Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    11/11/2024, 23:42

General

  • Target

    34cf9e5ac34516bb9000d64050f8ff4a6c24623efb216b0b4e386729a40d2b86.exe

  • Size

    1.4MB

  • MD5

    3598b66095a6c03c092a534e503c950d

  • SHA1

    30c147bf6c16e73a743aa7b0238917da8da7d4fe

  • SHA256

    34cf9e5ac34516bb9000d64050f8ff4a6c24623efb216b0b4e386729a40d2b86

  • SHA512

    3e5ef85f9dafbb952a076ccc038b86d48918e5ccfbdcc6c5b3ed75bfd334b32e3604587e433bab596d131172ab56336365a2a41b4e4320f94b4b4ff61b3ac2df

  • SSDEEP

    12288:DiXoH/uLJOyo937vGFWxwFJI+yeuVb8r+ZP712Ii+51cjVWtVj5JW:GU2JOt934J7Z6bQaj1BvUm9JW

Malware Config

Signatures

  • Executes dropped EXE 64 IoCs
  • Loads dropped DLL 56 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in System32 directory 15 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\34cf9e5ac34516bb9000d64050f8ff4a6c24623efb216b0b4e386729a40d2b86.exe
    "C:\Users\Admin\AppData\Local\Temp\34cf9e5ac34516bb9000d64050f8ff4a6c24623efb216b0b4e386729a40d2b86.exe"
    1⤵
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:2100
  • C:\Windows\System32\alg.exe
    C:\Windows\System32\alg.exe
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:1608
  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe
    C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe
    1⤵
    • Executes dropped EXE
    PID:2672
  • C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe
    C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe
    1⤵
    • Executes dropped EXE
    • Drops file in Windows directory
    PID:2856
  • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe
    C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe
    1⤵
    • Executes dropped EXE
    • Drops file in Windows directory
    PID:2860
  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
    C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2552
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1e4 -InterruptEvent 1d0 -NGENProcess 1d4 -Pipe 1e0 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1500
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1dc -InterruptEvent 248 -NGENProcess 250 -Pipe 254 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1984
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 248 -InterruptEvent 244 -NGENProcess 1ec -Pipe 240 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1424
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1dc -InterruptEvent 24c -NGENProcess 23c -Pipe 244 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2796
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 24c -InterruptEvent 260 -NGENProcess 258 -Pipe 238 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2508
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 24c -InterruptEvent 248 -NGENProcess 1dc -Pipe 250 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:1868
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 248 -InterruptEvent 1ec -NGENProcess 260 -Pipe 1e4 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2516
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1ec -InterruptEvent 23c -NGENProcess 25c -Pipe 258 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:784
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 26c -InterruptEvent 23c -NGENProcess 1ec -Pipe 1dc -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1948
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1d4 -InterruptEvent 24c -NGENProcess 274 -Pipe 26c -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2092
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 24c -InterruptEvent 270 -NGENProcess 1ec -Pipe 278 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1896
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 270 -InterruptEvent 264 -NGENProcess 268 -Pipe 260 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1392
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 264 -InterruptEvent 1d4 -NGENProcess 274 -Pipe 280 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:1236
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 248 -InterruptEvent 270 -NGENProcess 284 -Pipe 264 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:1124
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 270 -InterruptEvent 284 -NGENProcess 24c -Pipe 288 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:1956
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 284 -InterruptEvent 23c -NGENProcess 25c -Pipe 1ec -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2944
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 23c -InterruptEvent 28c -NGENProcess 248 -Pipe 268 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2724
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 28c -InterruptEvent 290 -NGENProcess 284 -Pipe 270 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1904
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 290 -InterruptEvent 298 -NGENProcess 248 -Pipe 274 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2092
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 298 -InterruptEvent 27c -NGENProcess 25c -Pipe 23c -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:1628
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 27c -InterruptEvent 29c -NGENProcess 294 -Pipe 1d4 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2168
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 29c -InterruptEvent 2a0 -NGENProcess 248 -Pipe 24c -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2656
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2a0 -InterruptEvent 2ac -NGENProcess 25c -Pipe 2a8 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2208
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1cc -InterruptEvent 254 -NGENProcess 2b0 -Pipe 240 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2420
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 254 -InterruptEvent 2c0 -NGENProcess 2a0 -Pipe 2bc -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:564
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2c0 -InterruptEvent 2a0 -NGENProcess 1c0 -Pipe 2c8 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:1956
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2b8 -InterruptEvent 1cc -NGENProcess 2cc -Pipe 2c0 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1476
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1cc -InterruptEvent 28c -NGENProcess 1c0 -Pipe 2b4 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      PID:2768
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 28c -InterruptEvent 2cc -NGENProcess 1c0 -Pipe 2c4 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2144
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2cc -InterruptEvent 2d8 -NGENProcess 2d0 -Pipe 2d4 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Windows directory
      PID:2832
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2d8 -InterruptEvent 2d0 -NGENProcess 28c -Pipe 2b0 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:1652
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2d0 -InterruptEvent 2e0 -NGENProcess 1c0 -Pipe 2a0 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Windows directory
      PID:2952
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2e0 -InterruptEvent 1c0 -NGENProcess 2d8 -Pipe 2dc -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2424
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1c0 -InterruptEvent 2f0 -NGENProcess 28c -Pipe 2ec -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:3060
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2f0 -InterruptEvent 28c -NGENProcess 2e0 -Pipe 2b8 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2748
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 28c -InterruptEvent 2f8 -NGENProcess 2d8 -Pipe 2d0 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Windows directory
      PID:1952
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2f8 -InterruptEvent 2d8 -NGENProcess 2f0 -Pipe 2f4 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1124
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2d8 -InterruptEvent 300 -NGENProcess 2e0 -Pipe 1c0 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      PID:896
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 300 -InterruptEvent 2e0 -NGENProcess 2f8 -Pipe 2fc -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2668
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2e0 -InterruptEvent 308 -NGENProcess 2f0 -Pipe 28c -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      PID:2204
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 308 -InterruptEvent 2f0 -NGENProcess 300 -Pipe 304 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:1708
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2f0 -InterruptEvent 310 -NGENProcess 2f8 -Pipe 2d8 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Windows directory
      PID:2840
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 310 -InterruptEvent 2f8 -NGENProcess 308 -Pipe 30c -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1052
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2f8 -InterruptEvent 318 -NGENProcess 300 -Pipe 2e0 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:2280
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 318 -InterruptEvent 300 -NGENProcess 310 -Pipe 314 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2860
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 300 -InterruptEvent 320 -NGENProcess 308 -Pipe 2f0 -Comment "NGen Worker Process"
      2⤵
      • Loads dropped DLL
      PID:2936
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 320 -InterruptEvent 308 -NGENProcess 318 -Pipe 31c -Comment "NGen Worker Process"
      2⤵
        PID:1884
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 308 -InterruptEvent 328 -NGENProcess 310 -Pipe 2f8 -Comment "NGen Worker Process"
        2⤵
        • Loads dropped DLL
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        PID:2028
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 328 -InterruptEvent 310 -NGENProcess 320 -Pipe 324 -Comment "NGen Worker Process"
        2⤵
          PID:1616
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
          C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 310 -InterruptEvent 330 -NGENProcess 318 -Pipe 300 -Comment "NGen Worker Process"
          2⤵
          • Loads dropped DLL
          • Drops file in Windows directory
          PID:2152
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
          C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 330 -InterruptEvent 318 -NGENProcess 328 -Pipe 32c -Comment "NGen Worker Process"
          2⤵
          • System Location Discovery: System Language Discovery
          PID:1444
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
          C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 318 -InterruptEvent 338 -NGENProcess 320 -Pipe 308 -Comment "NGen Worker Process"
          2⤵
          • Loads dropped DLL
          • Drops file in Windows directory
          PID:924
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
          C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 338 -InterruptEvent 320 -NGENProcess 330 -Pipe 334 -Comment "NGen Worker Process"
          2⤵
            PID:2796
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
            C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 320 -InterruptEvent 340 -NGENProcess 328 -Pipe 310 -Comment "NGen Worker Process"
            2⤵
            • Loads dropped DLL
            • Drops file in Windows directory
            • System Location Discovery: System Language Discovery
            PID:2916
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
            C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 340 -InterruptEvent 328 -NGENProcess 338 -Pipe 33c -Comment "NGen Worker Process"
            2⤵
            • System Location Discovery: System Language Discovery
            PID:2164
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
            C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 328 -InterruptEvent 348 -NGENProcess 330 -Pipe 318 -Comment "NGen Worker Process"
            2⤵
            • Loads dropped DLL
            • Drops file in Windows directory
            • System Location Discovery: System Language Discovery
            PID:1436
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
            C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 348 -InterruptEvent 330 -NGENProcess 340 -Pipe 344 -Comment "NGen Worker Process"
            2⤵
              PID:1100
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
              C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 330 -InterruptEvent 350 -NGENProcess 338 -Pipe 320 -Comment "NGen Worker Process"
              2⤵
              • Loads dropped DLL
              • Drops file in Windows directory
              • System Location Discovery: System Language Discovery
              PID:1520
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
              C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 350 -InterruptEvent 338 -NGENProcess 348 -Pipe 34c -Comment "NGen Worker Process"
              2⤵
              • System Location Discovery: System Language Discovery
              • Modifies data under HKEY_USERS
              PID:2200
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
              C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 338 -InterruptEvent 358 -NGENProcess 340 -Pipe 328 -Comment "NGen Worker Process"
              2⤵
                PID:2660
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 358 -InterruptEvent 35c -NGENProcess 354 -Pipe 254 -Comment "NGen Worker Process"
                2⤵
                • System Location Discovery: System Language Discovery
                PID:764
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 35c -InterruptEvent 360 -NGENProcess 348 -Pipe 330 -Comment "NGen Worker Process"
                2⤵
                • System Location Discovery: System Language Discovery
                PID:2352
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 360 -InterruptEvent 364 -NGENProcess 340 -Pipe 2e8 -Comment "NGen Worker Process"
                2⤵
                • Loads dropped DLL
                • Drops file in Windows directory
                PID:1752
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 364 -InterruptEvent 340 -NGENProcess 35c -Pipe 354 -Comment "NGen Worker Process"
                2⤵
                • Loads dropped DLL
                • Drops file in Windows directory
                PID:2548
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 340 -InterruptEvent 35c -NGENProcess 350 -Pipe 348 -Comment "NGen Worker Process"
                2⤵
                  PID:1716
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                  C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 35c -InterruptEvent 370 -NGENProcess 368 -Pipe 358 -Comment "NGen Worker Process"
                  2⤵
                  • System Location Discovery: System Language Discovery
                  PID:3064
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                  C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 370 -InterruptEvent 374 -NGENProcess 36c -Pipe 360 -Comment "NGen Worker Process"
                  2⤵
                  • System Location Discovery: System Language Discovery
                  • Modifies data under HKEY_USERS
                  PID:1900
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                  C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 374 -InterruptEvent 378 -NGENProcess 350 -Pipe 364 -Comment "NGen Worker Process"
                  2⤵
                    PID:2612
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                    C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 378 -InterruptEvent 37c -NGENProcess 368 -Pipe 338 -Comment "NGen Worker Process"
                    2⤵
                      PID:1204
                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 37c -InterruptEvent 380 -NGENProcess 36c -Pipe 340 -Comment "NGen Worker Process"
                      2⤵
                        PID:896
                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 380 -InterruptEvent 384 -NGENProcess 350 -Pipe 35c -Comment "NGen Worker Process"
                        2⤵
                          PID:1684
                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                          C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 384 -InterruptEvent 388 -NGENProcess 368 -Pipe 370 -Comment "NGen Worker Process"
                          2⤵
                          • System Location Discovery: System Language Discovery
                          PID:844
                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                          C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 388 -InterruptEvent 38c -NGENProcess 36c -Pipe 374 -Comment "NGen Worker Process"
                          2⤵
                            PID:1996
                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                            C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 38c -InterruptEvent 390 -NGENProcess 350 -Pipe 378 -Comment "NGen Worker Process"
                            2⤵
                            • System Location Discovery: System Language Discovery
                            PID:2084
                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                            C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 390 -InterruptEvent 394 -NGENProcess 368 -Pipe 37c -Comment "NGen Worker Process"
                            2⤵
                            • System Location Discovery: System Language Discovery
                            PID:404
                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                            C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 394 -InterruptEvent 398 -NGENProcess 36c -Pipe 380 -Comment "NGen Worker Process"
                            2⤵
                            • System Location Discovery: System Language Discovery
                            PID:2308
                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                            C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 398 -InterruptEvent 39c -NGENProcess 350 -Pipe 384 -Comment "NGen Worker Process"
                            2⤵
                            • System Location Discovery: System Language Discovery
                            PID:2876
                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                            C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 39c -InterruptEvent 3a0 -NGENProcess 368 -Pipe 388 -Comment "NGen Worker Process"
                            2⤵
                              PID:444
                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                              C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3a0 -InterruptEvent 3a4 -NGENProcess 36c -Pipe 38c -Comment "NGen Worker Process"
                              2⤵
                                PID:1408
                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3a4 -InterruptEvent 368 -NGENProcess 350 -Pipe 3ac -Comment "NGen Worker Process"
                                2⤵
                                • Modifies data under HKEY_USERS
                                PID:1432
                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 368 -InterruptEvent 3a8 -NGENProcess 390 -Pipe 394 -Comment "NGen Worker Process"
                                2⤵
                                • System Location Discovery: System Language Discovery
                                PID:2224
                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3a8 -InterruptEvent 3b0 -NGENProcess 36c -Pipe 398 -Comment "NGen Worker Process"
                                2⤵
                                • System Location Discovery: System Language Discovery
                                PID:784
                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3b0 -InterruptEvent 3b4 -NGENProcess 350 -Pipe 39c -Comment "NGen Worker Process"
                                2⤵
                                • System Location Discovery: System Language Discovery
                                PID:1772
                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3b4 -InterruptEvent 3b8 -NGENProcess 390 -Pipe 3a0 -Comment "NGen Worker Process"
                                2⤵
                                  PID:2160
                                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                  C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3b8 -InterruptEvent 3bc -NGENProcess 36c -Pipe 3a4 -Comment "NGen Worker Process"
                                  2⤵
                                    PID:2712
                                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                    C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3bc -InterruptEvent 3c0 -NGENProcess 350 -Pipe 368 -Comment "NGen Worker Process"
                                    2⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:1732
                                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                    C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3c0 -InterruptEvent 3c4 -NGENProcess 390 -Pipe 3a8 -Comment "NGen Worker Process"
                                    2⤵
                                      PID:1988
                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3c4 -InterruptEvent 3c8 -NGENProcess 36c -Pipe 3b0 -Comment "NGen Worker Process"
                                      2⤵
                                      • Modifies data under HKEY_USERS
                                      PID:948
                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3c8 -InterruptEvent 3cc -NGENProcess 350 -Pipe 3b4 -Comment "NGen Worker Process"
                                      2⤵
                                      • System Location Discovery: System Language Discovery
                                      • Modifies data under HKEY_USERS
                                      PID:2556
                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3cc -InterruptEvent 3d0 -NGENProcess 390 -Pipe 3b8 -Comment "NGen Worker Process"
                                      2⤵
                                      • Modifies data under HKEY_USERS
                                      PID:2344
                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3d0 -InterruptEvent 3d4 -NGENProcess 36c -Pipe 3bc -Comment "NGen Worker Process"
                                      2⤵
                                      • Modifies data under HKEY_USERS
                                      PID:1908
                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3d0 -InterruptEvent 36c -NGENProcess 3d4 -Pipe 3d8 -Comment "NGen Worker Process"
                                      2⤵
                                      • System Location Discovery: System Language Discovery
                                      • Modifies data under HKEY_USERS
                                      PID:444
                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 36c -InterruptEvent 3dc -NGENProcess 390 -Pipe 3c4 -Comment "NGen Worker Process"
                                      2⤵
                                      • Modifies data under HKEY_USERS
                                      PID:3064
                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3dc -InterruptEvent 3e0 -NGENProcess 3c0 -Pipe 3c8 -Comment "NGen Worker Process"
                                      2⤵
                                      • Modifies data under HKEY_USERS
                                      PID:1928
                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3e0 -InterruptEvent 3e4 -NGENProcess 3d4 -Pipe 3cc -Comment "NGen Worker Process"
                                      2⤵
                                      • System Location Discovery: System Language Discovery
                                      • Modifies data under HKEY_USERS
                                      PID:2380
                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3e4 -InterruptEvent 3e8 -NGENProcess 390 -Pipe 350 -Comment "NGen Worker Process"
                                      2⤵
                                      • Modifies data under HKEY_USERS
                                      PID:876
                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3e8 -InterruptEvent 3ec -NGENProcess 3c0 -Pipe 3d0 -Comment "NGen Worker Process"
                                      2⤵
                                      • System Location Discovery: System Language Discovery
                                      • Modifies data under HKEY_USERS
                                      PID:1104
                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3ec -InterruptEvent 3f0 -NGENProcess 3d4 -Pipe 36c -Comment "NGen Worker Process"
                                      2⤵
                                      • System Location Discovery: System Language Discovery
                                      • Modifies data under HKEY_USERS
                                      PID:2128
                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3f0 -InterruptEvent 3dc -NGENProcess 3e0 -Pipe 3f4 -Comment "NGen Worker Process"
                                      2⤵
                                      • Modifies data under HKEY_USERS
                                      PID:844
                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3dc -InterruptEvent 3f8 -NGENProcess 3c0 -Pipe 390 -Comment "NGen Worker Process"
                                      2⤵
                                      • Loads dropped DLL
                                      • Drops file in Windows directory
                                      • Modifies data under HKEY_USERS
                                      PID:2504
                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3f8 -InterruptEvent 3c0 -NGENProcess 3f0 -Pipe 3d4 -Comment "NGen Worker Process"
                                      2⤵
                                      • System Location Discovery: System Language Discovery
                                      • Modifies data under HKEY_USERS
                                      PID:2136
                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3c0 -InterruptEvent 404 -NGENProcess 3e0 -Pipe 3e8 -Comment "NGen Worker Process"
                                      2⤵
                                      • Loads dropped DLL
                                      • Drops file in Windows directory
                                      • System Location Discovery: System Language Discovery
                                      • Modifies data under HKEY_USERS
                                      PID:1472
                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 404 -InterruptEvent 3c0 -NGENProcess 40c -Pipe 3f8 -Comment "NGen Worker Process"
                                      2⤵
                                      • System Location Discovery: System Language Discovery
                                      • Modifies data under HKEY_USERS
                                      PID:1880
                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3c0 -InterruptEvent 3ec -NGENProcess 3e0 -Pipe 3dc -Comment "NGen Worker Process"
                                      2⤵
                                      • Loads dropped DLL
                                      • Drops file in Windows directory
                                      • System Location Discovery: System Language Discovery
                                      • Modifies data under HKEY_USERS
                                      PID:2860
                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 410 -InterruptEvent 404 -NGENProcess 414 -Pipe 3c0 -Comment "NGen Worker Process"
                                      2⤵
                                        PID:3004
                                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 404 -InterruptEvent 2cc -NGENProcess 3e0 -Pipe 3fc -Comment "NGen Worker Process"
                                        2⤵
                                        • Modifies data under HKEY_USERS
                                        PID:2420
                                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2cc -InterruptEvent 418 -NGENProcess 3ec -Pipe 3f0 -Comment "NGen Worker Process"
                                        2⤵
                                        • Loads dropped DLL
                                        • Drops file in Windows directory
                                        • System Location Discovery: System Language Discovery
                                        • Modifies data under HKEY_USERS
                                        PID:1500
                                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 418 -InterruptEvent 3ec -NGENProcess 404 -Pipe 414 -Comment "NGen Worker Process"
                                        2⤵
                                          PID:900
                                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                          C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3ec -InterruptEvent 420 -NGENProcess 3e0 -Pipe 408 -Comment "NGen Worker Process"
                                          2⤵
                                            PID:1960
                                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                            C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 420 -InterruptEvent 424 -NGENProcess 41c -Pipe 410 -Comment "NGen Worker Process"
                                            2⤵
                                              PID:2128
                                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                              C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 424 -InterruptEvent 428 -NGENProcess 404 -Pipe 2cc -Comment "NGen Worker Process"
                                              2⤵
                                                PID:2660
                                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 428 -InterruptEvent 42c -NGENProcess 3e0 -Pipe 3e4 -Comment "NGen Worker Process"
                                                2⤵
                                                  PID:2972
                                                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                  C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 42c -InterruptEvent 430 -NGENProcess 41c -Pipe 418 -Comment "NGen Worker Process"
                                                  2⤵
                                                  • System Location Discovery: System Language Discovery
                                                  PID:2592
                                                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                  C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 430 -InterruptEvent 434 -NGENProcess 404 -Pipe 3ec -Comment "NGen Worker Process"
                                                  2⤵
                                                  • System Location Discovery: System Language Discovery
                                                  PID:804
                                                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                  C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 434 -InterruptEvent 438 -NGENProcess 3e0 -Pipe 420 -Comment "NGen Worker Process"
                                                  2⤵
                                                    PID:2344
                                                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                    C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 438 -InterruptEvent 43c -NGENProcess 41c -Pipe 424 -Comment "NGen Worker Process"
                                                    2⤵
                                                      PID:1060
                                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 43c -InterruptEvent 440 -NGENProcess 404 -Pipe 428 -Comment "NGen Worker Process"
                                                      2⤵
                                                      • System Location Discovery: System Language Discovery
                                                      PID:564
                                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 440 -InterruptEvent 444 -NGENProcess 3e0 -Pipe 42c -Comment "NGen Worker Process"
                                                      2⤵
                                                        PID:2628
                                                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 444 -InterruptEvent 448 -NGENProcess 41c -Pipe 430 -Comment "NGen Worker Process"
                                                        2⤵
                                                        • System Location Discovery: System Language Discovery
                                                        PID:2700
                                                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 448 -InterruptEvent 44c -NGENProcess 404 -Pipe 434 -Comment "NGen Worker Process"
                                                        2⤵
                                                          PID:2196
                                                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                          C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 44c -InterruptEvent 450 -NGENProcess 3e0 -Pipe 438 -Comment "NGen Worker Process"
                                                          2⤵
                                                            PID:2452
                                                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                            C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 450 -InterruptEvent 454 -NGENProcess 41c -Pipe 43c -Comment "NGen Worker Process"
                                                            2⤵
                                                              PID:2596
                                                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                              C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 454 -InterruptEvent 458 -NGENProcess 404 -Pipe 440 -Comment "NGen Worker Process"
                                                              2⤵
                                                                PID:932
                                                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 458 -InterruptEvent 45c -NGENProcess 3e0 -Pipe 444 -Comment "NGen Worker Process"
                                                                2⤵
                                                                  PID:2584
                                                                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                  C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 45c -InterruptEvent 460 -NGENProcess 41c -Pipe 448 -Comment "NGen Worker Process"
                                                                  2⤵
                                                                    PID:2084
                                                                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                    C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 460 -InterruptEvent 464 -NGENProcess 404 -Pipe 44c -Comment "NGen Worker Process"
                                                                    2⤵
                                                                      PID:1736
                                                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 464 -InterruptEvent 468 -NGENProcess 3e0 -Pipe 450 -Comment "NGen Worker Process"
                                                                      2⤵
                                                                      • Loads dropped DLL
                                                                      • Drops file in Windows directory
                                                                      • System Location Discovery: System Language Discovery
                                                                      PID:2520
                                                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 468 -InterruptEvent 3e0 -NGENProcess 460 -Pipe 41c -Comment "NGen Worker Process"
                                                                      2⤵
                                                                      • System Location Discovery: System Language Discovery
                                                                      PID:2340
                                                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3e0 -InterruptEvent 470 -NGENProcess 404 -Pipe 458 -Comment "NGen Worker Process"
                                                                      2⤵
                                                                      • Loads dropped DLL
                                                                      • Drops file in Windows directory
                                                                      • System Location Discovery: System Language Discovery
                                                                      PID:2748
                                                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 470 -InterruptEvent 404 -NGENProcess 468 -Pipe 46c -Comment "NGen Worker Process"
                                                                      2⤵
                                                                      • System Location Discovery: System Language Discovery
                                                                      PID:1660
                                                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 404 -InterruptEvent 478 -NGENProcess 460 -Pipe 464 -Comment "NGen Worker Process"
                                                                      2⤵
                                                                        PID:676
                                                                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 478 -InterruptEvent 47c -NGENProcess 474 -Pipe 454 -Comment "NGen Worker Process"
                                                                        2⤵
                                                                          PID:1740
                                                                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                          C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 47c -InterruptEvent 480 -NGENProcess 468 -Pipe 3e0 -Comment "NGen Worker Process"
                                                                          2⤵
                                                                            PID:2536
                                                                        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
                                                                          C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
                                                                          1⤵
                                                                          • Executes dropped EXE
                                                                          • Drops file in Windows directory
                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                          PID:1384
                                                                          • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
                                                                            C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 1d0 -InterruptEvent 1bc -NGENProcess 1c0 -Pipe 1cc -Comment "NGen Worker Process"
                                                                            2⤵
                                                                            • Executes dropped EXE
                                                                            PID:1376
                                                                          • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
                                                                            C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 1c8 -InterruptEvent 234 -NGENProcess 23c -Pipe 240 -Comment "NGen Worker Process"
                                                                            2⤵
                                                                            • Executes dropped EXE
                                                                            PID:1204
                                                                        • C:\Windows\ehome\ehRecvr.exe
                                                                          C:\Windows\ehome\ehRecvr.exe
                                                                          1⤵
                                                                          • Executes dropped EXE
                                                                          • Modifies data under HKEY_USERS
                                                                          PID:2504
                                                                        • C:\Windows\ehome\ehsched.exe
                                                                          C:\Windows\ehome\ehsched.exe
                                                                          1⤵
                                                                          • Executes dropped EXE
                                                                          PID:1612
                                                                        • C:\Windows\eHome\EhTray.exe
                                                                          "C:\Windows\eHome\EhTray.exe" /nav:-2
                                                                          1⤵
                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                          • Suspicious use of FindShellTrayWindow
                                                                          • Suspicious use of SendNotifyMessage
                                                                          PID:2772
                                                                        • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                                                                          "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                                                                          1⤵
                                                                          • Executes dropped EXE
                                                                          PID:2888
                                                                        • C:\Windows\system32\IEEtwCollector.exe
                                                                          C:\Windows\system32\IEEtwCollector.exe /V
                                                                          1⤵
                                                                          • Executes dropped EXE
                                                                          PID:552
                                                                        • C:\Windows\ehome\ehRec.exe
                                                                          C:\Windows\ehome\ehRec.exe -Embedding
                                                                          1⤵
                                                                          • Modifies data under HKEY_USERS
                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                          PID:1592
                                                                        • C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE
                                                                          "C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE" /auditservice
                                                                          1⤵
                                                                          • Executes dropped EXE
                                                                          • Drops file in System32 directory
                                                                          PID:1292
                                                                        • C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe
                                                                          "C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"
                                                                          1⤵
                                                                          • Executes dropped EXE
                                                                          PID:2620
                                                                        • C:\Windows\System32\msdtc.exe
                                                                          C:\Windows\System32\msdtc.exe
                                                                          1⤵
                                                                          • Executes dropped EXE
                                                                          • Drops file in System32 directory
                                                                          • Drops file in Windows directory
                                                                          PID:3048
                                                                        • C:\Windows\system32\msiexec.exe
                                                                          C:\Windows\system32\msiexec.exe /V
                                                                          1⤵
                                                                          • Executes dropped EXE
                                                                          • Loads dropped DLL
                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                          PID:1072
                                                                        • C:\Program Files (x86)\Common Files\Microsoft Shared\Source Engine\OSE.EXE
                                                                          "C:\Program Files (x86)\Common Files\Microsoft Shared\Source Engine\OSE.EXE"
                                                                          1⤵
                                                                          • Executes dropped EXE
                                                                          PID:2500
                                                                        • C:\Windows\SysWow64\perfhost.exe
                                                                          C:\Windows\SysWow64\perfhost.exe
                                                                          1⤵
                                                                          • Executes dropped EXE
                                                                          • System Location Discovery: System Language Discovery
                                                                          PID:2580

                                                                        Network

                                                                              MITRE ATT&CK Enterprise v15

                                                                              Replay Monitor

                                                                              Loading Replay Monitor...

                                                                              Downloads

                                                                              • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\ose.exe

                                                                                Filesize

                                                                                1.5MB

                                                                                MD5

                                                                                0b0006cf35447f8fa4e0e0c8225b5f76

                                                                                SHA1

                                                                                f262d9cdfc91b99c672abcc0c75c92d2f7969850

                                                                                SHA256

                                                                                3c8654dd2dc957915be77cefd2a2ed3d3982df26366c9389c915ef08f529f5f4

                                                                                SHA512

                                                                                2020c88e7a46d38d37a1ca14310a010c687fd5bba6f106c4eaf7b915e16d8773e25ad2d5fee878df3579d4332678230b225b7d659f0ec9fd32c38a0c135d8ecb

                                                                              • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\setup.exe

                                                                                Filesize

                                                                                1.6MB

                                                                                MD5

                                                                                49e5b34f95d6d28df4cf9fa2e6050b90

                                                                                SHA1

                                                                                4bfe70c18050b636586651a8b76af70826985348

                                                                                SHA256

                                                                                86eb4573df1f51cd4afe159dcac614220cfdd730a81ba4f34d8833851f4df570

                                                                                SHA512

                                                                                224e985e4f049ea99f48bf219cf2b571e2e7040d663f708e41efbbb576973ac0e0ace8e6c9a0c27ac361ae5c9d2d5cabf28f410eec4e46f3c3e75d71cb7f5aea

                                                                              • C:\MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\DW20.EXE

                                                                                Filesize

                                                                                1.3MB

                                                                                MD5

                                                                                28721e4172b5ddc29beb7bdcb0a1e2b5

                                                                                SHA1

                                                                                0e8a3785344ca0d17e905d396ac11024b7dc76a7

                                                                                SHA256

                                                                                3aa6d11c67e63dcd852bed6e698b2bcd0b1ff5008d8091a9f7921743c387fc95

                                                                                SHA512

                                                                                f8c47ad107eeef3cc76f22c8bef4a2551afeaa53bff0bf2d0e3996a0a93757662d851aa78c99879b74b6176b8ccb48301cdb3ebba08035df7799337268b84235

                                                                              • C:\MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\dwtrig20.exe

                                                                                Filesize

                                                                                1.9MB

                                                                                MD5

                                                                                6b0107f3415026708ab0addaf7fec986

                                                                                SHA1

                                                                                fa264a145609fc27022363038ddc8b77498f3f78

                                                                                SHA256

                                                                                480e05667123d4488cc34af658642bf9394eda8f9de263a485f9440d9682403a

                                                                                SHA512

                                                                                ec4abe66048dc1dadd86f3e0a51c97c4764b8daff8d7df3a94dbb974ed214470c4d2800ece3e8a931859817c0132fe8aa83779881930cbde3f7a230e30aba99d

                                                                              • C:\Program Files (x86)\Common Files\microsoft shared\Source Engine\OSE.EXE

                                                                                Filesize

                                                                                1.5MB

                                                                                MD5

                                                                                fd05e62ede12aa46007aa5278ce3e5c5

                                                                                SHA1

                                                                                fdd5e4bbaa47a85a19d27e0299c6074dd67e19d4

                                                                                SHA256

                                                                                43221186a4c9f63643a7ab5ccb0ab0ec2cbd3fb1348ab6017b2838d91bbf5ef2

                                                                                SHA512

                                                                                82a57c868c1b76d6b205943926748502c8912d68b26e59dbbb3674e8694b5087f4a6b9d3ca7d481ce5756e753dd9e7f0274be0e7c40a4f2ca13a051b2673fb9a

                                                                              • C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE

                                                                                Filesize

                                                                                30.1MB

                                                                                MD5

                                                                                9fd8f694b0bfea9d0f4f0fad4e284768

                                                                                SHA1

                                                                                00dd238464b314582b58f171d65107bea1aa2875

                                                                                SHA256

                                                                                887b655fcce8f73d0e360e4a84ce76dc3574459e702ee0d3edc43a46de8634c0

                                                                                SHA512

                                                                                0b052bf420a62f48fe31698050488f851c30b298a53d00caf1392893656ffbcb297d902bbc5fb6c8d1b8542ff10fdb3716c14db914e7d6f4b3b278eeccb96f4f

                                                                              • C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe

                                                                                Filesize

                                                                                1.6MB

                                                                                MD5

                                                                                9b144d6e0288ea7332310d290c90750b

                                                                                SHA1

                                                                                abefc752d161b9b83c52a58af795ddcc35dd60cf

                                                                                SHA256

                                                                                f71a92a38af72ce8200288f0ed6e3dd8ba8b0a48f53e5961f6709439d098255d

                                                                                SHA512

                                                                                2b9c61475a8a4ac2bb52768f270b5dda91cea4ddcd45c682f464872258fdd4baa33eb5e47b310706fe1cd9c932be383181e180370e46cbbc447853727c25dd86

                                                                              • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe

                                                                                Filesize

                                                                                2.1MB

                                                                                MD5

                                                                                decf053dfedb8971b5a3dfa1ecd5e1fe

                                                                                SHA1

                                                                                a1303a652e146f297eb9a008a1efdfd3f41e736a

                                                                                SHA256

                                                                                411ce10756fce71e971000d3f5f48773934a512e0930735a1ba0899a16e587e9

                                                                                SHA512

                                                                                029c34ee29762e45dbc28476cb83d959c53f2e065a27fd73c4d48aadf025ccd6816d54bed1642cf0128a98f8c502b9fae416f4d0df297aeb1a8420f9342fd09e

                                                                              • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b91050d8b077a4e8.customDestinations-ms

                                                                                Filesize

                                                                                24B

                                                                                MD5

                                                                                b9bd716de6739e51c620f2086f9c31e4

                                                                                SHA1

                                                                                9733d94607a3cba277e567af584510edd9febf62

                                                                                SHA256

                                                                                7116ff028244a01f3d17f1d3bc2e1506bc9999c2e40e388458f0cccc4e117312

                                                                                SHA512

                                                                                cef609e54c7a81a646ad38dba7ac0b82401b220773b9c792cefac80c6564753229f0c011b34ffb56381dd3154a19aee2bf5f602c4d1af01f2cf0fbc1574e4478

                                                                              • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ngen_service.log

                                                                                Filesize

                                                                                872KB

                                                                                MD5

                                                                                87ded53ad86959ac6f33f03abed177ce

                                                                                SHA1

                                                                                5d1f9dd666cf5695fabce177be8d835a26ff6810

                                                                                SHA256

                                                                                4a206400c3814cdf097744163b281732a4677ccb690bb5043d34f5f4af9aa00b

                                                                                SHA512

                                                                                6015044093410907b169c040be0522cab625b34ea97e861515e9f2f62362a57ecdb5ab8d37e793a5160ba52bdda63101e5b3a5d23af20116b4b6f8a401bb5911

                                                                              • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe

                                                                                Filesize

                                                                                1.5MB

                                                                                MD5

                                                                                04be5424fad71c5f705930472e1a7b38

                                                                                SHA1

                                                                                e936bd60c4f18a33a393674cc03b789542ac6a1b

                                                                                SHA256

                                                                                cd73a91de729b91ff048c478e2528346bcd309d9b9e9d71854b2228a3dcb0185

                                                                                SHA512

                                                                                3679003fb6d3736b065d3353d4b95317f29a3eec1d530cf489e7b962784f439994effbca61e1bf6e4fc71254346dd342ed4dfad65313969872600d5b41011ec4

                                                                              • C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe

                                                                                Filesize

                                                                                1.4MB

                                                                                MD5

                                                                                ad6d36fabf0b56f1b3ef70bfe3857973

                                                                                SHA1

                                                                                3be3076ad4583c2522f70150e379db671c73061c

                                                                                SHA256

                                                                                a77fe5814ab3cf422248bbf092b9a8d12b8069fe2b0b87d8709881d7e8ff2b59

                                                                                SHA512

                                                                                78d8a50a3fd3a96264a7d116efe426c88b54e4a2cf38cc8ec5c35c518e078416f470c35b9ca47d98039a642d87268fabb27af2da439faa79bb97998398355d52

                                                                              • C:\Windows\Microsoft.NET\Framework\v2.0.50727\ngen_service.log

                                                                                Filesize

                                                                                1003KB

                                                                                MD5

                                                                                f008119eff79d9881cb61659075a61b8

                                                                                SHA1

                                                                                108a55f43c26fde172ef3cf717cca8c633b857f9

                                                                                SHA256

                                                                                7d8debe33637aa5c9427071493e54c5c9da9aec147fdcb2f62453d49690ed43d

                                                                                SHA512

                                                                                75e286dc522018afe20ae029c164c79cfc3e4e98434594e5497896dac86010958591f4e8fd5dd2f884a0ed9cf0a80b1a88c56b976ce9c84990a0c7e3ac20d84c

                                                                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe

                                                                                Filesize

                                                                                1.5MB

                                                                                MD5

                                                                                a1aefe049eed0b1e0ab2e43c90d13f91

                                                                                SHA1

                                                                                c0840d6ac74e8dba6b94ff428601cb0ff8e052fe

                                                                                SHA256

                                                                                5a78d13d96613d36ae3073e70ff5f55542f46f391fb55113b301c426a254ba3f

                                                                                SHA512

                                                                                2db5dd6f2a9a5770a382f517a6a66d26866e2476500f6936a6c62950527e59f4771917762f4a18b8533e87bd3b9286e6a2bf1a79cec58d093a5b5a31133c4556

                                                                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen_service.log

                                                                                Filesize

                                                                                8KB

                                                                                MD5

                                                                                a26acc4c7bbfa64cc0c3368c1b1fb0c0

                                                                                SHA1

                                                                                55970e941d92e1ae7c262f57f6d3bd1701167eaa

                                                                                SHA256

                                                                                91b0397b7affa85c7af6288fd13ea5f267b3e4597868ed40b543f8aca5e4d958

                                                                                SHA512

                                                                                df469bf164330eb22cbca20f92d88004408e047ec265db11e939846e4c096b7100ba3bbfaa3cad3c51a5c00b07e6f1702a96d360ea8bb145f7fdcf598bcb827c

                                                                              • C:\Windows\SysWOW64\perfhost.exe

                                                                                Filesize

                                                                                1.4MB

                                                                                MD5

                                                                                1b57cf5a6f5b41e6ae283afda28b7164

                                                                                SHA1

                                                                                0d2bed9930afe2c3809e02bead53f158e90708f1

                                                                                SHA256

                                                                                c7647146608d4c238c4d385ea7ebddc2c2a56215055fa363b92f98eb9c94d233

                                                                                SHA512

                                                                                97fd9d063d42b15a5110e165084c268477cab3d777c41f802a27b43f31fb13c4372aa74ccb52aa71b069781526154dbebe4a92f2a32afbbdf17d11b69f758330

                                                                              • C:\Windows\System32\ieetwcollector.exe

                                                                                Filesize

                                                                                1.5MB

                                                                                MD5

                                                                                a80763baeb3dec7652482fe213560cef

                                                                                SHA1

                                                                                374dfa6fd9077e5df2c026d9c3223593a8ed9ea5

                                                                                SHA256

                                                                                f0a40fca1ecc11bac277f737083c7a117db19a37f47c7211d2c4d25bb61a0b4e

                                                                                SHA512

                                                                                6e18df2ff2714994f4ed8b1c39a3d09ac3258c86540416dbdd0e5a057f43872f812968b6a07364a48b4b0786ec426b79c003d11c8bab9254eedfd201bc904486

                                                                              • C:\Windows\System32\msdtc.exe

                                                                                Filesize

                                                                                1.5MB

                                                                                MD5

                                                                                c9cc777d046277004bbf52d5bd55c9d7

                                                                                SHA1

                                                                                39235acd33bbd054e2f65a543f8167cac8bb67ae

                                                                                SHA256

                                                                                310a09b24f744f3267c7ce08cf8b09a967d082a6eaee1618b3848e803194bc5a

                                                                                SHA512

                                                                                012f3b502e6d13888c90de1258d913383c311023de9a7df03498a742762ed33b34d0484e6510311a8d2abacbb021b76c2cdace487cd23314fdf36a2160e58480

                                                                              • C:\Windows\System32\msiexec.exe

                                                                                Filesize

                                                                                1.5MB

                                                                                MD5

                                                                                8b59fd17272e9003c02121a30b0c606a

                                                                                SHA1

                                                                                e3426e6ed9fa2ac3509bc60448bbe41169991450

                                                                                SHA256

                                                                                00b4633a0d182c9ea413d2f564316fb480d217462c18c8214e0ce1926f45aa12

                                                                                SHA512

                                                                                2c48decc7325e928fee5f735a48edce49b5d79c4ed917cd73b50cb4636d1ce780b9d1cde6e865e2e96d6dc4d937ac2d81bdf4019f779192d93a34092917d6d3f

                                                                              • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.Office.To#\135228e87b2c27d26b516ac0fc0ce667\Microsoft.Office.Tools.Word.v9.0.ni.dll

                                                                                Filesize

                                                                                834KB

                                                                                MD5

                                                                                c76656b09bb7df6bd2ac1a6177a0027c

                                                                                SHA1

                                                                                0c296994a249e8649b19be84dce27c9ddafef3e0

                                                                                SHA256

                                                                                a0ae0aec5b203865fac761023741a59d274e2c41889aeb69140eb746d38f6ce0

                                                                                SHA512

                                                                                8390879b8812fc98c17702a52259d510a7fe8bc3cf4972e89f705e93bc8fa98300c34d49f3aec869da8d9f786d33004742e4538019c0f852c61db89c302d5fdf

                                                                              • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.Office.To#\5766ec3721d18a48bec1ca1f60331e2d\Microsoft.Office.Tools.Common.v9.0.ni.dll

                                                                                Filesize

                                                                                797KB

                                                                                MD5

                                                                                aeb0b6e6c5d32d1ada231285ff2ae881

                                                                                SHA1

                                                                                1f04a1c059503896336406aed1dc93340e90b742

                                                                                SHA256

                                                                                4c53ca542ac5ef9d822ef8cb3b0ecef3fb8b937d94c0a7b735bedb275c74a263

                                                                                SHA512

                                                                                e55fd4c4d2966b3f0b6e88292fbd6c20ffa34766e076e763442c15212d19b6dea5d9dc9e7c359d999674a5b2c8a3849c2bbaaf83e7aa8c12715028b06b5a48e1

                                                                              • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.Office.To#\60214b09b490be856c4ee2b3398d71bd\Microsoft.Office.Tools.Outlook.v9.0.ni.dll

                                                                                Filesize

                                                                                163KB

                                                                                MD5

                                                                                e88828b5a35063aa16c68ffb8322215d

                                                                                SHA1

                                                                                8225660ba3a9f528cf6ac32038ae3e0ec98d2331

                                                                                SHA256

                                                                                99facae4828c566c310a1ccf4059100067ab8bfb3d6e94e44dd9e189fd491142

                                                                                SHA512

                                                                                e4d2f5a5aeaa29d4d3392588f15db0d514ca4c86c629f0986ee8dba61e34af5ca9e06b94479efd8dd154026ae0da276888a0214e167129db18316a17d9718a57

                                                                              • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.Office.To#\d7be05162f8d0fba8f4447db13f6695b\Microsoft.Office.Tools.Excel.v9.0.ni.dll

                                                                                Filesize

                                                                                1.3MB

                                                                                MD5

                                                                                006498313e139299a5383f0892c954b9

                                                                                SHA1

                                                                                7b3aa10930da9f29272154e2674b86876957ce3a

                                                                                SHA256

                                                                                489fec79addba2de9141daa61062a05a95e96a196049ce414807bada572cc35c

                                                                                SHA512

                                                                                6a15a10ae66ce0e5b18e060bb53c3108d09f6b07ee2c4a834856f0a35bec2453b32f891620e787731985719831302160678eb52acada102fdb0b87a14288d925

                                                                              • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.Office.To#\e1f8e4d08d4b7f811b7dbbacd324027b\Microsoft.Office.Tools.v9.0.ni.dll

                                                                                Filesize

                                                                                148KB

                                                                                MD5

                                                                                ac901cf97363425059a50d1398e3454b

                                                                                SHA1

                                                                                2f8bd4ac2237a7b7606cb77a3d3c58051793c5c7

                                                                                SHA256

                                                                                f6c7aecb211d9aac911bf80c91e84a47a72ac52cbb523e34e9da6482c0b24c58

                                                                                SHA512

                                                                                6a340b6d5fa8e214f2a58d8b691c749336df087fa75bcc8d8c46f708e4b4ff3d68a61a17d13ee62322b75cbc61d39f5a572588772f3c5d6e5ff32036e5bc5a00

                                                                              • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\03cad6bd8b37d21b28dcb4f955be2158\Microsoft.VisualStudio.Tools.Applications.Contract.v9.0.ni.dll

                                                                                Filesize

                                                                                34KB

                                                                                MD5

                                                                                c26b034a8d6ab845b41ed6e8a8d6001d

                                                                                SHA1

                                                                                3a55774cf22d3244d30f9eb5e26c0a6792a3e493

                                                                                SHA256

                                                                                620b41f5e02df56c33919218bedc238ca7e76552c43da4f0f39a106835a4edc3

                                                                                SHA512

                                                                                483424665c3bc79aeb1de6dfdd633c8526331c7b271b1ea6fe93ab298089e2aceefe7f9c7d0c6e33e604ca7b2ed62e7bb586147fecdf9a0eea60e8c03816f537

                                                                              • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\0cb958acb9cd4cacb46ebc0396e30aa3\Microsoft.VisualStudio.Tools.Office.Contract.v9.0.ni.dll

                                                                                Filesize

                                                                                109KB

                                                                                MD5

                                                                                0fd0f978e977a4122b64ae8f8541de54

                                                                                SHA1

                                                                                153d3390416fdeba1b150816cbbf968e355dc64f

                                                                                SHA256

                                                                                211d2b83bb82042385757f811d90c5ae0a281f3abb3bf1c7901e8559db479e60

                                                                                SHA512

                                                                                ceddfc031bfe4fcf5093d0bbc5697b5fb0cd69b03bc32612325a82ea273dae5daff7e670b0d45816a33307b8b042d27669f5d5391cb2bdcf3e5a0c847c6dcaa8

                                                                              • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\2250002a7e02c5278f8c6a84bad8937d\Microsoft.VisualStudio.Tools.Office.Word.HostAdapter.v10.0.ni.dll

                                                                                Filesize

                                                                                187KB

                                                                                MD5

                                                                                ddd98ba58d9d7a5ef303c94779601467

                                                                                SHA1

                                                                                d61d59cf21ae21c7e80699fc571ed1530b8ed750

                                                                                SHA256

                                                                                5f48a518da7c946615e2ef89be2b3d38539be8f554b629524ced4f7bab094ad7

                                                                                SHA512

                                                                                24088fa4a5b5be255e1455420a7bf155570731f57042bfb447f3b9e0247a17bb1e51d9c1ed8c85d86d2f0282e962fc5f4e1e4999f1e7147a8d23e471888b0aa6

                                                                              • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\367516b7878af19f5c84c67f2cd277ae\Microsoft.VisualStudio.Tools.Office.Word.AddInAdapter.v9.0.ni.dll

                                                                                Filesize

                                                                                41KB

                                                                                MD5

                                                                                3c269caf88ccaf71660d8dc6c56f4873

                                                                                SHA1

                                                                                f9481bf17e10fe1914644e1b590b82a0ecc2c5c4

                                                                                SHA256

                                                                                de21619e70f9ef8ccbb274bcd0d9d2ace1bae0442dfefab45976671587cf0a48

                                                                                SHA512

                                                                                bd5be3721bf5bd4001127e0381a0589033cb17aa35852f8f073ba9684af7d8c5a0f3ee29987b345fc15fdf28c5b56686087001ef41221a2cfb16498cf4c016c6

                                                                              • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\73ab166f0ccfa8df85e53c8fd28a93f4\Microsoft.VisualStudio.Tools.Office.Excel.HostAdapter.v10.0.ni.dll

                                                                                Filesize

                                                                                180KB

                                                                                MD5

                                                                                0e869b3bb5de5d9ab94b09fc85203217

                                                                                SHA1

                                                                                d016e9a76503085126453e11019ac458ab10dc6c

                                                                                SHA256

                                                                                33ee0ae60cc5d46b61027723ebd45e91e95ac85e3829a7a9466f6ea540812171

                                                                                SHA512

                                                                                00c209f6e9ba108e0ce9e07238aeb3e696b80d649d9fd7a6cc7902e43ce6e612f4bfce453b2f8c953b025d941f86f16020dc9ba5cf93c6d1403209ca546714ae

                                                                              • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\787526c375f27d452cde50fea4f7986b\Microsoft.VisualStudio.Tools.Applications.Adapter.v9.0.ni.dll

                                                                                Filesize

                                                                                1.2MB

                                                                                MD5

                                                                                0637ad2bf6fc5ac1d29e547155bc818c

                                                                                SHA1

                                                                                a502879466b6dd37eae5881bbb18353f97623852

                                                                                SHA256

                                                                                868c297cb00b2d298f594ad7e3fd4e38aeaac78042613626d6f919b2bca25c4f

                                                                                SHA512

                                                                                1d18a16ec3b91c3143c4371de305a7ea464d41661752ece65bf1ce19a8342a265c024a740afa6be8baf4d1edfdac6c6fcdad7395c1294342cd1f4388428e52c1

                                                                              • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\8c6bac317f75b51647ea3a8da141b143\Microsoft.VisualStudio.Tools.Office.AddInAdapter.v9.0.ni.dll

                                                                                Filesize

                                                                                210KB

                                                                                MD5

                                                                                4f40997b51420653706cb0958086cd2d

                                                                                SHA1

                                                                                0069b956d17ce7d782a0e054995317f2f621b502

                                                                                SHA256

                                                                                8cd6a0b061b43e0b660b81859c910290a3672b00d7647ba0e86eda6ddcc8c553

                                                                                SHA512

                                                                                e18953d7a348859855e5f6e279bc9924fc3707b57a733ce9b8f7d21bd631d419f1ebfb29202608192eb346569ca9a55264f5b4c2aedd474c22060734a68a4ee6

                                                                              • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\9306fc630870a75ddd23441ad77bdc57\Microsoft.VisualStudio.Tools.Applications.Runtime.v10.0.ni.dll

                                                                                Filesize

                                                                                53KB

                                                                                MD5

                                                                                e3a7a2b65afd8ab8b154fdc7897595c3

                                                                                SHA1

                                                                                b21eefd6e23231470b5cf0bd0d7363879a2ed228

                                                                                SHA256

                                                                                e5faf5e8adf46a8246e6b5038409dadca46985a9951343a1936237d2c8d7a845

                                                                                SHA512

                                                                                6537c7ed398deb23be1256445297cb7c8d7801bf6e163d918d8e258213708b28f7255ecff9fbd3431d8f5e5a746aa95a29d3a777b28fcd688777aed6d8205a33

                                                                              • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\a05ee2388c8a28fb3ac98ec65148e455\Microsoft.VisualStudio.Tools.Applications.AddInAdapter.v10.0.ni.dll

                                                                                Filesize

                                                                                65KB

                                                                                MD5

                                                                                da9f9a01a99bd98104b19a95eeef256c

                                                                                SHA1

                                                                                272071d5bbc0c234bc2f63dfcd5a90f83079bbab

                                                                                SHA256

                                                                                b06632dff444204f6e76b16198c31ab706ea52270d5e3ae81626dc1fc1fb1a4d

                                                                                SHA512

                                                                                dcb3273e33b7df02461e81a4f65ae99c0a9ae98188a612ce6d605a058bd2dcb6ddb5b7c78abe1f0a955b7f0c07c323dbfd77a2b6a629a9c87e4ecc1c57e4d81d

                                                                              • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\a94b3ae8190566ba39cfae5d347efaef\Microsoft.VisualStudio.Tools.Office.Outlook.HostAdapter.v10.0.ni.dll

                                                                                Filesize

                                                                                83KB

                                                                                MD5

                                                                                748850c1e3920d9fa5afa212be8a0866

                                                                                SHA1

                                                                                dbec64d0cee4a308e059e6e8c5f7617e1d8d6249

                                                                                SHA256

                                                                                4bac3aed54c598be64894df38406f1e3f200be3b3310e43787ad4a0ec9c8e624

                                                                                SHA512

                                                                                1dd17be98a47671f2fd8e4a68e7ea447242af8fc1180627908190e45dc3b3134aa82e01d16ad20f713db9aad9b9981976c069cf4119c72bef395e765144bbc05

                                                                              • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\ac2e1ab5cae0ba75d0a7173ad624c222\Microsoft.VisualStudio.Tools.Office.HostAdapter.v10.0.ni.dll

                                                                                Filesize

                                                                                143KB

                                                                                MD5

                                                                                1eff63517430e183b5389ba579ed93e2

                                                                                SHA1

                                                                                5891927b05adc6db5464fb02469c113a975ebbf0

                                                                                SHA256

                                                                                b56eb87a81a8777ae81fe8099d7f18dd11757dff104a9609a0568ca0b4ce0856

                                                                                SHA512

                                                                                2861ba07bfea6dbe1e349df886a401df47e9ca2a3846d1f8a269c6a558bdc5f5e4bf30cbaa8c115af801f2e5bf722084b88290e1dd10c4cedbc49a26e8eda844

                                                                              • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\afa5bb1a39443d7dc81dfff54073929b\Microsoft.VisualStudio.Tools.Office.Contract.v10.0.ni.dll

                                                                                Filesize

                                                                                28KB

                                                                                MD5

                                                                                aefc3f3c8e7499bad4d05284e8abd16c

                                                                                SHA1

                                                                                7ab718bde7fdb2d878d8725dc843cfeba44a71f7

                                                                                SHA256

                                                                                4436550409cfb3d06b15dd0c3131e87e7002b0749c7c6e9dc3378c99dbec815d

                                                                                SHA512

                                                                                1d7dbc9764855a9a1f945c1bc8e86406c0625f1381d71b3ea6924322fbe419d1c70c3f3efd57ee2cb2097bb9385e0bf54965ab789328a80eb4946849648fe20b

                                                                              • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\de06a98a598aa0ff716a25b24d56ad7f\Microsoft.VisualStudio.Tools.Applications.Contract.v10.0.ni.dll

                                                                                Filesize

                                                                                27KB

                                                                                MD5

                                                                                9c60454398ce4bce7a52cbda4a45d364

                                                                                SHA1

                                                                                da1e5de264a6f6051b332f8f32fa876d297bf620

                                                                                SHA256

                                                                                edc90887d38c87282f49adbb12a94040f9ac86058bfae15063aaaff2672b54e1

                                                                                SHA512

                                                                                533b7e9c55102b248f4a7560955734b4156eb4c02539c6f978aeacecff1ff182ba0f04a07d32ed90707a62d73191b0e2d2649f38ae1c3e7a5a4c0fbea9a94300

                                                                              • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\e0220058091b941725ef02be0b84abe7\Microsoft.VisualStudio.Tools.Applications.HostAdapter.v10.0.ni.dll

                                                                                Filesize

                                                                                57KB

                                                                                MD5

                                                                                6eaaa1f987d6e1d81badf8665c55a341

                                                                                SHA1

                                                                                e52db4ad92903ca03a5a54fdb66e2e6fad59efd5

                                                                                SHA256

                                                                                4b78ffa5f0b6751aea11917db5961d566e2f59beaa054b41473d331fd392329e

                                                                                SHA512

                                                                                dbedfa6c569670c22d34d923e22b7dae7332b932b809082dad87a1f0bb125c912db37964b5881667867ccf23dc5e5be596aad85485746f8151ce1c51ffd097b2

                                                                              • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\ee73646032cbb022d16771203727e3b2\Microsoft.VisualStudio.Tools.Applications.Runtime.v9.0.ni.dll

                                                                                Filesize

                                                                                130KB

                                                                                MD5

                                                                                2735d2ab103beb0f7c1fbd6971838274

                                                                                SHA1

                                                                                6063646bc072546798bf8bf347425834f2bfad71

                                                                                SHA256

                                                                                f00156860ec7e88f4ccb459ca29b7e0e5c169cdc8a081cb043603187d25d92b3

                                                                                SHA512

                                                                                fe2ce60c7f61760a29344e254771d48995e983e158da0725818f37441f9690bda46545bf10c84b163f6afb163ffb504913d6ffddf84f72b062c7f233aed896de

                                                                              • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\f1a7ac664667f2d6bcd6c388b230c22b\Microsoft.VisualStudio.Tools.Applications.AddInAdapter.v9.0.ni.dll

                                                                                Filesize

                                                                                59KB

                                                                                MD5

                                                                                8c69bbdfbc8cc3fa3fa5edcd79901e94

                                                                                SHA1

                                                                                b8028f0f557692221d5c0160ec6ce414b2bdf19b

                                                                                SHA256

                                                                                a21471690e7c32c80049e17c13624820e77bca6c9c38b83d9ea8a7248086660d

                                                                                SHA512

                                                                                825f5b87b76303b62fc16a96b108fb1774c2aca52ac5e44cd0ac2fe2ee47d5d67947dfe7498e36bc849773f608ec5824711f8c36e375a378582eefb57c9c2557

                                                                              • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\fc36797f7054935a6033077612905a0f\Microsoft.VisualStudio.Tools.Office.Excel.AddInAdapter.v9.0.ni.dll

                                                                                Filesize

                                                                                42KB

                                                                                MD5

                                                                                71d4273e5b77cf01239a5d4f29e064fc

                                                                                SHA1

                                                                                e8876dea4e4c4c099e27234742016be3c80d8b62

                                                                                SHA256

                                                                                f019899f829731f899a99885fd52fde1fe4a4f6fe3ecf7f7a7cfa78517c00575

                                                                                SHA512

                                                                                41fe67cda988c53bd087df6296d1a242cddac688718ea5a5884a72b43e9638538e64d7a59e045c0b4d490496d884cf0ec694ddf7fcb41ae3b8cbc65b7686b180

                                                                              • C:\Windows\assembly\NativeImages_v2.0.50727_32\ehiVidCtl\88e20c69254157d91b96eadc9444815d\ehiVidCtl.ni.dll

                                                                                Filesize

                                                                                855KB

                                                                                MD5

                                                                                7812b0a90d92b4812d4063b89a970c58

                                                                                SHA1

                                                                                3c4a789b8d28a5bfa6a6191624e33b8f40e4c4ea

                                                                                SHA256

                                                                                897626e6af00e85e627eeaa7f9563b245335242bc6196b36d0072e5b6d45e543

                                                                                SHA512

                                                                                634a2395bada9227b1957f2b76ed7e19f12bfc4d71a145d182602a1b6e24d83e220ebfabd602b1995c360e1725a38a89ff58417b0295bb0da9ea35c41c21a6ed

                                                                              • C:\Windows\assembly\NativeImages_v2.0.50727_32\stdole\2c6d60b55bbab22515c512080d4b3bae\stdole.ni.dll

                                                                                Filesize

                                                                                43KB

                                                                                MD5

                                                                                3e72bdd0663c5b2bcd530f74139c83e3

                                                                                SHA1

                                                                                66069bcac0207512b9e07320f4fa5934650677d2

                                                                                SHA256

                                                                                6a6ac3094130d1affd34aae5ba2bd8c889e2071eb4217a75d72b5560f884e357

                                                                                SHA512

                                                                                b0a98db477fccae71b4ebfb8525ed52c10f1e7542f955b307f260e27e0758aa22896683302e34b0237e7e3bba9f5193ddcc7ff255c71fbaa1386988b0ec7d626

                                                                              • C:\Windows\ehome\ehrecvr.exe

                                                                                Filesize

                                                                                1.2MB

                                                                                MD5

                                                                                e39faf5a345ff022bad3b5ed822ce9c3

                                                                                SHA1

                                                                                344bf2d3226ce82c20510b8c29ef77fac13b1a30

                                                                                SHA256

                                                                                909b519cd1836eb32396c378ae0cc7451daa75e6ba9996eaab45b5d74c39c4c9

                                                                                SHA512

                                                                                9e7c14d582af3cdbb76f1357617bf61ce49534e85e7cd207aecb2f1f3854f72cee5b0ab97885ff3630dc1edd362886e073b0b358cfb246f1b3db50de19fd7d73

                                                                              • C:\Windows\system32\fxssvc.exe

                                                                                Filesize

                                                                                1.2MB

                                                                                MD5

                                                                                2a1546f3909b567185f9bca1e1076e46

                                                                                SHA1

                                                                                e26df3db5f517828bcb22d9e4420d70f42b30b55

                                                                                SHA256

                                                                                3d71dbf90f7d3b0b69ebfab3fe360e36efa0dfa376da4a13d90ebc29d44fe849

                                                                                SHA512

                                                                                1f747c17f605bba871ddffbfd57db02adcb40e2abe775b440eed77af6546dd3af9a6ffbb46543b90a31d5b11f714697d2e5cc73a133aa9eb64d2688cf6135019

                                                                              • \Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe

                                                                                Filesize

                                                                                1.4MB

                                                                                MD5

                                                                                6c489ef0e0c613b3aec9aa97bd598ce5

                                                                                SHA1

                                                                                3af16335dcf14b72531f847ac099e0228bb32f0f

                                                                                SHA256

                                                                                3cf7f97635f1e38004fe88851d803253dbc8134bc26af5557878a261c6b422d3

                                                                                SHA512

                                                                                0f86c4f949c333e30bfefac1fecb82d6eb877629afb8bc5e2689d9e14c52101967bfd3cfd6830834876745aa14298d3d5659759853d3192dbd740885d06d7040

                                                                              • \Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe

                                                                                Filesize

                                                                                1.4MB

                                                                                MD5

                                                                                3ed4e1c382b6e3aea6d31538a567e5cb

                                                                                SHA1

                                                                                8af2a0e98abc37d63ff8a25373ebe22e2e28da65

                                                                                SHA256

                                                                                9a20b4e1881f1b0a3f636b3e8033228ac7bf94a138ae1465b41164c08ccd2c49

                                                                                SHA512

                                                                                7c2f98b6bebfb811b386a66b98d3086e455e68735c2f881d997c5557eb9542827291a18c76af52a73e77bbf495094cad146d3bf5182d5d35551934687fffad24

                                                                              • \Windows\System32\alg.exe

                                                                                Filesize

                                                                                1.4MB

                                                                                MD5

                                                                                56d6819137ed029d05ed4276e87fa6cf

                                                                                SHA1

                                                                                6166f7b82f044491c466c1b7f9c4baf45dbd6d2f

                                                                                SHA256

                                                                                e8afad68418a3111bcf570860ba62909c337f20303d86561d9ed0277e6d54cc6

                                                                                SHA512

                                                                                4c19b77c9630130bb00db79eb8bf5a6780df3a9e826a40685dffabb53901e3f5345670db66b463ab2c92353bc0a147d38c5b6f3844f176da9d103db6e5494df3

                                                                              • \Windows\ehome\ehsched.exe

                                                                                Filesize

                                                                                1.5MB

                                                                                MD5

                                                                                e9bf43b8a4f05f88de713e6c94e9a790

                                                                                SHA1

                                                                                052e73eecf1394bbf9fea052b1d2cbcf1b41a531

                                                                                SHA256

                                                                                9f0ab7a1d1ebee80ac623be380dabb7022610647bc50f23a88beed3ccd52cecc

                                                                                SHA512

                                                                                83ff385399ebc1718512be9a16495ceb52c25db563683ed32d281f8bddf356758dade557ba45a2346adf48f67d38e4c2e15cd7eb94a1671065de3b617ebd8b96

                                                                              • memory/552-138-0x0000000140000000-0x000000014017F000-memory.dmp

                                                                                Filesize

                                                                                1.5MB

                                                                              • memory/552-697-0x0000000140000000-0x000000014017F000-memory.dmp

                                                                                Filesize

                                                                                1.5MB

                                                                              • memory/552-274-0x0000000140000000-0x000000014017F000-memory.dmp

                                                                                Filesize

                                                                                1.5MB

                                                                              • memory/564-747-0x0000000000400000-0x0000000000579000-memory.dmp

                                                                                Filesize

                                                                                1.5MB

                                                                              • memory/564-741-0x0000000000400000-0x0000000000579000-memory.dmp

                                                                                Filesize

                                                                                1.5MB

                                                                              • memory/784-450-0x0000000000400000-0x0000000000579000-memory.dmp

                                                                                Filesize

                                                                                1.5MB

                                                                              • memory/784-477-0x0000000000400000-0x0000000000579000-memory.dmp

                                                                                Filesize

                                                                                1.5MB

                                                                              • memory/1072-182-0x0000000100000000-0x0000000100183000-memory.dmp

                                                                                Filesize

                                                                                1.5MB

                                                                              • memory/1072-185-0x0000000000620000-0x00000000007A3000-memory.dmp

                                                                                Filesize

                                                                                1.5MB

                                                                              • memory/1072-360-0x0000000100000000-0x0000000100183000-memory.dmp

                                                                                Filesize

                                                                                1.5MB

                                                                              • memory/1072-373-0x0000000000620000-0x00000000007A3000-memory.dmp

                                                                                Filesize

                                                                                1.5MB

                                                                              • memory/1124-567-0x0000000000400000-0x0000000000579000-memory.dmp

                                                                                Filesize

                                                                                1.5MB

                                                                              • memory/1204-689-0x0000000140000000-0x000000014017F000-memory.dmp

                                                                                Filesize

                                                                                1.5MB

                                                                              • memory/1236-543-0x0000000000400000-0x0000000000579000-memory.dmp

                                                                                Filesize

                                                                                1.5MB

                                                                              • memory/1236-556-0x0000000000400000-0x0000000000579000-memory.dmp

                                                                                Filesize

                                                                                1.5MB

                                                                              • memory/1292-150-0x000000002E000000-0x000000002FE1E000-memory.dmp

                                                                                Filesize

                                                                                30.1MB

                                                                              • memory/1292-319-0x000000002E000000-0x000000002FE1E000-memory.dmp

                                                                                Filesize

                                                                                30.1MB

                                                                              • memory/1376-686-0x0000000140000000-0x000000014017F000-memory.dmp

                                                                                Filesize

                                                                                1.5MB

                                                                              • memory/1376-666-0x0000000140000000-0x000000014017F000-memory.dmp

                                                                                Filesize

                                                                                1.5MB

                                                                              • memory/1384-75-0x0000000000420000-0x0000000000480000-memory.dmp

                                                                                Filesize

                                                                                384KB

                                                                              • memory/1384-69-0x0000000000420000-0x0000000000480000-memory.dmp

                                                                                Filesize

                                                                                384KB

                                                                              • memory/1384-77-0x0000000140000000-0x000000014017F000-memory.dmp

                                                                                Filesize

                                                                                1.5MB

                                                                              • memory/1384-199-0x0000000140000000-0x000000014017F000-memory.dmp

                                                                                Filesize

                                                                                1.5MB

                                                                              • memory/1392-544-0x0000000000400000-0x0000000000579000-memory.dmp

                                                                                Filesize

                                                                                1.5MB

                                                                              • memory/1424-335-0x0000000000400000-0x0000000000579000-memory.dmp

                                                                                Filesize

                                                                                1.5MB

                                                                              • memory/1424-371-0x0000000000400000-0x0000000000579000-memory.dmp

                                                                                Filesize

                                                                                1.5MB

                                                                              • memory/1500-284-0x0000000000400000-0x0000000000579000-memory.dmp

                                                                                Filesize

                                                                                1.5MB

                                                                              • memory/1500-324-0x0000000000400000-0x0000000000579000-memory.dmp

                                                                                Filesize

                                                                                1.5MB

                                                                              • memory/1608-13-0x0000000000190000-0x00000000001F0000-memory.dmp

                                                                                Filesize

                                                                                384KB

                                                                              • memory/1608-20-0x0000000000190000-0x00000000001F0000-memory.dmp

                                                                                Filesize

                                                                                384KB

                                                                              • memory/1608-19-0x0000000100000000-0x0000000100175000-memory.dmp

                                                                                Filesize

                                                                                1.5MB

                                                                              • memory/1608-103-0x0000000100000000-0x0000000100175000-memory.dmp

                                                                                Filesize

                                                                                1.5MB

                                                                              • memory/1612-220-0x0000000140000000-0x0000000140183000-memory.dmp

                                                                                Filesize

                                                                                1.5MB

                                                                              • memory/1612-694-0x0000000140000000-0x0000000140183000-memory.dmp

                                                                                Filesize

                                                                                1.5MB

                                                                              • memory/1612-105-0x0000000000B80000-0x0000000000BE0000-memory.dmp

                                                                                Filesize

                                                                                384KB

                                                                              • memory/1612-111-0x0000000000B80000-0x0000000000BE0000-memory.dmp

                                                                                Filesize

                                                                                384KB

                                                                              • memory/1612-104-0x0000000140000000-0x0000000140183000-memory.dmp

                                                                                Filesize

                                                                                1.5MB

                                                                              • memory/1628-629-0x0000000000400000-0x0000000000579000-memory.dmp

                                                                                Filesize

                                                                                1.5MB

                                                                              • memory/1868-436-0x0000000000400000-0x0000000000579000-memory.dmp

                                                                                Filesize

                                                                                1.5MB

                                                                              • memory/1896-523-0x0000000000400000-0x0000000000579000-memory.dmp

                                                                                Filesize

                                                                                1.5MB

                                                                              • memory/1896-515-0x0000000000400000-0x0000000000579000-memory.dmp

                                                                                Filesize

                                                                                1.5MB

                                                                              • memory/1904-607-0x0000000000400000-0x0000000000579000-memory.dmp

                                                                                Filesize

                                                                                1.5MB

                                                                              • memory/1904-600-0x0000000000400000-0x0000000000579000-memory.dmp

                                                                                Filesize

                                                                                1.5MB

                                                                              • memory/1948-479-0x0000000000400000-0x0000000000579000-memory.dmp

                                                                                Filesize

                                                                                1.5MB

                                                                              • memory/1948-496-0x0000000000400000-0x0000000000579000-memory.dmp

                                                                                Filesize

                                                                                1.5MB

                                                                              • memory/1956-572-0x0000000000400000-0x0000000000579000-memory.dmp

                                                                                Filesize

                                                                                1.5MB

                                                                              • memory/1956-755-0x0000000000400000-0x0000000000579000-memory.dmp

                                                                                Filesize

                                                                                1.5MB

                                                                              • memory/1956-568-0x0000000003CB0000-0x0000000003D6A000-memory.dmp

                                                                                Filesize

                                                                                744KB

                                                                              • memory/1984-339-0x0000000000400000-0x0000000000579000-memory.dmp

                                                                                Filesize

                                                                                1.5MB

                                                                              • memory/1984-321-0x0000000000400000-0x0000000000579000-memory.dmp

                                                                                Filesize

                                                                                1.5MB

                                                                              • memory/2092-517-0x0000000000400000-0x0000000000579000-memory.dmp

                                                                                Filesize

                                                                                1.5MB

                                                                              • memory/2092-619-0x0000000000400000-0x0000000000579000-memory.dmp

                                                                                Filesize

                                                                                1.5MB

                                                                              • memory/2100-1-0x00000000002D0000-0x0000000000337000-memory.dmp

                                                                                Filesize

                                                                                412KB

                                                                              • memory/2100-0-0x0000000010000000-0x0000000010170000-memory.dmp

                                                                                Filesize

                                                                                1.4MB

                                                                              • memory/2100-8-0x00000000002D0000-0x0000000000337000-memory.dmp

                                                                                Filesize

                                                                                412KB

                                                                              • memory/2100-89-0x0000000010000000-0x0000000010170000-memory.dmp

                                                                                Filesize

                                                                                1.4MB

                                                                              • memory/2100-214-0x0000000010000000-0x0000000010170000-memory.dmp

                                                                                Filesize

                                                                                1.4MB

                                                                              • memory/2168-648-0x0000000000400000-0x0000000000579000-memory.dmp

                                                                                Filesize

                                                                                1.5MB

                                                                              • memory/2208-662-0x0000000000400000-0x0000000000579000-memory.dmp

                                                                                Filesize

                                                                                1.5MB

                                                                              • memory/2420-744-0x0000000000400000-0x0000000000579000-memory.dmp

                                                                                Filesize

                                                                                1.5MB

                                                                              • memory/2500-206-0x000000002E000000-0x000000002E186000-memory.dmp

                                                                                Filesize

                                                                                1.5MB

                                                                              • memory/2500-402-0x000000002E000000-0x000000002E186000-memory.dmp

                                                                                Filesize

                                                                                1.5MB

                                                                              • memory/2504-211-0x0000000140000000-0x000000014013C000-memory.dmp

                                                                                Filesize

                                                                                1.2MB

                                                                              • memory/2504-702-0x0000000140000000-0x000000014013C000-memory.dmp

                                                                                Filesize

                                                                                1.2MB

                                                                              • memory/2504-117-0x0000000001990000-0x00000000019A0000-memory.dmp

                                                                                Filesize

                                                                                64KB

                                                                              • memory/2504-116-0x0000000001980000-0x0000000001990000-memory.dmp

                                                                                Filesize

                                                                                64KB

                                                                              • memory/2504-97-0x0000000000A60000-0x0000000000AC0000-memory.dmp

                                                                                Filesize

                                                                                384KB

                                                                              • memory/2504-91-0x0000000000A60000-0x0000000000AC0000-memory.dmp

                                                                                Filesize

                                                                                384KB

                                                                              • memory/2504-90-0x0000000140000000-0x000000014013C000-memory.dmp

                                                                                Filesize

                                                                                1.2MB

                                                                              • memory/2508-415-0x0000000000400000-0x0000000000579000-memory.dmp

                                                                                Filesize

                                                                                1.5MB

                                                                              • memory/2508-379-0x0000000000400000-0x0000000000579000-memory.dmp

                                                                                Filesize

                                                                                1.5MB

                                                                              • memory/2516-455-0x0000000000400000-0x0000000000579000-memory.dmp

                                                                                Filesize

                                                                                1.5MB

                                                                              • memory/2552-714-0x0000000000CC0000-0x0000000000CCA000-memory.dmp

                                                                                Filesize

                                                                                40KB

                                                                              • memory/2552-716-0x0000000000CC0000-0x0000000000CDA000-memory.dmp

                                                                                Filesize

                                                                                104KB

                                                                              • memory/2552-717-0x0000000001370000-0x00000000013FC000-memory.dmp

                                                                                Filesize

                                                                                560KB

                                                                              • memory/2552-718-0x0000000001370000-0x0000000001414000-memory.dmp

                                                                                Filesize

                                                                                656KB

                                                                              • memory/2552-719-0x0000000002350000-0x00000000024EE000-memory.dmp

                                                                                Filesize

                                                                                1.6MB

                                                                              • memory/2552-720-0x0000000001370000-0x000000000145C000-memory.dmp

                                                                                Filesize

                                                                                944KB

                                                                              • memory/2552-721-0x0000000000CC0000-0x0000000000CD0000-memory.dmp

                                                                                Filesize

                                                                                64KB

                                                                              • memory/2552-722-0x0000000001370000-0x00000000013F8000-memory.dmp

                                                                                Filesize

                                                                                544KB

                                                                              • memory/2552-723-0x0000000000CC0000-0x0000000000CE4000-memory.dmp

                                                                                Filesize

                                                                                144KB

                                                                              • memory/2552-724-0x0000000000CC0000-0x0000000000CC8000-memory.dmp

                                                                                Filesize

                                                                                32KB

                                                                              • memory/2552-725-0x0000000000CC0000-0x0000000000CEA000-memory.dmp

                                                                                Filesize

                                                                                168KB

                                                                              • memory/2552-726-0x0000000001370000-0x00000000013D6000-memory.dmp

                                                                                Filesize

                                                                                408KB

                                                                              • memory/2552-715-0x0000000000CC0000-0x0000000000CDE000-memory.dmp

                                                                                Filesize

                                                                                120KB

                                                                              • memory/2552-54-0x0000000000400000-0x0000000000579000-memory.dmp

                                                                                Filesize

                                                                                1.5MB

                                                                              • memory/2552-60-0x0000000000260000-0x00000000002C7000-memory.dmp

                                                                                Filesize

                                                                                412KB

                                                                              • memory/2552-55-0x0000000000260000-0x00000000002C7000-memory.dmp

                                                                                Filesize

                                                                                412KB

                                                                              • memory/2552-184-0x0000000000400000-0x0000000000579000-memory.dmp

                                                                                Filesize

                                                                                1.5MB

                                                                              • memory/2580-219-0x0000000001000000-0x0000000001167000-memory.dmp

                                                                                Filesize

                                                                                1.4MB

                                                                              • memory/2580-442-0x0000000001000000-0x0000000001167000-memory.dmp

                                                                                Filesize

                                                                                1.4MB

                                                                              • memory/2620-161-0x0000000140000000-0x000000014019B000-memory.dmp

                                                                                Filesize

                                                                                1.6MB

                                                                              • memory/2620-177-0x0000000140000000-0x000000014019B000-memory.dmp

                                                                                Filesize

                                                                                1.6MB

                                                                              • memory/2656-651-0x0000000000400000-0x0000000000579000-memory.dmp

                                                                                Filesize

                                                                                1.5MB

                                                                              • memory/2672-26-0x0000000140000000-0x000000014016E000-memory.dmp

                                                                                Filesize

                                                                                1.4MB

                                                                              • memory/2672-148-0x0000000140000000-0x000000014016E000-memory.dmp

                                                                                Filesize

                                                                                1.4MB

                                                                              • memory/2724-603-0x0000000000400000-0x0000000000579000-memory.dmp

                                                                                Filesize

                                                                                1.5MB

                                                                              • memory/2796-368-0x0000000000400000-0x0000000000579000-memory.dmp

                                                                                Filesize

                                                                                1.5MB

                                                                              • memory/2796-384-0x0000000000400000-0x0000000000579000-memory.dmp

                                                                                Filesize

                                                                                1.5MB

                                                                              • memory/2856-35-0x0000000000270000-0x00000000002D7000-memory.dmp

                                                                                Filesize

                                                                                412KB

                                                                              • memory/2856-29-0x0000000010000000-0x0000000010170000-memory.dmp

                                                                                Filesize

                                                                                1.4MB

                                                                              • memory/2856-80-0x0000000010000000-0x0000000010170000-memory.dmp

                                                                                Filesize

                                                                                1.4MB

                                                                              • memory/2856-30-0x0000000000270000-0x00000000002D7000-memory.dmp

                                                                                Filesize

                                                                                412KB

                                                                              • memory/2856-36-0x0000000000270000-0x00000000002D7000-memory.dmp

                                                                                Filesize

                                                                                412KB

                                                                              • memory/2860-44-0x0000000010000000-0x0000000010178000-memory.dmp

                                                                                Filesize

                                                                                1.5MB

                                                                              • memory/2860-83-0x0000000010000000-0x0000000010178000-memory.dmp

                                                                                Filesize

                                                                                1.5MB

                                                                              • memory/2888-251-0x0000000140000000-0x0000000140237000-memory.dmp

                                                                                Filesize

                                                                                2.2MB

                                                                              • memory/2888-125-0x0000000000240000-0x00000000002A0000-memory.dmp

                                                                                Filesize

                                                                                384KB

                                                                              • memory/2888-119-0x0000000000240000-0x00000000002A0000-memory.dmp

                                                                                Filesize

                                                                                384KB

                                                                              • memory/2888-118-0x0000000140000000-0x0000000140237000-memory.dmp

                                                                                Filesize

                                                                                2.2MB

                                                                              • memory/2944-591-0x0000000000400000-0x0000000000579000-memory.dmp

                                                                                Filesize

                                                                                1.5MB

                                                                              • memory/3048-165-0x0000000140000000-0x0000000140187000-memory.dmp

                                                                                Filesize

                                                                                1.5MB

                                                                              • memory/3048-356-0x0000000140000000-0x0000000140187000-memory.dmp

                                                                                Filesize

                                                                                1.5MB