Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2024 16:05
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-24_04b5bbc97808c93abac75c0042e6b505_avoslocker.exe
Resource
win7-20240508-en
General
-
Target
2024-05-24_04b5bbc97808c93abac75c0042e6b505_avoslocker.exe
-
Size
1.3MB
-
MD5
04b5bbc97808c93abac75c0042e6b505
-
SHA1
e455578720860020aecee363e1812204bf1740fa
-
SHA256
3d032b379725d11000a30ade2fefbe0881516cccfe6e6ce5a5978436f5b2632e
-
SHA512
4c50c8d9b92951a2325e2e1a8a9ce7dddcc78ab3e90ae844757f412e60b6d319a6c644b580bbfcd5b9a45cb447f23534066b29a14be19a8f62ff5ca3d39bf3cd
-
SSDEEP
24576:92zEYytjjqNSlhvpfQiIhKPtehfQ7r9qySkbgedWe1g6p7HF/w/ftDsBUiScD7Wb:9PtjtQiIhUyQd1SkFdWmgiTd8DsMcDKb
Malware Config
Signatures
-
Executes dropped EXE 22 IoCs
Processes:
alg.exeDiagnosticsHub.StandardCollector.Service.exeelevation_service.exeelevation_service.exemaintenanceservice.exeOSE.EXEfxssvc.exemsdtc.exePerceptionSimulationService.exeperfhost.exelocator.exeSensorDataService.exesnmptrap.exespectrum.exessh-agent.exeTieringEngineService.exeAgentService.exevds.exevssvc.exewbengine.exeWmiApSrv.exeSearchIndexer.exepid process 2756 alg.exe 1252 DiagnosticsHub.StandardCollector.Service.exe 4864 elevation_service.exe 1688 elevation_service.exe 2900 maintenanceservice.exe 4320 OSE.EXE 5064 fxssvc.exe 4144 msdtc.exe 2308 PerceptionSimulationService.exe 2536 perfhost.exe 3756 locator.exe 3760 SensorDataService.exe 4544 snmptrap.exe 4400 spectrum.exe 3748 ssh-agent.exe 3312 TieringEngineService.exe 3624 AgentService.exe 3052 vds.exe 1952 vssvc.exe 2916 wbengine.exe 3856 WmiApSrv.exe 4308 SearchIndexer.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in System32 directory 28 IoCs
Processes:
DiagnosticsHub.StandardCollector.Service.exeelevation_service.exe2024-05-24_04b5bbc97808c93abac75c0042e6b505_avoslocker.exemsdtc.exedescription ioc process File opened for modification C:\Windows\system32\config\systemprofile\AppData\Roaming\89e769b8293b476c.bin DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Windows\System32\OpenSSH\ssh-agent.exe elevation_service.exe File opened for modification C:\Windows\system32\wbengine.exe elevation_service.exe File opened for modification C:\Windows\System32\alg.exe 2024-05-24_04b5bbc97808c93abac75c0042e6b505_avoslocker.exe File opened for modification C:\Windows\system32\AppVClient.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Windows\system32\msiexec.exe elevation_service.exe File opened for modification C:\Windows\system32\dllhost.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Windows\system32\dllhost.exe elevation_service.exe File opened for modification C:\Windows\system32\wbem\WmiApSrv.exe elevation_service.exe File opened for modification C:\Windows\system32\SearchIndexer.exe elevation_service.exe File opened for modification C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe 2024-05-24_04b5bbc97808c93abac75c0042e6b505_avoslocker.exe File opened for modification C:\Windows\System32\SensorDataService.exe elevation_service.exe File opened for modification C:\Windows\system32\AgentService.exe elevation_service.exe File opened for modification C:\Windows\system32\spectrum.exe elevation_service.exe File opened for modification C:\Windows\System32\vds.exe elevation_service.exe File opened for modification C:\Windows\system32\fxssvc.exe elevation_service.exe File opened for modification C:\Windows\system32\locator.exe elevation_service.exe File opened for modification C:\Windows\System32\snmptrap.exe elevation_service.exe File opened for modification C:\Windows\SysWow64\perfhost.exe elevation_service.exe File opened for modification C:\Windows\system32\SgrmBroker.exe elevation_service.exe File opened for modification C:\Windows\system32\vssvc.exe elevation_service.exe File opened for modification C:\Windows\system32\AppVClient.exe 2024-05-24_04b5bbc97808c93abac75c0042e6b505_avoslocker.exe File opened for modification C:\Windows\system32\dllhost.exe 2024-05-24_04b5bbc97808c93abac75c0042e6b505_avoslocker.exe File opened for modification C:\Windows\System32\msdtc.exe elevation_service.exe File opened for modification C:\Windows\system32\TieringEngineService.exe elevation_service.exe File opened for modification C:\Windows\system32\AppVClient.exe elevation_service.exe File opened for modification C:\Windows\system32\PerceptionSimulation\PerceptionSimulationService.exe elevation_service.exe File opened for modification C:\Windows\system32\MSDtc\MSDTC.LOG msdtc.exe -
Drops file in Program Files directory 64 IoCs
Processes:
elevation_service.exeDiagnosticsHub.StandardCollector.Service.exedescription ioc process File opened for modification C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe elevation_service.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleCrashHandler.exe elevation_service.exe File opened for modification C:\Program Files\Mozilla Firefox\maintenanceservice.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroTextExtractor.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files (x86)\Common Files\Java\Java Update\jucheck.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\kinit.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\keytool.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Mozilla Firefox\default-browser-agent.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\TabTip.exe elevation_service.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AdobeCollabSync.exe elevation_service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\wsgen.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\InspectorOfficeGadget.exe elevation_service.exe File opened for modification C:\Program Files\Internet Explorer\iexplore.exe elevation_service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javac.exe elevation_service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\native2ascii.exe elevation_service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\policytool.exe elevation_service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\schemagen.exe elevation_service.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe elevation_service.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\java-rmi.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Internet Explorer\iediagcmd.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jstat.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\ktab.exe elevation_service.exe File opened for modification C:\Program Files\Mozilla Firefox\pingsender.exe elevation_service.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\rmid.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\pi_brokers\64BitMAPIBroker.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\jabswitch.exe elevation_service.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\pi_brokers\32BitMAPIBroker.exe elevation_service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jconsole.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Eula.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARM.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jabswitch.exe elevation_service.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\ssvagent.exe elevation_service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jmap.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Mozilla Firefox\private_browsing.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Mozilla Firefox\uninstall\helper.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\LogTransport2.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Common Files\microsoft shared\OFFICE16\LICLUA.EXE elevation_service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\serialver.exe elevation_service.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\jp2launcher.exe elevation_service.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\orbd.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\java.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Google\Chrome\Application\110.0.5481.104\Installer\chrmstp.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\unpack200.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Mozilla Firefox\maintenanceservice_installer.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroBroker.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\IntegratedOffice.exe elevation_service.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\tnameserv.exe elevation_service.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\unpack200.exe elevation_service.exe File opened for modification C:\Program Files\Common Files\microsoft shared\Source Engine\OSE.EXE DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jinfo.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe elevation_service.exe File opened for modification C:\Program Files (x86)\Google\Update\Download\{8A69D345-D564-463C-AFF1-A69D9E530F96}\110.0.5481.104\chrome_installer.exe elevation_service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javah.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\native2ascii.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\javaw.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrServicesUpdater.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\jjs.exe elevation_service.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\servertool.exe elevation_service.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32Info.exe elevation_service.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\InputPersonalization.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jar.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\javaws.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javap.exe elevation_service.exe -
Drops file in Windows directory 2 IoCs
Processes:
elevation_service.exemsdtc.exedescription ioc process File opened for modification C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe elevation_service.exe File opened for modification C:\Windows\DtcInstall.log msdtc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 64 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
spectrum.exeSensorDataService.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C spectrum.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\FriendlyName spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 spectrum.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\FriendlyName spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 spectrum.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A spectrum.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\FriendlyName spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C spectrum.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\FriendlyName SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 SensorDataService.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName spectrum.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
TieringEngineService.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz TieringEngineService.exe Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 TieringEngineService.exe -
Modifies data under HKEY_USERS 64 IoCs
Processes:
SearchProtocolHost.exeSearchFilterHost.exefxssvc.exedescription ioc process Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{8082C5E6-4C27-48EC-A809-B8E1122E8F97} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 0100000000000000de9e3967f4adda01 SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Windows\System32\ieframe.dll,-12385 = "Favorites Bar" SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{5383EF74-273B-4278-AB0C-CDAA9FD5369E} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 01000000000000007b9c7767f4adda01 SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\MPEG2Demultiplexer SearchFilterHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{F81B1B56-7613-4EE4-BC05-1FAB5DE5C07E} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 0100000000000000de9e3967f4adda01 SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-126 = "Microsoft Word Macro-Enabled Template" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Windows\System32\ieframe.dll,-913 = "MHTML Document" SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{01BE4CFB-129A-452B-A209-F9D40B3B84A5} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 010000000000000055c45f67f4adda01 SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9939 = "ADTS Audio" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@fxsresm.dll,-1130 = "Microsoft Modem Device Provider" fxssvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{487BA7B8-4DB0-465F-B122-C74A445A095D} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 010000000000000079b32d67f4adda01 SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@"C:\Windows\system32\windowspowershell\v1.0\powershell.exe",-103 = "Windows PowerShell Script" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mid\OpenWithList SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Program Files\Common Files\system\wab32res.dll,-10100 = "Contacts" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates SearchFilterHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-178 = "OpenDocument Presentation" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-182 = "Microsoft PowerPoint Template" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9907 = "MIDI Sequence" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9914 = "Windows Media Audio/Video file" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-174 = "Microsoft PowerPoint Presentation" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-113 = "Microsoft Excel Binary Worksheet" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aif\OpenWithList SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-140 = "Microsoft OneNote Section" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-121 = "Microsoft Word 97 - 2003 Template" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9934 = "AVCHD Video" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-103 = "Microsoft Excel Macro-Enabled Worksheet" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Windows\system32\windows.storage.dll,-10152 = "File folder" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9932 = "MP4 Video" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Windows\System32\ieframe.dll,-914 = "SVG Document" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.snd\OpenWithList SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.svg SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@fxsresm.dll,-1133 = "Print" fxssvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\MPEG2Demultiplexer SearchFilterHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.html SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Windows\System32\ieframe.dll,-912 = "HTML Document" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.htm\OpenWithList SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum 64-bit\{4EFE2452-168A-11D1-BC76-00C04FB9453B}\Default MidiOut Device SearchFilterHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-123 = "Microsoft Word Document" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@windows.storage.dll,-21825 = "3D Objects" SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{AEB16279-B750-48F1-8586-97956060175A} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 0100000000000000513c3767f4adda01 SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Windows\system32\notepad.exe,-469 = "Text Document" SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{1E589E9D-8A8D-46D9-A2F9-E6D4F8161EE9} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 01000000000000006f021d67f4adda01 SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-131 = "Rich Text Format" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-111 = "Microsoft Excel Macro-Enabled Template" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aif SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-124 = "Microsoft Word Macro-Enabled Document" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Windows\System32\acppage.dll,-6002 = "Windows Batch File" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9938 = "3GPP2 Audio/Video" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@"C:\Windows\system32\windowspowershell\v1.0\powershell.exe",-105 = "Windows PowerShell XML Document" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-107 = "Microsoft Excel Comma Separated Values File" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mht\OpenWithList SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@fxsresm.dll,-1132 = "Store in a folder" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Windows\System32\wshext.dll,-4802 = "VBScript Script File" SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{80009818-F38F-4AF1-87B5-EADAB9433E58} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 0100000000000000e0b14c67f4adda01 SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Windows\regedit.exe,-309 = "Registration Entries" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@fxsresm.dll,-1131 = "Route through e-mail" fxssvc.exe Key created \REGISTRY\USER\.DEFAULT\Software SearchFilterHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.html\OpenWithList SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My SearchFilterHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pdf SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum 64-bit SearchFilterHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-142 = "Microsoft OneNote Table Of Contents" SearchProtocolHost.exe -
Suspicious behavior: EnumeratesProcesses 13 IoCs
Processes:
DiagnosticsHub.StandardCollector.Service.exeelevation_service.exepid process 1252 DiagnosticsHub.StandardCollector.Service.exe 1252 DiagnosticsHub.StandardCollector.Service.exe 1252 DiagnosticsHub.StandardCollector.Service.exe 1252 DiagnosticsHub.StandardCollector.Service.exe 1252 DiagnosticsHub.StandardCollector.Service.exe 1252 DiagnosticsHub.StandardCollector.Service.exe 4864 elevation_service.exe 4864 elevation_service.exe 4864 elevation_service.exe 4864 elevation_service.exe 4864 elevation_service.exe 4864 elevation_service.exe 4864 elevation_service.exe -
Suspicious behavior: LoadsDriver 2 IoCs
Processes:
pid process 668 668 -
Suspicious use of AdjustPrivilegeToken 40 IoCs
Processes:
2024-05-24_04b5bbc97808c93abac75c0042e6b505_avoslocker.exeDiagnosticsHub.StandardCollector.Service.exeelevation_service.exefxssvc.exeTieringEngineService.exeAgentService.exevssvc.exewbengine.exeSearchIndexer.exedescription pid process Token: SeTakeOwnershipPrivilege 1800 2024-05-24_04b5bbc97808c93abac75c0042e6b505_avoslocker.exe Token: SeDebugPrivilege 1252 DiagnosticsHub.StandardCollector.Service.exe Token: SeTakeOwnershipPrivilege 4864 elevation_service.exe Token: SeAuditPrivilege 5064 fxssvc.exe Token: SeRestorePrivilege 3312 TieringEngineService.exe Token: SeManageVolumePrivilege 3312 TieringEngineService.exe Token: SeAssignPrimaryTokenPrivilege 3624 AgentService.exe Token: SeBackupPrivilege 1952 vssvc.exe Token: SeRestorePrivilege 1952 vssvc.exe Token: SeAuditPrivilege 1952 vssvc.exe Token: SeBackupPrivilege 2916 wbengine.exe Token: SeRestorePrivilege 2916 wbengine.exe Token: SeSecurityPrivilege 2916 wbengine.exe Token: 33 4308 SearchIndexer.exe Token: SeIncBasePriorityPrivilege 4308 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4308 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4308 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4308 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4308 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4308 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4308 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4308 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4308 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4308 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4308 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4308 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4308 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4308 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4308 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4308 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4308 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4308 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4308 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4308 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4308 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4308 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4308 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4308 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4308 SearchIndexer.exe Token: SeDebugPrivilege 4864 elevation_service.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
SearchIndexer.exedescription pid process target process PID 4308 wrote to memory of 3336 4308 SearchIndexer.exe SearchProtocolHost.exe PID 4308 wrote to memory of 3336 4308 SearchIndexer.exe SearchProtocolHost.exe PID 4308 wrote to memory of 2472 4308 SearchIndexer.exe SearchFilterHost.exe PID 4308 wrote to memory of 2472 4308 SearchIndexer.exe SearchFilterHost.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-24_04b5bbc97808c93abac75c0042e6b505_avoslocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-24_04b5bbc97808c93abac75c0042e6b505_avoslocker.exe"1⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\alg.exeC:\Windows\System32\alg.exe1⤵
- Executes dropped EXE
-
C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exeC:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"1⤵
- Executes dropped EXE
-
C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"1⤵
- Executes dropped EXE
-
\??\c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"1⤵
- Executes dropped EXE
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s TapiSrv1⤵
-
C:\Windows\system32\fxssvc.exeC:\Windows\system32\fxssvc.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\msdtc.exeC:\Windows\System32\msdtc.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
-
C:\Windows\system32\PerceptionSimulation\PerceptionSimulationService.exeC:\Windows\system32\PerceptionSimulation\PerceptionSimulationService.exe1⤵
- Executes dropped EXE
-
C:\Windows\SysWow64\perfhost.exeC:\Windows\SysWow64\perfhost.exe1⤵
- Executes dropped EXE
-
C:\Windows\system32\locator.exeC:\Windows\system32\locator.exe1⤵
- Executes dropped EXE
-
C:\Windows\System32\SensorDataService.exeC:\Windows\System32\SensorDataService.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
-
C:\Windows\System32\snmptrap.exeC:\Windows\System32\snmptrap.exe1⤵
- Executes dropped EXE
-
C:\Windows\system32\spectrum.exeC:\Windows\system32\spectrum.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
-
C:\Windows\System32\OpenSSH\ssh-agent.exeC:\Windows\System32\OpenSSH\ssh-agent.exe1⤵
- Executes dropped EXE
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s SharedRealitySvc1⤵
-
C:\Windows\system32\TieringEngineService.exeC:\Windows\system32\TieringEngineService.exe1⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\AgentService.exeC:\Windows\system32\AgentService.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵
- Executes dropped EXE
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵
- Executes dropped EXE
-
C:\Windows\system32\SearchIndexer.exeC:\Windows\system32\SearchIndexer.exe /Embedding1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\SearchProtocolHost.exe"C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe1_ Global\UsGthrCtrlFltPipeMssGthrPipe1 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon"2⤵
- Modifies data under HKEY_USERS
-
C:\Windows\system32\SearchFilterHost.exe"C:\Windows\system32\SearchFilterHost.exe" 0 804 808 816 8192 812 7842⤵
- Modifies data under HKEY_USERS
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exeFilesize
2.1MB
MD5c5fb819591da86747235137bb6f87c30
SHA15db25d2268b3ae312c3b2a608073a091e6f6df46
SHA256b566247f1e06b85a6538a688e489bf4482ab24ce227e7692620e77e3dc407e00
SHA51226804d25ebe61519494bf12065853e919c6cc7f79278bf054011471ad3fd945c18bc947f10feaac3714abb3787b73c92bbb9e72876bac09d25f7a7bc4dad20b5
-
C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exeFilesize
797KB
MD58db2d948850ed3d351f5a432da584722
SHA11fecc08d2490a95d7163311390215e4fe2aff5d3
SHA256dc8ace9fd6bdf4597310f7386c857e722ad084689bfe070baf5e5ed564ead66f
SHA512f1416c939c655c6ce4910d6fa338416c022bd8d51aba4f9882a81139a8178ea323d4d5cc10b2eb1e016a17e8330af43bb9a7cd5cd9bc68a9bb33e1380e5e81c7
-
C:\Program Files\7-Zip\7z.exeFilesize
1.1MB
MD52c4b2342200b035b629f0e23531a1cbe
SHA168971fe141ab8ce89592118414c20a2e2901dff2
SHA256c4bb296a98aefafbc294a5e94c6dd253d9f1766c8b9fc0494a3d9b7b63a497d6
SHA512179750e643519af3635b51cf80e25e8143dccd6b67d020883e77ed7c244140b26e753697d4a4b34ddf3409712355e748a3ea3169cf7b4df59e68ba7e15bad4bf
-
C:\Program Files\7-Zip\7zFM.exeFilesize
1.5MB
MD57215887fe7748e0c54e16c428d43cbf5
SHA1b9c927595a6afcbc8c29bdb5d45fac2f1746194f
SHA256ca9d99a4ce5997b17910760d543b541fead5a954cf078c0b624d29d7cb699176
SHA51210b4d0dd921f1bed5fffd13a46215d7e18cb9ac76b7a431a46651621be5d80460e751e3e4d34f91aa1baab957d8e2825f8c5bb0192e129f32c75bfa1d3bec9fe
-
C:\Program Files\7-Zip\7zG.exeFilesize
1.2MB
MD5f1aecaeaf4de77c72d6c7efb71e21ec0
SHA15444a2abf43f7290049c200f9ad46077b5122810
SHA256e2502a1e3202695dbeb8541b22cedd1f1804a2f70590731d136fdedda92be27f
SHA512431dbcbdee4d7f39ccb9a952162a4866f34aca4e2fb59e7ff35134a25e729689207d09456ab526c6be0edf6ac7321466b98bfafa9a7f4e942ac0b9e3a6cd5d17
-
C:\Program Files\7-Zip\Uninstall.exeFilesize
582KB
MD5def822e96b2ba2e217915219e75fc616
SHA1dc8cb4c3b1bc03c71efb4812a76600031119e0fe
SHA256039a9109940c3cf61cea2d0b6088294fdbeaa4514a102f4c397eab165066832a
SHA5124f5da0e873a2d3c2c93a182f32426b402d738fd07b5cf2ed89046e5f9d97305d06d233188e22a6ae5e4224b621edce33af38d39d9ebbd16436981f5b97a5eca6
-
C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVShNotify.exeFilesize
840KB
MD58f47fe2c8bddc5d0805a32b7d14ea9ae
SHA1a9bacdecf5527d84cbd643687f6c842a2c0998d7
SHA256bcfc91b08dd19cff5ca4f8989e0203f8503f7c14fe1947b7ce911eba92fc482f
SHA512c482a01cb19a7201addc5c1014364617956d0a76bb1da43fc71f47b9dd55bf89c109401b3f508214fbc35b52394ac38185941506f001177fa43fcda595896e33
-
C:\Program Files\Common Files\microsoft shared\ClickToRun\IntegratedOffice.exeFilesize
4.6MB
MD523e7d584c75392b854ca31aa456d93f8
SHA197510338f9ec2a4d6fab6a5ff077ec106764ed99
SHA256c47c119295ba94b89f1981d45be64eb7a72c3fdb6dbf4937cc275e842f254a0e
SHA512c8c20a71da2a410caf180c2867c70ae2ee784b582b0f3214b211763f1cda2ec6ac8f4ee0c37d81fd17a3085f3c53712993549982db613034ab9195b98602a10a
-
C:\Program Files\Common Files\microsoft shared\ClickToRun\MavInject32.exeFilesize
910KB
MD510d2c874e5175e6cf779d580001f66c4
SHA1eb19ca17cc577a583930b719c281c9d87bc15579
SHA256870186483f65eef386d43d5dbbb82d171fd05c1d26913af1c5a92ecc23520b50
SHA512bbd73fd62e25a70d732c37525209f4276fb2f75591a3ef90e4b29be1024fa9e3a915d2164c7d242102b1e688d54b83fcd5ca1ea4aad2311ef6dca3de99a5b9ac
-
C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeC2RClient.exeFilesize
24.0MB
MD5fae79d70e9a00651d8bfc38b14fc8506
SHA135c696a6d9932b3c7513e132d4ac880d323cdf20
SHA256e6c673c9bdb1c22899768ed0755d656ba07320b3a6b4fe24b931712841b21e5c
SHA512d44b57ace5001741ee34f319943c3481c2ba9d69c9f732e8a74170636b144a21392d97be5f5620a93f0dae249c7f1394f044f73672312b74d099b61d8637deed
-
C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exeFilesize
2.7MB
MD54fdb33c5c9203663bdf39f8d17ec7466
SHA18df639e891726c2fe8f2948a0e336f9e84a99e59
SHA2564c85b32dc0f5b44d6fb1cec9e1274913ae3bb26d0516f35215b0ed4195910fe8
SHA51220b3d91fcc05748666a23c4f08d09cb43d9ce100ef107c3768bd2378557508a564802ff8f1bc5b2ab54a1a42b21ffc2f6cdecb061f2cc66f01300ac0ff098b94
-
C:\Program Files\Common Files\microsoft shared\OFFICE16\LICLUA.EXEFilesize
1.1MB
MD50326693f2107b35285dc5fb0cc110b97
SHA1f132184ce78bd9773ab3410a9e3f26ac10eb45d3
SHA256e2d6d92c19611175adfe10074c3a19e16e3d1f6b1903abd2b24c69ec75cf4a51
SHA51206fab0f16aa55b3cd3a69c462f6548739577b63c983283970984d62a410116ca68fec08b3e708f320e3bd34c5929f5940283595d9b9f307a42fb5cf8efdb0b85
-
C:\Program Files\Common Files\microsoft shared\Source Engine\OSE.EXEFilesize
805KB
MD54fa0cd65cd65738656fd8fe40a279a2f
SHA13b9cee543e7c643edcbea66ba06857c4f9ad7093
SHA256491d5196d441949063aab9b440ad4e89834d1213ebbafa23b5eafe1a4b7e94e9
SHA512c56567bb18c0192dfc1c6afa2e349987290e6d5103184c417501b3206655b4a9016ef25ae7c6c8a879f30b1a2ea297fcec91e593a8ce3e473049b4b8e4f520d2
-
C:\Program Files\Common Files\microsoft shared\VSTO\10.0\VSTOInstaller.exeFilesize
656KB
MD54005de13e60b3aebae88e5149ec2c849
SHA1304000a4ff71a391b9ddff35c24a6c2e59f05d6a
SHA256cef810ff32872211a253d13b0e9ed5417b7bac33be9d2950dc192c5b6b1c6e71
SHA512be869be65f94a94f121bbe5c5b0c2f678422d12c1b4edc35b4a67c33b5dbe33259a7189531aa38e8ef4f53afdc9a796e426af170286532073165d4e6ec55408e
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\Installer\chrmstp.exeFilesize
5.4MB
MD5839de14bb9bccb78097dbfe1e86f141f
SHA1fae5810a9e6fe90889dd87094a939abedf2ae2f0
SHA2560b33f33bb6e6ac877bae1e8f6b5d5d22a978190a738b6ff3f0f0deb8f5d24f23
SHA51222ba29efdeb56d20a9f9c7a83a526e329228c357596d3b6afcec0a27a1f9b3f48e39794b709940b173238f1804915ad9a1bd75fbaeabfc706a7a84edf2ab8d59
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\Installer\setup.exeFilesize
5.4MB
MD50cf2ac1e164ff0c8a1ca25ffcb98d2dc
SHA106084aafc9080ca4c6187b80a3ef8ea8c21a0672
SHA256f720ae1f6c3eb2daef5d6107798494dc54e8ae8c31d38af179b1d46d367ac76e
SHA512fd34f021460820d18e4937d532cbf2bc39c5d00cca990a3990ffad8bcbd77d8f0bd001dec310f95a899de1ccde4c7a5cfa85aaceb869b8f8cc9babfe0c69a009
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\chrome_pwa_launcher.exeFilesize
2.0MB
MD57463410f9fb6881a90241d43eb85f75a
SHA1232bb70130ec903645a4bedefef81a3b114e42bf
SHA2560fc359285f474899fdedeb0a128303f18894bcbb998bab2e5baf668521f186a2
SHA512114104c20097643ca65feab6650f38b50abea573741950a6219198f3543286e9de009000a02e36527e551677c17b975e27a018c901dd22b42ef1ab96202cf810
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exeFilesize
2.2MB
MD54c819e44947d81b39a94fdefa07e6584
SHA1af1f74f16f4d5b2492ddee9a28c3c5417b4dd11b
SHA256627691afc28572d782277e3cb1ef35d8a69b55c276b377efc32acc0b838299d3
SHA51258e22d0e1d2ad7544d99b1de0d11aa592dd11cd55378ff7de62da0584710458edb5f7a34a670028f44cb66737cc07d78cfbe8087b5397d1cf35b79b9a484b75f
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\notification_helper.exeFilesize
1.8MB
MD5720d428c85cc3217b4cc497f171973ba
SHA109f1860562dca87aa61fdec5eaa80a7b103e8cc2
SHA2563b07dfcaa1f82a123713a2d79fd903a1f05c7eceb14ee1f49673f4a86660ffb3
SHA51249cc6758d9090ba1eae86121db1acc24db8b9dd5d14b4d311f22c5774a3af0dbc2b92aea4db6c222c78ca0afc8b7040d208eebaab3402740990007ba96f2bde5
-
C:\Program Files\Google\Chrome\Application\chrome_proxy.exeFilesize
1.7MB
MD5a2be999984892e43d0209d9411d5df55
SHA18dc7692fb5de7fd7740852114fc8e2ffbb79ad82
SHA2564102d5eaedb111df3fef4ca6d440cccd9f18b32796c9da127316bca8c5b2a0a3
SHA5129447bcee96a09799c09453f62bc690ee23583a96458f9270c0ae161ad3a338ad17f1516592193ad625df54f6dc79070cf1b52376613fdf627b4d708c5a5d1176
-
C:\Program Files\Java\jdk-1.8\bin\appletviewer.exeFilesize
581KB
MD58e6c2a6c4d6d206dd4337461f871dd80
SHA13aa4377a1fdd321d8d3e65af220c193712a1a238
SHA2568c2e9ee12284b48f67a56af253a2c13d1ad4c94ecda30ce759c10a5825504e1f
SHA5129f264e0fa06246546f2e33c244b9f3de73b6d6912278cbe3bfac44a667b8f712db72b5af7d3905b540056d592f448e997f1c16ce7573a4d0e0c89d0395ccbb66
-
C:\Program Files\Java\jdk-1.8\bin\extcheck.exeFilesize
581KB
MD557b1841b3b510af9f8e74ae5e1d77873
SHA1e1e04bda8b8ae28c282ce504adc2eb9bf80be2aa
SHA25671c8e4ebe56ece642e8e6e38b84d3128ed52894fdd2e619f29808729af2b3850
SHA5121c0a41b821c886f8756dfa7890a2b2310718175bf4b6889fa845ac11c30d37b87dac189967abcee4738bea82b7a7dae593eca44424f195eeb4bd9f0e6f775d26
-
C:\Program Files\Java\jdk-1.8\bin\idlj.exeFilesize
581KB
MD5aa16736c3db2c028060f3f25dea1a2f8
SHA1032e9244f3c963f6d81f1ab675eb2905efa31806
SHA256777363cbdfc1434225d470decbde95d38d43e1a3aa8ec81ea6bd9721da27d4f5
SHA512ffb0701636406ba3b561ce2611682ecc0319e80af88d02b61b357222e12e290dae9b2d7045967366382e191457ab6a010e4f7886372d59e3f626e438b8b8e1d5
-
C:\Program Files\Java\jdk-1.8\bin\jabswitch.exeFilesize
601KB
MD5a30f9ad688e19e7791ae43c79597dd09
SHA1509fee555e1ba766f3b9d094916fa1b301cc2a6a
SHA256c7b9f7e06fe1523e657db3dd3f59dfa48c3bd87d852b49dcf1c222904c6c9cfc
SHA512d3d39b13e2c94df70181d80dc003c41b8c10c85fdc868e4f5a9ece2b4e4b771cec0f5c3d15a1ed661f417920e623f1a38912f259a4ac4368f5b49caba82f0f74
-
C:\Program Files\Java\jdk-1.8\bin\jar.exeFilesize
581KB
MD5e129b1d0ce1079a449913e91283177ce
SHA1697b21f0fa6139caf66bf30751d50351bdf47678
SHA256d4e3d46f84eb30cb05020958b280fd99166e8dfbf95a69dda0b5f6d88ad59320
SHA512f99f9e2f2985b9aa491c286c7a2172e7c3afc1b27cd3ee4a73acbed7564439f1a1348502210118d29bc1e4fca4516f27291bba141fffbbc379fb9b42fb8840a4
-
C:\Program Files\Java\jdk-1.8\bin\jarsigner.exeFilesize
581KB
MD5b42556594ccc8208c93555dbb0dbc032
SHA1d649871acdb8be8f791c6a33d7f5d64c2e80d77b
SHA256536f0e86fd35c80fb638185f91ae8f24b1dca4456082f1d30adedbed68429470
SHA512182ef1d11d5fe7341af896722dbd55a4088844bba6ce97c8ad1c51a60f443afec25ad3a8bd471ef6f90e130b2986a1fb8d96e84617b6631a23d5c180338afbc2
-
C:\Program Files\Java\jdk-1.8\bin\java-rmi.exeFilesize
581KB
MD52dd7881136524872c7be8504ef019593
SHA15e93f8220c2082d5f30ff52e3b9c49fe03d59f06
SHA2563d86a0f9e64dc69c4eaf4364ba365b8e1d62e1f543f462be21a20d396f220d21
SHA5126359af833d28b8e8fae12188d48cd2cb5aaa035cf14b3a17585a249a18fb1f9da60fa4208329992bc9a1cd4f8836b38ead8752dbf3795a6a24fbccd224d92da1
-
C:\Program Files\Java\jdk-1.8\bin\java.exeFilesize
841KB
MD596823198883e130f6a8b7a4dea529504
SHA1a0428b193f479ef8e93a0eecd34ca24278673708
SHA25637de80b89ed375c94003db69ed8339ec6673266f6aab621436d097231222a010
SHA51241d41626fef30b14f2843e1cfe37a676fcf8cc130ab255263d2372aa22a8e799a263feaac84d8ccd403d77638cf0c63e23053e8ac50e7af498ba7d9a3deadd01
-
C:\Program Files\Java\jdk-1.8\bin\javac.exeFilesize
581KB
MD5c6aec87a8e2071de1b079c5d380adfd0
SHA105e1a8ced543d8be81b79427561e37a9c5a04c17
SHA2565e73a2bc1c03935e630f1de1c6d7d90bdc461525131222ba50f1986e4c2e0f8f
SHA512202db59f8ec9ac60327cc6b09a1858cc24296b20cff04e386e75a24d1728d170cb6e8ee5cb99874f7e0332b0dca296c47e1711a1ab0c03e58905fae0c1d3573f
-
C:\Program Files\Java\jdk-1.8\bin\javadoc.exeFilesize
581KB
MD50847f57aeb9ffec24b7d96baa0b89f51
SHA10587e3326847c5cd726b1de1d017f09f5f25ae05
SHA2565ebec69064b4484b7e3cc8716d8ceea7327bdaa044e6b46539df55c9e8997dcd
SHA512ff3ba5d6aab08a590dc949a909b76f16fd3f4c031acb90c4801e79ebc1f0b0e4cb7ed0081fed5bdd4d08d6f71b9fad5e8d1ed9919f198baac1e0c3d81e84c546
-
C:\Program Files\Java\jdk-1.8\bin\javafxpackager.exeFilesize
717KB
MD5b37d0555ba1ead13ccf499d4185105b9
SHA1d00629db0736bb7c6e4a336c566a391388dfe900
SHA2568098bcfb88c7b1c101aff98f0d31af12725564a4e15dfa15e3ada68cf6566821
SHA5121b30553c733f0a4ab82aac0b12df3f14d80dce52539b719a86e941f662794d914c1c6c0f8f810f0cf5503bf3d4a587cfa0a7a81299a01acb4d522a10a448b9ba
-
C:\Program Files\Java\jdk-1.8\bin\javah.exeFilesize
581KB
MD5531bfbb500e7e97e03a220726870ba2b
SHA1777de26e136beeb1f19c2a93d441be3c014602e1
SHA2566561b00bc8c2b4cbf7a8cad5a1873c9ff20f860f561d1c92453e14be9454d92b
SHA512bf3af678d934f6b5cab0ac834d060c607ca45e7b636859fc235532fd75429570160678452d4a7054d9511754f93443af738b8b8fcd9a1c644e70e988dc999abc
-
C:\Program Files\Java\jdk-1.8\bin\javap.exeFilesize
581KB
MD55976b16c20ed54399c343ab3c18d3939
SHA1d892f1ac3b542a06091a72193b6b305c5f8c3f27
SHA256db2256c8c9bb60a9d5066b90e7eb1439ad7cdb42cd78947ab0e28e4794b2d4b1
SHA5127b73453c23e584cc2eff0d6bbef76ab7855e4f092d17a9f508223d94e158a3f1f78f2ccfa8e74c8b5d4ca004cccb6454743bcafe15c1e49d6102ae73fdfd9ced
-
C:\Program Files\Java\jdk-1.8\bin\javapackager.exeFilesize
717KB
MD58dc1259d984e9c8b1e2dff9f24561db9
SHA1dcf599087b58eb438ebef1b9c66ee4ac2615fb57
SHA256e8f0e75cb112190cccf12d7f5f5994ca50732374b424463541a7247f6425bb2e
SHA51272b6fd0df3f9a5ef6cdd396ad5c9cc423d3bdf60ed599dc2ac4536e9a676344e79cff354acd751fc6a43848133a8568ea2294e38ce87f1d4f5f30f91d6c99234
-
C:\Program Files\Java\jdk-1.8\bin\javaw.exeFilesize
841KB
MD520038c19d7c9227723017be299b4855d
SHA1268cdd14e77e3d9bb49273e6ab2c8acd3a7022ba
SHA25655f24721afa05154846ee3e4e1da2e9959da4391a5188e1ffe70c0f6c40a4950
SHA512a3c17ca9dbc2b5bf636cfcfa484bb4168659482adfc664a1e62fd60ab98ce0bc0548bbf9fa6a13dfa05ffd14c8513584c558f5293bde49730cdf42db32f45305
-
C:\Program Files\Java\jdk-1.8\bin\javaws.exeFilesize
1020KB
MD5707706072dbad088953f807eb1b36647
SHA11c8649f6e6e2bc74f8ad8044bf817e04ea753a79
SHA256d128b878b805cedca2962ce9f50ee8a238650d6f52ca35689c5757b6bc6507aa
SHA51218af5bcd4e11d9dbb1480870f8f44b1cc7d368c5b5c460a7c42c4aa86fc6f46d36f86661b2b50bb95e0a3695a5fb55edcd39fbe1c73b3891eb3e8268fed138c1
-
C:\Program Files\Java\jdk-1.8\bin\jcmd.exeFilesize
581KB
MD51925115b2f020bfcdaf992beff36cd39
SHA167e2a4dd9a54f585982204c034439b5130897e99
SHA256882d02a13c8f18961ac382ef6949e5a8bdbc0061dc8b3a1c49c604eed63d90be
SHA512cee8f7bd245a05ae89fc9459e50a3273b471dd05e1585b1668a2ef74b4afe94f4f710a86fdacfcfb852233803ac79d8071b37c7887502b9ae46117258be4df38
-
C:\Program Files\Java\jdk-1.8\bin\jconsole.exeFilesize
581KB
MD549a9a22a9b5288aaeb95ece90f3bd8aa
SHA1f1589839bb2bd84ed4cd362fd07594209ac568e9
SHA25624ed4a49abc57eee335ae4e16420c6eda5611c5262c2faa8dab865b6fa8d3087
SHA512928fbaaa354d70994fe55690928b30e57786212e4e3509b5fff91b55fc2cfc8316ef12272e9163bb2bef0d00797b24201def3203967e9eaf0b68bae8240bd1ef
-
C:\Program Files\Java\jdk-1.8\bin\jdb.exeFilesize
581KB
MD5d6e9de19bbf4ce888b43c849ff2f25a4
SHA1ed6ebc9e6c350fab3541acece53012a7a0809c7a
SHA2562cbef5a19078e5bd16801139c31f8d63cd289035dfcd4cab9670f5c9e842abc5
SHA512a6dcb9f5980fcf729538f8c2a4e3f6842d153588d9777b1229bb75de906064cd029cba101668c500f74ba58ff9b35557ec6cda171a2788cd2d51d540e7734441
-
C:\Program Files\Java\jdk-1.8\bin\jdeps.exeFilesize
581KB
MD5f4a3f1ac7231222e2a00c0d5675882c8
SHA17068c764e7b65b405570c1e5e2e426514c5638bb
SHA256ce484cb01ac15a75a3e7618bd426960ae45a5948b55b9c6424bd12b6292ec21d
SHA512ceb42cbc00ac68950af8a55135ab1d2f3e4aa5eed1e90dcb02debdaceeb5c72ef604d7ee631d0242d7bec399d1147f1eb928ac0c64a09d9530ccc59bb406b0cd
-
C:\Program Files\Java\jdk-1.8\bin\jhat.exeFilesize
581KB
MD5b302d8103ffd7594dde210770c83e5ad
SHA1aaeb275a9a38063a623f9595f4420d5576d3fad3
SHA25677599dcc88f6fcfd4cdeec3098bfe740270e8612e99cc479a0babedf794eaafe
SHA512dfab18995c06f62c98c77397c9e4d6ac7eafe61f7432641fdfc212091626bc4fef9c515ac1ec3543a08e74af87c77d354ca126ca89a4ff0bb137c404e67ba66d
-
C:\Program Files\dotnet\dotnet.exeFilesize
701KB
MD5b4e53282e454b4f498e64b8c2bfd02a0
SHA1d50a90a8892752fbc681c52aabbd03bb69ff2cf6
SHA256f1029f03ed5be40ac42c0e36cd80b2f8276dd6a1add4bd816c0d23876f3bee81
SHA51260c248b4898e3f474e759fba77ede976d1e17aca815906ab468813684cae3a8b7923aa7578501a012e46e3a0a69660285a89a814af2ef0016d6e2c28f9a0c390
-
C:\Windows\SysWOW64\perfhost.exeFilesize
588KB
MD5e3c56e3c3cdae9f24e087585969a7a8d
SHA1a90ade81f232d8dfc7f47bbdcb86ba07721a01ac
SHA2562aebe15a2fd63587abc8412e4c3ca87ce13258ad0eb252d317cdaa9243a9dae0
SHA5126eda19fc6887be8d3ea027e8aa943bff3dabd52ef31e1c1100f06536c9c8a2ea4d1e91c13dd47728df04c7c84a049d1b65167d2353e4d2766c3fc715a7b042fb
-
C:\Windows\System32\AgentService.exeFilesize
1.7MB
MD5dbe2ac9f2f8cbe3dc942c114a0b253c2
SHA1f0d82880e45845ebf47d9221c8bb238245370e60
SHA256a6a6b540e8ff75d22d0346b0eb3deb696f0c5c2c1553912121b41640f3ce8ece
SHA51251e9269c4c24252a11ab4ea7d420830785b64701512c3bd78ba83c242f8d37ef6dd4c74f481a3a09cb67d7d15c54c613a8575ec8873827200955fc968e18a031
-
C:\Windows\System32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exeFilesize
659KB
MD55d6d380c0348080eec5ccdb99d7ab054
SHA1ee0f10c6e99cd9ee927941325df6d8c13484b5af
SHA256a1a07d153a5a4c1a4f0942ea2b242e930e63c167b1bb74d92aabb323797796a8
SHA512b07083584de72e9ab2e5218278fdee04d78db3a5f433f47ab78cbd904de189cdab258c71746c6e46c186f789e36c71ec89caed098f7cbacfed9d5947d179b50c
-
C:\Windows\System32\FXSSVC.exeFilesize
1.2MB
MD547eb50436752c18b8a401fd198f2563c
SHA171ae724c1f3038c37547a0efee01a218a4e176da
SHA2569ee9ddc4c27345131ec7c52d3e694d696d79aa3380d9d5edad1b6e5d960efacb
SHA5126d7f3b014da469655f188214c5775ea6e78a90be05e6092a2d6db0ec586ea60d2813b63c921ab97b5268ace6b092c529ce9afcea473af377d3cbc1823544f571
-
C:\Windows\System32\Locator.exeFilesize
578KB
MD505793fec33c05681ab8ca612fa92e09d
SHA18d478d5977e28f928b6c83aca6a7e22648aaf032
SHA25658a41a1aee5ebc7b6a9f4d1e895f5f4cf48b34396fd7330dd6a777e9c8d984aa
SHA512401cf0478f163c5adf5e17e7ffd9d4cd5517934ce673e83ec8f4ad720acb7811c109a0b7bc1249403bcabb7cd678852e29696e990f2c890a4ad8de868ab11709
-
C:\Windows\System32\OpenSSH\ssh-agent.exeFilesize
940KB
MD5a46515d37c52f28d00eeb68bb294b3b2
SHA1b90ad421f2a38825fc90a751695667d247edb365
SHA256caba0bc5bd96ecf49c65397cb95174cb31e039cc0a9008ee7a036b173f52b974
SHA512eeab10f65340e5d95c4d78c19c6db04f41c6e6dbd8af16f910525162e34f3f5fa2b2641ee3f3d03053a8768b0f5cb7a550fcaf623f53e9497d667191d261fcdb
-
C:\Windows\System32\PerceptionSimulation\PerceptionSimulationService.exeFilesize
671KB
MD516fff18eb4ea72feae87fa1dd3c07147
SHA12049c34a96eaa769594a7a3d614fac76e036ecac
SHA256be24f7124c37ff03a09b5e86ac5b90ac4c25c6e597c037776a1f74f67b0c262d
SHA512d861cf386ee5e0e7777d29934e0ab01345f01433881d41e1afbbde738cbd45762dd279dbe921c8e1ec2a03ce2486127bba2a386cd9fbd1d15adf690622e6643f
-
C:\Windows\System32\SearchIndexer.exeFilesize
1.4MB
MD5a871f46c50cbc27764d96b91013fb472
SHA12577bf819f9842719e00aefa2ad564a0674508e5
SHA2560666a448661dd92ec93a85430fbf92dabecd82c43a51bcd1fb0672e6043fa3d3
SHA512c502122c4a13b909ada597fc8e2f5e2f65b43acd67e8cbb95527329e648cff5c40e735727fda454b6fb93cb3d5c5bff9a373497587d806ac4a8951df91ab24ac
-
C:\Windows\System32\SensorDataService.exeFilesize
1.8MB
MD5f0c3aa3ac61bafc55f1b2571ec723774
SHA189bb56b9105ff08101feddf5ef25a07fa4d919c6
SHA256e1e2c1a1e045f1b62ef6dc8723ac325e485e3c760439b9ed797c90f18cb9763a
SHA512e1cf5004cd6c28b4eb50fc687070ac830ad7274af6549fed2c5a912c7383456b8368d45b41e0787c49bdf1e916cb1e5c3aa478c7199f6ed3e6c39a3715e11bdb
-
C:\Windows\System32\Spectrum.exeFilesize
1.4MB
MD511edc615f74f3d9aea7312e5de626962
SHA12f7a60fe26a4e175a4d775e5c1d5132675f29c58
SHA25671acfe2cbe01fd2fc8c99d5af5d745b398f2d25ad859cb26b31aa56bdcbae6e6
SHA512cb79b72800324a50d0e7477d7ba806549a858295cf13105eefb29fdd93536503d66fa54042c87d231d605a7e989923e4c4f93471ff34a24c785e9a2e4f6d03a9
-
C:\Windows\System32\TieringEngineService.exeFilesize
885KB
MD54e0c37df443590b424c80624ce1544a0
SHA12be9d7445998372ce0ed3bd55582876dba4ee91f
SHA256c9f83cee74242be98d08e494609b0838630f890d10ae86e80ca49f08e5d41f5d
SHA5127ab4d8b55fee6ca1d390c13363e4b806a609d771bfb0573114a5c0968e16e60c629342fc44b9e8f8897f23ce48a191caab2bc5d44de6b2ef769e0ec5f970e6fd
-
C:\Windows\System32\VSSVC.exeFilesize
2.0MB
MD5159f3fa5f771d465f754fbe4a71e4d75
SHA19443607921908c509e78cbc0f17cb44117391c8e
SHA25615eae60bf8e7a0203d5ba09d4cb8064bd0f4abe44e3072bbabf4002171b5a71d
SHA512beb36072b11e3a1a1215a93780c4452a273f13f0fc786e04e6161f22b700fa326023d041a00996ee8d3b5de682e5eedb87e296c50f436a1c94a38e09cebb9995
-
C:\Windows\System32\alg.exeFilesize
661KB
MD5099f9cae3cc21ad7a4280af546be4f38
SHA19fd14282f528bb9e158e7ca1dc4d0cd3d5dc90c2
SHA25613805b42e4d6bdde1c395a0e4eb359703ce17aa0070dee6277964fcf60bdee7a
SHA512e5c529d8435c4003c711be0df6df97f390842d1bf2b3673608b9de481ec47985cf82c401054b59e98f5c531e19fb0306eca62829c646e2922063ed12ab5c3cce
-
C:\Windows\System32\msdtc.exeFilesize
712KB
MD52d6f8dbf9f815b219b196b23ae5362c8
SHA19b00724c45d7767dead84b6b2e7d057f371b5247
SHA25655445912a91c4185ef91624bf9490815de888d97b513937f6ef277d488843b11
SHA512f2f425ec9e150bdf897d824d508eac1492526216996777a577a027ff6290d2fd791af0ab91240a09155dd1f1393839dd779c5abf526054d4000cb6d77bc41516
-
C:\Windows\System32\snmptrap.exeFilesize
584KB
MD502fa531c19e44b15106dafe27439b515
SHA1bf1c3f8c22e27b42ba8df4dcf5bed922122615e3
SHA256bed44c61df1a9dd70030f0589136528eff8efb12de6fa0a09cf5136e247edf10
SHA5129b98a4d26c0f63d6a9f35e07cd88aae537f17382afc22ddf5a996203c435a67aa8f343792062ef1d97479e1ea8c584d089d966fe4e0fe7ad5da66bc2d861053b
-
C:\Windows\System32\vds.exeFilesize
1.3MB
MD57057080fcafb3f4ab990051ace041563
SHA11d8f19dfd1f591b7bc6910343a096fe7795cad36
SHA256d93d6620d023878568229690a7cdaf7ccefaddb2604437531b7fba84df215386
SHA512b9952c6aa45ad879b7a32d7af5386de46f35df2194c297aa0bc3345ebfb4aa22e59c1247ab2fd710faca6fa527e130c348da2d0f9e3d13954be26c590a8f3a00
-
C:\Windows\System32\wbem\WmiApSrv.exeFilesize
772KB
MD5ab8628e6746a27314c8c9208bbb2b4d6
SHA1e604b577959855aec91e71646f5b1894f9fe042f
SHA256dd9396dc9cfb27a744bcfbde4e66ae5b8911c7ea0e0fd3a060329a93de2847c4
SHA512e8be1a5a38799f257e581e1257c54ae3958bd0b6d288f7aa861dd962dae5c0b545de7dfc64ff4baa05a0de81fceedb8c150453421c14f7edb0827e311ad09217
-
C:\Windows\System32\wbengine.exeFilesize
2.1MB
MD5c3331194eb7ea5f66b90d764e8ce798a
SHA1fcc0a73734ab3d7dc13676971affb9b060466bfb
SHA256ba855083ef7b50085f5e43d213d39dcb7879906e80fa75c2b8f48a96f6ea234a
SHA512e077ad2b0e0fb0dfa0a1a6329508a09cbec662b6d6d9690302b91677e7eed8c5533206b80857fb5cfeb4870764487b418196b10764ad1d47119891eba4c68704
-
C:\Windows\system32\AppVClient.exeFilesize
1.3MB
MD56d3c70eacf98805600968eb53b6306fd
SHA12b1564ef2e15cd0ae1b25a9d6324f5e1a47b23f2
SHA2561b3d5c59be1f1fddadd5b36d3dd6b1ca227a799f6eb538efbeb6df12f5bcde67
SHA512e1b6b8f0a9607d97b36955952d323cbb6e808f8c778ccd67e64eef8aa2fb7ee5550d1b2d472c8e5d3d7b255d29e54b2aa5ce8cec1f04e8bfbd27acd9076d927f
-
memory/1252-242-0x0000000140000000-0x00000001400A9000-memory.dmpFilesize
676KB
-
memory/1252-30-0x0000000140000000-0x00000001400A9000-memory.dmpFilesize
676KB
-
memory/1252-19-0x00000000006A0000-0x0000000000700000-memory.dmpFilesize
384KB
-
memory/1252-31-0x00000000006A0000-0x0000000000700000-memory.dmpFilesize
384KB
-
memory/1688-244-0x0000000140000000-0x000000014022B000-memory.dmpFilesize
2.2MB
-
memory/1688-47-0x00000000001A0000-0x0000000000200000-memory.dmpFilesize
384KB
-
memory/1688-56-0x0000000140000000-0x000000014022B000-memory.dmpFilesize
2.2MB
-
memory/1688-57-0x00000000001A0000-0x0000000000200000-memory.dmpFilesize
384KB
-
memory/1800-0-0x0000000000400000-0x0000000000554000-memory.dmpFilesize
1.3MB
-
memory/1800-1-0x0000000002280000-0x00000000022E7000-memory.dmpFilesize
412KB
-
memory/1800-6-0x0000000002280000-0x00000000022E7000-memory.dmpFilesize
412KB
-
memory/1800-29-0x0000000000400000-0x0000000000554000-memory.dmpFilesize
1.3MB
-
memory/1952-460-0x0000000140000000-0x00000001401FC000-memory.dmpFilesize
2.0MB
-
memory/1952-330-0x0000000140000000-0x00000001401FC000-memory.dmpFilesize
2.0MB
-
memory/2308-264-0x0000000000BF0000-0x0000000000C50000-memory.dmpFilesize
384KB
-
memory/2308-270-0x0000000000BF0000-0x0000000000C50000-memory.dmpFilesize
384KB
-
memory/2308-263-0x0000000140000000-0x00000001400AB000-memory.dmpFilesize
684KB
-
memory/2308-329-0x0000000140000000-0x00000001400AB000-memory.dmpFilesize
684KB
-
memory/2536-276-0x00000000004A0000-0x0000000000507000-memory.dmpFilesize
412KB
-
memory/2536-275-0x0000000000400000-0x0000000000497000-memory.dmpFilesize
604KB
-
memory/2536-333-0x0000000000400000-0x0000000000497000-memory.dmpFilesize
604KB
-
memory/2756-241-0x0000000140000000-0x00000001400AA000-memory.dmpFilesize
680KB
-
memory/2756-11-0x0000000140000000-0x00000001400AA000-memory.dmpFilesize
680KB
-
memory/2900-82-0x0000000140000000-0x00000001400CF000-memory.dmpFilesize
828KB
-
memory/2900-80-0x0000000000C00000-0x0000000000C60000-memory.dmpFilesize
384KB
-
memory/2900-65-0x0000000140000000-0x00000001400CF000-memory.dmpFilesize
828KB
-
memory/2900-66-0x0000000000C00000-0x0000000000C60000-memory.dmpFilesize
384KB
-
memory/2900-59-0x0000000000C00000-0x0000000000C60000-memory.dmpFilesize
384KB
-
memory/2916-334-0x0000000140000000-0x0000000140216000-memory.dmpFilesize
2.1MB
-
memory/2916-461-0x0000000140000000-0x0000000140216000-memory.dmpFilesize
2.1MB
-
memory/3052-459-0x0000000140000000-0x0000000140147000-memory.dmpFilesize
1.3MB
-
memory/3052-326-0x0000000140000000-0x0000000140147000-memory.dmpFilesize
1.3MB
-
memory/3312-318-0x0000000140000000-0x00000001400E2000-memory.dmpFilesize
904KB
-
memory/3312-456-0x0000000140000000-0x00000001400E2000-memory.dmpFilesize
904KB
-
memory/3624-323-0x0000000140000000-0x00000001401C0000-memory.dmpFilesize
1.8MB
-
memory/3624-321-0x0000000140000000-0x00000001401C0000-memory.dmpFilesize
1.8MB
-
memory/3748-307-0x0000000140000000-0x0000000140102000-memory.dmpFilesize
1.0MB
-
memory/3748-455-0x0000000140000000-0x0000000140102000-memory.dmpFilesize
1.0MB
-
memory/3756-285-0x0000000140000000-0x0000000140095000-memory.dmpFilesize
596KB
-
memory/3756-337-0x0000000140000000-0x0000000140095000-memory.dmpFilesize
596KB
-
memory/3760-290-0x0000000140000000-0x00000001401D7000-memory.dmpFilesize
1.8MB
-
memory/3760-452-0x0000000140000000-0x00000001401D7000-memory.dmpFilesize
1.8MB
-
memory/3760-342-0x0000000140000000-0x00000001401D7000-memory.dmpFilesize
1.8MB
-
memory/3856-338-0x0000000140000000-0x00000001400C6000-memory.dmpFilesize
792KB
-
memory/3856-462-0x0000000140000000-0x00000001400C6000-memory.dmpFilesize
792KB
-
memory/4144-325-0x0000000140000000-0x00000001400B9000-memory.dmpFilesize
740KB
-
memory/4144-257-0x0000000140000000-0x00000001400B9000-memory.dmpFilesize
740KB
-
memory/4308-343-0x0000000140000000-0x0000000140179000-memory.dmpFilesize
1.5MB
-
memory/4308-463-0x0000000140000000-0x0000000140179000-memory.dmpFilesize
1.5MB
-
memory/4320-247-0x0000000140000000-0x00000001400CF000-memory.dmpFilesize
828KB
-
memory/4320-70-0x00000000006F0000-0x0000000000750000-memory.dmpFilesize
384KB
-
memory/4320-76-0x00000000006F0000-0x0000000000750000-memory.dmpFilesize
384KB
-
memory/4320-79-0x0000000140000000-0x00000001400CF000-memory.dmpFilesize
828KB
-
memory/4400-295-0x0000000140000000-0x0000000140169000-memory.dmpFilesize
1.4MB
-
memory/4400-451-0x0000000140000000-0x0000000140169000-memory.dmpFilesize
1.4MB
-
memory/4544-434-0x0000000140000000-0x0000000140096000-memory.dmpFilesize
600KB
-
memory/4544-292-0x0000000140000000-0x0000000140096000-memory.dmpFilesize
600KB
-
memory/4864-36-0x0000000000710000-0x0000000000770000-memory.dmpFilesize
384KB
-
memory/4864-44-0x0000000140000000-0x000000014024B000-memory.dmpFilesize
2.3MB
-
memory/4864-42-0x0000000000710000-0x0000000000770000-memory.dmpFilesize
384KB
-
memory/4864-243-0x0000000140000000-0x000000014024B000-memory.dmpFilesize
2.3MB
-
memory/5064-252-0x0000000140000000-0x0000000140135000-memory.dmpFilesize
1.2MB
-
memory/5064-254-0x0000000140000000-0x0000000140135000-memory.dmpFilesize
1.2MB