-0x0000000140000000-0x0000000140179000-memory.dmp

            Filesize

            1.5MB

          • memory/1360-539-0x0000000140000000-0x0000000140237000-memory.dmp

            Filesize

            2.2MB

          • memory/1360-213-0x0000000140000000-0x0000000140237000-memory.dmp

            Filesize

            2.2MB

          • memory/1360-194-0x00000000006F0000-0x0000000000750000-memory.dmp

            Filesize

            384KB

          • memory/1360-201-0x00000000006F0000-0x0000000000750000-memory.dmp

            Filesize

            384KB

          • memory/1676-269-0x0000000140000000-0x0000000140226000-memory.dmp

            Filesize

            2.1MB

          • memory/2004-302-0x0000000140000000-0x00000001401D7000-memory.dmp

            Filesize

            1.8MB

          • memory/2004-586-0x0000000140000000-0x00000001401D7000-memory.dmp

            Filesize

            1.8MB

          • memory/2328-217-0x0000000140000000-0x000000014022B000-memory.dmp

            Filesize

            2.2MB

          • memory/2328-206-0x0000000000190000-0x00000000001F0000-memory.dmp

            Filesize

            384KB

          • memory/2328-536-0x0000000140000000-0x000000014022B000-memory.dmp

            Filesize

            2.2MB

          • memory/2328-215-0x0000000000190000-0x00000000001F0000-memory.dmp

            Filesize

            384KB

          • memory/2336-271-0x0000000140000000-0x0000000140202000-memory.dmp

            Filesize

            2.0MB

          • memory/2704-164-0x0000000140000000-0x0000000140201000-memory.dmp

            Filesize

            2.0MB

          • memory/2704-163-0x0000000000560000-0x00000000005C0000-memory.dmp

            Filesize

            384KB

          • memory/2704-156-0x0000000000560000-0x00000000005C0000-memory.dmp

            Filesize

            384KB

          • memory/2704-433-0x0000000140000000-0x0000000140201000-memory.dmp

            Filesize

            2.0MB

          • memory/2732-298-0x0000000000400000-0x00000000005EE000-memory.dmp

            Filesize

            1.9MB

          • memory/2736-625-0x000001DF293D0000-0x000001DF294D0000-memory.dmp

            Filesize

            1024KB

          • memory/2736-626-0x000001DF293D0000-0x000001DF294D0000-memory.dmp

            Filesize

            1024KB

          • memory/2736-644-0x000001DF29AD0000-0x000001DF29AEA000-memory.dmp

            Filesize

            104KB

          • memory/2736-645-0x000001DF29AD0000-0x000001DF29AEA000-memory.dmp

            Filesize

            104KB

          • memory/2736-624-0x000001DF293B0000-0x000001DF293B1000-memory.dmp

            Filesize

            4KB

          • memory/2736-646-0x000001DF29AD0000-0x000001DF29AEA000-memory.dmp

            Filesize

            104KB

          • memory/2736-692-0x000001DF29AD0000-0x000001DF29AEA000-memory.dmp

            Filesize

            104KB

          • memory/2736-694-0x000001DF29AD0000-0x000001DF29AEA000-memory.dmp

            Filesize

            104KB

          • memory/2736-623-0x000001DF28970000-0x000001DF28980000-memory.dmp

            Filesize

            64KB

          • memory/2736-693-0x000001DF29AD0000-0x000001DF29AEA000-memory.dmp

            Filesize

            104KB

          • memory/2736-696-0x000001DF29AD0000-0x000001DF29AEA000-memory.dmp

            Filesize

            104KB

          • memory/2736-695-0x000001DF29AD0000-0x000001DF29AEA000-memory.dmp

            Filesize

            104KB

          • memory/2736-697-0x000001DF29AD0000-0x000001DF29AEA000-memory.dmp

            Filesize

            104KB

          • memory/2736-698-0x000001DF29C20000-0x000001DF29C30000-memory.dmp

            Filesize

            64KB

          • memory/2736-710-0x000001DF293B0000-0x000001DF293B1000-memory.dmp

            Filesize

            4KB

          • memory/2736-711-0x000001DF293D0000-0x000001DF294D0000-memory.dmp

            Filesize

            1024KB

          • memory/2736-712-0x000001DF293D0000-0x000001DF294D0000-memory.dmp

            Filesize

            1024KB

          • memory/2736-713-0x000001DF29AD0000-0x000001DF29AEA000-memory.dmp

            Filesize

            104KB

          • memory/2736-714-0x000001DF29AD0000-0x000001DF29AEA000-memory.dmp

            Filesize

            104KB

          • memory/2736-715-0x000001DF29AD0000-0x000001DF29AEA000-memory.dmp

            Filesize

            104KB

          • memory/2736-716-0x000001DF29AD0000-0x000001DF29AEA000-memory.dmp

            Filesize

            104KB

          • memory/2736-717-0x000001DF29AD0000-0x000001DF29AEA000-memory.dmp

            Filesize

            104KB

          • memory/2800-322-0x0000000140000000-0x00000001401ED000-memory.dmp

            Filesize

            1.9MB

          • memory/2820-396-0x0000000140000000-0x0000000140216000-memory.dmp

            Filesize

            2.1MB

          • memory/2884-170-0x0000000000650000-0x00000000006B0000-memory.dmp

            Filesize

            384KB

          • memory/2884-176-0x0000000000650000-0x00000000006B0000-memory.dmp

            Filesize

            384KB

          • memory/2884-183-0x0000000140000000-0x0000000140200000-memory.dmp

            Filesize

            2.0MB

          • memory/2936-398-0x0000000140000000-0x000000014021D000-memory.dmp

            Filesize

            2.1MB

          • memory/2936-699-0x0000000140000000-0x000000014021D000-memory.dmp

            Filesize

            2.1MB

          • memory/2964-362-0x0000000140000000-0x0000000140147000-memory.dmp

            Filesize

            1.3MB

          • memory/2964-690-0x0000000140000000-0x0000000140147000-memory.dmp

            Filesize

            1.3MB

          • memory/3092-346-0x0000000140000000-0x0000000140239000-memory.dmp

            Filesize

            2.2MB

          • memory/3352-239-0x0000000140000000-0x0000000140210000-memory.dmp

            Filesize

            2.1MB

          • memory/3352-566-0x0000000140000000-0x0000000140210000-memory.dmp

            Filesize

            2.1MB

          • memory/3352-234-0x0000000000D70000-0x0000000000DD0000-memory.dmp

            Filesize

            384KB

          • memory/3584-210-0x00000000053B0000-0x00000000053C0000-memory.dmp

            Filesize

            64KB

          • memory/3584-202-0x0000000000D60000-0x0000000000DC6000-memory.dmp

            Filesize

            408KB

          • memory/3676-162-0x0000000000400000-0x0000000000654000-memory.dmp

            Filesize

            2.3MB

          • memory/3676-430-0x0000000000400000-0x0000000000654000-memory.dmp

            Filesize

            2.3MB

          • memory/3676-144-0x00000000030B0000-0x0000000003116000-memory.dmp

            Filesize

            408KB

          • memory/3676-149-0x00000000030B0000-0x0000000003116000-memory.dmp

            Filesize

            408KB

          • memory/3676-143-0x0000000000400000-0x0000000000654000-memory.dmp

            Filesize

            2.3MB

          • memory/3676-140-0x0000000000400000-0x0000000000654000-memory.dmp

            Filesize

            2.3MB

          • memory/3796-226-0x00000000022B0000-0x0000000002310000-memory.dmp

            Filesize

            384KB

          • memory/3796-220-0x00000000022B0000-0x0000000002310000-memory.dmp

            Filesize

            384KB

          • memory/3796-230-0x00000000022B0000-0x0000000002310000-memory.dmp

            Filesize

            384KB

          • memory/3796-232-0x0000000140000000-0x0000000140221000-memory.dmp

            Filesize

            2.1MB

          • memory/3960-393-0x0000000140000000-0x00000001401FC000-memory.dmp

            Filesize

            2.0MB

          • memory/4352-135-0x00000000056D0000-0x0000000005762000-memory.dmp

            Filesize

            584KB

          • memory/4352-136-0x0000000005690000-0x000000000569A000-memory.dmp

            Filesize

            40KB

          • memory/4352-137-0x0000000005890000-0x00000000058A0000-memory.dmp

            Filesize

            64KB

          • memory/4352-138-0x0000000005890000-0x00000000058A0000-memory.dmp

            Filesize

            64KB

          • memory/4352-139-0x00000000075C0000-0x000000000765C000-memory.dmp

            Filesize

            624KB

          • memory/4352-134-0x0000000005DA0000-0x0000000006344000-memory.dmp

            Filesize

            5.6MB

          • memory/4352-133-0x0000000000C90000-0x0000000000E1A000-memory.dmp

            Filesize

            1.5MB

          • memory/4396-360-0x0000000140000000-0x00000001401C0000-memory.dmp

            Filesize

            1.8MB

          • memory/4652-345-0x0000000140000000-0x0000000140259000-memory.dmp

            Filesize

            2.3MB

          • memory/5100-300-0x0000000140000000-0x00000001401EC000-memory.dmp

            Filesize

            1.9MB

          • memory/5104-180-0x0000000000420000-0x0000000000480000-memory.dmp

            Filesize

            384KB

          • memory/5104-185-0x0000000140000000-0x0000000140135000-memory.dmp

            Filesize

            1.2MB

          • memory/5104-188-0x0000000000420000-0x0000000000480000-memory.dmp

            Filesize

            384KB

          • memory/5104-191-0x0000000000420000-0x0000000000480000-memory.dmp

            Filesize

            384KB

          • memory/5104-195-0x0000000140000000-0x0000000140135000-memory.dmp

            Filesize

            1.2MB

          • memory/5108-323-0x0000000140000000-0x0000000140169000-memory.dmp

            Filesize

            1.4MB

          • memory/5108-622-0x0000000140000000-0x0000000140169000-memory.dmp

            Filesize

            1.4MB