Analysis

  • max time kernel
    95s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    02-02-2024 10:42

General

  • Target

    2024-02-02_cedba9bf25b79119af56f4e2cf71fef8_ryuk.exe

  • Size

    4.1MB

  • MD5

    cedba9bf25b79119af56f4e2cf71fef8

  • SHA1

    77e76dfd7aaedad2e048000157799dbbe8a541fa

  • SHA256

    5f78910a8f6b9927d2c175399a034383ea2b4c40d11b4253b7775ca748f1aa46

  • SHA512

    be764af6856d13380b244d7537d2257bd5269ce4d0be7147c859187b9af5b00cffac021911d662b68a45dfd9055afd20b4185ccc18f7a0ba3dd5d2f85238ed9b

  • SSDEEP

    49152:r5Viqwo4KxghcyJLBaSbvviqMjfBV+TFZ1bBzP7n1Y8/17MVfw1QSXm+RFvTCr9C:rBfr+TFFqRlw6a+Kl2/V0cETQ/I

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 53 IoCs
  • Loads dropped DLL 15 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in System32 directory 21 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 34 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 26 IoCs
  • Suspicious use of AdjustPrivilegeToken 36 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of SetWindowsHookEx 14 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-02_cedba9bf25b79119af56f4e2cf71fef8_ryuk.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-02_cedba9bf25b79119af56f4e2cf71fef8_ryuk.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1696
    • C:\Users\Admin\AppData\Local\Temp\2024-02-02_cedba9bf25b79119af56f4e2cf71fef8_ryuk.exe
      C:\Users\Admin\AppData\Local\Temp\2024-02-02_cedba9bf25b79119af56f4e2cf71fef8_ryuk.exe --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 --annotation=exe=C:\Users\Admin\AppData\Local\Temp\2024-02-02_cedba9bf25b79119af56f4e2cf71fef8_ryuk.exe --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.73 --initial-client-data=0x13c,0x164,0x168,0x160,0x16c,0x140315460,0x140315470,0x140315480
      2⤵
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3020
    • C:\Windows\system32\wermgr.exe
      "C:\Windows\system32\wermgr.exe" "-outproc" "1696" "452"
      2⤵
        PID:2744
    • C:\Windows\System32\alg.exe
      C:\Windows\System32\alg.exe
      1⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      PID:2584
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe
      1⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      PID:2556
    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
      1⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2860
      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
        C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 1d0 -InterruptEvent 1bc -NGENProcess 1c0 -Pipe 1cc -Comment "NGen Worker Process"
        2⤵
        • Executes dropped EXE
        PID:2456
      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
        C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 238 -InterruptEvent 1bc -NGENProcess 1c0 -Pipe 1d0 -Comment "NGen Worker Process"
        2⤵
        • Executes dropped EXE
        PID:2868
      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
        C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 234 -InterruptEvent 1bc -NGENProcess 1c0 -Pipe 1d0 -Comment "NGen Worker Process"
        2⤵
        • Executes dropped EXE
        PID:2636
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      1⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2788
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1e8 -InterruptEvent 1d4 -NGENProcess 1d8 -Pipe 1e4 -Comment "NGen Worker Process"
        2⤵
        • Executes dropped EXE
        PID:552
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1e0 -InterruptEvent 24c -NGENProcess 254 -Pipe 258 -Comment "NGen Worker Process"
        2⤵
        • Executes dropped EXE
        PID:2580
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 24c -InterruptEvent 254 -NGENProcess 1d4 -Pipe 248 -Comment "NGen Worker Process"
        2⤵
        • Executes dropped EXE
        PID:660
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 23c -InterruptEvent 250 -NGENProcess 25c -Pipe 24c -Comment "NGen Worker Process"
        2⤵
        • Executes dropped EXE
        PID:2784
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 250 -InterruptEvent 25c -NGENProcess 1f0 -Pipe 260 -Comment "NGen Worker Process"
        2⤵
        • Executes dropped EXE
        PID:940
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 240 -InterruptEvent 244 -NGENProcess 264 -Pipe 250 -Comment "NGen Worker Process"
        2⤵
        • Executes dropped EXE
        PID:2536
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 244 -InterruptEvent 268 -NGENProcess 1f0 -Pipe 1e8 -Comment "NGen Worker Process"
        2⤵
        • Executes dropped EXE
        PID:2888
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 26c -InterruptEvent 1d8 -NGENProcess 270 -Pipe 244 -Comment "NGen Worker Process"
        2⤵
        • Executes dropped EXE
        PID:1604
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1d8 -InterruptEvent 240 -NGENProcess 1f0 -Pipe 274 -Comment "NGen Worker Process"
        2⤵
        • Executes dropped EXE
        PID:2192
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 240 -InterruptEvent 1f0 -NGENProcess 23c -Pipe 278 -Comment "NGen Worker Process"
        2⤵
        • Executes dropped EXE
        PID:2948
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 254 -InterruptEvent 26c -NGENProcess 27c -Pipe 240 -Comment "NGen Worker Process"
        2⤵
        • Executes dropped EXE
        PID:2536
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 26c -InterruptEvent 1e0 -NGENProcess 23c -Pipe 280 -Comment "NGen Worker Process"
        2⤵
        • Executes dropped EXE
        PID:3000
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1e0 -InterruptEvent 23c -NGENProcess 25c -Pipe 284 -Comment "NGen Worker Process"
        2⤵
        • Executes dropped EXE
        PID:1104
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 23c -InterruptEvent 270 -NGENProcess 268 -Pipe 1d8 -Comment "NGen Worker Process"
        2⤵
        • Executes dropped EXE
        PID:1252
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 270 -InterruptEvent 28c -NGENProcess 26c -Pipe 288 -Comment "NGen Worker Process"
        2⤵
        • Executes dropped EXE
        PID:764
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 28c -InterruptEvent 1f0 -NGENProcess 27c -Pipe 25c -Comment "NGen Worker Process"
        2⤵
        • Executes dropped EXE
        PID:876
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1f0 -InterruptEvent 290 -NGENProcess 254 -Pipe 264 -Comment "NGen Worker Process"
        2⤵
        • Executes dropped EXE
        PID:560
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 290 -InterruptEvent 270 -NGENProcess 23c -Pipe 298 -Comment "NGen Worker Process"
        2⤵
        • Executes dropped EXE
        PID:1236
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 270 -InterruptEvent 28c -NGENProcess 294 -Pipe 29c -Comment "NGen Worker Process"
        2⤵
        • Executes dropped EXE
        PID:2948
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 28c -InterruptEvent 26c -NGENProcess 290 -Pipe 1f0 -Comment "NGen Worker Process"
        2⤵
        • Executes dropped EXE
        PID:1164
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 26c -InterruptEvent 268 -NGENProcess 294 -Pipe 27c -Comment "NGen Worker Process"
        2⤵
        • Executes dropped EXE
        PID:1748
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 268 -InterruptEvent 1e0 -NGENProcess 270 -Pipe 2a8 -Comment "NGen Worker Process"
        2⤵
        • Executes dropped EXE
        PID:1576
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 254 -InterruptEvent 26c -NGENProcess 2ac -Pipe 268 -Comment "NGen Worker Process"
        2⤵
        • Executes dropped EXE
        PID:2184
    • C:\Windows\ehome\ehsched.exe
      C:\Windows\ehome\ehsched.exe
      1⤵
      • Executes dropped EXE
      PID:552
    • C:\Windows\ehome\ehRecvr.exe
      C:\Windows\ehome\ehRecvr.exe
      1⤵
      • Executes dropped EXE
      PID:2576
    • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe
      1⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      PID:952
    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe
      C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe
      1⤵
      • Executes dropped EXE
      PID:2504
    • C:\Windows\eHome\EhTray.exe
      "C:\Windows\eHome\EhTray.exe" /nav:-2
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1164
    • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
      "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
      1⤵
      • Executes dropped EXE
      PID:976
    • C:\Windows\ehome\ehRec.exe
      C:\Windows\ehome\ehRec.exe -Embedding
      1⤵
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1592
    • C:\Windows\system32\IEEtwCollector.exe
      C:\Windows\system32\IEEtwCollector.exe /V
      1⤵
      • Executes dropped EXE
      PID:2184
    • C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE" /auditservice
      1⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      PID:2668
    • C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe
      "C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"
      1⤵
      • Executes dropped EXE
      PID:2748
    • C:\Windows\System32\msdtc.exe
      C:\Windows\System32\msdtc.exe
      1⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Drops file in Windows directory
      PID:2976
    • C:\Windows\system32\msiexec.exe
      C:\Windows\system32\msiexec.exe /V
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of AdjustPrivilegeToken
      PID:1664
    • C:\Program Files (x86)\Common Files\Microsoft Shared\Source Engine\OSE.EXE
      "C:\Program Files (x86)\Common Files\Microsoft Shared\Source Engine\OSE.EXE"
      1⤵
      • Executes dropped EXE
      PID:1720
    • C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE
      "C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"
      1⤵
      • Executes dropped EXE
      PID:1600
    • C:\Windows\SysWow64\perfhost.exe
      C:\Windows\SysWow64\perfhost.exe
      1⤵
      • Executes dropped EXE
      PID:836
    • C:\Windows\system32\locator.exe
      C:\Windows\system32\locator.exe
      1⤵
      • Executes dropped EXE
      PID:1032
    • C:\Windows\System32\snmptrap.exe
      C:\Windows\System32\snmptrap.exe
      1⤵
      • Executes dropped EXE
      PID:1848
    • C:\Windows\System32\vds.exe
      C:\Windows\System32\vds.exe
      1⤵
      • Executes dropped EXE
      PID:2208
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:760
    • C:\Windows\system32\wbengine.exe
      "C:\Windows\system32\wbengine.exe"
      1⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:2764
    • C:\Windows\system32\wbem\WmiApSrv.exe
      C:\Windows\system32\wbem\WmiApSrv.exe
      1⤵
      • Executes dropped EXE
      PID:2468
    • C:\Program Files\Windows Media Player\wmpnetwk.exe
      "C:\Program Files\Windows Media Player\wmpnetwk.exe"
      1⤵
      • Executes dropped EXE
      • Modifies data under HKEY_USERS
      • Suspicious use of AdjustPrivilegeToken
      PID:288
    • C:\Windows\system32\SearchIndexer.exe
      C:\Windows\system32\SearchIndexer.exe /Embedding
      1⤵
      • Executes dropped EXE
      • Modifies data under HKEY_USERS
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1160
      • C:\Windows\system32\SearchProtocolHost.exe
        "C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe1_ Global\UsGthrCtrlFltPipeMssGthrPipe1 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon"
        2⤵
        • Drops file in System32 directory
        • Modifies data under HKEY_USERS
        • Suspicious use of SetWindowsHookEx
        PID:2604
      • C:\Windows\system32\SearchFilterHost.exe
        "C:\Windows\system32\SearchFilterHost.exe" 0 584 588 596 65536 592
        2⤵
        • Modifies data under HKEY_USERS
        PID:2960
      • C:\Windows\system32\SearchProtocolHost.exe
        "C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe_S-1-5-21-3470981204-343661084-3367201002-10002_ Global\UsGthrCtrlFltPipeMssGthrPipe_S-1-5-21-3470981204-343661084-3367201002-10002 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon" "1"
        2⤵
        • Suspicious use of SetWindowsHookEx
        PID:1764
    • C:\Windows\system32\dllhost.exe
      C:\Windows\system32\dllhost.exe /Processid:{02D4B3F1-FD88-11D1-960D-00805FC79235}
      1⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      PID:1236

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\Common Files\microsoft shared\Source Engine\OSE.EXE

      Filesize

      84KB

      MD5

      3e642245903fbb57a9fef0d8c3456aac

      SHA1

      d7e603e725fbc3091decdb031a6574324ca59f73

      SHA256

      e95061cf175de511def102f6ee1835fdaac905ef953de0fd7f3fe81927ea8cab

      SHA512

      f1b9231e97dc008502102cfd53d5bce8609a62d4f0cb210a86204af7f979b0f80dd9bd4f84779d5d1e48d3d8cd479b1b6f71207b4825f16010392b545fb1cb68

    • C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE

      Filesize

      311KB

      MD5

      5ae26675cb6fb21225e952c3f22c6640

      SHA1

      01314755212e8bd3b80f07794ca64240feefea2f

      SHA256

      0565ca68ea9b153985917b8280be0cb8786d0f86d8192675615265b1470806d9

      SHA512

      fd6d7ebeb023e182ef966c1b987f9149f0659101ccb92a3fbc326179e067fcff8d195d1132e6d30a1251f2456ef8208ba3fab91fc9b5dd47dd6ae6d68970a5c5

    • C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe

      Filesize

      509KB

      MD5

      f4cfd5881e1f1d2899edafcb8924feee

      SHA1

      f15700c902f9d7f8352a9cccb239c11995cc64dc

      SHA256

      4a8cb1dddab8a034f189055f26ad8a9e5e2d6fa46a81e0dbeea79ace7a7cc2c7

      SHA512

      af005307fcd749d4932f4413365dd413bf17479cf2f00c4bea4309b967ed182416ce2aac1f63e19ded9e4c48cc7273f33a11e8df6553d1a5caa49fa68552e7b5

    • C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE

      Filesize

      45KB

      MD5

      91aaee08cf125a2da8f26023df4a4878

      SHA1

      765ccfe80314704e09aba5970957312eed9356ef

      SHA256

      e96032e7f8625fc98f5687b084a40a3f2625b1c97509de8a71abf9cb34139a28

      SHA512

      317f442732ee713e33c06b741d78eb81500b46b72cfb4dd0b27d0f12a53c373c7a1d9582617a1c19de4e3c3033095a35c8314eb590adf3d35be65ba5a78d6a9c

    • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe

      Filesize

      1.1MB

      MD5

      f0a9318d326c9f19bf2288d38c9f9af8

      SHA1

      38116518d32a837ca7e10959661f2d347ab8965d

      SHA256

      4678786ec2d20fa8fa2035d2a09d5b7e23feebf0cc2cf75160187fff3debd310

      SHA512

      ba88388763db8674b6847172121a8ec8ed08ea4666a5bc18e0393ccaa34576c1ec697d2be3ff8d2ce552bc88e67dd350887599924ca60ea7f9c225fd89cdd20a

    • C:\Program Files\Windows Media Player\wmpnetwk.exe

      Filesize

      90KB

      MD5

      c3b8c0fac602024f9e2189e39e3574c6

      SHA1

      265c4e4a79f5c58a141d6842c5853209a86923ec

      SHA256

      f9d404e3db90b0f944a5928b5dc38a97d0cd0f8c14f320e8abe211e25bdbeda3

      SHA512

      75dd9028a530a52cb17b6b1b6c0c87a9470ce459bd27e01010c31ca82346ef9f4ceb6b6abdcb71ecab70463037bd63b5e1dfafe719940d36f76d09a20a1366bf

    • C:\ProgramData\Microsoft\Search\Data\Applications\Windows\MSS.log

      Filesize

      798KB

      MD5

      4419c27b64f60f6a325167c56ecf721f

      SHA1

      61c60bbc7edc2a7e3972a25483fd961affebdba0

      SHA256

      47c2cabb780300afee9cc1549c0ab483b235ca06d77ab613de5724bbb4b62d72

      SHA512

      b7e0b7e47d4062c4d1895502719f81e0ac1d3ec4019f062aff2b8c2df27be68fad4836ac1b863ec0bc2e94cbea162856fcbb4a2d8f822defcefce6d2772a8da5

    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

      Filesize

      152B

      MD5

      13d9ca5a73b1c37d6bd60a344b7b81ee

      SHA1

      eef38254df656eba311b8b5b3a54be12c39781a9

      SHA256

      3cbcba1998e779a83eee7ec5f9d463030b9ab9174d0c0f1bfc31ffceae976a90

      SHA512

      3c77ca6d0200e0cddc3e45d8c09095af93cc742ad1716c787d06f02a853ae156c12481920153e7171240596eeea31e5250a8743a28262c7529566d7129be3f41

    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\throttle_store.dat

      Filesize

      20B

      MD5

      9e4e94633b73f4a7680240a0ffd6cd2c

      SHA1

      e68e02453ce22736169a56fdb59043d33668368f

      SHA256

      41c91a9c93d76295746a149dce7ebb3b9ee2cb551d84365fff108e59a61cc304

      SHA512

      193011a756b2368956c71a9a3ae8bc9537d99f52218f124b2e64545eeb5227861d372639052b74d0dd956cb33ca72a9107e069f1ef332b9645044849d14af337

    • C:\Users\Admin\AppData\Local\Temp\OutofProcReport259389974.txt

      Filesize

      1KB

      MD5

      a26d35ab1a6a636afadf4a41c602b04f

      SHA1

      75af96d6b9a04108458608f66d8af8b41e83a37d

      SHA256

      d3e15e6e0e8005d0531693d7609c2d300e430577a7b2d5aa95da2a1ea52f2c18

      SHA512

      4d0bca35a541accd0cc625ec0f0d74bb477143c2c3d97222f045b6b5b61d23e8511cefc291e7da6a3d88284b6cb570bf710d7a4309b071a0bd9cbbced3d80a86

    • C:\Users\Admin\AppData\Roaming\99ea1671323b6587.bin

      Filesize

      12KB

      MD5

      15468349461ba858eda11b266bd98e83

      SHA1

      58e7a28ec80ca3918c65f07481b418d63a63fbc2

      SHA256

      a5c923974ab617fd707405e7fcceef20f2c86833913ae698c858f5d0d2d80e38

      SHA512

      4406bff3b5d6b1ab31c1cbc6c21f27e730d1b0a2f030bf869ec987c4a30122bbd2a62d75a055aa2b204f524e80cc947916ab38c4ff63ba09a2c0ecf91f6493d1

    • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe

      Filesize

      194KB

      MD5

      42dbc4b0cc11377e9451bf000c1bb25d

      SHA1

      e68ef8e64a1236a138f94cbca46349cc6986fa80

      SHA256

      d6e8b51fa6ec88e1c8aa49175fa39fb7d42fdf84506977fa9648416add176da2

      SHA512

      9af74db8faba8957abad353ca0e0acea66591e505ee017bf2b6a6048c2eae3c24ad4921627a975785879b3a0136df5acc50bfb110c534a08ed1df4272c5f9493

    • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe

      Filesize

      375KB

      MD5

      2c553a165764f4e3db74553b1370e92c

      SHA1

      1c9668237afbba3d56798f24f9aea8ca686e4e18

      SHA256

      dc1f3d29538a3a3cd602ee9e6fcecd7f7de9f46ae8470b597dfefbd81a51a9ba

      SHA512

      a8c4388897ed3bd50a657b4773f3deb384cf02ca3684da972a94c86ef886773935f89f491774b7ce895c210bebefebccaf6239f4e83babb304c81b16324dc051

    • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ngen_service.log

      Filesize

      203KB

      MD5

      cea51cf53852be9d4ce04e904e0ba9f8

      SHA1

      fea1bf69ea90e453d95d8f1e46886a17c4c94911

      SHA256

      308706ac4add5c3d8d8384164423bd1b2308c9c814cdef5e31d09c360728cff8

      SHA512

      f82fde160411e1fae95b2a7999be662258a973ac0aa1c8fecda2e412c1b991983001d4bb996b13b9586d800a1d1bdec010a7efe3def6bc21232170260af0b142

    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe

      Filesize

      192KB

      MD5

      fa24143e44c394832ffc81da2ba0a39a

      SHA1

      607508070d1a4deb75bde196ec6ccca9291635df

      SHA256

      eecfd1b759a5b315e4e920a2fad572defc7c6419872acb90d461720247648986

      SHA512

      597be620a9f894435add777f48e0e3b010e14be8f50387253c5d38e05062ddd8035c6e2c3228ea8722e032cc1fe4d35a1363e55a79f82fb24da1b18556171be5

    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe

      Filesize

      133KB

      MD5

      eb5ba192c31f7302122343070991defe

      SHA1

      cde684eeab58652793fcce2d0e861600b992d7ba

      SHA256

      26fb6e683b93f0b0c29549b397d486cbbca034d5621d596648bbf20d2e141a17

      SHA512

      61d4cca36de0476b5090485463cff3a3606b18802bd1f305cb89a0254430c5bdc5bba00112d38cc4607147aa69801314026099ee8904de1025f3ca0eb3292a30

    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe

      Filesize

      130KB

      MD5

      459a888a07b1425eecaa58223b99fd73

      SHA1

      70ccde91f341383e3489c4c759472e64544888f2

      SHA256

      25bb1518f1d99b9af60cd84555cd457940b0f456ad514ce21a0b2cab68443fa3

      SHA512

      e07ee6c82ed559e753194f8717edda086922474c92fb6cf83a9d10bc0ef121cd0395998fdab1413909c0d3e90cd42eebe3b8b94723a287522927b7b337314fda

    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe

      Filesize

      1.4MB

      MD5

      47a1942a69db65947520f2a4c3d6aef7

      SHA1

      4881e23c8cf46fe69fd32b7cb5c036b142271f79

      SHA256

      f56c7871215cac2ec34b3a8eff595356bdc44d3e66e3f9de3284fc9acf972fe5

      SHA512

      6797f5191e348fc8352abbfa44eab7ae2b1a8173df5829c33aa690ba993808690195c069044ae900d36e0dd6100fa150040fdd9a4af72fc42e883939e8f4da38

    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe

      Filesize

      790KB

      MD5

      f7791c8dedb81bdf5e765dcf1680dbcb

      SHA1

      ac32ca9afde7ea782c5c4d3378aca25da6d97101

      SHA256

      ca8ee5afedf6e0ce176e651ca04cc2ab6e6857400a8052ae73527b332f7c0791

      SHA512

      097fb0026fca0615de2e23569dd4acffb34bcd1a10476e4a942b24c1392fd1f531476b0dfbd3d47f0d851c35da84a1d9ac6085f8619f670f5771ab0437fde27a

    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe

      Filesize

      308KB

      MD5

      c0ead2376f9b149a3320bbb119547d98

      SHA1

      c12220bf90f278040b1ebecf1d977d77d47f0586

      SHA256

      dc4b5858dc5cbc3ea26c99d4099da481b10c64dacff8e38d08eb5f9e27be186f

      SHA512

      4482939255a61e48cbc693bab9dd8e4a53f7fcde7f91c520610ded3404d6d7eb1eeab7c7b8acb905f94aa5b539ffc9e599819cdbb313f12677fa3b71ebc74d17

    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe

      Filesize

      149KB

      MD5

      f24953ec9c1f0eb5d96c3e52cbd5a196

      SHA1

      48ce953c4122d16a6c2bd674b2e35569cf568d9d

      SHA256

      603aa527b1752be8fc43093ff9ec330959a8499861248d7a638547010f7f12dc

      SHA512

      587dc79c5f42e1dd31d3d8698dbc8b20d98b6fd0495e510febd1345e82d20b8493b790eb05ecacc41792e6d2b0a402e37b291c66c8ae898857c026402a2fcc17

    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\ngen_service.log

      Filesize

      170KB

      MD5

      1ec4bac5d41bebd7ea9d9e90e89884d4

      SHA1

      a737c79903c83ad72d1d5a4edef6e42b6eb9f4b6

      SHA256

      c4410eb8ebe99e108b7df1b26590eb0cf1d0490e90de77cfa2ea5162bce2093e

      SHA512

      54a40f1f638768b79734b6e00de6245ab0343447235544f561898ab0f3118a03763d96cd326f738af9a358fb4c6e2321dce9a79010d15d12d50324b6d670196e

    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe

      Filesize

      184KB

      MD5

      53518ba200db8e863fa7ebd7b4efa5dc

      SHA1

      b1545745c22b991a2c281e2d8ccbe475ef4bf49f

      SHA256

      387eedce98e37999e346caf3d8e35b99203a3be65922c63ba6fa295c8dd88e1c

      SHA512

      d85378c89f068c74505177db756749a3bc675f8f1c3e051ff7057d3082f6d83917b1b4355d05571fe2a342470aca4e2be0bddb4231db6ecb9062bc56be1be947

    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe

      Filesize

      1.4MB

      MD5

      35e84032899dd8967135cc640bbd333f

      SHA1

      ff012e743944234a9f5ff3343144de8ebe9fa90d

      SHA256

      8bef91e8172b808454c5bfd363a8e7315005c87cd0dbffdb5990e812a6b75dd2

      SHA512

      5852d77526e469d6adef3d1924639ab3af00acae7ff9689e79a1d34c461f6deadb53e94acc04e582fd5a717918e0ca8a8f80eccf8bd318c67e41f5aff9a83e77

    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe

      Filesize

      239KB

      MD5

      ce992d0a0ddc5e63752ceb02a8bd8a0d

      SHA1

      0d7e412df3cfe1a392061837197ec37524a732b6

      SHA256

      0eb0d82f13c4b2d3d4331c2aa205a07a10abdc910e72253764330c2be31b64f6

      SHA512

      50cd60a431e5c9515139b7be8799baf05a36e5aa55c96334e5644c1e2fe0bff7128a0dbaeffad4415ba93f6a789dee0a293cd14c653349d9a5abe500bf66382f

    • C:\Windows\SysWOW64\perfhost.exe

      Filesize

      47KB

      MD5

      af85333b01168ce4087ce3f008723bd9

      SHA1

      57e233b0e3a6e1d9479b4809f17e9b309477810d

      SHA256

      c8b97676a11d4cd8dc1368d0dac4eb7de90b5b83ca4e02219d2553381d3e55b9

      SHA512

      10cb94093fc36130fcc735e71eeb3e93226ba4c2f828e0eefb35ce8b3ef8dc209c2e0877499231999be270afa3f6afcc9712d6d5f1d1f4cc13dc30b70b9623b0

    • C:\Windows\System32\Locator.exe

      Filesize

      121KB

      MD5

      eff86cca341b8d2e3b43849685f70f53

      SHA1

      f0e0a569c294751a389dfee9305ed1283fc53377

      SHA256

      f34e378dc8c6251e425dca3c10ae7d8dbff609c3fcc16bc8059377341aa81ea5

      SHA512

      cfaa8bb4a2d0dea7e001479f593bf91574ca74c3a6864df94c9a58d846b59f5c765a29dcdcca2f0f83c4dfab2b008a7496d6783d19608053f838f34f198d2707

    • C:\Windows\System32\SearchIndexer.exe

      Filesize

      773KB

      MD5

      764d569c50febf44a45ac2ed2a978198

      SHA1

      e58028b5d9e67ae228c26a9db637adea6b2e982c

      SHA256

      ad3c193cc067d1b1f196e300df2c5691cbe8d8b4c6910ebade1319440cab16de

      SHA512

      5211ed2bd0694f292f05aa268e69637ad594d4abf1cb1fea2f416cd157b05a81d3ed78006add0acd262d53be01a68e6e38095a3d16b031ee461f814a4f886ce0

    • C:\Windows\System32\VSSVC.exe

      Filesize

      109KB

      MD5

      28be4447c1f6312ee0be521abc818f0f

      SHA1

      91f7d8c8cd3f8f28b5988d6777b4961168834c13

      SHA256

      dcf68fb3a5220ece8b1c24bb022a35794640d2510be38a6ddf8e01fd895f7915

      SHA512

      a9de4e499b52d4959235000415a005c324372bc019a8477f256bcdb343a83c3fef1173f72b1f9702f0738d0bf47434726ae1a441d12c8a407ae545046a526e3b

    • C:\Windows\System32\alg.exe

      Filesize

      136KB

      MD5

      bd8fa54352e4264e829c58e8a2b5de5d

      SHA1

      df19f18f4e078e609868e23724418b6174cdda36

      SHA256

      0e79ff644f46785472c28d5e9bfa6394c3ac012c33343150e4230dbcfe6d9230

      SHA512

      9356a3e586a4dc3000e855e2c6992f6fe318e31ad0265ee330d536baf98cc54b37803c5731c1fef67b894eb71d799c32059ba6696e198a54041a5908cb904d49

    • C:\Windows\System32\ieetwcollector.exe

      Filesize

      404KB

      MD5

      541d94e7faa2d2c54d46aa6580023a74

      SHA1

      a3b75f1dde08a5155822afb86cd6cf8890552e92

      SHA256

      d29cb31196e548df7ce14c1780d7fc357a8354b683ab02fd8c45c1739c8811a3

      SHA512

      232f5390b4f22050637056c1e0ca2713f26ed25300d95f550045e8521acd523b8df836b93ca56c824c7c10d347faee7370b27fce303881994d2dd6677aa2f61f

    • C:\Windows\System32\msdtc.exe

      Filesize

      545KB

      MD5

      eeff733f5b9c96610b43669ef2fcb10d

      SHA1

      3841a7c415913e9c8a56084ab1974e8b31b7e87b

      SHA256

      fe739d7bf9277105199b68f07528bf9ca99cb9fb35df2464e480603533ec44f0

      SHA512

      d0e3f0b17f38a4d125bd13f26be77ffabcf09bccec4066bf0bca690aca41574b8f7b34fb9d9243068ffb916f52714ee289ca4529587c3fd01f987851cd900513

    • C:\Windows\System32\msiexec.exe

      Filesize

      543KB

      MD5

      87f6367c80290578a5843d94f7e66a09

      SHA1

      ec5ccde270a9be6d7f09f689503ada9db0c71fc2

      SHA256

      25c516ca941b6c7d4f3ec8a7b458b889304ce1fc8d7fafe38babce8d1f18d979

      SHA512

      f0a2451682c8dad9811ad46af556ddae7e15e9d8a3e822bfe6c343821f05b123ab8adee8dd3fee05d6a48298fbe83cc8ce73038172548389b22eb67b8c6b5bf5

    • C:\Windows\System32\snmptrap.exe

      Filesize

      488KB

      MD5

      47f11ec29ae3c09869e60b95b323837b

      SHA1

      837a212a12b60b3815a70b558e3e6e43f198be0a

      SHA256

      dc7a503052907464f58b82e9c73425dfcf8d7eaf5a5d6d95441727d4ca7fada2

      SHA512

      74b4cc938656abaaa3bf7cd93fcbe26489bf0fbbe0ebbfa7d2b19fbf7b70963def51dcec0febae4d9935b3f33ccad9a2fdd64eb486a05eba176cd71567640514

    • C:\Windows\System32\vds.exe

      Filesize

      163KB

      MD5

      f85fb78e53aec2158c9f084c6a76d7f5

      SHA1

      b899322f74b3ed9038b758c34dc1da8b3463f5a7

      SHA256

      9dfb45d0b00bf9805491f96d796a4e0c672c72568c71e3846ce9bb8705844ceb

      SHA512

      2b365cff665f5188ce80011821b3943803625751e40bfd01d9f4eebb45ead056867a1437b55549b16e35fdb5fae19590b2ec470184335ef9efdfe1a36a062b7d

    • C:\Windows\System32\wbem\WmiApSrv.exe

      Filesize

      193KB

      MD5

      cb9085ffadf21d65d66451ce401d2038

      SHA1

      49983da8ee18a91e95975dbbf551f953ba4ed8da

      SHA256

      a23b37f66d62025ad099309ca15fc78dc9b51e2685fd27abeace884d348c0de6

      SHA512

      fc4ba15e44c835d8f0cb824064e5446f332061b309611852297aae70cdc0f4c1c00c889c32b8da7de799f9a6645c18ef36ab00c990557a79c14e0ba9713d60d3

    • C:\Windows\System32\wbengine.exe

      Filesize

      814KB

      MD5

      c7b36dbbe253ba90bc4f22525d336b8e

      SHA1

      3fa06f6e632f5639c7b996b7d9f20aeecc4af227

      SHA256

      46dab5a58ff1d023540db98bd1ea92261f653623b779c17ea4685e98bd89b532

      SHA512

      943e15eedd2256c609ba7971701cb45add2ae4eece912f16dfac90eeffc4d4fcf3e32fec550d97b6257e9af48bc4753f605a01bdcde63095d9e9935932c7202a

    • C:\Windows\ehome\ehrecvr.exe

      Filesize

      114KB

      MD5

      64b6c531ce6e42d094fbba288dcb8649

      SHA1

      9a1c24692f3aae391b2649bbf46c57d569b41274

      SHA256

      dbf3d0eb7399b5bb9f6c8b29619e45310043f9e13795a69a1e2f32b588b5b4d5

      SHA512

      adc9617e45849fe06e9262f802848a9fd532bef0f8fd835bc4ceec6263193742c01c75b870a98efc4d873e1046e2b2430f0985246e733a7a5b4f88ec9db42deb

    • C:\Windows\ehome\ehsched.exe

      Filesize

      64KB

      MD5

      f835411ed52bd07faf42dd0b1ce0ff3d

      SHA1

      cd3e5d283faa6ebfc94c0fb7c53f8d9e4bee2249

      SHA256

      43871596bd2c7354fa61a8b382ad46c70fcc6ff64e7355904e8417007e84c28b

      SHA512

      e769cc43485960a4a32306d73786c9efdbd55068a4c65bcdfd459423a4dc1e9c8207d35e9bbf3c6832bb9d3e6182eb2cef2db5311ab066aa47765ed2b0f02b1a

    • C:\Windows\system32\msiexec.exe

      Filesize

      564KB

      MD5

      9d2ae51c7c1e23491446400aac531a7c

      SHA1

      7b2ac50390ee3c2232a5ab07f17303e041000ced

      SHA256

      f3f43f892f2e6e036836c3032b7338e96598f5dcea578b21b9211b356a2fbd2a

      SHA512

      cba444543dbc83f3b9090138f0e4ed73b4a6f1d67b8ea17065c20f463e9064f16b66a0bc6d8441dffb1a11f85787c55354c296e8abbe66516955e3deac76d430

    • \Program Files\Windows Media Player\wmpnetwk.exe

      Filesize

      330KB

      MD5

      0a7d36be19bde3a150547a9fe0bed4b3

      SHA1

      2a4a2a690d5025c5ab94b9976e7c66a8e92397b0

      SHA256

      5bd0210dd9562bf2c6492da38463b7b723a52b510c3bd0d7a6c8a2b66218d9d7

      SHA512

      ef2b509b4177d14d76b3c2aadcfbe7a7c48832a15ec8060f4e3686eb23374d065fe6cb368641d39ab98f49e70730cad0b354d3412be37d5ce5ee77d8d9cd6a75

    • \Program Files\Windows Media Player\wmpnetwk.exe

      Filesize

      109KB

      MD5

      6284396ab35178bc3dea01a451227b17

      SHA1

      612572a26275f6be740a497ec9a47fa85a8bdcd9

      SHA256

      38b1ec23f4afd3e05fdab52f282365b3b3102be0ba29f8a542fb61d3530df20a

      SHA512

      d663378c9d3e457de850de71f467e13f9a3dba24e0466582226a0a30e2b80818bf5a615b8c0bb0deb03f5651acad5f816b91f35a08f146734c541f078bb7307a

    • \Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe

      Filesize

      348KB

      MD5

      a73fc8faf45a5ecd1b79dc4065a1cf56

      SHA1

      f5bd642ae29e48704311b41a0fb6e92a52807b74

      SHA256

      59f9ef79692b3d3939bd49fcb27267e011b224686a9f14c8a76576bf5d899e60

      SHA512

      dee7c97bc6064bdb8a1a7f9b0d32b46b40354d8c0b76c8ce53e80a22ccaef2c873cc01816c359f43a07aa666ab49e355721091d6334ea13ff72c2c0e484e2adf

    • \Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe

      Filesize

      427KB

      MD5

      aff19e68beb6089cd3099d534319df11

      SHA1

      cb010c8e53fbffcd5bfc913024518021226eaac0

      SHA256

      bf77611c7aabefe8085c09907ed9c81bd6a6ec065ff01516e354802749d070f2

      SHA512

      71402cf14f5be829b2b6819f1b996916324a02800f7379b759203909da8491a67d0b06f2b9604766afcb3bff0d959ce1294cec4d1c266fe00715448e870f34ec

    • \Windows\System32\Locator.exe

      Filesize

      90KB

      MD5

      ef07f911901ceae7df8cc95d41a662a5

      SHA1

      52b020a47326a65810f16c0dd301f69392bc4f2d

      SHA256

      6286da1cfdd166571220cfef831156a41ea57735f1a132ebb2080e4d9a906d28

      SHA512

      bd96945ec3cd891b5628d8710bfb149e788660965b5f71c335c0a01e1488149acd736d89d13890ef44ae685a6f60f6222d4d6d00c007c84863dc843b9cf12d08

    • \Windows\System32\alg.exe

      Filesize

      153KB

      MD5

      cc4af5e8c55422eae1a154b174a6abb8

      SHA1

      6f15fc5cfe7cee8cffa9673db3d10e37d49fd55a

      SHA256

      85b38806d671e62e0ed53ba718df1d9d9f71a967ee9f96d53a6d34431412f8b9

      SHA512

      ac198422e8a40d0ef3d791209d99bebffc16e12fbb7d526c58f4f39dc2561734eb5d77bfd981749106951d812a96cf2391afc8996a5c6b501b80f238ebe6bc88

    • \Windows\System32\ieetwcollector.exe

      Filesize

      500KB

      MD5

      2c70d86f5b645565c8ef3d1d8be98df4

      SHA1

      4e248538b19a3f23c13d09c44577e0d29000f12a

      SHA256

      029ce05fcff32f73d6e0b4a1aa65a4e71ba7a289814d2ee44699791dd0507ad7

      SHA512

      d07c5796e9f95438c6c258463878ff87f9e92393c18296d87ad04ae47f18746c5f8a05aa1a15f2a1a3eea1578e3c97e89896feb3fbed896a0175128765830621

    • \Windows\System32\msdtc.exe

      Filesize

      497KB

      MD5

      2367cd8923d9c991e13dc5a6c31bc327

      SHA1

      c39db6f214c73f72d1a13913e9ef327d99cd49d5

      SHA256

      50823071dd485b1fea62659a5f819b788dcfd5e94c24d182ea002826e0bf3574

      SHA512

      c84bfdd616c268e36c66b919ecf38e7218815f03d0b0ab81f15dc2adf4345deac2f7bee59fc555cb25c4b39f9f7a9a0b783e489bea9f1e291f0033db62e74e9d

    • \Windows\System32\msiexec.exe

      Filesize

      379KB

      MD5

      16321b311a454b0fd5675b830599fca0

      SHA1

      6741e3f4e3797d3cd43ff7598e88b83809118b4e

      SHA256

      05e4cab28917f450bb7c8049f21e5532e066ca463cdb1ab0ea0bb142a877ff73

      SHA512

      3476a8312e56fa186d700e39467a7cbc28f936071fb710ba9b385bde015f7a0ed7942bba6f669563412841561bf9eb08b598e3e580f5d9539de9000981501304

    • \Windows\System32\msiexec.exe

      Filesize

      401KB

      MD5

      e2b2cdfb05655d2958fe2cd8de71fd36

      SHA1

      4a0b47f1f686fc8ac0407aa11594d32eb9b93983

      SHA256

      f22709a24df098657922153a0e1264593048fe8cebd94f886147aebe3bd77122

      SHA512

      3c646d2d9b1be9d1424347971dc455e30593983fd38e970e35384743b0ab774dc40f168c40bb34dd72eac9b800963734ebc72b7d6c4fb9052ffd71fd354c983e

    • \Windows\System32\snmptrap.exe

      Filesize

      322KB

      MD5

      b7c0f5b225893ad42ec7d8c2ab4df426

      SHA1

      b1d71d5351792e33eee0d0743b12c68872c9e668

      SHA256

      10fdee0e307f0f9576ea903d7bb83d6f6a86f37a9c29f62e4aa668dd3d6988f8

      SHA512

      06b85a918ca8daa787706c748d95ee97ffb7024d65196c9ba7d8c799ca8f08dc60fefadc1354384569a9d67ada6d1d0566fb24a0db9ea004f37a6c4ee0537a1c

    • \Windows\System32\wbem\WmiApSrv.exe

      Filesize

      648KB

      MD5

      f1d61a2575ed53ce14b67110d68aa636

      SHA1

      4f638a020a51c1ec5c9d5dad9cc049525a49ef56

      SHA256

      4af81387c0e0097a5710e4116160f55a8425c0ee746f9437175ee3b8355aa65c

      SHA512

      dc053b89ddf5f0c4fa7bb02a3d6273137cf2d65de0ee3bde7f785be87bed65280c2ae59dfddcfdab980d0f50aa2eebd181f7a3717b17524ce43bf59321b5cb63

    • \Windows\System32\wbengine.exe

      Filesize

      659KB

      MD5

      720666170ff36992d10a6d969bf2a369

      SHA1

      b15e24a6cdeb22b3eea0115bbb6f3a7c6e19e6cb

      SHA256

      4e68487319b50c7cb21c6ab6cab0eeb5f785ec40603473df4b69ead0a988467d

      SHA512

      d08318952b8ed21c645de30a696b863691793b15c2156043f9c1bc3ceb269cad221bd12a137f36b4d150f4aef7ddd6df8e3a9cbd263bde124ca1bc303768d137

    • \Windows\ehome\ehrecvr.exe

      Filesize

      112KB

      MD5

      1bac209e206c06e5d98df80f61e4b778

      SHA1

      38b3e89f8a5636f92065fe0aa091ea08fd899a84

      SHA256

      396f169991bbf1a9e8c503171400043161fb7f75ce1d3751c919113d68f55fca

      SHA512

      be1331e5dc60202a61bce6750adb73153841b45d601a97bbd8bf4d161bb88b093a7db58e0ccb3970bd9e69bbb916a3b4b9f33b38efa8c7bfdd486947a7948195

    • memory/552-150-0x0000000140000000-0x0000000140172000-memory.dmp

      Filesize

      1.4MB

    • memory/552-161-0x0000000000BA0000-0x0000000000C00000-memory.dmp

      Filesize

      384KB

    • memory/552-270-0x0000000140000000-0x0000000140172000-memory.dmp

      Filesize

      1.4MB

    • memory/836-318-0x0000000001000000-0x0000000001156000-memory.dmp

      Filesize

      1.3MB

    • memory/836-323-0x0000000000170000-0x00000000001D7000-memory.dmp

      Filesize

      412KB

    • memory/952-78-0x0000000010000000-0x0000000010167000-memory.dmp

      Filesize

      1.4MB

    • memory/952-79-0x0000000000410000-0x0000000000470000-memory.dmp

      Filesize

      384KB

    • memory/952-85-0x0000000000410000-0x0000000000470000-memory.dmp

      Filesize

      384KB

    • memory/952-127-0x0000000010000000-0x0000000010167000-memory.dmp

      Filesize

      1.4MB

    • memory/976-294-0x0000000140000000-0x0000000140237000-memory.dmp

      Filesize

      2.2MB

    • memory/976-181-0x0000000140000000-0x0000000140237000-memory.dmp

      Filesize

      2.2MB

    • memory/976-186-0x00000000002F0000-0x0000000000350000-memory.dmp

      Filesize

      384KB

    • memory/1592-308-0x0000000000C90000-0x0000000000D10000-memory.dmp

      Filesize

      512KB

    • memory/1592-307-0x000007FEF3170000-0x000007FEF3B0D000-memory.dmp

      Filesize

      9.6MB

    • memory/1592-240-0x000007FEF3170000-0x000007FEF3B0D000-memory.dmp

      Filesize

      9.6MB

    • memory/1592-282-0x0000000000C90000-0x0000000000D10000-memory.dmp

      Filesize

      512KB

    • memory/1592-241-0x0000000000C90000-0x0000000000D10000-memory.dmp

      Filesize

      512KB

    • memory/1592-242-0x000007FEF3170000-0x000007FEF3B0D000-memory.dmp

      Filesize

      9.6MB

    • memory/1600-310-0x0000000000860000-0x00000000008C0000-memory.dmp

      Filesize

      384KB

    • memory/1600-301-0x0000000100000000-0x0000000100542000-memory.dmp

      Filesize

      5.3MB

    • memory/1600-311-0x0000000100000000-0x0000000100542000-memory.dmp

      Filesize

      5.3MB

    • memory/1664-267-0x0000000100000000-0x0000000100172000-memory.dmp

      Filesize

      1.4MB

    • memory/1664-316-0x0000000100000000-0x0000000100172000-memory.dmp

      Filesize

      1.4MB

    • memory/1664-280-0x0000000000A80000-0x0000000000AE0000-memory.dmp

      Filesize

      384KB

    • memory/1664-326-0x0000000000560000-0x00000000006D2000-memory.dmp

      Filesize

      1.4MB

    • memory/1664-273-0x0000000000560000-0x00000000006D2000-memory.dmp

      Filesize

      1.4MB

    • memory/1696-41-0x0000000140000000-0x0000000140431000-memory.dmp

      Filesize

      4.2MB

    • memory/1696-13-0x0000000002680000-0x0000000002AB1000-memory.dmp

      Filesize

      4.2MB

    • memory/1696-0-0x00000000001D0000-0x0000000000230000-memory.dmp

      Filesize

      384KB

    • memory/1696-35-0x00000000001D0000-0x0000000000230000-memory.dmp

      Filesize

      384KB

    • memory/1696-7-0x00000000001D0000-0x0000000000230000-memory.dmp

      Filesize

      384KB

    • memory/1696-8-0x00000000001D0000-0x0000000000230000-memory.dmp

      Filesize

      384KB

    • memory/1696-2-0x0000000140000000-0x0000000140431000-memory.dmp

      Filesize

      4.2MB

    • memory/1720-296-0x0000000000550000-0x00000000005B7000-memory.dmp

      Filesize

      412KB

    • memory/1720-288-0x000000002E000000-0x000000002E175000-memory.dmp

      Filesize

      1.5MB

    • memory/2184-243-0x0000000000160000-0x00000000001C0000-memory.dmp

      Filesize

      384KB

    • memory/2184-256-0x0000000140000000-0x000000014016E000-memory.dmp

      Filesize

      1.4MB

    • memory/2456-174-0x0000000000510000-0x0000000000570000-memory.dmp

      Filesize

      384KB

    • memory/2456-224-0x000007FEF5A80000-0x000007FEF646C000-memory.dmp

      Filesize

      9.9MB

    • memory/2456-223-0x0000000000510000-0x0000000000570000-memory.dmp

      Filesize

      384KB

    • memory/2456-221-0x0000000140000000-0x000000014016E000-memory.dmp

      Filesize

      1.4MB

    • memory/2456-214-0x000007FEF5A80000-0x000007FEF646C000-memory.dmp

      Filesize

      9.9MB

    • memory/2504-50-0x0000000140000000-0x000000014015D000-memory.dmp

      Filesize

      1.4MB

    • memory/2504-51-0x0000000000AC0000-0x0000000000B20000-memory.dmp

      Filesize

      384KB

    • memory/2504-139-0x0000000140000000-0x000000014015D000-memory.dmp

      Filesize

      1.4MB

    • memory/2504-57-0x0000000000AC0000-0x0000000000B20000-memory.dmp

      Filesize

      384KB

    • memory/2556-62-0x0000000000600000-0x0000000000667000-memory.dmp

      Filesize

      412KB

    • memory/2556-108-0x0000000010000000-0x000000001015F000-memory.dmp

      Filesize

      1.4MB

    • memory/2556-68-0x0000000000600000-0x0000000000667000-memory.dmp

      Filesize

      412KB

    • memory/2556-61-0x0000000010000000-0x000000001015F000-memory.dmp

      Filesize

      1.4MB

    • memory/2576-278-0x0000000001A30000-0x0000000001A31000-memory.dmp

      Filesize

      4KB

    • memory/2576-261-0x0000000140000000-0x000000014013C000-memory.dmp

      Filesize

      1.2MB

    • memory/2576-165-0x0000000001A30000-0x0000000001A31000-memory.dmp

      Filesize

      4KB

    • memory/2576-141-0x0000000140000000-0x000000014013C000-memory.dmp

      Filesize

      1.2MB

    • memory/2576-145-0x0000000000A70000-0x0000000000AD0000-memory.dmp

      Filesize

      384KB

    • memory/2584-45-0x0000000000920000-0x0000000000980000-memory.dmp

      Filesize

      384KB

    • memory/2584-114-0x0000000100000000-0x0000000100164000-memory.dmp

      Filesize

      1.4MB

    • memory/2584-30-0x0000000000920000-0x0000000000980000-memory.dmp

      Filesize

      384KB

    • memory/2584-32-0x0000000100000000-0x0000000100164000-memory.dmp

      Filesize

      1.4MB

    • memory/2668-253-0x000000002E000000-0x000000002FE1E000-memory.dmp

      Filesize

      30.1MB

    • memory/2668-258-0x00000000002C0000-0x0000000000327000-memory.dmp

      Filesize

      412KB

    • memory/2748-238-0x0000000140000000-0x000000014018A000-memory.dmp

      Filesize

      1.5MB

    • memory/2748-239-0x0000000000900000-0x0000000000960000-memory.dmp

      Filesize

      384KB

    • memory/2788-179-0x0000000000400000-0x0000000000568000-memory.dmp

      Filesize

      1.4MB

    • memory/2788-102-0x00000000005E0000-0x0000000000647000-memory.dmp

      Filesize

      412KB

    • memory/2788-98-0x0000000000400000-0x0000000000568000-memory.dmp

      Filesize

      1.4MB

    • memory/2788-95-0x00000000005E0000-0x0000000000647000-memory.dmp

      Filesize

      412KB

    • memory/2860-188-0x0000000140000000-0x000000014016E000-memory.dmp

      Filesize

      1.4MB

    • memory/2860-122-0x0000000000410000-0x0000000000470000-memory.dmp

      Filesize

      384KB

    • memory/2860-115-0x0000000140000000-0x000000014016E000-memory.dmp

      Filesize

      1.4MB

    • memory/2868-247-0x0000000000AD0000-0x0000000000B30000-memory.dmp

      Filesize

      384KB

    • memory/2868-245-0x0000000140000000-0x000000014016E000-memory.dmp

      Filesize

      1.4MB

    • memory/2976-312-0x0000000140000000-0x0000000140176000-memory.dmp

      Filesize

      1.5MB

    • memory/2976-262-0x0000000000A70000-0x0000000000AD0000-memory.dmp

      Filesize

      384KB

    • memory/2976-259-0x0000000140000000-0x0000000140176000-memory.dmp

      Filesize

      1.5MB

    • memory/3020-96-0x0000000140000000-0x0000000140431000-memory.dmp

      Filesize

      4.2MB

    • memory/3020-12-0x00000000004A0000-0x0000000000500000-memory.dmp

      Filesize

      384KB

    • memory/3020-19-0x00000000004A0000-0x0000000000500000-memory.dmp

      Filesize

      384KB