Analysis

  • max time kernel
    9s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    09/04/2024, 20:40

General

  • Target

    f46561f468b697f2ab5092ab12f591d0.exe

  • Size

    1.3MB

  • MD5

    f46561f468b697f2ab5092ab12f591d0

  • SHA1

    e270192f372bc3d1e101289b315099790561b45d

  • SHA256

    f9551872429581da3815f96430e7a4633022361697647b84e7516164cc02167e

  • SHA512

    67c473ca380d31847982cfaab6646cf9d75dc8036fb29a4c6d488139a3642988bff8b3049f9ba3f690f0407a7f91c49c9731d866c36e5e52e3a68dce12582e05

  • SSDEEP

    24576:vFjbSRQ5UOOU62FBnO+E222YJbNEUQKGOb:vF95UbU62FAQ228QKl

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 11 IoCs
  • Loads dropped DLL 5 IoCs
  • Drops file in System32 directory 5 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Drops file in Windows directory 20 IoCs
  • Modifies data under HKEY_USERS 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\f46561f468b697f2ab5092ab12f591d0.exe
    "C:\Users\Admin\AppData\Local\Temp\f46561f468b697f2ab5092ab12f591d0.exe"
    1⤵
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:2192
  • C:\Windows\System32\alg.exe
    C:\Windows\System32\alg.exe
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    PID:2196
  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe
    C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe
    1⤵
    • Executes dropped EXE
    PID:2600
  • C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe
    C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe
    1⤵
    • Executes dropped EXE
    • Drops file in Windows directory
    PID:2564
  • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe
    C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe
    1⤵
    • Executes dropped EXE
    • Drops file in Windows directory
    PID:2416
  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
    C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
    1⤵
    • Executes dropped EXE
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:2444
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1e8 -InterruptEvent 1d4 -NGENProcess 1d8 -Pipe 1e4 -Comment "NGen Worker Process"
      2⤵
        PID:2288
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1f0 -InterruptEvent 250 -NGENProcess 258 -Pipe 1e0 -Comment "NGen Worker Process"
        2⤵
          PID:2204
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
          C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1e8 -InterruptEvent 1ac -NGENProcess 254 -Pipe 1f0 -Comment "NGen Worker Process"
          2⤵
            PID:2880
        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
          C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
          1⤵
          • Executes dropped EXE
          • Drops file in Windows directory
          • Suspicious use of AdjustPrivilegeToken
          PID:2268
        • C:\Windows\ehome\ehRecvr.exe
          C:\Windows\ehome\ehRecvr.exe
          1⤵
          • Executes dropped EXE
          • Modifies data under HKEY_USERS
          PID:2116
        • C:\Windows\ehome\ehsched.exe
          C:\Windows\ehome\ehsched.exe
          1⤵
          • Executes dropped EXE
          PID:2840
        • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
          "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
          1⤵
          • Executes dropped EXE
          PID:1936
        • C:\Windows\eHome\EhTray.exe
          "C:\Windows\eHome\EhTray.exe" /nav:-2
          1⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:584
        • C:\Windows\system32\IEEtwCollector.exe
          C:\Windows\system32\IEEtwCollector.exe /V
          1⤵
          • Executes dropped EXE
          PID:1472
        • C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE
          "C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE" /auditservice
          1⤵
            PID:3064
          • C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe
            "C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"
            1⤵
              PID:640
            • C:\Windows\System32\msdtc.exe
              C:\Windows\System32\msdtc.exe
              1⤵
                PID:2888
              • C:\Windows\ehome\ehRec.exe
                C:\Windows\ehome\ehRec.exe -Embedding
                1⤵
                  PID:1792
                • C:\Windows\system32\msiexec.exe
                  C:\Windows\system32\msiexec.exe /V
                  1⤵
                    PID:2816
                  • C:\Program Files (x86)\Common Files\Microsoft Shared\Source Engine\OSE.EXE
                    "C:\Program Files (x86)\Common Files\Microsoft Shared\Source Engine\OSE.EXE"
                    1⤵
                      PID:2592
                    • C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE
                      "C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"
                      1⤵
                        PID:3052
                      • C:\Windows\SysWow64\perfhost.exe
                        C:\Windows\SysWow64\perfhost.exe
                        1⤵
                          PID:1420
                        • C:\Windows\system32\locator.exe
                          C:\Windows\system32\locator.exe
                          1⤵
                            PID:1916
                          • C:\Windows\System32\snmptrap.exe
                            C:\Windows\System32\snmptrap.exe
                            1⤵
                              PID:1744
                            • C:\Windows\System32\vds.exe
                              C:\Windows\System32\vds.exe
                              1⤵
                                PID:2796
                              • C:\Windows\system32\vssvc.exe
                                C:\Windows\system32\vssvc.exe
                                1⤵
                                  PID:944
                                • C:\Windows\system32\wbengine.exe
                                  "C:\Windows\system32\wbengine.exe"
                                  1⤵
                                    PID:2804
                                  • C:\Windows\system32\wbem\WmiApSrv.exe
                                    C:\Windows\system32\wbem\WmiApSrv.exe
                                    1⤵
                                      PID:1500
                                    • C:\Program Files\Windows Media Player\wmpnetwk.exe
                                      "C:\Program Files\Windows Media Player\wmpnetwk.exe"
                                      1⤵
                                        PID:2616
                                      • C:\Windows\system32\SearchIndexer.exe
                                        C:\Windows\system32\SearchIndexer.exe /Embedding
                                        1⤵
                                          PID:360

                                        Network

                                        MITRE ATT&CK Enterprise v15

                                        Replay Monitor

                                        Loading Replay Monitor...

                                        Downloads

                                        • C:\Program Files (x86)\Common Files\microsoft shared\Source Engine\OSE.EXE

                                          Filesize

                                          1.3MB

                                          MD5

                                          7a33e969c6af21739a745efc39bce59e

                                          SHA1

                                          ac41c6e325d2600eb7a33c710ba34b4bf51f14a2

                                          SHA256

                                          79c683827467d208e091fc831953cd51d1196f534efc90898916dbd05e095a30

                                          SHA512

                                          082cb4a4cd1228fc5aa544331d9f0621fd81600532aba7c17573008d7a7308f029b1af66fe546b0b0e21b392274097e5af6b89147c8940e792fab2c73342f324

                                        • C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE

                                          Filesize

                                          30.1MB

                                          MD5

                                          0a8b649707e2b2764b2de623d93715f8

                                          SHA1

                                          bc058a1af9d19086165223a75490c4a65743c26b

                                          SHA256

                                          8bf96cf759a56623cd35694ef3459301a5c833bdcef24016b7def3e4c409bdb7

                                          SHA512

                                          fffc5824231116b67805cf424768dd54858e5a8b7705ee5277956fe6df1c395eb36fde1d56cea5e6135be98e46af3b02da8bce1729c8c57181e11b68afa671a5

                                        • C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe

                                          Filesize

                                          1.4MB

                                          MD5

                                          bf105e5e4e192be88350570c6b0c669e

                                          SHA1

                                          81ddd09b11f4dc6058b0250e682d192d2facb65e

                                          SHA256

                                          546718e536c9c3a79cd4728ad1d0faed16e0122f80d0b1ec8b0537a7ca78dbb0

                                          SHA512

                                          8003e50a8077572a79fc2bd4c8603b0f5d65c7659aea53c997f1bc6dd09b1976c16904d68f007917260501773bb402a06c18e409c30a891ea8365f0dfbb8d56f

                                        • C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE

                                          Filesize

                                          5.2MB

                                          MD5

                                          f662d529973f55cdaca6ca3834830c50

                                          SHA1

                                          7a0ddbc2cafbb12c2e3592ea38056db88ffef16c

                                          SHA256

                                          0d8de1120d20c5b792ed375e30f4bf7f68549c779e9917f5d3125e1fb87e6cb0

                                          SHA512

                                          c39e1b8abc2a2e178d90e691282aab73ad9fe4a022e99bdd10c16e19f279e93df8b3079a4cb1d4f742aa4aa3b244d03268f94a9fd0724d1895046627fad55510

                                        • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe

                                          Filesize

                                          2.1MB

                                          MD5

                                          8d7bbe66c369914597275e012c3d7987

                                          SHA1

                                          345e003b3601870d53bcaf37d1c68168fcce6b94

                                          SHA256

                                          eae90f0d16b4670ded8f365503bff04a4137c4ff743ee2ff36b42cb80a8824c9

                                          SHA512

                                          1d61844ec3dce563e875f23b63319369346d0f74be1ce759c0b04bbca139b46f049112c56624de06b71a93eba36a71fbcd2acfb1e83e08607c1cf536d12270fb

                                        • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe

                                          Filesize

                                          1.3MB

                                          MD5

                                          fc5a310866c4f0ebe2a4d80472e0e886

                                          SHA1

                                          12120e33fe04d387fe712fb35e9061faeaa95476

                                          SHA256

                                          d7be0cd5065ce411bf24245c8bb2bd78416fb8da699243efa369d4ca59f3d94b

                                          SHA512

                                          7f8fc18f772e48a5c17dfcd1310839d848a70b679b464fe5d133644081d4c98c021ac8706ffa3af1f3600c744c0fe8ab6f707d531eb75a56b5a5ed415ec21450

                                        • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ngen_service.log

                                          Filesize

                                          872KB

                                          MD5

                                          108f3c84c5c8b959243c6b9b42ec44fe

                                          SHA1

                                          ee076ff4962b14cbc47b80aab72fc861e655825d

                                          SHA256

                                          f7f0176c6d0192540898926b4b64f2b466d7fde4426c090558ec6a42cc515a15

                                          SHA512

                                          c22d7c84e9448e35657e3d8a6aa735cc43155394d6c5f8b774c4d35c4ad62534aab0c92b8c5d47dd726c9133ed1002f5cae8fc01a260b356a58ed3a6fa872c15

                                        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe

                                          Filesize

                                          1.2MB

                                          MD5

                                          b07f2c1aa580b288160e0b9a2f5a61be

                                          SHA1

                                          7c9d90e8bb02240ed74c436be0811a837f67b4f0

                                          SHA256

                                          96852964647d4ef68c3e3400c513239b9627ef60027ff99f680ec4dcfe56534d

                                          SHA512

                                          1a6410b637c6932323ba6d14c39d602055e02fe12dcd225d0a718c117934eedb184228c3ab975a518b30ed6663aa3c44932b68f87385fc0f0841a9a0bda5294c

                                        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe

                                          Filesize

                                          1.3MB

                                          MD5

                                          5fdc7e119a3e4758dc1fe5254f3fca47

                                          SHA1

                                          d3d28245f177673fb751e13a73ea17b1f6febb7d

                                          SHA256

                                          45185ca62adc25389d3010ce7650fdb9ed585eea7ba466cfa8ac4eedbd762aa0

                                          SHA512

                                          f922e121f336409a0f504e066e36c6ec5ba050569dd6cec23f017ca07aea7cf216ba810e42d37ea961bc651e0550160c8e6db032727b690349a97e33af949454

                                        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe

                                          Filesize

                                          1.2MB

                                          MD5

                                          589ac3500437115bfbef8d4e792a1de2

                                          SHA1

                                          bd758e5a6d1b98f5b1c5c65d41d4c4ec9ae3d7cb

                                          SHA256

                                          aee16a10e24cdbd729d22ac2465a8dd6d95c3541404e00a3726a59336c74bfb8

                                          SHA512

                                          e7a13aaf0233f9bac794358815205512793cade93aec658cbab26dea145c3a07909c950ca1a20f9097814fce5c8f585d12c317973df9e6e4db640d1bec107929

                                        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\ngen_service.log

                                          Filesize

                                          1003KB

                                          MD5

                                          880ebb63acf48b674f791f6bdd8440cd

                                          SHA1

                                          736b22830ec390033c69be4b927ee79004dbdb12

                                          SHA256

                                          0b8b5ce3c67b8eeaaa9c0a4c3ffd77ac8ba7fe76468dbc6cbfc007e343c4361e

                                          SHA512

                                          3fba5b7cb0f7b7d3cf719e1418c91690eef9664b2c8e27eacce974a1ec911108fb543ad4e2a92778f6a0b920916b0158ecea04e626e8789f1d837362ee685457

                                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe

                                          Filesize

                                          1.3MB

                                          MD5

                                          be1f5dd0935db8817235a65e6b459616

                                          SHA1

                                          52c7786d74f9b31caede34bdd0914018dafa8b9e

                                          SHA256

                                          209edf1450cd6ec4e13d83beee288a02c05b3c595013bcf2a9661d3117837f34

                                          SHA512

                                          49a618c0d1794aabd7b5681430649488da08fe929f93314ecbbac8a5fc77b3fff7f0720ad5a275be77b0ff7e29e74f1e32e3000f52375bdfee0c59b46c00495e

                                        • C:\Windows\SysWOW64\perfhost.exe

                                          Filesize

                                          1.2MB

                                          MD5

                                          8bbd69c1eee1e9fd4a7343f6188b1486

                                          SHA1

                                          a56efe65bdfd83bfe69d61ed4cb8f777cb514277

                                          SHA256

                                          a474b250411f83dde86188a9fa8f4035921afcfb36c86a2fdcd43d2be6e26010

                                          SHA512

                                          bd37e3320aaed437d7ddcbc333ef736b7da86cc654673d0ac5f71eac15f6ad9f54dfbd8e8a977d6053b039e2ff5684a333a0cf96707fd6bf6a407c6bdb84dbc4

                                        • C:\Windows\System32\SearchIndexer.exe

                                          Filesize

                                          1.1MB

                                          MD5

                                          5538aeb2509be108a78cfcc3695cf945

                                          SHA1

                                          efd148e869e851403968bf760a32f13448323a50

                                          SHA256

                                          a1c239905d3cb4fb190d92367041f2c5e6d354db66ba1a79716b01085ea9db62

                                          SHA512

                                          d916975afc99cf0ed7108c53583c75c689cee70bf6a5bc24ecd5e0e5f65e5e06c53499a7b8b855bcdd6e809f8ec1f886e53c9a6eb7fd7c99f281d1fec9123d24

                                        • C:\Windows\System32\VSSVC.exe

                                          Filesize

                                          2.1MB

                                          MD5

                                          4c5e78fa46b4cb74d697424be82e6ec5

                                          SHA1

                                          1b9a0e6443f0776710a4abc51162568e1228c93e

                                          SHA256

                                          7eede70a19a14906dd6eae2ae08008fe975a2bcf009f29fcb5460b3e10282ee0

                                          SHA512

                                          0088d291324e79320bb7b52543c9354761ecbb5f548d3f8ecc6519ac12ab4c72865d037ea1745dd14b90909d376144fe68457e77a903490b4c033d877bf2f633

                                        • C:\Windows\System32\vds.exe

                                          Filesize

                                          1.7MB

                                          MD5

                                          db6af41d52bd3da83bfc9a059819d23c

                                          SHA1

                                          aefd29fd8bc96c64ec582476058d3afd97b7d32f

                                          SHA256

                                          6e256a48f31eb6675cb51813fdc74bf670e4fdd4c468d52b98d601ba7865c70c

                                          SHA512

                                          b6c583781589e2e7e93c5a9ceb99f30626e37ead65ad457d09c0b55786a10f9fbd426bfb4ac77cb71df25d7088226a825160d8259672b0fd8e5f01ed38de1eb3

                                        • C:\Windows\System32\wbengine.exe

                                          Filesize

                                          2.0MB

                                          MD5

                                          35467cce38f023d5cf289e4298c8c5f9

                                          SHA1

                                          57966e0cc365f32f2b54522980293c2c1eb57fa0

                                          SHA256

                                          b808dd375a522d94a7af5fc37fbadd898b4a9a9a50303db22a90aa03dcf642aa

                                          SHA512

                                          a6c051db03898a453d5fdca42f108ab9ba6557e0045d158d05506a3702bb5be2bf2f6e0a667f675c5b28fe86da7b3a81262c175289f5b2ab5d55541ad2f70518

                                        • C:\Windows\ehome\ehrecvr.exe

                                          Filesize

                                          1.2MB

                                          MD5

                                          7dc6bbedde0b2ba3d3de8ecc70970f80

                                          SHA1

                                          abe8413c6257ef9898fd5924ee78311f93a78623

                                          SHA256

                                          afb8d71441220ed5bd06374599891576479e51392e5b67eb9304ed84c3390251

                                          SHA512

                                          e9e6ae35374f69be4f284251a362d8779cbdd1f554f8e17d57f6da207ddfcd536442999d21defa5678076c6e27f7e737023110972fceb100526bde213c47afab

                                        • \Program Files\Windows Media Player\wmpnetwk.exe

                                          Filesize

                                          2.0MB

                                          MD5

                                          c1af17e93281c40285539ef08381e36b

                                          SHA1

                                          64e08073677adf7f058769c4530e6c0ce7b4edd9

                                          SHA256

                                          35d2072fd4b99ea6c8813d6eeb0c5a017a99f10dff6d627ff9cd34ebd7750937

                                          SHA512

                                          07dab5922abdf2b86ae347a24cbef60e3a9151c22b3481274cbe630024280827b6fecc453bf060822c768afd791896ce3a5387a86154214907d0d96151ccec1d

                                        • \Windows\System32\Locator.exe

                                          Filesize

                                          1.2MB

                                          MD5

                                          86799817fb0e0fd83a94a8b321330150

                                          SHA1

                                          154f40f0b4f78fb6e5dfa3696f164ad113261723

                                          SHA256

                                          8457563a1a43b756d7788288f79d4bad2ce1da92f8c2ab78b878f7719ecdc9fe

                                          SHA512

                                          896f49e45dc8bebf10eba8aea59f9aa3ddd3277739bde4a318394104c10979e0040da36fd76f2779baced4c0dc78414fd5882c1113146cd56fcf18045e64d5dd

                                        • \Windows\System32\alg.exe

                                          Filesize

                                          1.3MB

                                          MD5

                                          9b8c4cb7ea2db07d85d3b50cbcd0f873

                                          SHA1

                                          e7ad726e1c6d38d4737439654bd99c3043aff08d

                                          SHA256

                                          9645356a70076b24a38ab8ce2cf4968d2af42cc025b68437a17acfb5de7e0324

                                          SHA512

                                          3ebe408e7972606d776f12d4a615145eb0f50fe3ede5808638c25c028af499bb704801aaabb7fb5de212d43bc295b2ded83b432c0687f3000da1445c46037b47

                                        • \Windows\System32\ieetwcollector.exe

                                          Filesize

                                          1.3MB

                                          MD5

                                          cc941201f101de02f61cae364082442e

                                          SHA1

                                          41399c9f896cf51ffe15598c979ddc60125cc7ee

                                          SHA256

                                          5fa5c54bd6c43a8e54013f2ca1afdec786747872bd03d3a80be8455288c816ed

                                          SHA512

                                          f650effd3ea4302ef4d3fcf0d9fbdb7a14b06a9c3179cc0282ee31d4bf054f8929515801807e7fd0ea9e9bff6f889ebf2c081c7b5c51305da3fb1eb1d751efd7

                                        • \Windows\System32\msdtc.exe

                                          Filesize

                                          1.3MB

                                          MD5

                                          bb2125266f02990cdcb6e015326dfffd

                                          SHA1

                                          7690c6abc802905bbb476048cd1ea839d6c6c758

                                          SHA256

                                          f25506188b7e3a9c62820791ba7aea96784d6c1b0cb46b878ad0063c4d3e97e0

                                          SHA512

                                          498d4730c9d845326790f89966582dbceaf759840ec5c3ffbecab1d93e44a158d72e8f0a6570fb16289438f9362a4819008264522cb59e81ddf734db1483bb5b

                                        • \Windows\System32\msiexec.exe

                                          Filesize

                                          1.3MB

                                          MD5

                                          ad2ce9e6a298bbb1a5686bdba84a18e7

                                          SHA1

                                          60e8b4ec169d46d7ae4358fedfa850ebfc4cb84a

                                          SHA256

                                          d6949752d1c6e3d63a4a43e40aa7f91ab0634474809925aa9da20225963346d5

                                          SHA512

                                          4417826243de7b5ceb96b90d1dc51fa46cd58ad74aa9259c00555aa95de2959bd9396984a9c05199936d0f00ccfeda01150ffb679de986e02751c0a57df868c3

                                        • \Windows\System32\snmptrap.exe

                                          Filesize

                                          1.2MB

                                          MD5

                                          92049cbc0903ab6a68e724874bccc5e3

                                          SHA1

                                          69aaf90f17ad7c518dca719bd6c9851d094432f7

                                          SHA256

                                          6ba66af30c6bde33a15575831127e3246147e1fee010d56964f443f17feb6b8d

                                          SHA512

                                          f76a5e598ecfb03ef55ebbb4bcc62e32fe6de0e1e39789414ef0e0b426d230e3090d564182878568828718fad12da5386ce69148c8cee97640005128ca1d260a

                                        • \Windows\System32\wbem\WmiApSrv.exe

                                          Filesize

                                          1.4MB

                                          MD5

                                          30e127f36f8f9c6c9ab65c3d7fbe054e

                                          SHA1

                                          afd4017e8b27cfea6172080a79ba89e385f1f800

                                          SHA256

                                          73ba8eaf8c96b5b212f37b149450a0c6f03eea106c7d46c44008762ce244fde6

                                          SHA512

                                          4dd2e6d7970b07d12fb1a72c979542aea6282c298cc4bb865c12bbb858f64ac644be9380cbc45aaf082e9c52373f3828b6e1ddc34ccd76620cf134676ee84788

                                        • \Windows\ehome\ehsched.exe

                                          Filesize

                                          1.3MB

                                          MD5

                                          37b2576f53532fea18d61463736ceca5

                                          SHA1

                                          4a510a9b54f8a3b2b11ce1f3674a3755288eb852

                                          SHA256

                                          414ae74f29ee84c8406039d435f8402691b124f078d65de7c5f04d0bb4750044

                                          SHA512

                                          bfe9ac1a9b3ed415b646a9746a2481b85d3a12b5b76de77d241abf58c62b3e4e080479210f7bdc5231e7904673bcca3fb033e050511d0f81f333c4257521ad8b

                                        • memory/640-212-0x0000000140000000-0x0000000140209000-memory.dmp

                                          Filesize

                                          2.0MB

                                        • memory/640-185-0x0000000140000000-0x0000000140209000-memory.dmp

                                          Filesize

                                          2.0MB

                                        • memory/640-193-0x0000000000FC0000-0x0000000001020000-memory.dmp

                                          Filesize

                                          384KB

                                        • memory/640-213-0x0000000000FC0000-0x0000000001020000-memory.dmp

                                          Filesize

                                          384KB

                                        • memory/944-322-0x0000000100000000-0x0000000100219000-memory.dmp

                                          Filesize

                                          2.1MB

                                        • memory/1420-288-0x0000000000230000-0x0000000000297000-memory.dmp

                                          Filesize

                                          412KB

                                        • memory/1420-287-0x0000000001000000-0x00000000011D5000-memory.dmp

                                          Filesize

                                          1.8MB

                                        • memory/1472-165-0x0000000000170000-0x00000000001D0000-memory.dmp

                                          Filesize

                                          384KB

                                        • memory/1472-158-0x0000000140000000-0x00000001401ED000-memory.dmp

                                          Filesize

                                          1.9MB

                                        • memory/1472-296-0x0000000140000000-0x00000001401ED000-memory.dmp

                                          Filesize

                                          1.9MB

                                        • memory/1744-304-0x00000000003C0000-0x0000000000420000-memory.dmp

                                          Filesize

                                          384KB

                                        • memory/1744-298-0x0000000100000000-0x00000001001D5000-memory.dmp

                                          Filesize

                                          1.8MB

                                        • memory/1792-266-0x000007FEF4340000-0x000007FEF4CDD000-memory.dmp

                                          Filesize

                                          9.6MB

                                        • memory/1792-267-0x0000000000DE0000-0x0000000000E60000-memory.dmp

                                          Filesize

                                          512KB

                                        • memory/1916-291-0x0000000100000000-0x00000001001D4000-memory.dmp

                                          Filesize

                                          1.8MB

                                        • memory/1916-292-0x0000000000460000-0x00000000004C0000-memory.dmp

                                          Filesize

                                          384KB

                                        • memory/1936-147-0x00000000001E0000-0x0000000000240000-memory.dmp

                                          Filesize

                                          384KB

                                        • memory/1936-207-0x0000000140000000-0x0000000140237000-memory.dmp

                                          Filesize

                                          2.2MB

                                        • memory/1936-141-0x0000000140000000-0x0000000140237000-memory.dmp

                                          Filesize

                                          2.2MB

                                        • memory/2116-178-0x0000000140000000-0x000000014013C000-memory.dmp

                                          Filesize

                                          1.2MB

                                        • memory/2116-110-0x0000000000AB0000-0x0000000000B10000-memory.dmp

                                          Filesize

                                          384KB

                                        • memory/2116-153-0x0000000001A30000-0x0000000001A31000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/2116-119-0x0000000000AB0000-0x0000000000B10000-memory.dmp

                                          Filesize

                                          384KB

                                        • memory/2116-289-0x0000000001A30000-0x0000000001A31000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/2116-113-0x0000000140000000-0x000000014013C000-memory.dmp

                                          Filesize

                                          1.2MB

                                        • memory/2192-1-0x0000000001EC0000-0x0000000001F27000-memory.dmp

                                          Filesize

                                          412KB

                                        • memory/2192-0-0x0000000000400000-0x00000000005F5000-memory.dmp

                                          Filesize

                                          2.0MB

                                        • memory/2192-7-0x0000000001EC0000-0x0000000001F27000-memory.dmp

                                          Filesize

                                          412KB

                                        • memory/2192-6-0x0000000001EC0000-0x0000000001F27000-memory.dmp

                                          Filesize

                                          412KB

                                        • memory/2192-73-0x0000000000400000-0x00000000005F5000-memory.dmp

                                          Filesize

                                          2.0MB

                                        • memory/2196-19-0x0000000000850000-0x00000000008B0000-memory.dmp

                                          Filesize

                                          384KB

                                        • memory/2196-14-0x0000000100000000-0x00000001001E3000-memory.dmp

                                          Filesize

                                          1.9MB

                                        • memory/2196-12-0x0000000000850000-0x00000000008B0000-memory.dmp

                                          Filesize

                                          384KB

                                        • memory/2196-91-0x0000000100000000-0x00000001001E3000-memory.dmp

                                          Filesize

                                          1.9MB

                                        • memory/2196-20-0x0000000000850000-0x00000000008B0000-memory.dmp

                                          Filesize

                                          384KB

                                        • memory/2268-164-0x0000000140000000-0x00000001401ED000-memory.dmp

                                          Filesize

                                          1.9MB

                                        • memory/2268-94-0x0000000140000000-0x00000001401ED000-memory.dmp

                                          Filesize

                                          1.9MB

                                        • memory/2268-90-0x00000000001E0000-0x0000000000240000-memory.dmp

                                          Filesize

                                          384KB

                                        • memory/2268-99-0x00000000001E0000-0x0000000000240000-memory.dmp

                                          Filesize

                                          384KB

                                        • memory/2268-98-0x00000000001E0000-0x0000000000240000-memory.dmp

                                          Filesize

                                          384KB

                                        • memory/2288-282-0x0000000000660000-0x00000000006C7000-memory.dmp

                                          Filesize

                                          412KB

                                        • memory/2288-280-0x0000000000400000-0x00000000005E7000-memory.dmp

                                          Filesize

                                          1.9MB

                                        • memory/2416-60-0x0000000000210000-0x0000000000270000-memory.dmp

                                          Filesize

                                          384KB

                                        • memory/2416-139-0x0000000010000000-0x00000000101E6000-memory.dmp

                                          Filesize

                                          1.9MB

                                        • memory/2416-53-0x0000000010000000-0x00000000101E6000-memory.dmp

                                          Filesize

                                          1.9MB

                                        • memory/2416-52-0x0000000000210000-0x0000000000270000-memory.dmp

                                          Filesize

                                          384KB

                                        • memory/2444-152-0x0000000000400000-0x00000000005E7000-memory.dmp

                                          Filesize

                                          1.9MB

                                        • memory/2444-76-0x0000000000400000-0x00000000005E7000-memory.dmp

                                          Filesize

                                          1.9MB

                                        • memory/2444-79-0x00000000005F0000-0x0000000000657000-memory.dmp

                                          Filesize

                                          412KB

                                        • memory/2444-72-0x00000000005F0000-0x0000000000657000-memory.dmp

                                          Filesize

                                          412KB

                                        • memory/2564-44-0x00000000002A0000-0x0000000000307000-memory.dmp

                                          Filesize

                                          412KB

                                        • memory/2564-85-0x0000000010000000-0x00000000101DE000-memory.dmp

                                          Filesize

                                          1.9MB

                                        • memory/2564-38-0x00000000002A0000-0x0000000000307000-memory.dmp

                                          Filesize

                                          412KB

                                        • memory/2564-39-0x0000000010000000-0x00000000101DE000-memory.dmp

                                          Filesize

                                          1.9MB

                                        • memory/2592-276-0x000000002E000000-0x000000002E1F4000-memory.dmp

                                          Filesize

                                          2.0MB

                                        • memory/2592-278-0x0000000000310000-0x0000000000377000-memory.dmp

                                          Filesize

                                          412KB

                                        • memory/2600-34-0x0000000000200000-0x0000000000260000-memory.dmp

                                          Filesize

                                          384KB

                                        • memory/2600-27-0x0000000140000000-0x00000001401DC000-memory.dmp

                                          Filesize

                                          1.9MB

                                        • memory/2600-111-0x0000000140000000-0x00000001401DC000-memory.dmp

                                          Filesize

                                          1.9MB

                                        • memory/2600-26-0x0000000000200000-0x0000000000260000-memory.dmp

                                          Filesize

                                          384KB

                                        • memory/2796-318-0x0000000000CB0000-0x0000000000D10000-memory.dmp

                                          Filesize

                                          384KB

                                        • memory/2796-314-0x0000000100000000-0x0000000100253000-memory.dmp

                                          Filesize

                                          2.3MB

                                        • memory/2816-271-0x00000000005B0000-0x00000000007A1000-memory.dmp

                                          Filesize

                                          1.9MB

                                        • memory/2816-273-0x00000000003C0000-0x0000000000420000-memory.dmp

                                          Filesize

                                          384KB

                                        • memory/2816-290-0x0000000100000000-0x00000001001F1000-memory.dmp

                                          Filesize

                                          1.9MB

                                        • memory/2840-191-0x0000000140000000-0x00000001401F1000-memory.dmp

                                          Filesize

                                          1.9MB

                                        • memory/2840-126-0x0000000140000000-0x00000001401F1000-memory.dmp

                                          Filesize

                                          1.9MB

                                        • memory/2840-133-0x0000000000B90000-0x0000000000BF0000-memory.dmp

                                          Filesize

                                          384KB

                                        • memory/2888-331-0x0000000140000000-0x00000001401F5000-memory.dmp

                                          Filesize

                                          2.0MB

                                        • memory/2888-208-0x0000000000A80000-0x0000000000AE0000-memory.dmp

                                          Filesize

                                          384KB

                                        • memory/2888-199-0x0000000140000000-0x00000001401F5000-memory.dmp

                                          Filesize

                                          2.0MB

                                        • memory/3052-286-0x0000000000840000-0x00000000008A0000-memory.dmp

                                          Filesize

                                          384KB

                                        • memory/3052-284-0x0000000100000000-0x0000000100542000-memory.dmp

                                          Filesize

                                          5.3MB

                                        • memory/3052-323-0x0000000073708000-0x000000007371D000-memory.dmp

                                          Filesize

                                          84KB

                                        • memory/3064-170-0x000000002E000000-0x000000002FE1E000-memory.dmp

                                          Filesize

                                          30.1MB

                                        • memory/3064-311-0x000000002E000000-0x000000002FE1E000-memory.dmp

                                          Filesize

                                          30.1MB

                                        • memory/3064-180-0x00000000002B0000-0x0000000000317000-memory.dmp

                                          Filesize

                                          412KB