Analysis Overview
SHA256
8992b94e147a940a1da05b11631e28202c50840902fa372690485b49c415e4b5
Threat Level: Known bad
The file SecuriteInfo.com.Win32.TrojanX-gen.29310.32138 was found to be: Known bad.
Malicious Activity Summary
DarkCloud
Executes dropped EXE
Reads user/profile data of web browsers
Loads dropped DLL
Drops file in System32 directory
Suspicious use of SetThreadContext
Drops file in Program Files directory
Drops file in Windows directory
Enumerates physical storage devices
Unsigned PE
Checks processor information in registry
Suspicious behavior: LoadsDriver
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SetWindowsHookEx
Uses Task Scheduler COM API
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Suspicious behavior: EnumeratesProcesses
Modifies data under HKEY_USERS
Uses Volume Shadow Copy WMI provider
Uses Volume Shadow Copy service COM API
Checks SCSI registry key(s)
MITRE ATT&CK
Enterprise Matrix V6
Analysis: static1
Detonation Overview
Reported
2023-05-04 18:41
Signatures
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2023-05-04 18:41
Reported
2023-05-04 18:44
Platform
win7-20230220-en
Max time kernel
150s
Max time network
150s
Command Line
Signatures
DarkCloud
Executes dropped EXE
Loads dropped DLL
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | C:\Windows\system32\msiexec.exe | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Reads user/profile data of web browsers
Drops file in System32 directory
| Description | Indicator | Process | Target |
| File opened for modification | C:\Windows\system32\IEEtwCollector.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Windows\System32\snmptrap.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Windows\system32\vssvc.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Windows\System32\alg.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Windows\System32\msdtc.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Windows\system32\locator.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Windows\System32\vds.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Windows\system32\wbengine.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Windows\system32\wbem\WmiApSrv.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Windows\system32\dllhost.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Windows\system32\fxssvc.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat | C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE | N/A |
| File opened for modification | C:\Windows\system32\msiexec.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Windows\SysWow64\perfhost.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Windows\system32\config\systemprofile\AppData\Roaming\1b178fe2a5fe7035.bin | C:\Windows\System32\alg.exe | N/A |
| File opened for modification | C:\Windows\system32\MSDtc\MSDTC.LOG | C:\Windows\System32\msdtc.exe | N/A |
| File opened for modification | C:\Windows\system32\SearchIndexer.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
Suspicious use of SetThreadContext
| Description | Indicator | Process | Target |
| PID 1716 set thread context of 580 | N/A | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe |
Drops file in Program Files directory
| Description | Indicator | Process | Target |
| File opened for modification | C:\Program Files\Java\jdk1.7.0_80\bin\servertool.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Program Files\Java\jre7\bin\javaws.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Program Files\Java\jre7\bin\jp2launcher.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Program Files (x86)\Common Files\microsoft shared\ink\pipanel.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Oarpmany.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateOnDemand.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Program Files\Java\jdk1.7.0_80\jre\bin\javaws.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Program Files (x86)\Common Files\microsoft shared\MSInfo\msinfo32.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Program Files\Internet Explorer\ieinstal.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Program Files\Java\jdk1.7.0_80\bin\javaw.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Program Files\Java\jre7\bin\ktab.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\ODeploy.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Program Files (x86)\Common Files\microsoft shared\VSTA\8.0\x86\vsta_ep32.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Program Files\Internet Explorer\ielowutil.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Program Files\Java\jdk1.7.0_80\bin\idlj.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Program Files\Java\jdk1.7.0_80\bin\javadoc.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Program Files (x86)\Common Files\microsoft shared\DW\DWTRIG20.EXE | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Program Files (x86)\Common Files\microsoft shared\Smart Tag\SmartTagInstall.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Program Files (x86)\Google\Update\Install\{C04B3A16-0AA6-4535-B606-13B42F7DBF8B}\chrome_installer.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Program Files\Java\jdk1.7.0_80\jre\bin\jp2launcher.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Program Files\Java\jre7\bin\java.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Program Files\Mozilla Firefox\maintenanceservice.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroTextExtractor.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\{AC76BA86-7AD7-1033-7B44-A90000000001}\Setup.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Program Files (x86)\Common Files\microsoft shared\ink\TabTip32.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Program Files\Windows Media Player\wmpnetwk.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Program Files\Java\jdk1.7.0_80\bin\jmc.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Program Files\Java\jre7\bin\klist.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Program Files (x86)\Mozilla Maintenance Service\Uninstall.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Program Files\7-Zip\Uninstall.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Program Files\Google\Chrome\Application\106.0.5249.119\notification_helper.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Program Files\Java\jdk1.7.0_80\bin\jsadebugd.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Program Files\Java\jre7\bin\unpack200.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Icons\SC_Reader.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Program Files\Java\jre7\bin\servertool.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Program Files\Java\jre7\bin\ssvagent.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Program Files\7-Zip\7z.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Program Files\7-Zip\7zG.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Program Files\Java\jdk1.7.0_80\bin\xjc.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Program Files\Java\jdk1.7.0_80\jre\bin\pack200.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Program Files\Java\jre7\bin\keytool.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Program Files\Java\jre7\bin\kinit.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Program Files\Mozilla Firefox\private_browsing.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Program Files (x86)\Common Files\microsoft shared\VSTO\10.0\VSTOInstaller.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdate.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Program Files (x86)\Internet Explorer\ExtExport.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Program Files (x86)\Internet Explorer\ieinstal.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Program Files\Java\jdk1.7.0_80\bin\javac.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Program Files\Java\jdk1.7.0_80\bin\jmap.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Program Files\Java\jdk1.7.0_80\bin\rmiregistry.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Program Files\Java\jdk1.7.0_80\jre\bin\orbd.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Program Files\Java\jre7\bin\javaw.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\MSOICONS.EXE | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Program Files\DVD Maker\DVDMaker.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Program Files\Java\jdk1.7.0_80\bin\jabswitch.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Program Files\Java\jdk1.7.0_80\jre\bin\javaw.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Eula.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Program Files (x86)\Common Files\microsoft shared\EQUATION\EQNEDT32.EXE | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Program Files\Java\jdk1.7.0_80\bin\jconsole.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Program Files\Java\jdk1.7.0_80\bin\jps.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Program Files\Java\jre7\bin\policytool.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Program Files (x86)\Google\Update\Download\{8A69D345-D564-463C-AFF1-A69D9E530F96}\106.0.5249.119\chrome_installer.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
Drops file in Windows directory
| Description | Indicator | Process | Target |
| File created | C:\Windows\Registration\{02D4B3F1-FD88-11D1-960D-00805FC79235}.{8FCBB3C2-5924-453A-8A2E-61CFD685B2ED}.crmlog | C:\Windows\system32\dllhost.exe | N/A |
| File opened for modification | C:\Windows\ehome\ehsched.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File created | C:\Windows\Microsoft.NET\ngennicupdatelock.dat | C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe | N/A |
| File opened for modification | C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File created | C:\Windows\Microsoft.NET\ngenservice_pri1_lock.dat | C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe | N/A |
| File created | C:\Windows\Microsoft.NET\ngennicupdatelock.dat | C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe | N/A |
| File opened for modification | C:\Windows\DtcInstall.log | C:\Windows\System32\msdtc.exe | N/A |
| File opened for modification | C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Windows\Microsoft.NET\Framework\v2.0.50727\ngen_service.log | C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe | N/A |
| File opened for modification | C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen_service.log | C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe | N/A |
| File opened for modification | C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File created | C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ngenservicelock.dat | C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe | N/A |
| File created | C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngenservicelock.dat | C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe | N/A |
| File created | C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngenrootstorelock.dat | C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe | N/A |
| File created | C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngenofflinequeuelock.dat | C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe | N/A |
| File opened for modification | C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen_service.log | C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe | N/A |
| File created | C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngenservicelock.dat | C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe | N/A |
| File created | C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngenofflinequeuelock.dat | C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe | N/A |
| File created | C:\Windows\Microsoft.NET\Framework\v2.0.50727\ngen_service.lock | C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe | N/A |
| File opened for modification | C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File created | C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ngen_service.lock | C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe | N/A |
| File opened for modification | C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ngen_service.log | C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe | N/A |
| File opened for modification | C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Windows\Registration\{02D4B3F1-FD88-11D1-960D-00805FC79235}.{8FCBB3C2-5924-453A-8A2E-61CFD685B2ED}.crmlog | C:\Windows\system32\dllhost.exe | N/A |
| File opened for modification | C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File created | C:\Windows\Microsoft.NET\ngenservice_pri1_lock.dat | C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe | N/A |
| File created | C:\Windows\Microsoft.NET\Framework\v2.0.50727\ngenservicelock.dat | C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe | N/A |
| File created | C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngenrootstorelock.dat | C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe | N/A |
| File opened for modification | C:\Windows\ehome\ehRecvr.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
Modifies data under HKEY_USERS
| Description | Indicator | Process | Target |
| Key created | \REGISTRY\USER\.DEFAULT\Software | C:\Windows\ehome\ehRecvr.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft | C:\Windows\ehome\ehRecvr.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\ActiveMovie\devenum 64-bit | C:\Windows\ehome\ehRecvr.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings | C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE | N/A |
| Set value (int) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE\SAL\ShadowFileMaxClients = "32" | C:\Windows\ehome\ehRec.exe | N/A |
| Set value (int) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE\SAL\FileInlineGrowthQuantumSeconds = "30" | C:\Windows\ehome\ehRec.exe | N/A |
| Set value (int) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE\SAL\CacheShortPageCount = "64" | C:\Windows\ehome\ehRec.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32,@elscore.dll,-8 = "Microsoft Malayalam to Latin Transliteration" | C:\Windows\system32\SearchIndexer.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum 64-bit | C:\Windows\ehome\ehRecvr.exe | N/A |
| Set value (int) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\ActiveMovie\devenum 64-bit\Version = "7" | C:\Windows\ehome\ehRecvr.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE | C:\Windows\ehome\ehRec.exe | N/A |
| Set value (int) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE\SAL\SwagBitsPerSecond = "19922944" | C:\Windows\ehome\ehRec.exe | N/A |
| Set value (int) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE\SAL\LogInitialPageCount = "16" | C:\Windows\ehome\ehRec.exe | N/A |
| Set value (int) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE\SAL\CommitMaxCheckPointPageCount = "7" | C:\Windows\ehome\ehRec.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software | C:\Program Files\Windows Media Player\wmpnetwk.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\MediaPlayer\Health\{043838B9-9EA8-4E89-81B0-10DE839B0C0D} | C:\Program Files\Windows Media Player\wmpnetwk.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections | C:\Windows\system32\SearchIndexer.exe | N/A |
| Set value (data) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 | C:\Windows\system32\SearchProtocolHost.exe | N/A |
| Set value (int) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE\SAL\FileDiscontinuitiesPerSecond = "20" | C:\Windows\ehome\ehRec.exe | N/A |
| Set value (int) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE\SAL\CacheHashTableSize = "67" | C:\Windows\ehome\ehRec.exe | N/A |
| Set value (int) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE\SAL\CacheWaitForSize = "32" | C:\Windows\ehome\ehRec.exe | N/A |
| Set value (int) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE\SAL\NvpRecCount = "32" | C:\Windows\ehome\ehRec.exe | N/A |
| Set value (data) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\OfficeSoftwareProtectionPlatform\VLRenewalSchedule = 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 | C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\MediaPlayer | C:\Program Files\Windows Media Player\wmpnetwk.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32,@elscore.dll,-5 = "Microsoft Transliteration Engine" | C:\Windows\system32\SearchIndexer.exe | N/A |
| Set value (int) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE\SAL\LogMinJobWaitTimeMs = "3000" | C:\Windows\ehome\ehRec.exe | N/A |
| Set value (int) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE\SAL\NvpRecWaitForCounts = "32" | C:\Windows\ehome\ehRec.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\MediaPlayer\Health | C:\Program Files\Windows Media Player\wmpnetwk.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones | C:\Windows\system32\SearchIndexer.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap | C:\Windows\system32\SearchIndexer.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32,@elscore.dll,-4 = "Microsoft Simplified Chinese to Traditional Chinese Transliteration" | C:\Windows\system32\SearchIndexer.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32,@elscore.dll,-6 = "Microsoft Cyrillic to Latin Transliteration" | C:\Windows\system32\SearchIndexer.exe | N/A |
| Set value (int) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE\SAL\CacheLongPageCount = "32" | C:\Windows\ehome\ehRec.exe | N/A |
| Set value (int) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE\SAL\CriticalLowDiskSpace = "1073741824" | C:\Windows\ehome\ehRec.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\MediaPlayer\Health\{043838B9-9EA8-4E89-81B0-10DE839B0C0D} | C:\Program Files\Windows Media Player\wmpnetwk.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32,@elscore.dll,-9 = "Microsoft Bengali to Latin Transliteration" | C:\Windows\system32\SearchIndexer.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32,@elscore.dll,-1 = "Microsoft Language Detection" | C:\Windows\system32\SearchIndexer.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE\SAL | C:\Windows\ehome\ehRec.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\OfficeSoftwareProtectionPlatform | C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\MediaPlayer\Preferences\ | C:\Program Files\Windows Media Player\wmpnetwk.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft | C:\Program Files\Windows Media Player\wmpnetwk.exe | N/A |
| Set value (data) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 | C:\Windows\system32\SearchIndexer.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\ActiveMovie | C:\Windows\ehome\ehRecvr.exe | N/A |
| Set value (int) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE\SAL\FileGrowthQuantumSeconds = "180" | C:\Windows\ehome\ehRec.exe | N/A |
| Set value (int) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE\SAL\LogMaxJobDemoteTimeMs = "5000" | C:\Windows\ehome\ehRec.exe | N/A |
| Set value (int) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE\SAL\NvpClientsCount = "32" | C:\Windows\ehome\ehRec.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32,@elscore.dll,-2 = "Microsoft Script Detection" | C:\Windows\system32\SearchIndexer.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32,@elscore.dll,-3 = "Microsoft Traditional Chinese to Simplified Chinese Transliteration" | C:\Windows\system32\SearchIndexer.exe | N/A |
| Set value (int) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE\SAL\FileGrowthBudgetMs = "45000" | C:\Windows\ehome\ehRec.exe | N/A |
| Set value (int) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE\SAL\CommitMaxCheckPoitnRateMs = "10000" | C:\Windows\ehome\ehRec.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\system32\MCTRes.dll,-200005 = "Websites for United States" | C:\Windows\system32\SearchProtocolHost.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32,@elscore.dll,-7 = "Microsoft Devanagari to Latin Transliteration" | C:\Windows\system32\SearchIndexer.exe | N/A |
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\eHome\EhTray.exe | N/A |
| N/A | N/A | C:\Windows\eHome\EhTray.exe | N/A |
Suspicious use of SendNotifyMessage
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\eHome\EhTray.exe | N/A |
| N/A | N/A | C:\Windows\eHome\EhTray.exe | N/A |
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| N/A | N/A | C:\Windows\system32\SearchProtocolHost.exe | N/A |
| N/A | N/A | C:\Windows\system32\SearchProtocolHost.exe | N/A |
| N/A | N/A | C:\Windows\system32\SearchProtocolHost.exe | N/A |
| N/A | N/A | C:\Windows\system32\SearchProtocolHost.exe | N/A |
| N/A | N/A | C:\Windows\system32\SearchProtocolHost.exe | N/A |
| N/A | N/A | C:\Windows\system32\SearchProtocolHost.exe | N/A |
| N/A | N/A | C:\Windows\system32\SearchProtocolHost.exe | N/A |
| N/A | N/A | C:\Windows\system32\SearchProtocolHost.exe | N/A |
| N/A | N/A | C:\Windows\system32\SearchProtocolHost.exe | N/A |
| N/A | N/A | C:\Windows\system32\SearchProtocolHost.exe | N/A |
| N/A | N/A | C:\Windows\system32\SearchProtocolHost.exe | N/A |
Suspicious use of WriteProcessMemory
Uses Task Scheduler COM API
Uses Volume Shadow Copy WMI provider
Uses Volume Shadow Copy service COM API
Processes
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe
"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe"
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe
"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe"
C:\Windows\System32\alg.exe
C:\Windows\System32\alg.exe
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe
C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe
C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
C:\Windows\system32\dllhost.exe
C:\Windows\system32\dllhost.exe /Processid:{02D4B3F1-FD88-11D1-960D-00805FC79235}
C:\Windows\ehome\ehRecvr.exe
C:\Windows\ehome\ehRecvr.exe
C:\Windows\ehome\ehsched.exe
C:\Windows\ehome\ehsched.exe
C:\Windows\eHome\EhTray.exe
"C:\Windows\eHome\EhTray.exe" /nav:-2
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
C:\Windows\ehome\ehRec.exe
C:\Windows\ehome\ehRec.exe -Embedding
C:\Windows\system32\IEEtwCollector.exe
C:\Windows\system32\IEEtwCollector.exe /V
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1e4 -InterruptEvent 1d0 -NGENProcess 1d4 -Pipe 1e0 -Comment "NGen Worker Process"
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1dc -InterruptEvent 240 -NGENProcess 248 -Pipe 24c -Comment "NGen Worker Process"
C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE
"C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE" /auditservice
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 240 -InterruptEvent 23c -NGENProcess 1ec -Pipe 238 -Comment "NGen Worker Process"
C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe
"C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"
C:\Windows\System32\msdtc.exe
C:\Windows\System32\msdtc.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1ec -InterruptEvent 234 -NGENProcess 240 -Pipe 23c -Comment "NGen Worker Process"
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 234 -InterruptEvent 260 -NGENProcess 248 -Pipe 25c -Comment "NGen Worker Process"
C:\Windows\system32\msiexec.exe
C:\Windows\system32\msiexec.exe /V
C:\Program Files (x86)\Common Files\Microsoft Shared\Source Engine\OSE.EXE
"C:\Program Files (x86)\Common Files\Microsoft Shared\Source Engine\OSE.EXE"
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 260 -InterruptEvent 244 -NGENProcess 230 -Pipe 264 -Comment "NGen Worker Process"
C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE
"C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"
C:\Windows\SysWow64\perfhost.exe
C:\Windows\SysWow64\perfhost.exe
C:\Windows\system32\locator.exe
C:\Windows\system32\locator.exe
C:\Windows\System32\snmptrap.exe
C:\Windows\System32\snmptrap.exe
C:\Windows\System32\vds.exe
C:\Windows\System32\vds.exe
C:\Windows\system32\vssvc.exe
C:\Windows\system32\vssvc.exe
C:\Windows\system32\wbengine.exe
"C:\Windows\system32\wbengine.exe"
C:\Windows\system32\wbem\WmiApSrv.exe
C:\Windows\system32\wbem\WmiApSrv.exe
C:\Program Files\Windows Media Player\wmpnetwk.exe
"C:\Program Files\Windows Media Player\wmpnetwk.exe"
C:\Windows\system32\SearchIndexer.exe
C:\Windows\system32\SearchIndexer.exe /Embedding
C:\Windows\system32\SearchProtocolHost.exe
"C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe_S-1-5-21-3430344531-3702557399-3004411149-10001_ Global\UsGthrCtrlFltPipeMssGthrPipe_S-1-5-21-3430344531-3702557399-3004411149-10001 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon" "1"
C:\Windows\system32\SearchFilterHost.exe
"C:\Windows\system32\SearchFilterHost.exe" 0 596 600 608 65536 604
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 234 -InterruptEvent 244 -NGENProcess 230 -Pipe 264 -Comment "NGen Worker Process"
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 244 -InterruptEvent 248 -NGENProcess 180 -Pipe 254 -Comment "NGen Worker Process"
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 248 -InterruptEvent 1d4 -NGENProcess 1d0 -Pipe 250 -Comment "NGen Worker Process"
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1d4 -InterruptEvent 240 -NGENProcess 230 -Pipe 164 -Comment "NGen Worker Process"
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 240 -InterruptEvent 258 -NGENProcess 180 -Pipe 260 -Comment "NGen Worker Process"
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 258 -InterruptEvent 270 -NGENProcess 1d0 -Pipe 26c -Comment "NGen Worker Process"
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 270 -InterruptEvent 274 -NGENProcess 1a8 -Pipe 234 -Comment "NGen Worker Process"
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1d4 -InterruptEvent 27c -NGENProcess 278 -Pipe 180 -Comment "NGen Worker Process"
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 27c -InterruptEvent 248 -NGENProcess 270 -Pipe 1d0 -Comment "NGen Worker Process"
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 248 -InterruptEvent 280 -NGENProcess 274 -Pipe 230 -Comment "NGen Worker Process"
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 280 -InterruptEvent 1a8 -NGENProcess 244 -Pipe 278 -Comment "NGen Worker Process"
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 284 -InterruptEvent 248 -NGENProcess 288 -Pipe 280 -Comment "NGen Worker Process"
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 248 -InterruptEvent 28c -NGENProcess 244 -Pipe 240 -Comment "NGen Worker Process"
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 28c -InterruptEvent 1d4 -NGENProcess 274 -Pipe 1a8 -Comment "NGen Worker Process"
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1d4 -InterruptEvent 290 -NGENProcess 27c -Pipe 270 -Comment "NGen Worker Process"
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 290 -InterruptEvent 294 -NGENProcess 244 -Pipe 258 -Comment "NGen Worker Process"
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 294 -InterruptEvent 298 -NGENProcess 274 -Pipe 284 -Comment "NGen Worker Process"
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 298 -InterruptEvent 29c -NGENProcess 27c -Pipe 248 -Comment "NGen Worker Process"
C:\Windows\system32\SearchProtocolHost.exe
"C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe2_ Global\UsGthrCtrlFltPipeMssGthrPipe2 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon"
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 16c -InterruptEvent 154 -NGENProcess 15c -Pipe 168 -Comment "NGen Worker Process"
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 1e0 -InterruptEvent 154 -NGENProcess 15c -Pipe 16c -Comment "NGen Worker Process"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | pywolwnvd.biz | udp |
| US | 173.231.184.122:80 | pywolwnvd.biz | tcp |
| US | 8.8.8.8:53 | pywolwnvd.biz | udp |
| US | 173.231.184.122:80 | pywolwnvd.biz | tcp |
| US | 8.8.8.8:53 | ssbzmoy.biz | udp |
| US | 8.8.8.8:53 | cvgrf.biz | udp |
| US | 206.191.152.58:80 | cvgrf.biz | tcp |
| US | 8.8.8.8:53 | npukfztj.biz | udp |
| US | 63.251.106.25:80 | npukfztj.biz | tcp |
| US | 8.8.8.8:53 | przvgke.biz | udp |
| NL | 167.99.35.88:80 | przvgke.biz | tcp |
| US | 8.8.8.8:53 | zlenh.biz | udp |
| US | 8.8.8.8:53 | knjghuig.biz | udp |
| SG | 72.5.161.12:80 | knjghuig.biz | tcp |
| US | 8.8.8.8:53 | uhxqin.biz | udp |
| AU | 103.224.182.251:80 | uhxqin.biz | tcp |
| US | 8.8.8.8:53 | ww25.uhxqin.biz | udp |
| US | 199.59.243.223:80 | ww25.uhxqin.biz | tcp |
| AU | 103.224.182.251:80 | uhxqin.biz | tcp |
| US | 8.8.8.8:53 | anpmnmxo.biz | udp |
| US | 8.8.8.8:53 | ssbzmoy.biz | udp |
| US | 8.8.8.8:53 | cvgrf.biz | udp |
| AU | 103.224.182.251:80 | anpmnmxo.biz | tcp |
| US | 206.191.152.58:80 | cvgrf.biz | tcp |
| US | 8.8.8.8:53 | ww25.anpmnmxo.biz | udp |
| US | 199.59.243.223:80 | ww25.anpmnmxo.biz | tcp |
| US | 8.8.8.8:53 | npukfztj.biz | udp |
| AU | 103.224.182.251:80 | anpmnmxo.biz | tcp |
| US | 63.251.106.25:80 | npukfztj.biz | tcp |
| US | 8.8.8.8:53 | przvgke.biz | udp |
| NL | 167.99.35.88:80 | przvgke.biz | tcp |
| US | 8.8.8.8:53 | lpuegx.biz | udp |
| US | 8.8.8.8:53 | zlenh.biz | udp |
| RU | 82.112.184.197:80 | lpuegx.biz | tcp |
| US | 8.8.8.8:53 | knjghuig.biz | udp |
| SG | 72.5.161.12:80 | knjghuig.biz | tcp |
| US | 8.8.8.8:53 | uhxqin.biz | udp |
| AU | 103.224.182.251:80 | uhxqin.biz | tcp |
| US | 199.59.243.223:80 | ww25.anpmnmxo.biz | tcp |
| AU | 103.224.182.251:80 | uhxqin.biz | tcp |
| US | 8.8.8.8:53 | anpmnmxo.biz | udp |
| AU | 103.224.182.251:80 | anpmnmxo.biz | tcp |
| US | 199.59.243.223:80 | ww25.anpmnmxo.biz | tcp |
| AU | 103.224.182.251:80 | anpmnmxo.biz | tcp |
| US | 8.8.8.8:53 | lpuegx.biz | udp |
| RU | 82.112.184.197:80 | lpuegx.biz | tcp |
| RU | 82.112.184.197:80 | lpuegx.biz | tcp |
| RU | 82.112.184.197:80 | lpuegx.biz | tcp |
| US | 8.8.8.8:53 | vjaxhpbji.biz | udp |
| RU | 82.112.184.197:80 | vjaxhpbji.biz | tcp |
| US | 8.8.8.8:53 | vjaxhpbji.biz | udp |
| RU | 82.112.184.197:80 | vjaxhpbji.biz | tcp |
| RU | 82.112.184.197:80 | vjaxhpbji.biz | tcp |
| RU | 82.112.184.197:80 | vjaxhpbji.biz | tcp |
Files
memory/1716-54-0x0000000000E80000-0x000000000101A000-memory.dmp
memory/1716-55-0x0000000000550000-0x0000000000590000-memory.dmp
memory/1716-56-0x00000000005B0000-0x00000000005C2000-memory.dmp
memory/1716-57-0x0000000000550000-0x0000000000590000-memory.dmp
memory/1716-58-0x0000000000620000-0x000000000062C000-memory.dmp
memory/1716-59-0x0000000008750000-0x00000000088A2000-memory.dmp
memory/1716-60-0x000000000AED0000-0x000000000B09E000-memory.dmp
memory/580-61-0x0000000000400000-0x000000000065B000-memory.dmp
memory/580-62-0x0000000000400000-0x000000000065B000-memory.dmp
memory/580-63-0x0000000000400000-0x000000000065B000-memory.dmp
memory/580-65-0x000000007EFDE000-0x000000007EFDF000-memory.dmp
memory/580-66-0x0000000000400000-0x000000000065B000-memory.dmp
memory/580-68-0x0000000000400000-0x000000000065B000-memory.dmp
memory/580-69-0x0000000000330000-0x0000000000396000-memory.dmp
memory/580-74-0x0000000000330000-0x0000000000396000-memory.dmp
\Windows\System32\alg.exe
| MD5 | 3268bd7ab562bb714c1ce3e68c1a31ba |
| SHA1 | 2d24725585238f0b895d48620c33796960eed632 |
| SHA256 | 6615441122ea45908a5ae0336245408920df61289325e89460cdbd7d6539ef98 |
| SHA512 | 0c881172c435c8e9a5b1c3bfde909b55e974d0937002a92cd94959cfa1bb251e5881606de88985502895f143a7744f572293876e49e3bd1e56a66bd521846ef6 |
C:\Windows\System32\alg.exe
| MD5 | 3268bd7ab562bb714c1ce3e68c1a31ba |
| SHA1 | 2d24725585238f0b895d48620c33796960eed632 |
| SHA256 | 6615441122ea45908a5ae0336245408920df61289325e89460cdbd7d6539ef98 |
| SHA512 | 0c881172c435c8e9a5b1c3bfde909b55e974d0937002a92cd94959cfa1bb251e5881606de88985502895f143a7744f572293876e49e3bd1e56a66bd521846ef6 |
memory/580-82-0x0000000000400000-0x000000000065B000-memory.dmp
memory/1072-83-0x00000000003C0000-0x0000000000420000-memory.dmp
memory/1072-84-0x0000000100000000-0x00000001001FB000-memory.dmp
memory/1072-90-0x00000000003C0000-0x0000000000420000-memory.dmp
\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe
| MD5 | 0f43c2b85a074430dbe08ad6003d1cd1 |
| SHA1 | 654b2bde08ac880cf077f3717f5fd2f72db334c3 |
| SHA256 | 74b51149d60ed878da24bfdc0bca25b4dbfa7bbcbe738c022ab10542f30b7a2e |
| SHA512 | b830e5b188eff66d84a85d0ad2286032035aa864471d2597001061a2a63ba965bc51673236e09bf2bcc5ba41bc76aaa022268f2697d7ffc8c7e62b40f2a0d220 |
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe
| MD5 | 0f43c2b85a074430dbe08ad6003d1cd1 |
| SHA1 | 654b2bde08ac880cf077f3717f5fd2f72db334c3 |
| SHA256 | 74b51149d60ed878da24bfdc0bca25b4dbfa7bbcbe738c022ab10542f30b7a2e |
| SHA512 | b830e5b188eff66d84a85d0ad2286032035aa864471d2597001061a2a63ba965bc51673236e09bf2bcc5ba41bc76aaa022268f2697d7ffc8c7e62b40f2a0d220 |
C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe
| MD5 | 24202e20a075e5d71cbedefad71c1a9e |
| SHA1 | db078828e1130f85719da5b4f3698cac0d31bfdc |
| SHA256 | df2fab888634b9b7b8def3d010163e159fbc194bebd3acc749fa9caf2a796288 |
| SHA512 | 9d05eaaa5600b46ebc0621dd0cd7ba9f035165f12ae562be0fca0ad68efe1d4bb4cd8f6cf17a695324eea491a833847ecd39c821a31a0ca67e79e588a841e370 |
\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe
| MD5 | f5d0b06bf1ebc980878d0226c9000ce7 |
| SHA1 | 563083f7f5a17ddd2cee7fa8fd30a385cdead89e |
| SHA256 | 1df6c4b13c6778f955a2e6bbe75e7e96d4d2bfdeccc0fd2482f85ab3f2a8f0ab |
| SHA512 | df3d7e4e36931e5459383cc014a5ac9d5551886ed7a9836fc077fb8e07e5bf10cd7dbc228c018fbc290eddfedcf09ec3f75f899237483bdcdde22ecdb56227a5 |
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe
| MD5 | f5d0b06bf1ebc980878d0226c9000ce7 |
| SHA1 | 563083f7f5a17ddd2cee7fa8fd30a385cdead89e |
| SHA256 | 1df6c4b13c6778f955a2e6bbe75e7e96d4d2bfdeccc0fd2482f85ab3f2a8f0ab |
| SHA512 | df3d7e4e36931e5459383cc014a5ac9d5551886ed7a9836fc077fb8e07e5bf10cd7dbc228c018fbc290eddfedcf09ec3f75f899237483bdcdde22ecdb56227a5 |
memory/1932-104-0x0000000140000000-0x00000001401F4000-memory.dmp
memory/1880-105-0x0000000010000000-0x00000000101F6000-memory.dmp
memory/1820-106-0x0000000010000000-0x00000000101FE000-memory.dmp
C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe
| MD5 | 24202e20a075e5d71cbedefad71c1a9e |
| SHA1 | db078828e1130f85719da5b4f3698cac0d31bfdc |
| SHA256 | df2fab888634b9b7b8def3d010163e159fbc194bebd3acc749fa9caf2a796288 |
| SHA512 | 9d05eaaa5600b46ebc0621dd0cd7ba9f035165f12ae562be0fca0ad68efe1d4bb4cd8f6cf17a695324eea491a833847ecd39c821a31a0ca67e79e588a841e370 |
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe
| MD5 | f5d0b06bf1ebc980878d0226c9000ce7 |
| SHA1 | 563083f7f5a17ddd2cee7fa8fd30a385cdead89e |
| SHA256 | 1df6c4b13c6778f955a2e6bbe75e7e96d4d2bfdeccc0fd2482f85ab3f2a8f0ab |
| SHA512 | df3d7e4e36931e5459383cc014a5ac9d5551886ed7a9836fc077fb8e07e5bf10cd7dbc228c018fbc290eddfedcf09ec3f75f899237483bdcdde22ecdb56227a5 |
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
| MD5 | 300411cd115386b7fb7cee49906a11a8 |
| SHA1 | e58015f41ed2c150486def165b2646cf5f470738 |
| SHA256 | 9671c529fec90d48dedc179b039e8d2c381676d4f0a26cdef7dff48e1deb0705 |
| SHA512 | 6f1d69d36a19baef8b11edd08ca78000cccd9c03fad1e7cec3a8f0447e11aacbae2560dff1ddf2f656fe926c94c4546942f0371d1f37b468d65e4981c7f3e0a5 |
memory/2008-116-0x0000000000670000-0x00000000006D6000-memory.dmp
memory/2008-121-0x0000000000670000-0x00000000006D6000-memory.dmp
C:\Windows\Microsoft.NET\Framework\v2.0.50727\ngen_service.log
| MD5 | 62481774a3de53d62df364dcd8396f5e |
| SHA1 | 8d9a33529140bff403f5449fa9c57631cbe19d85 |
| SHA256 | 45e7ac2477b68050a34bbdc3d241edf6169af5d7db4ed52a276485e7315a27d4 |
| SHA512 | c0405ef6f164f2c75aa0593877513e0a5da89bbc4f4318f304d3b5e8f9b6bdf41ec31d77d153cbc550dfea0e594d144c53d4d98acf9f5fd8ad423487e7d7cc51 |
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ngen_service.log
| MD5 | cc454a16435a8ee87e992d78a3efc1f9 |
| SHA1 | 7ba7877d276a210d8e4ac39f768ee5e96fae2edf |
| SHA256 | 69735b1c49b5ed681737f811f970b05c1b8335ebc897b4527d8b097076c96dea |
| SHA512 | b7a88afe0688e66cd0df0d9d0343ccaa0399f331878dd400438b701709a5eab7757c9e3c41ae7bfe130a167cc94344c3a68f0d890d873ab4f669d15e511d54b1 |
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
| MD5 | 300411cd115386b7fb7cee49906a11a8 |
| SHA1 | e58015f41ed2c150486def165b2646cf5f470738 |
| SHA256 | 9671c529fec90d48dedc179b039e8d2c381676d4f0a26cdef7dff48e1deb0705 |
| SHA512 | 6f1d69d36a19baef8b11edd08ca78000cccd9c03fad1e7cec3a8f0447e11aacbae2560dff1ddf2f656fe926c94c4546942f0371d1f37b468d65e4981c7f3e0a5 |
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
| MD5 | aab5bb02f6e54347fc3ef357c8b8171e |
| SHA1 | 71d7d6204a3fb63fe5dea6fe178c10a43df0945f |
| SHA256 | c8dffbd443a7e457ff2b329e8db2e34f5b5d4d65311e3e5a07dea13bfdb0fed2 |
| SHA512 | bec479e58ae148052ceeb45450d39a1abf45e8affbe16082b1587d22a2b091ad225eade2d7b21ced1e6fa038c0f6e53790e9baa681ddcfb2e7dee65b1e7d9c80 |
memory/2008-132-0x0000000000400000-0x00000000005FF000-memory.dmp
\Windows\System32\dllhost.exe
| MD5 | 756c6f541d4c1dde055dc4674ab44621 |
| SHA1 | b29f97e3b2f9ec012ee6af710104dfbcc08a3138 |
| SHA256 | bdfef4e2bb3ae273f38d3797474c204c8e5e5c54567ab916adb529f34c5790fb |
| SHA512 | 40cdba6a9c97bc4cb6e4644438f4b8f6fce41d70503291834432e30a12aac0fbd9eff558dea80258fbe74cb47786c418d0aea145696c68b1fa6f551d9ad4ce7b |
C:\Windows\System32\dllhost.exe
| MD5 | 756c6f541d4c1dde055dc4674ab44621 |
| SHA1 | b29f97e3b2f9ec012ee6af710104dfbcc08a3138 |
| SHA256 | bdfef4e2bb3ae273f38d3797474c204c8e5e5c54567ab916adb529f34c5790fb |
| SHA512 | 40cdba6a9c97bc4cb6e4644438f4b8f6fce41d70503291834432e30a12aac0fbd9eff558dea80258fbe74cb47786c418d0aea145696c68b1fa6f551d9ad4ce7b |
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
| MD5 | aab5bb02f6e54347fc3ef357c8b8171e |
| SHA1 | 71d7d6204a3fb63fe5dea6fe178c10a43df0945f |
| SHA256 | c8dffbd443a7e457ff2b329e8db2e34f5b5d4d65311e3e5a07dea13bfdb0fed2 |
| SHA512 | bec479e58ae148052ceeb45450d39a1abf45e8affbe16082b1587d22a2b091ad225eade2d7b21ced1e6fa038c0f6e53790e9baa681ddcfb2e7dee65b1e7d9c80 |
C:\Windows\ehome\ehrecvr.exe
| MD5 | f0fe843d6bd4e421e0db9945a984ad43 |
| SHA1 | a92b4e4c54708cfeae395e0f564a922d2cea4a51 |
| SHA256 | 7c88cd275fd3da4c58a92f886d317f4bfc5f69d973374559a116bb446c72a097 |
| SHA512 | cf69b5e4a55f51a16650aa4a6354c40aa0e354a91c38ac76d91b1031392bdc45332817baae75a7dfc8964c63cc42a30e6e1b5784b638f00dfc0e353899406ff3 |
\Windows\ehome\ehrecvr.exe
| MD5 | f0fe843d6bd4e421e0db9945a984ad43 |
| SHA1 | a92b4e4c54708cfeae395e0f564a922d2cea4a51 |
| SHA256 | 7c88cd275fd3da4c58a92f886d317f4bfc5f69d973374559a116bb446c72a097 |
| SHA512 | cf69b5e4a55f51a16650aa4a6354c40aa0e354a91c38ac76d91b1031392bdc45332817baae75a7dfc8964c63cc42a30e6e1b5784b638f00dfc0e353899406ff3 |
memory/1768-142-0x0000000000850000-0x00000000008B0000-memory.dmp
memory/1768-148-0x0000000000850000-0x00000000008B0000-memory.dmp
memory/1420-150-0x0000000100000000-0x00000001001EC000-memory.dmp
memory/1608-151-0x0000000140000000-0x0000000140205000-memory.dmp
memory/1768-152-0x0000000140000000-0x000000014013C000-memory.dmp
C:\Windows\ehome\ehsched.exe
| MD5 | 61a38cd3393ec5e745824ab234ab7e37 |
| SHA1 | 983bfc7305f3c813473ad583333ca76bbee4ef2f |
| SHA256 | 934bc00bbe502ee985012ec4335892db6c14e1f21372496ccf3ea5b0b24ec1b8 |
| SHA512 | 472cb21f048cb1331cd00131e4c120e94686621cc14b56930e4e07258f4496386ca214edae1887633a724b26435bb06a417be80ceb46c114581dda29ce056af9 |
\Windows\ehome\ehsched.exe
| MD5 | 61a38cd3393ec5e745824ab234ab7e37 |
| SHA1 | 983bfc7305f3c813473ad583333ca76bbee4ef2f |
| SHA256 | 934bc00bbe502ee985012ec4335892db6c14e1f21372496ccf3ea5b0b24ec1b8 |
| SHA512 | 472cb21f048cb1331cd00131e4c120e94686621cc14b56930e4e07258f4496386ca214edae1887633a724b26435bb06a417be80ceb46c114581dda29ce056af9 |
memory/1980-156-0x0000000000870000-0x00000000008D0000-memory.dmp
memory/1768-160-0x0000000001380000-0x0000000001390000-memory.dmp
memory/1980-161-0x0000000140000000-0x0000000140209000-memory.dmp
memory/1768-163-0x0000000001390000-0x00000000013A0000-memory.dmp
memory/1980-165-0x0000000000870000-0x00000000008D0000-memory.dmp
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
| MD5 | 3888e0bf3f10c9b2143d300fc300b755 |
| SHA1 | a08eee879f85df81ceecd58cdbfc99b1ac043156 |
| SHA256 | e09edea4709f4d32707c6e5e205ec372919c177585be172e76868dd571c10986 |
| SHA512 | 4dc2a5bd081a6c2b054103dfc22402a6737d697ef39a90043815aabfec192debfab2ce440fbf5df31ebb9c0fe91bda9ab2f6a2715e6f731f73a5c3f18d43b0ec |
memory/1404-170-0x00000000008B0000-0x0000000000910000-memory.dmp
memory/1404-176-0x00000000008B0000-0x0000000000910000-memory.dmp
\Windows\System32\ieetwcollector.exe
| MD5 | c4fa8f024aa31767ac8ac089d6dfc5d0 |
| SHA1 | d9ac8685f9f74b1974da069480212c5251a727c9 |
| SHA256 | 141c60b3912e7f3f4b83f1d69fb591f84d568be0923c6b0ee5fac7f17166b364 |
| SHA512 | a13ff9d71f82529f31ea992255cd4244eea66947861c48656a2f3652b9f3338f3e3abe905b8833969d1e2c994248a4922a5e5ae676c004218b7889ed4c847ea2 |
memory/1500-183-0x0000000000290000-0x00000000002F0000-memory.dmp
memory/1768-182-0x0000000001430000-0x0000000001431000-memory.dmp
memory/1404-185-0x0000000140000000-0x0000000140237000-memory.dmp
C:\Windows\System32\ieetwcollector.exe
| MD5 | c4fa8f024aa31767ac8ac089d6dfc5d0 |
| SHA1 | d9ac8685f9f74b1974da069480212c5251a727c9 |
| SHA256 | 141c60b3912e7f3f4b83f1d69fb591f84d568be0923c6b0ee5fac7f17166b364 |
| SHA512 | a13ff9d71f82529f31ea992255cd4244eea66947861c48656a2f3652b9f3338f3e3abe905b8833969d1e2c994248a4922a5e5ae676c004218b7889ed4c847ea2 |
memory/484-186-0x0000000000E00000-0x0000000000E80000-memory.dmp
memory/1500-189-0x0000000140000000-0x0000000140205000-memory.dmp
memory/1500-194-0x0000000000290000-0x00000000002F0000-memory.dmp
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
| MD5 | 300411cd115386b7fb7cee49906a11a8 |
| SHA1 | e58015f41ed2c150486def165b2646cf5f470738 |
| SHA256 | 9671c529fec90d48dedc179b039e8d2c381676d4f0a26cdef7dff48e1deb0705 |
| SHA512 | 6f1d69d36a19baef8b11edd08ca78000cccd9c03fad1e7cec3a8f0447e11aacbae2560dff1ddf2f656fe926c94c4546942f0371d1f37b468d65e4981c7f3e0a5 |
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
| MD5 | 300411cd115386b7fb7cee49906a11a8 |
| SHA1 | e58015f41ed2c150486def165b2646cf5f470738 |
| SHA256 | 9671c529fec90d48dedc179b039e8d2c381676d4f0a26cdef7dff48e1deb0705 |
| SHA512 | 6f1d69d36a19baef8b11edd08ca78000cccd9c03fad1e7cec3a8f0447e11aacbae2560dff1ddf2f656fe926c94c4546942f0371d1f37b468d65e4981c7f3e0a5 |
memory/484-215-0x0000000000E00000-0x0000000000E80000-memory.dmp
memory/1120-217-0x0000000000400000-0x00000000005FF000-memory.dmp
memory/992-218-0x0000000000400000-0x00000000005FF000-memory.dmp
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
| MD5 | 300411cd115386b7fb7cee49906a11a8 |
| SHA1 | e58015f41ed2c150486def165b2646cf5f470738 |
| SHA256 | 9671c529fec90d48dedc179b039e8d2c381676d4f0a26cdef7dff48e1deb0705 |
| SHA512 | 6f1d69d36a19baef8b11edd08ca78000cccd9c03fad1e7cec3a8f0447e11aacbae2560dff1ddf2f656fe926c94c4546942f0371d1f37b468d65e4981c7f3e0a5 |
C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE
| MD5 | 9d1a14c74ca6e3c4d3bb4083da12dd8d |
| SHA1 | cd02242dc22d26b92401e1f95fe1b6405584e312 |
| SHA256 | d4ad80618ebf36641161635a7478ee770ad1316fe6c2a3b11cbd227a652f4aad |
| SHA512 | 0ab6d31f5fdd4c04166f3faecc11958eddc4b3d1a048d4c7cb782c9b2d612b5ae5f9c1ad36889c2d872b1926f6a039480b40c08521036fbaec5b985b40e2189b |
memory/992-238-0x0000000000400000-0x00000000005FF000-memory.dmp
memory/2152-239-0x0000000000400000-0x00000000005FF000-memory.dmp
memory/2172-241-0x000000002E000000-0x000000002FE1E000-memory.dmp
C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe
| MD5 | 0a034fc0f23c584271d476dcc10fef61 |
| SHA1 | 54b8ae0cf9319f5fbc750bc6686970fd3925f42a |
| SHA256 | 0f6f7cbf0ac629e39f29d41bdbcc4ff288b814af56a04d13d9f0900c20a9cd15 |
| SHA512 | 8e4ecf55c5b8a04fc121e719cf670bfc1332e8ad7cc048290f07c475e81f91499a95af5c8616e1e6298017157faf067431b3df08601c84cb73999c6cd37c96ee |
memory/2324-255-0x0000000140000000-0x0000000140221000-memory.dmp
C:\Windows\System32\msdtc.exe
| MD5 | cd67083a5281fc816c2e8ea3363f1de3 |
| SHA1 | bc4d6e618623455d616d8c55e2b4e2451feda941 |
| SHA256 | 3434df292178539f105b2efc74b83f847782f8951c84f187497be33cdfc5489c |
| SHA512 | 8169c84217990abfe81e6d5e949e7855c4b9d8a82139849a16c54f023b22e4b3328f46b3755a8658fe3b4d767f983500769806792b35ff2f4c3a217660598113 |
\Windows\System32\msdtc.exe
| MD5 | cd67083a5281fc816c2e8ea3363f1de3 |
| SHA1 | bc4d6e618623455d616d8c55e2b4e2451feda941 |
| SHA256 | 3434df292178539f105b2efc74b83f847782f8951c84f187497be33cdfc5489c |
| SHA512 | 8169c84217990abfe81e6d5e949e7855c4b9d8a82139849a16c54f023b22e4b3328f46b3755a8658fe3b4d767f983500769806792b35ff2f4c3a217660598113 |
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
| MD5 | 300411cd115386b7fb7cee49906a11a8 |
| SHA1 | e58015f41ed2c150486def165b2646cf5f470738 |
| SHA256 | 9671c529fec90d48dedc179b039e8d2c381676d4f0a26cdef7dff48e1deb0705 |
| SHA512 | 6f1d69d36a19baef8b11edd08ca78000cccd9c03fad1e7cec3a8f0447e11aacbae2560dff1ddf2f656fe926c94c4546942f0371d1f37b468d65e4981c7f3e0a5 |
memory/484-263-0x0000000000E00000-0x0000000000E80000-memory.dmp
memory/2428-266-0x0000000140000000-0x000000014020D000-memory.dmp
memory/2444-268-0x0000000000400000-0x00000000005FF000-memory.dmp
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b91050d8b077a4e8.customDestinations-ms
| MD5 | b9bd716de6739e51c620f2086f9c31e4 |
| SHA1 | 9733d94607a3cba277e567af584510edd9febf62 |
| SHA256 | 7116ff028244a01f3d17f1d3bc2e1506bc9999c2e40e388458f0cccc4e117312 |
| SHA512 | cef609e54c7a81a646ad38dba7ac0b82401b220773b9c792cefac80c6564753229f0c011b34ffb56381dd3154a19aee2bf5f602c4d1af01f2cf0fbc1574e4478 |
memory/2152-278-0x0000000000400000-0x00000000005FF000-memory.dmp
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
| MD5 | 300411cd115386b7fb7cee49906a11a8 |
| SHA1 | e58015f41ed2c150486def165b2646cf5f470738 |
| SHA256 | 9671c529fec90d48dedc179b039e8d2c381676d4f0a26cdef7dff48e1deb0705 |
| SHA512 | 6f1d69d36a19baef8b11edd08ca78000cccd9c03fad1e7cec3a8f0447e11aacbae2560dff1ddf2f656fe926c94c4546942f0371d1f37b468d65e4981c7f3e0a5 |
\Windows\System32\msiexec.exe
| MD5 | a3687b1823456083e1e610da33fe3ae4 |
| SHA1 | ebc5751dafdb0b7e34642b15cab273bf649bc6b8 |
| SHA256 | abee9d6188cc3eb0a87932057dd5eb93dcb4799f3fe699bb4cf3fe81d6d7ba09 |
| SHA512 | e7391f31eb042c38647ff264f115300cb3cb8fff18bc1cadda426334f24abd6ee3bdbd2cdb47ef891bb968a942fa987e53b72fa093e7d444372d78b9059eef5c |
memory/1072-303-0x0000000100000000-0x00000001001FB000-memory.dmp
C:\Windows\system32\msiexec.exe
| MD5 | a3687b1823456083e1e610da33fe3ae4 |
| SHA1 | ebc5751dafdb0b7e34642b15cab273bf649bc6b8 |
| SHA256 | abee9d6188cc3eb0a87932057dd5eb93dcb4799f3fe699bb4cf3fe81d6d7ba09 |
| SHA512 | e7391f31eb042c38647ff264f115300cb3cb8fff18bc1cadda426334f24abd6ee3bdbd2cdb47ef891bb968a942fa987e53b72fa093e7d444372d78b9059eef5c |
memory/2624-305-0x0000000000400000-0x00000000005FF000-memory.dmp
C:\Windows\System32\msiexec.exe
| MD5 | a3687b1823456083e1e610da33fe3ae4 |
| SHA1 | ebc5751dafdb0b7e34642b15cab273bf649bc6b8 |
| SHA256 | abee9d6188cc3eb0a87932057dd5eb93dcb4799f3fe699bb4cf3fe81d6d7ba09 |
| SHA512 | e7391f31eb042c38647ff264f115300cb3cb8fff18bc1cadda426334f24abd6ee3bdbd2cdb47ef891bb968a942fa987e53b72fa093e7d444372d78b9059eef5c |
memory/580-301-0x0000000000400000-0x000000000065B000-memory.dmp
\Windows\System32\msiexec.exe
| MD5 | a3687b1823456083e1e610da33fe3ae4 |
| SHA1 | ebc5751dafdb0b7e34642b15cab273bf649bc6b8 |
| SHA256 | abee9d6188cc3eb0a87932057dd5eb93dcb4799f3fe699bb4cf3fe81d6d7ba09 |
| SHA512 | e7391f31eb042c38647ff264f115300cb3cb8fff18bc1cadda426334f24abd6ee3bdbd2cdb47ef891bb968a942fa987e53b72fa093e7d444372d78b9059eef5c |
memory/2444-299-0x0000000000400000-0x00000000005FF000-memory.dmp
memory/2724-319-0x0000000100000000-0x0000000100209000-memory.dmp
memory/2724-320-0x0000000000540000-0x0000000000749000-memory.dmp
C:\Program Files (x86)\Common Files\microsoft shared\Source Engine\OSE.EXE
| MD5 | 3ccfbf18932df75beb791839ad0942bd |
| SHA1 | e01fe862b98cdba5b545a2ef71828e2cf8194b3f |
| SHA256 | 8a7890fe0dc29613be109577f60a89ae9ae374c8436a0cc3e22da3e21dc93210 |
| SHA512 | 100a76882d919e5573ac241b8545006817fec2907beafc81aede0cbb859a2c69210e6ed993622b46543818e3b091b116fd3035741aa6241169989bbd157c15e9 |
memory/2912-322-0x000000002E000000-0x000000002E20C000-memory.dmp
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
| MD5 | 300411cd115386b7fb7cee49906a11a8 |
| SHA1 | e58015f41ed2c150486def165b2646cf5f470738 |
| SHA256 | 9671c529fec90d48dedc179b039e8d2c381676d4f0a26cdef7dff48e1deb0705 |
| SHA512 | 6f1d69d36a19baef8b11edd08ca78000cccd9c03fad1e7cec3a8f0447e11aacbae2560dff1ddf2f656fe926c94c4546942f0371d1f37b468d65e4981c7f3e0a5 |
memory/2624-333-0x0000000000400000-0x00000000005FF000-memory.dmp
C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE
| MD5 | 63781df2cab3cdbb52faf6e589624a53 |
| SHA1 | ee457ee8a1d1fd85739171359b3b93361e44f387 |
| SHA256 | e75c2eb1f6e4c40d2d27261879d45cc48a074d49f20fe35bb339bc662243ed46 |
| SHA512 | d36c90dd22f311824fc7e243e092ec1ab2009d742bd7dd5e6ca68193eab2aeb6e62bc6b81dc5853da4c1decdf7e4d20d5d6e50b6519681769fb61263c43d3654 |
C:\Windows\SysWOW64\perfhost.exe
| MD5 | 8eb3275c0a43f190db522be949f6d0ec |
| SHA1 | 623bd3c0a4f65bd6ab6b277f2b24726df1637a20 |
| SHA256 | 8ccc87391731806a9caa13f8fb5431b2167c277d4a819ec853e71d775a400f33 |
| SHA512 | 0a3f3f1d0cdb62aa8b066d1b31dd56737df74880acdcecaa07c87343dd07b876f1e32740688400ff90a9c96dc951b1979e93bb6036056d83e272d7222b752b3f |
memory/1768-347-0x0000000140000000-0x000000014013C000-memory.dmp
memory/2960-348-0x0000000000400000-0x00000000005FF000-memory.dmp
memory/3020-349-0x0000000100000000-0x0000000100542000-memory.dmp
\Windows\System32\Locator.exe
| MD5 | bad844ca48e1ba1da420c4c98c3891f4 |
| SHA1 | 80c12badcccdda58d69eaa359a4b96157233736d |
| SHA256 | cb347a9aca7903a0155ee0b7816fa86e07236bc8e494c0f377c22a4a442b1c88 |
| SHA512 | 756cb228eee272bfad61874f8f51df776676873d97779b3bec437dddf16472279ec691da216f47dd8b8cb6a53f485d19e411f37a31997bde7a20635bde5e12fe |
memory/2080-351-0x0000000001000000-0x00000000011ED000-memory.dmp
C:\Windows\System32\Locator.exe
| MD5 | bad844ca48e1ba1da420c4c98c3891f4 |
| SHA1 | 80c12badcccdda58d69eaa359a4b96157233736d |
| SHA256 | cb347a9aca7903a0155ee0b7816fa86e07236bc8e494c0f377c22a4a442b1c88 |
| SHA512 | 756cb228eee272bfad61874f8f51df776676873d97779b3bec437dddf16472279ec691da216f47dd8b8cb6a53f485d19e411f37a31997bde7a20635bde5e12fe |
\Windows\System32\snmptrap.exe
| MD5 | 6154ed78dd41ffca074fe03cf75499ab |
| SHA1 | e8a734ef3949bf12457a3c82926fb9bf511da7ae |
| SHA256 | ff405ed87c9b5f0c79020a89630eaa21e38c99bb8a90f187f039707d469f39ed |
| SHA512 | b28f3781175bd2cf713246ebe79032c2fdc7dfc1540abfc7b30905840684686f81a678b18a43f432ba464584b9fc4f966fc9c27d914d638535d99c1192512fd1 |
C:\Windows\System32\snmptrap.exe
| MD5 | 6154ed78dd41ffca074fe03cf75499ab |
| SHA1 | e8a734ef3949bf12457a3c82926fb9bf511da7ae |
| SHA256 | ff405ed87c9b5f0c79020a89630eaa21e38c99bb8a90f187f039707d469f39ed |
| SHA512 | b28f3781175bd2cf713246ebe79032c2fdc7dfc1540abfc7b30905840684686f81a678b18a43f432ba464584b9fc4f966fc9c27d914d638535d99c1192512fd1 |
memory/1980-372-0x0000000140000000-0x0000000140209000-memory.dmp
memory/2164-373-0x0000000100000000-0x00000001001EC000-memory.dmp
memory/2256-374-0x0000000100000000-0x00000001001ED000-memory.dmp
C:\Windows\System32\vds.exe
| MD5 | 8471cd8961ef992da6c4d51ffe028c9e |
| SHA1 | be1c544a033ef1064a68d6f1ecd3777824764707 |
| SHA256 | 976d65136e27c14081c8c883af73fd274e42915bf974fcb65ea1b2e86fda430c |
| SHA512 | f2f9e746bc88f664da1fa86da94160686a520ffd9e503051add908130010dada9a7a8f8dfe6cdef7adb5d88df795cc9039afbab6db14da8f891d3065dff4eb50 |
\Windows\System32\vds.exe
| MD5 | 8471cd8961ef992da6c4d51ffe028c9e |
| SHA1 | be1c544a033ef1064a68d6f1ecd3777824764707 |
| SHA256 | 976d65136e27c14081c8c883af73fd274e42915bf974fcb65ea1b2e86fda430c |
| SHA512 | f2f9e746bc88f664da1fa86da94160686a520ffd9e503051add908130010dada9a7a8f8dfe6cdef7adb5d88df795cc9039afbab6db14da8f891d3065dff4eb50 |
C:\Windows\System32\VSSVC.exe
| MD5 | de5d837f368a7acb12ae3f7bee296980 |
| SHA1 | 9c0ca21a205dbd382d1d573d0e0d8c1aa4b8f5b0 |
| SHA256 | 9d430c3348de38452feac45a687157949d1a66f545d39af8e9febe423a21dc3e |
| SHA512 | c9ceef96a686856fb80c9d1fba3ce7b9349b5ca9fdaf50064dd97cc17dd8a91756ee461808a734fc31f0f1f55c04cdef1a2420e69d01f52ee5d4afe7f5e08bf8 |
memory/1500-392-0x0000000140000000-0x0000000140205000-memory.dmp
memory/2396-394-0x0000000100000000-0x000000010026B000-memory.dmp
memory/2228-396-0x0000000100000000-0x0000000100219000-memory.dmp
\Windows\System32\wbengine.exe
| MD5 | c85986e7d44001365edbe040b402fe6b |
| SHA1 | 40021c114436a3b3b964e92ee6006e35cba0f2cb |
| SHA256 | 605c85d069d873d860c185fdc91e05f933cd1480fa0bad2c0530e5bdd87e78bf |
| SHA512 | 0ce0aa28d128b1d63f5705b8650184142071433c8ffec7e3d06289f39d4f0c2d8af6c75a857dc74141029a579432139de25b7716d2e0917d40177268ecac62e4 |
C:\Windows\System32\wbengine.exe
| MD5 | c85986e7d44001365edbe040b402fe6b |
| SHA1 | 40021c114436a3b3b964e92ee6006e35cba0f2cb |
| SHA256 | 605c85d069d873d860c185fdc91e05f933cd1480fa0bad2c0530e5bdd87e78bf |
| SHA512 | 0ce0aa28d128b1d63f5705b8650184142071433c8ffec7e3d06289f39d4f0c2d8af6c75a857dc74141029a579432139de25b7716d2e0917d40177268ecac62e4 |
\Windows\System32\wbem\WmiApSrv.exe
| MD5 | bfc3353b3a85ab36f12429b940a172b0 |
| SHA1 | eaf34890851048a522eeea79dabdff0e1a1e95f7 |
| SHA256 | 7d0ccdbf65e11cacf4abad9ea1fad5775970230190674b047dce52bf683ef4db |
| SHA512 | 37543dce5e13d4ed2cb461cb12b33a032613179e1a9792bac152a7059d3a3308f39d9715a3987a1d419823bde9d099b734caa3030770134a027e9353c3f00426 |
C:\Windows\System32\wbem\WmiApSrv.exe
| MD5 | bfc3353b3a85ab36f12429b940a172b0 |
| SHA1 | eaf34890851048a522eeea79dabdff0e1a1e95f7 |
| SHA256 | 7d0ccdbf65e11cacf4abad9ea1fad5775970230190674b047dce52bf683ef4db |
| SHA512 | 37543dce5e13d4ed2cb461cb12b33a032613179e1a9792bac152a7059d3a3308f39d9715a3987a1d419823bde9d099b734caa3030770134a027e9353c3f00426 |
memory/2544-416-0x0000000100000000-0x0000000100202000-memory.dmp
memory/2744-419-0x0000000100000000-0x000000010021B000-memory.dmp
\Program Files\Windows Media Player\wmpnetwk.exe
| MD5 | 95deacf317fafe2e1ed45b8d324dcf7a |
| SHA1 | 4d97c892fe4eafa8a2bb7304abcfa232c703db70 |
| SHA256 | 54bb956802ff9ff1a0219ec127581a55338961c38f9a01d0d12d9751a1af8711 |
| SHA512 | 51819c2a28352859b879c2c34c9ab86379246657eb9de953c99cc04ffb94aaeebb6b5af54ad5accdfb55ad25cba457e7d533bf06e34ce4f9fd95dba79e09403a |
C:\Program Files\Windows Media Player\wmpnetwk.exe
| MD5 | 95deacf317fafe2e1ed45b8d324dcf7a |
| SHA1 | 4d97c892fe4eafa8a2bb7304abcfa232c703db70 |
| SHA256 | 54bb956802ff9ff1a0219ec127581a55338961c38f9a01d0d12d9751a1af8711 |
| SHA512 | 51819c2a28352859b879c2c34c9ab86379246657eb9de953c99cc04ffb94aaeebb6b5af54ad5accdfb55ad25cba457e7d533bf06e34ce4f9fd95dba79e09403a |
\Program Files\Windows Media Player\wmpnetwk.exe
| MD5 | 95deacf317fafe2e1ed45b8d324dcf7a |
| SHA1 | 4d97c892fe4eafa8a2bb7304abcfa232c703db70 |
| SHA256 | 54bb956802ff9ff1a0219ec127581a55338961c38f9a01d0d12d9751a1af8711 |
| SHA512 | 51819c2a28352859b879c2c34c9ab86379246657eb9de953c99cc04ffb94aaeebb6b5af54ad5accdfb55ad25cba457e7d533bf06e34ce4f9fd95dba79e09403a |
memory/2172-436-0x000000002E000000-0x000000002FE1E000-memory.dmp
memory/112-437-0x0000000100000000-0x000000010020A000-memory.dmp
C:\Windows\System32\SearchIndexer.exe
| MD5 | fd677db12091e1306004658684fbe0e2 |
| SHA1 | adc29b9729dfa46b9b22dbff359035e49dbdc85e |
| SHA256 | d5306d49c41b2e076b86b58e56a3ee9d7c47bb08187735aaf0780e039e16cf8d |
| SHA512 | c53c5a647d12c077b90ddd0142393b2a7859117e6955c7f4a29f1cd16ff8537fa26d44165e32f3faabddfe9c426c8280ca61f54179761c43e56e55d3bdecd0d6 |
memory/2428-457-0x0000000140000000-0x000000014020D000-memory.dmp
memory/300-459-0x0000000100000000-0x0000000100123000-memory.dmp
memory/1980-458-0x0000000140000000-0x0000000140209000-memory.dmp
C:\ProgramData\Microsoft\Search\Data\Applications\Windows\MSS.log
| MD5 | 80b878b71b411b285250f5d77e03ded8 |
| SHA1 | 793a99e4843cf613d5b176c34ad2d0e74b2d26ba |
| SHA256 | bf483d543349eacdfdf8988dfd6d08adf9ea017965f9e0d757e783c1bd868d1c |
| SHA512 | 25f311fd427092639ecabc1b30da7b51c7fe9c60cfcfda01dda917c0aee48f0ac6cd6879dc8f9e8ec9422666c8c72681a1815961d651d2d272258a8b3c56c17e |
memory/2724-604-0x0000000100000000-0x0000000100209000-memory.dmp
memory/2724-605-0x0000000000540000-0x0000000000749000-memory.dmp
memory/2912-609-0x000000002E000000-0x000000002E20C000-memory.dmp
memory/1500-612-0x0000000140000000-0x0000000140205000-memory.dmp
memory/3020-644-0x0000000100000000-0x0000000100542000-memory.dmp
memory/2256-680-0x0000000100000000-0x00000001001ED000-memory.dmp
memory/2396-683-0x0000000100000000-0x000000010026B000-memory.dmp
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
| MD5 | 300411cd115386b7fb7cee49906a11a8 |
| SHA1 | e58015f41ed2c150486def165b2646cf5f470738 |
| SHA256 | 9671c529fec90d48dedc179b039e8d2c381676d4f0a26cdef7dff48e1deb0705 |
| SHA512 | 6f1d69d36a19baef8b11edd08ca78000cccd9c03fad1e7cec3a8f0447e11aacbae2560dff1ddf2f656fe926c94c4546942f0371d1f37b468d65e4981c7f3e0a5 |
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
| MD5 | 300411cd115386b7fb7cee49906a11a8 |
| SHA1 | e58015f41ed2c150486def165b2646cf5f470738 |
| SHA256 | 9671c529fec90d48dedc179b039e8d2c381676d4f0a26cdef7dff48e1deb0705 |
| SHA512 | 6f1d69d36a19baef8b11edd08ca78000cccd9c03fad1e7cec3a8f0447e11aacbae2560dff1ddf2f656fe926c94c4546942f0371d1f37b468d65e4981c7f3e0a5 |
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
| MD5 | 300411cd115386b7fb7cee49906a11a8 |
| SHA1 | e58015f41ed2c150486def165b2646cf5f470738 |
| SHA256 | 9671c529fec90d48dedc179b039e8d2c381676d4f0a26cdef7dff48e1deb0705 |
| SHA512 | 6f1d69d36a19baef8b11edd08ca78000cccd9c03fad1e7cec3a8f0447e11aacbae2560dff1ddf2f656fe926c94c4546942f0371d1f37b468d65e4981c7f3e0a5 |
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
| MD5 | 300411cd115386b7fb7cee49906a11a8 |
| SHA1 | e58015f41ed2c150486def165b2646cf5f470738 |
| SHA256 | 9671c529fec90d48dedc179b039e8d2c381676d4f0a26cdef7dff48e1deb0705 |
| SHA512 | 6f1d69d36a19baef8b11edd08ca78000cccd9c03fad1e7cec3a8f0447e11aacbae2560dff1ddf2f656fe926c94c4546942f0371d1f37b468d65e4981c7f3e0a5 |
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
| MD5 | 300411cd115386b7fb7cee49906a11a8 |
| SHA1 | e58015f41ed2c150486def165b2646cf5f470738 |
| SHA256 | 9671c529fec90d48dedc179b039e8d2c381676d4f0a26cdef7dff48e1deb0705 |
| SHA512 | 6f1d69d36a19baef8b11edd08ca78000cccd9c03fad1e7cec3a8f0447e11aacbae2560dff1ddf2f656fe926c94c4546942f0371d1f37b468d65e4981c7f3e0a5 |
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
| MD5 | 300411cd115386b7fb7cee49906a11a8 |
| SHA1 | e58015f41ed2c150486def165b2646cf5f470738 |
| SHA256 | 9671c529fec90d48dedc179b039e8d2c381676d4f0a26cdef7dff48e1deb0705 |
| SHA512 | 6f1d69d36a19baef8b11edd08ca78000cccd9c03fad1e7cec3a8f0447e11aacbae2560dff1ddf2f656fe926c94c4546942f0371d1f37b468d65e4981c7f3e0a5 |
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
| MD5 | 300411cd115386b7fb7cee49906a11a8 |
| SHA1 | e58015f41ed2c150486def165b2646cf5f470738 |
| SHA256 | 9671c529fec90d48dedc179b039e8d2c381676d4f0a26cdef7dff48e1deb0705 |
| SHA512 | 6f1d69d36a19baef8b11edd08ca78000cccd9c03fad1e7cec3a8f0447e11aacbae2560dff1ddf2f656fe926c94c4546942f0371d1f37b468d65e4981c7f3e0a5 |
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
| MD5 | 300411cd115386b7fb7cee49906a11a8 |
| SHA1 | e58015f41ed2c150486def165b2646cf5f470738 |
| SHA256 | 9671c529fec90d48dedc179b039e8d2c381676d4f0a26cdef7dff48e1deb0705 |
| SHA512 | 6f1d69d36a19baef8b11edd08ca78000cccd9c03fad1e7cec3a8f0447e11aacbae2560dff1ddf2f656fe926c94c4546942f0371d1f37b468d65e4981c7f3e0a5 |
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
| MD5 | 300411cd115386b7fb7cee49906a11a8 |
| SHA1 | e58015f41ed2c150486def165b2646cf5f470738 |
| SHA256 | 9671c529fec90d48dedc179b039e8d2c381676d4f0a26cdef7dff48e1deb0705 |
| SHA512 | 6f1d69d36a19baef8b11edd08ca78000cccd9c03fad1e7cec3a8f0447e11aacbae2560dff1ddf2f656fe926c94c4546942f0371d1f37b468d65e4981c7f3e0a5 |
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
| MD5 | 300411cd115386b7fb7cee49906a11a8 |
| SHA1 | e58015f41ed2c150486def165b2646cf5f470738 |
| SHA256 | 9671c529fec90d48dedc179b039e8d2c381676d4f0a26cdef7dff48e1deb0705 |
| SHA512 | 6f1d69d36a19baef8b11edd08ca78000cccd9c03fad1e7cec3a8f0447e11aacbae2560dff1ddf2f656fe926c94c4546942f0371d1f37b468d65e4981c7f3e0a5 |
Analysis: behavioral2
Detonation Overview
Submitted
2023-05-04 18:41
Reported
2023-05-04 18:44
Platform
win10v2004-20230220-en
Max time kernel
151s
Max time network
153s
Command Line
Signatures
DarkCloud
Executes dropped EXE
Reads user/profile data of web browsers
Drops file in System32 directory
| Description | Indicator | Process | Target |
| File opened for modification | C:\Windows\system32\fxssvc.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Windows\System32\SensorDataService.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Windows\System32\snmptrap.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Windows\system32\TieringEngineService.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Windows\system32\AgentService.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Windows\system32\wbengine.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Windows\system32\config\systemprofile\AppData\Roaming\d9360d6ac4600f4c.bin | C:\Windows\System32\alg.exe | N/A |
| File opened for modification | C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Windows\System32\msdtc.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Windows\system32\PerceptionSimulation\PerceptionSimulationService.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Windows\system32\wbem\WmiApSrv.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Windows\system32\dllhost.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Windows\system32\AppVClient.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Windows\system32\msiexec.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Windows\system32\MSDtc\MSDTC.LOG | C:\Windows\System32\msdtc.exe | N/A |
| File opened for modification | C:\Windows\system32\SgrmBroker.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Windows\system32\spectrum.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Windows\system32\vssvc.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Windows\System32\alg.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Windows\system32\locator.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Windows\System32\OpenSSH\ssh-agent.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Windows\System32\vds.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Windows\system32\SearchIndexer.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Windows\SysWow64\perfhost.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
Suspicious use of SetThreadContext
| Description | Indicator | Process | Target |
| PID 2348 set thread context of 1512 | N/A | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe |
Drops file in Program Files directory
| Description | Indicator | Process | Target |
| File opened for modification | C:\Program Files\Java\jre1.8.0_66\bin\kinit.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Program Files\Common Files\microsoft shared\ClickToRun\InspectorOfficeGadget.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Program Files\Common Files\microsoft shared\Source Engine\OSE.EXE | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Program Files\Java\jdk1.8.0_66\bin\javafxpackager.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Program Files\Java\jdk1.8.0_66\bin\jinfo.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Program Files\Java\jdk1.8.0_66\bin\jstatd.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Program Files\Java\jdk1.8.0_66\jre\bin\ssvagent.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Program Files\Java\jre1.8.0_66\bin\jjs.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Program Files\Mozilla Firefox\crashreporter.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Program Files\Java\jdk1.8.0_66\bin\java-rmi.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Program Files\Java\jdk1.8.0_66\bin\javadoc.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Program Files\Java\jdk1.8.0_66\bin\jdb.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Program Files\Java\jdk1.8.0_66\bin\rmid.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Program Files\VideoLAN\VLC\vlc-cache-gen.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroBroker.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Program Files\Java\jdk1.8.0_66\bin\javac.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Program Files\Java\jdk1.8.0_66\bin\jvisualvm.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Program Files\Mozilla Firefox\default-browser-agent.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateComRegisterShell64.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Program Files\Java\jre1.8.0_66\bin\javacpl.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Program Files\Common Files\microsoft shared\ClickToRun\MavInject32.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Program Files\Internet Explorer\ieinstal.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Program Files\Internet Explorer\ielowutil.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Program Files\Java\jdk1.8.0_66\bin\jrunscript.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Program Files\Java\jdk1.8.0_66\bin\policytool.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Program Files\Java\jdk1.8.0_66\bin\unpack200.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Program Files\Java\jdk1.8.0_66\jre\bin\javaw.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroLayoutRecognizer\AcroLayoutRecognizer.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\FullTrustNotifier.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Program Files\Common Files\microsoft shared\ink\TabTip.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Program Files\Internet Explorer\iediagcmd.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Program Files\Java\jre1.8.0_66\bin\jabswitch.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32Info.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\reader_sl.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\wow_helper.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | \??\c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Program Files\Java\jdk1.8.0_66\bin\xjc.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\lib\nbexec64.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Program Files\Java\jre1.8.0_66\bin\ssvagent.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\pi_brokers\64BitMAPIBroker.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleCrashHandler.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Program Files\Java\jdk1.8.0_66\bin\jjs.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Program Files\Java\jdk1.8.0_66\bin\serialver.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVShNotify.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Program Files\Java\jdk1.8.0_66\bin\tnameserv.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Program Files\Java\jre1.8.0_66\bin\pack200.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Program Files (x86)\Mozilla Maintenance Service\Uninstall.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File created | C:\Program Files (x86)\Mozilla Maintenance Service\logs\maintenanceservice.log | C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe | N/A |
| File opened for modification | C:\Program Files\Common Files\microsoft shared\OFFICE16\LICLUA.EXE | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Program Files\Google\Chrome\Application\106.0.5249.119\notification_helper.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Program Files\Java\jdk1.8.0_66\bin\java.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Program Files\Java\jdk1.8.0_66\bin\kinit.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Program Files\Java\jdk1.8.0_66\jre\bin\jabswitch.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Program Files\Java\jdk1.8.0_66\jre\bin\unpack200.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Program Files\Google\Chrome\Application\106.0.5249.119\chrome_pwa_launcher.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Program Files\Java\jdk1.8.0_66\bin\javap.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Program Files\Java\jdk1.8.0_66\bin\wsimport.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\arh.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Program Files\Java\jre1.8.0_66\bin\keytool.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
Drops file in Windows directory
| Description | Indicator | Process | Target |
| File opened for modification | C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
| File opened for modification | C:\Windows\DtcInstall.log | C:\Windows\System32\msdtc.exe | N/A |
Enumerates physical storage devices
Checks SCSI registry key(s)
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 | C:\Windows\system32\spectrum.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 | C:\Windows\system32\spectrum.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName | C:\Windows\system32\spectrum.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A | C:\Windows\system32\spectrum.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C | C:\Windows\system32\spectrum.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\FriendlyName | C:\Windows\system32\spectrum.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C | C:\Windows\system32\spectrum.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A | C:\Windows\System32\SensorDataService.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 | C:\Windows\system32\spectrum.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 | C:\Windows\system32\spectrum.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 | C:\Windows\system32\spectrum.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000 | C:\Windows\system32\spectrum.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000 | C:\Windows\System32\SensorDataService.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A | C:\Windows\System32\SensorDataService.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\FriendlyName | C:\Windows\system32\spectrum.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 | C:\Windows\system32\spectrum.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 | C:\Windows\system32\spectrum.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 | C:\Windows\System32\SensorDataService.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 | C:\Windows\System32\SensorDataService.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 | C:\Windows\System32\SensorDataService.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 | C:\Windows\System32\SensorDataService.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A | C:\Windows\System32\SensorDataService.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C | C:\Windows\System32\SensorDataService.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 | C:\Windows\System32\SensorDataService.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName | C:\Windows\System32\SensorDataService.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A | C:\Windows\System32\SensorDataService.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 | C:\Windows\system32\spectrum.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 | C:\Windows\System32\SensorDataService.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A | C:\Windows\System32\SensorDataService.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 | C:\Windows\System32\SensorDataService.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 | C:\Windows\system32\spectrum.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 | C:\Windows\system32\spectrum.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A | C:\Windows\system32\spectrum.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 | C:\Windows\system32\spectrum.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A | C:\Windows\system32\spectrum.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A | C:\Windows\System32\SensorDataService.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A | C:\Windows\System32\SensorDataService.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 | C:\Windows\System32\SensorDataService.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 | C:\Windows\System32\SensorDataService.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A | C:\Windows\System32\SensorDataService.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C | C:\Windows\System32\SensorDataService.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 | C:\Windows\system32\spectrum.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 | C:\Windows\system32\spectrum.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A | C:\Windows\system32\spectrum.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 | C:\Windows\System32\SensorDataService.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 | C:\Windows\System32\SensorDataService.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A | C:\Windows\system32\spectrum.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A | C:\Windows\system32\spectrum.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 | C:\Windows\System32\SensorDataService.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A | C:\Windows\system32\spectrum.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 | C:\Windows\System32\SensorDataService.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A | C:\Windows\system32\spectrum.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 | C:\Windows\System32\SensorDataService.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C | C:\Windows\System32\SensorDataService.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\FriendlyName | C:\Windows\system32\spectrum.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C | C:\Windows\system32\spectrum.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 | C:\Windows\system32\spectrum.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C | C:\Windows\system32\spectrum.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 | C:\Windows\system32\spectrum.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C | C:\Windows\System32\SensorDataService.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A | C:\Windows\System32\SensorDataService.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 | C:\Windows\System32\SensorDataService.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A | C:\Windows\System32\SensorDataService.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A | C:\Windows\system32\spectrum.exe | N/A |
Checks processor information in registry
| Description | Indicator | Process | Target |
| Key opened | \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 | C:\Windows\system32\TieringEngineService.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz | C:\Windows\system32\TieringEngineService.exe | N/A |
Modifies data under HKEY_USERS
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-124 = "Microsoft Word Macro-Enabled Document" | C:\Windows\system32\SearchProtocolHost.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@C:\Windows\System32\ieframe.dll,-912 = "HTML Document" | C:\Windows\system32\SearchProtocolHost.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32,@elscore.dll,-4 = "Microsoft Simplified Chinese to Traditional Chinese Transliteration" | C:\Windows\system32\SearchIndexer.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@C:\Windows\System32\ieframe.dll,-12385 = "Favorites Bar" | C:\Windows\system32\SearchProtocolHost.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum 64-bit | C:\Windows\system32\SearchFilterHost.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\Multimedia | C:\Windows\system32\SearchFilterHost.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9902 = "Movie Clip" | C:\Windows\system32\SearchProtocolHost.exe | N/A |
| Set value (data) | \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{97E467B4-98C6-4F19-9588-161B7773D6F6} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 0100000000000000809b2314c97ed901 | C:\Windows\system32\SearchProtocolHost.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.svg | C:\Windows\system32\SearchProtocolHost.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@C:\Windows\System32\ieframe.dll,-914 = "SVG Document" | C:\Windows\system32\SearchProtocolHost.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mht | C:\Windows\system32\SearchProtocolHost.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mid | C:\Windows\system32\SearchProtocolHost.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@C:\Windows\System32\ieframe.dll,-10046 = "Internet Shortcut" | C:\Windows\system32\SearchProtocolHost.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached | C:\Windows\system32\SearchProtocolHost.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software | C:\Windows\system32\SearchProtocolHost.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion | C:\Windows\system32\SearchProtocolHost.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-178 = "OpenDocument Presentation" | C:\Windows\system32\SearchProtocolHost.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aifc\OpenWithList | C:\Windows\system32\SearchProtocolHost.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@C:\Windows\System32\wshext.dll,-4803 = "VBScript Encoded Script File" | C:\Windows\system32\SearchProtocolHost.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\MPEG2Demultiplexer | C:\Windows\system32\SearchFilterHost.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@C:\Windows\System32\ieframe.dll,-913 = "MHTML Document" | C:\Windows\system32\SearchProtocolHost.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.html\OpenWithList | C:\Windows\system32\SearchProtocolHost.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9907 = "MIDI Sequence" | C:\Windows\system32\SearchProtocolHost.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32,@elscore.dll,-10 = "Microsoft Hangul Decomposition Transliteration" | C:\Windows\system32\SearchIndexer.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32,@elscore.dll,-3 = "Microsoft Traditional Chinese to Simplified Chinese Transliteration" | C:\Windows\system32\SearchIndexer.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum 64-bit\{E0F158E1-CB04-11D0-BD4E-00A0C911CE86}\Default DirectSound Device | C:\Windows\system32\SearchFilterHost.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts | C:\Windows\system32\SearchProtocolHost.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-114 = "OpenDocument Spreadsheet" | C:\Windows\system32\SearchProtocolHost.exe | N/A |
| Set value (data) | \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{5383EF74-273B-4278-AB0C-CDAA9FD5369E} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 0100000000000000eb75c215c97ed901 | C:\Windows\system32\SearchProtocolHost.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@C:\Windows\system32\wmphoto.dll,-500 = "Windows Media Photo" | C:\Windows\system32\SearchProtocolHost.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-126 = "Microsoft Word Macro-Enabled Template" | C:\Windows\system32\SearchProtocolHost.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32,@elscore.dll,-1 = "Microsoft Language Detection" | C:\Windows\system32\SearchIndexer.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@windows.storage.dll,-21825 = "3D Objects" | C:\Windows\system32\SearchProtocolHost.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie | C:\Windows\system32\SearchFilterHost.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum 64-bit\{4EFE2452-168A-11D1-BC76-00C04FB9453B}\Default MidiOut Device | C:\Windows\system32\SearchFilterHost.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows | C:\Windows\system32\SearchProtocolHost.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My | C:\Windows\system32\SearchFilterHost.exe | N/A |
| Set value (data) | \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{C120DE80-FDE4-49F5-A713-E902EF062B8A} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 0100000000000000dfc75415c97ed901 | C:\Windows\system32\SearchProtocolHost.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.html | C:\Windows\system32\SearchProtocolHost.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-123 = "Microsoft Word Document" | C:\Windows\system32\SearchProtocolHost.exe | N/A |
| Set value (data) | \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{33154C99-BF49-443D-A73C-303A23ABBE97} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 0100000000000000d726b415c97ed901 | C:\Windows\system32\SearchProtocolHost.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mht\OpenWithList | C:\Windows\system32\SearchProtocolHost.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9912 = "Windows Media Audio file" | C:\Windows\system32\SearchProtocolHost.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9925 = "MP3 Format Sound" | C:\Windows\system32\SearchProtocolHost.exe | N/A |
| Set value (data) | \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{A38B883C-1682-497E-97B0-0A3A9E801682} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 0100000000000000a221e412c97ed901 | C:\Windows\system32\SearchProtocolHost.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\Multimedia\ActiveMovie | C:\Windows\system32\SearchFilterHost.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates | C:\Windows\system32\SearchFilterHost.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-180 = "Microsoft PowerPoint 97-2003 Template" | C:\Windows\system32\SearchProtocolHost.exe | N/A |
| Set value (data) | \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{01BE4CFB-129A-452B-A209-F9D40B3B84A5} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 01000000000000003858e214c97ed901 | C:\Windows\system32\SearchProtocolHost.exe | N/A |
| Set value (data) | \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{AEB16279-B750-48F1-8586-97956060175A} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 0100000000000000dd7d0815c97ed901 | C:\Windows\system32\SearchProtocolHost.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@C:\Windows\System32\wshext.dll,-4802 = "VBScript Script File" | C:\Windows\system32\SearchProtocolHost.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-142 = "Microsoft OneNote Table Of Contents" | C:\Windows\system32\SearchProtocolHost.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@fxsresm.dll,-1134 = "Microsoft Routing Extension" | C:\Windows\system32\fxssvc.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.asx | C:\Windows\system32\SearchProtocolHost.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@"C:\Windows\system32\windowspowershell\v1.0\powershell.exe",-105 = "Windows PowerShell XML Document" | C:\Windows\system32\SearchProtocolHost.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mid\OpenWithList | C:\Windows\system32\SearchProtocolHost.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32,@elscore.dll,-2 = "Microsoft Script Detection" | C:\Windows\system32\SearchIndexer.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32,@elscore.dll,-6 = "Microsoft Cyrillic to Latin Transliteration" | C:\Windows\system32\SearchIndexer.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32,@elscore.dll,-8 = "Microsoft Malayalam to Latin Transliteration" | C:\Windows\system32\SearchIndexer.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer | C:\Windows\system32\SearchProtocolHost.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.au | C:\Windows\system32\SearchProtocolHost.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9935 = "MPEG-2 TS Video" | C:\Windows\system32\SearchProtocolHost.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-174 = "Microsoft PowerPoint Presentation" | C:\Windows\system32\SearchProtocolHost.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@C:\Windows\system32\windows.storage.dll,-10152 = "File folder" | C:\Windows\system32\SearchProtocolHost.exe | N/A |
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: LoadsDriver
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe | N/A |
Suspicious use of WriteProcessMemory
Uses Volume Shadow Copy service COM API
Processes
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe
"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe"
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe
"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe"
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe
"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.29310.exe"
C:\Windows\System32\alg.exe
C:\Windows\System32\alg.exe
C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe
C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k NetworkService -p -s TapiSrv
C:\Windows\system32\fxssvc.exe
C:\Windows\system32\fxssvc.exe
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"
C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe
"C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"
C:\Windows\System32\msdtc.exe
C:\Windows\System32\msdtc.exe
\??\c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE
"c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"
C:\Windows\system32\PerceptionSimulation\PerceptionSimulationService.exe
C:\Windows\system32\PerceptionSimulation\PerceptionSimulationService.exe
C:\Windows\SysWow64\perfhost.exe
C:\Windows\SysWow64\perfhost.exe
C:\Windows\system32\locator.exe
C:\Windows\system32\locator.exe
C:\Windows\System32\SensorDataService.exe
C:\Windows\System32\SensorDataService.exe
C:\Windows\System32\snmptrap.exe
C:\Windows\System32\snmptrap.exe
C:\Windows\system32\spectrum.exe
C:\Windows\system32\spectrum.exe
C:\Windows\System32\OpenSSH\ssh-agent.exe
C:\Windows\System32\OpenSSH\ssh-agent.exe
C:\Windows\system32\svchost.exe
C:\Windows\system32\svchost.exe -k LocalService -p -s SharedRealitySvc
C:\Windows\system32\TieringEngineService.exe
C:\Windows\system32\TieringEngineService.exe
C:\Windows\system32\AgentService.exe
C:\Windows\system32\AgentService.exe
C:\Windows\System32\vds.exe
C:\Windows\System32\vds.exe
C:\Windows\system32\vssvc.exe
C:\Windows\system32\vssvc.exe
C:\Windows\system32\wbengine.exe
"C:\Windows\system32\wbengine.exe"
C:\Windows\system32\wbem\WmiApSrv.exe
C:\Windows\system32\wbem\WmiApSrv.exe
C:\Windows\system32\SearchIndexer.exe
C:\Windows\system32\SearchIndexer.exe /Embedding
C:\Windows\system32\SearchProtocolHost.exe
"C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe1_ Global\UsGthrCtrlFltPipeMssGthrPipe1 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon"
C:\Windows\system32\SearchFilterHost.exe
"C:\Windows\system32\SearchFilterHost.exe" 0 912 916 924 8192 920 896
Network
| Country | Destination | Domain | Proto |
| US | 93.184.221.240:80 | tcp | |
| US | 8.8.8.8:53 | 50.23.12.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 206.23.85.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 241.150.49.20.in-addr.arpa | udp |
| NL | 20.190.160.14:443 | tcp | |
| US | 8.8.8.8:53 | 8.3.197.209.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 140.32.126.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 217.106.137.52.in-addr.arpa | udp |
| US | 20.189.173.7:443 | tcp | |
| US | 8.8.8.8:53 | 149.220.183.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 86.8.109.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | pywolwnvd.biz | udp |
| US | 173.231.184.122:80 | pywolwnvd.biz | tcp |
| US | 8.8.8.8:53 | pywolwnvd.biz | udp |
| US | 173.231.184.122:80 | pywolwnvd.biz | tcp |
| US | 8.8.8.8:53 | ssbzmoy.biz | udp |
| US | 8.8.8.8:53 | cvgrf.biz | udp |
| US | 206.191.152.58:80 | cvgrf.biz | tcp |
| US | 8.8.8.8:53 | 122.184.231.173.in-addr.arpa | udp |
| US | 8.8.8.8:53 | npukfztj.biz | udp |
| US | 63.251.106.25:80 | npukfztj.biz | tcp |
| US | 8.8.8.8:53 | przvgke.biz | udp |
| NL | 167.99.35.88:80 | przvgke.biz | tcp |
| US | 8.8.8.8:53 | zlenh.biz | udp |
| US | 8.8.8.8:53 | knjghuig.biz | udp |
| SG | 72.5.161.12:80 | knjghuig.biz | tcp |
| US | 8.8.8.8:53 | 58.152.191.206.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 25.106.251.63.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 88.35.99.167.in-addr.arpa | udp |
| US | 8.8.8.8:53 | ssbzmoy.biz | udp |
| US | 8.8.8.8:53 | cvgrf.biz | udp |
| US | 206.191.152.58:80 | cvgrf.biz | tcp |
| US | 8.8.8.8:53 | uhxqin.biz | udp |
| US | 8.8.8.8:53 | 12.161.5.72.in-addr.arpa | udp |
| AU | 103.224.182.251:80 | uhxqin.biz | tcp |
| US | 8.8.8.8:53 | ww25.uhxqin.biz | udp |
| US | 8.8.8.8:53 | npukfztj.biz | udp |
| US | 63.251.106.25:80 | npukfztj.biz | tcp |
| US | 199.59.243.223:80 | ww25.uhxqin.biz | tcp |
| AU | 103.224.182.251:80 | uhxqin.biz | tcp |
| US | 8.8.8.8:53 | przvgke.biz | udp |
| NL | 167.99.35.88:80 | przvgke.biz | tcp |
| US | 8.8.8.8:53 | zlenh.biz | udp |
| US | 8.8.8.8:53 | knjghuig.biz | udp |
| SG | 72.5.161.12:80 | knjghuig.biz | tcp |
| US | 8.8.8.8:53 | 251.182.224.103.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 223.243.59.199.in-addr.arpa | udp |
| US | 8.8.8.8:53 | anpmnmxo.biz | udp |
| AU | 103.224.182.251:80 | anpmnmxo.biz | tcp |
| US | 8.8.8.8:53 | ww25.anpmnmxo.biz | udp |
| US | 199.59.243.223:80 | ww25.anpmnmxo.biz | tcp |
| US | 8.8.8.8:53 | uhxqin.biz | udp |
| AU | 103.224.182.251:80 | uhxqin.biz | tcp |
| AU | 103.224.182.251:80 | uhxqin.biz | tcp |
| US | 199.59.243.223:80 | ww25.anpmnmxo.biz | tcp |
| US | 8.8.8.8:53 | lpuegx.biz | udp |
| RU | 82.112.184.197:80 | lpuegx.biz | tcp |
| AU | 103.224.182.251:80 | uhxqin.biz | tcp |
| US | 8.8.8.8:53 | anpmnmxo.biz | udp |
| AU | 103.224.182.251:80 | anpmnmxo.biz | tcp |
| US | 199.59.243.223:80 | ww25.anpmnmxo.biz | tcp |
| AU | 103.224.182.251:80 | anpmnmxo.biz | tcp |
| US | 8.8.8.8:53 | lpuegx.biz | udp |
| RU | 82.112.184.197:80 | lpuegx.biz | tcp |
| NL | 173.223.113.164:443 | tcp | |
| US | 204.79.197.203:80 | tcp | |
| RU | 82.112.184.197:80 | lpuegx.biz | tcp |
| RU | 82.112.184.197:80 | lpuegx.biz | tcp |
| US | 8.8.8.8:53 | vjaxhpbji.biz | udp |
| RU | 82.112.184.197:80 | vjaxhpbji.biz | tcp |
| US | 8.8.8.8:53 | vjaxhpbji.biz | udp |
| RU | 82.112.184.197:80 | vjaxhpbji.biz | tcp |
| RU | 82.112.184.197:80 | vjaxhpbji.biz | tcp |
| RU | 82.112.184.197:80 | vjaxhpbji.biz | tcp |
| US | 8.8.8.8:53 | xlfhhhm.biz | udp |
| US | 173.231.189.15:80 | xlfhhhm.biz | tcp |
| US | 8.8.8.8:53 | ifsaia.biz | udp |
| SG | 63.251.126.10:80 | ifsaia.biz | tcp |
| US | 8.8.8.8:53 | udp | |
| N/A | 173.231.184.124:80 | tcp |
Files
memory/2348-133-0x0000000000080000-0x000000000021A000-memory.dmp
memory/2348-134-0x00000000051B0000-0x0000000005754000-memory.dmp
memory/2348-135-0x0000000004C00000-0x0000000004C92000-memory.dmp
memory/2348-136-0x0000000004B70000-0x0000000004B80000-memory.dmp
memory/2348-137-0x0000000005010000-0x000000000501A000-memory.dmp
memory/2348-138-0x0000000004B70000-0x0000000004B80000-memory.dmp
memory/2348-139-0x0000000008880000-0x000000000891C000-memory.dmp
memory/1512-140-0x0000000000400000-0x000000000065B000-memory.dmp
memory/1512-143-0x0000000000400000-0x000000000065B000-memory.dmp
memory/1512-144-0x0000000001340000-0x00000000013A6000-memory.dmp
memory/1512-149-0x0000000001340000-0x00000000013A6000-memory.dmp
memory/1512-154-0x0000000000400000-0x000000000065B000-memory.dmp
C:\Windows\System32\alg.exe
| MD5 | 8de42f360007fa54844332e98e1d2174 |
| SHA1 | 865842e7529f061927d569aaf296480362eafabd |
| SHA256 | b1e1d1d882cf2f8dbf72f1d6ab88f661783b4801059d9abc042f9e4ade34575d |
| SHA512 | faff873be993e5a21798fdb1ef649c343aee0191c44ab19f8848526835772f1d9865153acc73f90cf36dff9c02b429426f2f1506767da44389414b7d1550a5c5 |
memory/4124-157-0x0000000000710000-0x0000000000770000-memory.dmp
memory/4124-163-0x0000000000710000-0x0000000000770000-memory.dmp
C:\Windows\System32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe
| MD5 | c91b32313dd84831e1db3e202c19d981 |
| SHA1 | 7054bc8bad75c962799e6a3a1be3484753f9daca |
| SHA256 | 2749778929d83eb80d6f03b26949f7c5c25628ac66c64c2f7f38c7bd556aa310 |
| SHA512 | 4b499ca1557f5f09ee96e743a90158c7742457f260522461e15f56b47c0e7a8fedc729f2d95c4ddccae3971fbc0493f1fb3e65b2de170ef5ff7e5ffc3624a396 |
memory/2064-169-0x00000000006F0000-0x0000000000750000-memory.dmp
memory/2064-175-0x00000000006F0000-0x0000000000750000-memory.dmp
memory/4124-178-0x0000000140000000-0x0000000140201000-memory.dmp
memory/2064-179-0x0000000140000000-0x0000000140200000-memory.dmp
C:\Windows\System32\FXSSVC.exe
| MD5 | a9cdea84dc5a3324d8e4ced1ca4c188d |
| SHA1 | 21d368d833d92acb896d82a041088514e5f617b4 |
| SHA256 | 7754a1f068cc9ffffd930958581b46eacf5445126bad043cd7f564aa54f266cb |
| SHA512 | 93c7931a39cb5d773be7167b58f3d93eff58bddd920f8a840f5547810ec4898bc45d74e5be7d7da2d18e06e92a1728cad7870ed036bcde29e803a84181d50162 |
memory/2116-181-0x0000000000E60000-0x0000000000EC0000-memory.dmp
memory/2116-187-0x0000000000E60000-0x0000000000EC0000-memory.dmp
memory/2116-189-0x0000000000E60000-0x0000000000EC0000-memory.dmp
memory/2116-192-0x0000000140000000-0x0000000140135000-memory.dmp
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
| MD5 | acdde84eb61d05ad9eb142c3cd045839 |
| SHA1 | 93424013eaacb4b915dc18f1fc39d9ce1dda6fd7 |
| SHA256 | 4bbc019b0a65e7703ae85360148bdd39d5347c79fbc1516d0c3696c61cc174ea |
| SHA512 | ee2b8a4f38f599c439158157601e88727d89401ef58d2fe9a31547f5e43b607f89dcebf6a7e45a51be2bc14db6e95f35b819f361362704323dc2fdf0cdc92171 |
memory/2076-196-0x0000000140000000-0x0000000140237000-memory.dmp
memory/2076-194-0x0000000000E40000-0x0000000000EA0000-memory.dmp
memory/2076-201-0x0000000000E40000-0x0000000000EA0000-memory.dmp
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe
| MD5 | dc5df84f2f341eb756d52d416c25672a |
| SHA1 | 9b68322b63fbef5c3607b085e3f6c4042bbecb26 |
| SHA256 | d6851c67c09a02a54950f830ba3675987038db63f9b0325ae9618c6e77404f67 |
| SHA512 | 70ea351aff6fdaac102865c68d837b2bcb0c849bc48cbc9125aa1d702b158f7835723a028ea5d9e53627711d416ade14d73033b35ff46ab225c618b8849515f2 |
memory/2652-205-0x0000000000190000-0x00000000001F0000-memory.dmp
memory/2652-211-0x0000000000190000-0x00000000001F0000-memory.dmp
C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe
| MD5 | 46ba2c464cf5e7a9c60bb2ff5a5354e6 |
| SHA1 | 8eccf7799a6200fc6af615cc3db1cf7a578cc054 |
| SHA256 | 60c41130b4eae500234d0f1d828a0dce08ade62262ce53a8a69a9bda0cb22493 |
| SHA512 | 859ab843246002203c4438988c28f8c8162692dbaf46b090ee1ea12b73f1e96f41bb9095446e3c859e0d11dbafca4f12f64e217ed29b5caf2c3b4bff7fa22b1a |
memory/1872-215-0x0000000000D10000-0x0000000000D70000-memory.dmp
memory/2652-220-0x0000000140000000-0x000000014022B000-memory.dmp
memory/1872-222-0x0000000140000000-0x0000000140221000-memory.dmp
memory/1872-223-0x0000000000D10000-0x0000000000D70000-memory.dmp
memory/1872-226-0x0000000000D10000-0x0000000000D70000-memory.dmp
memory/1872-229-0x0000000140000000-0x0000000140221000-memory.dmp
C:\Windows\System32\msdtc.exe
| MD5 | 70d36ad73bfcec14501dc8c1b837b968 |
| SHA1 | c40f479d7a465bd0b2f06ba297876e919d719f8b |
| SHA256 | 86541463f910d70fef8caae5037644b8b7bbf62234cab589f3c62e8d0c19eda4 |
| SHA512 | ec2d0de054a8829fd0b6ccb6b629695307622d0bc397a1b73211855c4ef720e497b4c42898077878f787bc56fc869aa564411cb09eca7469bea22c54e83d4558 |
memory/3224-240-0x0000000140000000-0x0000000140210000-memory.dmp
C:\Program Files\Common Files\microsoft shared\Source Engine\OSE.EXE
| MD5 | dcd7a67e87e6114edb1085865f8d775e |
| SHA1 | b2a7ab3b3f236a138a3a758030c88d3af29f79d7 |
| SHA256 | ded42d6e4d800c011b58177d521749c872cc9ed61c953cb8c54204d126afbd82 |
| SHA512 | 9b80cbb087e4cec9a139de25396d8939c6c08038a933630dac220a0a8c2052a79ea3906725774d7770ab172156ea752516bee655ae4ef8847e565fd54232ca8c |
C:\Windows\System32\PerceptionSimulation\PerceptionSimulationService.exe
| MD5 | 6901c175e4321d9f7b8f3bb1f2d3aa09 |
| SHA1 | f8b43ac67148c876d10755b51a4f8c942fabe843 |
| SHA256 | 42db4986f57d66941b2fcaed7615ce114555b83f95607334210eb49514001915 |
| SHA512 | 20a5ed020d8c9749a42c8a0604094bf9fbd3625f162d53ec6efb9368e1b24a5ca172176f4cfb434b55ec40ea0988e8453e7d0ddde86e5f606ab79375ed0ea85c |
C:\Windows\SysWOW64\perfhost.exe
| MD5 | 813db0b56035ec0a4cf3887d71d2c4aa |
| SHA1 | f03217e425ebaee33cf9be638b8c83755733bd47 |
| SHA256 | 22669a2a26859389a1339b872c3a64c45f05e0e621b7691de49c583a0f3cb3f8 |
| SHA512 | 93d97485946fd5c6e50c46ba75573f65b89825eb7e218050fd2d6b71fcf483deda2465c13a5c9e861a8af4fc01ba0a0495ea3572768bff1473c960012f5771ca |
memory/3372-267-0x0000000140000000-0x0000000140226000-memory.dmp
memory/2068-269-0x0000000140000000-0x0000000140202000-memory.dmp
memory/2240-271-0x0000000000400000-0x00000000005EE000-memory.dmp
C:\Windows\System32\Locator.exe
| MD5 | 5a3e3ef62dec5c4fe3ae8bffa321fb75 |
| SHA1 | aeb3d5fc948c444ebf7aeadfdc2d3ad356cb877c |
| SHA256 | b5a644fbcaa08d29784db4eaf710fe8622d6f976327ae9fe24ea6c90f1ad468e |
| SHA512 | e155d1cb8313acc0e56cfecc62c71380688dc75d9f80df949c02b7e97e8139f2c5322cc9040a0dceaecfa87b0b421aa91589dc2d83421335cdbbcb4a977b8231 |
C:\Windows\System32\SensorDataService.exe
| MD5 | 43ffc36193e6ac79623905110158fc27 |
| SHA1 | ef71d136c676e635c0d9bc34c84f2fa34e2ff17e |
| SHA256 | 87348a239d0c9168c9743ebb88cdbc1e5097d235d9e8de1f52ffc05bfde1fe7a |
| SHA512 | b505f3dd4573cac85803fe96962c0f688018519a2fda0ca053ae33d8c689bdfb1ba11ccb7f98072598911d46a21f882e9dd29bfdf28f26c8bf8e7b554d017bb1 |
memory/1804-290-0x0000000140000000-0x00000001401EC000-memory.dmp
memory/4788-293-0x0000000140000000-0x00000001401D7000-memory.dmp
C:\Windows\System32\snmptrap.exe
| MD5 | 942e32bb98fc2ea47af51d8433b4ad53 |
| SHA1 | 001c21c4f8463c55e4985bd19423fb0a2a7e07ac |
| SHA256 | 477bcae3a98f347780b0d5d855b5f0ba1969a97fd83cca5b5a54fa8dba1493ff |
| SHA512 | 605a64ac7f48871972e137a4c90319d1c61a73b8d5d58f47f703adc85340f409076fa1267ef73ef4b5589563cb2ae637f7a7880c45b75e7acdb9bdef42c0d3c6 |
C:\Windows\System32\Spectrum.exe
| MD5 | b19a459f67badaae998ea140d2ee7724 |
| SHA1 | d84b67becb4c88c48f571a381bd562a885848730 |
| SHA256 | 28c841d2f0f7c5934e1bb393eb567e40603ba3d3f8fbf619ed366c1e6917e298 |
| SHA512 | 795471348df8470d5f3b82a257148d22f6f636d35bda514d46447698ca235c3e75d0f3d6d8b41cd2f8e5c316a0b0d14fce04c66ba4b9dc542caf8e650eb7e6e0 |
memory/1116-312-0x0000000140000000-0x00000001401ED000-memory.dmp
memory/4212-314-0x0000000140000000-0x0000000140169000-memory.dmp
C:\Windows\System32\OpenSSH\ssh-agent.exe
| MD5 | 5c868867266cc26eb10fb6a7ce2e7dba |
| SHA1 | 339b005d80b5281b57008ec283b0b084aebf65cc |
| SHA256 | 75b90f127d00b5e51fbc5c862adc1c97b215d8995fd4b6717913bca2d99b7d73 |
| SHA512 | 5a2648854c5fdf6b64d25e0638fc4202f7f78fa9eec11abf3e1ddc2d7ecba806e7f69d8c4176c08bd440578fc39a8930f6a0b74e720b7d2b8834c4f410fd6b75 |
C:\Windows\System32\OpenSSH\ssh-agent.exe
| MD5 | 5c868867266cc26eb10fb6a7ce2e7dba |
| SHA1 | 339b005d80b5281b57008ec283b0b084aebf65cc |
| SHA256 | 75b90f127d00b5e51fbc5c862adc1c97b215d8995fd4b6717913bca2d99b7d73 |
| SHA512 | 5a2648854c5fdf6b64d25e0638fc4202f7f78fa9eec11abf3e1ddc2d7ecba806e7f69d8c4176c08bd440578fc39a8930f6a0b74e720b7d2b8834c4f410fd6b75 |
memory/4620-333-0x0000000140000000-0x0000000140259000-memory.dmp
C:\Windows\System32\TieringEngineService.exe
| MD5 | 88c0a7ab684b302ffe4f68e3e37c4a98 |
| SHA1 | 9f58e001e784688c133f6b01ddc10483b836e638 |
| SHA256 | 82e3980e006350bc21aa661e10b7b3d408c3716c1e7f6cf1526d30a75a33e634 |
| SHA512 | 93ac6534dfd26610be00ff2e3e9a4dbd4d95ef90b756d3ba09a91da2346a9fd8b65af759b1d86a4bc9977af5d30673d71c1911637bab8b78aa7c223785ff550b |
C:\Windows\System32\AgentService.exe
| MD5 | f04bed6f8a5f80ae129fcb931b0d02b1 |
| SHA1 | 8b3e57fac5981828bd626a81ed372c16d553bbc9 |
| SHA256 | 36ca5f14dfe5022ade2470c0b0eb64da9e9a0e3b814f4da498f2d60a0dff41ca |
| SHA512 | cefe6eb98308ae6a9961ee4061c104f73577d0668d42e80e3f58e348ae49b96a1f42398f07ac54618a66e0f2e13eb9d09cb4f52058010258af929265865ffd4c |
memory/2788-356-0x0000000140000000-0x00000001401C0000-memory.dmp
memory/3180-357-0x0000000140000000-0x0000000140239000-memory.dmp
C:\Windows\System32\vds.exe
| MD5 | 936cf284c123b180a42f427262865120 |
| SHA1 | 7f1b41770f01c1f2de6fcb96a61d96e08a708f56 |
| SHA256 | 34065d621bb33cdec51b365eb30510d3efe81d07b078bfd389699badd060a297 |
| SHA512 | d47ebcf1c88ddefbbadc9563317da8a1808b8a2bb4490fc06f205ab963f4542da308593f0e58ad694f2f066b4f7a9f4d5183fe72f727e8c8efe5a00701b59e7b |
C:\Windows\System32\VSSVC.exe
| MD5 | 7e9e01f89238a68ec01091596c3afa94 |
| SHA1 | da02e0f7bc82f2317645ca99dbe0fd3b6a5c662e |
| SHA256 | 76376566c4f9be99426f51a917026e91d9265c4374286e479a401f39aaa497b2 |
| SHA512 | f7fa59f530ad48f1f241367891e5ea72c96dd01693322b696cdaee874e09215681320a056a18e31dd6cddd5076ece7970fe3faae0e38c350486608a4d6365011 |
C:\Windows\System32\wbengine.exe
| MD5 | 73e1c3ee65d2393db9a1d175b6d71233 |
| SHA1 | d23d9cf10e227eae506e32fcc89e0c09d6515428 |
| SHA256 | fb3102739989f9e818275a3f91748bd96b2275c01ea00dadb87d36bd50a7588c |
| SHA512 | 1aa51c38fb52df4805cc0d580c9f52d96ba95516d79e57771d2324d72ce802ea19cb73a1ef77ca0c4bef27f1dc937065f40b5b4be3cea74d0a66d15adb6457d4 |
memory/1512-380-0x0000000000400000-0x000000000065B000-memory.dmp
memory/1468-384-0x0000000140000000-0x0000000140147000-memory.dmp
memory/1884-386-0x0000000140000000-0x00000001401FC000-memory.dmp
memory/4380-389-0x0000000140000000-0x0000000140216000-memory.dmp
C:\Windows\System32\wbem\WmiApSrv.exe
| MD5 | c1210b42987151dcc4158dff83fb5f0b |
| SHA1 | c23a3240345f492d6adc5f0f2e01a7a8de6c0315 |
| SHA256 | a139d3a7db4d5b769b89e5cfa50bf1faac2a41795a05a38cbd6277442832bd9c |
| SHA512 | 5e9c338fc8195ff57696dc13e442f45a48800e14472d43af331a7f4c2f63cca482ba5f6075d97d9b0cffe6c3e64ff66b1bdc49361ae2a7145f4678a4c48e755b |
C:\Windows\System32\SearchIndexer.exe
| MD5 | 49f397e2edb5f439bd27e54fd2937b56 |
| SHA1 | 7ace2b64cc6f0d821efe73354883410002b622d9 |
| SHA256 | c9762fe7afbcdd9ce841b2c898f42ad0ceb4c3d965a82405f8ddc458c20f8ac0 |
| SHA512 | 9c93508bc0976388949df5524e90b7ab46939b35ee746cb011b2f00400da79276b80043780bf01aef5e6fc8fa9613f22e4c2b12919668d38310d740e372a2d0c |
memory/2080-406-0x0000000140000000-0x000000014021D000-memory.dmp
memory/1700-408-0x0000000140000000-0x0000000140179000-memory.dmp
memory/2076-436-0x0000000140000000-0x0000000140237000-memory.dmp
memory/2652-462-0x0000000140000000-0x000000014022B000-memory.dmp
memory/4788-508-0x0000000140000000-0x00000001401D7000-memory.dmp
memory/2240-511-0x0000000000400000-0x00000000005EE000-memory.dmp
memory/4212-536-0x0000000140000000-0x0000000140169000-memory.dmp
memory/1884-576-0x0000000140000000-0x00000001401FC000-memory.dmp
memory/4380-577-0x0000000140000000-0x0000000140216000-memory.dmp
memory/2080-580-0x0000000140000000-0x000000014021D000-memory.dmp
memory/1700-581-0x0000000140000000-0x0000000140179000-memory.dmp
memory/1384-644-0x00000205440D0000-0x00000205440E0000-memory.dmp
memory/1384-650-0x00000205440E0000-0x00000205440E1000-memory.dmp
memory/1384-654-0x0000020544100000-0x0000020544200000-memory.dmp
memory/1384-655-0x0000020544100000-0x0000020544200000-memory.dmp
memory/1384-656-0x0000020544100000-0x0000020544200000-memory.dmp
memory/1384-657-0x0000020544100000-0x0000020544200000-memory.dmp
memory/1384-658-0x0000020544100000-0x0000020544200000-memory.dmp
memory/1384-659-0x0000020544200000-0x0000020544210000-memory.dmp
memory/1384-676-0x0000020544200000-0x0000020544202000-memory.dmp
memory/1384-728-0x00000205440E0000-0x00000205440E1000-memory.dmp
memory/1384-729-0x0000020544100000-0x0000020544200000-memory.dmp
memory/1384-730-0x0000020544100000-0x0000020544200000-memory.dmp
memory/1384-731-0x0000020544100000-0x0000020544200000-memory.dmp
memory/1384-732-0x0000020544100000-0x0000020544200000-memory.dmp
memory/1384-733-0x0000020544100000-0x0000020544200000-memory.dmp
memory/1384-734-0x0000020544200000-0x0000020544210000-memory.dmp