Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    145s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    14/05/2024, 14:38

General

  • Target

    cadc97b40cacb5a00636a3b807d36380_NeikiAnalytics.exe

  • Size

    3.1MB

  • MD5

    cadc97b40cacb5a00636a3b807d36380

  • SHA1

    b84090d2ff717ffaf63038bfd84184f15d03573b

  • SHA256

    b09982f459ab37f10813274c4f6d4500c6cccf00d45f5d82de3bd8f8ded3c1a9

  • SHA512

    19a9307a48dc23c7a032f1884f400a9f6f280b4bdae8f1c6564c540cd359848ec39f2a46e830ee925c0abdf673c3186c0ba069e7e385905698d9b7b63a171562

  • SSDEEP

    98304:kHgNDfXQ1veFPk5FaoCRrgGUDx3XvYCp3nyG:VDfgZeVmCJWl3Tp3n

Malware Config

Signatures

  • Executes dropped EXE 64 IoCs
  • Loads dropped DLL 56 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 23 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 56 IoCs
  • Suspicious behavior: EnumeratesProcesses 33 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of SetWindowsHookEx 22 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\cadc97b40cacb5a00636a3b807d36380_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\cadc97b40cacb5a00636a3b807d36380_NeikiAnalytics.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2248
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\VCREDI~1.EXE
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\VCREDI~1.EXE
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1152
      • C:\Windows\SysWOW64\msiexec.exe
        msiexec /i vcredist.msi
        3⤵
        • Blocklisted process makes network request
        • Enumerates connected drives
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        PID:2348
  • C:\Windows\System32\alg.exe
    C:\Windows\System32\alg.exe
    1⤵
    • Executes dropped EXE
    PID:1072
  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe
    C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    PID:2576
  • C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe
    C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe
    1⤵
    • Executes dropped EXE
    PID:2416
  • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe
    C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe
    1⤵
    • Executes dropped EXE
    • Drops file in Windows directory
    PID:2376
  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
    C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1040
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1ec -InterruptEvent 1d8 -NGENProcess 1dc -Pipe 1e8 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2484
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 25c -InterruptEvent 1d8 -NGENProcess 1dc -Pipe 1ec -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2860
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1d8 -InterruptEvent 260 -NGENProcess 250 -Pipe 24c -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2152
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1d8 -InterruptEvent 258 -NGENProcess 25c -Pipe 240 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2612
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1f4 -InterruptEvent 268 -NGENProcess 248 -Pipe 1d8 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:1680
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1dc -InterruptEvent 260 -NGENProcess 26c -Pipe 1f4 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2860
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 250 -InterruptEvent 25c -NGENProcess 270 -Pipe 1dc -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:1792
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 25c -InterruptEvent 244 -NGENProcess 26c -Pipe 264 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2560
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 244 -InterruptEvent 278 -NGENProcess 260 -Pipe 274 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2484
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 278 -InterruptEvent 258 -NGENProcess 268 -Pipe 270 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2552
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 258 -InterruptEvent 27c -NGENProcess 250 -Pipe 254 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:1932
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 27c -InterruptEvent 280 -NGENProcess 260 -Pipe 248 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2660
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 284 -InterruptEvent 258 -NGENProcess 288 -Pipe 27c -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:852
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 258 -InterruptEvent 25c -NGENProcess 260 -Pipe 244 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:432
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 25c -InterruptEvent 290 -NGENProcess 280 -Pipe 28c -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2840
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 25c -InterruptEvent 268 -NGENProcess 258 -Pipe 250 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:1188
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 288 -InterruptEvent 298 -NGENProcess 26c -Pipe 25c -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2600
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 298 -InterruptEvent 29c -NGENProcess 258 -Pipe 260 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2380
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2a0 -InterruptEvent 288 -NGENProcess 2a4 -Pipe 298 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2808
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 268 -InterruptEvent 294 -NGENProcess 280 -Pipe 2a0 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:1312
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 294 -InterruptEvent 284 -NGENProcess 2a4 -Pipe 2a8 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2376
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 284 -InterruptEvent 2a4 -NGENProcess 278 -Pipe 2ac -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:1388
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2a4 -InterruptEvent 29c -NGENProcess 26c -Pipe 290 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:940
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2ac -InterruptEvent 1f0 -NGENProcess 2a8 -Pipe 230 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2028
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1f0 -InterruptEvent 1dc -NGENProcess 298 -Pipe 264 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:1540
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1f4 -InterruptEvent 2ac -NGENProcess 1d8 -Pipe 1f0 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:1016
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2ac -InterruptEvent 274 -NGENProcess 298 -Pipe 248 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2536
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 274 -InterruptEvent 240 -NGENProcess 1dc -Pipe 270 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Windows directory
      PID:1908
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 240 -InterruptEvent 298 -NGENProcess 1dc -Pipe 1f4 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2176
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 298 -InterruptEvent 220 -NGENProcess 24c -Pipe 1ec -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Windows directory
      PID:1928
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 220 -InterruptEvent 298 -NGENProcess 1fc -Pipe 2a8 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:596
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 298 -InterruptEvent 2ac -NGENProcess 1c8 -Pipe 1d8 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Windows directory
      PID:1464
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2ac -InterruptEvent 1c8 -NGENProcess 220 -Pipe 24c -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:3000
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1c8 -InterruptEvent 294 -NGENProcess 1fc -Pipe 240 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Windows directory
      PID:2816
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 294 -InterruptEvent 1fc -NGENProcess 2ac -Pipe 2b0 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2192
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1fc -InterruptEvent 288 -NGENProcess 220 -Pipe 298 -Comment "NGen Worker Process"
      2⤵
      • Loads dropped DLL
      • Drops file in Windows directory
      PID:1716
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 288 -InterruptEvent 220 -NGENProcess 294 -Pipe 2a4 -Comment "NGen Worker Process"
      2⤵
        PID:1912
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 220 -InterruptEvent 294 -NGENProcess 1fc -Pipe 278 -Comment "NGen Worker Process"
        2⤵
        • Loads dropped DLL
        • Drops file in Windows directory
        PID:2160
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 294 -InterruptEvent 1fc -NGENProcess 254 -Pipe 26c -Comment "NGen Worker Process"
        2⤵
          PID:2696
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
          C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1fc -InterruptEvent 268 -NGENProcess 288 -Pipe 1dc -Comment "NGen Worker Process"
          2⤵
          • Loads dropped DLL
          • Drops file in Windows directory
          PID:2864
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
          C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 268 -InterruptEvent 288 -NGENProcess 294 -Pipe 1c8 -Comment "NGen Worker Process"
          2⤵
            PID:1528
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
            C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 288 -InterruptEvent 258 -NGENProcess 254 -Pipe 220 -Comment "NGen Worker Process"
            2⤵
            • Loads dropped DLL
            • Drops file in Windows directory
            PID:3020
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
            C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2b4 -InterruptEvent 268 -NGENProcess 2b8 -Pipe 288 -Comment "NGen Worker Process"
            2⤵
              PID:564
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
              C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1d4 -InterruptEvent 268 -NGENProcess 2b4 -Pipe 254 -Comment "NGen Worker Process"
              2⤵
              • Loads dropped DLL
              • Drops file in Windows directory
              PID:768
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
              C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 268 -InterruptEvent 2b4 -NGENProcess 2ac -Pipe 2b8 -Comment "NGen Worker Process"
              2⤵
                PID:1440
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2b4 -InterruptEvent 2c0 -NGENProcess 280 -Pipe 294 -Comment "NGen Worker Process"
                2⤵
                • Loads dropped DLL
                • Drops file in Windows directory
                PID:2432
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2c0 -InterruptEvent 280 -NGENProcess 268 -Pipe 1fc -Comment "NGen Worker Process"
                2⤵
                  PID:2316
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                  C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2c8 -InterruptEvent 280 -NGENProcess 2c0 -Pipe 2ac -Comment "NGen Worker Process"
                  2⤵
                  • Loads dropped DLL
                  • Drops file in Windows directory
                  PID:1920
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                  C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 310 -InterruptEvent 31c -NGENProcess 318 -Pipe 308 -Comment "NGen Worker Process"
                  2⤵
                    PID:2624
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                    C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 31c -InterruptEvent 330 -NGENProcess 320 -Pipe 32c -Comment "NGen Worker Process"
                    2⤵
                    • Loads dropped DLL
                    PID:2892
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                    C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 30c -InterruptEvent 31c -NGENProcess 338 -Pipe 310 -Comment "NGen Worker Process"
                    2⤵
                      PID:2352
                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 31c -InterruptEvent 324 -NGENProcess 320 -Pipe 304 -Comment "NGen Worker Process"
                      2⤵
                      • Loads dropped DLL
                      • Drops file in Windows directory
                      PID:1104
                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 324 -InterruptEvent 31c -NGENProcess 340 -Pipe 30c -Comment "NGen Worker Process"
                      2⤵
                        PID:2356
                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 31c -InterruptEvent 328 -NGENProcess 320 -Pipe 314 -Comment "NGen Worker Process"
                        2⤵
                        • Loads dropped DLL
                        • Drops file in Windows directory
                        PID:1980
                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 328 -InterruptEvent 320 -NGENProcess 324 -Pipe 33c -Comment "NGen Worker Process"
                        2⤵
                          PID:2812
                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                          C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 320 -InterruptEvent 348 -NGENProcess 340 -Pipe 334 -Comment "NGen Worker Process"
                          2⤵
                          • Loads dropped DLL
                          • Drops file in Windows directory
                          PID:1664
                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                          C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 348 -InterruptEvent 340 -NGENProcess 328 -Pipe 344 -Comment "NGen Worker Process"
                          2⤵
                            PID:2020
                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                            C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 350 -InterruptEvent 330 -NGENProcess 354 -Pipe 348 -Comment "NGen Worker Process"
                            2⤵
                            • Loads dropped DLL
                            • Drops file in Windows directory
                            PID:2332
                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                            C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 330 -InterruptEvent 354 -NGENProcess 324 -Pipe 328 -Comment "NGen Worker Process"
                            2⤵
                            • Modifies data under HKEY_USERS
                            PID:2484
                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                            C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 354 -InterruptEvent 358 -NGENProcess 340 -Pipe 338 -Comment "NGen Worker Process"
                            2⤵
                              PID:2652
                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                              C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 358 -InterruptEvent 35c -NGENProcess 31c -Pipe 320 -Comment "NGen Worker Process"
                              2⤵
                                PID:1016
                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 35c -InterruptEvent 360 -NGENProcess 324 -Pipe 350 -Comment "NGen Worker Process"
                                2⤵
                                  PID:1912
                                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                  C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 360 -InterruptEvent 364 -NGENProcess 340 -Pipe 318 -Comment "NGen Worker Process"
                                  2⤵
                                  • Loads dropped DLL
                                  • Drops file in Windows directory
                                  PID:952
                                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                  C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 364 -InterruptEvent 340 -NGENProcess 35c -Pipe 31c -Comment "NGen Worker Process"
                                  2⤵
                                  • Loads dropped DLL
                                  • Drops file in Windows directory
                                  PID:2136
                                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                  C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 340 -InterruptEvent 35c -NGENProcess 330 -Pipe 324 -Comment "NGen Worker Process"
                                  2⤵
                                    PID:596
                                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                    C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 35c -InterruptEvent 370 -NGENProcess 368 -Pipe 358 -Comment "NGen Worker Process"
                                    2⤵
                                      PID:832
                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 370 -InterruptEvent 374 -NGENProcess 36c -Pipe 360 -Comment "NGen Worker Process"
                                      2⤵
                                      • Modifies data under HKEY_USERS
                                      PID:2172
                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 374 -InterruptEvent 378 -NGENProcess 330 -Pipe 364 -Comment "NGen Worker Process"
                                      2⤵
                                        PID:2656
                                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 378 -InterruptEvent 37c -NGENProcess 368 -Pipe 354 -Comment "NGen Worker Process"
                                        2⤵
                                          PID:836
                                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                          C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 37c -InterruptEvent 380 -NGENProcess 36c -Pipe 340 -Comment "NGen Worker Process"
                                          2⤵
                                            PID:1708
                                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                            C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 380 -InterruptEvent 384 -NGENProcess 330 -Pipe 35c -Comment "NGen Worker Process"
                                            2⤵
                                              PID:2852
                                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                              C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 388 -InterruptEvent 384 -NGENProcess 380 -Pipe 368 -Comment "NGen Worker Process"
                                              2⤵
                                                PID:656
                                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 384 -InterruptEvent 370 -NGENProcess 330 -Pipe 374 -Comment "NGen Worker Process"
                                                2⤵
                                                  PID:596
                                                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                  C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 370 -InterruptEvent 390 -NGENProcess 37c -Pipe 34c -Comment "NGen Worker Process"
                                                  2⤵
                                                    PID:272
                                                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                    C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 390 -InterruptEvent 394 -NGENProcess 380 -Pipe 38c -Comment "NGen Worker Process"
                                                    2⤵
                                                      PID:2652
                                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 394 -InterruptEvent 398 -NGENProcess 330 -Pipe 378 -Comment "NGen Worker Process"
                                                      2⤵
                                                        PID:2088
                                                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 398 -InterruptEvent 39c -NGENProcess 37c -Pipe 388 -Comment "NGen Worker Process"
                                                        2⤵
                                                          PID:1640
                                                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                          C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 39c -InterruptEvent 3a0 -NGENProcess 380 -Pipe 384 -Comment "NGen Worker Process"
                                                          2⤵
                                                            PID:2952
                                                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                            C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3a0 -InterruptEvent 3a4 -NGENProcess 330 -Pipe 370 -Comment "NGen Worker Process"
                                                            2⤵
                                                              PID:1148
                                                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                              C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3a4 -InterruptEvent 3a8 -NGENProcess 37c -Pipe 390 -Comment "NGen Worker Process"
                                                              2⤵
                                                              • Modifies data under HKEY_USERS
                                                              PID:2844
                                                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                              C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3a8 -InterruptEvent 3ac -NGENProcess 380 -Pipe 394 -Comment "NGen Worker Process"
                                                              2⤵
                                                                PID:824
                                                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3b0 -InterruptEvent 3a4 -NGENProcess 3b4 -Pipe 3a8 -Comment "NGen Worker Process"
                                                                2⤵
                                                                  PID:2940
                                                                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                  C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3a4 -InterruptEvent 398 -NGENProcess 380 -Pipe 39c -Comment "NGen Worker Process"
                                                                  2⤵
                                                                    PID:2160
                                                                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                    C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 398 -InterruptEvent 3b8 -NGENProcess 3ac -Pipe 36c -Comment "NGen Worker Process"
                                                                    2⤵
                                                                      PID:1508
                                                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3b8 -InterruptEvent 3bc -NGENProcess 3b4 -Pipe 3a0 -Comment "NGen Worker Process"
                                                                      2⤵
                                                                        PID:1104
                                                                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3bc -InterruptEvent 3c0 -NGENProcess 380 -Pipe 330 -Comment "NGen Worker Process"
                                                                        2⤵
                                                                          PID:2152
                                                                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                          C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3c0 -InterruptEvent 3c4 -NGENProcess 3ac -Pipe 3b0 -Comment "NGen Worker Process"
                                                                          2⤵
                                                                            PID:1800
                                                                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                            C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3c4 -InterruptEvent 3c8 -NGENProcess 3b4 -Pipe 3a4 -Comment "NGen Worker Process"
                                                                            2⤵
                                                                            • Modifies data under HKEY_USERS
                                                                            PID:2732
                                                                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                            C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3c8 -InterruptEvent 3cc -NGENProcess 380 -Pipe 398 -Comment "NGen Worker Process"
                                                                            2⤵
                                                                            • Modifies data under HKEY_USERS
                                                                            PID:564
                                                                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                            C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3cc -InterruptEvent 3d0 -NGENProcess 3ac -Pipe 3b8 -Comment "NGen Worker Process"
                                                                            2⤵
                                                                            • Modifies data under HKEY_USERS
                                                                            PID:2252
                                                                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                            C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3d0 -InterruptEvent 3d4 -NGENProcess 37c -Pipe 3bc -Comment "NGen Worker Process"
                                                                            2⤵
                                                                            • Modifies data under HKEY_USERS
                                                                            PID:1332
                                                                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                            C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3d0 -InterruptEvent 37c -NGENProcess 3d4 -Pipe 3d8 -Comment "NGen Worker Process"
                                                                            2⤵
                                                                            • Modifies data under HKEY_USERS
                                                                            PID:1404
                                                                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                            C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 37c -InterruptEvent 3dc -NGENProcess 3ac -Pipe 3c4 -Comment "NGen Worker Process"
                                                                            2⤵
                                                                            • Modifies data under HKEY_USERS
                                                                            PID:944
                                                                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                            C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3e0 -InterruptEvent 3dc -NGENProcess 37c -Pipe 3c0 -Comment "NGen Worker Process"
                                                                            2⤵
                                                                            • Modifies data under HKEY_USERS
                                                                            PID:2892
                                                                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                            C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3dc -InterruptEvent 3c8 -NGENProcess 3ac -Pipe 3cc -Comment "NGen Worker Process"
                                                                            2⤵
                                                                              PID:2536
                                                                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                              C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3e8 -InterruptEvent 3e0 -NGENProcess 3ec -Pipe 3dc -Comment "NGen Worker Process"
                                                                              2⤵
                                                                                PID:2172
                                                                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                                C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3e0 -InterruptEvent 3b4 -NGENProcess 3ac -Pipe 3e4 -Comment "NGen Worker Process"
                                                                                2⤵
                                                                                  PID:2284
                                                                                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                                  C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3b4 -InterruptEvent 3f0 -NGENProcess 3c8 -Pipe 3d4 -Comment "NGen Worker Process"
                                                                                  2⤵
                                                                                    PID:2272
                                                                                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                                    C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3f0 -InterruptEvent 3f4 -NGENProcess 3ec -Pipe 380 -Comment "NGen Worker Process"
                                                                                    2⤵
                                                                                      PID:1712
                                                                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                                      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3f4 -InterruptEvent 3f8 -NGENProcess 3ac -Pipe 3d0 -Comment "NGen Worker Process"
                                                                                      2⤵
                                                                                        PID:2744
                                                                                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                                        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3f8 -InterruptEvent 3ac -NGENProcess 3f0 -Pipe 3c8 -Comment "NGen Worker Process"
                                                                                        2⤵
                                                                                          PID:2176
                                                                                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                                          C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3f4 -InterruptEvent 404 -NGENProcess 3e8 -Pipe 3ac -Comment "NGen Worker Process"
                                                                                          2⤵
                                                                                            PID:1928
                                                                                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                                            C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 404 -InterruptEvent 3e8 -NGENProcess 3ec -Pipe 3f0 -Comment "NGen Worker Process"
                                                                                            2⤵
                                                                                              PID:1036
                                                                                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                                              C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 40c -InterruptEvent 3b4 -NGENProcess 410 -Pipe 404 -Comment "NGen Worker Process"
                                                                                              2⤵
                                                                                                PID:2088
                                                                                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                                                C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3b4 -InterruptEvent 410 -NGENProcess 3f8 -Pipe 3ec -Comment "NGen Worker Process"
                                                                                                2⤵
                                                                                                  PID:2520
                                                                                              • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
                                                                                                C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
                                                                                                1⤵
                                                                                                • Executes dropped EXE
                                                                                                • Drops file in Windows directory
                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                PID:2724
                                                                                                • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
                                                                                                  C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 1d8 -InterruptEvent 1c4 -NGENProcess 1c8 -Pipe 1d4 -Comment "NGen Worker Process"
                                                                                                  2⤵
                                                                                                  • Executes dropped EXE
                                                                                                  PID:1800
                                                                                                • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
                                                                                                  C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 244 -InterruptEvent 1c4 -NGENProcess 1c8 -Pipe 1d8 -Comment "NGen Worker Process"
                                                                                                  2⤵
                                                                                                  • Executes dropped EXE
                                                                                                  PID:840
                                                                                              • C:\Windows\ehome\ehRecvr.exe
                                                                                                C:\Windows\ehome\ehRecvr.exe
                                                                                                1⤵
                                                                                                • Executes dropped EXE
                                                                                                • Modifies data under HKEY_USERS
                                                                                                PID:2284
                                                                                              • C:\Windows\ehome\ehsched.exe
                                                                                                C:\Windows\ehome\ehsched.exe
                                                                                                1⤵
                                                                                                • Executes dropped EXE
                                                                                                PID:2352
                                                                                              • C:\Windows\eHome\EhTray.exe
                                                                                                "C:\Windows\eHome\EhTray.exe" /nav:-2
                                                                                                1⤵
                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                • Suspicious use of FindShellTrayWindow
                                                                                                • Suspicious use of SendNotifyMessage
                                                                                                PID:2024
                                                                                              • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                                                                                                "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                                                                                                1⤵
                                                                                                • Executes dropped EXE
                                                                                                PID:2228
                                                                                              • C:\Windows\system32\IEEtwCollector.exe
                                                                                                C:\Windows\system32\IEEtwCollector.exe /V
                                                                                                1⤵
                                                                                                • Executes dropped EXE
                                                                                                PID:2964
                                                                                              • C:\Windows\ehome\ehRec.exe
                                                                                                C:\Windows\ehome\ehRec.exe -Embedding
                                                                                                1⤵
                                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                PID:2948
                                                                                              • C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE
                                                                                                "C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE" /auditservice
                                                                                                1⤵
                                                                                                • Executes dropped EXE
                                                                                                • Drops file in System32 directory
                                                                                                PID:3016
                                                                                              • C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe
                                                                                                "C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"
                                                                                                1⤵
                                                                                                • Executes dropped EXE
                                                                                                PID:1052
                                                                                              • C:\Windows\System32\msdtc.exe
                                                                                                C:\Windows\System32\msdtc.exe
                                                                                                1⤵
                                                                                                • Executes dropped EXE
                                                                                                • Drops file in System32 directory
                                                                                                • Drops file in Windows directory
                                                                                                PID:1392
                                                                                              • C:\Windows\system32\msiexec.exe
                                                                                                C:\Windows\system32\msiexec.exe /V
                                                                                                1⤵
                                                                                                • Executes dropped EXE
                                                                                                • Loads dropped DLL
                                                                                                • Enumerates connected drives
                                                                                                • Drops file in Windows directory
                                                                                                • Modifies registry class
                                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                PID:1096
                                                                                                • C:\Windows\syswow64\MsiExec.exe
                                                                                                  C:\Windows\syswow64\MsiExec.exe -Embedding 315EC94EBAA071A78918B75732F8FCB2
                                                                                                  2⤵
                                                                                                  • Loads dropped DLL
                                                                                                  PID:1404
                                                                                              • C:\Program Files (x86)\Common Files\Microsoft Shared\Source Engine\OSE.EXE
                                                                                                "C:\Program Files (x86)\Common Files\Microsoft Shared\Source Engine\OSE.EXE"
                                                                                                1⤵
                                                                                                • Executes dropped EXE
                                                                                                PID:2396
                                                                                              • C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE
                                                                                                "C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"
                                                                                                1⤵
                                                                                                • Executes dropped EXE
                                                                                                PID:1336
                                                                                              • C:\Windows\system32\vssvc.exe
                                                                                                C:\Windows\system32\vssvc.exe
                                                                                                1⤵
                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                PID:1412
                                                                                              • C:\Windows\SysWow64\perfhost.exe
                                                                                                C:\Windows\SysWow64\perfhost.exe
                                                                                                1⤵
                                                                                                • Executes dropped EXE
                                                                                                PID:1896
                                                                                              • C:\Windows\system32\locator.exe
                                                                                                C:\Windows\system32\locator.exe
                                                                                                1⤵
                                                                                                • Executes dropped EXE
                                                                                                PID:2208
                                                                                              • C:\Windows\System32\snmptrap.exe
                                                                                                C:\Windows\System32\snmptrap.exe
                                                                                                1⤵
                                                                                                • Executes dropped EXE
                                                                                                PID:1964
                                                                                              • C:\Windows\System32\vds.exe
                                                                                                C:\Windows\System32\vds.exe
                                                                                                1⤵
                                                                                                • Executes dropped EXE
                                                                                                PID:2064
                                                                                              • C:\Windows\system32\wbengine.exe
                                                                                                "C:\Windows\system32\wbengine.exe"
                                                                                                1⤵
                                                                                                • Executes dropped EXE
                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                PID:1604
                                                                                              • C:\Windows\system32\wbem\WmiApSrv.exe
                                                                                                C:\Windows\system32\wbem\WmiApSrv.exe
                                                                                                1⤵
                                                                                                • Executes dropped EXE
                                                                                                PID:2960
                                                                                              • C:\Program Files\Windows Media Player\wmpnetwk.exe
                                                                                                "C:\Program Files\Windows Media Player\wmpnetwk.exe"
                                                                                                1⤵
                                                                                                • Executes dropped EXE
                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                PID:968
                                                                                              • C:\Windows\system32\SearchIndexer.exe
                                                                                                C:\Windows\system32\SearchIndexer.exe /Embedding
                                                                                                1⤵
                                                                                                • Executes dropped EXE
                                                                                                • Modifies data under HKEY_USERS
                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                • Suspicious use of WriteProcessMemory
                                                                                                PID:1564
                                                                                                • C:\Windows\system32\SearchProtocolHost.exe
                                                                                                  "C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe_S-1-5-21-330940541-141609230-1670313778-10001_ Global\UsGthrCtrlFltPipeMssGthrPipe_S-1-5-21-330940541-141609230-1670313778-10001 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon" "1"
                                                                                                  2⤵
                                                                                                  • Suspicious use of SetWindowsHookEx
                                                                                                  PID:2224
                                                                                                • C:\Windows\system32\SearchFilterHost.exe
                                                                                                  "C:\Windows\system32\SearchFilterHost.exe" 0 592 596 604 65536 600
                                                                                                  2⤵
                                                                                                  • Modifies data under HKEY_USERS
                                                                                                  PID:2156
                                                                                                • C:\Windows\system32\SearchProtocolHost.exe
                                                                                                  "C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe2_ Global\UsGthrCtrlFltPipeMssGthrPipe2 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon"
                                                                                                  2⤵
                                                                                                  • Drops file in System32 directory
                                                                                                  • Modifies data under HKEY_USERS
                                                                                                  • Suspicious use of SetWindowsHookEx
                                                                                                  PID:1732
                                                                                              • C:\Windows\system32\DrvInst.exe
                                                                                                DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "00000000000004B8" "00000000000003B4"
                                                                                                1⤵
                                                                                                • Drops file in Windows directory
                                                                                                • Modifies data under HKEY_USERS
                                                                                                PID:1344
                                                                                              • C:\Windows\system32\dllhost.exe
                                                                                                C:\Windows\system32\dllhost.exe /Processid:{02D4B3F1-FD88-11D1-960D-00805FC79235}
                                                                                                1⤵
                                                                                                • Executes dropped EXE
                                                                                                • Drops file in Windows directory
                                                                                                PID:1436

                                                                                              Network

                                                                                              MITRE ATT&CK Enterprise v15

                                                                                              Replay Monitor

                                                                                              Loading Replay Monitor...

                                                                                              Downloads

                                                                                              • C:\Program Files (x86)\Common Files\microsoft shared\Source Engine\OSE.EXE

                                                                                                Filesize

                                                                                                706KB

                                                                                                MD5

                                                                                                850d0f8a51786f11f97d5da43d3e1927

                                                                                                SHA1

                                                                                                4392ef7597cbe0afdd32e23772d5c27bcc190844

                                                                                                SHA256

                                                                                                cd0cc7b8ffb45283bfeb9c5cbed967b8beac4c52e3f4e69d1f55c626ce7d1dca

                                                                                                SHA512

                                                                                                b2ac4fdef35be841855b549805177fd1ac98f9b12871c8f1c86149ec133725d8c3c59c1cb3b0f6661fbaf09cd24e5d967a93d29ec52f44d0f095a614335f1d8d

                                                                                              • C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE

                                                                                                Filesize

                                                                                                30.1MB

                                                                                                MD5

                                                                                                024016d391a49e02aa237573b8c7e602

                                                                                                SHA1

                                                                                                0ca18b2fb3b62461913450d8936a017c6a45fe60

                                                                                                SHA256

                                                                                                cc36bd352b66553e727459c6325a254df40f9b8e8019f5847809a9bef9d728ab

                                                                                                SHA512

                                                                                                346af67984148f1d5ec82b4670674750010d8fcfb25baec95e88f260840c531685e484d102eb990c5f00e5e106abd7dfee2e7e69edb22d4b9ecefbd3ae3b005e

                                                                                              • C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe

                                                                                                Filesize

                                                                                                781KB

                                                                                                MD5

                                                                                                2313892d3d573fe7847a2faf0769ed15

                                                                                                SHA1

                                                                                                d8db01fc96468a45dec0a596e4ea1eddabafcfa8

                                                                                                SHA256

                                                                                                e2cafd424bb6b2c1a5e54b355474bbd9564914fbbf28da48c7b41c87dd3af343

                                                                                                SHA512

                                                                                                d8e243278845fc73e0083085089e59dd4cc851b1ed56fbef87eeb28bb92675b524bdd0352673713cc5da844d34a8698dc6b0bb8972fda9c07d9b69615f07567c

                                                                                              • C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE

                                                                                                Filesize

                                                                                                5.2MB

                                                                                                MD5

                                                                                                b8294947f080491e2c6290a85cc67e91

                                                                                                SHA1

                                                                                                ae71b91dc1ab080a005dc201f122ec7b7c127703

                                                                                                SHA256

                                                                                                a86679efe573583b5c8baaeb0e927afb8d876c8e4b60e5d40f2e319a51c4c834

                                                                                                SHA512

                                                                                                30c2d1d3821db7e02a003c6cae600caddec27a8b4b0b617c06c8a662dd54b9b6ee6780c829839719863dcf42d9c2dde3e851361ba2f7dbc9d1f02b6ceec9ea0c

                                                                                              • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe

                                                                                                Filesize

                                                                                                2.1MB

                                                                                                MD5

                                                                                                6d9bc8d12eec88b5003cea268e3da69d

                                                                                                SHA1

                                                                                                d2ebb475838b06e27d586d27a925d07e8d8abbbf

                                                                                                SHA256

                                                                                                192730bed809f4013a2487b8aafd31baac042faa1a0dcb689f9961175395fc2e

                                                                                                SHA512

                                                                                                41cae5dcf97608f910ced625adc04c8453f25b0209e6a514a0d6c452ac0fe894ef86ebe53ca1fdd298de99d0de88bd8713435f4f8ac868e1df01e6cff2c5d70f

                                                                                              • C:\Program Files\Windows Media Player\wmpnetwk.exe

                                                                                                Filesize

                                                                                                2.0MB

                                                                                                MD5

                                                                                                6d6a5151a097e683c18c00d5b913b9ff

                                                                                                SHA1

                                                                                                f3be971204ebfc549b22cd6746fa91a08785c50f

                                                                                                SHA256

                                                                                                16768bbbd158907c7f98164a018cdd4cde637176412354c8292c8103172e0cc0

                                                                                                SHA512

                                                                                                f4006082cc03359c54b839b003e8948dfe2072fd141052b7cee67e166d19b579ec84075c1df0a9a6dd7cd77f0447d083972de0ecdb83123d805799fa7d5a8d38

                                                                                              • C:\ProgramData\Microsoft\Search\Data\Applications\Windows\MSS.log

                                                                                                Filesize

                                                                                                1024KB

                                                                                                MD5

                                                                                                e4e8bd22f7cb41cb482ed6d096f5454a

                                                                                                SHA1

                                                                                                fd9e9fbb155380f3cebd918891f934e7e2b9939f

                                                                                                SHA256

                                                                                                4e7e364eb559c776fce47c248d882a8f06d7dacc08355e2254d1893c742042e7

                                                                                                SHA512

                                                                                                a7e93e1d162fe82c3ee30d315777bee259ea8bf362fe6309b18a5c7b28bd311fbcefb14442b1618e8d75e37faf03ac9542b1969c15b503aa589e128ee9b4d93a

                                                                                              • C:\Users\Admin\AppData\Local\Temp\Cab5CA1.tmp

                                                                                                Filesize

                                                                                                65KB

                                                                                                MD5

                                                                                                ac05d27423a85adc1622c714f2cb6184

                                                                                                SHA1

                                                                                                b0fe2b1abddb97837ea0195be70ab2ff14d43198

                                                                                                SHA256

                                                                                                c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

                                                                                                SHA512

                                                                                                6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

                                                                                              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vcredist.msi

                                                                                                Filesize

                                                                                                2.4MB

                                                                                                MD5

                                                                                                b31b234cb0f534069ba32aaaeacd7b2d

                                                                                                SHA1

                                                                                                d6f90459f8bdbf7e75cc85affe9b137dc5e304e2

                                                                                                SHA256

                                                                                                b5a652a1025f194f59e1349a1f26709d7ff7760067439b2d52d988a55d9340f0

                                                                                                SHA512

                                                                                                138cb14f6018d3bddd78012c5b36a591fe70d1b2b7f9d3774230639302401be57e1a4d6098c66a83c47e67138ac6dbe79f64548e4c317bb804a4e9a3ffdf94ea

                                                                                              • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ngen_service.log

                                                                                                Filesize

                                                                                                872KB

                                                                                                MD5

                                                                                                85949773ff5d639c58d527769ee66722

                                                                                                SHA1

                                                                                                c2a9fc0d3ad8166b57ed81e8e18e51ca3b95c339

                                                                                                SHA256

                                                                                                7bd43dec89d2503cf978f6a9e6c949751672ccf09b16cecd72adc762eeeadb42

                                                                                                SHA512

                                                                                                3c26040d1351d057741e64cbe283809a9212eeac15074e7be0741fec6696272998a1230e15bc4e681c4e5cfe9bb62e2212382c1175553c0f3f90026cea65cf15

                                                                                              • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe

                                                                                                Filesize

                                                                                                678KB

                                                                                                MD5

                                                                                                86e871436876879ad34ad04da9ddd8b0

                                                                                                SHA1

                                                                                                6b0adc562a4721c3c141dc4e9a966abf9fb3fb2d

                                                                                                SHA256

                                                                                                a25ba6ee10a8ef8f4fbd87e2d889380c86712f7a2c602a32379046945581d038

                                                                                                SHA512

                                                                                                15b2ddbf33e1b334e47c29026daadfdb6f0114dbcc517cbf630b17abbb9cd4a5ad87564512b222db94b3fc9c8f8b2118d31e9b6da531efae2c5ebb6784ef2a80

                                                                                              • C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe

                                                                                                Filesize

                                                                                                625KB

                                                                                                MD5

                                                                                                41194c749fd01c182ed156b25270b68d

                                                                                                SHA1

                                                                                                08530885898cb3a144ddb890d5950a7e38e4cd05

                                                                                                SHA256

                                                                                                941670716b5a079b52cdb913c0a71dc281d7540e67840839d9e6afe597b307b8

                                                                                                SHA512

                                                                                                0b200588c009b2b02975237169df9b7ea82aa959e50c72150f50af67bb8a0d7d07ee4cea3e2b0194cda2a32b2580cc8987db5aa5a79c4a63d750b2ae1eba5f21

                                                                                              • C:\Windows\Microsoft.NET\Framework\v2.0.50727\ngen_service.log

                                                                                                Filesize

                                                                                                1003KB

                                                                                                MD5

                                                                                                53ccb08305264f5b72d1ada5cc5a0fe1

                                                                                                SHA1

                                                                                                7b1b26f246e3152336fc041e7644dccb1a6035b3

                                                                                                SHA256

                                                                                                59cb4707c85b61963fb90c9d8ae2354066d2f6eab198dedec7cda4f7aaa8a69b

                                                                                                SHA512

                                                                                                6b55dbcfa0974e7298ebbbbbff359077eb15423b91f5fd701c81eae413a3ae74fd13fc0068189440427d6cc5da61f917fc9c91844345a394d22fc9364cd01e8e

                                                                                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe

                                                                                                Filesize

                                                                                                656KB

                                                                                                MD5

                                                                                                67dfab423e7e814664042b7479a12840

                                                                                                SHA1

                                                                                                d1a52fbfe2e6e8c0d6ee8872a876d772463ad618

                                                                                                SHA256

                                                                                                2d069586cd0c65ff928a84af76b819900f3ce9a340efb9b82f169504fc78045e

                                                                                                SHA512

                                                                                                95d62ab9ad80e424b1319bbd587d3752235fa07bff360de78c7e350335bffd41f209028262c2d12a08cd9ff8d174c84c62584dfb4fd9fa79a2cf6a240d0177d0

                                                                                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen_service.log

                                                                                                Filesize

                                                                                                8KB

                                                                                                MD5

                                                                                                edd8cba3191e67957ca7783af779a782

                                                                                                SHA1

                                                                                                652d3a54d5cd7dd48becf5b66e3bbbe72adba6f1

                                                                                                SHA256

                                                                                                0836f42e48aa20271dc8e719a96a71566e2876202d100a9fd9a5c7453c3ed85f

                                                                                                SHA512

                                                                                                26f952b179634ff296a2250c78643a401775deac9d161bccd5e5c1210b931054e0dc0de30be338fdb27888bec23d674470deb75eafb9fd2c1aceecf54a601910

                                                                                              • C:\Windows\SysWOW64\perfhost.exe

                                                                                                Filesize

                                                                                                587KB

                                                                                                MD5

                                                                                                0899b1a4a5dc26227f409ad695952cb2

                                                                                                SHA1

                                                                                                1e5d7f571a5fe43b62719b0af6e3b877fdf1c7bc

                                                                                                SHA256

                                                                                                7ece29fc350fcd230db6fce4b45fb926fb49fb0d3131a54cd17229ce694f5ece

                                                                                                SHA512

                                                                                                c13dd537f599b707b20de2137c61d8e9f0a5378f9f9f0e071dcae95678a69563e5a08280aa18e2b2b0c6a4e0975143c37caac2b6883df05153d80c954d9a435f

                                                                                              • C:\Windows\System32\Locator.exe

                                                                                                Filesize

                                                                                                577KB

                                                                                                MD5

                                                                                                6ac1c62267eb592ee4ab52e0692ab08b

                                                                                                SHA1

                                                                                                fe94f0c8f2fadbfacc99dbddb4f2b7a1db92b93e

                                                                                                SHA256

                                                                                                9a5982df61e559977bb253f2a834d1b8351323964fcc66664dbec8f5dc6fef18

                                                                                                SHA512

                                                                                                88cef6c2ccba6dfb91cf896c7b6963ec4a7666d6dc0c4e1093c57c4c1b4ed23b4baabf6e9b513c82bc3e751777872f36faa5a3c3ce0bc3b0bf8ce7e19f99f84c

                                                                                              • C:\Windows\System32\SearchIndexer.exe

                                                                                                Filesize

                                                                                                1.1MB

                                                                                                MD5

                                                                                                f0384ba302698cfed672acc299ef9a9f

                                                                                                SHA1

                                                                                                a17b826e1a0d37be5f012a5538557afe660c04bd

                                                                                                SHA256

                                                                                                4ac5f1ddf1ca2bc5cdfd39819b3a1a5aa9b71a4d16fd19e70aaba9fcbfa7b9d8

                                                                                                SHA512

                                                                                                9ec0ef1e85a42f76408d069f84698f091690b5244f593095050a2d60e0fe766af0a6c922c060f81cd98e5597d9ee317dc4f2578fc9a2e7841e28213148e82159

                                                                                              • C:\Windows\System32\vds.exe

                                                                                                Filesize

                                                                                                1.1MB

                                                                                                MD5

                                                                                                e3128d7c191e2d67d57b8a2d090d2f47

                                                                                                SHA1

                                                                                                a61b213a66417ebf903b65b43e6dda95b96d4156

                                                                                                SHA256

                                                                                                64b0096d4673b62bedaa06a4223dd8dde8d8ae14c35c3b91a4a7184de164c82e

                                                                                                SHA512

                                                                                                3737616ffd622f4483258db5a3ff8567a1de58cff261e4271c4a13a4578c4ddedfc877eaf53654114d04011e8b5708bfcf6b702611a6f714409b4effca484464

                                                                                              • C:\Windows\System32\wbengine.exe

                                                                                                Filesize

                                                                                                2.0MB

                                                                                                MD5

                                                                                                70b5562c54d98b937ab70b12cd78eebd

                                                                                                SHA1

                                                                                                132cd4631967249c8b574f8d13b35554ca4368c7

                                                                                                SHA256

                                                                                                ac5d2bf4a574842cfc45e0ce78df6dd39a255e770ef39de26e0bfc0f59c4814f

                                                                                                SHA512

                                                                                                5b7a686eb52f079dd226cb749ba588611986a13b21debe9b08bec44cb8d07f6928fa080849bc7347e2adfb1eff715749407c7b52a4289af4fdc576baa1d29dd3

                                                                                              • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.Office.To#\5766ec3721d18a48bec1ca1f60331e2d\Microsoft.Office.Tools.Common.v9.0.ni.dll

                                                                                                Filesize

                                                                                                797KB

                                                                                                MD5

                                                                                                aeb0b6e6c5d32d1ada231285ff2ae881

                                                                                                SHA1

                                                                                                1f04a1c059503896336406aed1dc93340e90b742

                                                                                                SHA256

                                                                                                4c53ca542ac5ef9d822ef8cb3b0ecef3fb8b937d94c0a7b735bedb275c74a263

                                                                                                SHA512

                                                                                                e55fd4c4d2966b3f0b6e88292fbd6c20ffa34766e076e763442c15212d19b6dea5d9dc9e7c359d999674a5b2c8a3849c2bbaaf83e7aa8c12715028b06b5a48e1

                                                                                              • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.Office.To#\60214b09b490be856c4ee2b3398d71bd\Microsoft.Office.Tools.Outlook.v9.0.ni.dll

                                                                                                Filesize

                                                                                                163KB

                                                                                                MD5

                                                                                                e88828b5a35063aa16c68ffb8322215d

                                                                                                SHA1

                                                                                                8225660ba3a9f528cf6ac32038ae3e0ec98d2331

                                                                                                SHA256

                                                                                                99facae4828c566c310a1ccf4059100067ab8bfb3d6e94e44dd9e189fd491142

                                                                                                SHA512

                                                                                                e4d2f5a5aeaa29d4d3392588f15db0d514ca4c86c629f0986ee8dba61e34af5ca9e06b94479efd8dd154026ae0da276888a0214e167129db18316a17d9718a57

                                                                                              • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.Office.To#\d7be05162f8d0fba8f4447db13f6695b\Microsoft.Office.Tools.Excel.v9.0.ni.dll

                                                                                                Filesize

                                                                                                1.3MB

                                                                                                MD5

                                                                                                006498313e139299a5383f0892c954b9

                                                                                                SHA1

                                                                                                7b3aa10930da9f29272154e2674b86876957ce3a

                                                                                                SHA256

                                                                                                489fec79addba2de9141daa61062a05a95e96a196049ce414807bada572cc35c

                                                                                                SHA512

                                                                                                6a15a10ae66ce0e5b18e060bb53c3108d09f6b07ee2c4a834856f0a35bec2453b32f891620e787731985719831302160678eb52acada102fdb0b87a14288d925

                                                                                              • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.Office.To#\e1f8e4d08d4b7f811b7dbbacd324027b\Microsoft.Office.Tools.v9.0.ni.dll

                                                                                                Filesize

                                                                                                148KB

                                                                                                MD5

                                                                                                ac901cf97363425059a50d1398e3454b

                                                                                                SHA1

                                                                                                2f8bd4ac2237a7b7606cb77a3d3c58051793c5c7

                                                                                                SHA256

                                                                                                f6c7aecb211d9aac911bf80c91e84a47a72ac52cbb523e34e9da6482c0b24c58

                                                                                                SHA512

                                                                                                6a340b6d5fa8e214f2a58d8b691c749336df087fa75bcc8d8c46f708e4b4ff3d68a61a17d13ee62322b75cbc61d39f5a572588772f3c5d6e5ff32036e5bc5a00

                                                                                              • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\03cad6bd8b37d21b28dcb4f955be2158\Microsoft.VisualStudio.Tools.Applications.Contract.v9.0.ni.dll

                                                                                                Filesize

                                                                                                34KB

                                                                                                MD5

                                                                                                c26b034a8d6ab845b41ed6e8a8d6001d

                                                                                                SHA1

                                                                                                3a55774cf22d3244d30f9eb5e26c0a6792a3e493

                                                                                                SHA256

                                                                                                620b41f5e02df56c33919218bedc238ca7e76552c43da4f0f39a106835a4edc3

                                                                                                SHA512

                                                                                                483424665c3bc79aeb1de6dfdd633c8526331c7b271b1ea6fe93ab298089e2aceefe7f9c7d0c6e33e604ca7b2ed62e7bb586147fecdf9a0eea60e8c03816f537

                                                                                              • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\0cb958acb9cd4cacb46ebc0396e30aa3\Microsoft.VisualStudio.Tools.Office.Contract.v9.0.ni.dll

                                                                                                Filesize

                                                                                                109KB

                                                                                                MD5

                                                                                                0fd0f978e977a4122b64ae8f8541de54

                                                                                                SHA1

                                                                                                153d3390416fdeba1b150816cbbf968e355dc64f

                                                                                                SHA256

                                                                                                211d2b83bb82042385757f811d90c5ae0a281f3abb3bf1c7901e8559db479e60

                                                                                                SHA512

                                                                                                ceddfc031bfe4fcf5093d0bbc5697b5fb0cd69b03bc32612325a82ea273dae5daff7e670b0d45816a33307b8b042d27669f5d5391cb2bdcf3e5a0c847c6dcaa8

                                                                                              • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\367516b7878af19f5c84c67f2cd277ae\Microsoft.VisualStudio.Tools.Office.Word.AddInAdapter.v9.0.ni.dll

                                                                                                Filesize

                                                                                                41KB

                                                                                                MD5

                                                                                                3c269caf88ccaf71660d8dc6c56f4873

                                                                                                SHA1

                                                                                                f9481bf17e10fe1914644e1b590b82a0ecc2c5c4

                                                                                                SHA256

                                                                                                de21619e70f9ef8ccbb274bcd0d9d2ace1bae0442dfefab45976671587cf0a48

                                                                                                SHA512

                                                                                                bd5be3721bf5bd4001127e0381a0589033cb17aa35852f8f073ba9684af7d8c5a0f3ee29987b345fc15fdf28c5b56686087001ef41221a2cfb16498cf4c016c6

                                                                                              • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\86cb0287b31d5c16320ef4ffa26d5dba\Microsoft.VisualStudio.Tools.Office.Outlook.HostAdapter.v10.0.ni.dll

                                                                                                Filesize

                                                                                                83KB

                                                                                                MD5

                                                                                                db829e6c3e4db005d1ae7c5d44e98e6c

                                                                                                SHA1

                                                                                                1ab53f9f5ea6b5fda97fe4805cceefb3174d3abc

                                                                                                SHA256

                                                                                                4c5294a3afca6738b3d52a5fac591c62d4b83013fdd277f7fcca361bbd77d664

                                                                                                SHA512

                                                                                                2288842cbbae2ac229957908b4b2c855aad92c550b6d0e4df50ff92f983fa10c899aea4bf8d8ae3abfe1f1c4a8a3ddd31a2c6b94c18572bfc733e3f1b2d87859

                                                                                              • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\8c6bac317f75b51647ea3a8da141b143\Microsoft.VisualStudio.Tools.Office.AddInAdapter.v9.0.ni.dll

                                                                                                Filesize

                                                                                                210KB

                                                                                                MD5

                                                                                                4f40997b51420653706cb0958086cd2d

                                                                                                SHA1

                                                                                                0069b956d17ce7d782a0e054995317f2f621b502

                                                                                                SHA256

                                                                                                8cd6a0b061b43e0b660b81859c910290a3672b00d7647ba0e86eda6ddcc8c553

                                                                                                SHA512

                                                                                                e18953d7a348859855e5f6e279bc9924fc3707b57a733ce9b8f7d21bd631d419f1ebfb29202608192eb346569ca9a55264f5b4c2aedd474c22060734a68a4ee6

                                                                                              • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\8e93e346d3b10b1be59c5999a90c8f3a\Microsoft.VisualStudio.Tools.Office.Excel.HostAdapter.v10.0.ni.dll

                                                                                                Filesize

                                                                                                180KB

                                                                                                MD5

                                                                                                2e9e8bcfcf667cbe4051145821374683

                                                                                                SHA1

                                                                                                f1fc92fdde1c3017fdd5fe7dde0651b916e75064

                                                                                                SHA256

                                                                                                b4b6c507035772167b80fba788de60fe52b29fe599a8a140b1f5c8d272a053b8

                                                                                                SHA512

                                                                                                ef04a64fce2ff42195fc854c6cffa2db9e0f5fd2ffcc35ab375cac6abe3810a6625015d9b0d0c16b8feeff81615b6dcc3c35e63fb4cc117c0e25c21f43a17463

                                                                                              • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\9306fc630870a75ddd23441ad77bdc57\Microsoft.VisualStudio.Tools.Applications.Runtime.v10.0.ni.dll

                                                                                                Filesize

                                                                                                53KB

                                                                                                MD5

                                                                                                e3a7a2b65afd8ab8b154fdc7897595c3

                                                                                                SHA1

                                                                                                b21eefd6e23231470b5cf0bd0d7363879a2ed228

                                                                                                SHA256

                                                                                                e5faf5e8adf46a8246e6b5038409dadca46985a9951343a1936237d2c8d7a845

                                                                                                SHA512

                                                                                                6537c7ed398deb23be1256445297cb7c8d7801bf6e163d918d8e258213708b28f7255ecff9fbd3431d8f5e5a746aa95a29d3a777b28fcd688777aed6d8205a33

                                                                                              • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\afa5bb1a39443d7dc81dfff54073929b\Microsoft.VisualStudio.Tools.Office.Contract.v10.0.ni.dll

                                                                                                Filesize

                                                                                                28KB

                                                                                                MD5

                                                                                                aefc3f3c8e7499bad4d05284e8abd16c

                                                                                                SHA1

                                                                                                7ab718bde7fdb2d878d8725dc843cfeba44a71f7

                                                                                                SHA256

                                                                                                4436550409cfb3d06b15dd0c3131e87e7002b0749c7c6e9dc3378c99dbec815d

                                                                                                SHA512

                                                                                                1d7dbc9764855a9a1f945c1bc8e86406c0625f1381d71b3ea6924322fbe419d1c70c3f3efd57ee2cb2097bb9385e0bf54965ab789328a80eb4946849648fe20b

                                                                                              • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\da732784132d9c8a3c4dd44ca935d6fd\Microsoft.VisualStudio.Tools.Office.Word.HostAdapter.v10.0.ni.dll

                                                                                                Filesize

                                                                                                187KB

                                                                                                MD5

                                                                                                353c9cd0267a522c05637f960e229b23

                                                                                                SHA1

                                                                                                0199b469158ef4f24d9449ce6347ae6249385f55

                                                                                                SHA256

                                                                                                bb38f16ec94b2eeaa159e1c1019b5f367242ea72eeb477d2e603e8e411ac46f6

                                                                                                SHA512

                                                                                                33208489e8aec2c9c386546a6a09e5810e44b7b6fd0a0eb35c7ff1e96fa7f834bb011c33eb470180af5b49feae2da962f8ec82c2865dcf75542cafd448f2c2c5

                                                                                              • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\de06a98a598aa0ff716a25b24d56ad7f\Microsoft.VisualStudio.Tools.Applications.Contract.v10.0.ni.dll

                                                                                                Filesize

                                                                                                27KB

                                                                                                MD5

                                                                                                9c60454398ce4bce7a52cbda4a45d364

                                                                                                SHA1

                                                                                                da1e5de264a6f6051b332f8f32fa876d297bf620

                                                                                                SHA256

                                                                                                edc90887d38c87282f49adbb12a94040f9ac86058bfae15063aaaff2672b54e1

                                                                                                SHA512

                                                                                                533b7e9c55102b248f4a7560955734b4156eb4c02539c6f978aeacecff1ff182ba0f04a07d32ed90707a62d73191b0e2d2649f38ae1c3e7a5a4c0fbea9a94300

                                                                                              • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\e0220058091b941725ef02be0b84abe7\Microsoft.VisualStudio.Tools.Applications.HostAdapter.v10.0.ni.dll

                                                                                                Filesize

                                                                                                57KB

                                                                                                MD5

                                                                                                6eaaa1f987d6e1d81badf8665c55a341

                                                                                                SHA1

                                                                                                e52db4ad92903ca03a5a54fdb66e2e6fad59efd5

                                                                                                SHA256

                                                                                                4b78ffa5f0b6751aea11917db5961d566e2f59beaa054b41473d331fd392329e

                                                                                                SHA512

                                                                                                dbedfa6c569670c22d34d923e22b7dae7332b932b809082dad87a1f0bb125c912db37964b5881667867ccf23dc5e5be596aad85485746f8151ce1c51ffd097b2

                                                                                              • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\ee73646032cbb022d16771203727e3b2\Microsoft.VisualStudio.Tools.Applications.Runtime.v9.0.ni.dll

                                                                                                Filesize

                                                                                                130KB

                                                                                                MD5

                                                                                                2735d2ab103beb0f7c1fbd6971838274

                                                                                                SHA1

                                                                                                6063646bc072546798bf8bf347425834f2bfad71

                                                                                                SHA256

                                                                                                f00156860ec7e88f4ccb459ca29b7e0e5c169cdc8a081cb043603187d25d92b3

                                                                                                SHA512

                                                                                                fe2ce60c7f61760a29344e254771d48995e983e158da0725818f37441f9690bda46545bf10c84b163f6afb163ffb504913d6ffddf84f72b062c7f233aed896de

                                                                                              • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\f030ae7a0ac8395493f8afcd319ee692\Microsoft.VisualStudio.Tools.Office.HostAdapter.v10.0.ni.dll

                                                                                                Filesize

                                                                                                143KB

                                                                                                MD5

                                                                                                f786ebe6116b55d4dc62a63dfede2ca6

                                                                                                SHA1

                                                                                                ab82f3b24229cf9ad31484b3811cdb84d5e916e9

                                                                                                SHA256

                                                                                                9805ae745d078fc9d64e256d4472c0edd369958a6872d71bd28d245a0239fe12

                                                                                                SHA512

                                                                                                80832872329611c5c68784196f890859f6f7c5795f6a62542ad20be813e587341b36ade410363646c43f9ced48d2cf89a4537fe60d90e868324270f7040c2738

                                                                                              • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\f1a7ac664667f2d6bcd6c388b230c22b\Microsoft.VisualStudio.Tools.Applications.AddInAdapter.v9.0.ni.dll

                                                                                                Filesize

                                                                                                59KB

                                                                                                MD5

                                                                                                8c69bbdfbc8cc3fa3fa5edcd79901e94

                                                                                                SHA1

                                                                                                b8028f0f557692221d5c0160ec6ce414b2bdf19b

                                                                                                SHA256

                                                                                                a21471690e7c32c80049e17c13624820e77bca6c9c38b83d9ea8a7248086660d

                                                                                                SHA512

                                                                                                825f5b87b76303b62fc16a96b108fb1774c2aca52ac5e44cd0ac2fe2ee47d5d67947dfe7498e36bc849773f608ec5824711f8c36e375a378582eefb57c9c2557

                                                                                              • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\fc36797f7054935a6033077612905a0f\Microsoft.VisualStudio.Tools.Office.Excel.AddInAdapter.v9.0.ni.dll

                                                                                                Filesize

                                                                                                42KB

                                                                                                MD5

                                                                                                71d4273e5b77cf01239a5d4f29e064fc

                                                                                                SHA1

                                                                                                e8876dea4e4c4c099e27234742016be3c80d8b62

                                                                                                SHA256

                                                                                                f019899f829731f899a99885fd52fde1fe4a4f6fe3ecf7f7a7cfa78517c00575

                                                                                                SHA512

                                                                                                41fe67cda988c53bd087df6296d1a242cddac688718ea5a5884a72b43e9638538e64d7a59e045c0b4d490496d884cf0ec694ddf7fcb41ae3b8cbc65b7686b180

                                                                                              • C:\Windows\assembly\NativeImages_v2.0.50727_32\ehiVidCtl\88e20c69254157d91b96eadc9444815d\ehiVidCtl.ni.dll

                                                                                                Filesize

                                                                                                855KB

                                                                                                MD5

                                                                                                7812b0a90d92b4812d4063b89a970c58

                                                                                                SHA1

                                                                                                3c4a789b8d28a5bfa6a6191624e33b8f40e4c4ea

                                                                                                SHA256

                                                                                                897626e6af00e85e627eeaa7f9563b245335242bc6196b36d0072e5b6d45e543

                                                                                                SHA512

                                                                                                634a2395bada9227b1957f2b76ed7e19f12bfc4d71a145d182602a1b6e24d83e220ebfabd602b1995c360e1725a38a89ff58417b0295bb0da9ea35c41c21a6ed

                                                                                              • C:\Windows\assembly\NativeImages_v2.0.50727_32\stdole\2c6d60b55bbab22515c512080d4b3bae\stdole.ni.dll

                                                                                                Filesize

                                                                                                43KB

                                                                                                MD5

                                                                                                3e72bdd0663c5b2bcd530f74139c83e3

                                                                                                SHA1

                                                                                                66069bcac0207512b9e07320f4fa5934650677d2

                                                                                                SHA256

                                                                                                6a6ac3094130d1affd34aae5ba2bd8c889e2071eb4217a75d72b5560f884e357

                                                                                                SHA512

                                                                                                b0a98db477fccae71b4ebfb8525ed52c10f1e7542f955b307f260e27e0758aa22896683302e34b0237e7e3bba9f5193ddcc7ff255c71fbaa1386988b0ec7d626

                                                                                              • \Users\Admin\AppData\Local\Temp\IXP000.TMP\VCREDI~1.EXE

                                                                                                Filesize

                                                                                                2.5MB

                                                                                                MD5

                                                                                                f031c0d2b460209b47b91c46a3d202fe

                                                                                                SHA1

                                                                                                95040f80b0d203e1abaec4e06e0ec0e01c507d03

                                                                                                SHA256

                                                                                                492826e1aacd984a00dd67a438386e4de883cc923cb1f25e265525a4cf70ed7b

                                                                                                SHA512

                                                                                                18840649d19c5310d274bac69010514872a554bb5ecadb4af5fa3667ad1a6bf9d644b31393edbc1b60ace6eff907c79c078f8213948cf90fa4d1529c68ccc629

                                                                                              • \Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe

                                                                                                Filesize

                                                                                                648KB

                                                                                                MD5

                                                                                                8f0c30d0a27d8cf5f29f151b735f8894

                                                                                                SHA1

                                                                                                3e01bfcc7f5eed51fe06a218bf42f5daf193edef

                                                                                                SHA256

                                                                                                e95851f5a279e13a045b8c1cc0dae8752ab6c52d8448796ae1faa0ed0a74b159

                                                                                                SHA512

                                                                                                4673439d397bbe674b42c07ddad78ee4d337d71c45064921f3fc8c16b84732590d328d7a2153ddfcd85ef5fcc62912af808f6ee6efadf80f15bc4ea4c3c3b886

                                                                                              • \Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe

                                                                                                Filesize

                                                                                                603KB

                                                                                                MD5

                                                                                                b8bfbcaceb4bacf429e35c4528a7ac5a

                                                                                                SHA1

                                                                                                81f0648f313561f713964fdf3a7c07bef1b85680

                                                                                                SHA256

                                                                                                b88ca4e3970500c3f0a00b56b01e2e8b16b142902f5b90d0097bb2f228fa0855

                                                                                                SHA512

                                                                                                bf01a80547e56550dc50b1abb376b1858bcf8dd5bfc9ab463e3ade5fddabfabc0b05a9750a50076c631ab9a7d8c53c604a78b1c2c7b63637af0af537710e2163

                                                                                              • \Windows\System32\alg.exe

                                                                                                Filesize

                                                                                                644KB

                                                                                                MD5

                                                                                                6d4c013805255aa5aeddb6ed9746500c

                                                                                                SHA1

                                                                                                69b998eff8aa98e19353aa9521effc2578e65b7c

                                                                                                SHA256

                                                                                                48bee88681f6bb8b8536555023be20f4d9edbc15ffad26f2b7e26d824725d8c2

                                                                                                SHA512

                                                                                                ddd14fe5a219cf39e9282d9db08925ab066a5293fffd4e681726233a360ef52cdf85b2ba03ce256a8579ac07e42957cc4b0d6cdad3513d1ea8aadc3a86a0a020

                                                                                              • \Windows\System32\ieetwcollector.exe

                                                                                                Filesize

                                                                                                674KB

                                                                                                MD5

                                                                                                6e6c4a49d09a9ffea7be5a6e752412b0

                                                                                                SHA1

                                                                                                1b1152335d5aff657b4ed1cd380f50e210af9f49

                                                                                                SHA256

                                                                                                b9d548dd55f824b0199337e3a163a04e9cfece1c8d5ff511725c6172ddd6501b

                                                                                                SHA512

                                                                                                9880b4462bde397866456586d968d2aa9e494c76c12a6976b753470389dee61df464e2a3d4e06bb6ec3b0a7e1fdddae2b1c677e809d03c3efaaa12839af2b2bc

                                                                                              • \Windows\System32\msdtc.exe

                                                                                                Filesize

                                                                                                705KB

                                                                                                MD5

                                                                                                6890489ae693defd89d46f2cf547837d

                                                                                                SHA1

                                                                                                358eabcee44fd93533610323a055212734827f1a

                                                                                                SHA256

                                                                                                73e723f8c208e45cce4e04a54a690861e974d998bd4301d2471c7b6e0e5d50db

                                                                                                SHA512

                                                                                                2e08e61449e3b067fb5970b4f32f1e2880db62a8cbf79a5e351d18339e2581ea8cd70a34e15f810fcbecafb977c0b6570a38de3d546c5145ec2a98e3ccc46ca0

                                                                                              • \Windows\System32\msiexec.exe

                                                                                                Filesize

                                                                                                691KB

                                                                                                MD5

                                                                                                8aa46851f6e432069bdb4b3819b998be

                                                                                                SHA1

                                                                                                6040982925498da39bfc63b9f30b00dfa124b280

                                                                                                SHA256

                                                                                                7b2467638bde1b30e3aa794a17b1868fa4ba312d74b61a98af4728664b414050

                                                                                                SHA512

                                                                                                462d2f32989025a2f0ebf8431ebcf1e26a7afc24531f02643f9df13c61c686c715e9809659b862a3816a18f55dd48fecf388c397a54f6615daf50a07b1c6ce00

                                                                                              • \Windows\System32\snmptrap.exe

                                                                                                Filesize

                                                                                                581KB

                                                                                                MD5

                                                                                                241c328b5494dcbde38e764d8dd25904

                                                                                                SHA1

                                                                                                4ee291af63f8579349f42a29640c4fcae3f5fdce

                                                                                                SHA256

                                                                                                01b40fa2f87ae847bfcea64b8071cbd1925da059a99990fcc2c07943a03bab11

                                                                                                SHA512

                                                                                                9659a4be9e16be54171216924abec6896b4af5127678fe62d590d5cfc0a6044995b2451f0bd546e37f52f0cc2f430d82e6e5e37fc7bb85edb96f13650dbb5aaa

                                                                                              • \Windows\System32\wbem\WmiApSrv.exe

                                                                                                Filesize

                                                                                                765KB

                                                                                                MD5

                                                                                                9abbef7b0bfa2f008d288858bb1af49b

                                                                                                SHA1

                                                                                                bda6604a166c0d38ab1530c532330c9c48c564b0

                                                                                                SHA256

                                                                                                a906b3148242379f3e5ddfbf8d186c345627c35851fc381e9e1da09c89ac4c5a

                                                                                                SHA512

                                                                                                a79a9cc3cfc2c750a43b2bf330b00869da7e9f34228cf4722f61a19d2d91ff40747e53e6ffad620572b78527ad6e385168062e7ef0d8ee8bf14438f9f91cd26a

                                                                                              • \Windows\ehome\ehrecvr.exe

                                                                                                Filesize

                                                                                                1.2MB

                                                                                                MD5

                                                                                                9cc3e1efb646bc878f7a8c925ae44ad3

                                                                                                SHA1

                                                                                                a4d4cf572f134f878777352f9340887dfe812ab2

                                                                                                SHA256

                                                                                                946129e882965c19c06b6df95ed8279fbdb425807b6acf15beb3197f94332912

                                                                                                SHA512

                                                                                                6b13fcc8f43932c95cf05ecb9fab60ce3d07e744bd8d5809ff279e64415f333cdd0f2b794e63529a2dd90a1fb84109f2b8b47dd50a17579f41cde22f05801a0a

                                                                                              • \Windows\ehome\ehsched.exe

                                                                                                Filesize

                                                                                                691KB

                                                                                                MD5

                                                                                                e64bdc19f16036ae3bfd92a8018d19ee

                                                                                                SHA1

                                                                                                c76edf48fbf0c2ad742f2576f41d941e863e35e2

                                                                                                SHA256

                                                                                                eef09644b4a99c96b75a9d6a4450b586a55fa06699b4d9c77ebdc3c5de1d7bf8

                                                                                                SHA512

                                                                                                613932324bb1130ab1455be8368e556143cb95aad0309972d6c37ae8f741af13921f0de762d3c1bf0227e262adc74d28cd14e5f0ae25d81e7b236a8f1e3c8b91

                                                                                              • memory/432-678-0x0000000000400000-0x00000000004A8000-memory.dmp

                                                                                                Filesize

                                                                                                672KB

                                                                                              • memory/432-686-0x0000000000400000-0x00000000004A8000-memory.dmp

                                                                                                Filesize

                                                                                                672KB

                                                                                              • memory/852-640-0x0000000000400000-0x00000000004A8000-memory.dmp

                                                                                                Filesize

                                                                                                672KB

                                                                                              • memory/852-682-0x0000000000400000-0x00000000004A8000-memory.dmp

                                                                                                Filesize

                                                                                                672KB

                                                                                              • memory/940-800-0x0000000000400000-0x00000000004A8000-memory.dmp

                                                                                                Filesize

                                                                                                672KB

                                                                                              • memory/968-602-0x0000000100000000-0x000000010020A000-memory.dmp

                                                                                                Filesize

                                                                                                2.0MB

                                                                                              • memory/968-291-0x0000000100000000-0x000000010020A000-memory.dmp

                                                                                                Filesize

                                                                                                2.0MB

                                                                                              • memory/1040-67-0x0000000000400000-0x00000000004A8000-memory.dmp

                                                                                                Filesize

                                                                                                672KB

                                                                                              • memory/1040-68-0x0000000000380000-0x00000000003E7000-memory.dmp

                                                                                                Filesize

                                                                                                412KB

                                                                                              • memory/1040-73-0x0000000000380000-0x00000000003E7000-memory.dmp

                                                                                                Filesize

                                                                                                412KB

                                                                                              • memory/1040-209-0x0000000000400000-0x00000000004A8000-memory.dmp

                                                                                                Filesize

                                                                                                672KB

                                                                                              • memory/1052-182-0x0000000140000000-0x00000001400CA000-memory.dmp

                                                                                                Filesize

                                                                                                808KB

                                                                                              • memory/1052-187-0x0000000140000000-0x00000001400CA000-memory.dmp

                                                                                                Filesize

                                                                                                808KB

                                                                                              • memory/1072-14-0x0000000100000000-0x00000001000A4000-memory.dmp

                                                                                                Filesize

                                                                                                656KB

                                                                                              • memory/1072-129-0x0000000100000000-0x00000001000A4000-memory.dmp

                                                                                                Filesize

                                                                                                656KB

                                                                                              • memory/1096-433-0x0000000000590000-0x0000000000642000-memory.dmp

                                                                                                Filesize

                                                                                                712KB

                                                                                              • memory/1096-212-0x0000000000590000-0x0000000000642000-memory.dmp

                                                                                                Filesize

                                                                                                712KB

                                                                                              • memory/1096-198-0x0000000100000000-0x00000001000B2000-memory.dmp

                                                                                                Filesize

                                                                                                712KB

                                                                                              • memory/1096-294-0x0000000100000000-0x00000001000B2000-memory.dmp

                                                                                                Filesize

                                                                                                712KB

                                                                                              • memory/1188-711-0x0000000000400000-0x00000000004A8000-memory.dmp

                                                                                                Filesize

                                                                                                672KB

                                                                                              • memory/1188-724-0x0000000000400000-0x00000000004A8000-memory.dmp

                                                                                                Filesize

                                                                                                672KB

                                                                                              • memory/1312-754-0x0000000000400000-0x00000000004A8000-memory.dmp

                                                                                                Filesize

                                                                                                672KB

                                                                                              • memory/1312-770-0x0000000000400000-0x00000000004A8000-memory.dmp

                                                                                                Filesize

                                                                                                672KB

                                                                                              • memory/1336-511-0x0000000100000000-0x0000000100542000-memory.dmp

                                                                                                Filesize

                                                                                                5.3MB

                                                                                              • memory/1336-245-0x0000000100000000-0x0000000100542000-memory.dmp

                                                                                                Filesize

                                                                                                5.3MB

                                                                                              • memory/1388-793-0x0000000000400000-0x00000000004A8000-memory.dmp

                                                                                                Filesize

                                                                                                672KB

                                                                                              • memory/1388-778-0x0000000000400000-0x00000000004A8000-memory.dmp

                                                                                                Filesize

                                                                                                672KB

                                                                                              • memory/1392-290-0x0000000140000000-0x00000001400B6000-memory.dmp

                                                                                                Filesize

                                                                                                728KB

                                                                                              • memory/1392-184-0x0000000140000000-0x00000001400B6000-memory.dmp

                                                                                                Filesize

                                                                                                728KB

                                                                                              • memory/1564-621-0x0000000100000000-0x0000000100123000-memory.dmp

                                                                                                Filesize

                                                                                                1.1MB

                                                                                              • memory/1564-303-0x0000000100000000-0x0000000100123000-memory.dmp

                                                                                                Filesize

                                                                                                1.1MB

                                                                                              • memory/1604-275-0x0000000100000000-0x0000000100202000-memory.dmp

                                                                                                Filesize

                                                                                                2.0MB

                                                                                              • memory/1604-574-0x0000000100000000-0x0000000100202000-memory.dmp

                                                                                                Filesize

                                                                                                2.0MB

                                                                                              • memory/1680-505-0x0000000000400000-0x00000000004A8000-memory.dmp

                                                                                                Filesize

                                                                                                672KB

                                                                                              • memory/1680-527-0x0000000000400000-0x00000000004A8000-memory.dmp

                                                                                                Filesize

                                                                                                672KB

                                                                                              • memory/1792-575-0x0000000000400000-0x00000000004A8000-memory.dmp

                                                                                                Filesize

                                                                                                672KB

                                                                                              • memory/1792-556-0x0000000000400000-0x00000000004A8000-memory.dmp

                                                                                                Filesize

                                                                                                672KB

                                                                                              • memory/1896-266-0x0000000001000000-0x0000000001096000-memory.dmp

                                                                                                Filesize

                                                                                                600KB

                                                                                              • memory/1932-632-0x0000000000400000-0x00000000004A8000-memory.dmp

                                                                                                Filesize

                                                                                                672KB

                                                                                              • memory/1932-620-0x0000000000400000-0x00000000004A8000-memory.dmp

                                                                                                Filesize

                                                                                                672KB

                                                                                              • memory/1964-271-0x0000000100000000-0x0000000100096000-memory.dmp

                                                                                                Filesize

                                                                                                600KB

                                                                                              • memory/2064-524-0x0000000100000000-0x0000000100114000-memory.dmp

                                                                                                Filesize

                                                                                                1.1MB

                                                                                              • memory/2064-270-0x0000000100000000-0x0000000100114000-memory.dmp

                                                                                                Filesize

                                                                                                1.1MB

                                                                                              • memory/2152-497-0x0000000000400000-0x00000000004A8000-memory.dmp

                                                                                                Filesize

                                                                                                672KB

                                                                                              • memory/2152-460-0x0000000000400000-0x00000000004A8000-memory.dmp

                                                                                                Filesize

                                                                                                672KB

                                                                                              • memory/2208-267-0x0000000100000000-0x0000000100095000-memory.dmp

                                                                                                Filesize

                                                                                                596KB

                                                                                              • memory/2228-138-0x0000000140000000-0x0000000140237000-memory.dmp

                                                                                                Filesize

                                                                                                2.2MB

                                                                                              • memory/2228-258-0x0000000140000000-0x0000000140237000-memory.dmp

                                                                                                Filesize

                                                                                                2.2MB

                                                                                              • memory/2248-2-0x0000000000250000-0x00000000002B7000-memory.dmp

                                                                                                Filesize

                                                                                                412KB

                                                                                              • memory/2248-9-0x0000000000250000-0x00000000002B7000-memory.dmp

                                                                                                Filesize

                                                                                                412KB

                                                                                              • memory/2248-1-0x00000000009F0000-0x0000000000D10000-memory.dmp

                                                                                                Filesize

                                                                                                3.1MB

                                                                                              • memory/2248-102-0x00000000009F0000-0x0000000000D10000-memory.dmp

                                                                                                Filesize

                                                                                                3.1MB

                                                                                              • memory/2248-90-0x0000000001000000-0x0000000001320000-memory.dmp

                                                                                                Filesize

                                                                                                3.1MB

                                                                                              • memory/2248-0-0x0000000001000000-0x0000000001320000-memory.dmp

                                                                                                Filesize

                                                                                                3.1MB

                                                                                              • memory/2284-105-0x0000000000180000-0x00000000001E0000-memory.dmp

                                                                                                Filesize

                                                                                                384KB

                                                                                              • memory/2284-230-0x0000000140000000-0x000000014013C000-memory.dmp

                                                                                                Filesize

                                                                                                1.2MB

                                                                                              • memory/2284-110-0x0000000000180000-0x00000000001E0000-memory.dmp

                                                                                                Filesize

                                                                                                384KB

                                                                                              • memory/2284-103-0x0000000140000000-0x000000014013C000-memory.dmp

                                                                                                Filesize

                                                                                                1.2MB

                                                                                              • memory/2352-236-0x0000000140000000-0x00000001400B2000-memory.dmp

                                                                                                Filesize

                                                                                                712KB

                                                                                              • memory/2352-514-0x0000000140000000-0x00000001400B2000-memory.dmp

                                                                                                Filesize

                                                                                                712KB

                                                                                              • memory/2352-121-0x0000000000840000-0x00000000008A0000-memory.dmp

                                                                                                Filesize

                                                                                                384KB

                                                                                              • memory/2352-123-0x0000000140000000-0x00000001400B2000-memory.dmp

                                                                                                Filesize

                                                                                                712KB

                                                                                              • memory/2352-115-0x0000000000840000-0x00000000008A0000-memory.dmp

                                                                                                Filesize

                                                                                                384KB

                                                                                              • memory/2376-54-0x00000000001E0000-0x0000000000240000-memory.dmp

                                                                                                Filesize

                                                                                                384KB

                                                                                              • memory/2376-94-0x0000000010000000-0x00000000100A7000-memory.dmp

                                                                                                Filesize

                                                                                                668KB

                                                                                              • memory/2376-768-0x0000000000400000-0x00000000004A8000-memory.dmp

                                                                                                Filesize

                                                                                                672KB

                                                                                              • memory/2376-47-0x0000000010000000-0x00000000100A7000-memory.dmp

                                                                                                Filesize

                                                                                                668KB

                                                                                              • memory/2376-781-0x0000000000400000-0x00000000004A8000-memory.dmp

                                                                                                Filesize

                                                                                                672KB

                                                                                              • memory/2376-48-0x00000000001E0000-0x0000000000240000-memory.dmp

                                                                                                Filesize

                                                                                                384KB

                                                                                              • memory/2380-738-0x0000000000400000-0x00000000004A8000-memory.dmp

                                                                                                Filesize

                                                                                                672KB

                                                                                              • memory/2380-732-0x0000000000400000-0x00000000004A8000-memory.dmp

                                                                                                Filesize

                                                                                                672KB

                                                                                              • memory/2396-488-0x000000002E000000-0x000000002E0B5000-memory.dmp

                                                                                                Filesize

                                                                                                724KB

                                                                                              • memory/2396-233-0x000000002E000000-0x000000002E0B5000-memory.dmp

                                                                                                Filesize

                                                                                                724KB

                                                                                              • memory/2416-62-0x0000000010000000-0x000000001009F000-memory.dmp

                                                                                                Filesize

                                                                                                636KB

                                                                                              • memory/2416-37-0x0000000000230000-0x0000000000297000-memory.dmp

                                                                                                Filesize

                                                                                                412KB

                                                                                              • memory/2416-32-0x0000000000230000-0x0000000000297000-memory.dmp

                                                                                                Filesize

                                                                                                412KB

                                                                                              • memory/2416-31-0x0000000010000000-0x000000001009F000-memory.dmp

                                                                                                Filesize

                                                                                                636KB

                                                                                              • memory/2484-443-0x0000000000400000-0x00000000004A8000-memory.dmp

                                                                                                Filesize

                                                                                                672KB

                                                                                              • memory/2484-588-0x0000000000400000-0x00000000004A8000-memory.dmp

                                                                                                Filesize

                                                                                                672KB

                                                                                              • memory/2484-603-0x0000000000400000-0x00000000004A8000-memory.dmp

                                                                                                Filesize

                                                                                                672KB

                                                                                              • memory/2484-222-0x0000000000400000-0x00000000004A8000-memory.dmp

                                                                                                Filesize

                                                                                                672KB

                                                                                              • memory/2552-612-0x0000000000400000-0x00000000004A8000-memory.dmp

                                                                                                Filesize

                                                                                                672KB

                                                                                              • memory/2560-591-0x0000000000400000-0x00000000004A8000-memory.dmp

                                                                                                Filesize

                                                                                                672KB

                                                                                              • memory/2560-573-0x0000000000400000-0x00000000004A8000-memory.dmp

                                                                                                Filesize

                                                                                                672KB

                                                                                              • memory/2576-19-0x0000000000A70000-0x0000000000AD0000-memory.dmp

                                                                                                Filesize

                                                                                                384KB

                                                                                              • memory/2576-18-0x0000000140000000-0x000000014009D000-memory.dmp

                                                                                                Filesize

                                                                                                628KB

                                                                                              • memory/2576-27-0x0000000000A70000-0x0000000000AD0000-memory.dmp

                                                                                                Filesize

                                                                                                384KB

                                                                                              • memory/2576-142-0x0000000140000000-0x000000014009D000-memory.dmp

                                                                                                Filesize

                                                                                                628KB

                                                                                              • memory/2600-723-0x0000000000400000-0x00000000004A8000-memory.dmp

                                                                                                Filesize

                                                                                                672KB

                                                                                              • memory/2600-735-0x0000000000400000-0x00000000004A8000-memory.dmp

                                                                                                Filesize

                                                                                                672KB

                                                                                              • memory/2612-510-0x0000000000400000-0x00000000004A8000-memory.dmp

                                                                                                Filesize

                                                                                                672KB

                                                                                              • memory/2612-496-0x0000000000400000-0x00000000004A8000-memory.dmp

                                                                                                Filesize

                                                                                                672KB

                                                                                              • memory/2660-649-0x0000000000400000-0x00000000004A8000-memory.dmp

                                                                                                Filesize

                                                                                                672KB

                                                                                              • memory/2724-91-0x0000000140000000-0x00000001400AE000-memory.dmp

                                                                                                Filesize

                                                                                                696KB

                                                                                              • memory/2724-82-0x00000000003E0000-0x0000000000440000-memory.dmp

                                                                                                Filesize

                                                                                                384KB

                                                                                              • memory/2724-88-0x00000000003E0000-0x0000000000440000-memory.dmp

                                                                                                Filesize

                                                                                                384KB

                                                                                              • memory/2808-759-0x0000000000400000-0x00000000004A8000-memory.dmp

                                                                                                Filesize

                                                                                                672KB

                                                                                              • memory/2840-710-0x0000000000400000-0x00000000004A8000-memory.dmp

                                                                                                Filesize

                                                                                                672KB

                                                                                              • memory/2840-698-0x0000000003BE0000-0x0000000003C9A000-memory.dmp

                                                                                                Filesize

                                                                                                744KB

                                                                                              • memory/2840-685-0x0000000000400000-0x00000000004A8000-memory.dmp

                                                                                                Filesize

                                                                                                672KB

                                                                                              • memory/2860-516-0x0000000000400000-0x00000000004A8000-memory.dmp

                                                                                                Filesize

                                                                                                672KB

                                                                                              • memory/2860-560-0x0000000000400000-0x00000000004A8000-memory.dmp

                                                                                                Filesize

                                                                                                672KB

                                                                                              • memory/2860-463-0x0000000000400000-0x00000000004A8000-memory.dmp

                                                                                                Filesize

                                                                                                672KB

                                                                                              • memory/2860-435-0x0000000000400000-0x00000000004A8000-memory.dmp

                                                                                                Filesize

                                                                                                672KB

                                                                                              • memory/2960-279-0x0000000100000000-0x00000001000C4000-memory.dmp

                                                                                                Filesize

                                                                                                784KB

                                                                                              • memory/2960-589-0x0000000100000000-0x00000001000C4000-memory.dmp

                                                                                                Filesize

                                                                                                784KB

                                                                                              • memory/2964-143-0x0000000140000000-0x00000001400AE000-memory.dmp

                                                                                                Filesize

                                                                                                696KB

                                                                                              • memory/2964-746-0x0000000140000000-0x00000001400AE000-memory.dmp

                                                                                                Filesize

                                                                                                696KB

                                                                                              • memory/3016-179-0x000000002E000000-0x000000002FE1E000-memory.dmp

                                                                                                Filesize

                                                                                                30.1MB

                                                                                              • memory/3016-264-0x000000002E000000-0x000000002FE1E000-memory.dmp

                                                                                                Filesize

                                                                                                30.1MB