Analysis

  • max time kernel
    150s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-01-2024 10:26

General

  • Target

    2024-01-27_2c17180e563754924088d787c3d749f3_mafia.exe

  • Size

    1.4MB

  • MD5

    2c17180e563754924088d787c3d749f3

  • SHA1

    e37f0ff908e3a740b4af61c058f73858cbd2bed8

  • SHA256

    cfb230be8cace9576b63099b4d0212dcb636a736eb4cfe88f66261aadca2d541

  • SHA512

    3b62ba433b8196272ace2d9e99da566382f7ba69cbc86cff950b7b67f6708f5b67ce6f5dae690dfd1760b0ef23d070116c7a601703533e8ea03beecad92250e2

  • SSDEEP

    24576:VKVGgkEltbjzWDwCmTPPk/z5Zf5hz0dNUX:VKkg/SDwCmTPc/lZfuN4

Malware Config

Signatures

  • Executes dropped EXE 21 IoCs
  • Modifies file permissions 1 TTPs 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in System32 directory 27 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 2 IoCs
  • Checks SCSI registry key(s) 3 TTPs 64 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: LoadsDriver 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 15 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-01-27_2c17180e563754924088d787c3d749f3_mafia.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-27_2c17180e563754924088d787c3d749f3_mafia.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1144
    • C:\Windows\SysWOW64\takeown.exe
      takeown /F C:\Windows\System32\DriverStore\FileRepository\ /A
      2⤵
      • Modifies file permissions
      • Suspicious use of AdjustPrivilegeToken
      PID:2116
    • C:\Windows\SysWOW64\cacls.exe
      cacls C:\Windows\System32\DriverStore\FileRepository*.* /E /G Everyone:F
      2⤵
        PID:4416
    • C:\Windows\System32\alg.exe
      C:\Windows\System32\alg.exe
      1⤵
      • Executes dropped EXE
      PID:2400
    • C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe
      C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe
      1⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2464
    • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
      "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
      1⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      PID:3180
    • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"
      1⤵
      • Executes dropped EXE
      PID:2644
    • C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe
      "C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"
      1⤵
      • Executes dropped EXE
      PID:2532
    • \??\c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE
      "c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"
      1⤵
      • Executes dropped EXE
      PID:3412
    • C:\Windows\System32\svchost.exe
      C:\Windows\System32\svchost.exe -k NetworkService -p -s TapiSrv
      1⤵
        PID:1672
      • C:\Windows\system32\fxssvc.exe
        C:\Windows\system32\fxssvc.exe
        1⤵
        • Executes dropped EXE
        • Modifies data under HKEY_USERS
        • Suspicious use of AdjustPrivilegeToken
        PID:5048
      • C:\Windows\System32\msdtc.exe
        C:\Windows\System32\msdtc.exe
        1⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        PID:2428
      • C:\Windows\system32\PerceptionSimulation\PerceptionSimulationService.exe
        C:\Windows\system32\PerceptionSimulation\PerceptionSimulationService.exe
        1⤵
        • Executes dropped EXE
        PID:4764
      • C:\Windows\SysWow64\perfhost.exe
        C:\Windows\SysWow64\perfhost.exe
        1⤵
        • Executes dropped EXE
        PID:2372
      • C:\Windows\system32\locator.exe
        C:\Windows\system32\locator.exe
        1⤵
        • Executes dropped EXE
        PID:548
      • C:\Windows\System32\SensorDataService.exe
        C:\Windows\System32\SensorDataService.exe
        1⤵
        • Executes dropped EXE
        • Checks SCSI registry key(s)
        PID:1332
      • C:\Windows\System32\snmptrap.exe
        C:\Windows\System32\snmptrap.exe
        1⤵
        • Executes dropped EXE
        PID:1832
      • C:\Windows\system32\spectrum.exe
        C:\Windows\system32\spectrum.exe
        1⤵
        • Executes dropped EXE
        • Checks SCSI registry key(s)
        PID:772
      • C:\Windows\System32\OpenSSH\ssh-agent.exe
        C:\Windows\System32\OpenSSH\ssh-agent.exe
        1⤵
        • Executes dropped EXE
        PID:2180
      • C:\Windows\system32\TieringEngineService.exe
        C:\Windows\system32\TieringEngineService.exe
        1⤵
        • Executes dropped EXE
        • Checks processor information in registry
        • Suspicious use of AdjustPrivilegeToken
        PID:3496
      • C:\Windows\system32\svchost.exe
        C:\Windows\system32\svchost.exe -k LocalService -p -s SharedRealitySvc
        1⤵
          PID:1680
        • C:\Windows\system32\AgentService.exe
          C:\Windows\system32\AgentService.exe
          1⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:3288
        • C:\Windows\System32\vds.exe
          C:\Windows\System32\vds.exe
          1⤵
          • Executes dropped EXE
          PID:1300
        • C:\Windows\system32\vssvc.exe
          C:\Windows\system32\vssvc.exe
          1⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:3432
        • C:\Windows\system32\wbengine.exe
          "C:\Windows\system32\wbengine.exe"
          1⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:4068
        • C:\Windows\system32\wbem\WmiApSrv.exe
          C:\Windows\system32\wbem\WmiApSrv.exe
          1⤵
          • Executes dropped EXE
          PID:3228
        • C:\Windows\system32\SearchIndexer.exe
          C:\Windows\system32\SearchIndexer.exe /Embedding
          1⤵
            PID:1668

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe

            Filesize

            2.1MB

            MD5

            2bcf3ef8d15d302840d21f5243700082

            SHA1

            2cab54ea2b447159325f8ab1a293130c513c4bda

            SHA256

            99b1bb98d93dc33d509aa19060b13664a559e7084d9d123bc0105ae8844e591f

            SHA512

            ed75b541dd6604ffdc79282cc2a2e135453f64c373d3d9d131267918dc94800476a3e4fc3d78f5ab7a494029d942ea29854c8853ab90218081740082d6f97ccf

          • C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe

            Filesize

            1.4MB

            MD5

            a7b99cfefa45b319d7c552d29065fe79

            SHA1

            1d669f3df80f87252ac8934ef314b73745f8045b

            SHA256

            53434b92bc8ab59c5607df4fa31e699357c2d1330fa35af8e39ecb5996ead79a

            SHA512

            3e6e4e2ba019550f1fe797ff70fc89e23bd8ccc9732c91cfe6cdfc04f4b36985641bda0bcc3dfdc0d3316250582345fc68e61fd37606de2642b651eb4fb2e347

          • C:\Program Files\7-Zip\7z.exe

            Filesize

            1.8MB

            MD5

            094457354ea9f5bccc246c220be8665e

            SHA1

            3fa5470d57788e4e1b371d84fa5269237a0d7500

            SHA256

            ee5facf243f5bc5aa173171eaef13039bc2a6a6d0753c1ff262e3b2c2510f593

            SHA512

            43ccd3c1cb5216eccc5d75d480af7fd8d79c663f1d8d37610681e77786a18990296b0e0c9191429d6284aa358fec6cc0d98243fdc53d3dd5d73b32f007cb3db4

          • C:\Program Files\7-Zip\7zFM.exe

            Filesize

            832KB

            MD5

            cdb8570846dcefb8deab8030dca14a19

            SHA1

            0d017f122877bd64ff1061a596a974bb305efd9f

            SHA256

            9cf2396446950a4a4a71a1cb29b45593fba0e808b676bf225aee49c4ae6d6fec

            SHA512

            8cde237a13c23a7a2b3ed2fb9c1921987a4c4084e4a0c113b6e3ff666d2560e8f8148b157e820d84c7e4450cd70fef9f5685a60e90eb93643f304a2a999e49a9

          • C:\Program Files\7-Zip\7zG.exe

            Filesize

            768KB

            MD5

            babea9c3eda973203845aac6eeb44583

            SHA1

            d331771008c0818b7a048c8b22e70c4dd86bc4c4

            SHA256

            9c998ef8b391447024270afcc4bfa701894e3f50c999906d934e3f6e8d69908a

            SHA512

            b808d16e21dcc357f9c979ef7af4f988bb575dd4c548ca8090dc968846c9ba917b9640515387f5bde7cdbf7908823bae39a3acbc03a930a247563ef54be3e0b2

          • C:\Program Files\7-Zip\Uninstall.exe

            Filesize

            640KB

            MD5

            a850d18367477d2714ae6fb2dfcd550d

            SHA1

            aaf1d4dad44967e225707a7416c6611a629f0720

            SHA256

            85a27e2d5f22677792117c7e574ad82dc4d5531ae1d378a1fb5440ecca1b5c55

            SHA512

            fd78ed42bc583098003c76e42a109a66a940e76864b644320f20edde7a8c56f592336407a2d8bb5296cdfb1f287abc2296d13460f64c1420a930c26c4bfb523b

          • C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVShNotify.exe

            Filesize

            512KB

            MD5

            958674847997e2f800e235d3296b16bc

            SHA1

            8863e2e0a3e0d1ee683eaf20177f2fa1deea775c

            SHA256

            2402fa5eec8f3f23ad6e8df69376db406295ffa682c114cf268e5e56dee80d63

            SHA512

            bca3c0c96b5bdd39fc055802bdeda6bb48ea08d41ab88a8d7e96dcd8a4a05057d253979eb609a49b32842b38063f221a44b94d925f6eeddb89d69e7fb08bc9c6

          • C:\Program Files\Common Files\microsoft shared\ClickToRun\IntegratedOffice.exe

            Filesize

            384KB

            MD5

            13a8527d87c91976027c05e6bef8aa7d

            SHA1

            746be6ac311dce3d6728318d6437245d8551583d

            SHA256

            698827348a0e172252082f6862d14f95b09df91417b2c5d300c95060a0802697

            SHA512

            c3005d2c4adc772ecfcee9a237bd97a385281b4c095c6da14c1ec76a3e48131ddab0684553dc2f6dec1fdc16065b3b67473bf290a21e3913a70138819387dfa0

          • C:\Program Files\Common Files\microsoft shared\ClickToRun\MavInject32.exe

            Filesize

            384KB

            MD5

            a36014323d05ce3fd01ab37ae4661ffa

            SHA1

            922177c75be887cddc67adac77320773b7ec550a

            SHA256

            129b9eb6a91ccefe5ea9abd1ac8eb0b140cbfdd661351c45caa2e7cf92f473b0

            SHA512

            4b79871250e485c30feefb2519cf1b05b1ca9f497f80354a89528f15ecb9812c218faa0b963a8302e97121be2f509d8ffeb9135bddb9cfa896b3d7037454c249

          • C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe

            Filesize

            576KB

            MD5

            bf02a2cd5c62ca17e2973849662b26a8

            SHA1

            8e58755c8c415b3a966d91c54d91ef00660020ce

            SHA256

            6d6b78da90db5d18fbe639d3eb14080cc75782aa0c6c487d3ea8f18423876415

            SHA512

            2d8ca853c3ffbff38aac5d7843eb41d12cc5fe9713379ec9436dad04410dbeed440ac98a1ae6c64d72033f7a992f108079bd19a2879d50c73e2f55d63aec0221

          • C:\Program Files\Common Files\microsoft shared\Source Engine\OSE.EXE

            Filesize

            1.5MB

            MD5

            50e5521dbca4ee0a6520c935b0f2ad5b

            SHA1

            c93c59e86a701fd305826aa3ba5a3f1081b7b5d7

            SHA256

            22f38eb67d002aa3996762a39c269bca8adccff6a5fb0ea47eaca7137a435a3c

            SHA512

            4efb588cc02c41320ad2e9462fd182202b72efb1c473ee379ef834e2faf183545a222da8ec5d2d4417f23a88b54af986f59797c20c1a2f5a0f45a83240781b7b

          • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe

            Filesize

            2.1MB

            MD5

            621a9b02fbcc1019dcc43fd5865f1c37

            SHA1

            0a4f42ce3363b6dcb58efe43dd224dd6aa83a779

            SHA256

            6e2e556ecaf48b251a3ffd3e79e15454ebc0e87aa211b307782683312e27a505

            SHA512

            80577f7c451b491650c5a096911fdf1ccbc8f6876e6e79a2573ab07cad6153361e211d436a1903fd558507d1d275e4698e9518b98435beed67749ce4464f7071

          • C:\Windows\SysWOW64\perfhost.exe

            Filesize

            1.2MB

            MD5

            808734f92ac4979ea224114efda9a306

            SHA1

            6f76caaee0c3237f659c6c5aaad10abbe5754000

            SHA256

            d3221cceecf92d052485ef978af1dffc15a4dae73ba1771b44e9633b1db2297a

            SHA512

            757105833dbda943e67c58e80332b87b0fc7ad4f04111c9a7cff28f8454f543f2aeb9ed6c9c1aa24f87285fe31756aba573ad73640e8801c6e5b9ea3d886e1d2

          • C:\Windows\System32\AgentService.exe

            Filesize

            1.7MB

            MD5

            1e9e9a5d2304570110b714b54dad6c9f

            SHA1

            a550905ccd7f9c98c110bd83c6cbcc9c6c652cd8

            SHA256

            ebce0fbb183bfc11d63f104f117def18df9d3c42936f7a6e968cc70982a1709a

            SHA512

            4dd4a12dd6ca9dda53d9dce934b4fba25204306606a7556e0a9dfbd043002cbc7807163e8ced0176fbb20ec308081aa22e6eca60cb301183698bc4c7c52b98c3

          • C:\Windows\System32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe

            Filesize

            1.3MB

            MD5

            d05e058e784b439fd5dca4efd35cc262

            SHA1

            36b2fd7ca4f4577c088e746befbb2de63a294578

            SHA256

            10f76ab16164120ee0602bf1731be154fffc0171d4e0e47471495619960292e0

            SHA512

            054cbfa7515428a120c96ae320e3eb8d30573746d9ed3a0e854294110183ac48f0ba072a0c002219658d6ca8507c5962ce2d24b164ff4e70ca42f93737acae5c

          • C:\Windows\System32\FXSSVC.exe

            Filesize

            1.2MB

            MD5

            5b28f5378d6b9ab8e0e2fc0b3a4eae32

            SHA1

            c31714590fe0bdf22b6aa78628057c4b3ba1f5a3

            SHA256

            c261b7d4854c4576a4c677f8c015bca1b4dccf1b0430cc73d09dcb5abcb41437

            SHA512

            3c1037dd5cbd325d0c80babfea5bc4a3480066d45ec5a703711cd20aeae781fce8d64ddb45c4bf925715c6e58681e1cfb0b5d1bacd9882b5a11e7a2d492db568

          • C:\Windows\System32\Locator.exe

            Filesize

            1.2MB

            MD5

            ca5238646132d61d45fe8f20179362ac

            SHA1

            947dc573c2c0b9be63f1e5e9993007e97a2277ac

            SHA256

            d7a2636c4bb28dc07324aef4a3a2fdaa23f089dd18ed010dea0eeaf4ba956d43

            SHA512

            a17b5c7609ef4a10e64b73c2cab05b95e5702075a2cd1ba3f93ae2845ccfa18c6cfa703768544c38e56e27338fa0ed5b5599446ccae518bf426b23ea7e072811

          • C:\Windows\System32\OpenSSH\ssh-agent.exe

            Filesize

            1.6MB

            MD5

            b1c67c0286e290ad4794a9f5828fcfe3

            SHA1

            13cd040d793d2357e2a67fefe6122b34fb81843c

            SHA256

            65769c657bf25efa2463287b249c7aa4698d472692b75c06d36ea78fd4350b4a

            SHA512

            94945b38187e6d09602a632c41b49459cc0d968e59e7c0d3f30505bf1875e9d8012da4984cf603ada12b2ae42230d047c2bd36a749b90d32ff03edbe0f06e7a7

          • C:\Windows\System32\PerceptionSimulation\PerceptionSimulationService.exe

            Filesize

            1.3MB

            MD5

            80f3c283e7f13ecffe0d3a996021fd9d

            SHA1

            8f27a76369c87b7162a5a788bee4bf0d25226664

            SHA256

            01e4ecf2c4e1daf87082c23d92951062cb9ca65abcbc2006bac16c42310a4ebe

            SHA512

            cec98dfeac189052726f79eac7568a932a1f4433154b7c6a8331b4e0aed0404fe29d3b830bef22df72b41a6d60feba3c2da4a7eafa7da8e27d37d21bbbefff5a

          • C:\Windows\System32\SearchIndexer.exe

            Filesize

            1.4MB

            MD5

            7ece9967247c7a9745e4da6e4ec7ed96

            SHA1

            cd04e84d0e865e5983853c6526ad32ff6a7851eb

            SHA256

            d4874f201637fb6ddf464ecfd1943e6d06a510a0b2f25285728e823aba3044f4

            SHA512

            abeacbdd3b2d49a68d879380758249104e43150420519de9d1d22ed8de70bf7f39f23a3b6dbe1d9be49da244986c91ebb28499718559de0734401d1b246432e7

          • C:\Windows\System32\SensorDataService.exe

            Filesize

            1.8MB

            MD5

            603cd95eef79283547dfde8a741870ba

            SHA1

            4730fdbe8357fd033e57915842e21412d07d1e8f

            SHA256

            a298aa86c78f99eb2006b37b8a42935417abe9eafc0483a775233cba6b130e14

            SHA512

            618980ddddff03bbc4bea165f9fe397b30ec15b139530d18d1f80b6eba8700e67d83389a66430fededaf767d7d4684eded21d14e3a79b30f9b2e88595797f762

          • C:\Windows\System32\Spectrum.exe

            Filesize

            1.4MB

            MD5

            001763b776275486bbe95ce906058f61

            SHA1

            8439e0f44790d32173e893e2c8b19d58ed10f01c

            SHA256

            5bfda73f42209302b9ab89faa341f7c3dfd51b07c59a4ec81cb8a470afc314ce

            SHA512

            35d41b76765b09b421adc5b65fc6deeb781e43e4c49a551f4eb133b237138626b8021af01f634724faa8185372b73e3e16c7f885c15f69964f8bc76c3fdf15af

          • C:\Windows\System32\TieringEngineService.exe

            Filesize

            1.5MB

            MD5

            1e116be9a7299f333b1c628942abeea3

            SHA1

            c77ab75086b44a7e9f139b135be2642a557d9d68

            SHA256

            85e5b9555d91c54e4b47fd7b6fb9e9bf99798f3b47203e6cd57d5c9b5559018e

            SHA512

            9f3c111e1799d85b799ed424e4133369784d91df0dcded728bfe56d576838c1529edf62d45d824244070aec07580632950126b5c55894d7bb2961c027cc45d29

          • C:\Windows\System32\VSSVC.exe

            Filesize

            2.0MB

            MD5

            ff76d34bc74e55fd8c5296d7a463aba4

            SHA1

            2cb1637b53e459c70aee6427b19b6674d6f959b2

            SHA256

            2ee188a78e1932c7b64316d6a0f32f620a075565d5c9f8725035299ff5ef947b

            SHA512

            0208c6b9f9951738249a773d680cf829a280296d618c879275535872cd7b599bda6003610f1a4a63c1eb6f0efd701ddfcb7e0922679114f70327ee2ddda3b95f

          • C:\Windows\System32\alg.exe

            Filesize

            1.3MB

            MD5

            7e2488c2c4e67f01a497b74de85365e1

            SHA1

            19278dd7cc095e07d23f115ccbc7f4cd7aa2dddb

            SHA256

            a76b9e292628305279bbb6285e88779aa3ec558105ae5121af53841aa291b116

            SHA512

            d4c0da9b187a7f6bc1cbc48aab3d7e2f26882cb5cf909bf8da6e1b72b3913f15cc18bd302dd4c83353744ffc6de9fc9c4cc82425e85fc07232363a49594e79e0

          • C:\Windows\System32\msdtc.exe

            Filesize

            1.4MB

            MD5

            14566409e57317896bf871443c5a1460

            SHA1

            6470129aedce138a2e53d04252f1a443ef2da64e

            SHA256

            925bc7e9160d296407f05530d386eb67f804b17bb140e3576d88c60e7060e8da

            SHA512

            e90127582074247ab2230ce52bcf45e197489cceece44b2084032837f09706092f86177f09efa3edadb308812a7194aaa5bfcc4c76a669241072d643050ed8a5

          • C:\Windows\System32\snmptrap.exe

            Filesize

            1.2MB

            MD5

            1f605a0aa582221d2fca249fc4ec3558

            SHA1

            0a273f045e5eb473f3449f2eb5e91f2db2b88810

            SHA256

            1d20e74f533de1b3109bb406e6c21220381db71c31b1f083407c08b41c20de55

            SHA512

            65454f77aab6ede16f97818aa784031de199a122c6c0b02e82fd565592d6e890c5e9e82bb6d56ad7c56647e157b4d8e6e28d31e73aabbb9ab6007a2eb083b00d

          • C:\Windows\System32\vds.exe

            Filesize

            1.3MB

            MD5

            72308cf447799955ce0f3891fc6b5446

            SHA1

            1dbed5d670bd758cb800eda08b522ca5ee0a568b

            SHA256

            e168a80e1e5e9d9003055790ed0edf29fcbcb9a0da27dc26ed15ac0d92ac5199

            SHA512

            20993868984ca1ac31ef4abf1b83d0512e19100fe3e13946468fc3d3b569eaef5f96be326354cd835865afe93c8627ffad7fb85b3489fa62191917461118560e

          • C:\Windows\System32\wbem\WmiApSrv.exe

            Filesize

            1.4MB

            MD5

            739028d5173f30e1258499d5da472e24

            SHA1

            21c4bf72030d91ba7e4156a0308d9ed0438fd0cd

            SHA256

            37bf180dee9a2082fcdfab0fe43c694376cccda4ec7e334221405be5a5f84659

            SHA512

            6535642f15610ed449a7591a9bb1b6bb198b374d4789f8dcb11b8add5be5e8678cca5edaa413df3fd7ca51ebdbda68872a083c9345204b40cc7063b6294a11f4

          • C:\Windows\System32\wbengine.exe

            Filesize

            2.1MB

            MD5

            2b3e431a777d4a860bf852c4b91125ec

            SHA1

            5a8779a183d4393135c722ec06a307491297a5e4

            SHA256

            9fc27409951abae65a92f5bb6484451a43ca23aa69c6bff53645160ad09bfcaf

            SHA512

            a0ee30b706870b8282a2a9ef12693c4ec497cc170c6e551dc486d2143f89cced815953945f934f8269995e21daa6fe1b3fedf56e5be8113c365ed61abdb982f9

          • C:\Windows\system32\AppVClient.exe

            Filesize

            1.3MB

            MD5

            efd0da25d152f7a7cc042d95e825a3b9

            SHA1

            e1e44d8da5135bbc8a08d5de6849fc86fb11d609

            SHA256

            459c76864f5b2e863f82b824b8e0c715b2268d6c598958b49956de372eb03ff5

            SHA512

            7d6716796fb0dedbd93b4b43d728fa4b44878fbf48bfb4b03c9d1d2591cb989eeddf7e8bbd3988504f72dae90df2bbef92475d612e99dc63996dda787a6cbd83

          • C:\odt\office2016setup.exe

            Filesize

            1024KB

            MD5

            1c7f17f86b6924d4b5808ebe7945f82b

            SHA1

            ab5178220e5c19fdb00f5cf1b2b65656dbd63c76

            SHA256

            4ab3caeee921b0a3541aa41249b593b389520eeaeab26bb46c6c4d31ea698bdd

            SHA512

            57ca5d9e6b2f8f6dff1c074c94f6422455211acf1e61e56de5560f58e65ac2e134094c9ece336e781b25f42427119eefe15537b925be0a3806d8a78301f9ecd3

          • memory/548-330-0x0000000140000000-0x00000001401EC000-memory.dmp

            Filesize

            1.9MB

          • memory/548-284-0x0000000140000000-0x00000001401EC000-memory.dmp

            Filesize

            1.9MB

          • memory/772-304-0x0000000000750000-0x00000000007B0000-memory.dmp

            Filesize

            384KB

          • memory/772-294-0x0000000140000000-0x0000000140169000-memory.dmp

            Filesize

            1.4MB

          • memory/772-346-0x0000000140000000-0x0000000140169000-memory.dmp

            Filesize

            1.4MB

          • memory/1144-1-0x0000000000790000-0x00000000007F6000-memory.dmp

            Filesize

            408KB

          • memory/1144-6-0x0000000000790000-0x00000000007F6000-memory.dmp

            Filesize

            408KB

          • memory/1144-7-0x0000000000790000-0x00000000007F6000-memory.dmp

            Filesize

            408KB

          • memory/1144-0-0x0000000000400000-0x0000000000612000-memory.dmp

            Filesize

            2.1MB

          • memory/1144-29-0x0000000000400000-0x0000000000612000-memory.dmp

            Filesize

            2.1MB

          • memory/1300-331-0x0000000140000000-0x0000000140147000-memory.dmp

            Filesize

            1.3MB

          • memory/1332-358-0x0000000140000000-0x00000001401D7000-memory.dmp

            Filesize

            1.8MB

          • memory/1332-334-0x0000000140000000-0x00000001401D7000-memory.dmp

            Filesize

            1.8MB

          • memory/1332-287-0x0000000140000000-0x00000001401D7000-memory.dmp

            Filesize

            1.8MB

          • memory/1668-347-0x0000000140000000-0x0000000140179000-memory.dmp

            Filesize

            1.5MB

          • memory/1832-291-0x0000000140000000-0x00000001401ED000-memory.dmp

            Filesize

            1.9MB

          • memory/1832-341-0x0000000140000000-0x00000001401ED000-memory.dmp

            Filesize

            1.9MB

          • memory/2180-317-0x0000000000EB0000-0x0000000000F10000-memory.dmp

            Filesize

            384KB

          • memory/2180-309-0x0000000140000000-0x0000000140259000-memory.dmp

            Filesize

            2.3MB

          • memory/2372-274-0x00000000008E0000-0x0000000000946000-memory.dmp

            Filesize

            408KB

          • memory/2372-279-0x00000000008E0000-0x0000000000946000-memory.dmp

            Filesize

            408KB

          • memory/2372-273-0x0000000000400000-0x00000000005EE000-memory.dmp

            Filesize

            1.9MB

          • memory/2372-325-0x00000000008E0000-0x0000000000946000-memory.dmp

            Filesize

            408KB

          • memory/2372-321-0x0000000000400000-0x00000000005EE000-memory.dmp

            Filesize

            1.9MB

          • memory/2400-80-0x0000000140000000-0x0000000140201000-memory.dmp

            Filesize

            2.0MB

          • memory/2400-12-0x0000000140000000-0x0000000140201000-memory.dmp

            Filesize

            2.0MB

          • memory/2428-255-0x0000000140000000-0x0000000140210000-memory.dmp

            Filesize

            2.1MB

          • memory/2428-303-0x0000000140000000-0x0000000140210000-memory.dmp

            Filesize

            2.1MB

          • memory/2464-96-0x0000000140000000-0x0000000140200000-memory.dmp

            Filesize

            2.0MB

          • memory/2464-23-0x00000000006B0000-0x0000000000710000-memory.dmp

            Filesize

            384KB

          • memory/2464-16-0x00000000006B0000-0x0000000000710000-memory.dmp

            Filesize

            384KB

          • memory/2464-17-0x0000000140000000-0x0000000140200000-memory.dmp

            Filesize

            2.0MB

          • memory/2532-56-0x0000000002240000-0x00000000022A0000-memory.dmp

            Filesize

            384KB

          • memory/2532-55-0x0000000140000000-0x0000000140221000-memory.dmp

            Filesize

            2.1MB

          • memory/2532-68-0x0000000140000000-0x0000000140221000-memory.dmp

            Filesize

            2.1MB

          • memory/2532-66-0x0000000002240000-0x00000000022A0000-memory.dmp

            Filesize

            384KB

          • memory/2532-63-0x0000000002240000-0x00000000022A0000-memory.dmp

            Filesize

            384KB

          • memory/2644-45-0x0000000140000000-0x000000014022B000-memory.dmp

            Filesize

            2.2MB

          • memory/2644-44-0x00000000001A0000-0x0000000000200000-memory.dmp

            Filesize

            384KB

          • memory/2644-51-0x00000000001A0000-0x0000000000200000-memory.dmp

            Filesize

            384KB

          • memory/2644-175-0x0000000140000000-0x000000014022B000-memory.dmp

            Filesize

            2.2MB

          • memory/3180-169-0x0000000140000000-0x0000000140237000-memory.dmp

            Filesize

            2.2MB

          • memory/3180-39-0x0000000000910000-0x0000000000970000-memory.dmp

            Filesize

            384KB

          • memory/3180-40-0x0000000000910000-0x0000000000970000-memory.dmp

            Filesize

            384KB

          • memory/3180-32-0x0000000140000000-0x0000000140237000-memory.dmp

            Filesize

            2.2MB

          • memory/3180-33-0x0000000000910000-0x0000000000970000-memory.dmp

            Filesize

            384KB

          • memory/3228-342-0x0000000140000000-0x000000014021D000-memory.dmp

            Filesize

            2.1MB

          • memory/3288-327-0x0000000140000000-0x00000001401C0000-memory.dmp

            Filesize

            1.8MB

          • memory/3288-326-0x0000000140000000-0x00000001401C0000-memory.dmp

            Filesize

            1.8MB

          • memory/3412-78-0x00000000004F0000-0x0000000000550000-memory.dmp

            Filesize

            384KB

          • memory/3412-71-0x00000000004F0000-0x0000000000550000-memory.dmp

            Filesize

            384KB

          • memory/3412-72-0x0000000140000000-0x0000000140226000-memory.dmp

            Filesize

            2.1MB

          • memory/3412-193-0x0000000140000000-0x0000000140226000-memory.dmp

            Filesize

            2.1MB

          • memory/3432-335-0x0000000140000000-0x00000001401FC000-memory.dmp

            Filesize

            2.0MB

          • memory/3496-322-0x0000000140000000-0x0000000140239000-memory.dmp

            Filesize

            2.2MB

          • memory/4068-338-0x0000000140000000-0x0000000140216000-memory.dmp

            Filesize

            2.1MB

          • memory/4764-259-0x0000000140000000-0x0000000140202000-memory.dmp

            Filesize

            2.0MB

          • memory/4764-260-0x0000000000750000-0x00000000007B0000-memory.dmp

            Filesize

            384KB

          • memory/4764-268-0x0000000000750000-0x00000000007B0000-memory.dmp

            Filesize

            384KB

          • memory/4764-308-0x0000000140000000-0x0000000140202000-memory.dmp

            Filesize

            2.0MB

          • memory/5048-250-0x0000000140000000-0x0000000140135000-memory.dmp

            Filesize

            1.2MB

          • memory/5048-253-0x0000000140000000-0x0000000140135000-memory.dmp

            Filesize

            1.2MB