Analysis

  • max time kernel
    62s
  • max time network
    157s
  • platform
    windows7_x64
  • resource
    win7-20240319-en
  • resource tags

    arch:x64arch:x86image:win7-20240319-enlocale:en-usos:windows7-x64system
  • submitted
    19-04-2024 01:14

General

  • Target

    2024-04-19_f528d0f5614ea8af232a7269a490e662_magniber_revil_zxxz.exe

  • Size

    24.3MB

  • MD5

    f528d0f5614ea8af232a7269a490e662

  • SHA1

    4862934c57bc3124a43699249d7fe7cc54ae7f24

  • SHA256

    e03bb3bdb16627b6cd7237ce7f357dc8affb40f43beb0c4d6b844009f83e01bf

  • SHA512

    52ddbb0010eef2db7c40bdcff00e5d5c7eb3536e94556fb42cb946a075ec43de427ede721eb2d966b8e72b4d2358624a8a6d58261a2c71dbd6d5cecbb95f78c1

  • SSDEEP

    196608:CP0Hj6JigboXZDwqY8a/qVwsEXX1KOgCu3JK1Op3H2SAmGcWqnlv0189nU:CPboGX8a/jWWu3cI2D/cWcls1mU

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 32 IoCs
  • Loads dropped DLL 15 IoCs
  • Drops file in System32 directory 17 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 28 IoCs
  • Modifies data under HKEY_USERS 38 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 26 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-19_f528d0f5614ea8af232a7269a490e662_magniber_revil_zxxz.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-19_f528d0f5614ea8af232a7269a490e662_magniber_revil_zxxz.exe"
    1⤵
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:1376
  • C:\Windows\System32\alg.exe
    C:\Windows\System32\alg.exe
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    PID:2736
  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe
    C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe
    1⤵
    • Executes dropped EXE
    PID:2664
  • C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe
    C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe
    1⤵
    • Executes dropped EXE
    • Drops file in Windows directory
    PID:2916
  • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe
    C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe
    1⤵
    • Executes dropped EXE
    • Drops file in Windows directory
    PID:2516
  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
    C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
    1⤵
    • Executes dropped EXE
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:296
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1e8 -InterruptEvent 1d4 -NGENProcess 1d8 -Pipe 1e4 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2136
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 258 -InterruptEvent 1d4 -NGENProcess 1d8 -Pipe 1e8 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:288
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1d4 -InterruptEvent 25c -NGENProcess 24c -Pipe 248 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:1612
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 25c -InterruptEvent 264 -NGENProcess 23c -Pipe 260 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2944
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 264 -InterruptEvent 26c -NGENProcess 240 -Pipe 268 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:1412
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 26c -InterruptEvent 274 -NGENProcess 1f0 -Pipe 270 -Comment "NGen Worker Process"
      2⤵
        PID:2596
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1d8 -InterruptEvent 184 -NGENProcess 1ac -Pipe 27c -Comment "NGen Worker Process"
        2⤵
          PID:2728
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
          C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1ac -InterruptEvent 278 -NGENProcess 1d8 -Pipe 184 -Comment "NGen Worker Process"
          2⤵
            PID:2744
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
            C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 278 -InterruptEvent 284 -NGENProcess 26c -Pipe 280 -Comment "NGen Worker Process"
            2⤵
              PID:572
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
              C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 278 -InterruptEvent 210 -NGENProcess 1ac -Pipe 24c -Comment "NGen Worker Process"
              2⤵
                PID:2376
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 284 -InterruptEvent 244 -NGENProcess 210 -Pipe 208 -Comment "NGen Worker Process"
                2⤵
                  PID:1584
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                  C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 244 -InterruptEvent 1d8 -NGENProcess 28c -Pipe 26c -Comment "NGen Worker Process"
                  2⤵
                    PID:1592
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                    C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1d8 -InterruptEvent 294 -NGENProcess 274 -Pipe 290 -Comment "NGen Worker Process"
                    2⤵
                      PID:2568
                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1ac -InterruptEvent 278 -NGENProcess 284 -Pipe 29c -Comment "NGen Worker Process"
                      2⤵
                        PID:2552
                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1ac -InterruptEvent 25c -NGENProcess 244 -Pipe 298 -Comment "NGen Worker Process"
                        2⤵
                          PID:2212
                      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
                        C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
                        1⤵
                        • Executes dropped EXE
                        • Drops file in Windows directory
                        • Suspicious use of AdjustPrivilegeToken
                        PID:1960
                      • C:\Windows\system32\dllhost.exe
                        C:\Windows\system32\dllhost.exe /Processid:{02D4B3F1-FD88-11D1-960D-00805FC79235}
                        1⤵
                        • Executes dropped EXE
                        • Drops file in Windows directory
                        PID:2176
                      • C:\Windows\ehome\ehRecvr.exe
                        C:\Windows\ehome\ehRecvr.exe
                        1⤵
                        • Executes dropped EXE
                        • Modifies data under HKEY_USERS
                        PID:2652
                      • C:\Windows\ehome\ehsched.exe
                        C:\Windows\ehome\ehsched.exe
                        1⤵
                        • Executes dropped EXE
                        PID:2596
                      • C:\Windows\eHome\EhTray.exe
                        "C:\Windows\eHome\EhTray.exe" /nav:-2
                        1⤵
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of FindShellTrayWindow
                        • Suspicious use of SendNotifyMessage
                        PID:1680
                      • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                        "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                        1⤵
                        • Executes dropped EXE
                        PID:540
                      • C:\Windows\ehome\ehRec.exe
                        C:\Windows\ehome\ehRec.exe -Embedding
                        1⤵
                        • Modifies data under HKEY_USERS
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:616
                      • C:\Windows\system32\IEEtwCollector.exe
                        C:\Windows\system32\IEEtwCollector.exe /V
                        1⤵
                        • Executes dropped EXE
                        PID:1480
                      • C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE
                        "C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE" /auditservice
                        1⤵
                        • Executes dropped EXE
                        • Drops file in System32 directory
                        • Modifies data under HKEY_USERS
                        PID:1676
                      • C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe
                        "C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"
                        1⤵
                        • Executes dropped EXE
                        PID:2984
                      • C:\Windows\System32\msdtc.exe
                        C:\Windows\System32\msdtc.exe
                        1⤵
                        • Executes dropped EXE
                        • Drops file in System32 directory
                        • Drops file in Windows directory
                        PID:2472
                      • C:\Windows\system32\msiexec.exe
                        C:\Windows\system32\msiexec.exe /V
                        1⤵
                        • Executes dropped EXE
                        • Loads dropped DLL
                        • Suspicious use of AdjustPrivilegeToken
                        PID:916
                      • C:\Program Files (x86)\Common Files\Microsoft Shared\Source Engine\OSE.EXE
                        "C:\Program Files (x86)\Common Files\Microsoft Shared\Source Engine\OSE.EXE"
                        1⤵
                        • Executes dropped EXE
                        PID:2840
                      • C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE
                        "C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"
                        1⤵
                        • Executes dropped EXE
                        PID:2288
                      • C:\Windows\SysWow64\perfhost.exe
                        C:\Windows\SysWow64\perfhost.exe
                        1⤵
                        • Executes dropped EXE
                        PID:2400
                      • C:\Windows\system32\locator.exe
                        C:\Windows\system32\locator.exe
                        1⤵
                        • Executes dropped EXE
                        PID:3064
                      • C:\Windows\System32\snmptrap.exe
                        C:\Windows\System32\snmptrap.exe
                        1⤵
                        • Executes dropped EXE
                        PID:1484
                      • C:\Windows\System32\vds.exe
                        C:\Windows\System32\vds.exe
                        1⤵
                        • Executes dropped EXE
                        PID:1084
                      • C:\Windows\system32\vssvc.exe
                        C:\Windows\system32\vssvc.exe
                        1⤵
                        • Executes dropped EXE
                        • Suspicious use of AdjustPrivilegeToken
                        PID:1748
                      • C:\Windows\system32\wbengine.exe
                        "C:\Windows\system32\wbengine.exe"
                        1⤵
                        • Executes dropped EXE
                        • Suspicious use of AdjustPrivilegeToken
                        PID:1644
                      • C:\Windows\system32\wbem\WmiApSrv.exe
                        C:\Windows\system32\wbem\WmiApSrv.exe
                        1⤵
                        • Executes dropped EXE
                        PID:2448
                      • C:\Program Files\Windows Media Player\wmpnetwk.exe
                        "C:\Program Files\Windows Media Player\wmpnetwk.exe"
                        1⤵
                        • Executes dropped EXE
                        • Modifies data under HKEY_USERS
                        PID:2588
                      • C:\Windows\system32\SearchIndexer.exe
                        C:\Windows\system32\SearchIndexer.exe /Embedding
                        1⤵
                        • Executes dropped EXE
                        • Modifies data under HKEY_USERS
                        • Suspicious use of AdjustPrivilegeToken
                        PID:2040
                        • C:\Windows\system32\SearchProtocolHost.exe
                          "C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe_S-1-5-21-2610426812-2871295383-373749122-10001_ Global\UsGthrCtrlFltPipeMssGthrPipe_S-1-5-21-2610426812-2871295383-373749122-10001 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon" "1"
                          2⤵
                            PID:2784
                          • C:\Windows\system32\SearchFilterHost.exe
                            "C:\Windows\system32\SearchFilterHost.exe" 0 588 592 600 65536 596
                            2⤵
                              PID:1952
                            • C:\Windows\system32\SearchProtocolHost.exe
                              "C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe2_ Global\UsGthrCtrlFltPipeMssGthrPipe2 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon"
                              2⤵
                                PID:1568

                            Network

                            MITRE ATT&CK Enterprise v15

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\Program Files (x86)\Common Files\microsoft shared\Source Engine\OSE.EXE

                              Filesize

                              1.3MB

                              MD5

                              8222c1a1bc3b3bfcecc5840069988402

                              SHA1

                              b67bd8af6b8c7bb27912134c2240678f89e1b3c8

                              SHA256

                              1938508312b73ab5ae83e9e7d7c691d4cf43f841d2ac1ed8a603cf73b6dee2ae

                              SHA512

                              36cb9668cb54625db808c9590bd31ac8580cebf4615e30773b6ecc12924991b3e8e68f5a518cf37c5dc004c966ace161e06372356b2dba93aca4e02044c9a38e

                            • C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE

                              Filesize

                              30.1MB

                              MD5

                              273931c4f551c05c27b85acc3b2a6050

                              SHA1

                              11b613a9f6e85034bfcbb5cd3a6db6b5a478c79b

                              SHA256

                              e3e7e679c0098e6f7d06696c6ef1b915204d11502db3c75c897be3a0e218e2fb

                              SHA512

                              88039a1a1e7fd6df00c9d8f8932b9a11f2361dfc5d2748810053956781c45c4ec4c09ac3cf05623df9c172340f227d2ecb4e01fcf6665525eda146d858a513d5

                            • C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe

                              Filesize

                              1.3MB

                              MD5

                              86549468af4ad52c8f9576afbae18a4f

                              SHA1

                              51536e631fcf340bfecc87e637bf576ab8bc3a0c

                              SHA256

                              199ba53697c8926b5c2de13120f4f4a3fcb76adba58304e5ba418a84b23a75c6

                              SHA512

                              45662402e169f7d442207eb17981f9f445c8ed6d7332649f80ef91dc499e3374335c463df1a062ff5728a8c3de279e7e36a2f408fc23e92e1cabd24df1114284

                            • C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE

                              Filesize

                              5.2MB

                              MD5

                              12e03debe37ea2974ff403981fdfad9a

                              SHA1

                              11b4d329db47d86e6674845dfc33000f2d15389c

                              SHA256

                              0d344182b3b6a089f6a86ad3840b10f10639f61a50ac5364df8e2574bc86af18

                              SHA512

                              56184ee2eb18ba01b77c1f41f7ef1e64df6cbe6308ce7be9d0a9d37d5750df365db280c95314907d5caf2eeb3b501610d10672851a36b1940768190bf325f238

                            • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe

                              Filesize

                              2.1MB

                              MD5

                              f01bc0443f042e788a832dbbb75074e1

                              SHA1

                              5f3bf4d6aac3349aea9ae35a01c7104baf829c55

                              SHA256

                              f34555cfe7f735cedf855028f6e9083e1197d2d0bff941bbfdf98867644c7408

                              SHA512

                              f255fa7109ab96774fd5c79d0a3d7e27878f05d17dacb3abff714cb1b1d9d1d92a6d0c8c3de2f15a06594eb90a3a4041fc6aaa9d5570a6de9a337e3d4bf32cd1

                            • C:\Program Files\Windows Media Player\wmpnetwk.exe

                              Filesize

                              2.0MB

                              MD5

                              e4aa20a1cf1ee218d0a146000ee39548

                              SHA1

                              534c28d8cf1b50a0cd8c2fd2f30cccb949babfbd

                              SHA256

                              f85b95c1eb8cdc1202d63bd0950caf2e8f614da2c09cdda7ea6eb76f708a2801

                              SHA512

                              97843d04dfac50a6106d3f2efc46f19011f758f3adcb4dbe864ef278a50d875024a15f0f340f555352bcd5947ac10fe85e7e9645438c5b52eb74176a318f79ca

                            • C:\ProgramData\Microsoft\Search\Data\Applications\Windows\MSS.log

                              Filesize

                              1024KB

                              MD5

                              14349ce1846fccf7830f06c7b606ea7e

                              SHA1

                              20fcec01f71a77e84b5b7052e2acb8d87616faef

                              SHA256

                              932c5198814c1de31e2754b3e57aa12ee72b99dafce3b331f7a2efa659201b04

                              SHA512

                              0c3df92a9f054f6c38abdc2da475a76d7185bb591c6679fd287cacfeb493a42dccadf009041c870472c7efb2b253a049d20eb0b9e1ddcbaf6649054532637fc4

                            • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ngen_service.log

                              Filesize

                              872KB

                              MD5

                              cd30ad4f1a30fd1db54fc46d3f6def73

                              SHA1

                              fcba7714a11c0071dc6bb86f0f8a82a2dcf17cbd

                              SHA256

                              5aabb6d4392ff93e321d56ebeb92c3f53c619464074b22764dfc246496a5efc7

                              SHA512

                              2c4c237352badac25d0bb3d1d2822fa661a4b63cc033ecf245c5965abc6e60984313174437e9fadc164824510fd2b7b1e2e4cbb5025951746fd7cd0f85bf4c87

                            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe

                              Filesize

                              1.2MB

                              MD5

                              1c37c85075415c060f00916fa3c0864d

                              SHA1

                              ae5c73444a5a2a14b8cce6375bb8edf34b925600

                              SHA256

                              8b288542eb88c4e7b957712ffe05a031a8aaf87387e07cbb48a4dd2aa7c87a89

                              SHA512

                              be78dd40c4c7c0be98f942dcdcf01c7dea84499d7a70040bb59435837309ef5cb04c89519924b11064c7b16ed8bc7f84f2b1f303847f2361db9b21eddff137d4

                            • C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe

                              Filesize

                              1.2MB

                              MD5

                              ba9a5bd7a8d5199792cb8f1607bd78fc

                              SHA1

                              88f4f979a0632c6c5ebf9a4332979f8f2dcd28e4

                              SHA256

                              ae58c7902aa6371728a2763cae462dee8d2ec7b5180041d83b9b6195d808de09

                              SHA512

                              4bad81683916caafc650c6278aa3a08e02f7f2a4e53089677f763cbedf9c6a31bd9347515b2f6641f6f47a2a9fb4dd88bda60658a6043d686df03431787af96f

                            • C:\Windows\Microsoft.NET\Framework\v2.0.50727\ngen_service.log

                              Filesize

                              1003KB

                              MD5

                              3402c55cd5cee99650a2e1b24f81667b

                              SHA1

                              83e7e4e361b54846eb23eb2e2f8e8eb986a6336d

                              SHA256

                              fef98b46631289398e2d16f0bb9632bd6a92e0a0e58efcabe76c50f9f0218574

                              SHA512

                              1a0fda15084e726bc4d880747e4879d102d30b6e51fe4448d42cae9dae05672e096680769ba048ba5baa1b058ccdb771bdd845646b2585badd030406fb474918

                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe

                              Filesize

                              1.2MB

                              MD5

                              59663cadefc5b5ebb15eff5f6eec31ac

                              SHA1

                              2ee7337a829a70cf356c5e3881f38f2ac5e8de2c

                              SHA256

                              91a4afc211af4d6461caafe257be17aa6d814e057afccfd6f0f95e41d05ed0a8

                              SHA512

                              5d943a57a3b149ab112b2e2932192b5e23308e186dd4f366fe6f168e6164039ce8fd9e91f8e179acbae0ec7c36c3085a5b97d5dfc8618861e659ce798d1ed8e7

                            • C:\Windows\SysWOW64\perfhost.exe

                              Filesize

                              1.2MB

                              MD5

                              7abec56806da4962febc57e5a0d7f855

                              SHA1

                              018a8c0bcd05a8ba73640e59b02a4bc4ad2311a5

                              SHA256

                              5daec7423927c24fc696b49b0f362f2b7bfb39cd5016b1411a892649755ecbc3

                              SHA512

                              aa0813499817692c559e7e91b4a44c7e5a0b66e367816ee31b530c2a7da8a8bd9c6ee22e199aabbc1de8ecd387647d8b0d9efba7ce3cc946950202c1fce047c6

                            • C:\Windows\System32\SearchIndexer.exe

                              Filesize

                              1.1MB

                              MD5

                              50979c769e016ef5a44abdf9b98722ab

                              SHA1

                              9631a72d4381f9ddf0b03186168cfe17a69da16d

                              SHA256

                              1eed275e6955f73547069782de11f411ab35721b611196cc823fdd0a3b48c7b8

                              SHA512

                              355e19e4085f22c2a3abb74f48eb1ead99cc373d163ff223d0c3a619df2a35c0ea040b282fb4dfa91b9b2cd82bcfc6c07aab44448f6314c2a85bbde6cba8cdd4

                            • C:\Windows\System32\VSSVC.exe

                              Filesize

                              2.1MB

                              MD5

                              d68c07d2f1f96c63d121921f6033c269

                              SHA1

                              f255dc1a99e669877e1a7ac1c4acfa430c7bc5a6

                              SHA256

                              40c1fd94c94862ca7de96cb53e16a015e91946616bb16e9b1121e642eb36a792

                              SHA512

                              596e7d61ac14e59e968d64ed63fcc1667c12c8e2125e2180cba9a752b1010cedbbc7496ddf1d6be08218bdff2aa316f1ae7d690e58cbef17769b5785ed61172a

                            • C:\Windows\System32\alg.exe

                              Filesize

                              1.2MB

                              MD5

                              4ef512f7fae5249c7ce6a54a7339f7cf

                              SHA1

                              aa0ec1f67ec83e624c82f40d46d6eedd389cfe36

                              SHA256

                              9cc0846ac6c39a5733ef735787da26dcb732b9e0713d8d0a92960db491000919

                              SHA512

                              66dfe8c8d0777491c866bc09dd9dcf6610f181e6b1d81fc347bf85ad1ae8676dd79d9dab65fad3d5f616744ac77b91d0f37f5d30c19e73f793d7aebcab4258bb

                            • C:\Windows\System32\dllhost.exe

                              Filesize

                              1.1MB

                              MD5

                              9fbe93ef540d266f215a48fc6dbdecc4

                              SHA1

                              f96392d3e6b2a3ee90c813328197171579b90894

                              SHA256

                              55e693d5235288884dc8be3dada61fc34d229bc985d6d311bb3fe6d3fbd67817

                              SHA512

                              35030da193678918ba1c1066596d9a062ccfda372ff52a76cd94e4cc75c1f47b7709aed55323bc7e7689cb21bc2e61b2a5de235600e352cffe9442853d5cb36e

                            • C:\Windows\System32\msiexec.exe

                              Filesize

                              1.3MB

                              MD5

                              a8670d30dc51644beb404bcd352e8b16

                              SHA1

                              eb3b5da33d68f0fb1d568299eee258f32b8f15f9

                              SHA256

                              bcab4525dbbf9d711e7565c2758e66ddee344e3a6b39af34185840731e8b1169

                              SHA512

                              b30e1b2ae9bcb15eff7733abe0766dd150eea6443baebe3b6159c240458b1b623a5360e0b7904be77267b8a29ff9f0833acf89f13264488826cac1150f1650de

                            • C:\Windows\System32\vds.exe

                              Filesize

                              1.6MB

                              MD5

                              07cfe0541fd11b55b225c9001bc9a549

                              SHA1

                              a9ae376b4e5bf21d19a6ba0983318b35fa9477fe

                              SHA256

                              c3f809501a7e3de3c9d17783f20a16d41c6c49900c76119a09632eda8f90ea68

                              SHA512

                              2557e368b75d17dabaa5e13dae4f991df1f5a29fe7e63fc602012f87839efd45d9540e811049e2807db71dec3ecbb15a98a158db07d38ce60048c54f9ee829c8

                            • C:\Windows\system32\fxssvc.exe

                              Filesize

                              1.2MB

                              MD5

                              76103f5526d0b446cd7d3b5103a66483

                              SHA1

                              aee7b1348bbd7d3c0162a0e49fbf2f5b0798babb

                              SHA256

                              a274df8eed782c8307ffecc607eb9a12335fc4fec40f81fdf39ab53d7ed6c013

                              SHA512

                              822b0635e0328659f067d9dc7d59e1b9e9ce2c151de9f687a774c8d7c63697eb1b1ebd352cdd4d7ba73b36e9cb26d7095c82bf62e204e78be8a5f104504341a0

                            • \Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe

                              Filesize

                              1.2MB

                              MD5

                              c558a45dd5d84e0e1a7bba74288955b6

                              SHA1

                              2a30cae6a8e1d88d5b0d3b1c299e40f1049d231d

                              SHA256

                              f5c49911ea2a14cb9e304a46574a3ee0913a7a16c052d9c43e471e84ee15be0b

                              SHA512

                              95a2fba0728f09111e98675ba1c8d099c19f81db615c95ade497354ce09feac669039bd9148619360ccdbf089bb679907465b42caeb76005881fb7e848e7731c

                            • \Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe

                              Filesize

                              1.2MB

                              MD5

                              f3f1d2a876adbb1ad460259a0f7bcc79

                              SHA1

                              cbd39150b32f7b350afce72199cdff62f995ef4f

                              SHA256

                              aa70376a4aec26dc3e9ff7b4235dd5e195b10144ccfca28445b65800e0c0b511

                              SHA512

                              d612d2929f89f1bceafa1386bb4566f2ba8aa64cde7f5631a76efd79424a7e754ce9e9f8c88983a936fd90994c2dc478c41d87242fd5b1a4bd22f5241c808fcb

                            • \Windows\System32\Locator.exe

                              Filesize

                              1.1MB

                              MD5

                              dc64226d5969d669caf5e28848a36bac

                              SHA1

                              94025806282262c50a980b3fac62c6d76609529a

                              SHA256

                              0be1fa9d3050df9ec4f3cb0aeef7bf2823d685084880a943fc4d4d21b8dd2084

                              SHA512

                              109f3c7726bee53935431bb7f8e5af76d311531c026c778428a526c3b77b297bc9bd515ebab9f7d74e4cc013b0401e949ee0d384f860709eacd2a9f24d4750c2

                            • \Windows\System32\ieetwcollector.exe

                              Filesize

                              1.2MB

                              MD5

                              ba2fdd17da77b9ebd5d4011ec04afe5c

                              SHA1

                              df2bad4ff22c8722134342d77a689a379177c5fc

                              SHA256

                              c3398db645119fc84c8b52ffcab39e5224bb0753df9349c2d7a5e76f12b16d21

                              SHA512

                              4a846daa99bb3a7adf39a63f3e184ea8a507fbf8cb0ebfa82eeb2e8e96698ee93627ba9da3fbbfd10875dbdecc955134181be8bbb852e94437f6fb77cc6683e9

                            • \Windows\System32\msdtc.exe

                              Filesize

                              1.3MB

                              MD5

                              ac58ea6d2af2a6260d1f3715ae423602

                              SHA1

                              5dbedb8a1dccee0fc825ea2452252ccfc19f36ce

                              SHA256

                              b5d61c53e39f92f08ddf6d8a8497790923d85b8bc084f069ddf3ee005c796e57

                              SHA512

                              4fbcce106f698f500067bfa98c832359a019f7fdbdbf18899a04d4af6db7bab5562df15a984a638f04fd073fc15e4c8071b9a0c335d36d2f8e15d7ff9ceb25c2

                            • \Windows\System32\snmptrap.exe

                              Filesize

                              1.1MB

                              MD5

                              6a7376796b34534ad26d00a182e4c7ff

                              SHA1

                              1af10ecca740bc002d318fbb122f6126b66542f3

                              SHA256

                              180d5836cec4c86cf538b82ee80a9cb0076ed720e507d81e71b84ed76345bf70

                              SHA512

                              b7ab1c7bae05b46bfc4979c44b40e1e7b06b6083b4de218586ad2f6a533db7807fed984f7d0140b546138c7afc6cfdfc56bc54344a7184476008ad7599e17b90

                            • \Windows\System32\wbem\WmiApSrv.exe

                              Filesize

                              1.3MB

                              MD5

                              92011df7b5bc3f63c6150eef7f5aa5cc

                              SHA1

                              6d34142d205a1b52c6874386c9672b7b4df9061d

                              SHA256

                              96e635f30a2e7bcd315c1e7433636d5440ff82b7978718b27ccfc9615cfea6b5

                              SHA512

                              53b7d35c989667e41ecfd7879a725866c33fc079a4bccc83895f58f7cf0723dfcaccbd0544953d5f445b20ada0ade9e4412c9a2dceb9906a8081cd66ef4b6ff6

                            • \Windows\System32\wbengine.exe

                              Filesize

                              2.0MB

                              MD5

                              6e2a6ec44cff292fb2cdff6f0d0e278a

                              SHA1

                              926953f4fd81616a11d5fd4cddfd50c2ee5b337a

                              SHA256

                              1c50c2b1947d1c449e4975151b35d057b78cc6a96deaa18d3430a5e8fa127d97

                              SHA512

                              4409193ab2edb679cafe58c3a281ce34f0c880c4d2e15e27bd71cfee0e324ffb3167de5a41f13678789ae37a32d165708b3f07fcf2724d06f9c08ed2d554b29d

                            • \Windows\ehome\ehrecvr.exe

                              Filesize

                              1.2MB

                              MD5

                              eb9c5d90d601ee3614d1a887b26f9747

                              SHA1

                              fdc81fc855876d1a69dda1ddb493b7a58d7971da

                              SHA256

                              d6cd1ed0be98e73dd7ae3e099d229d80a12e2665a701000f4802647e502fe1ed

                              SHA512

                              c9850202d8c7776d8bbfeb6822f788260a8a4b9cf8d606f3fd9bf775035139a85686af025529bf89726b06b41c745f9c68957e8b4706afed5ba3f7e0f8971d99

                            • \Windows\ehome\ehsched.exe

                              Filesize

                              1.3MB

                              MD5

                              48661e457ab8496d348f47f9cbeded3b

                              SHA1

                              7ad6305b61b7ba0465c1e9034707e22de8513eee

                              SHA256

                              dbcba8b6e89a86ab06e24aebbf79586f36ee74a78f1526463ce7be25bbafca37

                              SHA512

                              819feb6cb2be1815f8da0fb48bfd6708ef7f3d3d9ca56628fa1cc3f309b621a1d272fa7610ff44eb01ff8220bc831f4caca43f99f4f89e44f9245f853c0c3614

                            • memory/288-288-0x0000000000400000-0x000000000053C000-memory.dmp

                              Filesize

                              1.2MB

                            • memory/288-276-0x0000000073710000-0x0000000073DFE000-memory.dmp

                              Filesize

                              6.9MB

                            • memory/288-262-0x0000000000620000-0x0000000000687000-memory.dmp

                              Filesize

                              412KB

                            • memory/288-249-0x0000000000400000-0x000000000053C000-memory.dmp

                              Filesize

                              1.2MB

                            • memory/288-289-0x0000000073710000-0x0000000073DFE000-memory.dmp

                              Filesize

                              6.9MB

                            • memory/296-79-0x0000000000230000-0x0000000000297000-memory.dmp

                              Filesize

                              412KB

                            • memory/296-151-0x0000000000400000-0x000000000053C000-memory.dmp

                              Filesize

                              1.2MB

                            • memory/296-80-0x0000000000230000-0x0000000000297000-memory.dmp

                              Filesize

                              412KB

                            • memory/296-74-0x0000000000230000-0x0000000000297000-memory.dmp

                              Filesize

                              412KB

                            • memory/296-73-0x0000000000400000-0x000000000053C000-memory.dmp

                              Filesize

                              1.2MB

                            • memory/540-236-0x0000000140000000-0x0000000140237000-memory.dmp

                              Filesize

                              2.2MB

                            • memory/540-164-0x00000000001E0000-0x0000000000240000-memory.dmp

                              Filesize

                              384KB

                            • memory/540-156-0x0000000140000000-0x0000000140237000-memory.dmp

                              Filesize

                              2.2MB

                            • memory/616-180-0x000007FEF3B10000-0x000007FEF44AD000-memory.dmp

                              Filesize

                              9.6MB

                            • memory/616-181-0x0000000000300000-0x0000000000380000-memory.dmp

                              Filesize

                              512KB

                            • memory/616-256-0x0000000000300000-0x0000000000380000-memory.dmp

                              Filesize

                              512KB

                            • memory/616-264-0x000007FEF3B10000-0x000007FEF44AD000-memory.dmp

                              Filesize

                              9.6MB

                            • memory/616-246-0x000007FEF3B10000-0x000007FEF44AD000-memory.dmp

                              Filesize

                              9.6MB

                            • memory/616-270-0x0000000000300000-0x0000000000380000-memory.dmp

                              Filesize

                              512KB

                            • memory/616-182-0x000007FEF3B10000-0x000007FEF44AD000-memory.dmp

                              Filesize

                              9.6MB

                            • memory/916-266-0x0000000100000000-0x0000000100146000-memory.dmp

                              Filesize

                              1.3MB

                            • memory/916-268-0x0000000000610000-0x0000000000756000-memory.dmp

                              Filesize

                              1.3MB

                            • memory/916-274-0x0000000000180000-0x00000000001E0000-memory.dmp

                              Filesize

                              384KB

                            • memory/1376-63-0x0000000000400000-0x0000000001EFA000-memory.dmp

                              Filesize

                              27.0MB

                            • memory/1376-0-0x0000000000340000-0x00000000003A7000-memory.dmp

                              Filesize

                              412KB

                            • memory/1376-9-0x0000000000400000-0x0000000001EFA000-memory.dmp

                              Filesize

                              27.0MB

                            • memory/1376-5-0x0000000000340000-0x00000000003A7000-memory.dmp

                              Filesize

                              412KB

                            • memory/1480-170-0x0000000140000000-0x0000000140142000-memory.dmp

                              Filesize

                              1.3MB

                            • memory/1480-185-0x0000000000160000-0x00000000001C0000-memory.dmp

                              Filesize

                              384KB

                            • memory/1480-253-0x0000000140000000-0x0000000140142000-memory.dmp

                              Filesize

                              1.3MB

                            • memory/1612-281-0x0000000000400000-0x000000000053C000-memory.dmp

                              Filesize

                              1.2MB

                            • memory/1612-287-0x0000000000230000-0x0000000000297000-memory.dmp

                              Filesize

                              412KB

                            • memory/1612-291-0x0000000073710000-0x0000000073DFE000-memory.dmp

                              Filesize

                              6.9MB

                            • memory/1676-192-0x000000002E000000-0x000000002FE1E000-memory.dmp

                              Filesize

                              30.1MB

                            • memory/1676-259-0x000000002E000000-0x000000002FE1E000-memory.dmp

                              Filesize

                              30.1MB

                            • memory/1676-196-0x0000000000A70000-0x0000000000AD7000-memory.dmp

                              Filesize

                              412KB

                            • memory/1960-163-0x0000000140000000-0x0000000140142000-memory.dmp

                              Filesize

                              1.3MB

                            • memory/1960-92-0x0000000140000000-0x0000000140142000-memory.dmp

                              Filesize

                              1.3MB

                            • memory/1960-98-0x0000000000320000-0x0000000000380000-memory.dmp

                              Filesize

                              384KB

                            • memory/1960-89-0x0000000000320000-0x0000000000380000-memory.dmp

                              Filesize

                              384KB

                            • memory/2136-250-0x0000000000400000-0x000000000053C000-memory.dmp

                              Filesize

                              1.2MB

                            • memory/2136-207-0x00000000006E0000-0x0000000000747000-memory.dmp

                              Filesize

                              412KB

                            • memory/2136-227-0x0000000073710000-0x0000000073DFE000-memory.dmp

                              Filesize

                              6.9MB

                            • memory/2136-200-0x0000000000400000-0x000000000053C000-memory.dmp

                              Filesize

                              1.2MB

                            • memory/2136-251-0x0000000073710000-0x0000000073DFE000-memory.dmp

                              Filesize

                              6.9MB

                            • memory/2176-111-0x0000000100000000-0x0000000100129000-memory.dmp

                              Filesize

                              1.2MB

                            • memory/2176-110-0x00000000008C0000-0x0000000000920000-memory.dmp

                              Filesize

                              384KB

                            • memory/2176-117-0x00000000008C0000-0x0000000000920000-memory.dmp

                              Filesize

                              384KB

                            • memory/2176-184-0x0000000100000000-0x0000000100129000-memory.dmp

                              Filesize

                              1.2MB

                            • memory/2472-293-0x0000000140000000-0x000000014014A000-memory.dmp

                              Filesize

                              1.3MB

                            • memory/2472-229-0x0000000140000000-0x000000014014A000-memory.dmp

                              Filesize

                              1.3MB

                            • memory/2472-237-0x0000000000C50000-0x0000000000CB0000-memory.dmp

                              Filesize

                              384KB

                            • memory/2516-55-0x0000000000400000-0x0000000000460000-memory.dmp

                              Filesize

                              384KB

                            • memory/2516-54-0x0000000010000000-0x000000001013B000-memory.dmp

                              Filesize

                              1.2MB

                            • memory/2516-61-0x0000000000400000-0x0000000000460000-memory.dmp

                              Filesize

                              384KB

                            • memory/2516-122-0x0000000010000000-0x000000001013B000-memory.dmp

                              Filesize

                              1.2MB

                            • memory/2596-138-0x0000000140000000-0x0000000140146000-memory.dmp

                              Filesize

                              1.3MB

                            • memory/2596-147-0x0000000000840000-0x00000000008A0000-memory.dmp

                              Filesize

                              384KB

                            • memory/2596-206-0x0000000140000000-0x0000000140146000-memory.dmp

                              Filesize

                              1.3MB

                            • memory/2652-125-0x0000000140000000-0x000000014013C000-memory.dmp

                              Filesize

                              1.2MB

                            • memory/2652-133-0x0000000000850000-0x00000000008B0000-memory.dmp

                              Filesize

                              384KB

                            • memory/2652-194-0x0000000140000000-0x000000014013C000-memory.dmp

                              Filesize

                              1.2MB

                            • memory/2652-152-0x0000000001430000-0x0000000001431000-memory.dmp

                              Filesize

                              4KB

                            • memory/2664-34-0x0000000000830000-0x0000000000890000-memory.dmp

                              Filesize

                              384KB

                            • memory/2664-109-0x0000000140000000-0x0000000140131000-memory.dmp

                              Filesize

                              1.2MB

                            • memory/2664-26-0x0000000140000000-0x0000000140131000-memory.dmp

                              Filesize

                              1.2MB

                            • memory/2664-27-0x0000000000830000-0x0000000000890000-memory.dmp

                              Filesize

                              384KB

                            • memory/2736-20-0x0000000000170000-0x00000000001D0000-memory.dmp

                              Filesize

                              384KB

                            • memory/2736-13-0x0000000000170000-0x00000000001D0000-memory.dmp

                              Filesize

                              384KB

                            • memory/2736-12-0x0000000100000000-0x0000000100138000-memory.dmp

                              Filesize

                              1.2MB

                            • memory/2736-90-0x0000000100000000-0x0000000100138000-memory.dmp

                              Filesize

                              1.2MB

                            • memory/2916-38-0x0000000010000000-0x0000000010133000-memory.dmp

                              Filesize

                              1.2MB

                            • memory/2916-39-0x0000000000630000-0x0000000000697000-memory.dmp

                              Filesize

                              412KB

                            • memory/2916-44-0x0000000000630000-0x0000000000697000-memory.dmp

                              Filesize

                              412KB

                            • memory/2916-71-0x0000000010000000-0x0000000010133000-memory.dmp

                              Filesize

                              1.2MB

                            • memory/2984-224-0x0000000001010000-0x0000000001070000-memory.dmp

                              Filesize

                              384KB

                            • memory/2984-223-0x0000000140000000-0x000000014015E000-memory.dmp

                              Filesize

                              1.4MB