Analysis

  • max time kernel
    150s
  • max time network
    142s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    19/02/2024, 13:32

General

  • Target

    2ad8d4b2d22a5ac04ff9251bb152ab4b5894a136a8a28a86e160f2056e5d2eff.exe

  • Size

    1.8MB

  • MD5

    e16cd7909cefbb58eadfd41e044e150b

  • SHA1

    7615c19dadf1ad5560414099233b52963de6158b

  • SHA256

    2ad8d4b2d22a5ac04ff9251bb152ab4b5894a136a8a28a86e160f2056e5d2eff

  • SHA512

    6e526ca13ee53d14b5e66a13cd22b7838ed1fbe3cf8a7a5c4368c03abc052157a22504e163edac0ab03ee5feb6ec1f044372a39e25db69177ead05f657912a9b

  • SSDEEP

    49152:aKJ0WR7AFPyyiSruXKpk3WFDL9zxnSg6ZU6CENlc7dpJLrQWd:aKlBAFPydSS6W6X9lnH69CEN6rV

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 64 IoCs
  • Loads dropped DLL 47 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in System32 directory 18 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2ad8d4b2d22a5ac04ff9251bb152ab4b5894a136a8a28a86e160f2056e5d2eff.exe
    "C:\Users\Admin\AppData\Local\Temp\2ad8d4b2d22a5ac04ff9251bb152ab4b5894a136a8a28a86e160f2056e5d2eff.exe"
    1⤵
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:2268
  • C:\Windows\System32\alg.exe
    C:\Windows\System32\alg.exe
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:2680
  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe
    C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe
    1⤵
    • Executes dropped EXE
    PID:2344
  • C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe
    C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe
    1⤵
    • Executes dropped EXE
    • Drops file in Windows directory
    PID:1636
  • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe
    C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe
    1⤵
    • Executes dropped EXE
    • Drops file in Windows directory
    PID:2092
  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
    C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:340
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1e4 -InterruptEvent 1d0 -NGENProcess 1d4 -Pipe 1e0 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:348
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1dc -InterruptEvent 248 -NGENProcess 250 -Pipe 254 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:1884
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 240 -InterruptEvent 24c -NGENProcess 244 -Pipe 1dc -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2736
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1ec -InterruptEvent 240 -NGENProcess 1d0 -Pipe 238 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2464
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 240 -InterruptEvent 25c -NGENProcess 1e4 -Pipe 1d4 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:348
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 25c -InterruptEvent 260 -NGENProcess 244 -Pipe 248 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:1336
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 260 -InterruptEvent 264 -NGENProcess 1d0 -Pipe 24c -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:3068
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 264 -InterruptEvent 26c -NGENProcess 1e4 -Pipe 268 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2972
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 26c -InterruptEvent 270 -NGENProcess 23c -Pipe 250 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:1308
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 270 -InterruptEvent 244 -NGENProcess 1d0 -Pipe 240 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2692
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 244 -InterruptEvent 274 -NGENProcess 260 -Pipe 1ec -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2248
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 274 -InterruptEvent 278 -NGENProcess 23c -Pipe 25c -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:1372
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 278 -InterruptEvent 27c -NGENProcess 1d0 -Pipe 264 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:1504
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 27c -InterruptEvent 280 -NGENProcess 260 -Pipe 26c -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2308
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 284 -InterruptEvent 278 -NGENProcess 288 -Pipe 27c -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2128
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 278 -InterruptEvent 28c -NGENProcess 260 -Pipe 270 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:1928
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 244 -InterruptEvent 284 -NGENProcess 290 -Pipe 278 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:1672
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 284 -InterruptEvent 294 -NGENProcess 260 -Pipe 280 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:1604
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 298 -InterruptEvent 244 -NGENProcess 29c -Pipe 284 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2676
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 298 -InterruptEvent 23c -NGENProcess 274 -Pipe 260 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:1580
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 23c -InterruptEvent 28c -NGENProcess 244 -Pipe 288 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2888
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 28c -InterruptEvent 244 -NGENProcess 2a0 -Pipe 2a4 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:1372
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 244 -InterruptEvent 1e4 -NGENProcess 294 -Pipe 29c -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2564
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 28c -InterruptEvent 218 -NGENProcess 2ac -Pipe 254 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2380
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 218 -InterruptEvent 2c8 -NGENProcess 244 -Pipe 2c4 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:320
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2c8 -InterruptEvent 2d0 -NGENProcess 2b8 -Pipe 2cc -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:1444
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2d0 -InterruptEvent 2b8 -NGENProcess 28c -Pipe 2d4 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:1288
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2ac -InterruptEvent 218 -NGENProcess 2d8 -Pipe 2d0 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Windows directory
      PID:764
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 218 -InterruptEvent 2b8 -NGENProcess 2d8 -Pipe 2bc -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2392
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2e0 -InterruptEvent 2c8 -NGENProcess 2e4 -Pipe 218 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Windows directory
      PID:1140
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2c8 -InterruptEvent 2e4 -NGENProcess 2b4 -Pipe 2d8 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2952
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2e4 -InterruptEvent 2ec -NGENProcess 2b8 -Pipe 2e8 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Windows directory
      PID:1580
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2f0 -InterruptEvent 2c8 -NGENProcess 2f4 -Pipe 2e4 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2856
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1cc -InterruptEvent 2c8 -NGENProcess 2f0 -Pipe 2b8 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Windows directory
      PID:2564
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2dc -InterruptEvent 2c0 -NGENProcess 2fc -Pipe 1cc -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:348
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 300 -InterruptEvent 2f4 -NGENProcess 2fc -Pipe 2f0 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Windows directory
      PID:2236
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2dc -InterruptEvent 2f8 -NGENProcess 2fc -Pipe 2ec -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2920
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2c8 -InterruptEvent 2e0 -NGENProcess 304 -Pipe 2dc -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Windows directory
      PID:2688
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 25c -InterruptEvent 2b4 -NGENProcess 264 -Pipe 2c8 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:1556
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 26c -InterruptEvent 2b4 -NGENProcess 25c -Pipe 304 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Windows directory
      PID:1824
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2b4 -InterruptEvent 25c -NGENProcess 300 -Pipe 264 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2512
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2f4 -InterruptEvent 25c -NGENProcess 2b4 -Pipe 2fc -Comment "NGen Worker Process"
      2⤵
      • Loads dropped DLL
      • Drops file in Windows directory
      PID:1264
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 25c -InterruptEvent 2b4 -NGENProcess 26c -Pipe 300 -Comment "NGen Worker Process"
      2⤵
        PID:2008
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 244 -InterruptEvent 2f4 -NGENProcess 28c -Pipe 25c -Comment "NGen Worker Process"
        2⤵
        • Loads dropped DLL
        • Drops file in Windows directory
        PID:2764
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2f4 -InterruptEvent 28c -NGENProcess 1e8 -Pipe 26c -Comment "NGen Worker Process"
        2⤵
          PID:304
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
          C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 308 -InterruptEvent 244 -NGENProcess 30c -Pipe 2f4 -Comment "NGen Worker Process"
          2⤵
          • Loads dropped DLL
          • Drops file in Windows directory
          PID:2024
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
          C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 244 -InterruptEvent 30c -NGENProcess 2b4 -Pipe 1e8 -Comment "NGen Worker Process"
          2⤵
            PID:2676
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
            C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 30c -InterruptEvent 314 -NGENProcess 2e0 -Pipe 2f8 -Comment "NGen Worker Process"
            2⤵
            • Loads dropped DLL
            • Drops file in Windows directory
            PID:1880
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
            C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 310 -InterruptEvent 31c -NGENProcess 314 -Pipe 30c -Comment "NGen Worker Process"
            2⤵
              PID:1660
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
              C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 31c -InterruptEvent 2c0 -NGENProcess 244 -Pipe 2b4 -Comment "NGen Worker Process"
              2⤵
              • Loads dropped DLL
              • Drops file in Windows directory
              PID:1540
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
              C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2c0 -InterruptEvent 244 -NGENProcess 310 -Pipe 318 -Comment "NGen Worker Process"
              2⤵
                PID:2684
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 244 -InterruptEvent 324 -NGENProcess 22c -Pipe 2e0 -Comment "NGen Worker Process"
                2⤵
                • Loads dropped DLL
                • Drops file in Windows directory
                PID:1264
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 324 -InterruptEvent 22c -NGENProcess 2c0 -Pipe 308 -Comment "NGen Worker Process"
                2⤵
                  PID:1840
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                  C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 328 -InterruptEvent 320 -NGENProcess 32c -Pipe 324 -Comment "NGen Worker Process"
                  2⤵
                  • Loads dropped DLL
                  • Drops file in Windows directory
                  PID:2596
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                  C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 228 -InterruptEvent 31c -NGENProcess 330 -Pipe 328 -Comment "NGen Worker Process"
                  2⤵
                    PID:2636
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                    C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 28c -InterruptEvent 244 -NGENProcess 334 -Pipe 228 -Comment "NGen Worker Process"
                    2⤵
                    • Loads dropped DLL
                    • Drops file in Windows directory
                    PID:2172
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                    C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 330 -InterruptEvent 2c0 -NGENProcess 334 -Pipe 310 -Comment "NGen Worker Process"
                    2⤵
                      PID:3044
                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 314 -InterruptEvent 32c -NGENProcess 33c -Pipe 330 -Comment "NGen Worker Process"
                      2⤵
                      • Loads dropped DLL
                      • Drops file in Windows directory
                      PID:1560
                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 22c -InterruptEvent 338 -NGENProcess 340 -Pipe 314 -Comment "NGen Worker Process"
                      2⤵
                      • Modifies data under HKEY_USERS
                      PID:1808
                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 320 -InterruptEvent 334 -NGENProcess 344 -Pipe 22c -Comment "NGen Worker Process"
                      2⤵
                        PID:992
                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 31c -InterruptEvent 33c -NGENProcess 348 -Pipe 320 -Comment "NGen Worker Process"
                        2⤵
                          PID:1244
                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                          C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 244 -InterruptEvent 340 -NGENProcess 34c -Pipe 31c -Comment "NGen Worker Process"
                          2⤵
                            PID:1620
                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                            C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2c0 -InterruptEvent 344 -NGENProcess 350 -Pipe 244 -Comment "NGen Worker Process"
                            2⤵
                            • Loads dropped DLL
                            • Drops file in Windows directory
                            PID:2932
                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                            C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 32c -InterruptEvent 348 -NGENProcess 354 -Pipe 2c0 -Comment "NGen Worker Process"
                            2⤵
                            • Loads dropped DLL
                            PID:1872
                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                            C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 348 -InterruptEvent 354 -NGENProcess 34c -Pipe 350 -Comment "NGen Worker Process"
                            2⤵
                              PID:2280
                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                              C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 354 -InterruptEvent 35c -NGENProcess 344 -Pipe 358 -Comment "NGen Worker Process"
                              2⤵
                                PID:2768
                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 33c -InterruptEvent 348 -NGENProcess 360 -Pipe 354 -Comment "NGen Worker Process"
                                2⤵
                                • Modifies data under HKEY_USERS
                                PID:672
                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 348 -InterruptEvent 338 -NGENProcess 344 -Pipe 28c -Comment "NGen Worker Process"
                                2⤵
                                  PID:2772
                                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                  C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 338 -InterruptEvent 364 -NGENProcess 35c -Pipe 34c -Comment "NGen Worker Process"
                                  2⤵
                                    PID:652
                                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                    C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 364 -InterruptEvent 36c -NGENProcess 360 -Pipe 368 -Comment "NGen Worker Process"
                                    2⤵
                                      PID:2948
                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 354 -InterruptEvent 36c -NGENProcess 364 -Pipe 32c -Comment "NGen Worker Process"
                                      2⤵
                                        PID:1676
                                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 344 -InterruptEvent 348 -NGENProcess 374 -Pipe 354 -Comment "NGen Worker Process"
                                        2⤵
                                          PID:2920
                                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                          C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 348 -InterruptEvent 340 -NGENProcess 364 -Pipe 35c -Comment "NGen Worker Process"
                                          2⤵
                                            PID:1580
                                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                            C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 378 -InterruptEvent 344 -NGENProcess 37c -Pipe 348 -Comment "NGen Worker Process"
                                            2⤵
                                              PID:1584
                                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                              C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 344 -InterruptEvent 33c -NGENProcess 364 -Pipe 370 -Comment "NGen Worker Process"
                                              2⤵
                                                PID:2360
                                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 380 -InterruptEvent 378 -NGENProcess 384 -Pipe 344 -Comment "NGen Worker Process"
                                                2⤵
                                                  PID:2128
                                                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                  C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 378 -InterruptEvent 338 -NGENProcess 364 -Pipe 360 -Comment "NGen Worker Process"
                                                  2⤵
                                                    PID:2580
                                                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                    C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 388 -InterruptEvent 380 -NGENProcess 38c -Pipe 378 -Comment "NGen Worker Process"
                                                    2⤵
                                                      PID:672
                                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 380 -InterruptEvent 390 -NGENProcess 364 -Pipe 374 -Comment "NGen Worker Process"
                                                      2⤵
                                                        PID:940
                                                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 36c -InterruptEvent 388 -NGENProcess 394 -Pipe 380 -Comment "NGen Worker Process"
                                                        2⤵
                                                        • Modifies data under HKEY_USERS
                                                        PID:692
                                                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 338 -InterruptEvent 384 -NGENProcess 398 -Pipe 36c -Comment "NGen Worker Process"
                                                        2⤵
                                                          PID:2056
                                                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                          C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 37c -InterruptEvent 364 -NGENProcess 39c -Pipe 338 -Comment "NGen Worker Process"
                                                          2⤵
                                                            PID:1884
                                                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                            C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 364 -InterruptEvent 38c -NGENProcess 398 -Pipe 340 -Comment "NGen Worker Process"
                                                            2⤵
                                                              PID:2476
                                                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                              C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3a0 -InterruptEvent 37c -NGENProcess 3a4 -Pipe 364 -Comment "NGen Worker Process"
                                                              2⤵
                                                                PID:1580
                                                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 37c -InterruptEvent 390 -NGENProcess 398 -Pipe 33c -Comment "NGen Worker Process"
                                                                2⤵
                                                                  PID:2700
                                                                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                  C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 390 -InterruptEvent 3ac -NGENProcess 38c -Pipe 3a8 -Comment "NGen Worker Process"
                                                                  2⤵
                                                                    PID:1880
                                                                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                    C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 388 -InterruptEvent 3ac -NGENProcess 390 -Pipe 39c -Comment "NGen Worker Process"
                                                                    2⤵
                                                                      PID:2008
                                                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3a4 -InterruptEvent 3a0 -NGENProcess 3b4 -Pipe 388 -Comment "NGen Worker Process"
                                                                      2⤵
                                                                      • Modifies data under HKEY_USERS
                                                                      PID:1560
                                                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 394 -InterruptEvent 38c -NGENProcess 3b8 -Pipe 3a4 -Comment "NGen Worker Process"
                                                                      2⤵
                                                                      • Modifies data under HKEY_USERS
                                                                      PID:1724
                                                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 398 -InterruptEvent 390 -NGENProcess 3bc -Pipe 394 -Comment "NGen Worker Process"
                                                                      2⤵
                                                                      • Modifies data under HKEY_USERS
                                                                      PID:1592
                                                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 384 -InterruptEvent 3b4 -NGENProcess 3c0 -Pipe 398 -Comment "NGen Worker Process"
                                                                      2⤵
                                                                      • Modifies data under HKEY_USERS
                                                                      PID:1984
                                                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3bc -InterruptEvent 3b4 -NGENProcess 37c -Pipe 3b8 -Comment "NGen Worker Process"
                                                                      2⤵
                                                                      • Modifies data under HKEY_USERS
                                                                      PID:2920
                                                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3b4 -InterruptEvent 3ac -NGENProcess 3c0 -Pipe 3a0 -Comment "NGen Worker Process"
                                                                      2⤵
                                                                      • Modifies data under HKEY_USERS
                                                                      PID:2496
                                                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3c8 -InterruptEvent 3bc -NGENProcess 3cc -Pipe 3b4 -Comment "NGen Worker Process"
                                                                      2⤵
                                                                      • Modifies data under HKEY_USERS
                                                                      PID:1636
                                                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 38c -InterruptEvent 3bc -NGENProcess 3c8 -Pipe 3c0 -Comment "NGen Worker Process"
                                                                      2⤵
                                                                      • Modifies data under HKEY_USERS
                                                                      PID:2916
                                                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3b0 -InterruptEvent 3c4 -NGENProcess 3d4 -Pipe 38c -Comment "NGen Worker Process"
                                                                      2⤵
                                                                      • Modifies data under HKEY_USERS
                                                                      PID:1084
                                                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3c4 -InterruptEvent 390 -NGENProcess 3c8 -Pipe 37c -Comment "NGen Worker Process"
                                                                      2⤵
                                                                      • Modifies data under HKEY_USERS
                                                                      PID:2712
                                                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 390 -InterruptEvent 3dc -NGENProcess 3bc -Pipe 3d8 -Comment "NGen Worker Process"
                                                                      2⤵
                                                                      • Modifies data under HKEY_USERS
                                                                      PID:2032
                                                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3dc -InterruptEvent 3ac -NGENProcess 384 -Pipe 3d4 -Comment "NGen Worker Process"
                                                                      2⤵
                                                                        PID:2152
                                                                    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
                                                                      C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
                                                                      1⤵
                                                                      • Executes dropped EXE
                                                                      • Drops file in System32 directory
                                                                      • Drops file in Program Files directory
                                                                      • Drops file in Windows directory
                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                      PID:1452
                                                                      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
                                                                        C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 1d0 -InterruptEvent 1bc -NGENProcess 1c0 -Pipe 1cc -Comment "NGen Worker Process"
                                                                        2⤵
                                                                        • Executes dropped EXE
                                                                        PID:1552
                                                                      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
                                                                        C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 1c8 -InterruptEvent 230 -NGENProcess 238 -Pipe 23c -Comment "NGen Worker Process"
                                                                        2⤵
                                                                        • Executes dropped EXE
                                                                        PID:628
                                                                    • C:\Windows\ehome\ehRecvr.exe
                                                                      C:\Windows\ehome\ehRecvr.exe
                                                                      1⤵
                                                                      • Executes dropped EXE
                                                                      PID:2760
                                                                    • C:\Windows\ehome\ehsched.exe
                                                                      C:\Windows\ehome\ehsched.exe
                                                                      1⤵
                                                                      • Executes dropped EXE
                                                                      PID:988
                                                                    • C:\Windows\eHome\EhTray.exe
                                                                      "C:\Windows\eHome\EhTray.exe" /nav:-2
                                                                      1⤵
                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                      • Suspicious use of FindShellTrayWindow
                                                                      • Suspicious use of SendNotifyMessage
                                                                      PID:2156
                                                                    • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                                                                      "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                                                                      1⤵
                                                                      • Executes dropped EXE
                                                                      PID:1564
                                                                    • C:\Windows\ehome\ehRec.exe
                                                                      C:\Windows\ehome\ehRec.exe -Embedding
                                                                      1⤵
                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                      PID:1832
                                                                    • C:\Windows\system32\IEEtwCollector.exe
                                                                      C:\Windows\system32\IEEtwCollector.exe /V
                                                                      1⤵
                                                                      • Executes dropped EXE
                                                                      PID:312
                                                                    • C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE
                                                                      "C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE" /auditservice
                                                                      1⤵
                                                                      • Executes dropped EXE
                                                                      • Drops file in System32 directory
                                                                      • Modifies data under HKEY_USERS
                                                                      PID:2252
                                                                    • C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe
                                                                      "C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"
                                                                      1⤵
                                                                      • Executes dropped EXE
                                                                      PID:1584
                                                                    • C:\Windows\System32\msdtc.exe
                                                                      C:\Windows\System32\msdtc.exe
                                                                      1⤵
                                                                      • Executes dropped EXE
                                                                      • Drops file in System32 directory
                                                                      PID:2704
                                                                    • C:\Windows\system32\msiexec.exe
                                                                      C:\Windows\system32\msiexec.exe /V
                                                                      1⤵
                                                                      • Executes dropped EXE
                                                                      • Loads dropped DLL
                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                      PID:2604
                                                                    • C:\Program Files (x86)\Common Files\Microsoft Shared\Source Engine\OSE.EXE
                                                                      "C:\Program Files (x86)\Common Files\Microsoft Shared\Source Engine\OSE.EXE"
                                                                      1⤵
                                                                      • Executes dropped EXE
                                                                      PID:1632
                                                                    • C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE
                                                                      "C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"
                                                                      1⤵
                                                                      • Executes dropped EXE
                                                                      • Modifies data under HKEY_USERS
                                                                      PID:2400
                                                                    • C:\Windows\SysWow64\perfhost.exe
                                                                      C:\Windows\SysWow64\perfhost.exe
                                                                      1⤵
                                                                      • Executes dropped EXE
                                                                      PID:1860
                                                                    • C:\Windows\system32\locator.exe
                                                                      C:\Windows\system32\locator.exe
                                                                      1⤵
                                                                      • Executes dropped EXE
                                                                      PID:1340
                                                                    • C:\Windows\System32\snmptrap.exe
                                                                      C:\Windows\System32\snmptrap.exe
                                                                      1⤵
                                                                      • Executes dropped EXE
                                                                      PID:948
                                                                    • C:\Windows\system32\dllhost.exe
                                                                      C:\Windows\system32\dllhost.exe /Processid:{02D4B3F1-FD88-11D1-960D-00805FC79235}
                                                                      1⤵
                                                                      • Executes dropped EXE
                                                                      • Drops file in Windows directory
                                                                      PID:2472

                                                                    Network

                                                                          MITRE ATT&CK Enterprise v15

                                                                          Replay Monitor

                                                                          Loading Replay Monitor...

                                                                          Downloads

                                                                          • C:\Program Files (x86)\Common Files\microsoft shared\Source Engine\OSE.EXE

                                                                            Filesize

                                                                            1.3MB

                                                                            MD5

                                                                            c6186a43a43dc751c0946193e8fe1b39

                                                                            SHA1

                                                                            99c872a705bdd5d506ea3d1354bbf6af3fcf1fe7

                                                                            SHA256

                                                                            9e3531558b8cadcf7736017de2ff5a2c7331b25e32fbb661d3e999bed5a9bc26

                                                                            SHA512

                                                                            5df01b62eef8196183f6f9e1f6f667da4c53a4dcd08035171322609595d24cd3ce10207eb6c5fe2f35e291e7408f9c94192b2efc8fcc1a24e4c9b45932b8ee0a

                                                                          • C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE

                                                                            Filesize

                                                                            3.8MB

                                                                            MD5

                                                                            e5e7b1e2ab64f47340ca194cf8388a27

                                                                            SHA1

                                                                            44170564602fa0de33703d8baeda08774b2f538c

                                                                            SHA256

                                                                            0f1703a4076e13385776bf7c8768f62224f04c6f7383090d255462d69ab23915

                                                                            SHA512

                                                                            08f9d97e8684e27fedd790f124cae0d3e96e12045ac0526f5f013154ec736b1129ac1cdac1d15aa5b3d5be0374af8f0d2947cfb88a96bcf70064b50e014ab285

                                                                          • C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe

                                                                            Filesize

                                                                            1.4MB

                                                                            MD5

                                                                            04342931c410bf7acb2d735b4cd4b9e7

                                                                            SHA1

                                                                            39a88e1afccdc0f325579b60330a7a8d150e0e99

                                                                            SHA256

                                                                            b0e034cad8e4b4db37b4c7484aaf4f9e98f5283c4299a6e977ee80096559ae2b

                                                                            SHA512

                                                                            0844fc1994be5e9f1b2f52dcd308dbec4cafb519dbfdad6f781532cae807e3e5040f02803ee664f4c7c009112052dad9f57dad1249dfbded3194c95f8fe4032a

                                                                          • C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe

                                                                            Filesize

                                                                            1.2MB

                                                                            MD5

                                                                            a5a85585c9ae9f5bc2e456c32d6290aa

                                                                            SHA1

                                                                            5b20a3b9ccc14313d039049066fd43e79db249c5

                                                                            SHA256

                                                                            3decdf56304a7ced21668b843a56a9f44c4a971ca183161e2f491adbf7938587

                                                                            SHA512

                                                                            c6f078983d19534b067d97eaab3e6b39aca2d093bafd8b5d700a3041c7741ba242023589006425b8f7073413e92e93d07783fbeeb5cc842b4769ae977241c10b

                                                                          • C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE

                                                                            Filesize

                                                                            1.5MB

                                                                            MD5

                                                                            d674b2b562f8e14d6355ef319b0b3e7e

                                                                            SHA1

                                                                            20a136b544e8dbd30f9aa2822202b09677f0d582

                                                                            SHA256

                                                                            efd51d8ccb67970aaba18f6b9f92776f49365b76a0fadc32a3db7d83748a450b

                                                                            SHA512

                                                                            3f2df158fc06ff8d25c23c7cef0d71ee097e5425777aa5b5785ecb6159215db796bd7857926179654a153b2ca7bca8f9889954f00a7985843c4364bc027dd8da

                                                                          • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe

                                                                            Filesize

                                                                            2.1MB

                                                                            MD5

                                                                            682874ac3b777337d76783439fec3ec1

                                                                            SHA1

                                                                            0857f25b920b7c8b7858d19744a41ccaf42566c7

                                                                            SHA256

                                                                            6819392dd6e2e17a9579be285e4ae52594e82f642155bcd0a03ebb17e5bd7ae4

                                                                            SHA512

                                                                            89cb564ddd2a1d4ec68a9e9ccb0d6249f22fdbbcd00d680193cd7a29529f73b9b8a10a783af0d49a8e2fac1afffdb313f37ba17815c616d8ada3dcb75d968267

                                                                          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b91050d8b077a4e8.customDestinations-ms

                                                                            Filesize

                                                                            24B

                                                                            MD5

                                                                            b9bd716de6739e51c620f2086f9c31e4

                                                                            SHA1

                                                                            9733d94607a3cba277e567af584510edd9febf62

                                                                            SHA256

                                                                            7116ff028244a01f3d17f1d3bc2e1506bc9999c2e40e388458f0cccc4e117312

                                                                            SHA512

                                                                            cef609e54c7a81a646ad38dba7ac0b82401b220773b9c792cefac80c6564753229f0c011b34ffb56381dd3154a19aee2bf5f602c4d1af01f2cf0fbc1574e4478

                                                                          • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ngen_service.log

                                                                            Filesize

                                                                            872KB

                                                                            MD5

                                                                            ca2ee12c768a4d58bfb3195b4ec2472a

                                                                            SHA1

                                                                            eb74a611cb9ccfec19147bd81ae5c316ca8166b3

                                                                            SHA256

                                                                            3b4f056f45510ffa4a4c34ad2f6f8cdd263171b52fb26ce28f64255585b86089

                                                                            SHA512

                                                                            44066665d36b8229ae12cd9f2e97e47cc020cebbcac71547fdca976f4f23e060f6f046f70f12690484616bf16b90b15c393ee1f4ae836bf677e8906074ea7c97

                                                                          • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe

                                                                            Filesize

                                                                            1.3MB

                                                                            MD5

                                                                            adcee33238bf09f49e97389f381ea7b6

                                                                            SHA1

                                                                            9d1a2d8191d49a1ec8e0bd347cd3a49fabeca997

                                                                            SHA256

                                                                            182033ed2fbd2810ca549ba3635cea9dfb96e1e6390de04548d08d54fa22d92f

                                                                            SHA512

                                                                            422b87346f6c19e3d9dd0f2de7af674985dc28a2306285e6635d2f58625874d1e995a2467e4c8c9d0c03673e09250498f8472279dadbbc0a1f6ca8b6682394e7

                                                                          • C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe

                                                                            Filesize

                                                                            1.2MB

                                                                            MD5

                                                                            74be3dd949aa16e1610f3abfcf86d240

                                                                            SHA1

                                                                            577d2304ce1ef49736b6687c488101557b9edaeb

                                                                            SHA256

                                                                            9321d7156144ba66a6b9642238d3dd03c97fd0eb37859430a10142362ff4195c

                                                                            SHA512

                                                                            d21f4e40d0af4f2367309ed5c1efc1e3dfd8b929fb131950cf9f66b656fd21b186484ca8d180e73853b013cbac7b4be9fd5a825832065e88e0912933c17fce38

                                                                          • C:\Windows\Microsoft.NET\Framework\v2.0.50727\ngen_service.log

                                                                            Filesize

                                                                            1003KB

                                                                            MD5

                                                                            77402c8bfeb45b164371af1029f7e6e2

                                                                            SHA1

                                                                            9beb906e00a5a226938b12a2cac789ab665c238c

                                                                            SHA256

                                                                            0dff30066728ad1907bb0d3d0f3a170f6d6f48e9bd021ee543e3609dd1528445

                                                                            SHA512

                                                                            969d2d073503257adcec7c0d736c920b77aa63835612df2f2ebc935dd358ae8eaf25a7dd35f69c7908b81475fada0fb0a8e8c7e2057af3e493a5ea963dc51020

                                                                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe

                                                                            Filesize

                                                                            1.3MB

                                                                            MD5

                                                                            551f619213a838bd62d77daa0d04838b

                                                                            SHA1

                                                                            b6a185904dea0cc4114656f6db8adaf9b7b7c23f

                                                                            SHA256

                                                                            1eef4d02d4dc6b7bec129e7c237537a948386288c7a32a50763b38b4a980c55c

                                                                            SHA512

                                                                            a18b0ddb5a3890b74fd120d463f424ffa0528190320f71af217e084cb660e346dbbb4aed94ed5ab27aea67fa403c39dad3eca583c68ad7526036328398908d45

                                                                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe

                                                                            Filesize

                                                                            676KB

                                                                            MD5

                                                                            3f59f65f816cce5d3fad717b500a71e3

                                                                            SHA1

                                                                            26d4e76b8a5851e5fab5efca0278d1d212f7a3ee

                                                                            SHA256

                                                                            7bf861f8fd4392316e8d0059f89508533f2853e6c79d5950b175cdb23dfa3763

                                                                            SHA512

                                                                            b0374fd0057fc4ca82b3e228fa009c4b85bbc7759e9e43da190c74acc3f1eecf27137e99157f679e2f281e6c9a673839bc78557033555b77fa9af88741fcb085

                                                                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe

                                                                            Filesize

                                                                            1024KB

                                                                            MD5

                                                                            ec48d242d9293ba0bff46173900eec8f

                                                                            SHA1

                                                                            80c34950b882e6aa51eda8ec4e1b8faecac7caf1

                                                                            SHA256

                                                                            8e9f426a5d4925ad21a80f67970b1294ae9bd8e5206f2baca62684180b5c21c7

                                                                            SHA512

                                                                            f796518b699032c570ae8122cfd24e7ccecbc7ac42776576d3085ca8532fbef55f289892eb4d4e4d354ac6d36473e00b00fee846393549cd68d163cf7cb6a8a4

                                                                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen_service.log

                                                                            Filesize

                                                                            8KB

                                                                            MD5

                                                                            8f138c73acd5babfeecdd5c4bfb8cba5

                                                                            SHA1

                                                                            e59234333e231addb7e8bf09570437e56ab881a2

                                                                            SHA256

                                                                            f21eaf0969bdb20558c45d4de0fe0f7be8f6ecdad1c887ce611d20eb5363f0ca

                                                                            SHA512

                                                                            40b1d04029b7e98f6bf953bf617e89dc45360addb5b0bf53b0e1927abfa25bd4ab4abf8030ed0bd98cad3d8a38e54da0389e6275cbec42fc9ef3d493f070b11f

                                                                          • C:\Windows\SysWOW64\perfhost.exe

                                                                            Filesize

                                                                            1.2MB

                                                                            MD5

                                                                            fdd51f3e3ccbead2305f811831504543

                                                                            SHA1

                                                                            aa32d3d706ea29083fbf21a313ccfe84eb6168a3

                                                                            SHA256

                                                                            ae17e5d898a2162862d80794a46b1ac55adb075000a6fa6cc5383385cd45b86c

                                                                            SHA512

                                                                            4414cac43c1c017e85b3c90841ba52e9bd39004a0571ae20e8df44729dc7c1a2c885d0a6069bf65eb32fd5bfa588f2f5f1c42d6e54133a59d05ca270751f249a

                                                                          • C:\Windows\System32\Locator.exe

                                                                            Filesize

                                                                            1.2MB

                                                                            MD5

                                                                            f846e45b5f82d8163804408d1f18a8f7

                                                                            SHA1

                                                                            19a23c7a6dd88c3d915963b8b8cb98e229b644d5

                                                                            SHA256

                                                                            4077961c01ae01dd59a006f80a50abd9b1adc5e3e2ae64e1634e0e9b7d4b94ad

                                                                            SHA512

                                                                            29b55bc19ea3f7c6a758ae1a7fb2b3bbdbee6a6b1b00449835f1a4a2fb6c5fa9ff847d101209fa0277be560a65a34ac5c8cce3a9a81d46c2947cb97448282884

                                                                          • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.Office.To#\e1f8e4d08d4b7f811b7dbbacd324027b\Microsoft.Office.Tools.v9.0.ni.dll

                                                                            Filesize

                                                                            148KB

                                                                            MD5

                                                                            ac901cf97363425059a50d1398e3454b

                                                                            SHA1

                                                                            2f8bd4ac2237a7b7606cb77a3d3c58051793c5c7

                                                                            SHA256

                                                                            f6c7aecb211d9aac911bf80c91e84a47a72ac52cbb523e34e9da6482c0b24c58

                                                                            SHA512

                                                                            6a340b6d5fa8e214f2a58d8b691c749336df087fa75bcc8d8c46f708e4b4ff3d68a61a17d13ee62322b75cbc61d39f5a572588772f3c5d6e5ff32036e5bc5a00

                                                                          • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\00cf0faa3d37faa0ea2d240c1ca307ef\Microsoft.VisualStudio.Tools.Office.HostAdapter.v10.0.ni.dll

                                                                            Filesize

                                                                            143KB

                                                                            MD5

                                                                            75c84340d765d73eac1c743a31b6571a

                                                                            SHA1

                                                                            52aeef700a52b8e687316f42816eb9c0599354df

                                                                            SHA256

                                                                            b72a1f7da8b3c3dc95c2252319f6f3e71c81ed8bd59a5b31bd2861e14c364459

                                                                            SHA512

                                                                            9a9cdbc3a103e733150fae265c594dd7378ca402521387e466732f2431472a6a0e6cb4dfe02fe9f5b975a1739c685471ad2a4dddcdf6f12c4b5be469832fd5f1

                                                                          • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\03cad6bd8b37d21b28dcb4f955be2158\Microsoft.VisualStudio.Tools.Applications.Contract.v9.0.ni.dll

                                                                            Filesize

                                                                            34KB

                                                                            MD5

                                                                            c26b034a8d6ab845b41ed6e8a8d6001d

                                                                            SHA1

                                                                            3a55774cf22d3244d30f9eb5e26c0a6792a3e493

                                                                            SHA256

                                                                            620b41f5e02df56c33919218bedc238ca7e76552c43da4f0f39a106835a4edc3

                                                                            SHA512

                                                                            483424665c3bc79aeb1de6dfdd633c8526331c7b271b1ea6fe93ab298089e2aceefe7f9c7d0c6e33e604ca7b2ed62e7bb586147fecdf9a0eea60e8c03816f537

                                                                          • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\0cb958acb9cd4cacb46ebc0396e30aa3\Microsoft.VisualStudio.Tools.Office.Contract.v9.0.ni.dll

                                                                            Filesize

                                                                            109KB

                                                                            MD5

                                                                            0fd0f978e977a4122b64ae8f8541de54

                                                                            SHA1

                                                                            153d3390416fdeba1b150816cbbf968e355dc64f

                                                                            SHA256

                                                                            211d2b83bb82042385757f811d90c5ae0a281f3abb3bf1c7901e8559db479e60

                                                                            SHA512

                                                                            ceddfc031bfe4fcf5093d0bbc5697b5fb0cd69b03bc32612325a82ea273dae5daff7e670b0d45816a33307b8b042d27669f5d5391cb2bdcf3e5a0c847c6dcaa8

                                                                          • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\367516b7878af19f5c84c67f2cd277ae\Microsoft.VisualStudio.Tools.Office.Word.AddInAdapter.v9.0.ni.dll

                                                                            Filesize

                                                                            41KB

                                                                            MD5

                                                                            3c269caf88ccaf71660d8dc6c56f4873

                                                                            SHA1

                                                                            f9481bf17e10fe1914644e1b590b82a0ecc2c5c4

                                                                            SHA256

                                                                            de21619e70f9ef8ccbb274bcd0d9d2ace1bae0442dfefab45976671587cf0a48

                                                                            SHA512

                                                                            bd5be3721bf5bd4001127e0381a0589033cb17aa35852f8f073ba9684af7d8c5a0f3ee29987b345fc15fdf28c5b56686087001ef41221a2cfb16498cf4c016c6

                                                                          • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\8c6bac317f75b51647ea3a8da141b143\Microsoft.VisualStudio.Tools.Office.AddInAdapter.v9.0.ni.dll

                                                                            Filesize

                                                                            210KB

                                                                            MD5

                                                                            4f40997b51420653706cb0958086cd2d

                                                                            SHA1

                                                                            0069b956d17ce7d782a0e054995317f2f621b502

                                                                            SHA256

                                                                            8cd6a0b061b43e0b660b81859c910290a3672b00d7647ba0e86eda6ddcc8c553

                                                                            SHA512

                                                                            e18953d7a348859855e5f6e279bc9924fc3707b57a733ce9b8f7d21bd631d419f1ebfb29202608192eb346569ca9a55264f5b4c2aedd474c22060734a68a4ee6

                                                                          • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\9306fc630870a75ddd23441ad77bdc57\Microsoft.VisualStudio.Tools.Applications.Runtime.v10.0.ni.dll

                                                                            Filesize

                                                                            53KB

                                                                            MD5

                                                                            e3a7a2b65afd8ab8b154fdc7897595c3

                                                                            SHA1

                                                                            b21eefd6e23231470b5cf0bd0d7363879a2ed228

                                                                            SHA256

                                                                            e5faf5e8adf46a8246e6b5038409dadca46985a9951343a1936237d2c8d7a845

                                                                            SHA512

                                                                            6537c7ed398deb23be1256445297cb7c8d7801bf6e163d918d8e258213708b28f7255ecff9fbd3431d8f5e5a746aa95a29d3a777b28fcd688777aed6d8205a33

                                                                          • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\afa5bb1a39443d7dc81dfff54073929b\Microsoft.VisualStudio.Tools.Office.Contract.v10.0.ni.dll

                                                                            Filesize

                                                                            28KB

                                                                            MD5

                                                                            aefc3f3c8e7499bad4d05284e8abd16c

                                                                            SHA1

                                                                            7ab718bde7fdb2d878d8725dc843cfeba44a71f7

                                                                            SHA256

                                                                            4436550409cfb3d06b15dd0c3131e87e7002b0749c7c6e9dc3378c99dbec815d

                                                                            SHA512

                                                                            1d7dbc9764855a9a1f945c1bc8e86406c0625f1381d71b3ea6924322fbe419d1c70c3f3efd57ee2cb2097bb9385e0bf54965ab789328a80eb4946849648fe20b

                                                                          • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\cd6d459672d7b9e4cde4e68c74da1e46\Microsoft.VisualStudio.Tools.Office.Excel.HostAdapter.v10.0.ni.dll

                                                                            Filesize

                                                                            180KB

                                                                            MD5

                                                                            d0b49aedc832fa34a6b535fdd0a6f0da

                                                                            SHA1

                                                                            5524c45cf0c3f741dc5f3e9d8723fc9b259b2a21

                                                                            SHA256

                                                                            b9d32bf688cae1b9efd16a11ef26f5a246292dba160b8e7793377de76826f564

                                                                            SHA512

                                                                            481791f2665bca77575105da6b0e2083dca3b0a23f303365c5523225bc232ead586d1aabd9264a0f418fba1e0297451948774646fbb1f418fdfaac69e7020f3a

                                                                          • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\d4b9f24135109423a9640792ba1b99ac\Microsoft.VisualStudio.Tools.Office.Outlook.HostAdapter.v10.0.ni.dll

                                                                            Filesize

                                                                            83KB

                                                                            MD5

                                                                            c52a710daa23c533ef9810caa9fa7eee

                                                                            SHA1

                                                                            98489f6c102eb911cf4ff79a1ddcd21833cd580b

                                                                            SHA256

                                                                            2ef170dc387bd0dae8e03b7b5b6653e313055ef2b4db403c2bdc54bc05eccf20

                                                                            SHA512

                                                                            47ffd8df6307f9b20cad6a51f0e72e530e705dfeb6e86595cc2c9ffc23c258b580ad472fdf02cf5d4052b989c8ef7d25ca59afb792d096e8d4aab8f308590950

                                                                          • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\de06a98a598aa0ff716a25b24d56ad7f\Microsoft.VisualStudio.Tools.Applications.Contract.v10.0.ni.dll

                                                                            Filesize

                                                                            27KB

                                                                            MD5

                                                                            9c60454398ce4bce7a52cbda4a45d364

                                                                            SHA1

                                                                            da1e5de264a6f6051b332f8f32fa876d297bf620

                                                                            SHA256

                                                                            edc90887d38c87282f49adbb12a94040f9ac86058bfae15063aaaff2672b54e1

                                                                            SHA512

                                                                            533b7e9c55102b248f4a7560955734b4156eb4c02539c6f978aeacecff1ff182ba0f04a07d32ed90707a62d73191b0e2d2649f38ae1c3e7a5a4c0fbea9a94300

                                                                          • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\e0220058091b941725ef02be0b84abe7\Microsoft.VisualStudio.Tools.Applications.HostAdapter.v10.0.ni.dll

                                                                            Filesize

                                                                            57KB

                                                                            MD5

                                                                            6eaaa1f987d6e1d81badf8665c55a341

                                                                            SHA1

                                                                            e52db4ad92903ca03a5a54fdb66e2e6fad59efd5

                                                                            SHA256

                                                                            4b78ffa5f0b6751aea11917db5961d566e2f59beaa054b41473d331fd392329e

                                                                            SHA512

                                                                            dbedfa6c569670c22d34d923e22b7dae7332b932b809082dad87a1f0bb125c912db37964b5881667867ccf23dc5e5be596aad85485746f8151ce1c51ffd097b2

                                                                          • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\e4cf87a3a8192b067d081842e477a80c\Microsoft.VisualStudio.Tools.Office.Word.HostAdapter.v10.0.ni.dll

                                                                            Filesize

                                                                            187KB

                                                                            MD5

                                                                            8dd5154c0cc7682c828d36a5d09b4271

                                                                            SHA1

                                                                            cc9cfcf61e9bc5967f6420904d203482859dad81

                                                                            SHA256

                                                                            5908040a6a12e9d5fbb7cf821585db4e681e5e0abf435c8f187cdbb3e99b999a

                                                                            SHA512

                                                                            e7bfadfceb3028798216d7241b6d0317cc21d53176d74860234d3878960d444cb87a2988d2be71eb3bab44bea5028c35a118b8e345b2c4c84fd47d11741b77a0

                                                                          • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\ee73646032cbb022d16771203727e3b2\Microsoft.VisualStudio.Tools.Applications.Runtime.v9.0.ni.dll

                                                                            Filesize

                                                                            130KB

                                                                            MD5

                                                                            2735d2ab103beb0f7c1fbd6971838274

                                                                            SHA1

                                                                            6063646bc072546798bf8bf347425834f2bfad71

                                                                            SHA256

                                                                            f00156860ec7e88f4ccb459ca29b7e0e5c169cdc8a081cb043603187d25d92b3

                                                                            SHA512

                                                                            fe2ce60c7f61760a29344e254771d48995e983e158da0725818f37441f9690bda46545bf10c84b163f6afb163ffb504913d6ffddf84f72b062c7f233aed896de

                                                                          • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\f1a7ac664667f2d6bcd6c388b230c22b\Microsoft.VisualStudio.Tools.Applications.AddInAdapter.v9.0.ni.dll

                                                                            Filesize

                                                                            59KB

                                                                            MD5

                                                                            8c69bbdfbc8cc3fa3fa5edcd79901e94

                                                                            SHA1

                                                                            b8028f0f557692221d5c0160ec6ce414b2bdf19b

                                                                            SHA256

                                                                            a21471690e7c32c80049e17c13624820e77bca6c9c38b83d9ea8a7248086660d

                                                                            SHA512

                                                                            825f5b87b76303b62fc16a96b108fb1774c2aca52ac5e44cd0ac2fe2ee47d5d67947dfe7498e36bc849773f608ec5824711f8c36e375a378582eefb57c9c2557

                                                                          • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\fc36797f7054935a6033077612905a0f\Microsoft.VisualStudio.Tools.Office.Excel.AddInAdapter.v9.0.ni.dll

                                                                            Filesize

                                                                            42KB

                                                                            MD5

                                                                            71d4273e5b77cf01239a5d4f29e064fc

                                                                            SHA1

                                                                            e8876dea4e4c4c099e27234742016be3c80d8b62

                                                                            SHA256

                                                                            f019899f829731f899a99885fd52fde1fe4a4f6fe3ecf7f7a7cfa78517c00575

                                                                            SHA512

                                                                            41fe67cda988c53bd087df6296d1a242cddac688718ea5a5884a72b43e9638538e64d7a59e045c0b4d490496d884cf0ec694ddf7fcb41ae3b8cbc65b7686b180

                                                                          • C:\Windows\assembly\NativeImages_v2.0.50727_32\ehiVidCtl\88e20c69254157d91b96eadc9444815d\ehiVidCtl.ni.dll

                                                                            Filesize

                                                                            855KB

                                                                            MD5

                                                                            7812b0a90d92b4812d4063b89a970c58

                                                                            SHA1

                                                                            3c4a789b8d28a5bfa6a6191624e33b8f40e4c4ea

                                                                            SHA256

                                                                            897626e6af00e85e627eeaa7f9563b245335242bc6196b36d0072e5b6d45e543

                                                                            SHA512

                                                                            634a2395bada9227b1957f2b76ed7e19f12bfc4d71a145d182602a1b6e24d83e220ebfabd602b1995c360e1725a38a89ff58417b0295bb0da9ea35c41c21a6ed

                                                                          • C:\Windows\assembly\NativeImages_v2.0.50727_32\stdole\2c6d60b55bbab22515c512080d4b3bae\stdole.ni.dll

                                                                            Filesize

                                                                            43KB

                                                                            MD5

                                                                            3e72bdd0663c5b2bcd530f74139c83e3

                                                                            SHA1

                                                                            66069bcac0207512b9e07320f4fa5934650677d2

                                                                            SHA256

                                                                            6a6ac3094130d1affd34aae5ba2bd8c889e2071eb4217a75d72b5560f884e357

                                                                            SHA512

                                                                            b0a98db477fccae71b4ebfb8525ed52c10f1e7542f955b307f260e27e0758aa22896683302e34b0237e7e3bba9f5193ddcc7ff255c71fbaa1386988b0ec7d626

                                                                          • C:\Windows\ehome\ehrecvr.exe

                                                                            Filesize

                                                                            1.2MB

                                                                            MD5

                                                                            9f7f6e6f60190dbb238ea7c49c8449d5

                                                                            SHA1

                                                                            0ac27fde849075c1036ac858486fc648dde241fc

                                                                            SHA256

                                                                            cde0d4b4bc42b25ee1dde53476137610efe5235742b2d2a79841e368ae2f545f

                                                                            SHA512

                                                                            be9a44ec8be762682ad8521a1c68872b7bfacb482cf18beecdcee43d8ffda1768094ae73d02f135083bad62a08a280950bf56b1388412c73b1745e1afa3b4dc6

                                                                          • C:\Windows\ehome\ehsched.exe

                                                                            Filesize

                                                                            1.3MB

                                                                            MD5

                                                                            259d29bf3bcab8986095313e0eb68ce1

                                                                            SHA1

                                                                            1ac22193f1bb60113a70f7f4b11fbb40e396ec57

                                                                            SHA256

                                                                            7a9db7d90b93587da71d910f5d39d1598f347b8750afc7c7c051e8f7b71f2728

                                                                            SHA512

                                                                            6ce0896f837b2148ae5c276ea7804488b05ae9a683f2b926ae997ceafc15d226f0bb28f660f8b27768ee23bbd592df9031b51bd87a6b591d4b1b01342b44161b

                                                                          • C:\Windows\system32\fxssvc.exe

                                                                            Filesize

                                                                            846KB

                                                                            MD5

                                                                            c3a7620ba5ee7895dbd79d27802dcd9d

                                                                            SHA1

                                                                            c2995c1a469eadb29d094aba2731eb73fc01fd5d

                                                                            SHA256

                                                                            7687ce1fc87aee0b48e6d61fce47cc16e1a171ba9f033634913c4d8c46b393ea

                                                                            SHA512

                                                                            13789157f81abb8c9e6d12c1b5cc37138ce1b595ba9273e4c59e10a6b900ad62a0553f42dc3d457ccdf0d2f325c75522e4b7dec529e6415447b1a74c1adae644

                                                                          • \Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe

                                                                            Filesize

                                                                            1.3MB

                                                                            MD5

                                                                            09ef5c50dd617da3a9d0f1283c3a8295

                                                                            SHA1

                                                                            e6c0368a2bc11a0de522caf55187705f213ca282

                                                                            SHA256

                                                                            b8e9505744a3a50ae52d6eda32e0cadb47d8b423cd3e338ff7604ce3a6a63a7c

                                                                            SHA512

                                                                            9a3639e0cf78dab6941ed35c3846897e7b2acc96db1e7a93c2e8006d8d60d811d344f517f03cf46301b66a607389d8e00b9d43f7d0f6464574312a7fe0ee933c

                                                                          • \Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe

                                                                            Filesize

                                                                            1.2MB

                                                                            MD5

                                                                            b042fb80cf6cf82d732a65a2cb7665f3

                                                                            SHA1

                                                                            98a0379611551a8d4de1a32b171ddface51906fd

                                                                            SHA256

                                                                            aa4a1c1c0e4b4d18cfb7f659419db281e4d06efa853eeb797cdc2037e75be472

                                                                            SHA512

                                                                            32ee022629026cad298fe40a63ba17c49a22660e13a3753ed6051800d2d92b1a5a3038f9a2ad36d5bf080e5b4cc4a76949a3ee7e11a14e5ffa0492755b2e4b03

                                                                          • \Windows\System32\alg.exe

                                                                            Filesize

                                                                            1.3MB

                                                                            MD5

                                                                            4b26a8c26ad700e8aeb89cfaa056cb36

                                                                            SHA1

                                                                            577c80b40494ad3ea2816b5b175656aa332344cd

                                                                            SHA256

                                                                            19be4f496ab4307b98479782257fc38cb84ad4427806d3db261c331d3878ad22

                                                                            SHA512

                                                                            90219794bd1e0fbc8154a6f6ab8a521813b24a047711ed5ee06c5ddc0c1e88269cf36261016b310584dce99d7c21b9667dbc49e8254887bbc5abb7716ef91fb3

                                                                          • \Windows\System32\dllhost.exe

                                                                            Filesize

                                                                            1.2MB

                                                                            MD5

                                                                            7551de770874c32d3106e34732343b1a

                                                                            SHA1

                                                                            a3f8eb613b2fe5ba33419a3a4d6c9ccddbd1537a

                                                                            SHA256

                                                                            fa3719740c94be6187c2ba3b6ce1b0387e20fb1cd7bde5784c834a01a33a4864

                                                                            SHA512

                                                                            51fd32625afdd8132424ddae1a42323413b7f3e0f3826c21ebc2da7f4d4fc3543ac7007673d33884425b558e8aaafe064716e1213e359fa22308b33ee6e62977

                                                                          • \Windows\System32\ieetwcollector.exe

                                                                            Filesize

                                                                            1.3MB

                                                                            MD5

                                                                            660ccc6efe36bd9ca126f51d85fbb627

                                                                            SHA1

                                                                            47691d24909cb9989edeeddab1f6fa70e662ef71

                                                                            SHA256

                                                                            550990c0eddabab772a18c1399b39de4b7f03da9bfcb9ba9836ba18e010636a4

                                                                            SHA512

                                                                            50dc92e696919f38fe45665cefd96af651436e7ef7b9f0f7fd4c2878ace9194f2758c0adc8a0790ebf97bbc7f5aee48d0f81259aad49a0f0bc457711211321f6

                                                                          • \Windows\System32\msdtc.exe

                                                                            Filesize

                                                                            1.3MB

                                                                            MD5

                                                                            83c5764890310824b9644f5090510ed3

                                                                            SHA1

                                                                            a65e0aafd8ed1f78255ad9d0854d42829c34fea1

                                                                            SHA256

                                                                            6d65d0a26ccd0daba74c82ca32ecf8c236be35d29e44ff9b94fcac8daea624fd

                                                                            SHA512

                                                                            3936a40a763f3c06e0535ddf8a961e73f5e0cc32360461edb03995cc73b3f4288fa21fec3b17224477df79ce6c58a0e95fef7acbfdef2692e0f22a509a183b13

                                                                          • \Windows\System32\msiexec.exe

                                                                            Filesize

                                                                            1.3MB

                                                                            MD5

                                                                            318457dbdc0bfe79bd8be8fef13f05d0

                                                                            SHA1

                                                                            5f63e9e1622cb707df0a4c2aa70cf528302b932e

                                                                            SHA256

                                                                            c58283ea45616a1e80d3d40f24f437931bb6c4f7e8116119d26b252a325f4533

                                                                            SHA512

                                                                            1277431a6b90105a67c79b71c67dcbf5a1249351cf90c4fdc449b04da23c4d56f31016d976615796176636b801a020494361cad2d30862466f793fbc957f0ed3

                                                                          • \Windows\System32\snmptrap.exe

                                                                            Filesize

                                                                            1.2MB

                                                                            MD5

                                                                            70dbe4082b960d299f895505ce1aa0ee

                                                                            SHA1

                                                                            7cc90509064af59d8ed4126ad715fab84d159246

                                                                            SHA256

                                                                            ddfd3abf1b15e4efa34794808156eb50078012ba3f8e4f474b8d2ba68899dcd8

                                                                            SHA512

                                                                            8ae3e82808e38ca78a843f727dc4be48bc51cbc35fb38fc8ff253fe7b650c6dc0c3146164da6af3e134d411389988ce79f0b98d17b91e18f8616c87a02c7a3e5

                                                                          • memory/312-217-0x0000000000810000-0x0000000000870000-memory.dmp

                                                                            Filesize

                                                                            384KB

                                                                          • memory/312-214-0x0000000140000000-0x00000001401ED000-memory.dmp

                                                                            Filesize

                                                                            1.9MB

                                                                          • memory/340-130-0x0000000000BE0000-0x0000000000C47000-memory.dmp

                                                                            Filesize

                                                                            412KB

                                                                          • memory/340-123-0x0000000000400000-0x00000000005E7000-memory.dmp

                                                                            Filesize

                                                                            1.9MB

                                                                          • memory/340-124-0x0000000000BE0000-0x0000000000C47000-memory.dmp

                                                                            Filesize

                                                                            412KB

                                                                          • memory/340-199-0x0000000000400000-0x00000000005E7000-memory.dmp

                                                                            Filesize

                                                                            1.9MB

                                                                          • memory/340-129-0x0000000000BE0000-0x0000000000C47000-memory.dmp

                                                                            Filesize

                                                                            412KB

                                                                          • memory/948-430-0x0000000100000000-0x00000001001D5000-memory.dmp

                                                                            Filesize

                                                                            1.8MB

                                                                          • memory/988-234-0x0000000140000000-0x00000001401F1000-memory.dmp

                                                                            Filesize

                                                                            1.9MB

                                                                          • memory/988-181-0x00000000003A0000-0x0000000000400000-memory.dmp

                                                                            Filesize

                                                                            384KB

                                                                          • memory/988-173-0x00000000003A0000-0x0000000000400000-memory.dmp

                                                                            Filesize

                                                                            384KB

                                                                          • memory/988-182-0x00000000003A0000-0x0000000000400000-memory.dmp

                                                                            Filesize

                                                                            384KB

                                                                          • memory/988-176-0x0000000140000000-0x00000001401F1000-memory.dmp

                                                                            Filesize

                                                                            1.9MB

                                                                          • memory/1340-341-0x0000000100000000-0x00000001001D4000-memory.dmp

                                                                            Filesize

                                                                            1.8MB

                                                                          • memory/1340-350-0x0000000000420000-0x0000000000480000-memory.dmp

                                                                            Filesize

                                                                            384KB

                                                                          • memory/1452-216-0x0000000140000000-0x00000001401ED000-memory.dmp

                                                                            Filesize

                                                                            1.9MB

                                                                          • memory/1452-142-0x0000000000AF0000-0x0000000000B50000-memory.dmp

                                                                            Filesize

                                                                            384KB

                                                                          • memory/1452-150-0x0000000000AF0000-0x0000000000B50000-memory.dmp

                                                                            Filesize

                                                                            384KB

                                                                          • memory/1452-143-0x0000000140000000-0x00000001401ED000-memory.dmp

                                                                            Filesize

                                                                            1.9MB

                                                                          • memory/1564-192-0x0000000140000000-0x0000000140237000-memory.dmp

                                                                            Filesize

                                                                            2.2MB

                                                                          • memory/1564-190-0x00000000001E0000-0x0000000000240000-memory.dmp

                                                                            Filesize

                                                                            384KB

                                                                          • memory/1564-197-0x00000000001E0000-0x0000000000240000-memory.dmp

                                                                            Filesize

                                                                            384KB

                                                                          • memory/1564-263-0x0000000140000000-0x0000000140237000-memory.dmp

                                                                            Filesize

                                                                            2.2MB

                                                                          • memory/1584-242-0x0000000000FE0000-0x0000000001040000-memory.dmp

                                                                            Filesize

                                                                            384KB

                                                                          • memory/1584-233-0x0000000140000000-0x0000000140209000-memory.dmp

                                                                            Filesize

                                                                            2.0MB

                                                                          • memory/1584-249-0x0000000000FE0000-0x0000000001040000-memory.dmp

                                                                            Filesize

                                                                            384KB

                                                                          • memory/1584-248-0x0000000140000000-0x0000000140209000-memory.dmp

                                                                            Filesize

                                                                            2.0MB

                                                                          • memory/1632-297-0x0000000000530000-0x0000000000597000-memory.dmp

                                                                            Filesize

                                                                            412KB

                                                                          • memory/1632-426-0x000000002E000000-0x000000002E1F4000-memory.dmp

                                                                            Filesize

                                                                            2.0MB

                                                                          • memory/1632-295-0x000000002E000000-0x000000002E1F4000-memory.dmp

                                                                            Filesize

                                                                            2.0MB

                                                                          • memory/1636-114-0x0000000010000000-0x00000000101DE000-memory.dmp

                                                                            Filesize

                                                                            1.9MB

                                                                          • memory/1636-103-0x0000000000480000-0x00000000004E7000-memory.dmp

                                                                            Filesize

                                                                            412KB

                                                                          • memory/1636-97-0x0000000010000000-0x00000000101DE000-memory.dmp

                                                                            Filesize

                                                                            1.9MB

                                                                          • memory/1636-98-0x0000000000480000-0x00000000004E7000-memory.dmp

                                                                            Filesize

                                                                            412KB

                                                                          • memory/1832-236-0x0000000000D50000-0x0000000000DD0000-memory.dmp

                                                                            Filesize

                                                                            512KB

                                                                          • memory/1832-327-0x0000000000D50000-0x0000000000DD0000-memory.dmp

                                                                            Filesize

                                                                            512KB

                                                                          • memory/1832-211-0x000007FEF4590000-0x000007FEF4F2D000-memory.dmp

                                                                            Filesize

                                                                            9.6MB

                                                                          • memory/1832-308-0x0000000000D50000-0x0000000000DD0000-memory.dmp

                                                                            Filesize

                                                                            512KB

                                                                          • memory/1832-265-0x000007FEF4590000-0x000007FEF4F2D000-memory.dmp

                                                                            Filesize

                                                                            9.6MB

                                                                          • memory/1832-275-0x000007FEF4590000-0x000007FEF4F2D000-memory.dmp

                                                                            Filesize

                                                                            9.6MB

                                                                          • memory/1832-212-0x0000000000D50000-0x0000000000DD0000-memory.dmp

                                                                            Filesize

                                                                            512KB

                                                                          • memory/1832-273-0x0000000000D50000-0x0000000000DD0000-memory.dmp

                                                                            Filesize

                                                                            512KB

                                                                          • memory/1832-213-0x000007FEF4590000-0x000007FEF4F2D000-memory.dmp

                                                                            Filesize

                                                                            9.6MB

                                                                          • memory/1860-326-0x0000000000170000-0x00000000001D7000-memory.dmp

                                                                            Filesize

                                                                            412KB

                                                                          • memory/1860-319-0x0000000001000000-0x00000000011D5000-memory.dmp

                                                                            Filesize

                                                                            1.8MB

                                                                          • memory/2092-119-0x0000000010000000-0x00000000101E6000-memory.dmp

                                                                            Filesize

                                                                            1.9MB

                                                                          • memory/2252-292-0x000000002E000000-0x000000002FE1E000-memory.dmp

                                                                            Filesize

                                                                            30.1MB

                                                                          • memory/2252-228-0x00000000009E0000-0x0000000000A47000-memory.dmp

                                                                            Filesize

                                                                            412KB

                                                                          • memory/2252-222-0x000000002E000000-0x000000002FE1E000-memory.dmp

                                                                            Filesize

                                                                            30.1MB

                                                                          • memory/2268-141-0x0000000000400000-0x00000000005DB000-memory.dmp

                                                                            Filesize

                                                                            1.9MB

                                                                          • memory/2268-0-0x0000000000400000-0x00000000005DB000-memory.dmp

                                                                            Filesize

                                                                            1.9MB

                                                                          • memory/2268-6-0x00000000005E0000-0x0000000000647000-memory.dmp

                                                                            Filesize

                                                                            412KB

                                                                          • memory/2268-1-0x00000000005E0000-0x0000000000647000-memory.dmp

                                                                            Filesize

                                                                            412KB

                                                                          • memory/2268-427-0x0000000000400000-0x00000000005DB000-memory.dmp

                                                                            Filesize

                                                                            1.9MB

                                                                          • memory/2344-174-0x0000000140000000-0x00000001401DC000-memory.dmp

                                                                            Filesize

                                                                            1.9MB

                                                                          • memory/2344-94-0x0000000140000000-0x00000001401DC000-memory.dmp

                                                                            Filesize

                                                                            1.9MB

                                                                          • memory/2400-313-0x0000000100000000-0x0000000100542000-memory.dmp

                                                                            Filesize

                                                                            5.3MB

                                                                          • memory/2400-321-0x0000000074078000-0x000000007408D000-memory.dmp

                                                                            Filesize

                                                                            84KB

                                                                          • memory/2400-302-0x0000000100000000-0x0000000100542000-memory.dmp

                                                                            Filesize

                                                                            5.3MB

                                                                          • memory/2400-311-0x0000000000160000-0x00000000001C0000-memory.dmp

                                                                            Filesize

                                                                            384KB

                                                                          • memory/2604-324-0x0000000100000000-0x00000001001F1000-memory.dmp

                                                                            Filesize

                                                                            1.9MB

                                                                          • memory/2604-277-0x0000000000700000-0x00000000008F1000-memory.dmp

                                                                            Filesize

                                                                            1.9MB

                                                                          • memory/2604-270-0x0000000100000000-0x00000001001F1000-memory.dmp

                                                                            Filesize

                                                                            1.9MB

                                                                          • memory/2604-348-0x0000000000700000-0x00000000008F1000-memory.dmp

                                                                            Filesize

                                                                            1.9MB

                                                                          • memory/2604-282-0x0000000000670000-0x00000000006D0000-memory.dmp

                                                                            Filesize

                                                                            384KB

                                                                          • memory/2680-159-0x0000000100000000-0x00000001001E3000-memory.dmp

                                                                            Filesize

                                                                            1.9MB

                                                                          • memory/2680-16-0x00000000008E0000-0x0000000000940000-memory.dmp

                                                                            Filesize

                                                                            384KB

                                                                          • memory/2680-15-0x0000000100000000-0x00000001001E3000-memory.dmp

                                                                            Filesize

                                                                            1.9MB

                                                                          • memory/2680-78-0x00000000008E0000-0x0000000000940000-memory.dmp

                                                                            Filesize

                                                                            384KB

                                                                          • memory/2680-73-0x00000000008E0000-0x0000000000940000-memory.dmp

                                                                            Filesize

                                                                            384KB

                                                                          • memory/2704-266-0x0000000000450000-0x00000000004B0000-memory.dmp

                                                                            Filesize

                                                                            384KB

                                                                          • memory/2704-316-0x0000000140000000-0x00000001401F5000-memory.dmp

                                                                            Filesize

                                                                            2.0MB

                                                                          • memory/2704-252-0x0000000140000000-0x00000001401F5000-memory.dmp

                                                                            Filesize

                                                                            2.0MB

                                                                          • memory/2760-162-0x0000000140000000-0x000000014013C000-memory.dmp

                                                                            Filesize

                                                                            1.2MB

                                                                          • memory/2760-185-0x0000000001980000-0x0000000001990000-memory.dmp

                                                                            Filesize

                                                                            64KB

                                                                          • memory/2760-187-0x0000000001A30000-0x0000000001A31000-memory.dmp

                                                                            Filesize

                                                                            4KB

                                                                          • memory/2760-160-0x0000000000190000-0x00000000001F0000-memory.dmp

                                                                            Filesize

                                                                            384KB

                                                                          • memory/2760-186-0x0000000001990000-0x00000000019A0000-memory.dmp

                                                                            Filesize

                                                                            64KB

                                                                          • memory/2760-168-0x0000000000190000-0x00000000001F0000-memory.dmp

                                                                            Filesize

                                                                            384KB

                                                                          • memory/2760-226-0x0000000140000000-0x000000014013C000-memory.dmp

                                                                            Filesize

                                                                            1.2MB