Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    14/05/2024, 17:32

General

  • Target

    2024-05-14_b06fcaf516367cfa8984a0449412993f_bkransomware.exe

  • Size

    1.8MB

  • MD5

    b06fcaf516367cfa8984a0449412993f

  • SHA1

    cf508e0161660bd2b9e80c14f757ce84f6e5615a

  • SHA256

    8823520d43a9e393798af27bfe8a587fe565f7520d0e1adda3ef964a7a20cd83

  • SHA512

    be329ce89f668f0a63b94a37ef58f43885d83613bd78253afadd03c6f9d0167bdb65ff73b6bcad64d876765b358193848e9b72e7b0b532e1f32771d07e4249de

  • SSDEEP

    49152:+E19+ApwXk1QE1RzsEQPaxHNJgDUYmvFur31yAipQCtXxc0H:D93wXmoKYU7dG1yfpVBlH

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 64 IoCs
  • Loads dropped DLL 59 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in System32 directory 21 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 26 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of SetWindowsHookEx 18 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-14_b06fcaf516367cfa8984a0449412993f_bkransomware.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-14_b06fcaf516367cfa8984a0449412993f_bkransomware.exe"
    1⤵
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    PID:2212
  • C:\Windows\System32\alg.exe
    C:\Windows\System32\alg.exe
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:2944
  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe
    C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe
    1⤵
    • Executes dropped EXE
    PID:2572
  • C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe
    C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe
    1⤵
    • Executes dropped EXE
    PID:2524
  • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe
    C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe
    1⤵
    • Executes dropped EXE
    PID:2776
  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
    C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
    1⤵
    • Executes dropped EXE
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1608
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1e8 -InterruptEvent 1d4 -NGENProcess 1d8 -Pipe 1e4 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:1856
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 258 -InterruptEvent 1d4 -NGENProcess 1d8 -Pipe 1e8 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:772
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1d4 -InterruptEvent 25c -NGENProcess 24c -Pipe 248 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:1984
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1d4 -InterruptEvent 250 -NGENProcess 258 -Pipe 23c -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2752
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1f0 -InterruptEvent 250 -NGENProcess 1d4 -Pipe 25c -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2428
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 250 -InterruptEvent 244 -NGENProcess 258 -Pipe 268 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2676
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 244 -InterruptEvent 24c -NGENProcess 1d8 -Pipe 240 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2932
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 24c -InterruptEvent 26c -NGENProcess 1d4 -Pipe 260 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2632
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 270 -InterruptEvent 26c -NGENProcess 24c -Pipe 258 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:684
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 26c -InterruptEvent 254 -NGENProcess 1d4 -Pipe 1f0 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:1940
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 254 -InterruptEvent 250 -NGENProcess 244 -Pipe 27c -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:552
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 250 -InterruptEvent 264 -NGENProcess 278 -Pipe 274 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2300
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 264 -InterruptEvent 280 -NGENProcess 1d4 -Pipe 1d8 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2064
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 280 -InterruptEvent 284 -NGENProcess 244 -Pipe 270 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:1324
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 284 -InterruptEvent 288 -NGENProcess 278 -Pipe 26c -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2376
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 28c -InterruptEvent 280 -NGENProcess 290 -Pipe 284 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2216
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 264 -InterruptEvent 254 -NGENProcess 1d4 -Pipe 280 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:664
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 254 -InterruptEvent 250 -NGENProcess 290 -Pipe 24c -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:1460
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 250 -InterruptEvent 298 -NGENProcess 28c -Pipe 244 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:1324
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 29c -InterruptEvent 298 -NGENProcess 250 -Pipe 1d4 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2764
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 294 -InterruptEvent 264 -NGENProcess 2a4 -Pipe 29c -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:924
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 264 -InterruptEvent 278 -NGENProcess 250 -Pipe 288 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:1048
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 278 -InterruptEvent 2a8 -NGENProcess 298 -Pipe 290 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:744
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 220 -InterruptEvent 288 -NGENProcess 244 -Pipe 29c -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:1728
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 288 -InterruptEvent 23c -NGENProcess 24c -Pipe 25c -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2916
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 23c -InterruptEvent 248 -NGENProcess 260 -Pipe 268 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:1684
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 248 -InterruptEvent 1e8 -NGENProcess 244 -Pipe 258 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2272
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1e8 -InterruptEvent 224 -NGENProcess 24c -Pipe 214 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Windows directory
      PID:2612
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 224 -InterruptEvent 244 -NGENProcess 24c -Pipe 23c -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:1820
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 244 -InterruptEvent 294 -NGENProcess 1c4 -Pipe 1d0 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Windows directory
      PID:2760
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2a4 -InterruptEvent 224 -NGENProcess 278 -Pipe 244 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2280
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 224 -InterruptEvent 248 -NGENProcess 1c4 -Pipe 260 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Windows directory
      PID:756
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 248 -InterruptEvent 1c4 -NGENProcess 2a4 -Pipe 294 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:912
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1c4 -InterruptEvent 2a8 -NGENProcess 278 -Pipe 240 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Windows directory
      PID:1784
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2a8 -InterruptEvent 278 -NGENProcess 248 -Pipe 2b0 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:1256
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 278 -InterruptEvent 2ac -NGENProcess 2a4 -Pipe 224 -Comment "NGen Worker Process"
      2⤵
      • Loads dropped DLL
      • Drops file in Windows directory
      PID:2864
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2ac -InterruptEvent 2a4 -NGENProcess 2a8 -Pipe 298 -Comment "NGen Worker Process"
      2⤵
        PID:368
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2a4 -InterruptEvent 250 -NGENProcess 248 -Pipe 1c4 -Comment "NGen Worker Process"
        2⤵
        • Loads dropped DLL
        • Drops file in Windows directory
        PID:2052
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 250 -InterruptEvent 248 -NGENProcess 2ac -Pipe 254 -Comment "NGen Worker Process"
        2⤵
          PID:2876
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
          C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 248 -InterruptEvent 2a0 -NGENProcess 2a8 -Pipe 278 -Comment "NGen Worker Process"
          2⤵
          • Loads dropped DLL
          • Drops file in Windows directory
          PID:1648
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
          C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2a0 -InterruptEvent 248 -NGENProcess 28c -Pipe 220 -Comment "NGen Worker Process"
          2⤵
            PID:1820
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
            C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 248 -InterruptEvent 288 -NGENProcess 2b4 -Pipe 2a4 -Comment "NGen Worker Process"
            2⤵
            • Loads dropped DLL
            • Drops file in Windows directory
            PID:1804
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
            C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 288 -InterruptEvent 2b4 -NGENProcess 2a0 -Pipe 2a8 -Comment "NGen Worker Process"
            2⤵
              PID:1876
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
              C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2b4 -InterruptEvent 2c0 -NGENProcess 28c -Pipe 250 -Comment "NGen Worker Process"
              2⤵
              • Loads dropped DLL
              • Drops file in Windows directory
              PID:1320
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
              C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2c0 -InterruptEvent 28c -NGENProcess 288 -Pipe 2bc -Comment "NGen Worker Process"
              2⤵
                PID:2768
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 28c -InterruptEvent 2c8 -NGENProcess 2a0 -Pipe 2b4 -Comment "NGen Worker Process"
                2⤵
                • Loads dropped DLL
                • Drops file in Windows directory
                PID:2876
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2c8 -InterruptEvent 2a0 -NGENProcess 2c0 -Pipe 2ac -Comment "NGen Worker Process"
                2⤵
                  PID:2428
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                  C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2a0 -InterruptEvent 2d0 -NGENProcess 288 -Pipe 2c4 -Comment "NGen Worker Process"
                  2⤵
                  • Loads dropped DLL
                  • Drops file in Windows directory
                  PID:2600
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                  C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2d0 -InterruptEvent 288 -NGENProcess 2c8 -Pipe 2cc -Comment "NGen Worker Process"
                  2⤵
                    PID:1752
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                    C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 288 -InterruptEvent 2d8 -NGENProcess 2c0 -Pipe 28c -Comment "NGen Worker Process"
                    2⤵
                    • Loads dropped DLL
                    • Drops file in Windows directory
                    PID:1408
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                    C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2d8 -InterruptEvent 2c0 -NGENProcess 2d0 -Pipe 2d4 -Comment "NGen Worker Process"
                    2⤵
                      PID:2144
                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2c0 -InterruptEvent 2e0 -NGENProcess 2c8 -Pipe 2a0 -Comment "NGen Worker Process"
                      2⤵
                      • Loads dropped DLL
                      • Drops file in Windows directory
                      PID:1620
                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2e0 -InterruptEvent 2c0 -NGENProcess 248 -Pipe 2dc -Comment "NGen Worker Process"
                      2⤵
                        PID:1624
                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2c0 -InterruptEvent 2b8 -NGENProcess 2e4 -Pipe 288 -Comment "NGen Worker Process"
                        2⤵
                        • Loads dropped DLL
                        • Drops file in Windows directory
                        PID:2864
                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2b8 -InterruptEvent 2e4 -NGENProcess 2e0 -Pipe 2c8 -Comment "NGen Worker Process"
                        2⤵
                          PID:864
                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                          C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2e4 -InterruptEvent 24c -NGENProcess 2ec -Pipe 2d8 -Comment "NGen Worker Process"
                          2⤵
                          • Loads dropped DLL
                          • Drops file in Windows directory
                          PID:2768
                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                          C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 24c -InterruptEvent 2ec -NGENProcess 2b8 -Pipe 2e8 -Comment "NGen Worker Process"
                          2⤵
                            PID:1548
                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                            C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2ec -InterruptEvent 2f8 -NGENProcess 2e0 -Pipe 2c0 -Comment "NGen Worker Process"
                            2⤵
                            • Loads dropped DLL
                            • Drops file in Windows directory
                            PID:2428
                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                            C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2f8 -InterruptEvent 2e0 -NGENProcess 24c -Pipe 2f4 -Comment "NGen Worker Process"
                            2⤵
                            • Modifies data under HKEY_USERS
                            PID:1572
                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                            C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2e0 -InterruptEvent 300 -NGENProcess 2b8 -Pipe 2e4 -Comment "NGen Worker Process"
                            2⤵
                              PID:1408
                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                              C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 300 -InterruptEvent 304 -NGENProcess 2fc -Pipe 2d0 -Comment "NGen Worker Process"
                              2⤵
                                PID:1992
                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 304 -InterruptEvent 308 -NGENProcess 24c -Pipe 2ec -Comment "NGen Worker Process"
                                2⤵
                                  PID:2636
                                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                  C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 308 -InterruptEvent 30c -NGENProcess 2b8 -Pipe 2f0 -Comment "NGen Worker Process"
                                  2⤵
                                  • Loads dropped DLL
                                  • Drops file in Windows directory
                                  PID:1048
                                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                  C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 30c -InterruptEvent 2b8 -NGENProcess 304 -Pipe 2fc -Comment "NGen Worker Process"
                                  2⤵
                                  • Loads dropped DLL
                                  • Drops file in Windows directory
                                  PID:1724
                                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                  C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2b8 -InterruptEvent 304 -NGENProcess 2f8 -Pipe 24c -Comment "NGen Worker Process"
                                  2⤵
                                    PID:600
                                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                    C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 304 -InterruptEvent 318 -NGENProcess 310 -Pipe 300 -Comment "NGen Worker Process"
                                    2⤵
                                      PID:1804
                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 318 -InterruptEvent 31c -NGENProcess 314 -Pipe 308 -Comment "NGen Worker Process"
                                      2⤵
                                      • Modifies data under HKEY_USERS
                                      PID:1700
                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 31c -InterruptEvent 320 -NGENProcess 2f8 -Pipe 30c -Comment "NGen Worker Process"
                                      2⤵
                                        PID:628
                                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 320 -InterruptEvent 2e0 -NGENProcess 310 -Pipe 324 -Comment "NGen Worker Process"
                                        2⤵
                                          PID:2916
                                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                          C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2e0 -InterruptEvent 328 -NGENProcess 314 -Pipe 2b8 -Comment "NGen Worker Process"
                                          2⤵
                                            PID:1284
                                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                            C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 328 -InterruptEvent 32c -NGENProcess 2f8 -Pipe 304 -Comment "NGen Worker Process"
                                            2⤵
                                              PID:1072
                                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                              C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 32c -InterruptEvent 330 -NGENProcess 310 -Pipe 318 -Comment "NGen Worker Process"
                                              2⤵
                                                PID:2416
                                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 330 -InterruptEvent 334 -NGENProcess 314 -Pipe 31c -Comment "NGen Worker Process"
                                                2⤵
                                                  PID:1572
                                                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                  C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 334 -InterruptEvent 338 -NGENProcess 2f8 -Pipe 320 -Comment "NGen Worker Process"
                                                  2⤵
                                                    PID:2144
                                                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                    C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 338 -InterruptEvent 33c -NGENProcess 310 -Pipe 2e0 -Comment "NGen Worker Process"
                                                    2⤵
                                                      PID:1788
                                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 33c -InterruptEvent 340 -NGENProcess 314 -Pipe 328 -Comment "NGen Worker Process"
                                                      2⤵
                                                        PID:1352
                                                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 340 -InterruptEvent 344 -NGENProcess 2f8 -Pipe 32c -Comment "NGen Worker Process"
                                                        2⤵
                                                          PID:1624
                                                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                          C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 344 -InterruptEvent 348 -NGENProcess 310 -Pipe 330 -Comment "NGen Worker Process"
                                                          2⤵
                                                            PID:2992
                                                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                            C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 348 -InterruptEvent 34c -NGENProcess 314 -Pipe 334 -Comment "NGen Worker Process"
                                                            2⤵
                                                              PID:2464
                                                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                              C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 34c -InterruptEvent 350 -NGENProcess 2f8 -Pipe 338 -Comment "NGen Worker Process"
                                                              2⤵
                                                              • Modifies data under HKEY_USERS
                                                              PID:2656
                                                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                              C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 350 -InterruptEvent 354 -NGENProcess 310 -Pipe 33c -Comment "NGen Worker Process"
                                                              2⤵
                                                                PID:1572
                                                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 354 -InterruptEvent 358 -NGENProcess 314 -Pipe 340 -Comment "NGen Worker Process"
                                                                2⤵
                                                                  PID:2400
                                                                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                  C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 358 -InterruptEvent 35c -NGENProcess 2f8 -Pipe 344 -Comment "NGen Worker Process"
                                                                  2⤵
                                                                    PID:628
                                                                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                    C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 35c -InterruptEvent 360 -NGENProcess 310 -Pipe 348 -Comment "NGen Worker Process"
                                                                    2⤵
                                                                      PID:2052
                                                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 360 -InterruptEvent 364 -NGENProcess 314 -Pipe 34c -Comment "NGen Worker Process"
                                                                      2⤵
                                                                        PID:952
                                                                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 364 -InterruptEvent 368 -NGENProcess 2f8 -Pipe 350 -Comment "NGen Worker Process"
                                                                        2⤵
                                                                          PID:2552
                                                                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                          C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 368 -InterruptEvent 36c -NGENProcess 310 -Pipe 354 -Comment "NGen Worker Process"
                                                                          2⤵
                                                                            PID:2896
                                                                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                            C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 36c -InterruptEvent 370 -NGENProcess 314 -Pipe 358 -Comment "NGen Worker Process"
                                                                            2⤵
                                                                            • Modifies data under HKEY_USERS
                                                                            PID:2248
                                                                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                            C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 370 -InterruptEvent 374 -NGENProcess 2f8 -Pipe 35c -Comment "NGen Worker Process"
                                                                            2⤵
                                                                            • Modifies data under HKEY_USERS
                                                                            PID:2376
                                                                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                            C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 370 -InterruptEvent 120 -NGENProcess 36c -Pipe 310 -Comment "NGen Worker Process"
                                                                            2⤵
                                                                            • Modifies data under HKEY_USERS
                                                                            PID:1796
                                                                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                            C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 120 -InterruptEvent 248 -NGENProcess 374 -Pipe 368 -Comment "NGen Worker Process"
                                                                            2⤵
                                                                            • Modifies data under HKEY_USERS
                                                                            PID:2088
                                                                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                            C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 120 -InterruptEvent 374 -NGENProcess 248 -Pipe 364 -Comment "NGen Worker Process"
                                                                            2⤵
                                                                            • Modifies data under HKEY_USERS
                                                                            PID:960
                                                                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                            C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 374 -InterruptEvent 37c -NGENProcess 36c -Pipe 11c -Comment "NGen Worker Process"
                                                                            2⤵
                                                                            • Modifies data under HKEY_USERS
                                                                            PID:952
                                                                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                            C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 37c -InterruptEvent 380 -NGENProcess 2f8 -Pipe 378 -Comment "NGen Worker Process"
                                                                            2⤵
                                                                            • Modifies data under HKEY_USERS
                                                                            PID:2844
                                                                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                            C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 380 -InterruptEvent 384 -NGENProcess 248 -Pipe 370 -Comment "NGen Worker Process"
                                                                            2⤵
                                                                              PID:1820
                                                                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                              C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 384 -InterruptEvent 388 -NGENProcess 36c -Pipe 360 -Comment "NGen Worker Process"
                                                                              2⤵
                                                                              • Modifies data under HKEY_USERS
                                                                              PID:1228
                                                                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                              C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 388 -InterruptEvent 38c -NGENProcess 2f8 -Pipe 120 -Comment "NGen Worker Process"
                                                                              2⤵
                                                                              • Modifies data under HKEY_USERS
                                                                              PID:2672
                                                                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                              C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 38c -InterruptEvent 390 -NGENProcess 248 -Pipe 374 -Comment "NGen Worker Process"
                                                                              2⤵
                                                                              • Modifies data under HKEY_USERS
                                                                              PID:2180
                                                                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                              C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 390 -InterruptEvent 394 -NGENProcess 36c -Pipe 37c -Comment "NGen Worker Process"
                                                                              2⤵
                                                                              • Modifies data under HKEY_USERS
                                                                              PID:1728
                                                                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                              C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 394 -InterruptEvent 398 -NGENProcess 2f8 -Pipe 380 -Comment "NGen Worker Process"
                                                                              2⤵
                                                                              • Loads dropped DLL
                                                                              • Drops file in Windows directory
                                                                              • Modifies data under HKEY_USERS
                                                                              PID:960
                                                                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                              C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 398 -InterruptEvent 2f8 -NGENProcess 390 -Pipe 248 -Comment "NGen Worker Process"
                                                                              2⤵
                                                                              • Modifies data under HKEY_USERS
                                                                              PID:2240
                                                                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                              C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2f8 -InterruptEvent 3a8 -NGENProcess 36c -Pipe 3a4 -Comment "NGen Worker Process"
                                                                              2⤵
                                                                              • Loads dropped DLL
                                                                              • Drops file in Windows directory
                                                                              • Modifies data under HKEY_USERS
                                                                              PID:2380
                                                                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                              C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3a8 -InterruptEvent 36c -NGENProcess 398 -Pipe 38c -Comment "NGen Worker Process"
                                                                              2⤵
                                                                              • Modifies data under HKEY_USERS
                                                                              PID:1876
                                                                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                              C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 36c -InterruptEvent 3b0 -NGENProcess 390 -Pipe 394 -Comment "NGen Worker Process"
                                                                              2⤵
                                                                              • Loads dropped DLL
                                                                              • Drops file in Windows directory
                                                                              • Modifies data under HKEY_USERS
                                                                              PID:1400
                                                                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                              C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3b0 -InterruptEvent 390 -NGENProcess 3a8 -Pipe 3ac -Comment "NGen Worker Process"
                                                                              2⤵
                                                                                PID:912
                                                                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                                C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 390 -InterruptEvent 3b8 -NGENProcess 398 -Pipe 2f8 -Comment "NGen Worker Process"
                                                                                2⤵
                                                                                • Modifies data under HKEY_USERS
                                                                                PID:2552
                                                                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                                C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3b8 -InterruptEvent 3bc -NGENProcess 3b4 -Pipe 3a0 -Comment "NGen Worker Process"
                                                                                2⤵
                                                                                • Loads dropped DLL
                                                                                • Drops file in Windows directory
                                                                                PID:1648
                                                                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                                C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3bc -InterruptEvent 3b4 -NGENProcess 390 -Pipe 3a8 -Comment "NGen Worker Process"
                                                                                2⤵
                                                                                  PID:2412
                                                                                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                                  C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3b4 -InterruptEvent 3c4 -NGENProcess 398 -Pipe 384 -Comment "NGen Worker Process"
                                                                                  2⤵
                                                                                    PID:1460
                                                                                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                                    C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3b0 -InterruptEvent 3bc -NGENProcess 3c8 -Pipe 3b4 -Comment "NGen Worker Process"
                                                                                    2⤵
                                                                                      PID:300
                                                                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                                      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3bc -InterruptEvent 3b8 -NGENProcess 398 -Pipe 388 -Comment "NGen Worker Process"
                                                                                      2⤵
                                                                                        PID:2748
                                                                                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                                        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3b8 -InterruptEvent 3cc -NGENProcess 3c4 -Pipe 390 -Comment "NGen Worker Process"
                                                                                        2⤵
                                                                                          PID:2596
                                                                                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                                          C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3cc -InterruptEvent 3d0 -NGENProcess 3c8 -Pipe 1bc -Comment "NGen Worker Process"
                                                                                          2⤵
                                                                                            PID:2656
                                                                                        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
                                                                                          C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
                                                                                          1⤵
                                                                                          • Executes dropped EXE
                                                                                          • Drops file in Windows directory
                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                          PID:2968
                                                                                          • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
                                                                                            C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 1d4 -InterruptEvent 1c0 -NGENProcess 1c4 -Pipe 1d0 -Comment "NGen Worker Process"
                                                                                            2⤵
                                                                                            • Executes dropped EXE
                                                                                            PID:848
                                                                                          • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
                                                                                            C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 244 -InterruptEvent 1c0 -NGENProcess 1c4 -Pipe 1d4 -Comment "NGen Worker Process"
                                                                                            2⤵
                                                                                            • Executes dropped EXE
                                                                                            PID:2272
                                                                                        • C:\Windows\ehome\ehRecvr.exe
                                                                                          C:\Windows\ehome\ehRecvr.exe
                                                                                          1⤵
                                                                                          • Executes dropped EXE
                                                                                          PID:1428
                                                                                        • C:\Windows\ehome\ehsched.exe
                                                                                          C:\Windows\ehome\ehsched.exe
                                                                                          1⤵
                                                                                          • Executes dropped EXE
                                                                                          PID:1164
                                                                                        • C:\Windows\eHome\EhTray.exe
                                                                                          "C:\Windows\eHome\EhTray.exe" /nav:-2
                                                                                          1⤵
                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                          • Suspicious use of FindShellTrayWindow
                                                                                          • Suspicious use of SendNotifyMessage
                                                                                          PID:2072
                                                                                        • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                                                                                          "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                                                                                          1⤵
                                                                                          • Executes dropped EXE
                                                                                          PID:2276
                                                                                        • C:\Windows\system32\IEEtwCollector.exe
                                                                                          C:\Windows\system32\IEEtwCollector.exe /V
                                                                                          1⤵
                                                                                          • Executes dropped EXE
                                                                                          PID:2248
                                                                                        • C:\Windows\ehome\ehRec.exe
                                                                                          C:\Windows\ehome\ehRec.exe -Embedding
                                                                                          1⤵
                                                                                          • Modifies data under HKEY_USERS
                                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                          PID:2268
                                                                                        • C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE
                                                                                          "C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE" /auditservice
                                                                                          1⤵
                                                                                          • Executes dropped EXE
                                                                                          • Drops file in System32 directory
                                                                                          PID:944
                                                                                        • C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe
                                                                                          "C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"
                                                                                          1⤵
                                                                                          • Executes dropped EXE
                                                                                          PID:320
                                                                                        • C:\Windows\System32\msdtc.exe
                                                                                          C:\Windows\System32\msdtc.exe
                                                                                          1⤵
                                                                                          • Executes dropped EXE
                                                                                          • Drops file in System32 directory
                                                                                          PID:1740
                                                                                        • C:\Windows\system32\msiexec.exe
                                                                                          C:\Windows\system32\msiexec.exe /V
                                                                                          1⤵
                                                                                          • Executes dropped EXE
                                                                                          • Loads dropped DLL
                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                          PID:2132
                                                                                        • C:\Program Files (x86)\Common Files\Microsoft Shared\Source Engine\OSE.EXE
                                                                                          "C:\Program Files (x86)\Common Files\Microsoft Shared\Source Engine\OSE.EXE"
                                                                                          1⤵
                                                                                          • Executes dropped EXE
                                                                                          PID:2556
                                                                                        • C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE
                                                                                          "C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"
                                                                                          1⤵
                                                                                          • Executes dropped EXE
                                                                                          PID:2396
                                                                                        • C:\Windows\SysWow64\perfhost.exe
                                                                                          C:\Windows\SysWow64\perfhost.exe
                                                                                          1⤵
                                                                                          • Executes dropped EXE
                                                                                          PID:536
                                                                                        • C:\Windows\system32\locator.exe
                                                                                          C:\Windows\system32\locator.exe
                                                                                          1⤵
                                                                                          • Executes dropped EXE
                                                                                          PID:1124
                                                                                        • C:\Windows\System32\snmptrap.exe
                                                                                          C:\Windows\System32\snmptrap.exe
                                                                                          1⤵
                                                                                          • Executes dropped EXE
                                                                                          PID:1452
                                                                                        • C:\Windows\System32\vds.exe
                                                                                          C:\Windows\System32\vds.exe
                                                                                          1⤵
                                                                                          • Executes dropped EXE
                                                                                          PID:2908
                                                                                        • C:\Windows\system32\vssvc.exe
                                                                                          C:\Windows\system32\vssvc.exe
                                                                                          1⤵
                                                                                          • Executes dropped EXE
                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                          PID:1504
                                                                                        • C:\Windows\system32\wbengine.exe
                                                                                          "C:\Windows\system32\wbengine.exe"
                                                                                          1⤵
                                                                                          • Executes dropped EXE
                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                          PID:2924
                                                                                        • C:\Windows\system32\wbem\WmiApSrv.exe
                                                                                          C:\Windows\system32\wbem\WmiApSrv.exe
                                                                                          1⤵
                                                                                          • Executes dropped EXE
                                                                                          PID:1584
                                                                                        • C:\Program Files\Windows Media Player\wmpnetwk.exe
                                                                                          "C:\Program Files\Windows Media Player\wmpnetwk.exe"
                                                                                          1⤵
                                                                                          • Executes dropped EXE
                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                          PID:2352
                                                                                        • C:\Windows\system32\SearchIndexer.exe
                                                                                          C:\Windows\system32\SearchIndexer.exe /Embedding
                                                                                          1⤵
                                                                                          • Executes dropped EXE
                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                          • Suspicious use of WriteProcessMemory
                                                                                          PID:2444
                                                                                          • C:\Windows\system32\SearchProtocolHost.exe
                                                                                            "C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe_S-1-5-21-330940541-141609230-1670313778-10001_ Global\UsGthrCtrlFltPipeMssGthrPipe_S-1-5-21-330940541-141609230-1670313778-10001 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon" "1"
                                                                                            2⤵
                                                                                            • Suspicious use of SetWindowsHookEx
                                                                                            PID:2596
                                                                                          • C:\Windows\system32\SearchFilterHost.exe
                                                                                            "C:\Windows\system32\SearchFilterHost.exe" 0 588 592 600 65536 596
                                                                                            2⤵
                                                                                              PID:2388
                                                                                            • C:\Windows\system32\SearchProtocolHost.exe
                                                                                              "C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe2_ Global\UsGthrCtrlFltPipeMssGthrPipe2 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon"
                                                                                              2⤵
                                                                                              • Drops file in System32 directory
                                                                                              • Modifies data under HKEY_USERS
                                                                                              • Suspicious use of SetWindowsHookEx
                                                                                              PID:340
                                                                                          • C:\Windows\system32\dllhost.exe
                                                                                            C:\Windows\system32\dllhost.exe /Processid:{02D4B3F1-FD88-11D1-960D-00805FC79235}
                                                                                            1⤵
                                                                                            • Executes dropped EXE
                                                                                            • Drops file in Windows directory
                                                                                            PID:2304

                                                                                          Network

                                                                                          MITRE ATT&CK Enterprise v15

                                                                                          Replay Monitor

                                                                                          Loading Replay Monitor...

                                                                                          Downloads

                                                                                          • C:\Program Files (x86)\Common Files\microsoft shared\Source Engine\OSE.EXE

                                                                                            Filesize

                                                                                            706KB

                                                                                            MD5

                                                                                            bc91dfcfb0b6477994fe74e8c24d2654

                                                                                            SHA1

                                                                                            248347993dacbc5c1d2c630b50e58ead07d1381e

                                                                                            SHA256

                                                                                            090017fb70d00a10a254498d6b074f9ef90eb5ac1d98e3545ef45160bd002ec1

                                                                                            SHA512

                                                                                            52dc68be4142dce5e5f50235d0f3e937f5743f284ab34ee98a5f6dacb664e2b6c7e3d67c652b01dab72480577d6b83503b8e4741fdf02a44b44fa58cc78c2968

                                                                                          • C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE

                                                                                            Filesize

                                                                                            30.1MB

                                                                                            MD5

                                                                                            179604c6b35bc1360d5be4313f7ba708

                                                                                            SHA1

                                                                                            21429ce073712020f3ca072d1ec9e0688d3908a4

                                                                                            SHA256

                                                                                            0a29516870906f8893d3b26a4814678bd35e82a4b5c5cb8c1cecb325e930a515

                                                                                            SHA512

                                                                                            f8d02ab804e9236789a0936b0dce43950b82e4b6b30a619c24017fe8291ba8e831c32279b45839f843d6ac67302a104f81cad32a5fd2bd869d763b3e593be07c

                                                                                          • C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe

                                                                                            Filesize

                                                                                            781KB

                                                                                            MD5

                                                                                            4e6684c96eea80e688e3f14742c49102

                                                                                            SHA1

                                                                                            f5a6fc422774ab356ebb5de603394679f8c2ff4a

                                                                                            SHA256

                                                                                            b81af320094cd6d8ffe5fddf98cdbf014f7e542889745f1340c4d1206ee55a2e

                                                                                            SHA512

                                                                                            679feea5ae5d5b9ab6908fb30e4db434e520e142a7b7c38df2b32ef257267fa9bf51e7c09c1e733aac96bc24efa7287183ef026af5b71f0fd64fff88134639b0

                                                                                          • C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE

                                                                                            Filesize

                                                                                            5.2MB

                                                                                            MD5

                                                                                            b3c4eb858ff68824bb21adffbfe0e46e

                                                                                            SHA1

                                                                                            bea9d1edbe0b223ee8e85cf5e075c82153c054cb

                                                                                            SHA256

                                                                                            4d66c785bc4c99546adb63daac2358911e023f305670d15caccfa0fe9871c56e

                                                                                            SHA512

                                                                                            6a1b6c2558267e132b804baae2d1509c2eb1e85aba10ed4a9eed1a0c408f8364e87010353e938f30fafd13e08cdef80e0c0f050555d4fbc11b1b097a5b730621

                                                                                          • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe

                                                                                            Filesize

                                                                                            2.1MB

                                                                                            MD5

                                                                                            dad878146cd837c4227c91a3122e35a7

                                                                                            SHA1

                                                                                            e49fc3e612700b1f60dd632168d3c42032d510c7

                                                                                            SHA256

                                                                                            e69f0d48c0d95e8d09563100fa30d508f1334f5adf8d13200569d215b4630ecf

                                                                                            SHA512

                                                                                            639677b7e81610d46daffcf515e8a405509723fb47fe68b2e12f8b4f01e7525eb7071917a06f79a5492ac3ba08ede947679b3e8a866960901dfce38a749e5aa3

                                                                                          • C:\Program Files\Windows Media Player\wmpnetwk.exe

                                                                                            Filesize

                                                                                            2.0MB

                                                                                            MD5

                                                                                            3742b79e9af4ef847aaad4fa8b41f2f5

                                                                                            SHA1

                                                                                            d3ad45848cb2dc73e150d42229714a517d5a7135

                                                                                            SHA256

                                                                                            65b82f8b09c5b281e720393a069b56f78b2b66ecbcceb48cf4181dd8f4b29137

                                                                                            SHA512

                                                                                            85562061d5a676a7ece6b51325171aee992fccd282ff1771516a7133a61271f4129db1e6763f4209cfc5c8af0ac38cd38c06cdd4a74c0b76c16a9d6fe0f57593

                                                                                          • C:\ProgramData\Microsoft\Search\Data\Applications\Windows\MSS.log

                                                                                            Filesize

                                                                                            1024KB

                                                                                            MD5

                                                                                            e4e8bd22f7cb41cb482ed6d096f5454a

                                                                                            SHA1

                                                                                            fd9e9fbb155380f3cebd918891f934e7e2b9939f

                                                                                            SHA256

                                                                                            4e7e364eb559c776fce47c248d882a8f06d7dacc08355e2254d1893c742042e7

                                                                                            SHA512

                                                                                            a7e93e1d162fe82c3ee30d315777bee259ea8bf362fe6309b18a5c7b28bd311fbcefb14442b1618e8d75e37faf03ac9542b1969c15b503aa589e128ee9b4d93a

                                                                                          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b91050d8b077a4e8.customDestinations-ms

                                                                                            Filesize

                                                                                            24B

                                                                                            MD5

                                                                                            b9bd716de6739e51c620f2086f9c31e4

                                                                                            SHA1

                                                                                            9733d94607a3cba277e567af584510edd9febf62

                                                                                            SHA256

                                                                                            7116ff028244a01f3d17f1d3bc2e1506bc9999c2e40e388458f0cccc4e117312

                                                                                            SHA512

                                                                                            cef609e54c7a81a646ad38dba7ac0b82401b220773b9c792cefac80c6564753229f0c011b34ffb56381dd3154a19aee2bf5f602c4d1af01f2cf0fbc1574e4478

                                                                                          • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe

                                                                                            Filesize

                                                                                            648KB

                                                                                            MD5

                                                                                            c739799a4f78f0f9caab755d29d950ad

                                                                                            SHA1

                                                                                            cad87035c2ad439976e968c56c1b6c003998bd48

                                                                                            SHA256

                                                                                            019709f77c106992c717305e3df5385f1aeab4d8bb3c7c6daec68d0e4e8c8493

                                                                                            SHA512

                                                                                            28344ba4e4807c27d526a8b3a218290a9a7cdae612264c20d2e9dcc80ae134f3c6087a32330ec3ce3a8c3831c62601cc9b031bedf155a99cb48ddbe6fe737d32

                                                                                          • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ngen_service.log

                                                                                            Filesize

                                                                                            872KB

                                                                                            MD5

                                                                                            c5fb5a90bccc01774a6d12157be594a1

                                                                                            SHA1

                                                                                            7175672ad91b74e6123102f9190e1f31177c0119

                                                                                            SHA256

                                                                                            8f87ba8cbcd128c75afedb576f0826da16b3ba3680e5aa9c5c244ccca0cc0014

                                                                                            SHA512

                                                                                            1a014cad2901e24c7dc801f9c021227fe454fdaaab8a3c61dec6a2abddf35d3d26167ac0a8c5b8a17e02c37b012bce15a950dfb3ce415388c70a8e823c84b456

                                                                                          • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe

                                                                                            Filesize

                                                                                            678KB

                                                                                            MD5

                                                                                            303bb4da0dc5bf5c40abeb4b67ebd634

                                                                                            SHA1

                                                                                            353d2904cb2ff1c4e077e0b989454fc2d3e0c6fe

                                                                                            SHA256

                                                                                            c70bc3175343528537ff5bbb895139ef0838d3690079ee9d7670f0e8aaf0b4fe

                                                                                            SHA512

                                                                                            8129a1289769a1a8918bb9b846494dd3c9a63fcfbe5866a268bb27f2e3522d0a1576206a5c44e9ef55c0d91a23c59512a86d85a24a8ee3aa0e067082d672b461

                                                                                          • C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe

                                                                                            Filesize

                                                                                            625KB

                                                                                            MD5

                                                                                            bebe71c1af233abafd1f7f76c501742c

                                                                                            SHA1

                                                                                            942487a40ba58c26043a1bf171423ad144e390b6

                                                                                            SHA256

                                                                                            cf68adf32f13cdfa97219e57b78e1c75a6794829c884e4fa604f3ccb2fe49806

                                                                                            SHA512

                                                                                            c549708ae75ec9e61079bdf380bfd8cee02553d9d4b0f5b960e19c6b71d0fec693ef9b18ef79d6dde4b653978e5fc4b778c289acb69405a821e196443b54fca8

                                                                                          • C:\Windows\Microsoft.NET\Framework\v2.0.50727\ngen_service.log

                                                                                            Filesize

                                                                                            1003KB

                                                                                            MD5

                                                                                            a26e691f74f0ddfdbb493ad656c9a91c

                                                                                            SHA1

                                                                                            78eac90899e24c2dd749fc44607af1ea9dc35a23

                                                                                            SHA256

                                                                                            6eddf506fc4317bd0170a44c37d5c7fef19c6e0a5d15cc99e674c94a03faca26

                                                                                            SHA512

                                                                                            c16f81c42ad3a2b8676d6ec0a71c731684d0efa4325fbc9cb9aea8730c463c132b59da9053e20b8922d57766f9e130e95a6cd27bd232a1c08cecf02f53674d8e

                                                                                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe

                                                                                            Filesize

                                                                                            656KB

                                                                                            MD5

                                                                                            9b0a894fcd08b02ce71f8fbed90bbe52

                                                                                            SHA1

                                                                                            e85cb909dc8f17eb7deb47a435a8dfb21567483b

                                                                                            SHA256

                                                                                            3e21bc27406f1d9e8e2219e6b1a3c2990edc73d4d8d5b95f843b0d04b7680dc7

                                                                                            SHA512

                                                                                            943e337af687f3cf7940f4390d08f8c01ef9cf81f70552b5206f2dcf865d5d4bed8b74b9e9164df07def202ffd92905327f6174bf2c84b521aabadeae73b4a5d

                                                                                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen_service.log

                                                                                            Filesize

                                                                                            8KB

                                                                                            MD5

                                                                                            e357989910a074d345aa39e07da48cc8

                                                                                            SHA1

                                                                                            3ccf39e874aee718437ae3f147d70db6fe5f6fef

                                                                                            SHA256

                                                                                            20177d9c665fc074fca43dc4113c9bdcf339a8d5ada0cc9aead998182ef63059

                                                                                            SHA512

                                                                                            a5010e616678f17bfe32a6d4b0acf65258c95048c62bab0d509f918d49a35083058d8b1b56597168b453a3e1148e1afc77c263a6c3180c22bc983cb67260d7f8

                                                                                          • C:\Windows\SysWOW64\perfhost.exe

                                                                                            Filesize

                                                                                            587KB

                                                                                            MD5

                                                                                            ef86a93187a3e036f9454656067133d3

                                                                                            SHA1

                                                                                            73d69757b06efa1091c40d74f9da13507f124f1a

                                                                                            SHA256

                                                                                            c9e7c0815be18269f8b54f901ebe58213ed2f3009985e5bf0323b1249c1b804a

                                                                                            SHA512

                                                                                            d38703d849a56f97c23478f0bf544fc7cc5991233aa730b0a0df19ebd8e20abd1d047268380f3c5a812a1d578fb06b6ab5c22857308f7536c4fb51ee3e809a7d

                                                                                          • C:\Windows\System32\Locator.exe

                                                                                            Filesize

                                                                                            577KB

                                                                                            MD5

                                                                                            b792313cb0d4235111d4d23bc2443e30

                                                                                            SHA1

                                                                                            f07f89563c1a6213978382205d97b3a8a6ceaaff

                                                                                            SHA256

                                                                                            4d2b8176de3239bd91cfbe20ff6b6c0670e533144f16c5f159a2484d4bdce7d9

                                                                                            SHA512

                                                                                            ead34d62210ff949f45ba9a377aadcf8e4050960404f6367e2a2552107d3e5238afd9ba166c632268b26e1345936955a9992511fe1538ec32072ca273439a839

                                                                                          • C:\Windows\System32\SearchIndexer.exe

                                                                                            Filesize

                                                                                            1.1MB

                                                                                            MD5

                                                                                            7dbda99df1d599cc695a7c113b5a3f5b

                                                                                            SHA1

                                                                                            f440c71d7b743030cb8fb352debd553b79002d19

                                                                                            SHA256

                                                                                            2d1d6e206e81cc7ea3c1f4065e191da11b3216d584b74ad167ed54c9c433da85

                                                                                            SHA512

                                                                                            8e37e8195c5e57523e4ee3628e189e43bd0ff60800d11db4797c089a844af1090a01c4cf04368165ea22733112af1b4b3de79643015b343e2ee5c27f5bfab297

                                                                                          • C:\Windows\System32\VSSVC.exe

                                                                                            Filesize

                                                                                            2.1MB

                                                                                            MD5

                                                                                            1843e049fb2cfa7fccaa7cf4b98106bb

                                                                                            SHA1

                                                                                            4ba5579c032bf0bbc08c0c83a07cab114cd6f180

                                                                                            SHA256

                                                                                            e9b30eb0dfefda4f8fc84ec0ffa4aef910af27342c8d86350c6ea62f2313efff

                                                                                            SHA512

                                                                                            0094e141d8b4b15c72e26a6a586cc1a5700573c4932fc40895c2013ba733b7f60b83d516c451d5eb3feae52cc5ee7bfa1608bc598fd2dfe2006e0d0106bef8b9

                                                                                          • C:\Windows\System32\ieetwcollector.exe

                                                                                            Filesize

                                                                                            674KB

                                                                                            MD5

                                                                                            7399d64dfa976be4fe9ab01aef99b98f

                                                                                            SHA1

                                                                                            1815845c0663fcb339a2e33af016c9b6c90bf0b2

                                                                                            SHA256

                                                                                            6fde80c6a468fde210171f8800440d8d4e87f2dab53ea7fa4489957c7c627cc7

                                                                                            SHA512

                                                                                            3d04dd7be417ab29f7124145a32f06ceb52969ffa8560bf4483fcc35b8f668d02de47cf590e357600a1744ee91b2abb7ef295fa90e5de07149e8ce902c3bbd6b

                                                                                          • C:\Windows\System32\vds.exe

                                                                                            Filesize

                                                                                            1.1MB

                                                                                            MD5

                                                                                            7c1c2ddc3e6ede2ec660ed3c7b56fc8e

                                                                                            SHA1

                                                                                            293d9b7744295770a80ed37b5cd4feb4f02192fb

                                                                                            SHA256

                                                                                            b1307f3d6884590e652242fd028a3b4843db89ba2bc995a00af78a2fd75c10bc

                                                                                            SHA512

                                                                                            acde97d8ce564715bf8e940dd8b5f8809899c22259ca74001830a8f7907d9d6b2b9c4769e75c8545e87e1202efdd6d2759ae6a7abb14ada3ad981926197bbf16

                                                                                          • C:\Windows\System32\wbem\WmiApSrv.exe

                                                                                            Filesize

                                                                                            765KB

                                                                                            MD5

                                                                                            daf1aec0b06fae3c095fae9b4f702f46

                                                                                            SHA1

                                                                                            17af9a3518397ce865cedd1c27571f3d22f4eb08

                                                                                            SHA256

                                                                                            c1ff9149e720487b483a3394c719a4d49a6d17db0352cb8822f6482c6afb8cf8

                                                                                            SHA512

                                                                                            09d0b736b6ae104ce6a0c46abd7d2846e4af6094a2cc7ebed567a503f271ada0805475ca52ab9df0da7540b2c6adde684313a634040be51a750ab19b6d937bfc

                                                                                          • C:\Windows\System32\wbengine.exe

                                                                                            Filesize

                                                                                            2.0MB

                                                                                            MD5

                                                                                            d1689fb41dfb823822a6e6e42dc2d720

                                                                                            SHA1

                                                                                            308fca3e1c8bde53baea07c6e53b4959311ac879

                                                                                            SHA256

                                                                                            b910d42f66c7b9ff66a959a211dac7efdecf55470f988534713f6896ee8a616b

                                                                                            SHA512

                                                                                            faa492a03a0b821e9c0c030f9fdfe20840cda8f572f4f57103dd595cf9a86dc5c0d2bb2742e0cf4ba2ec670fb10321af7dd662323d9606ca2d8ddabab0283f81

                                                                                          • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.Office.To#\135228e87b2c27d26b516ac0fc0ce667\Microsoft.Office.Tools.Word.v9.0.ni.dll

                                                                                            Filesize

                                                                                            834KB

                                                                                            MD5

                                                                                            c76656b09bb7df6bd2ac1a6177a0027c

                                                                                            SHA1

                                                                                            0c296994a249e8649b19be84dce27c9ddafef3e0

                                                                                            SHA256

                                                                                            a0ae0aec5b203865fac761023741a59d274e2c41889aeb69140eb746d38f6ce0

                                                                                            SHA512

                                                                                            8390879b8812fc98c17702a52259d510a7fe8bc3cf4972e89f705e93bc8fa98300c34d49f3aec869da8d9f786d33004742e4538019c0f852c61db89c302d5fdf

                                                                                          • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.Office.To#\5766ec3721d18a48bec1ca1f60331e2d\Microsoft.Office.Tools.Common.v9.0.ni.dll

                                                                                            Filesize

                                                                                            797KB

                                                                                            MD5

                                                                                            aeb0b6e6c5d32d1ada231285ff2ae881

                                                                                            SHA1

                                                                                            1f04a1c059503896336406aed1dc93340e90b742

                                                                                            SHA256

                                                                                            4c53ca542ac5ef9d822ef8cb3b0ecef3fb8b937d94c0a7b735bedb275c74a263

                                                                                            SHA512

                                                                                            e55fd4c4d2966b3f0b6e88292fbd6c20ffa34766e076e763442c15212d19b6dea5d9dc9e7c359d999674a5b2c8a3849c2bbaaf83e7aa8c12715028b06b5a48e1

                                                                                          • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.Office.To#\60214b09b490be856c4ee2b3398d71bd\Microsoft.Office.Tools.Outlook.v9.0.ni.dll

                                                                                            Filesize

                                                                                            163KB

                                                                                            MD5

                                                                                            e88828b5a35063aa16c68ffb8322215d

                                                                                            SHA1

                                                                                            8225660ba3a9f528cf6ac32038ae3e0ec98d2331

                                                                                            SHA256

                                                                                            99facae4828c566c310a1ccf4059100067ab8bfb3d6e94e44dd9e189fd491142

                                                                                            SHA512

                                                                                            e4d2f5a5aeaa29d4d3392588f15db0d514ca4c86c629f0986ee8dba61e34af5ca9e06b94479efd8dd154026ae0da276888a0214e167129db18316a17d9718a57

                                                                                          • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.Office.To#\d7be05162f8d0fba8f4447db13f6695b\Microsoft.Office.Tools.Excel.v9.0.ni.dll

                                                                                            Filesize

                                                                                            1.3MB

                                                                                            MD5

                                                                                            006498313e139299a5383f0892c954b9

                                                                                            SHA1

                                                                                            7b3aa10930da9f29272154e2674b86876957ce3a

                                                                                            SHA256

                                                                                            489fec79addba2de9141daa61062a05a95e96a196049ce414807bada572cc35c

                                                                                            SHA512

                                                                                            6a15a10ae66ce0e5b18e060bb53c3108d09f6b07ee2c4a834856f0a35bec2453b32f891620e787731985719831302160678eb52acada102fdb0b87a14288d925

                                                                                          • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.Office.To#\e1f8e4d08d4b7f811b7dbbacd324027b\Microsoft.Office.Tools.v9.0.ni.dll

                                                                                            Filesize

                                                                                            148KB

                                                                                            MD5

                                                                                            ac901cf97363425059a50d1398e3454b

                                                                                            SHA1

                                                                                            2f8bd4ac2237a7b7606cb77a3d3c58051793c5c7

                                                                                            SHA256

                                                                                            f6c7aecb211d9aac911bf80c91e84a47a72ac52cbb523e34e9da6482c0b24c58

                                                                                            SHA512

                                                                                            6a340b6d5fa8e214f2a58d8b691c749336df087fa75bcc8d8c46f708e4b4ff3d68a61a17d13ee62322b75cbc61d39f5a572588772f3c5d6e5ff32036e5bc5a00

                                                                                          • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\03cad6bd8b37d21b28dcb4f955be2158\Microsoft.VisualStudio.Tools.Applications.Contract.v9.0.ni.dll

                                                                                            Filesize

                                                                                            34KB

                                                                                            MD5

                                                                                            c26b034a8d6ab845b41ed6e8a8d6001d

                                                                                            SHA1

                                                                                            3a55774cf22d3244d30f9eb5e26c0a6792a3e493

                                                                                            SHA256

                                                                                            620b41f5e02df56c33919218bedc238ca7e76552c43da4f0f39a106835a4edc3

                                                                                            SHA512

                                                                                            483424665c3bc79aeb1de6dfdd633c8526331c7b271b1ea6fe93ab298089e2aceefe7f9c7d0c6e33e604ca7b2ed62e7bb586147fecdf9a0eea60e8c03816f537

                                                                                          • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\0cb958acb9cd4cacb46ebc0396e30aa3\Microsoft.VisualStudio.Tools.Office.Contract.v9.0.ni.dll

                                                                                            Filesize

                                                                                            109KB

                                                                                            MD5

                                                                                            0fd0f978e977a4122b64ae8f8541de54

                                                                                            SHA1

                                                                                            153d3390416fdeba1b150816cbbf968e355dc64f

                                                                                            SHA256

                                                                                            211d2b83bb82042385757f811d90c5ae0a281f3abb3bf1c7901e8559db479e60

                                                                                            SHA512

                                                                                            ceddfc031bfe4fcf5093d0bbc5697b5fb0cd69b03bc32612325a82ea273dae5daff7e670b0d45816a33307b8b042d27669f5d5391cb2bdcf3e5a0c847c6dcaa8

                                                                                          • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\367516b7878af19f5c84c67f2cd277ae\Microsoft.VisualStudio.Tools.Office.Word.AddInAdapter.v9.0.ni.dll

                                                                                            Filesize

                                                                                            41KB

                                                                                            MD5

                                                                                            3c269caf88ccaf71660d8dc6c56f4873

                                                                                            SHA1

                                                                                            f9481bf17e10fe1914644e1b590b82a0ecc2c5c4

                                                                                            SHA256

                                                                                            de21619e70f9ef8ccbb274bcd0d9d2ace1bae0442dfefab45976671587cf0a48

                                                                                            SHA512

                                                                                            bd5be3721bf5bd4001127e0381a0589033cb17aa35852f8f073ba9684af7d8c5a0f3ee29987b345fc15fdf28c5b56686087001ef41221a2cfb16498cf4c016c6

                                                                                          • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\8c6bac317f75b51647ea3a8da141b143\Microsoft.VisualStudio.Tools.Office.AddInAdapter.v9.0.ni.dll

                                                                                            Filesize

                                                                                            210KB

                                                                                            MD5

                                                                                            4f40997b51420653706cb0958086cd2d

                                                                                            SHA1

                                                                                            0069b956d17ce7d782a0e054995317f2f621b502

                                                                                            SHA256

                                                                                            8cd6a0b061b43e0b660b81859c910290a3672b00d7647ba0e86eda6ddcc8c553

                                                                                            SHA512

                                                                                            e18953d7a348859855e5f6e279bc9924fc3707b57a733ce9b8f7d21bd631d419f1ebfb29202608192eb346569ca9a55264f5b4c2aedd474c22060734a68a4ee6

                                                                                          • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\9306fc630870a75ddd23441ad77bdc57\Microsoft.VisualStudio.Tools.Applications.Runtime.v10.0.ni.dll

                                                                                            Filesize

                                                                                            53KB

                                                                                            MD5

                                                                                            e3a7a2b65afd8ab8b154fdc7897595c3

                                                                                            SHA1

                                                                                            b21eefd6e23231470b5cf0bd0d7363879a2ed228

                                                                                            SHA256

                                                                                            e5faf5e8adf46a8246e6b5038409dadca46985a9951343a1936237d2c8d7a845

                                                                                            SHA512

                                                                                            6537c7ed398deb23be1256445297cb7c8d7801bf6e163d918d8e258213708b28f7255ecff9fbd3431d8f5e5a746aa95a29d3a777b28fcd688777aed6d8205a33

                                                                                          • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\ac2e1ab5cae0ba75d0a7173ad624c222\Microsoft.VisualStudio.Tools.Office.HostAdapter.v10.0.ni.dll

                                                                                            Filesize

                                                                                            143KB

                                                                                            MD5

                                                                                            1eff63517430e183b5389ba579ed93e2

                                                                                            SHA1

                                                                                            5891927b05adc6db5464fb02469c113a975ebbf0

                                                                                            SHA256

                                                                                            b56eb87a81a8777ae81fe8099d7f18dd11757dff104a9609a0568ca0b4ce0856

                                                                                            SHA512

                                                                                            2861ba07bfea6dbe1e349df886a401df47e9ca2a3846d1f8a269c6a558bdc5f5e4bf30cbaa8c115af801f2e5bf722084b88290e1dd10c4cedbc49a26e8eda844

                                                                                          • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\afa5bb1a39443d7dc81dfff54073929b\Microsoft.VisualStudio.Tools.Office.Contract.v10.0.ni.dll

                                                                                            Filesize

                                                                                            28KB

                                                                                            MD5

                                                                                            aefc3f3c8e7499bad4d05284e8abd16c

                                                                                            SHA1

                                                                                            7ab718bde7fdb2d878d8725dc843cfeba44a71f7

                                                                                            SHA256

                                                                                            4436550409cfb3d06b15dd0c3131e87e7002b0749c7c6e9dc3378c99dbec815d

                                                                                            SHA512

                                                                                            1d7dbc9764855a9a1f945c1bc8e86406c0625f1381d71b3ea6924322fbe419d1c70c3f3efd57ee2cb2097bb9385e0bf54965ab789328a80eb4946849648fe20b

                                                                                          • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\c87f1048323723bac23aa5c7995bbab6\Microsoft.VisualStudio.Tools.Office.Outlook.HostAdapter.v10.0.ni.dll

                                                                                            Filesize

                                                                                            83KB

                                                                                            MD5

                                                                                            ceba82795c86dd08952fc932d6e67d3b

                                                                                            SHA1

                                                                                            a4474f19ea735fddc942c5c153a961435ed75e2f

                                                                                            SHA256

                                                                                            648c545195268a9a79d7998bd96c29c131ec7a93f1b097680bb584b07237b5e6

                                                                                            SHA512

                                                                                            331153f7718c4b8ebab55599158518998687df21afa8f6c2aca3ba1b9aa3d3e33365ab5ecd6c842a874ec94b490a25522be2488154203c6e6dd20a3a479167d1

                                                                                          • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\d898570fac0b2f32dd5d8779e9090f4e\Microsoft.VisualStudio.Tools.Office.Word.HostAdapter.v10.0.ni.dll

                                                                                            Filesize

                                                                                            187KB

                                                                                            MD5

                                                                                            02107d7ea912fdb53b1c63e7ee8902cb

                                                                                            SHA1

                                                                                            f1553ec2780d1523afc24cd9232b2742162d3007

                                                                                            SHA256

                                                                                            53c480121c41b96ca658ac8e3e7418b78fcb895c708ee09ab9d2de77c2e96db9

                                                                                            SHA512

                                                                                            5bf85bc36c68345df7c65ea950eda85cf969c830265eccb36b92d3b5b04cf5fe4627cdb17abd23e23419d1a7afc6fe60580562799ddc82f8ce31b1c48b27e3b6

                                                                                          • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\de06a98a598aa0ff716a25b24d56ad7f\Microsoft.VisualStudio.Tools.Applications.Contract.v10.0.ni.dll

                                                                                            Filesize

                                                                                            27KB

                                                                                            MD5

                                                                                            9c60454398ce4bce7a52cbda4a45d364

                                                                                            SHA1

                                                                                            da1e5de264a6f6051b332f8f32fa876d297bf620

                                                                                            SHA256

                                                                                            edc90887d38c87282f49adbb12a94040f9ac86058bfae15063aaaff2672b54e1

                                                                                            SHA512

                                                                                            533b7e9c55102b248f4a7560955734b4156eb4c02539c6f978aeacecff1ff182ba0f04a07d32ed90707a62d73191b0e2d2649f38ae1c3e7a5a4c0fbea9a94300

                                                                                          • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\e0220058091b941725ef02be0b84abe7\Microsoft.VisualStudio.Tools.Applications.HostAdapter.v10.0.ni.dll

                                                                                            Filesize

                                                                                            57KB

                                                                                            MD5

                                                                                            6eaaa1f987d6e1d81badf8665c55a341

                                                                                            SHA1

                                                                                            e52db4ad92903ca03a5a54fdb66e2e6fad59efd5

                                                                                            SHA256

                                                                                            4b78ffa5f0b6751aea11917db5961d566e2f59beaa054b41473d331fd392329e

                                                                                            SHA512

                                                                                            dbedfa6c569670c22d34d923e22b7dae7332b932b809082dad87a1f0bb125c912db37964b5881667867ccf23dc5e5be596aad85485746f8151ce1c51ffd097b2

                                                                                          • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\ee73646032cbb022d16771203727e3b2\Microsoft.VisualStudio.Tools.Applications.Runtime.v9.0.ni.dll

                                                                                            Filesize

                                                                                            130KB

                                                                                            MD5

                                                                                            2735d2ab103beb0f7c1fbd6971838274

                                                                                            SHA1

                                                                                            6063646bc072546798bf8bf347425834f2bfad71

                                                                                            SHA256

                                                                                            f00156860ec7e88f4ccb459ca29b7e0e5c169cdc8a081cb043603187d25d92b3

                                                                                            SHA512

                                                                                            fe2ce60c7f61760a29344e254771d48995e983e158da0725818f37441f9690bda46545bf10c84b163f6afb163ffb504913d6ffddf84f72b062c7f233aed896de

                                                                                          • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\eeab7ec1649470097919d245a5b1d036\Microsoft.VisualStudio.Tools.Office.Excel.HostAdapter.v10.0.ni.dll

                                                                                            Filesize

                                                                                            180KB

                                                                                            MD5

                                                                                            381a6bdcadc499ff8e80cbd578276f1b

                                                                                            SHA1

                                                                                            8d871618c368b6ea5b160de953734b92e1799f1a

                                                                                            SHA256

                                                                                            0fdd7308012b0d157ea263bb6212b023cc403aae02257da39b5c0518f282677c

                                                                                            SHA512

                                                                                            b16a6a3d2c89f1ae0ca0791c7ea0860fee8c8a39a7bcd5f32ed5d2f9a0dff3119c7eda49c94be69506247d90f89c137ea0f987f3124693fd64e03a8c576182af

                                                                                          • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\f1a7ac664667f2d6bcd6c388b230c22b\Microsoft.VisualStudio.Tools.Applications.AddInAdapter.v9.0.ni.dll

                                                                                            Filesize

                                                                                            59KB

                                                                                            MD5

                                                                                            8c69bbdfbc8cc3fa3fa5edcd79901e94

                                                                                            SHA1

                                                                                            b8028f0f557692221d5c0160ec6ce414b2bdf19b

                                                                                            SHA256

                                                                                            a21471690e7c32c80049e17c13624820e77bca6c9c38b83d9ea8a7248086660d

                                                                                            SHA512

                                                                                            825f5b87b76303b62fc16a96b108fb1774c2aca52ac5e44cd0ac2fe2ee47d5d67947dfe7498e36bc849773f608ec5824711f8c36e375a378582eefb57c9c2557

                                                                                          • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\fc36797f7054935a6033077612905a0f\Microsoft.VisualStudio.Tools.Office.Excel.AddInAdapter.v9.0.ni.dll

                                                                                            Filesize

                                                                                            42KB

                                                                                            MD5

                                                                                            71d4273e5b77cf01239a5d4f29e064fc

                                                                                            SHA1

                                                                                            e8876dea4e4c4c099e27234742016be3c80d8b62

                                                                                            SHA256

                                                                                            f019899f829731f899a99885fd52fde1fe4a4f6fe3ecf7f7a7cfa78517c00575

                                                                                            SHA512

                                                                                            41fe67cda988c53bd087df6296d1a242cddac688718ea5a5884a72b43e9638538e64d7a59e045c0b4d490496d884cf0ec694ddf7fcb41ae3b8cbc65b7686b180

                                                                                          • C:\Windows\assembly\NativeImages_v2.0.50727_32\ehiVidCtl\88e20c69254157d91b96eadc9444815d\ehiVidCtl.ni.dll

                                                                                            Filesize

                                                                                            855KB

                                                                                            MD5

                                                                                            7812b0a90d92b4812d4063b89a970c58

                                                                                            SHA1

                                                                                            3c4a789b8d28a5bfa6a6191624e33b8f40e4c4ea

                                                                                            SHA256

                                                                                            897626e6af00e85e627eeaa7f9563b245335242bc6196b36d0072e5b6d45e543

                                                                                            SHA512

                                                                                            634a2395bada9227b1957f2b76ed7e19f12bfc4d71a145d182602a1b6e24d83e220ebfabd602b1995c360e1725a38a89ff58417b0295bb0da9ea35c41c21a6ed

                                                                                          • C:\Windows\assembly\NativeImages_v2.0.50727_32\stdole\2c6d60b55bbab22515c512080d4b3bae\stdole.ni.dll

                                                                                            Filesize

                                                                                            43KB

                                                                                            MD5

                                                                                            3e72bdd0663c5b2bcd530f74139c83e3

                                                                                            SHA1

                                                                                            66069bcac0207512b9e07320f4fa5934650677d2

                                                                                            SHA256

                                                                                            6a6ac3094130d1affd34aae5ba2bd8c889e2071eb4217a75d72b5560f884e357

                                                                                            SHA512

                                                                                            b0a98db477fccae71b4ebfb8525ed52c10f1e7542f955b307f260e27e0758aa22896683302e34b0237e7e3bba9f5193ddcc7ff255c71fbaa1386988b0ec7d626

                                                                                          • \Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe

                                                                                            Filesize

                                                                                            603KB

                                                                                            MD5

                                                                                            3bdc85eb64afa54f2c91c1f481ef131b

                                                                                            SHA1

                                                                                            00dc04f59a8ef1fe8d38fe7a8fa20d874f159dc0

                                                                                            SHA256

                                                                                            67d9031a67a0e87ab23546f099c7f3350281091b66dd289ba300e99cfe37bc5a

                                                                                            SHA512

                                                                                            5e773bb96f1eb42f4f549c7edc8151512bbda4a29b578ca2e9d05c202c11b1e292038c271a8cae483ce0a8b03c7fa39be9c43bc129cdd3c9930b3718524328de

                                                                                          • \Windows\System32\alg.exe

                                                                                            Filesize

                                                                                            644KB

                                                                                            MD5

                                                                                            ed13c51fef6b8af42928f84e81b27c52

                                                                                            SHA1

                                                                                            e45dda84acc332586b4bc4a6a3b998c027221dbc

                                                                                            SHA256

                                                                                            9f1a005ed15e232c118919cb5b1a6ae69c34ff083e084683bed229be6b082b37

                                                                                            SHA512

                                                                                            b9e56e4b7b24f57ee9a601032926a57f6bc2ccab8a4c188a9caec2ff3d52eb3f9b1ef18fcfef92e0ffa3e529bcd9d6a31f343b51b0138e5638d9c118ed27629c

                                                                                          • \Windows\System32\msdtc.exe

                                                                                            Filesize

                                                                                            705KB

                                                                                            MD5

                                                                                            1a7f531d72b08c42b643d96c06975d6e

                                                                                            SHA1

                                                                                            45cf102c1f2a8ec5985158b8877651b83c720ab6

                                                                                            SHA256

                                                                                            19d711cd1aba76139661b0721e40e43b9ae755452f8e7952d3308557c85a382e

                                                                                            SHA512

                                                                                            07fe7f6bbc1762871644655ff99c27f45557de4a83daf5191d41b19ee5513495722e7a99c3116199fdd0e523448e8db0a8e61af60c50c03da241ed871a3424a6

                                                                                          • \Windows\System32\msiexec.exe

                                                                                            Filesize

                                                                                            691KB

                                                                                            MD5

                                                                                            e13f034887ea39885b58e1f667d8ed0d

                                                                                            SHA1

                                                                                            dba53239ed01be217825536f750dd3f685703f6d

                                                                                            SHA256

                                                                                            02e3b7fe16dc66b1944975a665c0d0a900235ef06a8b94b8b500c06547b23d5f

                                                                                            SHA512

                                                                                            d5bb33ea3e150283684494d901890c70836defebd4a5834a7dc415bc5bd7f507c6bbad588c832cbe708bac045a73c60babec9e481f6f3c56911cc014d744c35f

                                                                                          • \Windows\System32\snmptrap.exe

                                                                                            Filesize

                                                                                            581KB

                                                                                            MD5

                                                                                            dd227f686a5eec3942123c1ccaf5c715

                                                                                            SHA1

                                                                                            567e01d12542b67a752c3f22357b4548c5a4ac9e

                                                                                            SHA256

                                                                                            9560b395c32871409673d2b7c92d628bf7e3099bf76418c5e52c26976a5e47a3

                                                                                            SHA512

                                                                                            a5756e204a24f1ffc2e666855833435dccaf4133d3a17a294f15a2b9100334328e63e11482eaa709e59e59688c988add983b37b2bd20e4fcd24d305558742cec

                                                                                          • \Windows\ehome\ehrecvr.exe

                                                                                            Filesize

                                                                                            1.2MB

                                                                                            MD5

                                                                                            ef551f9ffa0f0af30006c3e290b81acb

                                                                                            SHA1

                                                                                            36431a495c7e97fec1a00c45ee92d804cea3d8d5

                                                                                            SHA256

                                                                                            3bce27fbcdf2385985f96ac55e2d970720c11551018db3a107b1cea4aead1db6

                                                                                            SHA512

                                                                                            d3bcf3d6b1c03f105deead4dea303423dca5da40ee5a6a4d1d485160dee24905770c0a7b2a958f498136362bafa20ac31db61b8d0cc44c9184ff905a771b82b2

                                                                                          • \Windows\ehome\ehsched.exe

                                                                                            Filesize

                                                                                            691KB

                                                                                            MD5

                                                                                            190eb6fa1d62112d006fb26e31a47439

                                                                                            SHA1

                                                                                            5d9ef412be58ed301ff5990734e0546f13f12d9b

                                                                                            SHA256

                                                                                            4541ee219db196520aa4913ba48436aa352b854516442f60578ebbf8c43f3b10

                                                                                            SHA512

                                                                                            66ba04bf1d9c827fc7ccb1c4152bd1816308ee6ad101c4b615787549c6652ed8b798772e9c35d6996211a917c936a0e49577d5cf11c9e20abf10d940f5adff18

                                                                                          • memory/320-181-0x0000000140000000-0x00000001400CA000-memory.dmp

                                                                                            Filesize

                                                                                            808KB

                                                                                          • memory/320-197-0x0000000140000000-0x00000001400CA000-memory.dmp

                                                                                            Filesize

                                                                                            808KB

                                                                                          • memory/536-245-0x0000000001000000-0x0000000001096000-memory.dmp

                                                                                            Filesize

                                                                                            600KB

                                                                                          • memory/536-376-0x0000000001000000-0x0000000001096000-memory.dmp

                                                                                            Filesize

                                                                                            600KB

                                                                                          • memory/552-659-0x0000000000400000-0x00000000004A8000-memory.dmp

                                                                                            Filesize

                                                                                            672KB

                                                                                          • memory/552-678-0x0000000000400000-0x00000000004A8000-memory.dmp

                                                                                            Filesize

                                                                                            672KB

                                                                                          • memory/664-793-0x0000000000400000-0x00000000004A8000-memory.dmp

                                                                                            Filesize

                                                                                            672KB

                                                                                          • memory/664-786-0x0000000000400000-0x00000000004A8000-memory.dmp

                                                                                            Filesize

                                                                                            672KB

                                                                                          • memory/684-640-0x0000000000400000-0x00000000004A8000-memory.dmp

                                                                                            Filesize

                                                                                            672KB

                                                                                          • memory/772-307-0x0000000000400000-0x00000000004A8000-memory.dmp

                                                                                            Filesize

                                                                                            672KB

                                                                                          • memory/772-316-0x0000000000400000-0x00000000004A8000-memory.dmp

                                                                                            Filesize

                                                                                            672KB

                                                                                          • memory/924-841-0x0000000000400000-0x00000000004A8000-memory.dmp

                                                                                            Filesize

                                                                                            672KB

                                                                                          • memory/924-838-0x0000000000400000-0x00000000004A8000-memory.dmp

                                                                                            Filesize

                                                                                            672KB

                                                                                          • memory/944-277-0x000000002E000000-0x000000002FE1E000-memory.dmp

                                                                                            Filesize

                                                                                            30.1MB

                                                                                          • memory/944-172-0x000000002E000000-0x000000002FE1E000-memory.dmp

                                                                                            Filesize

                                                                                            30.1MB

                                                                                          • memory/1124-389-0x0000000100000000-0x0000000100095000-memory.dmp

                                                                                            Filesize

                                                                                            596KB

                                                                                          • memory/1124-265-0x0000000100000000-0x0000000100095000-memory.dmp

                                                                                            Filesize

                                                                                            596KB

                                                                                          • memory/1164-244-0x0000000140000000-0x00000001400B2000-memory.dmp

                                                                                            Filesize

                                                                                            712KB

                                                                                          • memory/1164-124-0x0000000140000000-0x00000001400B2000-memory.dmp

                                                                                            Filesize

                                                                                            712KB

                                                                                          • memory/1324-728-0x0000000000400000-0x00000000004A8000-memory.dmp

                                                                                            Filesize

                                                                                            672KB

                                                                                          • memory/1324-745-0x0000000000400000-0x00000000004A8000-memory.dmp

                                                                                            Filesize

                                                                                            672KB

                                                                                          • memory/1324-827-0x0000000000400000-0x00000000004A8000-memory.dmp

                                                                                            Filesize

                                                                                            672KB

                                                                                          • memory/1428-119-0x00000000003B0000-0x0000000000410000-memory.dmp

                                                                                            Filesize

                                                                                            384KB

                                                                                          • memory/1428-240-0x0000000140000000-0x000000014013C000-memory.dmp

                                                                                            Filesize

                                                                                            1.2MB

                                                                                          • memory/1428-112-0x0000000140000000-0x000000014013C000-memory.dmp

                                                                                            Filesize

                                                                                            1.2MB

                                                                                          • memory/1428-114-0x00000000003B0000-0x0000000000410000-memory.dmp

                                                                                            Filesize

                                                                                            384KB

                                                                                          • memory/1452-435-0x0000000100000000-0x0000000100096000-memory.dmp

                                                                                            Filesize

                                                                                            600KB

                                                                                          • memory/1452-281-0x0000000100000000-0x0000000100096000-memory.dmp

                                                                                            Filesize

                                                                                            600KB

                                                                                          • memory/1460-803-0x0000000000400000-0x00000000004A8000-memory.dmp

                                                                                            Filesize

                                                                                            672KB

                                                                                          • memory/1460-817-0x0000000000400000-0x00000000004A8000-memory.dmp

                                                                                            Filesize

                                                                                            672KB

                                                                                          • memory/1504-627-0x0000000100000000-0x0000000100219000-memory.dmp

                                                                                            Filesize

                                                                                            2.1MB

                                                                                          • memory/1504-346-0x0000000100000000-0x0000000100219000-memory.dmp

                                                                                            Filesize

                                                                                            2.1MB

                                                                                          • memory/1584-372-0x0000000100000000-0x00000001000C4000-memory.dmp

                                                                                            Filesize

                                                                                            784KB

                                                                                          • memory/1584-660-0x0000000100000000-0x00000001000C4000-memory.dmp

                                                                                            Filesize

                                                                                            784KB

                                                                                          • memory/1608-204-0x0000000000400000-0x00000000004A8000-memory.dmp

                                                                                            Filesize

                                                                                            672KB

                                                                                          • memory/1608-79-0x00000000004B0000-0x0000000000517000-memory.dmp

                                                                                            Filesize

                                                                                            412KB

                                                                                          • memory/1608-74-0x00000000004B0000-0x0000000000517000-memory.dmp

                                                                                            Filesize

                                                                                            412KB

                                                                                          • memory/1608-73-0x0000000000400000-0x00000000004A8000-memory.dmp

                                                                                            Filesize

                                                                                            672KB

                                                                                          • memory/1740-186-0x0000000140000000-0x00000001400B6000-memory.dmp

                                                                                            Filesize

                                                                                            728KB

                                                                                          • memory/1740-312-0x0000000140000000-0x00000001400B6000-memory.dmp

                                                                                            Filesize

                                                                                            728KB

                                                                                          • memory/1856-278-0x0000000000400000-0x00000000004A8000-memory.dmp

                                                                                            Filesize

                                                                                            672KB

                                                                                          • memory/1856-310-0x0000000000400000-0x00000000004A8000-memory.dmp

                                                                                            Filesize

                                                                                            672KB

                                                                                          • memory/1940-658-0x0000000000400000-0x00000000004A8000-memory.dmp

                                                                                            Filesize

                                                                                            672KB

                                                                                          • memory/1940-639-0x0000000000400000-0x00000000004A8000-memory.dmp

                                                                                            Filesize

                                                                                            672KB

                                                                                          • memory/1984-319-0x0000000000400000-0x00000000004A8000-memory.dmp

                                                                                            Filesize

                                                                                            672KB

                                                                                          • memory/1984-419-0x0000000000400000-0x00000000004A8000-memory.dmp

                                                                                            Filesize

                                                                                            672KB

                                                                                          • memory/2064-709-0x0000000000400000-0x00000000004A8000-memory.dmp

                                                                                            Filesize

                                                                                            672KB

                                                                                          • memory/2064-727-0x0000000000400000-0x00000000004A8000-memory.dmp

                                                                                            Filesize

                                                                                            672KB

                                                                                          • memory/2132-318-0x0000000100000000-0x00000001000B2000-memory.dmp

                                                                                            Filesize

                                                                                            712KB

                                                                                          • memory/2132-337-0x0000000000590000-0x0000000000642000-memory.dmp

                                                                                            Filesize

                                                                                            712KB

                                                                                          • memory/2132-212-0x0000000000590000-0x0000000000642000-memory.dmp

                                                                                            Filesize

                                                                                            712KB

                                                                                          • memory/2132-202-0x0000000100000000-0x00000001000B2000-memory.dmp

                                                                                            Filesize

                                                                                            712KB

                                                                                          • memory/2212-6-0x00000000005E0000-0x0000000000647000-memory.dmp

                                                                                            Filesize

                                                                                            412KB

                                                                                          • memory/2212-72-0x0000000000400000-0x00000000005D9000-memory.dmp

                                                                                            Filesize

                                                                                            1.8MB

                                                                                          • memory/2212-1-0x00000000005E0000-0x0000000000647000-memory.dmp

                                                                                            Filesize

                                                                                            412KB

                                                                                          • memory/2212-0-0x0000000000400000-0x00000000005D9000-memory.dmp

                                                                                            Filesize

                                                                                            1.8MB

                                                                                          • memory/2216-785-0x0000000000400000-0x00000000004A8000-memory.dmp

                                                                                            Filesize

                                                                                            672KB

                                                                                          • memory/2216-765-0x0000000000400000-0x00000000004A8000-memory.dmp

                                                                                            Filesize

                                                                                            672KB

                                                                                          • memory/2248-159-0x0000000140000000-0x00000001400AE000-memory.dmp

                                                                                            Filesize

                                                                                            696KB

                                                                                          • memory/2276-264-0x0000000140000000-0x0000000140237000-memory.dmp

                                                                                            Filesize

                                                                                            2.2MB

                                                                                          • memory/2276-145-0x0000000140000000-0x0000000140237000-memory.dmp

                                                                                            Filesize

                                                                                            2.2MB

                                                                                          • memory/2300-680-0x0000000000400000-0x00000000004A8000-memory.dmp

                                                                                            Filesize

                                                                                            672KB

                                                                                          • memory/2300-710-0x0000000000400000-0x00000000004A8000-memory.dmp

                                                                                            Filesize

                                                                                            672KB

                                                                                          • memory/2352-377-0x0000000100000000-0x000000010020A000-memory.dmp

                                                                                            Filesize

                                                                                            2.0MB

                                                                                          • memory/2352-688-0x0000000100000000-0x000000010020A000-memory.dmp

                                                                                            Filesize

                                                                                            2.0MB

                                                                                          • memory/2376-748-0x0000000000400000-0x00000000004A8000-memory.dmp

                                                                                            Filesize

                                                                                            672KB

                                                                                          • memory/2376-751-0x0000000003C20000-0x0000000003CDA000-memory.dmp

                                                                                            Filesize

                                                                                            744KB

                                                                                          • memory/2376-764-0x0000000000400000-0x00000000004A8000-memory.dmp

                                                                                            Filesize

                                                                                            672KB

                                                                                          • memory/2396-371-0x0000000100000000-0x0000000100542000-memory.dmp

                                                                                            Filesize

                                                                                            5.3MB

                                                                                          • memory/2396-241-0x0000000100000000-0x0000000100542000-memory.dmp

                                                                                            Filesize

                                                                                            5.3MB

                                                                                          • memory/2428-567-0x0000000000400000-0x00000000004A8000-memory.dmp

                                                                                            Filesize

                                                                                            672KB

                                                                                          • memory/2428-436-0x0000000000400000-0x00000000004A8000-memory.dmp

                                                                                            Filesize

                                                                                            672KB

                                                                                          • memory/2444-708-0x0000000100000000-0x0000000100123000-memory.dmp

                                                                                            Filesize

                                                                                            1.1MB

                                                                                          • memory/2444-390-0x0000000100000000-0x0000000100123000-memory.dmp

                                                                                            Filesize

                                                                                            1.1MB

                                                                                          • memory/2524-108-0x0000000010000000-0x000000001009F000-memory.dmp

                                                                                            Filesize

                                                                                            636KB

                                                                                          • memory/2524-46-0x0000000000440000-0x00000000004A7000-memory.dmp

                                                                                            Filesize

                                                                                            412KB

                                                                                          • memory/2524-40-0x0000000000440000-0x00000000004A7000-memory.dmp

                                                                                            Filesize

                                                                                            412KB

                                                                                          • memory/2524-38-0x0000000010000000-0x000000001009F000-memory.dmp

                                                                                            Filesize

                                                                                            636KB

                                                                                          • memory/2556-350-0x000000002E000000-0x000000002E0B5000-memory.dmp

                                                                                            Filesize

                                                                                            724KB

                                                                                          • memory/2556-226-0x000000002E000000-0x000000002E0B5000-memory.dmp

                                                                                            Filesize

                                                                                            724KB

                                                                                          • memory/2572-35-0x00000000004D0000-0x0000000000530000-memory.dmp

                                                                                            Filesize

                                                                                            384KB

                                                                                          • memory/2572-26-0x0000000140000000-0x000000014009D000-memory.dmp

                                                                                            Filesize

                                                                                            628KB

                                                                                          • memory/2572-27-0x00000000004D0000-0x0000000000530000-memory.dmp

                                                                                            Filesize

                                                                                            384KB

                                                                                          • memory/2572-138-0x0000000140000000-0x000000014009D000-memory.dmp

                                                                                            Filesize

                                                                                            628KB

                                                                                          • memory/2632-619-0x0000000000400000-0x00000000004A8000-memory.dmp

                                                                                            Filesize

                                                                                            672KB

                                                                                          • memory/2676-564-0x0000000000400000-0x00000000004A8000-memory.dmp

                                                                                            Filesize

                                                                                            672KB

                                                                                          • memory/2676-596-0x0000000000400000-0x00000000004A8000-memory.dmp

                                                                                            Filesize

                                                                                            672KB

                                                                                          • memory/2752-440-0x0000000000400000-0x00000000004A8000-memory.dmp

                                                                                            Filesize

                                                                                            672KB

                                                                                          • memory/2752-412-0x0000000000400000-0x00000000004A8000-memory.dmp

                                                                                            Filesize

                                                                                            672KB

                                                                                          • memory/2764-835-0x0000000000400000-0x00000000004A8000-memory.dmp

                                                                                            Filesize

                                                                                            672KB

                                                                                          • memory/2776-62-0x00000000001E0000-0x0000000000240000-memory.dmp

                                                                                            Filesize

                                                                                            384KB

                                                                                          • memory/2776-54-0x00000000001E0000-0x0000000000240000-memory.dmp

                                                                                            Filesize

                                                                                            384KB

                                                                                          • memory/2776-89-0x0000000010000000-0x00000000100A7000-memory.dmp

                                                                                            Filesize

                                                                                            668KB

                                                                                          • memory/2776-53-0x0000000010000000-0x00000000100A7000-memory.dmp

                                                                                            Filesize

                                                                                            668KB

                                                                                          • memory/2908-587-0x0000000100000000-0x0000000100114000-memory.dmp

                                                                                            Filesize

                                                                                            1.1MB

                                                                                          • memory/2908-313-0x0000000100000000-0x0000000100114000-memory.dmp

                                                                                            Filesize

                                                                                            1.1MB

                                                                                          • memory/2924-359-0x0000000100000000-0x0000000100202000-memory.dmp

                                                                                            Filesize

                                                                                            2.0MB

                                                                                          • memory/2924-638-0x0000000100000000-0x0000000100202000-memory.dmp

                                                                                            Filesize

                                                                                            2.0MB

                                                                                          • memory/2932-592-0x0000000000400000-0x00000000004A8000-memory.dmp

                                                                                            Filesize

                                                                                            672KB

                                                                                          • memory/2932-615-0x0000000000400000-0x00000000004A8000-memory.dmp

                                                                                            Filesize

                                                                                            672KB

                                                                                          • memory/2944-12-0x0000000000870000-0x00000000008D0000-memory.dmp

                                                                                            Filesize

                                                                                            384KB

                                                                                          • memory/2944-19-0x0000000000870000-0x00000000008D0000-memory.dmp

                                                                                            Filesize

                                                                                            384KB

                                                                                          • memory/2944-20-0x0000000000870000-0x00000000008D0000-memory.dmp

                                                                                            Filesize

                                                                                            384KB

                                                                                          • memory/2944-18-0x0000000100000000-0x00000001000A4000-memory.dmp

                                                                                            Filesize

                                                                                            656KB

                                                                                          • memory/2944-91-0x0000000100000000-0x00000001000A4000-memory.dmp

                                                                                            Filesize

                                                                                            656KB

                                                                                          • memory/2968-93-0x0000000000AF0000-0x0000000000B50000-memory.dmp

                                                                                            Filesize

                                                                                            384KB

                                                                                          • memory/2968-225-0x0000000140000000-0x00000001400AE000-memory.dmp

                                                                                            Filesize

                                                                                            696KB

                                                                                          • memory/2968-92-0x0000000140000000-0x00000001400AE000-memory.dmp

                                                                                            Filesize

                                                                                            696KB

                                                                                          • memory/2968-99-0x0000000000AF0000-0x0000000000B50000-memory.dmp

                                                                                            Filesize

                                                                                            384KB