Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    03/04/2024, 10:18

General

  • Target

    2024-04-03_cd7b199f57142ddaeca9c24b0819df6d_magniber_revil_zxxz.exe

  • Size

    24.3MB

  • MD5

    cd7b199f57142ddaeca9c24b0819df6d

  • SHA1

    4dcea2edabad051a54cbe3dcb7f8992e70c4fc8d

  • SHA256

    6e6d1ecd26a0273765e2eabb1f4164cd2d3c61c2ee4a424bed8ea09807f031fd

  • SHA512

    ef6d21fc1fda9aaa3af415e0fb9313c69e9fcf57f5a0555da10f97b58966c7a28b75cdbfa1367e086df9457fac233034706395208191fe4c931925320e7a713d

  • SSDEEP

    196608:7P0Hj6JigboXZDwqY8a/qVwsEXX1KOgCu3JK1Op3H2SAmGcWqnlv018iP:7PboGX8a/jWWu3cI2D/cWcls1J

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 64 IoCs
  • Loads dropped DLL 37 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in System32 directory 20 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • Modifies data under HKEY_USERS 62 IoCs
  • Suspicious behavior: EnumeratesProcesses 26 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of SetWindowsHookEx 14 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-03_cd7b199f57142ddaeca9c24b0819df6d_magniber_revil_zxxz.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-03_cd7b199f57142ddaeca9c24b0819df6d_magniber_revil_zxxz.exe"
    1⤵
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2368
  • C:\Windows\System32\alg.exe
    C:\Windows\System32\alg.exe
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:2388
  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe
    C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe
    1⤵
    • Executes dropped EXE
    PID:2596
  • C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe
    C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe
    1⤵
    • Executes dropped EXE
    PID:2660
  • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe
    C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe
    1⤵
    • Executes dropped EXE
    PID:2572
  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
    C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
    1⤵
    • Executes dropped EXE
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2508
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1e4 -InterruptEvent 1d0 -NGENProcess 1d4 -Pipe 1e0 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2308
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 240 -InterruptEvent 248 -NGENProcess 1e4 -Pipe 1ec -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:1076
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 248 -InterruptEvent 258 -NGENProcess 230 -Pipe 254 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:1592
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 25c -InterruptEvent 240 -NGENProcess 260 -Pipe 248 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:1540
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 250 -InterruptEvent 240 -NGENProcess 25c -Pipe 230 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:1532
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 234 -InterruptEvent 24c -NGENProcess 268 -Pipe 250 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2124
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 238 -InterruptEvent 24c -NGENProcess 234 -Pipe 25c -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:384
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1e4 -InterruptEvent 264 -NGENProcess 270 -Pipe 238 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2580
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 258 -InterruptEvent 264 -NGENProcess 1e4 -Pipe 234 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2888
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 264 -InterruptEvent 278 -NGENProcess 270 -Pipe 23c -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:1532
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 27c -InterruptEvent 278 -NGENProcess 264 -Pipe 24c -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:1716
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 240 -InterruptEvent 278 -NGENProcess 27c -Pipe 270 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:112
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 268 -InterruptEvent 278 -NGENProcess 240 -Pipe 264 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2584
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 260 -InterruptEvent 278 -NGENProcess 268 -Pipe 27c -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:792
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1e4 -InterruptEvent 278 -NGENProcess 260 -Pipe 240 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:1968
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 258 -InterruptEvent 278 -NGENProcess 1e4 -Pipe 268 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:1700
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 26c -InterruptEvent 278 -NGENProcess 258 -Pipe 260 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:1540
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1e4 -InterruptEvent 29c -NGENProcess 278 -Pipe 298 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:792
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 288 -InterruptEvent 29c -NGENProcess 1e4 -Pipe 294 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2812
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 290 -InterruptEvent 274 -NGENProcess 2a0 -Pipe 288 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2616
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 274 -InterruptEvent 2a4 -NGENProcess 1e4 -Pipe 258 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2576
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2a8 -InterruptEvent 2a4 -NGENProcess 274 -Pipe 26c -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2124
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 28c -InterruptEvent 2a4 -NGENProcess 2a8 -Pipe 1e4 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:1724
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 294 -InterruptEvent 26c -NGENProcess 288 -Pipe 1f4 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:948
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 26c -InterruptEvent 248 -NGENProcess 268 -Pipe 230 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:1500
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 238 -InterruptEvent 254 -NGENProcess 298 -Pipe 26c -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2972
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 254 -InterruptEvent 250 -NGENProcess 294 -Pipe 234 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:3004
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 210 -InterruptEvent 250 -NGENProcess 254 -Pipe 25c -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Windows directory
      PID:748
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 250 -InterruptEvent 298 -NGENProcess 254 -Pipe 238 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2968
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 28c -InterruptEvent 298 -NGENProcess 250 -Pipe 1cc -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Windows directory
      PID:2656
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2a4 -InterruptEvent 294 -NGENProcess 274 -Pipe 28c -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:332
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 284 -InterruptEvent 294 -NGENProcess 2a4 -Pipe 250 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Windows directory
      PID:2564
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 274 -InterruptEvent 2ac -NGENProcess 294 -Pipe 1d0 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2724
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 268 -InterruptEvent 2ac -NGENProcess 274 -Pipe 2b0 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Windows directory
      PID:1580
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 288 -InterruptEvent 254 -NGENProcess 294 -Pipe 248 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2696
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1ec -InterruptEvent 254 -NGENProcess 288 -Pipe 2ac -Comment "NGen Worker Process"
      2⤵
      • Loads dropped DLL
      • Drops file in Windows directory
      PID:1148
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 254 -InterruptEvent 288 -NGENProcess 29c -Pipe 294 -Comment "NGen Worker Process"
      2⤵
        PID:2836
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2a4 -InterruptEvent 288 -NGENProcess 254 -Pipe 268 -Comment "NGen Worker Process"
        2⤵
        • Loads dropped DLL
        • Drops file in Windows directory
        PID:808
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 288 -InterruptEvent 254 -NGENProcess 1ec -Pipe 29c -Comment "NGen Worker Process"
        2⤵
          PID:500
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
          C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2a0 -InterruptEvent 254 -NGENProcess 288 -Pipe 298 -Comment "NGen Worker Process"
          2⤵
          • Loads dropped DLL
          • Drops file in Windows directory
          PID:940
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
          C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1c0 -InterruptEvent 2a4 -NGENProcess 2b8 -Pipe 2a0 -Comment "NGen Worker Process"
          2⤵
            PID:824
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
            C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 274 -InterruptEvent 2a4 -NGENProcess 1c0 -Pipe 288 -Comment "NGen Worker Process"
            2⤵
            • Loads dropped DLL
            • Drops file in Windows directory
            PID:2104
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
            C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 284 -InterruptEvent 280 -NGENProcess 2c0 -Pipe 274 -Comment "NGen Worker Process"
            2⤵
              PID:816
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
              C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 278 -InterruptEvent 280 -NGENProcess 284 -Pipe 1c0 -Comment "NGen Worker Process"
              2⤵
              • Loads dropped DLL
              • Drops file in Windows directory
              PID:2664
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
              C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2a8 -InterruptEvent 2bc -NGENProcess 2c8 -Pipe 2c4 -Comment "NGen Worker Process"
              2⤵
                PID:1896
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 254 -InterruptEvent 2bc -NGENProcess 2a8 -Pipe 284 -Comment "NGen Worker Process"
                2⤵
                • Loads dropped DLL
                • Drops file in Windows directory
                PID:1220
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1ec -InterruptEvent 278 -NGENProcess 2d0 -Pipe 254 -Comment "NGen Worker Process"
                2⤵
                  PID:2372
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                  C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 278 -InterruptEvent 2a4 -NGENProcess 2a8 -Pipe 2b8 -Comment "NGen Worker Process"
                  2⤵
                  • Loads dropped DLL
                  • Drops file in Windows directory
                  PID:2400
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                  C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2d4 -InterruptEvent 1ec -NGENProcess 2d8 -Pipe 278 -Comment "NGen Worker Process"
                  2⤵
                    PID:3008
                • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
                  C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
                  1⤵
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1620
                  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
                    C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 1dc -InterruptEvent 1c8 -NGENProcess 1cc -Pipe 1d8 -Comment "NGen Worker Process"
                    2⤵
                    • Executes dropped EXE
                    PID:2228
                  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
                    C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 1d4 -InterruptEvent 240 -NGENProcess 248 -Pipe 24c -Comment "NGen Worker Process"
                    2⤵
                    • Executes dropped EXE
                    PID:1300
                • C:\Windows\ehome\ehRecvr.exe
                  C:\Windows\ehome\ehRecvr.exe
                  1⤵
                  • Executes dropped EXE
                  • Modifies data under HKEY_USERS
                  PID:808
                • C:\Windows\ehome\ehsched.exe
                  C:\Windows\ehome\ehsched.exe
                  1⤵
                  • Executes dropped EXE
                  PID:2236
                • C:\Windows\eHome\EhTray.exe
                  "C:\Windows\eHome\EhTray.exe" /nav:-2
                  1⤵
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of FindShellTrayWindow
                  • Suspicious use of SendNotifyMessage
                  PID:612
                • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                  "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                  1⤵
                  • Executes dropped EXE
                  PID:2044
                • C:\Windows\system32\IEEtwCollector.exe
                  C:\Windows\system32\IEEtwCollector.exe /V
                  1⤵
                  • Executes dropped EXE
                  PID:2068
                • C:\Windows\ehome\ehRec.exe
                  C:\Windows\ehome\ehRec.exe -Embedding
                  1⤵
                  • Modifies data under HKEY_USERS
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2012
                • C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE
                  "C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE" /auditservice
                  1⤵
                  • Executes dropped EXE
                  • Drops file in System32 directory
                  • Modifies data under HKEY_USERS
                  PID:1992
                • C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe
                  "C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"
                  1⤵
                  • Executes dropped EXE
                  • Drops file in Program Files directory
                  PID:2224
                • C:\Windows\System32\msdtc.exe
                  C:\Windows\System32\msdtc.exe
                  1⤵
                  • Executes dropped EXE
                  • Drops file in System32 directory
                  • Drops file in Windows directory
                  PID:1616
                • C:\Windows\system32\msiexec.exe
                  C:\Windows\system32\msiexec.exe /V
                  1⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2732
                • C:\Program Files (x86)\Common Files\Microsoft Shared\Source Engine\OSE.EXE
                  "C:\Program Files (x86)\Common Files\Microsoft Shared\Source Engine\OSE.EXE"
                  1⤵
                  • Executes dropped EXE
                  PID:2468
                • C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE
                  "C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"
                  1⤵
                  • Executes dropped EXE
                  • Modifies data under HKEY_USERS
                  PID:1364
                • C:\Windows\SysWow64\perfhost.exe
                  C:\Windows\SysWow64\perfhost.exe
                  1⤵
                  • Executes dropped EXE
                  PID:2268
                • C:\Windows\system32\locator.exe
                  C:\Windows\system32\locator.exe
                  1⤵
                  • Executes dropped EXE
                  PID:540
                • C:\Windows\System32\snmptrap.exe
                  C:\Windows\System32\snmptrap.exe
                  1⤵
                  • Executes dropped EXE
                  PID:2276
                • C:\Windows\System32\vds.exe
                  C:\Windows\System32\vds.exe
                  1⤵
                  • Executes dropped EXE
                  PID:2992
                • C:\Windows\system32\vssvc.exe
                  C:\Windows\system32\vssvc.exe
                  1⤵
                  • Executes dropped EXE
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2624
                • C:\Windows\system32\wbengine.exe
                  "C:\Windows\system32\wbengine.exe"
                  1⤵
                  • Executes dropped EXE
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1180
                • C:\Windows\system32\wbem\WmiApSrv.exe
                  C:\Windows\system32\wbem\WmiApSrv.exe
                  1⤵
                  • Executes dropped EXE
                  PID:692
                • C:\Program Files\Windows Media Player\wmpnetwk.exe
                  "C:\Program Files\Windows Media Player\wmpnetwk.exe"
                  1⤵
                  • Executes dropped EXE
                  • Modifies data under HKEY_USERS
                  • Suspicious use of AdjustPrivilegeToken
                  PID:324
                • C:\Windows\system32\SearchIndexer.exe
                  C:\Windows\system32\SearchIndexer.exe /Embedding
                  1⤵
                  • Executes dropped EXE
                  • Modifies data under HKEY_USERS
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:2192
                  • C:\Windows\system32\SearchProtocolHost.exe
                    "C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe_S-1-5-21-3627615824-4061627003-3019543961-10001_ Global\UsGthrCtrlFltPipeMssGthrPipe_S-1-5-21-3627615824-4061627003-3019543961-10001 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon" "1"
                    2⤵
                    • Suspicious use of SetWindowsHookEx
                    PID:2940
                  • C:\Windows\system32\SearchFilterHost.exe
                    "C:\Windows\system32\SearchFilterHost.exe" 0 588 592 600 65536 596
                    2⤵
                      PID:1628
                    • C:\Windows\system32\SearchProtocolHost.exe
                      "C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe2_ Global\UsGthrCtrlFltPipeMssGthrPipe2 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon"
                      2⤵
                      • Modifies data under HKEY_USERS
                      • Suspicious use of SetWindowsHookEx
                      PID:1076
                  • C:\Windows\system32\dllhost.exe
                    C:\Windows\system32\dllhost.exe /Processid:{02D4B3F1-FD88-11D1-960D-00805FC79235}
                    1⤵
                    • Executes dropped EXE
                    • Drops file in Windows directory
                    PID:2152

                  Network

                        MITRE ATT&CK Enterprise v15

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Program Files (x86)\Common Files\microsoft shared\Source Engine\OSE.EXE

                          Filesize

                          706KB

                          MD5

                          78ffdab62ef8be43da8cb7fd3e896c5e

                          SHA1

                          f69626d84451edc039833647efbb943bf8188ea8

                          SHA256

                          d48f7fb382baa480085881c931c0343f23d38a3c60b218fb8be2a6e96a369be7

                          SHA512

                          8d3e1866f06e915e977c89b3b183e4808ff7f40bd8d43fe55ab1c95905539049ad06f2267d4322dfc475ff2727c68681c2c9bb685c2a51c835c77d8962892a49

                        • C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE

                          Filesize

                          30.1MB

                          MD5

                          6dc7f5cc900801a5a161762fa6980c09

                          SHA1

                          101f2495e860a5207ee1c469736d67fab05881e8

                          SHA256

                          68b88456a2f70e9994cd1870ada0153a904534c7f95e8df30d119ca2846367da

                          SHA512

                          632458232a1d5281d809d3c94f24faf4aa3358166daf1bebd415bc5f096638b1f95036bdfe1950e20249a03f77efb366b9ff9e39e0adba08535feb530aaa2d7c

                        • C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe

                          Filesize

                          781KB

                          MD5

                          aa75a7235949e9ebed7824601f6cb1f0

                          SHA1

                          98e09e7a4952f37e956faa0f41ce587396854348

                          SHA256

                          885086b4631769297f64e8d79fe647071c72aa4087652deb1357e2c448eb7b30

                          SHA512

                          84257e905928d4aed0702cddf96bcb26c64aa87b683f7d763811fcb7ede62a67ca5cad9e416efab98b7ad543f7f78cdc4db7c21ecf473158c5112da5a70585b0

                        • C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE

                          Filesize

                          5.2MB

                          MD5

                          bdfa7de760126d7273e8df6f187adf94

                          SHA1

                          254222ff889fbb567b90edaa01c0a5d92dee82db

                          SHA256

                          b6920dd4734c3c6d54b3fdaf985f03b013c5bca5eb0256f5906eea76e18454ca

                          SHA512

                          28677ee30f200b3b023af3afc18a2952dc30391ea443ffbc38bd7f426d3307b78391822b3a5b8e420fc49879964e4d2dd911696a39bfcb1055cb4461241702c6

                        • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe

                          Filesize

                          2.1MB

                          MD5

                          2478d7d2415be39ea35d17b255dd4c3b

                          SHA1

                          1953b71b3fb9c5525870a7d2ea8e50eac67bf06d

                          SHA256

                          b6bdee3fbdbca8176576ffb09fcaeaeea21f8161a0d9fb4f9504e7f2d7129438

                          SHA512

                          45436590a5006c7304ed7154272981c47c876ebe3bc71a85b3067a0de5e78909095c035b70da8836dd90ab190097c0d53edf872d77120bb444c3d0a763b6974b

                        • C:\ProgramData\Microsoft\Search\Data\Applications\Windows\MSS.log

                          Filesize

                          1024KB

                          MD5

                          797286f6bd275073e20ba1d6dfc4ff1d

                          SHA1

                          1f889d4ed1188976f33ea15dd44f652dfe1225c0

                          SHA256

                          b52c6ee028dffa1497cf118a32b54ab7c9e5b56c774ad2d3799bc7257b9de459

                          SHA512

                          6dbd54f0cc16b9fc9dc479a9fc5b00573c1fd29e65cd6c8870794cf0fc5879ee7b05cfe0211fc3bf84d3caa695dd826562e7db1ba08f1b3e978fbdf4ebedbfc8

                        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b91050d8b077a4e8.customDestinations-ms

                          Filesize

                          24B

                          MD5

                          b9bd716de6739e51c620f2086f9c31e4

                          SHA1

                          9733d94607a3cba277e567af584510edd9febf62

                          SHA256

                          7116ff028244a01f3d17f1d3bc2e1506bc9999c2e40e388458f0cccc4e117312

                          SHA512

                          cef609e54c7a81a646ad38dba7ac0b82401b220773b9c792cefac80c6564753229f0c011b34ffb56381dd3154a19aee2bf5f602c4d1af01f2cf0fbc1574e4478

                        • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ngen_service.log

                          Filesize

                          872KB

                          MD5

                          9345a87eca84a1209c495a3b6a59fe5f

                          SHA1

                          ea71e788e9c90c33c5995acf267d9506763a8fbd

                          SHA256

                          c3dc7c66521815e9b7630b515f329eb19dac629916a31b6d4ab2fa4449ffbf11

                          SHA512

                          b3c00f28ba729764a7e7b6e389c6f48e502d88320b154aa77e481e424ea946aef0554002b987f7bcbafabe1a150f6584ca0af8101025a0a8046ad5f60e6e1fe7

                        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe

                          Filesize

                          603KB

                          MD5

                          6519b0c4e2aae9ce6e7404d640c8b314

                          SHA1

                          354ecdbc425fef489593950c10008fc83a98b973

                          SHA256

                          4074a00ddf8d9e2a4d182c23a126754b89e838dc84a10d355560e24602b817a9

                          SHA512

                          169a9c78910352382bf93710bda023c3ba3dc70037f4c780cf4ad79817c0df76f90c2554176326e02425cea9b8deb76c815306889931ee06fbe9604ad13002db

                        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe

                          Filesize

                          678KB

                          MD5

                          be7e2927c0a0aabf5fa65ce7f8bce61d

                          SHA1

                          04a8bafb99277803071f2276122ea88120e3c164

                          SHA256

                          fc03ec4ad348654cfc2b65034130fd60bbd539f8794abe392570768c639999de

                          SHA512

                          f49d0f79a12d96449d2432ccea615afb5e2e5ecbe6cf610fe583fb3d04d9959a1427a482dc2731a1dc1d94bab146f50ff0e7ecfb5f8b3bcf342a33fa4f724f49

                        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe

                          Filesize

                          625KB

                          MD5

                          f3adade901964ac50187f1e47493cf5b

                          SHA1

                          7ceda1ddfae2511f8171bf54155104729327672a

                          SHA256

                          06b2b8555c7bdc1947303e881c2b1b83b67ed6a2976ade73af999f28f7d1ceda

                          SHA512

                          6ddf41e95fe924991991637e953faa8127dafcc47602121bf98bcfc47aeef3af0bb5d6a1be471f094b264594f14b448ebd9540737eb398c550f096804a781600

                        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\ngen_service.log

                          Filesize

                          1003KB

                          MD5

                          b81a6579e55d81be6b71eef7c73b76b5

                          SHA1

                          aac9eb4675d7235ac342293961f7850dcaf1e3d2

                          SHA256

                          a4e13bbd7e4569b1a48e9a8edeefe70186ae1195ce224cc0f231a9298578f4ef

                          SHA512

                          731ada5a7465f7488232281d5da40fda7ddf8cb179ad1a69837f078e27817bd41f59ae076f7cb6d5abba0d83f1a594f525cf23819cc3c6225f7fc1355feec89c

                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe

                          Filesize

                          656KB

                          MD5

                          7e04b409de704961de90c0adf2bf9b79

                          SHA1

                          e38cc734a6e183bc4c1322a843928e51c1da8f04

                          SHA256

                          89877785928da924d41be7af4b447f483d01ad4760b9759317d3d3d21de6945b

                          SHA512

                          2da0fa71064b6d6569e4067f7504e7e3c9cfac844a2652299e4cb4dfbe80778c52df89e351f0b3117ffba450c5160ab679c4bc83fe5aacbaa6d11786819ce6b2

                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen_service.log

                          Filesize

                          8KB

                          MD5

                          7625e34fbaff4e5d27270b8c18aaff01

                          SHA1

                          1b5757ff2acb17f587fa29f08e8defbfc9af8da2

                          SHA256

                          8e90830dea391633fed1d480a20fa73f43f0d5e8028303a14495980527174a54

                          SHA512

                          9444837367efc2ed78c0da6b183cf4af5081051c94afd88d429d4d6523a377dfc071f62e0b1d84c830f42c3a22586f2aeda9fccf891b70458ce73ed4a88c3847

                        • C:\Windows\SysWOW64\perfhost.exe

                          Filesize

                          587KB

                          MD5

                          432db0901c2b9301d5a73ef0118329e0

                          SHA1

                          9a51b0e9355576a8326f7a97f5ae67424c6451a3

                          SHA256

                          664aa5f584b5951cea75088225a5a2feea434bd7cba32d11f35f00083f719743

                          SHA512

                          16bf7b040b468eb439f1c93110f7b626e2a8d952419417831428e48f40caf4155712f42a7c3e8b35ea9f8235c7b88dc65c52b211de6c211596bd93a15db4f446

                        • C:\Windows\System32\SearchIndexer.exe

                          Filesize

                          1.1MB

                          MD5

                          da4416db89e1b34c1e860f87bce8de8b

                          SHA1

                          1d12e35320b0fce724f7447a1475f2e81a04f973

                          SHA256

                          c0e4c782727314fd83d367eed2a48dde09d1877f806f99dccf63653f4b773428

                          SHA512

                          63d374238b89a3cd56caf89e3ebb4ac17bc453ea06a877cf3a3ef69fd576c114f13eb39060b2c5fb9c2c84d037d239bd7ef3c016441af20c40f90535bd3ae47d

                        • C:\Windows\System32\VSSVC.exe

                          Filesize

                          2.1MB

                          MD5

                          3b22a0f05c1c88c12b37ecbc027ec49f

                          SHA1

                          d639df6058ebb04ab51ff0dbae7f0b29dcdfc2bb

                          SHA256

                          6244ec755a48a7e73092458bf7214b4af97eb3dffd3dd4b6a2b04c8c861b6870

                          SHA512

                          5cdff944a21180d2bb4a57f0330c682a296d647d268a95f44f07fa5a22273f5af7a1b4141cfca08f7b75fad95dcb71c4b03114210bbb8dba148443446558eaea

                        • C:\Windows\System32\ieetwcollector.exe

                          Filesize

                          674KB

                          MD5

                          08afdec2c21961580c635910a9009592

                          SHA1

                          19bd733957b9c1f479a813d8e28859b4f0cca27c

                          SHA256

                          4803a0432722d125f10d0e2769835b0e2af518ab29b98f1c7a30af0c555c971d

                          SHA512

                          8138be6f12f5dc9ebecc1abe157a6b623ac9b00c548a5835f63c51bfa0389b8db150df33705ba4dec2807b2c892c0658f0487efe8530592f918dfcc8d2c8a5b9

                        • C:\Windows\System32\msdtc.exe

                          Filesize

                          705KB

                          MD5

                          2ba1e9d3522d8443b4c13b29cd1a0821

                          SHA1

                          4836139578ece94045a34a01e90fda93e089d91a

                          SHA256

                          1c4553ffdceca8e2dfc8780cc8f9a99f6730440fb25ae1abf9e95f97aae53e7c

                          SHA512

                          4861979280cd8d70d6745fab54ead62cf2981ff34a6449daa31019799c556c80f0f681bc2a6c5a5698075fc69b3cad09207e882d4dc8865777bd39a06d1b6d88

                        • C:\Windows\System32\snmptrap.exe

                          Filesize

                          581KB

                          MD5

                          8faad73a4ebaa1aa28bd43701f30c466

                          SHA1

                          0ee913aee666c0614d6e3d7963555a45bbf00504

                          SHA256

                          0b0a3d83438629d287843c8ee3c98a17d9aa00af8aeadcb9e069e03a5abef373

                          SHA512

                          1dd76d139fcec33fec2a83e314d4e6893e2e77b19e37fe70b6a2cc5e9aad2f26d70b9d706e08a025447bdb7c8e63c9026fbd665853ab4c0c245658f59ff0dc4a

                        • C:\Windows\System32\vds.exe

                          Filesize

                          1.1MB

                          MD5

                          d2c07e525b6f0acf4ed739821a5472fd

                          SHA1

                          e90b531851ec8b40672358d53d4a9231238a5e37

                          SHA256

                          4e6d4e4c2fc89973d9b0c8df9bd4389bc9d3e3f42ac9eb93062f99a5751801da

                          SHA512

                          6d6516ccdd09f5c5a0a3103ea6a7eca656c0689e407dcbd392169d2f0c0fe45f20c81b602a40f15f8a1a2a9b34fd5ba54fe6d6865b0a798d01386327940dfbca

                        • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.Office.To#\e1f8e4d08d4b7f811b7dbbacd324027b\Microsoft.Office.Tools.v9.0.ni.dll

                          Filesize

                          148KB

                          MD5

                          ac901cf97363425059a50d1398e3454b

                          SHA1

                          2f8bd4ac2237a7b7606cb77a3d3c58051793c5c7

                          SHA256

                          f6c7aecb211d9aac911bf80c91e84a47a72ac52cbb523e34e9da6482c0b24c58

                          SHA512

                          6a340b6d5fa8e214f2a58d8b691c749336df087fa75bcc8d8c46f708e4b4ff3d68a61a17d13ee62322b75cbc61d39f5a572588772f3c5d6e5ff32036e5bc5a00

                        • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\03cad6bd8b37d21b28dcb4f955be2158\Microsoft.VisualStudio.Tools.Applications.Contract.v9.0.ni.dll

                          Filesize

                          34KB

                          MD5

                          c26b034a8d6ab845b41ed6e8a8d6001d

                          SHA1

                          3a55774cf22d3244d30f9eb5e26c0a6792a3e493

                          SHA256

                          620b41f5e02df56c33919218bedc238ca7e76552c43da4f0f39a106835a4edc3

                          SHA512

                          483424665c3bc79aeb1de6dfdd633c8526331c7b271b1ea6fe93ab298089e2aceefe7f9c7d0c6e33e604ca7b2ed62e7bb586147fecdf9a0eea60e8c03816f537

                        • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\0cb958acb9cd4cacb46ebc0396e30aa3\Microsoft.VisualStudio.Tools.Office.Contract.v9.0.ni.dll

                          Filesize

                          109KB

                          MD5

                          0fd0f978e977a4122b64ae8f8541de54

                          SHA1

                          153d3390416fdeba1b150816cbbf968e355dc64f

                          SHA256

                          211d2b83bb82042385757f811d90c5ae0a281f3abb3bf1c7901e8559db479e60

                          SHA512

                          ceddfc031bfe4fcf5093d0bbc5697b5fb0cd69b03bc32612325a82ea273dae5daff7e670b0d45816a33307b8b042d27669f5d5391cb2bdcf3e5a0c847c6dcaa8

                        • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\367516b7878af19f5c84c67f2cd277ae\Microsoft.VisualStudio.Tools.Office.Word.AddInAdapter.v9.0.ni.dll

                          Filesize

                          41KB

                          MD5

                          3c269caf88ccaf71660d8dc6c56f4873

                          SHA1

                          f9481bf17e10fe1914644e1b590b82a0ecc2c5c4

                          SHA256

                          de21619e70f9ef8ccbb274bcd0d9d2ace1bae0442dfefab45976671587cf0a48

                          SHA512

                          bd5be3721bf5bd4001127e0381a0589033cb17aa35852f8f073ba9684af7d8c5a0f3ee29987b345fc15fdf28c5b56686087001ef41221a2cfb16498cf4c016c6

                        • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\8c6bac317f75b51647ea3a8da141b143\Microsoft.VisualStudio.Tools.Office.AddInAdapter.v9.0.ni.dll

                          Filesize

                          210KB

                          MD5

                          4f40997b51420653706cb0958086cd2d

                          SHA1

                          0069b956d17ce7d782a0e054995317f2f621b502

                          SHA256

                          8cd6a0b061b43e0b660b81859c910290a3672b00d7647ba0e86eda6ddcc8c553

                          SHA512

                          e18953d7a348859855e5f6e279bc9924fc3707b57a733ce9b8f7d21bd631d419f1ebfb29202608192eb346569ca9a55264f5b4c2aedd474c22060734a68a4ee6

                        • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\9306fc630870a75ddd23441ad77bdc57\Microsoft.VisualStudio.Tools.Applications.Runtime.v10.0.ni.dll

                          Filesize

                          53KB

                          MD5

                          e3a7a2b65afd8ab8b154fdc7897595c3

                          SHA1

                          b21eefd6e23231470b5cf0bd0d7363879a2ed228

                          SHA256

                          e5faf5e8adf46a8246e6b5038409dadca46985a9951343a1936237d2c8d7a845

                          SHA512

                          6537c7ed398deb23be1256445297cb7c8d7801bf6e163d918d8e258213708b28f7255ecff9fbd3431d8f5e5a746aa95a29d3a777b28fcd688777aed6d8205a33

                        • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\afa5bb1a39443d7dc81dfff54073929b\Microsoft.VisualStudio.Tools.Office.Contract.v10.0.ni.dll

                          Filesize

                          28KB

                          MD5

                          aefc3f3c8e7499bad4d05284e8abd16c

                          SHA1

                          7ab718bde7fdb2d878d8725dc843cfeba44a71f7

                          SHA256

                          4436550409cfb3d06b15dd0c3131e87e7002b0749c7c6e9dc3378c99dbec815d

                          SHA512

                          1d7dbc9764855a9a1f945c1bc8e86406c0625f1381d71b3ea6924322fbe419d1c70c3f3efd57ee2cb2097bb9385e0bf54965ab789328a80eb4946849648fe20b

                        • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\de06a98a598aa0ff716a25b24d56ad7f\Microsoft.VisualStudio.Tools.Applications.Contract.v10.0.ni.dll

                          Filesize

                          27KB

                          MD5

                          9c60454398ce4bce7a52cbda4a45d364

                          SHA1

                          da1e5de264a6f6051b332f8f32fa876d297bf620

                          SHA256

                          edc90887d38c87282f49adbb12a94040f9ac86058bfae15063aaaff2672b54e1

                          SHA512

                          533b7e9c55102b248f4a7560955734b4156eb4c02539c6f978aeacecff1ff182ba0f04a07d32ed90707a62d73191b0e2d2649f38ae1c3e7a5a4c0fbea9a94300

                        • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\ee73646032cbb022d16771203727e3b2\Microsoft.VisualStudio.Tools.Applications.Runtime.v9.0.ni.dll

                          Filesize

                          130KB

                          MD5

                          2735d2ab103beb0f7c1fbd6971838274

                          SHA1

                          6063646bc072546798bf8bf347425834f2bfad71

                          SHA256

                          f00156860ec7e88f4ccb459ca29b7e0e5c169cdc8a081cb043603187d25d92b3

                          SHA512

                          fe2ce60c7f61760a29344e254771d48995e983e158da0725818f37441f9690bda46545bf10c84b163f6afb163ffb504913d6ffddf84f72b062c7f233aed896de

                        • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\f1a7ac664667f2d6bcd6c388b230c22b\Microsoft.VisualStudio.Tools.Applications.AddInAdapter.v9.0.ni.dll

                          Filesize

                          59KB

                          MD5

                          8c69bbdfbc8cc3fa3fa5edcd79901e94

                          SHA1

                          b8028f0f557692221d5c0160ec6ce414b2bdf19b

                          SHA256

                          a21471690e7c32c80049e17c13624820e77bca6c9c38b83d9ea8a7248086660d

                          SHA512

                          825f5b87b76303b62fc16a96b108fb1774c2aca52ac5e44cd0ac2fe2ee47d5d67947dfe7498e36bc849773f608ec5824711f8c36e375a378582eefb57c9c2557

                        • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\fc36797f7054935a6033077612905a0f\Microsoft.VisualStudio.Tools.Office.Excel.AddInAdapter.v9.0.ni.dll

                          Filesize

                          42KB

                          MD5

                          71d4273e5b77cf01239a5d4f29e064fc

                          SHA1

                          e8876dea4e4c4c099e27234742016be3c80d8b62

                          SHA256

                          f019899f829731f899a99885fd52fde1fe4a4f6fe3ecf7f7a7cfa78517c00575

                          SHA512

                          41fe67cda988c53bd087df6296d1a242cddac688718ea5a5884a72b43e9638538e64d7a59e045c0b4d490496d884cf0ec694ddf7fcb41ae3b8cbc65b7686b180

                        • \Program Files\Windows Media Player\wmpnetwk.exe

                          Filesize

                          2.0MB

                          MD5

                          5d990e08628d1382e37c0b3f429e695b

                          SHA1

                          934f805fcf9d2c86d7cf4ff4884af94414d7a6f3

                          SHA256

                          e9d68b6eab2ecf740362e6de225b39bcaf828982c2b06307ec59148f9ee5f40f

                          SHA512

                          9b73da9efaeda09d422d96d60fd8e2ba25cb4acb343064a6bfbd2cdc79eb70b031bc071af85f2ddf102b23f91ab1c55145a70dfec3b4499c26f2e8e44b3d17a6

                        • \Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe

                          Filesize

                          648KB

                          MD5

                          e8008856da9f497d0a2056aa980eb488

                          SHA1

                          444639db329b3f4b9e9a976b41c70c79410a2fea

                          SHA256

                          e2c67aa986f8ced3fa40e03f8c6abcd416e3f65a89544a10e25e85a4387f8df4

                          SHA512

                          72badac426bf1002ddd96f6f928873a3b7f2ecfef7fe588957d9b81d94428d16eb2e1bc29f938fc1b197e7e369cb2099c6bc62b754e8af406b7bafc0f9f536a8

                        • \Windows\System32\Locator.exe

                          Filesize

                          577KB

                          MD5

                          647cb117981329879bb74773f92eec91

                          SHA1

                          5c45f38cb6175426a54ecdcbf914bae73cf97674

                          SHA256

                          078f55c15c3973b00f008f9be574faa019177a62703465471c791117afe33705

                          SHA512

                          65a1d786a4f7195ffafd9cb0725d50318711e623c0212ad512e463d593166f96b60f2bc6c6c5501639a6c683d79d1edcc104df4cf15d1941f3e87d3450c1c8c8

                        • \Windows\System32\alg.exe

                          Filesize

                          644KB

                          MD5

                          1f20f688bd27b76e867e51eebde0287e

                          SHA1

                          03dd4965b5b5e89586afc1d44935bf0aa8211b56

                          SHA256

                          308f9a8415b505458d58eb04182aeadb946a8e171b6f8120c1f2f46564210793

                          SHA512

                          136d1ebbe7aff5175ad641e7fc679d4372cd8fc552aa3f1b0429b5ce7e7ab8f94573b046f0d1dcaaf8436e4fa38370131e4339ab47ab8795ba948ba60d64b13d

                        • \Windows\System32\msiexec.exe

                          Filesize

                          691KB

                          MD5

                          5fb78055e9c501a03b738b39002f9fbb

                          SHA1

                          9bc1505180bbe0ff2d9e2b5c9afb806729ec911a

                          SHA256

                          a245a9df7156d2d4cf919bfe5e6ce9af69eaf64c233e73b282fb52e69825b540

                          SHA512

                          aae86d9876c2a6bcb0bfdc2a74288dea7ad3ba4f7fb94a3cdd85522e8595ffe6431c7210a153351b889174efd7a879dd6890091fec4054f633024df138513f18

                        • \Windows\System32\wbem\WmiApSrv.exe

                          Filesize

                          765KB

                          MD5

                          dad87a5b4a7086592e66005518596af0

                          SHA1

                          f31f12cb67408353171ac73bbad0bedf158c0e22

                          SHA256

                          f2b99b72c0737f627111b22c26db7d40a002423310818c223dc2d729032cad97

                          SHA512

                          2e6b0041a6fde4966848d44693a8b51703f3061648c6b21632730230415d4209314beb46398ad874944877a3bbfd1eaed547ed790a6cc71a163fb9307fa8f200

                        • \Windows\System32\wbengine.exe

                          Filesize

                          2.0MB

                          MD5

                          8db3e7cbaa6266b171a637ba0e3c331a

                          SHA1

                          93ea35336b72bb342b935ea6ad7e253f6e932ef5

                          SHA256

                          1e32c40d70df1293bd155a33be95c6f3ac0b18d37bacabef2c4659349301e3e6

                          SHA512

                          d21acf0c43f4e22d310745fd0ae50acb037ba15e9a68c682bd89a27040a2cee5e1f05aa19c214db1daeab57292ffb3c04ca46807907f6f69d4ed165f06a40530

                        • \Windows\ehome\ehrecvr.exe

                          Filesize

                          1.2MB

                          MD5

                          30c0a4bd6c432f59d9ced0789e8933b4

                          SHA1

                          e178a74a53e4c2f3b994b76113aaefa04ccbc7e2

                          SHA256

                          751489b76730642b5c47575cac9ec87b601f6c716ba3afd734fdca58606052c8

                          SHA512

                          6f1c6a4290155376010d9d0288b2fd47288595b45bb420b779157ddefd1a3e15e35e30327bfd42dc27a5db529f5d5b71d9e300561c19280a869cc4a6dea9ab39

                        • \Windows\ehome\ehsched.exe

                          Filesize

                          691KB

                          MD5

                          6c8b773308ad7b2932256c695e9a1e95

                          SHA1

                          6780060c044acd7d957b08f04a4b94c9eb74031d

                          SHA256

                          f66c7d8809148cd02ab8cea8c3a7d43d82d4d66a6af679b5e9f704b80ad5f73b

                          SHA512

                          98ec12f947e2ca3ba8c4fc11a917dec58a8a50a575c2ca814e039ddab1d87cbc5d9f4820cdac628b4f433bb35fc43d91b4c7aeed8dc0031093cf1bcb82f45af2

                        • memory/540-302-0x0000000100000000-0x0000000100095000-memory.dmp

                          Filesize

                          596KB

                        • memory/808-202-0x0000000001A30000-0x0000000001A31000-memory.dmp

                          Filesize

                          4KB

                        • memory/808-179-0x0000000140000000-0x000000014013C000-memory.dmp

                          Filesize

                          1.2MB

                        • memory/808-111-0x0000000000A60000-0x0000000000AC0000-memory.dmp

                          Filesize

                          384KB

                        • memory/808-135-0x0000000001A30000-0x0000000001A31000-memory.dmp

                          Filesize

                          4KB

                        • memory/808-118-0x0000000000A60000-0x0000000000AC0000-memory.dmp

                          Filesize

                          384KB

                        • memory/808-113-0x0000000140000000-0x000000014013C000-memory.dmp

                          Filesize

                          1.2MB

                        • memory/1076-299-0x0000000000400000-0x00000000004A8000-memory.dmp

                          Filesize

                          672KB

                        • memory/1364-272-0x0000000000830000-0x0000000000890000-memory.dmp

                          Filesize

                          384KB

                        • memory/1364-273-0x0000000100000000-0x0000000100542000-memory.dmp

                          Filesize

                          5.3MB

                        • memory/1364-289-0x0000000073788000-0x000000007379D000-memory.dmp

                          Filesize

                          84KB

                        • memory/1616-213-0x0000000140000000-0x00000001400B6000-memory.dmp

                          Filesize

                          728KB

                        • memory/1616-218-0x00000000009E0000-0x0000000000A40000-memory.dmp

                          Filesize

                          384KB

                        • memory/1616-286-0x0000000140000000-0x00000001400B6000-memory.dmp

                          Filesize

                          728KB

                        • memory/1620-95-0x00000000001E0000-0x0000000000240000-memory.dmp

                          Filesize

                          384KB

                        • memory/1620-164-0x0000000140000000-0x00000001400AE000-memory.dmp

                          Filesize

                          696KB

                        • memory/1620-89-0x00000000001E0000-0x0000000000240000-memory.dmp

                          Filesize

                          384KB

                        • memory/1620-88-0x0000000140000000-0x00000001400AE000-memory.dmp

                          Filesize

                          696KB

                        • memory/1992-180-0x0000000000230000-0x0000000000297000-memory.dmp

                          Filesize

                          412KB

                        • memory/1992-247-0x000000002E000000-0x000000002FE1E000-memory.dmp

                          Filesize

                          30.1MB

                        • memory/1992-175-0x000000002E000000-0x000000002FE1E000-memory.dmp

                          Filesize

                          30.1MB

                        • memory/2012-169-0x0000000000F30000-0x0000000000FB0000-memory.dmp

                          Filesize

                          512KB

                        • memory/2012-225-0x0000000000F30000-0x0000000000FB0000-memory.dmp

                          Filesize

                          512KB

                        • memory/2012-290-0x0000000000F30000-0x0000000000FB0000-memory.dmp

                          Filesize

                          512KB

                        • memory/2012-172-0x000007FEF4330000-0x000007FEF4CCD000-memory.dmp

                          Filesize

                          9.6MB

                        • memory/2012-243-0x000007FEF4330000-0x000007FEF4CCD000-memory.dmp

                          Filesize

                          9.6MB

                        • memory/2012-241-0x0000000000F30000-0x0000000000FB0000-memory.dmp

                          Filesize

                          512KB

                        • memory/2012-168-0x000007FEF4330000-0x000007FEF4CCD000-memory.dmp

                          Filesize

                          9.6MB

                        • memory/2012-232-0x000007FEF4330000-0x000007FEF4CCD000-memory.dmp

                          Filesize

                          9.6MB

                        • memory/2044-211-0x0000000140000000-0x0000000140237000-memory.dmp

                          Filesize

                          2.2MB

                        • memory/2044-148-0x00000000003E0000-0x0000000000440000-memory.dmp

                          Filesize

                          384KB

                        • memory/2044-140-0x0000000140000000-0x0000000140237000-memory.dmp

                          Filesize

                          2.2MB

                        • memory/2068-223-0x0000000140000000-0x00000001400AE000-memory.dmp

                          Filesize

                          696KB

                        • memory/2068-155-0x0000000140000000-0x00000001400AE000-memory.dmp

                          Filesize

                          696KB

                        • memory/2068-162-0x0000000000810000-0x0000000000870000-memory.dmp

                          Filesize

                          384KB

                        • memory/2224-184-0x0000000140000000-0x00000001400CA000-memory.dmp

                          Filesize

                          808KB

                        • memory/2224-231-0x0000000000910000-0x0000000000970000-memory.dmp

                          Filesize

                          384KB

                        • memory/2224-226-0x0000000140000000-0x00000001400CA000-memory.dmp

                          Filesize

                          808KB

                        • memory/2224-208-0x0000000000910000-0x0000000000970000-memory.dmp

                          Filesize

                          384KB

                        • memory/2236-123-0x0000000140000000-0x00000001400B2000-memory.dmp

                          Filesize

                          712KB

                        • memory/2236-133-0x0000000000BE0000-0x0000000000C40000-memory.dmp

                          Filesize

                          384KB

                        • memory/2236-186-0x0000000140000000-0x00000001400B2000-memory.dmp

                          Filesize

                          712KB

                        • memory/2268-280-0x0000000001000000-0x0000000001096000-memory.dmp

                          Filesize

                          600KB

                        • memory/2268-288-0x0000000000210000-0x0000000000277000-memory.dmp

                          Filesize

                          412KB

                        • memory/2308-204-0x0000000000380000-0x00000000003E7000-memory.dmp

                          Filesize

                          412KB

                        • memory/2308-274-0x0000000000400000-0x00000000004A8000-memory.dmp

                          Filesize

                          672KB

                        • memory/2308-190-0x0000000000400000-0x00000000004A8000-memory.dmp

                          Filesize

                          672KB

                        • memory/2308-271-0x00000000729E0000-0x00000000730CE000-memory.dmp

                          Filesize

                          6.9MB

                        • memory/2368-5-0x0000000000240000-0x00000000002A7000-memory.dmp

                          Filesize

                          412KB

                        • memory/2368-73-0x0000000000400000-0x0000000001EFA000-memory.dmp

                          Filesize

                          27.0MB

                        • memory/2368-7-0x0000000000400000-0x0000000001EFA000-memory.dmp

                          Filesize

                          27.0MB

                        • memory/2368-0-0x0000000000240000-0x00000000002A7000-memory.dmp

                          Filesize

                          412KB

                        • memory/2388-18-0x0000000000900000-0x0000000000960000-memory.dmp

                          Filesize

                          384KB

                        • memory/2388-12-0x0000000000900000-0x0000000000960000-memory.dmp

                          Filesize

                          384KB

                        • memory/2388-97-0x0000000100000000-0x00000001000A4000-memory.dmp

                          Filesize

                          656KB

                        • memory/2388-19-0x0000000100000000-0x00000001000A4000-memory.dmp

                          Filesize

                          656KB

                        • memory/2468-252-0x000000002E000000-0x000000002E0B5000-memory.dmp

                          Filesize

                          724KB

                        • memory/2468-255-0x0000000000230000-0x0000000000297000-memory.dmp

                          Filesize

                          412KB

                        • memory/2508-79-0x00000000002C0000-0x0000000000327000-memory.dmp

                          Filesize

                          412KB

                        • memory/2508-152-0x0000000000400000-0x00000000004A8000-memory.dmp

                          Filesize

                          672KB

                        • memory/2508-78-0x00000000002C0000-0x0000000000327000-memory.dmp

                          Filesize

                          412KB

                        • memory/2508-74-0x0000000000400000-0x00000000004A8000-memory.dmp

                          Filesize

                          672KB

                        • memory/2508-71-0x00000000002C0000-0x0000000000327000-memory.dmp

                          Filesize

                          412KB

                        • memory/2572-106-0x0000000010000000-0x00000000100A7000-memory.dmp

                          Filesize

                          668KB

                        • memory/2572-54-0x0000000010000000-0x00000000100A7000-memory.dmp

                          Filesize

                          668KB

                        • memory/2572-60-0x0000000000520000-0x0000000000580000-memory.dmp

                          Filesize

                          384KB

                        • memory/2572-53-0x0000000000520000-0x0000000000580000-memory.dmp

                          Filesize

                          384KB

                        • memory/2596-110-0x0000000140000000-0x000000014009D000-memory.dmp

                          Filesize

                          628KB

                        • memory/2596-32-0x0000000000300000-0x0000000000360000-memory.dmp

                          Filesize

                          384KB

                        • memory/2596-25-0x0000000140000000-0x000000014009D000-memory.dmp

                          Filesize

                          628KB

                        • memory/2596-26-0x0000000000300000-0x0000000000360000-memory.dmp

                          Filesize

                          384KB

                        • memory/2660-43-0x0000000000280000-0x00000000002E7000-memory.dmp

                          Filesize

                          412KB

                        • memory/2660-37-0x0000000000280000-0x00000000002E7000-memory.dmp

                          Filesize

                          412KB

                        • memory/2660-36-0x0000000010000000-0x000000001009F000-memory.dmp

                          Filesize

                          636KB

                        • memory/2660-68-0x0000000010000000-0x000000001009F000-memory.dmp

                          Filesize

                          636KB

                        • memory/2732-249-0x0000000000680000-0x00000000006E0000-memory.dmp

                          Filesize

                          384KB

                        • memory/2732-311-0x0000000100000000-0x00000001000B2000-memory.dmp

                          Filesize

                          712KB

                        • memory/2732-234-0x0000000100000000-0x00000001000B2000-memory.dmp

                          Filesize

                          712KB

                        • memory/2732-236-0x0000000000570000-0x0000000000622000-memory.dmp

                          Filesize

                          712KB