Analysis
-
max time kernel
145s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
25-01-2024 16:03
Static task
static1
Behavioral task
behavioral1
Sample
2088914a799277cf237a85ec33559ced9ed37540ba39a8ad1329f4bef5ecd18a.exe
Resource
win7-20231215-en
General
-
Target
2088914a799277cf237a85ec33559ced9ed37540ba39a8ad1329f4bef5ecd18a.exe
-
Size
1.2MB
-
MD5
9c570d450016d56e5a1bdda735539075
-
SHA1
f369d3186cb38ad6472da7b14e814100356020d1
-
SHA256
2088914a799277cf237a85ec33559ced9ed37540ba39a8ad1329f4bef5ecd18a
-
SHA512
b567f8b216c5bdfd312b833756c29657e49d5a890bb726d4cd37120a8757c9ecbbadc203d60070470e27810b41b7bad2ac8033c1cf960aa66a275c8cc10930e0
-
SSDEEP
24576:JTN9gj3Htgtozpyj4mIexbUSAL2mZ7mzAWbeIYVgOBvWi:JYHyELexbUSCfmzz9YVgY
Malware Config
Signatures
-
Executes dropped EXE 22 IoCs
Processes:
alg.exeDiagnosticsHub.StandardCollector.Service.exefxssvc.exeelevation_service.exeelevation_service.exemaintenanceservice.exemsdtc.exeOSE.EXEPerceptionSimulationService.exeperfhost.exelocator.exeSensorDataService.exesnmptrap.exespectrum.exessh-agent.exeTieringEngineService.exeAgentService.exevds.exevssvc.exewbengine.exeWmiApSrv.exeSearchIndexer.exepid process 808 alg.exe 4468 DiagnosticsHub.StandardCollector.Service.exe 3924 fxssvc.exe 2904 elevation_service.exe 520 elevation_service.exe 4760 maintenanceservice.exe 4784 msdtc.exe 5096 OSE.EXE 3132 PerceptionSimulationService.exe 4676 perfhost.exe 2804 locator.exe 4472 SensorDataService.exe 1924 snmptrap.exe 4596 spectrum.exe 3204 ssh-agent.exe 744 TieringEngineService.exe 3880 AgentService.exe 2208 vds.exe 3200 vssvc.exe 4960 wbengine.exe 3544 WmiApSrv.exe 1752 SearchIndexer.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in System32 directory 37 IoCs
Processes:
2088914a799277cf237a85ec33559ced9ed37540ba39a8ad1329f4bef5ecd18a.exeDiagnosticsHub.StandardCollector.Service.exealg.exemsdtc.exedescription ioc process File opened for modification C:\Windows\system32\dllhost.exe 2088914a799277cf237a85ec33559ced9ed37540ba39a8ad1329f4bef5ecd18a.exe File opened for modification C:\Windows\system32\PerceptionSimulation\PerceptionSimulationService.exe 2088914a799277cf237a85ec33559ced9ed37540ba39a8ad1329f4bef5ecd18a.exe File opened for modification C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe 2088914a799277cf237a85ec33559ced9ed37540ba39a8ad1329f4bef5ecd18a.exe File opened for modification C:\Windows\system32\TieringEngineService.exe 2088914a799277cf237a85ec33559ced9ed37540ba39a8ad1329f4bef5ecd18a.exe File opened for modification C:\Windows\system32\SearchIndexer.exe 2088914a799277cf237a85ec33559ced9ed37540ba39a8ad1329f4bef5ecd18a.exe File opened for modification C:\Windows\system32\AppVClient.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Windows\System32\OpenSSH\ssh-agent.exe 2088914a799277cf237a85ec33559ced9ed37540ba39a8ad1329f4bef5ecd18a.exe File opened for modification C:\Windows\system32\AppVClient.exe alg.exe File opened for modification C:\Windows\system32\SgrmBroker.exe alg.exe File opened for modification C:\Windows\system32\SgrmBroker.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Windows\System32\msdtc.exe 2088914a799277cf237a85ec33559ced9ed37540ba39a8ad1329f4bef5ecd18a.exe File opened for modification C:\Windows\system32\fxssvc.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Windows\system32\SgrmBroker.exe 2088914a799277cf237a85ec33559ced9ed37540ba39a8ad1329f4bef5ecd18a.exe File opened for modification C:\Windows\system32\wbem\WmiApSrv.exe 2088914a799277cf237a85ec33559ced9ed37540ba39a8ad1329f4bef5ecd18a.exe File opened for modification C:\Windows\System32\SensorDataService.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Windows\System32\alg.exe 2088914a799277cf237a85ec33559ced9ed37540ba39a8ad1329f4bef5ecd18a.exe File opened for modification C:\Windows\system32\msiexec.exe 2088914a799277cf237a85ec33559ced9ed37540ba39a8ad1329f4bef5ecd18a.exe File opened for modification C:\Windows\System32\snmptrap.exe 2088914a799277cf237a85ec33559ced9ed37540ba39a8ad1329f4bef5ecd18a.exe File opened for modification C:\Windows\system32\wbengine.exe 2088914a799277cf237a85ec33559ced9ed37540ba39a8ad1329f4bef5ecd18a.exe File opened for modification C:\Windows\system32\dllhost.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Windows\system32\AgentService.exe 2088914a799277cf237a85ec33559ced9ed37540ba39a8ad1329f4bef5ecd18a.exe File opened for modification C:\Windows\System32\vds.exe 2088914a799277cf237a85ec33559ced9ed37540ba39a8ad1329f4bef5ecd18a.exe File opened for modification C:\Windows\system32\vssvc.exe 2088914a799277cf237a85ec33559ced9ed37540ba39a8ad1329f4bef5ecd18a.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Roaming\4717ba501f063bd9.bin alg.exe File opened for modification C:\Windows\system32\AppVClient.exe 2088914a799277cf237a85ec33559ced9ed37540ba39a8ad1329f4bef5ecd18a.exe File opened for modification C:\Windows\system32\fxssvc.exe 2088914a799277cf237a85ec33559ced9ed37540ba39a8ad1329f4bef5ecd18a.exe File opened for modification C:\Windows\SysWow64\perfhost.exe 2088914a799277cf237a85ec33559ced9ed37540ba39a8ad1329f4bef5ecd18a.exe File opened for modification C:\Windows\System32\SensorDataService.exe 2088914a799277cf237a85ec33559ced9ed37540ba39a8ad1329f4bef5ecd18a.exe File opened for modification C:\Windows\system32\dllhost.exe alg.exe File opened for modification C:\Windows\system32\msiexec.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Windows\system32\AgentService.exe alg.exe File opened for modification C:\Windows\system32\AgentService.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Windows\system32\MSDtc\MSDTC.LOG msdtc.exe File opened for modification C:\Windows\system32\locator.exe 2088914a799277cf237a85ec33559ced9ed37540ba39a8ad1329f4bef5ecd18a.exe File opened for modification C:\Windows\system32\spectrum.exe 2088914a799277cf237a85ec33559ced9ed37540ba39a8ad1329f4bef5ecd18a.exe File opened for modification C:\Windows\system32\fxssvc.exe alg.exe File opened for modification C:\Windows\system32\msiexec.exe alg.exe -
Drops file in Program Files directory 64 IoCs
Processes:
2088914a799277cf237a85ec33559ced9ed37540ba39a8ad1329f4bef5ecd18a.exeDiagnosticsHub.StandardCollector.Service.exealg.exedescription ioc process File opened for modification C:\Program Files\Java\jdk-1.8\bin\pack200.exe 2088914a799277cf237a85ec33559ced9ed37540ba39a8ad1329f4bef5ecd18a.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\jp2launcher.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Internet Explorer\iediagcmd.exe 2088914a799277cf237a85ec33559ced9ed37540ba39a8ad1329f4bef5ecd18a.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javaws.exe 2088914a799277cf237a85ec33559ced9ed37540ba39a8ad1329f4bef5ecd18a.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\kinit.exe 2088914a799277cf237a85ec33559ced9ed37540ba39a8ad1329f4bef5ecd18a.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\ssvagent.exe alg.exe File opened for modification C:\Program Files\Mozilla Firefox\crashreporter.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\ktab.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\wsgen.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\notification_helper.exe 2088914a799277cf237a85ec33559ced9ed37540ba39a8ad1329f4bef5ecd18a.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\ktab.exe 2088914a799277cf237a85ec33559ced9ed37540ba39a8ad1329f4bef5ecd18a.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\tnameserv.exe 2088914a799277cf237a85ec33559ced9ed37540ba39a8ad1329f4bef5ecd18a.exe File opened for modification C:\Program Files\Internet Explorer\ieinstal.exe alg.exe File opened for modification C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_77703\java.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jstat.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroBroker.exe 2088914a799277cf237a85ec33559ced9ed37540ba39a8ad1329f4bef5ecd18a.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroLayoutRecognizer\AcroLayoutRecognizer.exe 2088914a799277cf237a85ec33559ced9ed37540ba39a8ad1329f4bef5ecd18a.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Eula.exe 2088914a799277cf237a85ec33559ced9ed37540ba39a8ad1329f4bef5ecd18a.exe File opened for modification C:\Program Files\Mozilla Firefox\crashreporter.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Mozilla Firefox\maintenanceservice_installer.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files (x86)\Internet Explorer\ielowutil.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AdobeCollabSync.exe alg.exe File opened for modification C:\Program Files (x86)\Common Files\Java\Java Update\jucheck.exe alg.exe File opened for modification C:\Program Files (x86)\Internet Explorer\ieinstal.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ShapeCollector.exe alg.exe File opened for modification C:\Program Files\Mozilla Firefox\uninstall\helper.exe alg.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\schemagen.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\orbd.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jabswitch.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jconsole.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jconsole.exe 2088914a799277cf237a85ec33559ced9ed37540ba39a8ad1329f4bef5ecd18a.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jhat.exe 2088914a799277cf237a85ec33559ced9ed37540ba39a8ad1329f4bef5ecd18a.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\jp2launcher.exe 2088914a799277cf237a85ec33559ced9ed37540ba39a8ad1329f4bef5ecd18a.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\keytool.exe 2088914a799277cf237a85ec33559ced9ed37540ba39a8ad1329f4bef5ecd18a.exe File opened for modification C:\Program Files\7-Zip\7zG.exe alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\TabTip.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jjs.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\VideoLAN\VLC\uninstall.exe 2088914a799277cf237a85ec33559ced9ed37540ba39a8ad1329f4bef5ecd18a.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\javacpl.exe alg.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\WCChromeExtn\WCChromeNativeMessagingHost.exe alg.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\wow_helper.exe alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\VSTO\10.0\VSTOInstaller.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\unpack200.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\javaw.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\kinit.exe alg.exe File opened for modification C:\Program Files\Mozilla Firefox\maintenanceservice_installer.exe alg.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe 2088914a799277cf237a85ec33559ced9ed37540ba39a8ad1329f4bef5ecd18a.exe File opened for modification C:\Program Files\dotnet\dotnet.exe 2088914a799277cf237a85ec33559ced9ed37540ba39a8ad1329f4bef5ecd18a.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\idlj.exe 2088914a799277cf237a85ec33559ced9ed37540ba39a8ad1329f4bef5ecd18a.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\policytool.exe 2088914a799277cf237a85ec33559ced9ed37540ba39a8ad1329f4bef5ecd18a.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdate.exe 2088914a799277cf237a85ec33559ced9ed37540ba39a8ad1329f4bef5ecd18a.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe alg.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AdobeCollabSync.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\InputPersonalization.exe 2088914a799277cf237a85ec33559ced9ed37540ba39a8ad1329f4bef5ecd18a.exe File opened for modification C:\Program Files\7-Zip\7z.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\rmid.exe 2088914a799277cf237a85ec33559ced9ed37540ba39a8ad1329f4bef5ecd18a.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\pack200.exe alg.exe File opened for modification C:\Program Files\dotnet\dotnet.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\ktab.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jrunscript.exe alg.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc-cache-gen.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\klist.exe 2088914a799277cf237a85ec33559ced9ed37540ba39a8ad1329f4bef5ecd18a.exe -
Drops file in Windows directory 4 IoCs
Processes:
DiagnosticsHub.StandardCollector.Service.exe2088914a799277cf237a85ec33559ced9ed37540ba39a8ad1329f4bef5ecd18a.exemsdtc.exealg.exedescription ioc process File opened for modification C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe 2088914a799277cf237a85ec33559ced9ed37540ba39a8ad1329f4bef5ecd18a.exe File opened for modification C:\Windows\DtcInstall.log msdtc.exe File opened for modification C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe alg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 64 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
SensorDataService.exespectrum.exedescription ioc process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\FriendlyName SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A SensorDataService.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\FriendlyName spectrum.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\FriendlyName SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C spectrum.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A SensorDataService.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A spectrum.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\FriendlyName spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C spectrum.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
TieringEngineService.exedescription ioc process Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 TieringEngineService.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz TieringEngineService.exe -
Modifies data under HKEY_USERS 64 IoCs
Processes:
SearchFilterHost.exeSearchProtocolHost.exeSearchIndexer.exefxssvc.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum 64-bit SearchFilterHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-172 = "Microsoft PowerPoint 97-2003 Slide Show" SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{C120DE80-FDE4-49F5-A713-E902EF062B8A} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 0100000000000000c8aead20a84fda01 SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9934 = "AVCHD Video" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-102 = "Microsoft Excel Template" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-116 = "Microsoft Excel Template" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@C:\Windows\System32\msxml3r.dll,-1 = "XML Document" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xht SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software SearchFilterHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.DVR-MS\OpenWithList SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32,@elscore.dll,-9 = "Microsoft Bengali to Latin Transliteration" SearchIndexer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@C:\Windows\System32\ieframe.dll,-912 = "HTML Document" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32,@elscore.dll,-1 = "Microsoft Language Detection" SearchIndexer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{F81B1B56-7613-4EE4-BC05-1FAB5DE5C07E} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 01000000000000004a42de1fa84fda01 SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie SearchFilterHost.exe Key created \REGISTRY\USER\.DEFAULT\Software SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@windows.storage.dll,-34583 = "Saved Pictures" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9936 = "QuickTime Movie" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-101 = "Microsoft Excel Worksheet" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32,@elscore.dll,-3 = "Microsoft Traditional Chinese to Simplified Chinese Transliteration" SearchIndexer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@C:\Windows\System32\Windows.UI.Immersive.dll,-38304 = "Public Account Pictures" SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{33154C99-BF49-443D-A73C-303A23ABBE97} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 0100000000000000673e3b20a84fda01 SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-114 = "OpenDocument Spreadsheet" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-170 = "Microsoft PowerPoint 97-2003 Presentation" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xht\OpenWithList SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-174 = "Microsoft PowerPoint Presentation" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mid SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@C:\Windows\System32\mshta.exe,-6412 = "HTML Application" SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{97E467B4-98C6-4F19-9588-161B7773D6F6} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 01000000000000009da6c11fa84fda01 SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@C:\Windows\System32\ieframe.dll,-913 = "MHTML Document" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@C:\Windows\system32\notepad.exe,-469 = "Text Document" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@C:\Windows\system32\wmphoto.dll,-500 = "Windows Media Photo" SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{5383EF74-273B-4278-AB0C-CDAA9FD5369E} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 0100000000000000928b4920a84fda01 SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.snd SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE SearchFilterHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Multimedia\ActiveMovie SearchFilterHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-120 = "Microsoft Word 97 - 2003 Document" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My SearchFilterHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32,@elscore.dll,-7 = "Microsoft Devanagari to Latin Transliteration" SearchIndexer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-113 = "Microsoft Excel Binary Worksheet" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@windows.storage.dll,-21825 = "3D Objects" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-123 = "Microsoft Word Document" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.DVR-MS SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{80009818-F38F-4AF1-87B5-EADAB9433E58} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 01000000000000005586c520a84fda01 SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@"C:\Windows\system32\windowspowershell\v1.0\powershell.exe",-103 = "Windows PowerShell Script" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@C:\Windows\System32\ieframe.dll,-10046 = "Internet Shortcut" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32,@elscore.dll,-8 = "Microsoft Malayalam to Latin Transliteration" SearchIndexer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9914 = "Windows Media Audio/Video file" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@C:\Windows\System32\acppage.dll,-6002 = "Windows Batch File" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE SearchFilterHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@C:\Program Files\Common Files\system\wab32res.dll,-10100 = "Contacts" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.htm\OpenWithList SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{1E589E9D-8A8D-46D9-A2F9-E6D4F8161EE9} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 01000000000000004314e31fa84fda01 SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{5985FC23-2588-4D9A-B38B-7E7AFFAB3155} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 0100000000000000ef9f3d20a84fda01 SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.snd\OpenWithList SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@fxsresm.dll,-1134 = "Microsoft Routing Extension" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32,@elscore.dll,-4 = "Microsoft Simplified Chinese to Traditional Chinese Transliteration" SearchIndexer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-121 = "Microsoft Word 97 - 2003 Template" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum 64-bit\{4EFE2452-168A-11D1-BC76-00C04FB9453B}\Default MidiOut Device SearchFilterHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mhtml SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@fxsresm.dll,-1133 = "Print" fxssvc.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
Processes:
DiagnosticsHub.StandardCollector.Service.exepid process 4468 DiagnosticsHub.StandardCollector.Service.exe 4468 DiagnosticsHub.StandardCollector.Service.exe 4468 DiagnosticsHub.StandardCollector.Service.exe 4468 DiagnosticsHub.StandardCollector.Service.exe 4468 DiagnosticsHub.StandardCollector.Service.exe 4468 DiagnosticsHub.StandardCollector.Service.exe 4468 DiagnosticsHub.StandardCollector.Service.exe -
Suspicious behavior: LoadsDriver 2 IoCs
Processes:
pid process 660 660 -
Suspicious use of AdjustPrivilegeToken 41 IoCs
Processes:
2088914a799277cf237a85ec33559ced9ed37540ba39a8ad1329f4bef5ecd18a.exefxssvc.exeTieringEngineService.exeAgentService.exevssvc.exewbengine.exeSearchIndexer.exealg.exeDiagnosticsHub.StandardCollector.Service.exedescription pid process Token: SeTakeOwnershipPrivilege 1728 2088914a799277cf237a85ec33559ced9ed37540ba39a8ad1329f4bef5ecd18a.exe Token: SeAuditPrivilege 3924 fxssvc.exe Token: SeRestorePrivilege 744 TieringEngineService.exe Token: SeManageVolumePrivilege 744 TieringEngineService.exe Token: SeAssignPrimaryTokenPrivilege 3880 AgentService.exe Token: SeBackupPrivilege 3200 vssvc.exe Token: SeRestorePrivilege 3200 vssvc.exe Token: SeAuditPrivilege 3200 vssvc.exe Token: SeBackupPrivilege 4960 wbengine.exe Token: SeRestorePrivilege 4960 wbengine.exe Token: SeSecurityPrivilege 4960 wbengine.exe Token: 33 1752 SearchIndexer.exe Token: SeIncBasePriorityPrivilege 1752 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1752 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1752 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1752 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1752 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1752 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1752 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1752 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1752 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1752 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1752 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1752 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1752 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1752 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1752 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1752 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1752 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1752 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1752 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1752 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1752 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1752 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1752 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1752 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1752 SearchIndexer.exe Token: SeDebugPrivilege 808 alg.exe Token: SeDebugPrivilege 808 alg.exe Token: SeDebugPrivilege 808 alg.exe Token: SeDebugPrivilege 4468 DiagnosticsHub.StandardCollector.Service.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
SearchIndexer.exedescription pid process target process PID 1752 wrote to memory of 1576 1752 SearchIndexer.exe SearchProtocolHost.exe PID 1752 wrote to memory of 1576 1752 SearchIndexer.exe SearchProtocolHost.exe PID 1752 wrote to memory of 4716 1752 SearchIndexer.exe SearchFilterHost.exe PID 1752 wrote to memory of 4716 1752 SearchIndexer.exe SearchFilterHost.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\2088914a799277cf237a85ec33559ced9ed37540ba39a8ad1329f4bef5ecd18a.exe"C:\Users\Admin\AppData\Local\Temp\2088914a799277cf237a85ec33559ced9ed37540ba39a8ad1329f4bef5ecd18a.exe"1⤵
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1728
-
C:\Windows\System32\alg.exeC:\Windows\System32\alg.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:808
-
C:\Windows\system32\fxssvc.exeC:\Windows\system32\fxssvc.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3924
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s TapiSrv1⤵PID:1176
-
C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exeC:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4468
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵
- Executes dropped EXE
PID:2904
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"1⤵
- Executes dropped EXE
PID:520
-
C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"1⤵
- Executes dropped EXE
PID:4760
-
C:\Windows\System32\msdtc.exeC:\Windows\System32\msdtc.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
PID:4784
-
\??\c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"1⤵
- Executes dropped EXE
PID:5096
-
C:\Windows\system32\PerceptionSimulation\PerceptionSimulationService.exeC:\Windows\system32\PerceptionSimulation\PerceptionSimulationService.exe1⤵
- Executes dropped EXE
PID:3132
-
C:\Windows\SysWow64\perfhost.exeC:\Windows\SysWow64\perfhost.exe1⤵
- Executes dropped EXE
PID:4676
-
C:\Windows\System32\SensorDataService.exeC:\Windows\System32\SensorDataService.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
PID:4472
-
C:\Windows\System32\OpenSSH\ssh-agent.exeC:\Windows\System32\OpenSSH\ssh-agent.exe1⤵
- Executes dropped EXE
PID:3204
-
C:\Windows\system32\TieringEngineService.exeC:\Windows\system32\TieringEngineService.exe1⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
PID:744
-
C:\Windows\system32\AgentService.exeC:\Windows\system32\AgentService.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3880
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3200
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4960
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵
- Executes dropped EXE
PID:3544
-
C:\Windows\system32\SearchIndexer.exeC:\Windows\system32\SearchIndexer.exe /Embedding1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Windows\system32\SearchProtocolHost.exe"C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe1_ Global\UsGthrCtrlFltPipeMssGthrPipe1 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon"2⤵
- Modifies data under HKEY_USERS
PID:1576 -
C:\Windows\system32\SearchFilterHost.exe"C:\Windows\system32\SearchFilterHost.exe" 0 912 916 924 8192 920 8962⤵
- Modifies data under HKEY_USERS
PID:4716
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵
- Executes dropped EXE
PID:2208
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s SharedRealitySvc1⤵PID:4692
-
C:\Windows\system32\spectrum.exeC:\Windows\system32\spectrum.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
PID:4596
-
C:\Windows\System32\snmptrap.exeC:\Windows\System32\snmptrap.exe1⤵
- Executes dropped EXE
PID:1924
-
C:\Windows\system32\locator.exeC:\Windows\system32\locator.exe1⤵
- Executes dropped EXE
PID:2804
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exeFilesize
344KB
MD5d767f95304499e879d23152e34ca2a20
SHA151ec827b2d7bb595632d06f7862a664021797684
SHA25687ffd8bd5103d6689c8f41d29562452ab0e30ac696a4957f128c40ddfe5c91cf
SHA512d2efa5465ec2accc3efe7f50388666b531b06049eec4372e74d323d42c4c121ceef458dc786e331df7087e89ea7dd5a71d417a6db2b015aec2371a8d42a127a2
-
C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exeFilesize
271KB
MD52f073d5063e8875dc0d6dbaf1903c2a5
SHA1ee63347867b6ef3860510f55a751b8ad9911825e
SHA256911d34b370bf93b98e32a1a1a1af93a418e409af7a249d80f990574ce626d118
SHA512beed9d70d204246d87b4ed4962ced0b70655c3be1d46af396b7d8b1d3e4f2d014c073f4b505ff94c90be7e913882a07bdd3773eb2a19694e5aefa76091929f68
-
C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exeFilesize
260KB
MD528110b1d3674d0a843deda64774c3b96
SHA176bbc2e7c11e6d5c31be632ed54e88346ec179fd
SHA25687624b017f0c1795508f4cc32ea504a706e17e63f3d6ead87814e7f147d7eb04
SHA512510226d1875e391ba59d63f303724f1e57a606931ea94d17bf0846b331a9beafb49fa0cb8b6b2b0c1fa915fb729690d9b4babeaa6ec9effdf11c8519e807ca7c
-
C:\Program Files\7-Zip\7z.exeFilesize
298KB
MD53585cdb6440146703d92112323ff7807
SHA1539d7a9424d5e2ab66a598b2533bb5e81ec914b5
SHA2562593e97684b328bf2e40bae63e4bc79e54d74f2673a593601a41053a438508f9
SHA5123bd73fe51f416429b1b4a926151a0e02baee1451b8e72c6e3bd3a12ecf2a6d44d9f8a935be253d46bba7c525bee4057d38f0e1178ea5fb4fa3e8b9ceb45fd43d
-
C:\Program Files\7-Zip\7zFM.exeFilesize
238KB
MD5069e3302d3b748f1ed9334c2fa852642
SHA1c623ac6d2ed925f4e7e276db2951591ec21cb10f
SHA256ce6f2c12cb7023e55398b17545c7b240772fc46bbe33c132956d870fee1a6663
SHA512638c8a97a22ad2a3907df95a90cdac65c7631d21e2d94de2b7caf285b4a465a48625d34f1e2e5240abd35a90fd6538668c64dcd290b42ee3c5e7686d926582c0
-
C:\Program Files\7-Zip\7zG.exeFilesize
206KB
MD5c7d4454d5e7fce146901ab8d4f6b134b
SHA16f894887547b7319312eacd11a6766d54ede2a82
SHA256c5ac3357c09df7f64f25c326f40af232bb18e4a4c34bac34f4e1838648abaab0
SHA512aa6e9339c0a474c3e8efb0dadfbb7a86e04b81dadc9d54f8c9e549b55e3bda5f6c34e1851ba7803cc4e51ba6c90caee2c6017bfce485a707fdd0896de0858f86
-
C:\Program Files\7-Zip\Uninstall.exeFilesize
311KB
MD5687f1f74645aa4220922c379d40b92f7
SHA1ac4873104ca55e6c36800adb68c1ecbca93ba67d
SHA2568426254e0a234b62ac0dba682163b93f551f044712bf996e72fe5403dab6ca4b
SHA512324c4cd64158163da798ea2cd334001a0d6658c2fb3d266032d75f3b4d45beb53c3cead1651aa73d3a4a64ab92f7c98d0bc203308772e6d326efb6567ab1dc55
-
C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVShNotify.exeFilesize
126KB
MD5bd2810e46061b8a0a736f7dbc804f552
SHA135e51bc050dee7214eb906c2b247ecd98746c026
SHA2569694eed824759c842b5c63eec8fdc3f4c0cbbda4ac40544c28e9952aaf5499f8
SHA512c59ca73e0ab5952bcb7f94ae37ea17a24a35cc79159263e87b104859aac512c35754790d8cb8ac8afd67373b6e1cb16f34611bd448bf06e094f418947739748f
-
C:\Program Files\Common Files\microsoft shared\ClickToRun\IntegratedOffice.exeFilesize
314KB
MD59c0a069f8f62b760be39697a4cbef91f
SHA1f20bfaa9a59b9be871fb4676bb111fd03c32c8ba
SHA2562e407da1fbb71d2fcc32e5b07c9b5028c0acc612e97864d100089336f4f8687a
SHA51232fd1ba3873bf159f71c6877ff446bcb7f3b71bb0ef47ad93ce9a00a6c6857281a791f51bac2f669a024373378f9b4a2410eddf9cb3daa9168b2c9df8906b3c1
-
C:\Program Files\Common Files\microsoft shared\ClickToRun\MavInject32.exeFilesize
160KB
MD5b3a76b3f52b559c8ff77d5745a817f2e
SHA1a5f943e23dcd3ef371995595a04345075800ea40
SHA25611c7d7a45434344fa1f5a5c568e9f9385d38699d46ab353b0a9a8dd4144b1212
SHA512028d43dcc2ae1262fae7be5c6cb7ca1dd66ea6cacf932e2b3204d0b5c85e2ac4cef4dfc2af3c8fd81c52866a3563423557e602267637c4ca2042964214e56fe9
-
C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeC2RClient.exeFilesize
23KB
MD54fc605cd0c1ce715763c79790e52628f
SHA1b4563baf18dc4d52127163adb95483f480f3db8f
SHA2565829921de83d519d0a8daadfa9182de8dc3ea41d5583af7e0a4b64651f990a0e
SHA512056a2690c2b985ee0241c3f8c846191c8d2e9f3fbc0fbe19e4b64640304dac0d562341a592ab0a9c9a63291a5d39f3d1c88e67009153bffd2102fde627e54513
-
C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exeFilesize
249KB
MD5f48e71da57bf8c5e919d1df1a1cf4df9
SHA19f0fc0f17109d8e9d0fbe0c2525615e2a1484205
SHA256904d6f0d9c819ef402de75b0784199d4f2eab7d04e888247a399379e2576389e
SHA512c49789eb7b6710da3d127d509f5c2e18d44abe44e5c41fd8e3f69cadf2717401b172b3ea7b6cb5350703ea4fffa9e4c9d03b1bd54585b42917cb986ada6f9865
-
C:\Program Files\Common Files\microsoft shared\OFFICE16\LICLUA.EXEFilesize
85KB
MD5817e807a3946581366e9c2bf28244ecf
SHA1a6ac7d48663044b1cb448943275638647128c5a2
SHA256b78996ccb0083f7a152cc8fc27b504dec80bec57e92c5fbade528ee9e1db360e
SHA512c8ad49c082a1c75856ef016ee071a76e299d366683fb8561895236ec84b17b6fe20f89f216d7da50889cafda945d67d37a33d6ff1bdfacd6437df3c5d2bc4ba6
-
C:\Program Files\Common Files\microsoft shared\Source Engine\OSE.EXEFilesize
155KB
MD517b9f8970ba7899dee880aaa349eb915
SHA100ea8a4a21a396f71c6b58e213419f0558869764
SHA256632d4f8e42bb09c663e350b0682ad170d27413b3bb322998d7e61fa2fe7217ab
SHA512962282cf02afcaeede9ba5f8c1d7b62bef975326b8f1eb9d4d467bf4e377a217b2304141fad5990459639d3469a4fdee07d5a99c83fa666cbff499f19db5a72d
-
C:\Program Files\Common Files\microsoft shared\VSTO\10.0\VSTOInstaller.exeFilesize
28KB
MD5449c5e501d9e38052ef53913809c1556
SHA130752a5bfcfb1a5e2f5d0828f49ed07471b3d174
SHA256b4547a8cf49d012d7d0e5b58e5d75bc63d7a7ca8e2fa1e03954c303458c69907
SHA5122201d11df20988b22e7b05196513cea52d5aa41288825b16447412de6c870095fd537ffce5eaa86ad2c7862c08e2d08a8a97ace1c76e8f5868a6657c24fb2f1e
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\chrmstp.exeFilesize
75KB
MD5252a13177360790d3e23977eb6eccf9e
SHA1071cd806e948ea80498bff61e70aba3c264ae7b7
SHA256fd86d8c205a38c5b9bd050ff313b9daa0b2e0b0bc0a87e8d81ce7c2093ced0fa
SHA512cd7c5838efbcc38b3de45a9f130c9f5a37fe4f4229f05f6172856e53c7ed06239ead32c8a3df7c9db7773bda3f18ee2438775d190b2d5b4194a9f5fa4d652d8b
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exeFilesize
61KB
MD51b4bf63b37e0b08768a4796732f149c7
SHA17c2b87401258a4107f2f07815ccbe8289bd3778f
SHA2564abd3e3c459ed617deb15a50bf744f629e6a1ae37dcff5eaaf0feb84005514bf
SHA51222aa60c1c21a14cb5ff6f4a320687b6efd3fac62fc78abafdcb96806baa646e2e821fee518562c1ac1ba0c48be43e4c432bb44f646717da04d4c64090c6119df
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\chrome_pwa_launcher.exeFilesize
71KB
MD52f9ff2182f8266d62ee8cb42791c137a
SHA16fb45a5b0304bd0940c8ebcd0765f718392ca99d
SHA2569bee303304fe4c3d1290fc4ba85e5bf0ce96e300a21846f3cfeb0a0cdfc2915e
SHA51211857edd8a8622993f91b107ec91934ac27867ebc5b30bad22a9f78ffd68a3c9a0a8cde026afbd60eac6aa141f8621f63a1b5d6c0ad4db28b7ca573018780c21
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exeFilesize
431KB
MD5e3a2e1e3ed5aae4e0933123feb98a225
SHA1261dc0c578bb1ca578180fc693bdb3cae5eedb44
SHA256a60287e8be4b78ff23996123300c4477c65e5d0237e6dc18bdc1b324b046b8f4
SHA5128bf0e10f4b0f41dcef30a613b3dcfb088c73f9f06b502488fba5c7738e66b0cc9b159f952847cb534f6934e1b783e4fa9810c9ccaae5575922d8fc16269e31c5
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\notification_helper.exeFilesize
58KB
MD5df907d23869726bc698d6aa10798c476
SHA10a30f64cf5ae075d53280a455ddf1b03298b37b0
SHA256268112e1cabbe33a037888cd1748d41e318f940fb4f7a7586c95583427480338
SHA5120e58b6ec6660b12ddaf1a402ecb8e5d4cc2a9b12e6e8e4051f34d4ef15c55e43b0b46103dcad98197f1548e0ea17866eb0d6658caab0f7f21f48b1240865bb4d
-
C:\Program Files\Google\Chrome\Application\chrome_proxy.exeFilesize
210KB
MD5d2f53f8ed1b7ef16a261874fa84ad614
SHA1a84ff2c45e191acac722a6642b9a9cfe0eb1ad8f
SHA2561b280a1dc271d4d5f20b7038e54d81d83f790d7978944bc1b444d0b081277307
SHA512576fce4ff6a72c4dedd20cfe598ce24d1861084d8329c8349971c0a078b52e6bbfd9a4c167b17b5416244d1f0c2e3b4ac2709d0971501237bdd39c2a0bc11e0c
-
C:\Program Files\Java\jdk-1.8\bin\appletviewer.exeFilesize
92KB
MD5c3f7122a9d4d5330e95e58cb40db29e2
SHA17011443cdf945485b1572c862d389ba531c0f31f
SHA256366a7ce7d51da6d667bec9bcc49cdc6fcb62c09aa2ab4b5b6773925b35b9152b
SHA512806f18a8a2ef8efa99bd83e425b2e4317ad3e8cdf39930cec73f14286935c0ee03ceebae61c1901f5babd2f74747970dd1610e6b02591407b9b874be2282111a
-
C:\Program Files\Java\jdk-1.8\bin\extcheck.exeFilesize
118KB
MD53f3836724c6b6cbe34dc1b6959fa98f9
SHA1a5d2947f7fed67ec55d002699217615223c2e6a5
SHA256ace3687357a683bcf77e7ae0ea6d4b87f936bc371ac187f6d1d617e9105a8da9
SHA512234eb59c52d25a9217921523e468a2f2730878346a0ebfc3bbde99563b1badcb08cccf391109d2c920b88a1fcaeef60cc0bf434775984b6b1adcdc523fae2655
-
C:\Program Files\Java\jdk-1.8\bin\idlj.exeFilesize
71KB
MD5ad9bbf35528423b1bcb05c17538ed43e
SHA18303fcda83d5292682aee62ca15884aa88e9a8bb
SHA256229c7b1f00100facd5664f6475a5e98731ad6dec2140e8d64eaed5cdb16a06f2
SHA5127bf379d62d3f2e5227f8ea2080eb2c1f7a90cba4c6bcb5cbb9b082dd3247982a7a27e1ba1903c6d971aedf75e481b65bc372811c9076e5d413afd118d431bd4f
-
C:\Program Files\Java\jdk-1.8\bin\jabswitch.exeFilesize
73KB
MD580320884c0e849b97f869c4b5b70c6ac
SHA19fe49382e981e95500a21d8cf8918451b70bfbd6
SHA2563220a69d2d9409353f672758a4268fc483b7267d709b197d455b2c765d0116c0
SHA512e9003ba48ab951ce3bb625ed9e9032653a78c279f931f6a311b65fae9810784aa22a8c0401499ded96046a5dfa4577c56fb39cccd0c142f1fcfe3f007934ee50
-
C:\Program Files\Java\jdk-1.8\bin\jar.exeFilesize
116KB
MD5c346d175bf3ffefa619010c04008f8d2
SHA1cc4a6b1d5552d4708274cdeca99290acfb85de96
SHA256ad824a7c6bfe2a50d35c918d1bc0d316f3631632564a7bde83097c6244ca25bb
SHA512691ec8a3e01f8e873ca0b32fc8163832b1487704af51522f308497b0092725411dae6c36bf3f3545d7addb4a3133eff709eff28e5df6bf7d6bfb8afb815bc8c7
-
C:\Program Files\Java\jdk-1.8\bin\jarsigner.exeFilesize
20KB
MD5bcaf8c75614066555ccf817ed2df0938
SHA12364019756a2bee4cfcc2a0f4f28c24b90417cad
SHA2569c8c3bf64717a28f5c9e455f05b1bf54166091f21bd0010ff2e5d4b1dbb730d9
SHA51291e731b32471b9ce0949f12d9985bb85e0afa24d5d42d9e1aabd87606301b1bab938369c3bfcda1b0851c321d8b5c0116bfde69de7bb094a6f30abd059f6f6c5
-
C:\Program Files\Java\jdk-1.8\bin\java-rmi.exeFilesize
34KB
MD57fac1984604f8248834a6e78e88b5f5e
SHA16ba7db0409b9b1b288ce473547989da978f5da9a
SHA2567a38c6602a6fb08b9ec004bd8227d8e49b1ca1e3fef7885292eb1b3f9471b0da
SHA512922f89d660716be5d798b495eff34c75d876577c5fdbe0c0f2ba18131e611a36d153efe0f23dc09c95b9b4c1a30a9f852e054f7c3ae731ab87f3ae5ba0359839
-
C:\Program Files\Java\jdk-1.8\bin\java.exeFilesize
59KB
MD542f16e87964f0226d9c9b962670ccba5
SHA1c296da329ecbd5680704d24b85589f35d17fbeb1
SHA2562c97280251dcab1fef7d8498b6af74b9b5dbf25285a1ed31c56187a2bb9cfb1b
SHA512c69d3169b2b1c2ab1a76e662dc458979af86db7813e07b20d14bb13f62be7da4924dba772419c013c7d274f64bc9e011f64569f3761db698a6c9efb46553012a
-
C:\Program Files\Java\jdk-1.8\bin\javac.exeFilesize
113KB
MD5f9548211da06be634d9b52869c91bc7a
SHA16fea7a5cbdb8317642a3dfc9c325529053cbb25f
SHA256d92be43c80ad45b3bef6ae15e7b6c99597473e0f1ccc9b21f5ba392838c9f0b2
SHA5123a12d0ec290b1625762ec3559aec0d5d9dea5f6bb2813bc02d26cac4db3a766b1aca06f3617562921ddea7bed5b7fb15e6994d54038b06dfb23d5bfd61f4ec7b
-
C:\Program Files\Java\jdk-1.8\bin\javadoc.exeFilesize
64KB
MD5c9fcad01b652dbe9f635d3986e60b200
SHA17fe741fb2e7b76d798dfc8a4025cac625a657cb3
SHA256d41a7cc525cd168c31b0a131858ea5220f3e2d7f0b349af0082f9a1bfd7f863c
SHA5127ac1eaedd05c1e434c8461a6195ce26254961f3f1259bb1af37ffd774bfee78b578eb7356a410a445096fd3664a8bbd6075f30be61ab8c5eda9dd601b7a3de1f
-
C:\Program Files\Java\jdk-1.8\bin\javafxpackager.exeFilesize
29KB
MD5891209df4a3186a3dee74d3d0da4a3f1
SHA1dbff13a33b74d2ddebeda8f6afe232c040013fc4
SHA25611947a496bb4ee390c0a3f5a958b735dec790919f1d2c767faf1373b490ce23e
SHA5129bb23fcdd675b990e91ccc432776029e665790045053af5c787b61565210b5c66f26bb974b0fa96cfeaa816aeb20097dc3a7d5dcaedfdb7065bed404cba72935
-
C:\Program Files\Java\jdk-1.8\bin\javah.exeFilesize
64KB
MD551b35c1e0d17e4ad4c16eef8aba477ab
SHA15d696a16fc2be985c128abb801eb6e7e77a561a3
SHA2567ef9f2000b85b95bb0d34c4162339540c8b3e416c2d306721ee4fc3d39ce52f2
SHA5126185ca5342f51e94cf19e3491692c16350d7ca07111f2c6e29d56fa6e10cec7517e7f4a8067e880fe57390f16e3323b700ee3e86cd5a5566c232a8e4b32a0d3b
-
C:\Program Files\Java\jdk-1.8\bin\javap.exeFilesize
88KB
MD52475ae155a750cbf02b26bfc3be9c454
SHA1d62a754633f91ea3dda63d04414d0f05ac85c2d9
SHA25604c463db53250e95ceb93409b02e951d8419af074ce3f481e7906044ba8928d8
SHA512609437fae6cb2fa982b4474d839e228deb3258288ee666c4573a9986c762d3aa879923bf16ee0bf2a1930f8145fddc1c281f68453ca958a0f1119cdb7d727902
-
C:\Program Files\Java\jdk-1.8\bin\javapackager.exeFilesize
32KB
MD55ec355a796b85d3dc2d7549f42e0166d
SHA1d5fd2c52b291e93a41be5b3e385bffa8c4223117
SHA256468ec6d98ecc848ff913a78712d38419a99aec96fe5a974ffd616115c271db66
SHA512b80cacdc8d18776d4203f53814e93dec53d81a4ff53de6ee611b3e0de7d1a2dc6151da0c5bd657a8f833587ea298e53dbf96d39b1abfae5afa2cc5732e07ac52
-
C:\Program Files\Java\jdk-1.8\bin\javaw.exeFilesize
99KB
MD515d4a83f76d95fd5369418c2439dbece
SHA145bfd20e9d65ad1bdffca1b9153834c60d42f5d5
SHA256202a4f4c7cb2b351bccfd11673fd99bef887936e666e44e18f3edc2c88062444
SHA512c9408b23d740beb0f53db14ebc4460de5e97951842dc8a636aa5d737f4c72e2219e5fd71cc4ca062c67054686fe5d920ce46ae910638543809d30ab057ca24b6
-
C:\Program Files\Java\jdk-1.8\bin\javaws.exeFilesize
77KB
MD589d3e1226e3fbea3dd081ca04bf5cef6
SHA1cb1e9d1928d6a46f7cda8744834f558d712f084c
SHA256a4fbcea911ab30fbe590ad08830ba2bdd42444c54ab51e0b474b29a09476965d
SHA5124c762b1360f4ef2bfac6cb6e023a4b4d610dd27ab03d4815e14f148763774d1bf4dfa61f509fcce99af8e5b9ec463c2d45e087c0253244b602210311f5325591
-
C:\Program Files\Windows Media Player\wmpnetwk.exeFilesize
32KB
MD5859756d5f200edd218b730a0c5325c61
SHA1f23d0babeb655efe7b923082950681bf7568f243
SHA256a3b851f93c6676f86f9846783c952db9f2bb9ab699498bfb751cb4fe241e56e7
SHA512ded0d1fc048851c3b67a9d583faf7ba24898816c7da737b02d1361c87ffb2f691b7e85ad87059ac899b4b108af056ff185e8a6c25135e053b0c6088c63ced720
-
C:\Program Files\dotnet\dotnet.exeFilesize
58KB
MD51cdba84b2101c99be2d83dbc1dc1fc89
SHA10bd8507f894918aee03e9606bb2e658c5487b8bf
SHA2561a6dae7f1b1b1e617e4ee8e262ce36ae3dbbe49143af2e54b92c9ee957e04a0e
SHA512cd8050f02b2d5d6524765ecb49959946cac6a86155c3faad5b606b1f89e7b6e16043c3b25a20fdf4b1849ed960b2b439149e4169042bbc00bd99507c07de1aa2
-
C:\Windows\SysWOW64\perfhost.exeFilesize
416KB
MD55f1151cc6140495ee27689638a3e5011
SHA10cda26456db7e00675bb0ed8741e466b9787a5d2
SHA25629e607f1b3df1342c6f1a6631fd466649c86857cd7e0e5fdd99f8eca73d16acd
SHA512612799ff2135fb04a682593c38bce4c3ada905b4116d1c91d43a149b5b4903075b4317dd88196a97f8a040f133f8c4cc8bb97586d0c869fcbb57cb3a29a2dca7
-
C:\Windows\System32\AgentService.exeFilesize
127KB
MD51791062c9d8225f9b9d0ed9b1ca26e7b
SHA1d50edd95a4bb6c0a7e6b16f75502c5daea026c09
SHA256e2146bb62032e76ce9085e3f2b9841bf8fb502fc655f59c18419b5283d7d94d5
SHA51247eced5df14b3ac1771b9ff794de6ecc72845389cd57bf427ceda485b46ce10d9f64eb664fa91cac9b4ad433edeebfd64fc7909f7f79b9f7d719af0ac5ac04ad
-
C:\Windows\System32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exeFilesize
240KB
MD55e6874bb428e0096c9d00259960bc00c
SHA1519bcf20bc513a5907d895eef2e360f4d40a5fb5
SHA256d7c23d61940d3ea2c178a2f97fa9f21eb10146d11311386eea06f469981397a4
SHA512acb567814f91333333cf2e2c66cfae6a2e93da02654b97a1e9b220f578e4026a00c6c0dc43e83e4ebc3306f720110a8598d7144fe3470d8fda399ebc9676f15b
-
C:\Windows\System32\FXSSVC.exeFilesize
72KB
MD5f8a2a0310054a6fd6c47fb03425c10b9
SHA1198864f4f36698de99984c856b1e144f414a661b
SHA256075a4f71aad99a04573a94082189f731c1af7666d8b59fb4456b04938895955a
SHA5120b2636fb12b3890a62d4a90ec96df1707cd9508da093269744bdbe31b98524162dea1f138bd371d3f2a727dacd83132906e063f651dcf2374583bef9de94be30
-
C:\Windows\System32\Locator.exeFilesize
88KB
MD550b0b091e4a785b71e0d9e336b7b9e4b
SHA18b23db9ad4e8d0d439ec375252ca5e19918e2b80
SHA256717fd1956d472bd741ae6cdb07fa6869c02654ceef44ed5577fc30e24a2b3a3a
SHA512385b1896cf104d8ba24a87d00b3812192c02dc5c779645a5748291114f6c5bd24da0b85a7ced360b53ade1ecff814117cc1071aa51e92d1fb0dd42aaebec03ac
-
C:\Windows\System32\OpenSSH\ssh-agent.exeFilesize
160KB
MD51c4abf9fe24262ff9c847ab2bc9d608d
SHA13fa44eabe11ecc9e766712632ac6baadfcad710b
SHA256545bb8b9340aa491b67a1b240d8ebbe3066db52311601accb4161cf6ac984fa7
SHA512bf2de23fc3c8cb5e75ba6486ef2c042c2ea127e3660b5b0b1d2729b54249145550166e8fce2e3f90e33a78b5b131b0a2c44bd27c2dac9cc4a839a5fa32b2fff9
-
C:\Windows\System32\OpenSSH\ssh-agent.exeFilesize
186KB
MD5bc007c7a09f7f2a88230fc430985939f
SHA1603ea80df44d3b99565db12fc076bcec5017c1d6
SHA2569feb40830f2305fab46d8bad97e0d74156dbd38d2d9d6e26178e3c74b3eb6e0a
SHA512f2d468d2d23a603c24f55c890d1d853563ebcbdce39348a9a655beb3cbe071e3fab5fdfb56f7ea6f48816afe02eea9699cac9a7236a6554b05aab814d56bc0f1
-
C:\Windows\System32\PerceptionSimulation\PerceptionSimulationService.exeFilesize
149KB
MD58962c3b25015769491be225de7b14ac4
SHA14d724028b6b2a06efbea2f71fefde211aee082cb
SHA25676b4ff8e926dfd2015652d5b53c29320599e8b0ca2f02761ffee143269bd1ec7
SHA51248413293f31926ed3d2c282db986f08cf2e8fa455cfa4b2059aaa8b7cb1083cc82e3a5f71b8797197918fe5b6e74acd89804fdfe0a8102061bec89789847c1d5
-
C:\Windows\System32\SearchIndexer.exeFilesize
78KB
MD5a21d6d284fc8b94590215163ad1f2dfa
SHA199323f223f0f318a6c9d1046c249b86ac359f577
SHA256e7830804abd96f9e4eab97aca06483e39caf18d88b462687a1332338a5cac735
SHA51270497c20324d53cc0c51e647b96c48bb89d1de613e54b42d7e3a29ea5768e326ba7dfd053a60788a80c73cf8e46e4a54fb057feebd6a9a5f730f26f7ca22d663
-
C:\Windows\System32\SensorDataService.exeFilesize
88KB
MD55fd41ef345538709b33a59a75872f78e
SHA1c74d7cb444344ff7a282ff4ddf2cabb5aa60e0e9
SHA2561588e794cf57283f9b0e0f9fd514e85dcafc29c1ae53b4b5fc9a1096aaf405f9
SHA512e4b0d1fe1463af067ff7f839d623c701a2cf176fc847ac5a675811783b52ba6433d5e2fb80661cc42ddcebb2ad88788a6eb78f422cdb4f58b6ef19b4d565b14b
-
C:\Windows\System32\Spectrum.exeFilesize
166KB
MD5feb8b019d0b3d01d8a67c08183637b58
SHA1a45cd02be9e4a8389f6065e98176b5ef2d6fbe34
SHA2568aca747dd3d29c1ea375b901546b2b9375089aeef969c156df70314427550690
SHA512421fdaf2eec2447e99c2cba647f18c5a8d38dda6369bf67a16935fe01609962d803d969c0fefaa112f4e5132e0852a87ad43964b81a9c9ffccf439716f4b1d2a
-
C:\Windows\System32\TieringEngineService.exeFilesize
225KB
MD50f3e623b2475fda69bfbbc3922ac1dbc
SHA1c5a2684d28c7f3658be00a6444445ebd6b20cbca
SHA25672f5fdaf814552110154ec5c5b302063543f2abe354eef1cf109210b7890e159
SHA51207dbe8d8b94d03603828b40391eb0aef09ce4db241a11f29e5cc26fba1ab2396f1ad72db3dd4f240ab2e07f4319990ff62d0e43d9687ed480c6be38e70f178d9
-
C:\Windows\System32\VSSVC.exeFilesize
145KB
MD5518ea26616dd157394c8b72dd2e5c1c6
SHA1696f80cdfc06d3e388f27a35d32966115af46e17
SHA256b7be1524ed987385566607b36498961a4ca40b99499c9439ec38f2cfdb3ef086
SHA5129ca915f1868e9a9613db841b108cccff79721eca7ecc21b4f26a4cdb9f636b76ffc5d0c8ac10da9ba0183173e979cbd6487966c0c6b7cfabc2c5a19f6e15b0a9
-
C:\Windows\System32\alg.exeFilesize
330KB
MD5ca2f32431822d19a64a945b3763c6362
SHA11e1391704effa6f35b9764e778bbd9ff0c7422e4
SHA25679236b39cde071628c0114834d50e71edca721ff34fe8ff6dda6dce7658e0421
SHA51201b96c3d6bda8d151325ab8156405a478401dc564d65f3b9f4916499367cd86ac99326bbffc6edd7452b57e0596341c97e81520619dd9582b0f3587feecb669a
-
C:\Windows\System32\msdtc.exeFilesize
288KB
MD5d71ef6d982b4150f40028e804d4c5a6d
SHA102c14cd68211ba8c50f2e4ecbf9f06f9a0526606
SHA25637df3c5b2b778593125ab28c42ba5c6fd702fb76f3332d124c975a5ba55d2b9e
SHA5129f96f899faa833ec245dcae5d0d4fa271954fc1b469a2886decb96aa7b56426fb4c06ea74c373ea56e3659d178a40561a274ff429f91e5d1b70a506023788f44
-
C:\Windows\System32\snmptrap.exeFilesize
57KB
MD55829d9f6fb2ac156f17cfa836860f7ff
SHA14455d102ee0711d65f7750819903c02ac6e73017
SHA256feae8c66b78fa1a3498987dd04aa79c5cacf6a80a8bdecf12004691106d12813
SHA512f89c87cf700ffc46c779c2f6b0555165b71b7d7826c50cd8e5d5db7c4c78e3022cd56c897ae03ae4caf702161258e8923dbf9053a6ba997365b357a13bbeb7bc
-
C:\Windows\System32\vds.exeFilesize
70KB
MD5dca8d2aa0fbc119683d0cfdbf4c7fade
SHA1597158298b791304a6bf53b0d5988d72607f3cf3
SHA25692859c594965b988c6f4788e28c135dbb550c84a3dcb55855844461f295bcee1
SHA512cf63de0adc1f8770871c43ed8bc2ab097293680c12ed69e8ae9130c6abd161b587f6f72623006e80eb419b42248c1a93776899316dd558c08e6eca880a85c383
-
C:\Windows\System32\wbem\WmiApSrv.exeFilesize
61KB
MD5aadca28b20c0adccfbbe34aab3f754da
SHA1a6f7fcb835f11c5a883e0e7effdd40e695932fb9
SHA256222a933329e0e7ae786620cdd472219cec90dde1b879c6ed65ae0be99ab85f09
SHA512a08f486ce81c2009ba8b63bd0a32d3ee1b78ed08a29e7e82373c51ceb67a333390792d1674d9f331bda184ec72b7b240f96267d06c40845058e5867702a872aa
-
C:\Windows\System32\wbengine.exeFilesize
93KB
MD58b6f50f06ea45b602c613f76f74400dd
SHA1fc56648d2eb228578cbd035b52cd77ee58fece2e
SHA2564fc9d62c8770f951878c903bd3bc522c90f6f159f5d69fdb476083054378432b
SHA512db8540fd272e6e0b2f9955021792e5fe9fc2488b0272e7e2eefd727a7ad1e2c6a599e804c7498e2ea608af23b11408920268f46581b2240b9f74ec51057aee6e
-
C:\Windows\system32\AgentService.exeFilesize
146KB
MD5125aa19362e31235e40cb818fabb31fd
SHA11aa870a214bef78e6d7388bfb3a58470a1e81050
SHA25613044839282dd4ec5787d082503b421d6d4198a020954a42c84f0b65f4c12c8d
SHA512a0897be329219e5ecb422c20ffb63e02d752dedc5459247c81fa3723dfeaf2349f7480d35f6f3112111fc26966469f0dd96c6d4fe94a218de2a382a0416fa916
-
C:\Windows\system32\AppVClient.exeFilesize
243KB
MD5147ae5079563fc05a0dd973f3aea3038
SHA108b948b6b81462021c0da04a004c2c64b45e7e0e
SHA2567c271b799e3af37da1b0f39f83a81fd63b9fca1ebbf34d21237750436fc17613
SHA5121710af97380d06a87567088935c525897449a487c427a7ac94a579f632cfc46074d4b5a4cc9e5f790ef5c819814a411dd12df75044424ab6bb990745ba21e2ba
-
C:\Windows\system32\SgrmBroker.exeFilesize
291KB
MD5cef0d3ff34b004a5cb3a07f35c65fc15
SHA1ad1030705b8182327db61c7ec4dc86df82b56095
SHA256a3aa7b75230a5c67dca8a38537be12c74a10c31a228f842b1de5285be518a887
SHA5127ce9d30d30d4dc2aa398be4131f96ac1184ff9b257fc5534898966cdeca4b07920b8fbbd581d6d800a40326b68d571b8897bf12eb81f3b75bddcb4d964d532e7
-
C:\Windows\system32\fxssvc.exeFilesize
121KB
MD5d173ba9bb71dfc247efb5a5052143e9a
SHA14ca41dd6e3b86df9ef894417cd64d1e772466256
SHA256da2722a3cd4ecf5251eae51d2b27c879f852da2352cfdc4178103ba9970c0514
SHA5121c72f7745e11f5444822d33df1da55f64853265203a2e72b8f7036f250c93131a2f13ac843bac9d09c8cf72c57797dd5b73a04fbbe2d3b6e874de79ec582e3ea
-
C:\Windows\system32\msiexec.exeFilesize
374KB
MD50dca639f9bb6ae1a529dcd16bdef36e4
SHA1a4d3f2e004246953710aa8634a17023bbbe9f3b4
SHA25666c3a4b53ba6c4f275f5af6ca3e6aba214ec6bd61e89fdc774c46989eb74d37e
SHA512065533e575fe3c18b938f58f1d5bf36ef0d6c440e81ad49977551867632a2e8b9b471a354454b4c61f285c7c9c0609d51358fb52550fee749413c84e5fae013a
-
C:\odt\office2016setup.exeFilesize
235KB
MD50b2a2d1dfb4fae12ef27bf819ba873b1
SHA14ebe5432de561d4eb74520c0f742570b2663a487
SHA256cbedb95b256a0a15177878847c8e4ca7f35e27fa026f56eb2eec6b2fbba91e5c
SHA5121f1ddf4a4e57608c76291eb1841d400ffcc0ee9a44160e0a5ff021ad426dcbf8112c03fa82acf714cf7c57b50146d9a395c17a9b4ceefda495f99a7975aa820a
-
memory/520-66-0x0000000140000000-0x000000014022B000-memory.dmpFilesize
2.2MB
-
memory/520-70-0x00000000001A0000-0x0000000000200000-memory.dmpFilesize
384KB
-
memory/520-62-0x00000000001A0000-0x0000000000200000-memory.dmpFilesize
384KB
-
memory/520-134-0x0000000140000000-0x000000014022B000-memory.dmpFilesize
2.2MB
-
memory/744-213-0x00000000007F0000-0x0000000000850000-memory.dmpFilesize
384KB
-
memory/744-204-0x0000000140000000-0x00000001400E2000-memory.dmpFilesize
904KB
-
memory/744-272-0x0000000140000000-0x00000001400E2000-memory.dmpFilesize
904KB
-
memory/808-13-0x00000000006F0000-0x0000000000750000-memory.dmpFilesize
384KB
-
memory/808-74-0x0000000140000000-0x00000001400AA000-memory.dmpFilesize
680KB
-
memory/808-19-0x00000000006F0000-0x0000000000750000-memory.dmpFilesize
384KB
-
memory/808-12-0x0000000140000000-0x00000001400AA000-memory.dmpFilesize
680KB
-
memory/1728-7-0x00000000023E0000-0x0000000002447000-memory.dmpFilesize
412KB
-
memory/1728-6-0x00000000023E0000-0x0000000002447000-memory.dmpFilesize
412KB
-
memory/1728-64-0x0000000000400000-0x000000000052E000-memory.dmpFilesize
1.2MB
-
memory/1728-0-0x0000000000400000-0x000000000052E000-memory.dmpFilesize
1.2MB
-
memory/1728-1-0x00000000023E0000-0x0000000002447000-memory.dmpFilesize
412KB
-
memory/1728-493-0x0000000000400000-0x000000000052E000-memory.dmpFilesize
1.2MB
-
memory/1752-295-0x0000000000790000-0x00000000007F0000-memory.dmpFilesize
384KB
-
memory/1752-287-0x0000000140000000-0x0000000140179000-memory.dmpFilesize
1.5MB
-
memory/1924-233-0x0000000140000000-0x0000000140096000-memory.dmpFilesize
600KB
-
memory/1924-174-0x0000000000500000-0x0000000000560000-memory.dmpFilesize
384KB
-
memory/1924-164-0x0000000140000000-0x0000000140096000-memory.dmpFilesize
600KB
-
memory/2208-243-0x0000000000C80000-0x0000000000CE0000-memory.dmpFilesize
384KB
-
memory/2208-235-0x0000000140000000-0x0000000140147000-memory.dmpFilesize
1.3MB
-
memory/2208-487-0x0000000140000000-0x0000000140147000-memory.dmpFilesize
1.3MB
-
memory/2804-144-0x0000000000500000-0x0000000000560000-memory.dmpFilesize
384KB
-
memory/2804-138-0x0000000140000000-0x0000000140095000-memory.dmpFilesize
596KB
-
memory/2804-212-0x0000000000500000-0x0000000000560000-memory.dmpFilesize
384KB
-
memory/2804-202-0x0000000140000000-0x0000000140095000-memory.dmpFilesize
596KB
-
memory/2904-51-0x0000000140000000-0x0000000140237000-memory.dmpFilesize
2.2MB
-
memory/2904-57-0x0000000000D80000-0x0000000000DE0000-memory.dmpFilesize
384KB
-
memory/2904-50-0x0000000000D80000-0x0000000000DE0000-memory.dmpFilesize
384KB
-
memory/2904-121-0x0000000140000000-0x0000000140237000-memory.dmpFilesize
2.2MB
-
memory/2904-58-0x0000000000D80000-0x0000000000DE0000-memory.dmpFilesize
384KB
-
memory/3132-123-0x0000000140000000-0x00000001400AB000-memory.dmpFilesize
684KB
-
memory/3132-185-0x0000000140000000-0x00000001400AB000-memory.dmpFilesize
684KB
-
memory/3132-130-0x0000000000600000-0x0000000000660000-memory.dmpFilesize
384KB
-
memory/3200-256-0x0000000000780000-0x00000000007E0000-memory.dmpFilesize
384KB
-
memory/3200-247-0x0000000140000000-0x00000001401FC000-memory.dmpFilesize
2.0MB
-
memory/3204-190-0x0000000140000000-0x0000000140102000-memory.dmpFilesize
1.0MB
-
memory/3204-200-0x0000000000AE0000-0x0000000000B40000-memory.dmpFilesize
384KB
-
memory/3204-259-0x0000000140000000-0x0000000140102000-memory.dmpFilesize
1.0MB
-
memory/3544-282-0x00000000006A0000-0x0000000000700000-memory.dmpFilesize
384KB
-
memory/3544-275-0x0000000140000000-0x00000001400C6000-memory.dmpFilesize
792KB
-
memory/3880-226-0x0000000000BF0000-0x0000000000C50000-memory.dmpFilesize
384KB
-
memory/3880-219-0x0000000140000000-0x00000001401C0000-memory.dmpFilesize
1.8MB
-
memory/3880-232-0x0000000000BF0000-0x0000000000C50000-memory.dmpFilesize
384KB
-
memory/3880-230-0x0000000140000000-0x00000001401C0000-memory.dmpFilesize
1.8MB
-
memory/3924-46-0x0000000000E60000-0x0000000000EC0000-memory.dmpFilesize
384KB
-
memory/3924-49-0x0000000140000000-0x0000000140135000-memory.dmpFilesize
1.2MB
-
memory/3924-37-0x0000000000E60000-0x0000000000EC0000-memory.dmpFilesize
384KB
-
memory/3924-36-0x0000000140000000-0x0000000140135000-memory.dmpFilesize
1.2MB
-
memory/3924-43-0x0000000000E60000-0x0000000000EC0000-memory.dmpFilesize
384KB
-
memory/4468-32-0x0000000000700000-0x0000000000760000-memory.dmpFilesize
384KB
-
memory/4468-25-0x0000000000700000-0x0000000000760000-memory.dmpFilesize
384KB
-
memory/4468-91-0x0000000140000000-0x00000001400A9000-memory.dmpFilesize
676KB
-
memory/4468-26-0x0000000140000000-0x00000001400A9000-memory.dmpFilesize
676KB
-
memory/4472-217-0x0000000140000000-0x00000001401D7000-memory.dmpFilesize
1.8MB
-
memory/4472-149-0x0000000140000000-0x00000001401D7000-memory.dmpFilesize
1.8MB
-
memory/4472-161-0x00000000006A0000-0x0000000000700000-memory.dmpFilesize
384KB
-
memory/4596-246-0x0000000140000000-0x0000000140169000-memory.dmpFilesize
1.4MB
-
memory/4596-176-0x0000000140000000-0x0000000140169000-memory.dmpFilesize
1.4MB
-
memory/4596-186-0x0000000000730000-0x0000000000790000-memory.dmpFilesize
384KB
-
memory/4676-135-0x0000000000400000-0x0000000000497000-memory.dmpFilesize
604KB
-
memory/4716-540-0x000001A05DC40000-0x000001A05DC50000-memory.dmpFilesize
64KB
-
memory/4716-541-0x000001A05DC70000-0x000001A05DC71000-memory.dmpFilesize
4KB
-
memory/4760-89-0x0000000140000000-0x00000001400CA000-memory.dmpFilesize
808KB
-
memory/4760-83-0x0000000000CD0000-0x0000000000D30000-memory.dmpFilesize
384KB
-
memory/4760-75-0x0000000140000000-0x00000001400CA000-memory.dmpFilesize
808KB
-
memory/4760-76-0x0000000000CD0000-0x0000000000D30000-memory.dmpFilesize
384KB
-
memory/4760-88-0x0000000000CD0000-0x0000000000D30000-memory.dmpFilesize
384KB
-
memory/4784-101-0x0000000000D80000-0x0000000000DE0000-memory.dmpFilesize
384KB
-
memory/4784-92-0x0000000140000000-0x00000001400B9000-memory.dmpFilesize
740KB
-
memory/4784-158-0x0000000140000000-0x00000001400B9000-memory.dmpFilesize
740KB
-
memory/4960-262-0x0000000140000000-0x0000000140216000-memory.dmpFilesize
2.1MB
-
memory/4960-270-0x0000000000BE0000-0x0000000000C40000-memory.dmpFilesize
384KB
-
memory/5096-106-0x0000000140000000-0x00000001400CF000-memory.dmpFilesize
828KB
-
memory/5096-117-0x00000000007B0000-0x0000000000810000-memory.dmpFilesize
384KB
-
memory/5096-172-0x0000000140000000-0x00000001400CF000-memory.dmpFilesize
828KB