Analysis

  • max time kernel
    142s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    13-08-2024 20:15

General

  • Target

    445200757953e4b85cd025c46bc30d21784bc158854be7ac64bbd7dcf97f1f7d.exe

  • Size

    1.2MB

  • MD5

    94000a160f3ccd7e2e0e607cc8b58c66

  • SHA1

    fbcb18fdfd5f61bb7fa654f7756884d02e75bc85

  • SHA256

    445200757953e4b85cd025c46bc30d21784bc158854be7ac64bbd7dcf97f1f7d

  • SHA512

    689c9b664db7606da041c47df5181b7905ec7d822e31b0b9688301700512055ba28f2a12c7bc4afc23d375239b47c85ed19e91f30ae51385e351cf9b9d3322b7

  • SSDEEP

    12288:P2Z3FN92mrRUDkDTYNmN3Rus3SAFYq8Noz9qirzrEX1fsd7TOoOTd:+Z1N3RUDHNmdPCAaq8Nozgi/rE0TOj

Malware Config

Signatures

  • Executes dropped EXE 64 IoCs
  • Loads dropped DLL 46 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in System32 directory 25 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 29 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of SetWindowsHookEx 20 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\445200757953e4b85cd025c46bc30d21784bc158854be7ac64bbd7dcf97f1f7d.exe
    "C:\Users\Admin\AppData\Local\Temp\445200757953e4b85cd025c46bc30d21784bc158854be7ac64bbd7dcf97f1f7d.exe"
    1⤵
    • Drops file in System32 directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    PID:2292
  • C:\Windows\System32\alg.exe
    C:\Windows\System32\alg.exe
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Suspicious use of AdjustPrivilegeToken
    PID:2904
  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe
    C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2784
  • C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe
    C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe
    1⤵
    • Executes dropped EXE
    • System Location Discovery: System Language Discovery
    PID:2684
  • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe
    C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe
    1⤵
    • Executes dropped EXE
    PID:2632
  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
    C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
    1⤵
    • Executes dropped EXE
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1128
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1e8 -InterruptEvent 1d4 -NGENProcess 1d8 -Pipe 1e4 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2696
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 258 -InterruptEvent 1d4 -NGENProcess 1d8 -Pipe 1e8 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2572
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1d4 -InterruptEvent 248 -NGENProcess 24c -Pipe 244 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2632
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 254 -InterruptEvent 25c -NGENProcess 258 -Pipe 248 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1708
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 25c -InterruptEvent 264 -NGENProcess 24c -Pipe 240 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1104
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 250 -InterruptEvent 254 -NGENProcess 268 -Pipe 25c -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2284
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1d4 -InterruptEvent 1d8 -NGENProcess 26c -Pipe 250 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2576
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1d8 -InterruptEvent 23c -NGENProcess 268 -Pipe 258 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2916
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 23c -InterruptEvent 274 -NGENProcess 254 -Pipe 270 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2056
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 274 -InterruptEvent 27c -NGENProcess 264 -Pipe 278 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:396
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 27c -InterruptEvent 284 -NGENProcess 1f0 -Pipe 280 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1168
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 284 -InterruptEvent 23c -NGENProcess 26c -Pipe 1d8 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1288
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1d4 -InterruptEvent 23c -NGENProcess 284 -Pipe 27c -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1572
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 23c -InterruptEvent 264 -NGENProcess 26c -Pipe 288 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2328
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 264 -InterruptEvent 254 -NGENProcess 24c -Pipe 260 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2788
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 254 -InterruptEvent 28c -NGENProcess 284 -Pipe 268 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2648
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 28c -InterruptEvent 290 -NGENProcess 274 -Pipe 1f0 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2812
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 290 -InterruptEvent 274 -NGENProcess 264 -Pipe 298 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2020
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 274 -InterruptEvent 264 -NGENProcess 24c -Pipe 29c -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1624
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 264 -InterruptEvent 23c -NGENProcess 1d4 -Pipe 26c -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1100
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 23c -InterruptEvent 2a0 -NGENProcess 290 -Pipe 284 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1144
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2a0 -InterruptEvent 2a4 -NGENProcess 24c -Pipe 294 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2396
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2a8 -InterruptEvent 23c -NGENProcess 2ac -Pipe 2a0 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1764
  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
    C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
    1⤵
    • Executes dropped EXE
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:1080
    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 1d4 -InterruptEvent 1c0 -NGENProcess 1c4 -Pipe 1d0 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2736
    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 1d4 -InterruptEvent 244 -NGENProcess 22c -Pipe 240 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2856
    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 1d4 -InterruptEvent 208 -NGENProcess 1b0 -Pipe 244 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:1104
    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 208 -InterruptEvent 260 -NGENProcess 1cc -Pipe 25c -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2640
    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 260 -InterruptEvent 264 -NGENProcess 250 -Pipe 258 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2184
    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 264 -InterruptEvent 268 -NGENProcess 1b0 -Pipe 24c -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:1756
    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 268 -InterruptEvent 26c -NGENProcess 1cc -Pipe 1bc -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Windows directory
      PID:2836
    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 26c -InterruptEvent 1b0 -NGENProcess 1cc -Pipe 260 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:896
    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 1b0 -InterruptEvent 278 -NGENProcess 270 -Pipe 274 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Windows directory
      PID:2072
    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 278 -InterruptEvent 270 -NGENProcess 26c -Pipe 1d4 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:1684
    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 270 -InterruptEvent 280 -NGENProcess 1cc -Pipe 250 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Windows directory
      PID:2828
    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 280 -InterruptEvent 1cc -NGENProcess 278 -Pipe 27c -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:952
    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 1cc -InterruptEvent 288 -NGENProcess 26c -Pipe 1b0 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Windows directory
      PID:1496
    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 288 -InterruptEvent 26c -NGENProcess 280 -Pipe 284 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:584
    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 26c -InterruptEvent 290 -NGENProcess 278 -Pipe 270 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Windows directory
      PID:1056
    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 290 -InterruptEvent 278 -NGENProcess 288 -Pipe 28c -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2968
    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 278 -InterruptEvent 298 -NGENProcess 280 -Pipe 1cc -Comment "NGen Worker Process"
      2⤵
      • Loads dropped DLL
      • Drops file in Windows directory
      PID:2212
    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 298 -InterruptEvent 280 -NGENProcess 290 -Pipe 294 -Comment "NGen Worker Process"
      2⤵
        PID:2260
      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
        C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 280 -InterruptEvent 2a0 -NGENProcess 288 -Pipe 26c -Comment "NGen Worker Process"
        2⤵
        • Loads dropped DLL
        • Drops file in Windows directory
        PID:2944
      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
        C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2a0 -InterruptEvent 288 -NGENProcess 298 -Pipe 29c -Comment "NGen Worker Process"
        2⤵
          PID:1264
        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
          C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 288 -InterruptEvent 2a8 -NGENProcess 290 -Pipe 278 -Comment "NGen Worker Process"
          2⤵
          • Loads dropped DLL
          • Drops file in Windows directory
          PID:2624
        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
          C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2a8 -InterruptEvent 290 -NGENProcess 2a0 -Pipe 2a4 -Comment "NGen Worker Process"
          2⤵
            PID:628
          • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
            C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 290 -InterruptEvent 2b0 -NGENProcess 298 -Pipe 280 -Comment "NGen Worker Process"
            2⤵
            • Loads dropped DLL
            • Drops file in Windows directory
            PID:2836
          • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
            C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2b0 -InterruptEvent 298 -NGENProcess 2a8 -Pipe 2ac -Comment "NGen Worker Process"
            2⤵
              PID:1192
            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
              C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 298 -InterruptEvent 2b8 -NGENProcess 2a0 -Pipe 288 -Comment "NGen Worker Process"
              2⤵
              • Loads dropped DLL
              • Drops file in Windows directory
              PID:1376
            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
              C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2b8 -InterruptEvent 2a0 -NGENProcess 2b0 -Pipe 2b4 -Comment "NGen Worker Process"
              2⤵
                PID:3068
              • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
                C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2a0 -InterruptEvent 2c0 -NGENProcess 2a8 -Pipe 290 -Comment "NGen Worker Process"
                2⤵
                • Loads dropped DLL
                • Drops file in Windows directory
                PID:2336
              • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
                C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2c0 -InterruptEvent 2a8 -NGENProcess 2b8 -Pipe 2bc -Comment "NGen Worker Process"
                2⤵
                  PID:2988
                • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
                  C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2c0 -InterruptEvent 10c -NGENProcess 254 -Pipe 2b0 -Comment "NGen Worker Process"
                  2⤵
                  • Loads dropped DLL
                  • Drops file in Windows directory
                  PID:2376
                • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
                  C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 10c -InterruptEvent 254 -NGENProcess 2c8 -Pipe 2a8 -Comment "NGen Worker Process"
                  2⤵
                    PID:2024
                  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
                    C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 254 -InterruptEvent 264 -NGENProcess 298 -Pipe 2b8 -Comment "NGen Worker Process"
                    2⤵
                    • Loads dropped DLL
                    • Drops file in Windows directory
                    PID:2944
                  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
                    C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 264 -InterruptEvent 298 -NGENProcess 10c -Pipe 208 -Comment "NGen Worker Process"
                    2⤵
                      PID:2936
                    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
                      C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 298 -InterruptEvent 2d0 -NGENProcess 2c8 -Pipe 2c0 -Comment "NGen Worker Process"
                      2⤵
                      • Loads dropped DLL
                      • Drops file in Windows directory
                      PID:2604
                    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
                      C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2d0 -InterruptEvent 2c8 -NGENProcess 264 -Pipe 2cc -Comment "NGen Worker Process"
                      2⤵
                        PID:2248
                      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
                        C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2c8 -InterruptEvent 2d8 -NGENProcess 10c -Pipe 254 -Comment "NGen Worker Process"
                        2⤵
                        • Loads dropped DLL
                        • Drops file in Windows directory
                        PID:1764
                      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
                        C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2d8 -InterruptEvent 10c -NGENProcess 2d0 -Pipe 2d4 -Comment "NGen Worker Process"
                        2⤵
                          PID:2968
                        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
                          C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 10c -InterruptEvent 2e0 -NGENProcess 264 -Pipe 298 -Comment "NGen Worker Process"
                          2⤵
                          • Loads dropped DLL
                          • Drops file in Windows directory
                          PID:1684
                        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
                          C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2e0 -InterruptEvent 264 -NGENProcess 2d8 -Pipe 2dc -Comment "NGen Worker Process"
                          2⤵
                          • Drops file in System32 directory
                          • Modifies data under HKEY_USERS
                          PID:1376
                        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
                          C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 264 -InterruptEvent 2e8 -NGENProcess 2d0 -Pipe 2c8 -Comment "NGen Worker Process"
                          2⤵
                            PID:2952
                          • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
                            C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2e8 -InterruptEvent 2ec -NGENProcess 2e4 -Pipe 108 -Comment "NGen Worker Process"
                            2⤵
                              PID:2060
                            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
                              C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2ec -InterruptEvent 2f8 -NGENProcess 2d8 -Pipe 2f4 -Comment "NGen Worker Process"
                              2⤵
                                PID:2528
                              • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
                                C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2f8 -InterruptEvent 2fc -NGENProcess 2a0 -Pipe 2f0 -Comment "NGen Worker Process"
                                2⤵
                                  PID:2548
                                • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
                                  C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2fc -InterruptEvent 300 -NGENProcess 2e4 -Pipe 2e0 -Comment "NGen Worker Process"
                                  2⤵
                                    PID:2636
                                  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
                                    C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 300 -InterruptEvent 2e4 -NGENProcess 2f8 -Pipe 2d8 -Comment "NGen Worker Process"
                                    2⤵
                                      PID:1276
                                    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
                                      C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2e4 -InterruptEvent 2f8 -NGENProcess 264 -Pipe 2a0 -Comment "NGen Worker Process"
                                      2⤵
                                        PID:1724
                                      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
                                        C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2f8 -InterruptEvent 30c -NGENProcess 304 -Pipe 2ec -Comment "NGen Worker Process"
                                        2⤵
                                          PID:2376
                                        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
                                          C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 30c -InterruptEvent 304 -NGENProcess 2e4 -Pipe 308 -Comment "NGen Worker Process"
                                          2⤵
                                            PID:1732
                                          • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
                                            C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 304 -InterruptEvent 314 -NGENProcess 264 -Pipe 300 -Comment "NGen Worker Process"
                                            2⤵
                                              PID:1576
                                            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
                                              C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 314 -InterruptEvent 318 -NGENProcess 310 -Pipe 2e8 -Comment "NGen Worker Process"
                                              2⤵
                                                PID:968
                                              • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
                                                C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 318 -InterruptEvent 31c -NGENProcess 2e4 -Pipe 2f8 -Comment "NGen Worker Process"
                                                2⤵
                                                  PID:2636
                                                • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
                                                  C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 31c -InterruptEvent 320 -NGENProcess 264 -Pipe 2fc -Comment "NGen Worker Process"
                                                  2⤵
                                                    PID:2264
                                                  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
                                                    C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 320 -InterruptEvent 324 -NGENProcess 310 -Pipe 30c -Comment "NGen Worker Process"
                                                    2⤵
                                                      PID:1064
                                                    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
                                                      C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 324 -InterruptEvent 328 -NGENProcess 2e4 -Pipe 304 -Comment "NGen Worker Process"
                                                      2⤵
                                                        PID:2444
                                                      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
                                                        C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 328 -InterruptEvent 32c -NGENProcess 264 -Pipe 314 -Comment "NGen Worker Process"
                                                        2⤵
                                                          PID:2688
                                                      • C:\Windows\ehome\ehRecvr.exe
                                                        C:\Windows\ehome\ehRecvr.exe
                                                        1⤵
                                                        • Executes dropped EXE
                                                        PID:1088
                                                      • C:\Windows\ehome\ehsched.exe
                                                        C:\Windows\ehome\ehsched.exe
                                                        1⤵
                                                        • Executes dropped EXE
                                                        PID:1192
                                                      • C:\Windows\eHome\EhTray.exe
                                                        "C:\Windows\eHome\EhTray.exe" /nav:-2
                                                        1⤵
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        • Suspicious use of FindShellTrayWindow
                                                        • Suspicious use of SendNotifyMessage
                                                        PID:1820
                                                      • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                                                        "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                                                        1⤵
                                                        • Executes dropped EXE
                                                        PID:2700
                                                      • C:\Windows\system32\IEEtwCollector.exe
                                                        C:\Windows\system32\IEEtwCollector.exe /V
                                                        1⤵
                                                        • Executes dropped EXE
                                                        PID:1536
                                                      • C:\Windows\ehome\ehRec.exe
                                                        C:\Windows\ehome\ehRec.exe -Embedding
                                                        1⤵
                                                        • Modifies data under HKEY_USERS
                                                        • Suspicious behavior: EnumeratesProcesses
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:1712
                                                      • C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE
                                                        "C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE" /auditservice
                                                        1⤵
                                                        • Executes dropped EXE
                                                        • Drops file in System32 directory
                                                        • System Location Discovery: System Language Discovery
                                                        • Modifies data under HKEY_USERS
                                                        PID:1156
                                                      • C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe
                                                        "C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"
                                                        1⤵
                                                        • Executes dropped EXE
                                                        PID:2284
                                                      • C:\Program Files (x86)\Common Files\Microsoft Shared\Source Engine\OSE.EXE
                                                        "C:\Program Files (x86)\Common Files\Microsoft Shared\Source Engine\OSE.EXE"
                                                        1⤵
                                                        • Executes dropped EXE
                                                        • System Location Discovery: System Language Discovery
                                                        PID:2596
                                                      • C:\Windows\System32\msdtc.exe
                                                        C:\Windows\System32\msdtc.exe
                                                        1⤵
                                                        • Executes dropped EXE
                                                        • Drops file in System32 directory
                                                        • Drops file in Windows directory
                                                        PID:3016
                                                      • C:\Windows\system32\msiexec.exe
                                                        C:\Windows\system32\msiexec.exe /V
                                                        1⤵
                                                        • Executes dropped EXE
                                                        • Loads dropped DLL
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:3044
                                                      • C:\Windows\SysWow64\perfhost.exe
                                                        C:\Windows\SysWow64\perfhost.exe
                                                        1⤵
                                                        • Executes dropped EXE
                                                        • System Location Discovery: System Language Discovery
                                                        PID:1168
                                                      • C:\Windows\system32\locator.exe
                                                        C:\Windows\system32\locator.exe
                                                        1⤵
                                                        • Executes dropped EXE
                                                        PID:924
                                                      • C:\Windows\System32\snmptrap.exe
                                                        C:\Windows\System32\snmptrap.exe
                                                        1⤵
                                                        • Executes dropped EXE
                                                        PID:2984
                                                      • C:\Windows\System32\vds.exe
                                                        C:\Windows\System32\vds.exe
                                                        1⤵
                                                        • Executes dropped EXE
                                                        PID:844
                                                      • C:\Windows\system32\vssvc.exe
                                                        C:\Windows\system32\vssvc.exe
                                                        1⤵
                                                        • Executes dropped EXE
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:2284
                                                      • C:\Windows\system32\wbengine.exe
                                                        "C:\Windows\system32\wbengine.exe"
                                                        1⤵
                                                        • Executes dropped EXE
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:2236
                                                      • C:\Windows\system32\wbem\WmiApSrv.exe
                                                        C:\Windows\system32\wbem\WmiApSrv.exe
                                                        1⤵
                                                        • Executes dropped EXE
                                                        PID:2776
                                                      • C:\Program Files\Windows Media Player\wmpnetwk.exe
                                                        "C:\Program Files\Windows Media Player\wmpnetwk.exe"
                                                        1⤵
                                                        • Executes dropped EXE
                                                        • Modifies data under HKEY_USERS
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:2956
                                                      • C:\Windows\system32\SearchIndexer.exe
                                                        C:\Windows\system32\SearchIndexer.exe /Embedding
                                                        1⤵
                                                        • Executes dropped EXE
                                                        • Modifies data under HKEY_USERS
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:2916
                                                        • C:\Windows\system32\SearchProtocolHost.exe
                                                          "C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe_S-1-5-21-2212144002-1172735686-1556890956-10001_ Global\UsGthrCtrlFltPipeMssGthrPipe_S-1-5-21-2212144002-1172735686-1556890956-10001 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon" "1"
                                                          2⤵
                                                          • Suspicious use of SetWindowsHookEx
                                                          PID:3048
                                                        • C:\Windows\system32\SearchFilterHost.exe
                                                          "C:\Windows\system32\SearchFilterHost.exe" 0 588 592 600 65536 596
                                                          2⤵
                                                          • Modifies data under HKEY_USERS
                                                          PID:1368
                                                        • C:\Windows\system32\SearchProtocolHost.exe
                                                          "C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe2_ Global\UsGthrCtrlFltPipeMssGthrPipe2 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon"
                                                          2⤵
                                                          • Drops file in System32 directory
                                                          • Modifies data under HKEY_USERS
                                                          • Suspicious use of SetWindowsHookEx
                                                          PID:600

                                                      Network

                                                      MITRE ATT&CK Enterprise v15

                                                      Replay Monitor

                                                      Loading Replay Monitor...

                                                      Downloads

                                                      • C:\Program Files (x86)\Common Files\microsoft shared\Source Engine\OSE.EXE

                                                        Filesize

                                                        1.3MB

                                                        MD5

                                                        a87125bd0b4e3a45a3616cc265dc1b2d

                                                        SHA1

                                                        2b77daae52c678ebfb99888859b0c6fd3c45cc59

                                                        SHA256

                                                        94dbf603d92874da4b2be3e957c7f82843ca0347357b1a6b77c81b6d3e542a70

                                                        SHA512

                                                        967e166c40c901d13eff5985b7cf94039375075ddde293fb82a9a51e85892235f57e0478f926a972017eff1a1ae4f8e3a26da23dc3fa33b718bbe0ffea182a2d

                                                      • C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE

                                                        Filesize

                                                        30.1MB

                                                        MD5

                                                        011892d8cc8f6f96e6eba44a711c974f

                                                        SHA1

                                                        2a631cea081ddbd48643982cb5c0b14c9bce3e70

                                                        SHA256

                                                        855eed8ba1a657928507bdba356f4cbbff2d6d0b4e12d69eb9124c3cc231c809

                                                        SHA512

                                                        5e9685d90a32b1b16c4bb8b4026e46522059e0c72d0f18d094174ba20b167a8afc6628dd360616fe74b62857f98ec9bd957aa8406d9dcc7ec02025c7201051e7

                                                      • C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe

                                                        Filesize

                                                        1.4MB

                                                        MD5

                                                        02aecd0ebdc349f3b126f2b078c0fd8f

                                                        SHA1

                                                        196bdfb85eef86cb7778393a832b9ea78bf91459

                                                        SHA256

                                                        45632448a071d0739e31561acff10e6c64d91d7c001c318a57663f0bb0c16b5c

                                                        SHA512

                                                        8534e80dea4cdcba91b69ca5eaacaea3eaae212e8f66c8f752197fc34d523c6ff98b1318bb7903ca73688135f9812eb69a77519e1bb006036195839558362435

                                                      • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe

                                                        Filesize

                                                        2.1MB

                                                        MD5

                                                        18c298fbcf2283a37fcf15f4701978d4

                                                        SHA1

                                                        1271963d1709fa16c0e4c649ea5bf4269fec3474

                                                        SHA256

                                                        d5f0ed953eb5d56ca690d3055bea7c941eea586f6a6c741d3b1dac839dd58213

                                                        SHA512

                                                        1b1bba21faed7fb24850018613fe3cc3daf7992f6460625accc86c8c94f3899868536f87548bd71bb267a143cc361392aca8a0fca78861b06b54cf7a55b6ea35

                                                      • C:\ProgramData\Microsoft\Search\Data\Applications\Windows\MSS.log

                                                        Filesize

                                                        1024KB

                                                        MD5

                                                        d10c27f59dfdc972c4de635687df4614

                                                        SHA1

                                                        3ebd0ac94d845bca26c36a05e3a70f75561fe3e4

                                                        SHA256

                                                        71636872ba48e12fbf90eec49168337910ef98ad0ee00cda106f2904c83f8f65

                                                        SHA512

                                                        4c649ed28619302cbad9f1a2455bd4f2970b05f59740d642c4691f073df9e195bd6fcbcda107ffe7ad7b095bcff68c1882744e86fb374c4224f804850010bf4c

                                                      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b91050d8b077a4e8.customDestinations-ms

                                                        Filesize

                                                        24B

                                                        MD5

                                                        b9bd716de6739e51c620f2086f9c31e4

                                                        SHA1

                                                        9733d94607a3cba277e567af584510edd9febf62

                                                        SHA256

                                                        7116ff028244a01f3d17f1d3bc2e1506bc9999c2e40e388458f0cccc4e117312

                                                        SHA512

                                                        cef609e54c7a81a646ad38dba7ac0b82401b220773b9c792cefac80c6564753229f0c011b34ffb56381dd3154a19aee2bf5f602c4d1af01f2cf0fbc1574e4478

                                                      • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ngen_service.log

                                                        Filesize

                                                        872KB

                                                        MD5

                                                        4abb5b60d89f7f9d498b06ab632b8c25

                                                        SHA1

                                                        71e1b0636f824665b5d3ae658aed8b02dfe19a0a

                                                        SHA256

                                                        bc081cd088338a05c286abf35325b29c9d8a3977f835de14e2b2d8bdb7555d90

                                                        SHA512

                                                        24683c76ca95f74974c2414a3365ed10d2c042f0daf612a80a72f710e6077e919465a837bce3c2f23598016f10760f4168df9cacd17b6ee626750cd59660ef4c

                                                      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe

                                                        Filesize

                                                        1.3MB

                                                        MD5

                                                        f6d674dcf01aa5970aa352b0369ec56b

                                                        SHA1

                                                        ecec3c41b1ec07815c2b69ade98f833e88756b2c

                                                        SHA256

                                                        a348913e4f7eda5d4cd554cd8f910e3c2debd76ffb544f888dddc340d1bb4341

                                                        SHA512

                                                        96d0a47a0abeb216b4d503fb75eaf502817222f48903fa820eaa800848b10285a6bcb6d4cc7411edc64124456890aa1c3dfcafa787b76c78ffc12327cbd60c77

                                                      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen_service.log

                                                        Filesize

                                                        8KB

                                                        MD5

                                                        e8e37bf375c4131933e59d238878d0c3

                                                        SHA1

                                                        be0adfc61aea871c74853137f406f513b9c3c660

                                                        SHA256

                                                        b82a684d7dd0da93e9bda696a2183fd5eaa94ef9b1cbd98a577dc696c3223a6c

                                                        SHA512

                                                        6cc2f065e2741d69730a0d02c6e9bcbfc772fcccaba54062c146db2868ae845980b1e7b595c68dd0d295dc8ff65b10837181b7bcb3fecc6a926cbc22d4bda1f6

                                                      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe

                                                        Filesize

                                                        1.2MB

                                                        MD5

                                                        e83713671461b24abeba164221e359c8

                                                        SHA1

                                                        59454d3f669ba412e9f32d1818c284242ab03ee8

                                                        SHA256

                                                        7881ac0f0d8e0ab1d6f3819a5f3f34a77086ccf33aaededea25299a03579244e

                                                        SHA512

                                                        8284d06b2490017236f9c85a0182895085dcdca3aa90662632f8db00b139861d9d34132936858cc4d55b28ed6eae5bba692abe9dcef1797c00ab249eb6172ed8

                                                      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\ngen_service.log

                                                        Filesize

                                                        1003KB

                                                        MD5

                                                        02e6285a934a0a7eb8ae140beacabd8d

                                                        SHA1

                                                        37f0c507144c931178ebb8ff098762fdd978234b

                                                        SHA256

                                                        f1bed9df082ca7d240f9732b54a9c8cde7694ff9d8c0ba7c77e266ced1045f48

                                                        SHA512

                                                        c1594fe06f8b25a80addc1c82e0c1b6e241949fca32a8baafdd8b51e95cc1dca83b9fc679de4b242c6caa68231c922134a50fc6f04070fba9a0bb3572ec563d9

                                                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe

                                                        Filesize

                                                        1.3MB

                                                        MD5

                                                        5eed15bd3ea8ef721874e32152b8c877

                                                        SHA1

                                                        0ee5df48bfc23e466b885dabaf78f2308c4abe6c

                                                        SHA256

                                                        fabba9f00e4875e468a5552e46aa06295727a173b8c73255fe6732df0159c7e0

                                                        SHA512

                                                        ff399871bc75fa8d82796879f375d612d0e826aede9554c2349eabd3d680abe349f247a0f3d36cb95004a40c8317fac5302bbef4fa7de3b52f332e933af0a254

                                                      • C:\Windows\SysWOW64\perfhost.exe

                                                        Filesize

                                                        1.2MB

                                                        MD5

                                                        b1615bb623ab1bec2c9ba90a7027359c

                                                        SHA1

                                                        40976003e68bd952998e9bbd7e02ad18fb8a1f61

                                                        SHA256

                                                        2f9311fc94a14b7d26f7a24551f1f2ba0b9cb941cc10ea26fb7ff30f11cbbf04

                                                        SHA512

                                                        8285fb8b7be16e658c528c14b02ada4f6382c86325a7ea7d45e4a613e70183b3554de13e7ad20b72612b1ac7126d3745988c47ba6a1f213bb1f802a11c85bacc

                                                      • C:\Windows\System32\Locator.exe

                                                        Filesize

                                                        1.2MB

                                                        MD5

                                                        091b7734660b3e00c23d47859da79391

                                                        SHA1

                                                        b519324abcf019cce7c6ccf760ce183dc2dc3b34

                                                        SHA256

                                                        2935a0697218c023f20fd51b183d73e2f0b346a1490872122e7d7d6867422cee

                                                        SHA512

                                                        7432e089f10e5495b8fcd8d704bdd9e32f3fc42ad746d6d1bf95e58ec32ff1be2c87de671b28fb1afd74db0b196fd5c3a5efb324b2ba9f607ad7eabb83a13fd4

                                                      • C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft.Office.To#\82425dbc07ec64ab599534080b6fbc08\Microsoft.Office.Tools.v9.0.ni.dll

                                                        Filesize

                                                        248KB

                                                        MD5

                                                        4bbf44ea6ee52d7af8e58ea9c0caa120

                                                        SHA1

                                                        f7dcafcf850b4081b61ec7d313d7ec35d6ac66d2

                                                        SHA256

                                                        c89c478c2d7134cd28b3d28d4216ad6aa41de3edd9d87a227ec19cf1cbf3fb08

                                                        SHA512

                                                        c82356750a03bd6f92f03c67acdd5e1085fbd70533a8b314ae54676f37762d9ca5fa91574529b147d3e1c983bf042106b75f41206f5ddc37094a5e1c327c0fd3

                                                      • C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft.VisualStu#\06216e3a9e4ca262bc1e9a3818ced7fe\Microsoft.VisualStudio.Tools.Office.Excel.AddInAdapter.v9.0.ni.dll

                                                        Filesize

                                                        58KB

                                                        MD5

                                                        3d6987fc36386537669f2450761cdd9d

                                                        SHA1

                                                        7a35de593dce75d1cb6a50c68c96f200a93eb0c9

                                                        SHA256

                                                        34c0302fcf7d2237f914aaa484b24f5a222745f21f5b5806b9c519538665d9cb

                                                        SHA512

                                                        1d74371f0b6c68ead18b083c08b7e44fcaf930a16e0641ad6cd8d8defb4bde838377741e5b827f7f05d4f0ad4550b509ba6dff787f51fc6830d8f2c88dbf0e11

                                                      • C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft.VisualStu#\077a55be734d6ef6e2de59fa7325dac5\Microsoft.VisualStudio.Tools.Office.Contract.v9.0.ni.dll

                                                        Filesize

                                                        205KB

                                                        MD5

                                                        0a41e63195a60814fe770be368b4992f

                                                        SHA1

                                                        d826fd4e4d1c9256abd6c59ce8adb6074958a3e7

                                                        SHA256

                                                        4a8ccb522a4076bcd5f217437c195b43914ea26da18096695ee689355e2740e1

                                                        SHA512

                                                        1c916165eb5a2e30d4c6a67f2023ab5df4e393e22d9d8123aa5b9b8522fdb5dfe539bcb772a6e55219b23d865ee1438d066e78f0cb138a4a61cc2a1cecf54728

                                                      • C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft.VisualStu#\2951791a1aa22719b6fdcb816f7e6c04\Microsoft.VisualStudio.Tools.Office.Contract.v10.0.ni.dll

                                                        Filesize

                                                        43KB

                                                        MD5

                                                        68c51bcdc03e97a119431061273f045a

                                                        SHA1

                                                        6ecba97b7be73bf465adf3aa1d6798fedcc1e435

                                                        SHA256

                                                        4a3aa6bd2a02778759886aaa884d1e8e4a089a1e0578c973fcb4fc885901ebaf

                                                        SHA512

                                                        d71d6275c6f389f6b7becb54cb489da149f614454ae739e95c33a32ed805820bef14c98724882c4ebb51b4705f41b3cdb5a8ed134411011087774cac6e9d23e8

                                                      • C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft.VisualStu#\369a81b278211f8d96a305e918172713\Microsoft.VisualStudio.Tools.Applications.Runtime.v9.0.ni.dll

                                                        Filesize

                                                        198KB

                                                        MD5

                                                        9d9305a1998234e5a8f7047e1d8c0efe

                                                        SHA1

                                                        ba7e589d4943cd4fc9f26c55e83c77559e7337a8

                                                        SHA256

                                                        469ff9727392795925c7fe5625afcf508ba07e145c7940e4a12dbd6f14afc268

                                                        SHA512

                                                        58b8cc718ae1a72a9d596f7779aeb0d5492a19e5d668828fd6cff1aa37181cc62878799b4c97beec9c71c67a0c215162ff544b2417f6017cd892a1ce64f7878c

                                                      • C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft.VisualStu#\495b075725ac74eb8a443e20bdafe39d\Microsoft.VisualStudio.Tools.Office.Outlook.HostAdapter.v10.0.ni.dll

                                                        Filesize

                                                        122KB

                                                        MD5

                                                        a5d5d5b70335fe70531525596bd3c63b

                                                        SHA1

                                                        e5878c41a5c31f50ee99d85f2fc0c0480d37f6cf

                                                        SHA256

                                                        4f3974ed0653e31cc68a3c8f99d143d0e7a5a2cf371f48c86979ee8c96d29f51

                                                        SHA512

                                                        c94d2db6c95f896c459d85d1e25039d50b7d6892971c2bee2427d83883b216f9926f5a8a3f3a68fe324cb52d2304af147e4f0c7f27d606f14219b7806b57c505

                                                      • C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft.VisualStu#\6e100177db1ef25970ca4a9eba03c352\Microsoft.VisualStudio.Tools.Applications.Contract.v9.0.ni.dll

                                                        Filesize

                                                        70KB

                                                        MD5

                                                        57b601497b76f8cd4f0486d8c8bf918e

                                                        SHA1

                                                        da797c446d4ca5a328f6322219f14efe90a5be54

                                                        SHA256

                                                        1380d349abb6d461254118591637c8198859d8aadfdb098b8d532fdc4d776e2d

                                                        SHA512

                                                        1347793a9dbff305975f4717afa9ee56443bc48586d35a64e8a375535fa9e0f6333e13c2267d5dbb7fe868aa863b23034a2e655dcd68b59dca75f17a4cbc1850

                                                      • C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft.VisualStu#\77f00d3b4d847c1dd38a1c69e4ef5cb1\Microsoft.VisualStudio.Tools.Applications.Runtime.v10.0.ni.dll

                                                        Filesize

                                                        87KB

                                                        MD5

                                                        ed5c3f3402e320a8b4c6a33245a687d1

                                                        SHA1

                                                        4da11c966616583a817e98f7ee6fce6cde381dae

                                                        SHA256

                                                        b58d8890d884e60af0124555472e23dee55905e678ec9506a3fbe00fffab0a88

                                                        SHA512

                                                        d664b1f9f37c50d0e730a25ff7b79618f1ca99a0f1df0b32a4c82c95b2d15b6ef04ce5560db7407c6c3d2dff70514dac77cb0598f6d32b25362ae83fedb2bc2a

                                                      • C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft.VisualStu#\9cdb8781509cf054ab5aeb88712b2f80\Microsoft.VisualStudio.Tools.Office.Word.HostAdapter.v10.0.ni.dll

                                                        Filesize

                                                        305KB

                                                        MD5

                                                        3c31e9ec30f63851f9a7067d19bd8f57

                                                        SHA1

                                                        265c497a0323ef9b4a5b45ea4f04356da1c6bed5

                                                        SHA256

                                                        9d7f87573da033241bdcac71e4efdb9332236bbc4cd0025ab6c88a8f5289bd25

                                                        SHA512

                                                        72157b2e1a2325c798c5ccc671c7e4715205eca9868040cae4719761f03273d7368819631d6423fb2af83feb5977e173769efef0aeb366c7b0641433a3a05c40

                                                      • C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft.VisualStu#\9e076728e51ab285a8bc0f0b0a226e2c\Microsoft.VisualStudio.Tools.Applications.HostAdapter.v10.0.ni.dll

                                                        Filesize

                                                        82KB

                                                        MD5

                                                        2eeeff61d87428ae7a2e651822adfdc4

                                                        SHA1

                                                        66f3811045a785626e6e1ea7bab7e42262f4c4c1

                                                        SHA256

                                                        37f2ee9f8794df6d51a678c62b4838463a724fdf1bd65277cd41feaf2e6c9047

                                                        SHA512

                                                        cadf3a04aa6dc2b6b781c292d73e195be5032b755616f4b49c6bdde8b3ae297519fc255b0a46280b60aaf45d4dedb9b828d33f1400792b87074f01bbab19e41a

                                                      • C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft.VisualStu#\a58534126a42a5dbdef4573bac06c734\Microsoft.VisualStudio.Tools.Office.Word.AddInAdapter.v9.0.ni.dll

                                                        Filesize

                                                        58KB

                                                        MD5

                                                        a8b651d9ae89d5e790ab8357edebbffe

                                                        SHA1

                                                        500cff2ba14e4c86c25c045a51aec8aa6e62d796

                                                        SHA256

                                                        1c8239c49fb10c715b52e60afd0e6668592806ef447ad0c52599231f995a95d7

                                                        SHA512

                                                        b4d87ee520353113bb5cf242a855057627fde9f79b74031ba11d5feee1a371612154940037954cd1e411da0c102f616be72617a583512420fd1fc743541a10ce

                                                      • C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft.VisualStu#\bd1950e68286b869edc77261e0821c93\Microsoft.VisualStudio.Tools.Applications.AddInAdapter.v9.0.ni.dll

                                                        Filesize

                                                        85KB

                                                        MD5

                                                        5180107f98e16bdca63e67e7e3169d22

                                                        SHA1

                                                        dd2e82756dcda2f5a82125c4d743b4349955068d

                                                        SHA256

                                                        d0658cbf473ef3666c758d28a1c4bcdcb25b2e515ad5251127d0906e65938f01

                                                        SHA512

                                                        27d785971c28181cf9115ab14de066931c4d81f8d357ea8b9eabfe0f70bd5848023b69948ac6a586989e892bcde40999f8895a0bd2e7a28bac7f2fa64bb22363

                                                      • C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft.VisualStu#\dbe51d156773fefd09c7a52feeb8ff79\Microsoft.VisualStudio.Tools.Office.AddInAdapter.v9.0.ni.dll

                                                        Filesize

                                                        298KB

                                                        MD5

                                                        5fd34a21f44ccbeda1bf502aa162a96a

                                                        SHA1

                                                        1f3b1286c01dea47be5e65cb72956a2355e1ae5e

                                                        SHA256

                                                        5d88539a1b7be77e11fe33572606c1093c54a80eea8bd3662f2ef5078a35ce01

                                                        SHA512

                                                        58c3904cd1a06fbd3a432b3b927e189a744282cc105eda6f0d7f406971ccbc942c7403c2dcbb2d042981cf53419ca5e2cf4d9f57175e45cc5c484b0c121bb125

                                                      • C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft.VisualStu#\df30246daf54310f7a519555511e1334\Microsoft.VisualStudio.Tools.Office.Excel.HostAdapter.v10.0.ni.dll

                                                        Filesize

                                                        271KB

                                                        MD5

                                                        c6d0a75df61d77f7db55b1de31ceee8e

                                                        SHA1

                                                        3489fd96127b8b0ae9e3a360f1ef7754a52f6298

                                                        SHA256

                                                        38ebb83762bd2b299397e036c610e1310f04a3b721efd83f53bda77996f7c31c

                                                        SHA512

                                                        84971539fa8ea7d6c8d7089056fce7f6e8fa8c0354dd96d48b289754336419e87bf9d29809367e4a4b14d436576631185b4541aee422f5fe7c402c7404757608

                                                      • C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft.VisualStu#\e45a0e1bd97a5a0eae6d678180325b04\Microsoft.VisualStudio.Tools.Office.HostAdapter.v10.0.ni.dll

                                                        Filesize

                                                        221KB

                                                        MD5

                                                        9142ed1e4d5c6f93cb6764a8c481cbe1

                                                        SHA1

                                                        1f03135777b0db6d3ace50dbd8f99af3ac2d21f8

                                                        SHA256

                                                        c985665c74fee7fc0ca238820772915c33c4d031f227176027832c26bb7f9ae9

                                                        SHA512

                                                        2c9d0608e2d62aa477f6b38ed69583c0a43d1fb3c7ac4e795a0dbca5668f712b79a59a135f05b486e560f4c3f8b824af75c54f2a7df7d08049577fd1af8e2fd2

                                                      • C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft.VisualStu#\fe8d06712eb58d0150803744020b072a\Microsoft.VisualStudio.Tools.Applications.Contract.v10.0.ni.dll

                                                        Filesize

                                                        43KB

                                                        MD5

                                                        dd1dfa421035fdfb6fd96d301a8c3d96

                                                        SHA1

                                                        d535030ad8d53d57f45bc14c7c7b69efd929efb3

                                                        SHA256

                                                        f71293fe6cf29af54d61bd2070df0a5ff17a661baf1b0b6c1d3393fd23ccd30c

                                                        SHA512

                                                        8e0f2bee9801a4eba974132811d7274e52e6e17ccd60e8b3f74959994f007bdb0c60eb9facb6321c0fdfbcc44e9a77d8c5c776d998ccce256fa864338a6f63b1

                                                      • C:\Windows\assembly\NativeImages_v2.0.50727_64\ehiActivScp\ee22f412f6314443add3ca412afd6569\ehiActivScp.ni.dll

                                                        Filesize

                                                        124KB

                                                        MD5

                                                        929653b5b019b4555b25d55e6bf9987b

                                                        SHA1

                                                        993844805819ee445ff8136ee38c1aee70de3180

                                                        SHA256

                                                        2766353ca5c6a87169474692562282005905f1ca82eaa08e08223fc084dbb9a2

                                                        SHA512

                                                        effc809cca6170575efa7b4b23af9c49712ee9a7aaffd8f3a954c2d293be5be2cf3c388df4af2043f82b9b2ea041acdbb9d7ddd99a2fc744cce95cf4d820d013

                                                      • C:\Windows\assembly\NativeImages_v2.0.50727_64\ehiVidCtl\11d57f5c033326954c0bc4f0b2680812\ehiVidCtl.ni.dll

                                                        Filesize

                                                        2.1MB

                                                        MD5

                                                        10b5a285eafccdd35390bb49861657e7

                                                        SHA1

                                                        62c05a4380e68418463529298058f3d2de19660d

                                                        SHA256

                                                        5f3bb3296ab50050e6b4ea7e95caa937720689db735c70309e5603a778be3a9a

                                                        SHA512

                                                        19ff9ac75f80814ed5124adc25fc2a6d1d7b825c770e1edb8f5b6990e44f9d2d0c1c0ed75b984e729709d603350055e5a543993a80033367810c417864df1452

                                                      • C:\Windows\assembly\NativeImages_v2.0.50727_64\stdole\70f1aed4a280583cbd09e0f5d9bbc1f5\stdole.ni.dll

                                                        Filesize

                                                        88KB

                                                        MD5

                                                        1f394b5ca6924de6d9dbfb0e90ea50ef

                                                        SHA1

                                                        4e2caa5e98531c6fbf5728f4ae4d90a1ad150920

                                                        SHA256

                                                        9db0e4933b95ad289129c91cd9e14a0c530f42b55e8c92dc8c881bc3dd40b998

                                                        SHA512

                                                        e27ea0f7b59d41a85547d607ae3c05f32ce19fa5d008c8eaf11d0c253a73af3cfa6df25e3ee7f3920cd775e1a3a2db934e5891b4aafd4270d65a727b439f7476

                                                      • C:\Windows\system32\fxssvc.exe

                                                        Filesize

                                                        1.2MB

                                                        MD5

                                                        4a51abf4b43e7019e8bd03915c13d4b7

                                                        SHA1

                                                        d4929fde9ed6fcc93383a10c00008dedfe278192

                                                        SHA256

                                                        0f1ee75df0ebabdfb4640a47a666ec0fa47102b89f64d3a5d771f5734db4e785

                                                        SHA512

                                                        84bf13822bf6b36ff86dbd9f4e59f705b2aa4d5edad73296fc4675dd827f45f98ba01331086b1277d805d7be1b33f4b43fd39932fe30b61c73ed118c69625206

                                                      • \Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe

                                                        Filesize

                                                        1.3MB

                                                        MD5

                                                        e82956277fbf82a2c6161cd52c4216ba

                                                        SHA1

                                                        7d66d04511ef702b3f094dae53e1625a64d94f0c

                                                        SHA256

                                                        6ebc2cb5fdd6731a11c4281f72e446a51572f424f44c71815ac593ee5e588773

                                                        SHA512

                                                        ee8f48e53082c011a2da2720fefde9501e47c85f9190ba3cc1074a1502f1fb970f4796437dcd951673f0007597c018f999c84510c296862cac83b8d25aed0a33

                                                      • \Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe

                                                        Filesize

                                                        1.2MB

                                                        MD5

                                                        17f5a5132f288ca2bdd3ef29e7874de1

                                                        SHA1

                                                        cb88b5c3e83bcf7d88012fbcd45fa48e1e429e2c

                                                        SHA256

                                                        0410792ce33fa21f35121d2f52b9e0e1a2bcd4e72e61db9900f8639bf365f86b

                                                        SHA512

                                                        fa35e6f1dc471e2bec4dd0e7502943bace724d41f2825bcc01c99e0fe923510e4c772b75fba5902968e88e3817b10ba908dae78e21b240fbcc9310b37a3d1cae

                                                      • \Windows\System32\alg.exe

                                                        Filesize

                                                        1.3MB

                                                        MD5

                                                        23855aaa75bed9dd857a481c249b4e10

                                                        SHA1

                                                        267484f68618c84774fc4e788f3972ed920608f0

                                                        SHA256

                                                        5176f3ac08c1a965fd91ce0ff2b43e671f470c93308e58fb7663d2c0d3d2326f

                                                        SHA512

                                                        c606d76cc533c50539a682e06fa3e6cbf8c5e2b5cb5ee84b946f97809eca290ce0e5c62dc98be11b4b2ac4c546469abbeb6d0347188ac16087b41323250ebd61

                                                      • \Windows\System32\ieetwcollector.exe

                                                        Filesize

                                                        1.3MB

                                                        MD5

                                                        0773689dc29aafa9b2f33ec5ab249b79

                                                        SHA1

                                                        900e3abb9cd3de61132730d8dbd9c7f4c3f543dc

                                                        SHA256

                                                        d368d640a25df7647e08211560777f31691cd73f59758f9ca67f52aa169e742e

                                                        SHA512

                                                        8593bfafd4e879dd88ebf8ad7ca54488625ee625e76dc954fac6a3e75a30669650e47c7604677b8c1ae1494cbf67b05c8ccb1a624275cdd023a974e486697436

                                                      • \Windows\System32\msdtc.exe

                                                        Filesize

                                                        1.3MB

                                                        MD5

                                                        cca8a5434c53f4c255ea33901ef97a06

                                                        SHA1

                                                        18afd18a21fc4fe79967aa3b471a0cdfddf028d0

                                                        SHA256

                                                        b99d67210c8461305cb97fdb2caecc2d5d6bb17b2ec7a36cc82849f94b184e6f

                                                        SHA512

                                                        f4d2a58428b8623c182e8617a6d52fb7873193225ae8ab80f5c4b7881b5f7bd9cadeb14bf1322afae16c490e97a1f422ba02a380012244bf5f53122b46a19ecb

                                                      • \Windows\System32\msiexec.exe

                                                        Filesize

                                                        1.3MB

                                                        MD5

                                                        8f8bf328d731e1ae2ec31d4250205479

                                                        SHA1

                                                        a3a4bc2ed77694c03c2ddd02c4a091440bac9644

                                                        SHA256

                                                        2bc6746e579ba4512377f9c51f5951ad668a4f4e3dfa29ef0332f0eb7aacabb6

                                                        SHA512

                                                        11385c4e7131bb3a1455e629b14aad709164a9aa28b9b4e7799cede93f04b4af1d8468490dd49f9423237373a9eb8eb81de790f44bcea826e0e85bee9238cb43

                                                      • \Windows\System32\snmptrap.exe

                                                        Filesize

                                                        1.2MB

                                                        MD5

                                                        a557c697982a9e159569e75b705212e1

                                                        SHA1

                                                        70986091abff8b4d4797e2c3b5acdd70be775ac5

                                                        SHA256

                                                        55f21d9a76cd75e78682dd1fdc414d086e6f7c6ea924630babf4a2ae49fb92f5

                                                        SHA512

                                                        f210700c79e947758c965884b10dd646e565bb81bf744ebabeb10c63367ed4ec88d5ff4cd659d08a725ca08bac51fb7a5600af9f9aa861fe5926a36e3f97e711

                                                      • \Windows\ehome\ehrecvr.exe

                                                        Filesize

                                                        1.2MB

                                                        MD5

                                                        39abbbb766b8b82385b37ce13c1a7839

                                                        SHA1

                                                        9dcf298c1a9a1da616d2d5434c3141ddcb9be047

                                                        SHA256

                                                        d5f28a3a27035d6b95ce421f82903dd484389e0ccef2554861ad77d75707e088

                                                        SHA512

                                                        e834af4a552cfdaf4350838f55f998e2acba61e6d17a755586d4bd760131f6fdfef9a937d809eb33a73eb1f7adbedec43a787abedc15259441d10e4704eba848

                                                      • \Windows\ehome\ehsched.exe

                                                        Filesize

                                                        1.3MB

                                                        MD5

                                                        a44dafe5f57c51081181751e3fe695dd

                                                        SHA1

                                                        e3ed01451b249c24ea200c83d27cae4e95715e9e

                                                        SHA256

                                                        b3881bcfd033f162e77ab59a9b855696a5e2525dcf208b74d75aa8ac57f9e8cf

                                                        SHA512

                                                        2c5ecedeba266fcdf9a5204f488e2ddb6df7a07f21e249723e161f76da1b1beed245885876dcbea884a747c9034531a7856e8e34fecbdaf294ac7ff0d6d06230

                                                      • memory/396-438-0x0000000000400000-0x00000000005E7000-memory.dmp

                                                        Filesize

                                                        1.9MB

                                                      • memory/896-961-0x0000000001920000-0x0000000001938000-memory.dmp

                                                        Filesize

                                                        96KB

                                                      • memory/896-962-0x00000000018F0000-0x00000000018FE000-memory.dmp

                                                        Filesize

                                                        56KB

                                                      • memory/896-964-0x000000001AD80000-0x000000001AD9E000-memory.dmp

                                                        Filesize

                                                        120KB

                                                      • memory/896-963-0x000000001AD60000-0x000000001AD7A000-memory.dmp

                                                        Filesize

                                                        104KB

                                                      • memory/1080-90-0x0000000000A90000-0x0000000000AF0000-memory.dmp

                                                        Filesize

                                                        384KB

                                                      • memory/1080-96-0x0000000140000000-0x00000001401ED000-memory.dmp

                                                        Filesize

                                                        1.9MB

                                                      • memory/1080-97-0x0000000000A90000-0x0000000000AF0000-memory.dmp

                                                        Filesize

                                                        384KB

                                                      • memory/1080-251-0x0000000140000000-0x00000001401ED000-memory.dmp

                                                        Filesize

                                                        1.9MB

                                                      • memory/1088-112-0x0000000140000000-0x000000014013C000-memory.dmp

                                                        Filesize

                                                        1.2MB

                                                      • memory/1088-113-0x0000000000850000-0x00000000008B0000-memory.dmp

                                                        Filesize

                                                        384KB

                                                      • memory/1088-284-0x0000000140000000-0x000000014013C000-memory.dmp

                                                        Filesize

                                                        1.2MB

                                                      • memory/1088-676-0x0000000140000000-0x000000014013C000-memory.dmp

                                                        Filesize

                                                        1.2MB

                                                      • memory/1088-119-0x0000000000850000-0x00000000008B0000-memory.dmp

                                                        Filesize

                                                        384KB

                                                      • memory/1100-610-0x0000000000400000-0x00000000005E7000-memory.dmp

                                                        Filesize

                                                        1.9MB

                                                      • memory/1104-348-0x0000000000400000-0x00000000005E7000-memory.dmp

                                                        Filesize

                                                        1.9MB

                                                      • memory/1104-371-0x0000000000400000-0x00000000005E7000-memory.dmp

                                                        Filesize

                                                        1.9MB

                                                      • memory/1128-72-0x0000000000400000-0x00000000005E7000-memory.dmp

                                                        Filesize

                                                        1.9MB

                                                      • memory/1128-74-0x0000000000390000-0x00000000003F7000-memory.dmp

                                                        Filesize

                                                        412KB

                                                      • memory/1128-78-0x0000000000390000-0x00000000003F7000-memory.dmp

                                                        Filesize

                                                        412KB

                                                      • memory/1128-212-0x0000000000400000-0x00000000005E7000-memory.dmp

                                                        Filesize

                                                        1.9MB

                                                      • memory/1144-600-0x0000000000400000-0x00000000005E7000-memory.dmp

                                                        Filesize

                                                        1.9MB

                                                      • memory/1144-622-0x0000000000400000-0x00000000005E7000-memory.dmp

                                                        Filesize

                                                        1.9MB

                                                      • memory/1156-185-0x000000002E000000-0x000000002FE1E000-memory.dmp

                                                        Filesize

                                                        30.1MB

                                                      • memory/1156-372-0x000000002E000000-0x000000002FE1E000-memory.dmp

                                                        Filesize

                                                        30.1MB

                                                      • memory/1168-469-0x0000000000400000-0x00000000005E7000-memory.dmp

                                                        Filesize

                                                        1.9MB

                                                      • memory/1192-131-0x0000000140000000-0x00000001401F1000-memory.dmp

                                                        Filesize

                                                        1.9MB

                                                      • memory/1192-330-0x0000000140000000-0x00000001401F1000-memory.dmp

                                                        Filesize

                                                        1.9MB

                                                      • memory/1192-652-0x0000000140000000-0x00000001401F1000-memory.dmp

                                                        Filesize

                                                        1.9MB

                                                      • memory/1288-484-0x0000000000400000-0x00000000005E7000-memory.dmp

                                                        Filesize

                                                        1.9MB

                                                      • memory/1288-471-0x0000000000400000-0x00000000005E7000-memory.dmp

                                                        Filesize

                                                        1.9MB

                                                      • memory/1536-368-0x0000000140000000-0x00000001401ED000-memory.dmp

                                                        Filesize

                                                        1.9MB

                                                      • memory/1536-671-0x0000000140000000-0x00000001401ED000-memory.dmp

                                                        Filesize

                                                        1.9MB

                                                      • memory/1536-164-0x0000000140000000-0x00000001401ED000-memory.dmp

                                                        Filesize

                                                        1.9MB

                                                      • memory/1572-490-0x0000000000400000-0x00000000005E7000-memory.dmp

                                                        Filesize

                                                        1.9MB

                                                      • memory/1624-596-0x0000000000400000-0x00000000005E7000-memory.dmp

                                                        Filesize

                                                        1.9MB

                                                      • memory/1684-1009-0x0000000001880000-0x000000000188C000-memory.dmp

                                                        Filesize

                                                        48KB

                                                      • memory/1708-352-0x0000000000400000-0x00000000005E7000-memory.dmp

                                                        Filesize

                                                        1.9MB

                                                      • memory/1708-333-0x0000000000400000-0x00000000005E7000-memory.dmp

                                                        Filesize

                                                        1.9MB

                                                      • memory/1756-925-0x00000000018F0000-0x0000000001906000-memory.dmp

                                                        Filesize

                                                        88KB

                                                      • memory/1756-922-0x0000000000E40000-0x0000000000E4E000-memory.dmp

                                                        Filesize

                                                        56KB

                                                      • memory/1756-924-0x000000001AD00000-0x000000001AD48000-memory.dmp

                                                        Filesize

                                                        288KB

                                                      • memory/1756-923-0x0000000000E50000-0x0000000000E5C000-memory.dmp

                                                        Filesize

                                                        48KB

                                                      • memory/1764-638-0x0000000000400000-0x00000000005E7000-memory.dmp

                                                        Filesize

                                                        1.9MB

                                                      • memory/2020-580-0x0000000000400000-0x00000000005E7000-memory.dmp

                                                        Filesize

                                                        1.9MB

                                                      • memory/2056-427-0x0000000000400000-0x00000000005E7000-memory.dmp

                                                        Filesize

                                                        1.9MB

                                                      • memory/2056-406-0x0000000000400000-0x00000000005E7000-memory.dmp

                                                        Filesize

                                                        1.9MB

                                                      • memory/2072-990-0x000000001B6B0000-0x000000001B6C8000-memory.dmp

                                                        Filesize

                                                        96KB

                                                      • memory/2072-979-0x0000000001B00000-0x0000000001B18000-memory.dmp

                                                        Filesize

                                                        96KB

                                                      • memory/2072-981-0x000000001ACE0000-0x000000001ACEE000-memory.dmp

                                                        Filesize

                                                        56KB

                                                      • memory/2072-980-0x000000001ACD0000-0x000000001ACDC000-memory.dmp

                                                        Filesize

                                                        48KB

                                                      • memory/2072-991-0x000000001B6B0000-0x000000001B6C8000-memory.dmp

                                                        Filesize

                                                        96KB

                                                      • memory/2072-984-0x000000001B250000-0x000000001B26E000-memory.dmp

                                                        Filesize

                                                        120KB

                                                      • memory/2072-983-0x000000001AD60000-0x000000001AD7A000-memory.dmp

                                                        Filesize

                                                        104KB

                                                      • memory/2072-982-0x000000001ACF0000-0x000000001AD06000-memory.dmp

                                                        Filesize

                                                        88KB

                                                      • memory/2284-187-0x0000000140000000-0x0000000140209000-memory.dmp

                                                        Filesize

                                                        2.0MB

                                                      • memory/2284-382-0x0000000000400000-0x00000000005E7000-memory.dmp

                                                        Filesize

                                                        1.9MB

                                                      • memory/2284-199-0x0000000140000000-0x0000000140209000-memory.dmp

                                                        Filesize

                                                        2.0MB

                                                      • memory/2284-373-0x0000000000400000-0x00000000005E7000-memory.dmp

                                                        Filesize

                                                        1.9MB

                                                      • memory/2292-71-0x0000000010000000-0x00000000101DE000-memory.dmp

                                                        Filesize

                                                        1.9MB

                                                      • memory/2292-0-0x0000000010000000-0x00000000101DE000-memory.dmp

                                                        Filesize

                                                        1.9MB

                                                      • memory/2292-152-0x0000000010000000-0x00000000101DE000-memory.dmp

                                                        Filesize

                                                        1.9MB

                                                      • memory/2292-1-0x0000000000230000-0x0000000000297000-memory.dmp

                                                        Filesize

                                                        412KB

                                                      • memory/2292-7-0x0000000000230000-0x0000000000297000-memory.dmp

                                                        Filesize

                                                        412KB

                                                      • memory/2292-6-0x0000000000230000-0x0000000000297000-memory.dmp

                                                        Filesize

                                                        412KB

                                                      • memory/2328-512-0x0000000000400000-0x00000000005E7000-memory.dmp

                                                        Filesize

                                                        1.9MB

                                                      • memory/2396-619-0x0000000000400000-0x00000000005E7000-memory.dmp

                                                        Filesize

                                                        1.9MB

                                                      • memory/2396-625-0x0000000000400000-0x00000000005E7000-memory.dmp

                                                        Filesize

                                                        1.9MB

                                                      • memory/2572-289-0x0000000000400000-0x00000000005E7000-memory.dmp

                                                        Filesize

                                                        1.9MB

                                                      • memory/2572-261-0x0000000000400000-0x00000000005E7000-memory.dmp

                                                        Filesize

                                                        1.9MB

                                                      • memory/2576-399-0x0000000000400000-0x00000000005E7000-memory.dmp

                                                        Filesize

                                                        1.9MB

                                                      • memory/2576-380-0x0000000000400000-0x00000000005E7000-memory.dmp

                                                        Filesize

                                                        1.9MB

                                                      • memory/2596-196-0x000000002E000000-0x000000002E1F4000-memory.dmp

                                                        Filesize

                                                        2.0MB

                                                      • memory/2596-405-0x000000002E000000-0x000000002E1F4000-memory.dmp

                                                        Filesize

                                                        2.0MB

                                                      • memory/2632-54-0x0000000010000000-0x00000000101E6000-memory.dmp

                                                        Filesize

                                                        1.9MB

                                                      • memory/2632-106-0x0000000010000000-0x00000000101E6000-memory.dmp

                                                        Filesize

                                                        1.9MB

                                                      • memory/2632-62-0x0000000000230000-0x0000000000290000-memory.dmp

                                                        Filesize

                                                        384KB

                                                      • memory/2632-287-0x0000000000400000-0x00000000005E7000-memory.dmp

                                                        Filesize

                                                        1.9MB

                                                      • memory/2632-337-0x0000000000400000-0x00000000005E7000-memory.dmp

                                                        Filesize

                                                        1.9MB

                                                      • memory/2632-55-0x0000000000230000-0x0000000000290000-memory.dmp

                                                        Filesize

                                                        384KB

                                                      • memory/2648-553-0x0000000000400000-0x00000000005E7000-memory.dmp

                                                        Filesize

                                                        1.9MB

                                                      • memory/2648-529-0x0000000000400000-0x00000000005E7000-memory.dmp

                                                        Filesize

                                                        1.9MB

                                                      • memory/2684-101-0x0000000010000000-0x00000000101DE000-memory.dmp

                                                        Filesize

                                                        1.9MB

                                                      • memory/2684-40-0x0000000000370000-0x00000000003D7000-memory.dmp

                                                        Filesize

                                                        412KB

                                                      • memory/2684-47-0x0000000000370000-0x00000000003D7000-memory.dmp

                                                        Filesize

                                                        412KB

                                                      • memory/2684-39-0x0000000010000000-0x00000000101DE000-memory.dmp

                                                        Filesize

                                                        1.9MB

                                                      • memory/2696-256-0x0000000000400000-0x00000000005E7000-memory.dmp

                                                        Filesize

                                                        1.9MB

                                                      • memory/2696-220-0x0000000000400000-0x00000000005E7000-memory.dmp

                                                        Filesize

                                                        1.9MB

                                                      • memory/2700-148-0x0000000140000000-0x0000000140237000-memory.dmp

                                                        Filesize

                                                        2.2MB

                                                      • memory/2700-341-0x0000000140000000-0x0000000140237000-memory.dmp

                                                        Filesize

                                                        2.2MB

                                                      • memory/2784-139-0x0000000140000000-0x00000001401DC000-memory.dmp

                                                        Filesize

                                                        1.9MB

                                                      • memory/2784-28-0x0000000000320000-0x0000000000380000-memory.dmp

                                                        Filesize

                                                        384KB

                                                      • memory/2784-36-0x0000000000320000-0x0000000000380000-memory.dmp

                                                        Filesize

                                                        384KB

                                                      • memory/2784-27-0x0000000140000000-0x00000001401DC000-memory.dmp

                                                        Filesize

                                                        1.9MB

                                                      • memory/2788-526-0x0000000000400000-0x00000000005E7000-memory.dmp

                                                        Filesize

                                                        1.9MB

                                                      • memory/2788-517-0x0000000003DA0000-0x0000000003E5A000-memory.dmp

                                                        Filesize

                                                        744KB

                                                      • memory/2812-568-0x0000000000400000-0x00000000005E7000-memory.dmp

                                                        Filesize

                                                        1.9MB

                                                      • memory/2836-939-0x000000001ACC0000-0x000000001AD08000-memory.dmp

                                                        Filesize

                                                        288KB

                                                      • memory/2836-937-0x0000000001980000-0x000000000198E000-memory.dmp

                                                        Filesize

                                                        56KB

                                                      • memory/2836-940-0x000000001AD10000-0x000000001AD26000-memory.dmp

                                                        Filesize

                                                        88KB

                                                      • memory/2836-938-0x000000001ACB0000-0x000000001ACBC000-memory.dmp

                                                        Filesize

                                                        48KB

                                                      • memory/2836-942-0x000000001ADD0000-0x000000001ADDE000-memory.dmp

                                                        Filesize

                                                        56KB

                                                      • memory/2836-943-0x000000001ADD0000-0x000000001ADDE000-memory.dmp

                                                        Filesize

                                                        56KB

                                                      • memory/2904-89-0x0000000100000000-0x00000001001E3000-memory.dmp

                                                        Filesize

                                                        1.9MB

                                                      • memory/2904-13-0x00000000008E0000-0x0000000000940000-memory.dmp

                                                        Filesize

                                                        384KB

                                                      • memory/2904-21-0x0000000100000000-0x00000001001E3000-memory.dmp

                                                        Filesize

                                                        1.9MB

                                                      • memory/2904-22-0x00000000008E0000-0x0000000000940000-memory.dmp

                                                        Filesize

                                                        384KB

                                                      • memory/2916-408-0x0000000000400000-0x00000000005E7000-memory.dmp

                                                        Filesize

                                                        1.9MB