Analysis

  • max time kernel
    142s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    25/03/2025, 20:57

General

  • Target

    2025-03-25_09fc4a868fabcda73a9dcc5c4de8e430_wannacry.exe

  • Size

    5.0MB

  • MD5

    09fc4a868fabcda73a9dcc5c4de8e430

  • SHA1

    697fc70dc34afa26cef69703bb590530ea876261

  • SHA256

    04aba9d9010b4b111bd27e9272cf00a7acba3e1070e4bc2be1ff2508273c13b5

  • SHA512

    2bbe726a66516c4ff107cb7b8e45c8bd8f9ce5d30f8f73d9f43ffb79e0f5afe672ff3e44b7b2274d98ea051443b4d1cffac4d28b0f32e4bebf1e2cc9ea16426b

  • SSDEEP

    98304:tDqPoBhz1aRxcSUDk36SAEdhvxWa9P593u7wRGpj3:tDqPe1Cxcxk3ZAEUadzCF9

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Wannacry family
  • Contacts a large (3187) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 64 IoCs
  • Loads dropped DLL 52 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops file in System32 directory 22 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of SetWindowsHookEx 20 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2025-03-25_09fc4a868fabcda73a9dcc5c4de8e430_wannacry.exe
    "C:\Users\Admin\AppData\Local\Temp\2025-03-25_09fc4a868fabcda73a9dcc5c4de8e430_wannacry.exe"
    1⤵
    • Drops file in System32 directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    PID:2568
    • C:\WINDOWS\tasksche.exe
      C:\WINDOWS\tasksche.exe /i
      2⤵
      • Executes dropped EXE
      PID:2764
  • C:\Windows\System32\alg.exe
    C:\Windows\System32\alg.exe
    1⤵
    • Executes dropped EXE
    PID:1980
  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe
    C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2424
  • C:\Users\Admin\AppData\Local\Temp\2025-03-25_09fc4a868fabcda73a9dcc5c4de8e430_wannacry.exe
    C:\Users\Admin\AppData\Local\Temp\2025-03-25_09fc4a868fabcda73a9dcc5c4de8e430_wannacry.exe -m security
    1⤵
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2916
  • C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe
    C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe
    1⤵
    • Executes dropped EXE
    • System Location Discovery: System Language Discovery
    PID:1664
  • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe
    C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe
    1⤵
    • Executes dropped EXE
    • Drops file in Windows directory
    PID:1604
  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
    C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
    1⤵
    • Executes dropped EXE
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1116
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1e8 -InterruptEvent 1d4 -NGENProcess 1d8 -Pipe 1e4 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2848
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1e8 -InterruptEvent 258 -NGENProcess 240 -Pipe 254 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2412
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 258 -InterruptEvent 25c -NGENProcess 1e0 -Pipe 248 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:1728
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 258 -InterruptEvent 1d4 -NGENProcess 1e8 -Pipe 23c -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2352
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1d4 -InterruptEvent 244 -NGENProcess 25c -Pipe 1d8 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2408
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 240 -InterruptEvent 258 -NGENProcess 268 -Pipe 1d4 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1548
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 258 -InterruptEvent 260 -NGENProcess 25c -Pipe 1e0 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1040
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 26c -InterruptEvent 240 -NGENProcess 270 -Pipe 258 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:1920
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 240 -InterruptEvent 1e8 -NGENProcess 25c -Pipe 264 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:3016
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 274 -InterruptEvent 26c -NGENProcess 278 -Pipe 240 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2388
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 24c -InterruptEvent 26c -NGENProcess 274 -Pipe 25c -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:916
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 250 -InterruptEvent 244 -NGENProcess 280 -Pipe 24c -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2052
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 244 -InterruptEvent 268 -NGENProcess 274 -Pipe 270 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2064
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 284 -InterruptEvent 268 -NGENProcess 244 -Pipe 26c -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:3020
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 268 -InterruptEvent 1e8 -NGENProcess 274 -Pipe 27c -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1808
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 28c -InterruptEvent 284 -NGENProcess 290 -Pipe 268 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2428
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 284 -InterruptEvent 260 -NGENProcess 274 -Pipe 288 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:3044
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 294 -InterruptEvent 28c -NGENProcess 298 -Pipe 284 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:1984
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 28c -InterruptEvent 280 -NGENProcess 274 -Pipe 278 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:932
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 29c -InterruptEvent 280 -NGENProcess 28c -Pipe 260 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1424
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 280 -InterruptEvent 244 -NGENProcess 274 -Pipe 250 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2992
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 244 -InterruptEvent 274 -NGENProcess 1e8 -Pipe 2a8 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:1764
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 274 -InterruptEvent 290 -NGENProcess 2a4 -Pipe 2a0 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2076
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 250 -InterruptEvent 1ec -NGENProcess 260 -Pipe 2a8 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:316
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1ec -InterruptEvent 1d4 -NGENProcess 284 -Pipe 1e0 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2240
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1d4 -InterruptEvent 1d8 -NGENProcess 240 -Pipe 258 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1744
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1d8 -InterruptEvent 23c -NGENProcess 260 -Pipe 25c -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2372
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 23c -InterruptEvent 248 -NGENProcess 284 -Pipe 220 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Windows directory
      PID:1556
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 248 -InterruptEvent 260 -NGENProcess 284 -Pipe 1d4 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2580
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 260 -InterruptEvent 1c4 -NGENProcess 254 -Pipe 224 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Windows directory
      PID:2496
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1d0 -InterruptEvent 248 -NGENProcess 244 -Pipe 260 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2972
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 248 -InterruptEvent 1d8 -NGENProcess 254 -Pipe 240 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      PID:2484
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 244 -InterruptEvent 1ec -NGENProcess 1c4 -Pipe 2b0 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1336
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2ac -InterruptEvent 1d8 -NGENProcess 274 -Pipe 1ec -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Windows directory
      PID:3020
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2a4 -InterruptEvent 284 -NGENProcess 28c -Pipe 2ac -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1836
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 284 -InterruptEvent 290 -NGENProcess 274 -Pipe 280 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      PID:1192
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 290 -InterruptEvent 274 -NGENProcess 2a4 -Pipe 1d8 -Comment "NGen Worker Process"
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2756
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 274 -InterruptEvent 294 -NGENProcess 28c -Pipe 1c4 -Comment "NGen Worker Process"
      2⤵
      • Loads dropped DLL
      • Drops file in Windows directory
      PID:2900
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 294 -InterruptEvent 28c -NGENProcess 290 -Pipe 1e8 -Comment "NGen Worker Process"
      2⤵
      • System Location Discovery: System Language Discovery
      PID:1784
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 28c -InterruptEvent 2b4 -NGENProcess 2a4 -Pipe 284 -Comment "NGen Worker Process"
      2⤵
      • Loads dropped DLL
      • Drops file in Windows directory
      PID:2252
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2b4 -InterruptEvent 2a4 -NGENProcess 294 -Pipe 298 -Comment "NGen Worker Process"
      2⤵
        PID:2356
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2a4 -InterruptEvent 2bc -NGENProcess 290 -Pipe 274 -Comment "NGen Worker Process"
        2⤵
        • Loads dropped DLL
        • Drops file in Windows directory
        PID:1676
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2bc -InterruptEvent 290 -NGENProcess 2b4 -Pipe 2b8 -Comment "NGen Worker Process"
        2⤵
          PID:1376
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
          C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 290 -InterruptEvent 2c4 -NGENProcess 294 -Pipe 28c -Comment "NGen Worker Process"
          2⤵
          • Loads dropped DLL
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          PID:1576
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
          C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2c4 -InterruptEvent 294 -NGENProcess 2bc -Pipe 2c0 -Comment "NGen Worker Process"
          2⤵
          • System Location Discovery: System Language Discovery
          PID:108
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
          C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 294 -InterruptEvent 2cc -NGENProcess 2b4 -Pipe 2a4 -Comment "NGen Worker Process"
          2⤵
          • Loads dropped DLL
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          PID:1784
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
          C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2cc -InterruptEvent 2b4 -NGENProcess 2c4 -Pipe 2c8 -Comment "NGen Worker Process"
          2⤵
            PID:2428
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
            C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2b4 -InterruptEvent 2d4 -NGENProcess 2bc -Pipe 290 -Comment "NGen Worker Process"
            2⤵
            • Loads dropped DLL
            • Drops file in Windows directory
            • System Location Discovery: System Language Discovery
            PID:2088
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
            C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2d8 -InterruptEvent 2cc -NGENProcess 2dc -Pipe 2b4 -Comment "NGen Worker Process"
            2⤵
            • System Location Discovery: System Language Discovery
            PID:1676
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
            C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2cc -InterruptEvent 264 -NGENProcess 2bc -Pipe 294 -Comment "NGen Worker Process"
            2⤵
            • Loads dropped DLL
            • Drops file in Windows directory
            • System Location Discovery: System Language Discovery
            PID:2972
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
            C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 264 -InterruptEvent 2bc -NGENProcess 2d8 -Pipe 2d4 -Comment "NGen Worker Process"
            2⤵
            • System Location Discovery: System Language Discovery
            PID:2108
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
            C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2bc -InterruptEvent 2e4 -NGENProcess 2dc -Pipe 248 -Comment "NGen Worker Process"
            2⤵
            • Loads dropped DLL
            • Drops file in Windows directory
            PID:2352
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
            C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2e8 -InterruptEvent 264 -NGENProcess 2ec -Pipe 2bc -Comment "NGen Worker Process"
            2⤵
              PID:748
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
              C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 264 -InterruptEvent 2d0 -NGENProcess 2dc -Pipe 2cc -Comment "NGen Worker Process"
              2⤵
              • Loads dropped DLL
              • Drops file in Windows directory
              • System Location Discovery: System Language Discovery
              PID:2256
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
              C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2d0 -InterruptEvent 2dc -NGENProcess 2e8 -Pipe 2e4 -Comment "NGen Worker Process"
              2⤵
              • System Location Discovery: System Language Discovery
              PID:1676
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
              C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2dc -InterruptEvent 2f4 -NGENProcess 2ec -Pipe 250 -Comment "NGen Worker Process"
              2⤵
              • Loads dropped DLL
              • Drops file in Windows directory
              • System Location Discovery: System Language Discovery
              PID:2376
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
              C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2f4 -InterruptEvent 2ec -NGENProcess 2d0 -Pipe 2f0 -Comment "NGen Worker Process"
              2⤵
                PID:2480
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2ec -InterruptEvent 2fc -NGENProcess 2e8 -Pipe 264 -Comment "NGen Worker Process"
                2⤵
                • Loads dropped DLL
                • Drops file in Windows directory
                • System Location Discovery: System Language Discovery
                PID:2276
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2fc -InterruptEvent 2e8 -NGENProcess 2f4 -Pipe 2f8 -Comment "NGen Worker Process"
                2⤵
                • Modifies data under HKEY_USERS
                PID:1444
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2e8 -InterruptEvent 304 -NGENProcess 2d0 -Pipe 2dc -Comment "NGen Worker Process"
                2⤵
                  PID:1528
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                  C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 304 -InterruptEvent 308 -NGENProcess 300 -Pipe 2e0 -Comment "NGen Worker Process"
                  2⤵
                    PID:948
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                    C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 308 -InterruptEvent 30c -NGENProcess 2f4 -Pipe 2ec -Comment "NGen Worker Process"
                    2⤵
                    • System Location Discovery: System Language Discovery
                    PID:2900
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                    C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 30c -InterruptEvent 310 -NGENProcess 2d0 -Pipe 2c4 -Comment "NGen Worker Process"
                    2⤵
                    • Loads dropped DLL
                    • Drops file in Windows directory
                    • System Location Discovery: System Language Discovery
                    PID:2832
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                    C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 310 -InterruptEvent 2d0 -NGENProcess 308 -Pipe 300 -Comment "NGen Worker Process"
                    2⤵
                    • Loads dropped DLL
                    • Drops file in Windows directory
                    • System Location Discovery: System Language Discovery
                    PID:2712
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                    C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 318 -InterruptEvent 2fc -NGENProcess 31c -Pipe 30c -Comment "NGen Worker Process"
                    2⤵
                    • System Location Discovery: System Language Discovery
                    PID:2276
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                    C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2fc -InterruptEvent 2e8 -NGENProcess 308 -Pipe 304 -Comment "NGen Worker Process"
                    2⤵
                      PID:2028
                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2e8 -InterruptEvent 320 -NGENProcess 2d0 -Pipe 2d8 -Comment "NGen Worker Process"
                      2⤵
                      • System Location Discovery: System Language Discovery
                      • Modifies data under HKEY_USERS
                      PID:2404
                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 320 -InterruptEvent 324 -NGENProcess 31c -Pipe 310 -Comment "NGen Worker Process"
                      2⤵
                        PID:2992
                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 324 -InterruptEvent 328 -NGENProcess 308 -Pipe 2f4 -Comment "NGen Worker Process"
                        2⤵
                        • System Location Discovery: System Language Discovery
                        PID:1876
                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 328 -InterruptEvent 32c -NGENProcess 2d0 -Pipe 318 -Comment "NGen Worker Process"
                        2⤵
                        • System Location Discovery: System Language Discovery
                        PID:1032
                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 330 -InterruptEvent 324 -NGENProcess 334 -Pipe 328 -Comment "NGen Worker Process"
                        2⤵
                          PID:2052
                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                          C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 324 -InterruptEvent 2fc -NGENProcess 2d0 -Pipe 2e8 -Comment "NGen Worker Process"
                          2⤵
                            PID:2228
                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                            C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 338 -InterruptEvent 330 -NGENProcess 33c -Pipe 324 -Comment "NGen Worker Process"
                            2⤵
                              PID:1476
                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                              C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 330 -InterruptEvent 314 -NGENProcess 2d0 -Pipe 320 -Comment "NGen Worker Process"
                              2⤵
                                PID:2904
                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 314 -InterruptEvent 340 -NGENProcess 2fc -Pipe 308 -Comment "NGen Worker Process"
                                2⤵
                                  PID:2620
                                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                  C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 340 -InterruptEvent 344 -NGENProcess 33c -Pipe 31c -Comment "NGen Worker Process"
                                  2⤵
                                    PID:2712
                                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                    C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 344 -InterruptEvent 33c -NGENProcess 330 -Pipe 34c -Comment "NGen Worker Process"
                                    2⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:2536
                                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                    C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 33c -InterruptEvent 32c -NGENProcess 348 -Pipe 338 -Comment "NGen Worker Process"
                                    2⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:2756
                                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                    C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 32c -InterruptEvent 350 -NGENProcess 340 -Pipe 334 -Comment "NGen Worker Process"
                                    2⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:316
                                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                    C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 350 -InterruptEvent 354 -NGENProcess 330 -Pipe 2d0 -Comment "NGen Worker Process"
                                    2⤵
                                    • System Location Discovery: System Language Discovery
                                    • Modifies data under HKEY_USERS
                                    PID:2972
                                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                    C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 354 -InterruptEvent 358 -NGENProcess 348 -Pipe 314 -Comment "NGen Worker Process"
                                    2⤵
                                      PID:960
                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 358 -InterruptEvent 35c -NGENProcess 350 -Pipe 32c -Comment "NGen Worker Process"
                                      2⤵
                                        PID:924
                                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 35c -InterruptEvent 350 -NGENProcess 348 -Pipe 364 -Comment "NGen Worker Process"
                                        2⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:1956
                                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 350 -InterruptEvent 33c -NGENProcess 344 -Pipe 2fc -Comment "NGen Worker Process"
                                        2⤵
                                          PID:1752
                                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                          C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 33c -InterruptEvent 368 -NGENProcess 358 -Pipe 330 -Comment "NGen Worker Process"
                                          2⤵
                                          • System Location Discovery: System Language Discovery
                                          PID:2804
                                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                          C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 368 -InterruptEvent 358 -NGENProcess 35c -Pipe 370 -Comment "NGen Worker Process"
                                          2⤵
                                          • System Location Discovery: System Language Discovery
                                          PID:2484
                                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                          C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 360 -InterruptEvent 350 -NGENProcess 374 -Pipe 368 -Comment "NGen Worker Process"
                                          2⤵
                                            PID:1872
                                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                            C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 350 -InterruptEvent 340 -NGENProcess 35c -Pipe 354 -Comment "NGen Worker Process"
                                            2⤵
                                            • System Location Discovery: System Language Discovery
                                            • Modifies data under HKEY_USERS
                                            PID:2428
                                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                            C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 378 -InterruptEvent 360 -NGENProcess 37c -Pipe 350 -Comment "NGen Worker Process"
                                            2⤵
                                            • System Location Discovery: System Language Discovery
                                            • Modifies data under HKEY_USERS
                                            PID:2252
                                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                            C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 360 -InterruptEvent 344 -NGENProcess 35c -Pipe 348 -Comment "NGen Worker Process"
                                            2⤵
                                            • System Location Discovery: System Language Discovery
                                            • Modifies data under HKEY_USERS
                                            PID:3028
                                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                            C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 344 -InterruptEvent 380 -NGENProcess 340 -Pipe 33c -Comment "NGen Worker Process"
                                            2⤵
                                            • System Location Discovery: System Language Discovery
                                            • Modifies data under HKEY_USERS
                                            PID:2364
                                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                            C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 344 -InterruptEvent 340 -NGENProcess 380 -Pipe 384 -Comment "NGen Worker Process"
                                            2⤵
                                            • Modifies data under HKEY_USERS
                                            PID:3020
                                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                            C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 340 -InterruptEvent 388 -NGENProcess 35c -Pipe 358 -Comment "NGen Worker Process"
                                            2⤵
                                            • Modifies data under HKEY_USERS
                                            PID:2932
                                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                            C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 388 -InterruptEvent 38c -NGENProcess 36c -Pipe 378 -Comment "NGen Worker Process"
                                            2⤵
                                            • System Location Discovery: System Language Discovery
                                            • Modifies data under HKEY_USERS
                                            PID:1340
                                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                            C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 38c -InterruptEvent 390 -NGENProcess 380 -Pipe 360 -Comment "NGen Worker Process"
                                            2⤵
                                            • System Location Discovery: System Language Discovery
                                            • Modifies data under HKEY_USERS
                                            PID:1944
                                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                            C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 394 -InterruptEvent 390 -NGENProcess 38c -Pipe 35c -Comment "NGen Worker Process"
                                            2⤵
                                            • Modifies data under HKEY_USERS
                                            PID:2780
                                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                            C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 390 -InterruptEvent 37c -NGENProcess 380 -Pipe 344 -Comment "NGen Worker Process"
                                            2⤵
                                            • Modifies data under HKEY_USERS
                                            PID:1972
                                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                            C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 37c -InterruptEvent 39c -NGENProcess 388 -Pipe 374 -Comment "NGen Worker Process"
                                            2⤵
                                            • System Location Discovery: System Language Discovery
                                            • Modifies data under HKEY_USERS
                                            PID:2240
                                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                            C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 39c -InterruptEvent 3a0 -NGENProcess 38c -Pipe 398 -Comment "NGen Worker Process"
                                            2⤵
                                            • System Location Discovery: System Language Discovery
                                            • Modifies data under HKEY_USERS
                                            PID:1872
                                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                            C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3a0 -InterruptEvent 3a4 -NGENProcess 380 -Pipe 340 -Comment "NGen Worker Process"
                                            2⤵
                                            • Loads dropped DLL
                                            • Drops file in Windows directory
                                            • System Location Discovery: System Language Discovery
                                            • Modifies data under HKEY_USERS
                                            PID:2948
                                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                            C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3a4 -InterruptEvent 380 -NGENProcess 39c -Pipe 388 -Comment "NGen Worker Process"
                                            2⤵
                                            • Modifies data under HKEY_USERS
                                            PID:2356
                                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                            C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 380 -InterruptEvent 3ac -NGENProcess 38c -Pipe 390 -Comment "NGen Worker Process"
                                            2⤵
                                              PID:1044
                                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                              C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3b0 -InterruptEvent 3a4 -NGENProcess 3b4 -Pipe 380 -Comment "NGen Worker Process"
                                              2⤵
                                                PID:952
                                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3a4 -InterruptEvent 37c -NGENProcess 38c -Pipe 3a0 -Comment "NGen Worker Process"
                                                2⤵
                                                  PID:948
                                                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                  C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 37c -InterruptEvent 38c -NGENProcess 3b0 -Pipe 3ac -Comment "NGen Worker Process"
                                                  2⤵
                                                    PID:2108
                                                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                    C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 38c -InterruptEvent 3bc -NGENProcess 3b4 -Pipe 394 -Comment "NGen Worker Process"
                                                    2⤵
                                                      PID:1872
                                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3bc -InterruptEvent 3c0 -NGENProcess 3b8 -Pipe 3a8 -Comment "NGen Worker Process"
                                                      2⤵
                                                        PID:952
                                                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3c0 -InterruptEvent 3b8 -NGENProcess 38c -Pipe 3b0 -Comment "NGen Worker Process"
                                                        2⤵
                                                          PID:2620
                                                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                          C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3c8 -InterruptEvent 3a4 -NGENProcess 3cc -Pipe 3c0 -Comment "NGen Worker Process"
                                                          2⤵
                                                            PID:2932
                                                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                            C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3a4 -InterruptEvent 36c -NGENProcess 38c -Pipe 37c -Comment "NGen Worker Process"
                                                            2⤵
                                                              PID:1476
                                                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                              C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 36c -InterruptEvent 3d0 -NGENProcess 3b8 -Pipe 39c -Comment "NGen Worker Process"
                                                              2⤵
                                                                PID:2628
                                                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3d0 -InterruptEvent 3d4 -NGENProcess 3cc -Pipe 3bc -Comment "NGen Worker Process"
                                                                2⤵
                                                                  PID:1752
                                                                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                  C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3d4 -InterruptEvent 3d8 -NGENProcess 38c -Pipe 3b4 -Comment "NGen Worker Process"
                                                                  2⤵
                                                                    PID:1500
                                                                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                    C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3d8 -InterruptEvent 3dc -NGENProcess 3b8 -Pipe 3c8 -Comment "NGen Worker Process"
                                                                    2⤵
                                                                      PID:1488
                                                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3dc -InterruptEvent 3b8 -NGENProcess 3d0 -Pipe 3e4 -Comment "NGen Worker Process"
                                                                      2⤵
                                                                        PID:2252
                                                                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3b8 -InterruptEvent 3a4 -NGENProcess 3e0 -Pipe 36c -Comment "NGen Worker Process"
                                                                        2⤵
                                                                          PID:2388
                                                                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                          C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3e8 -InterruptEvent 3dc -NGENProcess 3ec -Pipe 3b8 -Comment "NGen Worker Process"
                                                                          2⤵
                                                                            PID:2004
                                                                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                            C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3dc -InterruptEvent 3c4 -NGENProcess 3e0 -Pipe 3cc -Comment "NGen Worker Process"
                                                                            2⤵
                                                                              PID:1540
                                                                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                              C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3c4 -InterruptEvent 3e0 -NGENProcess 3d8 -Pipe 3f4 -Comment "NGen Worker Process"
                                                                              2⤵
                                                                                PID:1040
                                                                            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
                                                                              C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
                                                                              1⤵
                                                                              • Executes dropped EXE
                                                                              • Drops file in Windows directory
                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                              PID:1948
                                                                              • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
                                                                                C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 1d0 -InterruptEvent 1bc -NGENProcess 1c0 -Pipe 1cc -Comment "NGen Worker Process"
                                                                                2⤵
                                                                                • Executes dropped EXE
                                                                                PID:932
                                                                              • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
                                                                                C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 240 -InterruptEvent 1bc -NGENProcess 1c0 -Pipe 1d0 -Comment "NGen Worker Process"
                                                                                2⤵
                                                                                • Executes dropped EXE
                                                                                PID:2140
                                                                            • C:\Windows\ehome\ehRecvr.exe
                                                                              C:\Windows\ehome\ehRecvr.exe
                                                                              1⤵
                                                                              • Executes dropped EXE
                                                                              PID:3036
                                                                            • C:\Windows\ehome\ehsched.exe
                                                                              C:\Windows\ehome\ehsched.exe
                                                                              1⤵
                                                                              • Executes dropped EXE
                                                                              PID:616
                                                                            • C:\Windows\eHome\EhTray.exe
                                                                              "C:\Windows\eHome\EhTray.exe" /nav:-2
                                                                              1⤵
                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                              • Suspicious use of FindShellTrayWindow
                                                                              • Suspicious use of SendNotifyMessage
                                                                              PID:1048
                                                                            • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                                                                              "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                                                                              1⤵
                                                                              • Executes dropped EXE
                                                                              PID:544
                                                                            • C:\Windows\ehome\ehRec.exe
                                                                              C:\Windows\ehome\ehRec.exe -Embedding
                                                                              1⤵
                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                              PID:1408
                                                                            • C:\Windows\system32\IEEtwCollector.exe
                                                                              C:\Windows\system32\IEEtwCollector.exe /V
                                                                              1⤵
                                                                              • Executes dropped EXE
                                                                              PID:2272
                                                                            • C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE
                                                                              "C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE" /auditservice
                                                                              1⤵
                                                                              • Executes dropped EXE
                                                                              • Drops file in System32 directory
                                                                              PID:2188
                                                                            • C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe
                                                                              "C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"
                                                                              1⤵
                                                                              • Executes dropped EXE
                                                                              PID:2600
                                                                            • C:\Windows\System32\msdtc.exe
                                                                              C:\Windows\System32\msdtc.exe
                                                                              1⤵
                                                                              • Executes dropped EXE
                                                                              • Drops file in System32 directory
                                                                              PID:1008
                                                                            • C:\Windows\system32\msiexec.exe
                                                                              C:\Windows\system32\msiexec.exe /V
                                                                              1⤵
                                                                              • Executes dropped EXE
                                                                              • Loads dropped DLL
                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                              PID:1696
                                                                            • C:\Program Files (x86)\Common Files\Microsoft Shared\Source Engine\OSE.EXE
                                                                              "C:\Program Files (x86)\Common Files\Microsoft Shared\Source Engine\OSE.EXE"
                                                                              1⤵
                                                                              • Executes dropped EXE
                                                                              PID:2224
                                                                            • C:\Windows\SysWow64\perfhost.exe
                                                                              C:\Windows\SysWow64\perfhost.exe
                                                                              1⤵
                                                                              • Executes dropped EXE
                                                                              PID:1580
                                                                            • C:\Windows\system32\locator.exe
                                                                              C:\Windows\system32\locator.exe
                                                                              1⤵
                                                                              • Executes dropped EXE
                                                                              PID:2304
                                                                            • C:\Windows\System32\snmptrap.exe
                                                                              C:\Windows\System32\snmptrap.exe
                                                                              1⤵
                                                                              • Executes dropped EXE
                                                                              PID:2448
                                                                            • C:\Windows\System32\vds.exe
                                                                              C:\Windows\System32\vds.exe
                                                                              1⤵
                                                                              • Executes dropped EXE
                                                                              PID:2532
                                                                            • C:\Windows\system32\vssvc.exe
                                                                              C:\Windows\system32\vssvc.exe
                                                                              1⤵
                                                                              • Executes dropped EXE
                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                              PID:1868
                                                                            • C:\Windows\system32\wbengine.exe
                                                                              "C:\Windows\system32\wbengine.exe"
                                                                              1⤵
                                                                              • Executes dropped EXE
                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                              PID:2696
                                                                            • C:\Windows\system32\wbem\WmiApSrv.exe
                                                                              C:\Windows\system32\wbem\WmiApSrv.exe
                                                                              1⤵
                                                                              • Executes dropped EXE
                                                                              PID:1968
                                                                            • C:\Program Files\Windows Media Player\wmpnetwk.exe
                                                                              "C:\Program Files\Windows Media Player\wmpnetwk.exe"
                                                                              1⤵
                                                                              • Executes dropped EXE
                                                                              • Modifies data under HKEY_USERS
                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                              PID:1852
                                                                            • C:\Windows\system32\SearchIndexer.exe
                                                                              C:\Windows\system32\SearchIndexer.exe /Embedding
                                                                              1⤵
                                                                              • Executes dropped EXE
                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                              PID:1804
                                                                              • C:\Windows\system32\SearchProtocolHost.exe
                                                                                "C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe_S-1-5-21-3692679935-4019334568-335155002-10001_ Global\UsGthrCtrlFltPipeMssGthrPipe_S-1-5-21-3692679935-4019334568-335155002-10001 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon" "1"
                                                                                2⤵
                                                                                • Suspicious use of SetWindowsHookEx
                                                                                PID:2516
                                                                              • C:\Windows\system32\SearchFilterHost.exe
                                                                                "C:\Windows\system32\SearchFilterHost.exe" 0 596 600 608 65536 604
                                                                                2⤵
                                                                                • Modifies data under HKEY_USERS
                                                                                PID:1284
                                                                              • C:\Windows\system32\SearchProtocolHost.exe
                                                                                "C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe2_ Global\UsGthrCtrlFltPipeMssGthrPipe2 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon"
                                                                                2⤵
                                                                                • Drops file in System32 directory
                                                                                • Modifies data under HKEY_USERS
                                                                                • Suspicious use of SetWindowsHookEx
                                                                                PID:3044

                                                                            Network

                                                                            MITRE ATT&CK Enterprise v15

                                                                            Replay Monitor

                                                                            Loading Replay Monitor...

                                                                            Downloads

                                                                            • C:\Program Files (x86)\Common Files\microsoft shared\Source Engine\OSE.EXE

                                                                              Filesize

                                                                              1.4MB

                                                                              MD5

                                                                              081794f26cb9aa71a7f96ffbe2d14343

                                                                              SHA1

                                                                              4d95c06b76a20e8b605d5e2c61208fc6f85a4e8d

                                                                              SHA256

                                                                              c3505eb4905dfc3a02cecf7006a5c7978ac5b20ee352d2e0fad38d19a632bd58

                                                                              SHA512

                                                                              76070e7fe3fb783546a60cfac3b3c730e5bcb78f068a3f5760eba92cdf77f31baebe21145640c6337e189082c2a21970889d7d6325b1b3b77734bb22510fbf2f

                                                                            • C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE

                                                                              Filesize

                                                                              30.1MB

                                                                              MD5

                                                                              8bddbc2eda658d4e7feea81e847c6f3a

                                                                              SHA1

                                                                              ebb0f75385008a48a9e29d04ce390000279b1522

                                                                              SHA256

                                                                              1ef56382f2641b280aeca1dac86db75e55c7ba99b909ada78f19ecc9fee10221

                                                                              SHA512

                                                                              cc6777e901bfe458b729892d7e84153f827ea5f774e765bf7890c023fcd00093b2e00d4df6937bd552303cfe9a227dc1e3aeeeb5599d26ef349b6993e1ab3168

                                                                            • C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe

                                                                              Filesize

                                                                              1.4MB

                                                                              MD5

                                                                              df853afaf1e0158285a5a92fff944244

                                                                              SHA1

                                                                              c4f2ce30aacf14eb842704fb4ad072b6b4fc46fb

                                                                              SHA256

                                                                              c860dabbc3cc7b20f7381330db2874f65b173f3aa4ae7393d2a1b7f4aaa23c30

                                                                              SHA512

                                                                              9c6b16f1d97328449b63cc323cfa91c7effedde69b6a98371379fd60150d85ce75fe57cfc01767eaaccb4b101e6a970b74c075dac3f7065ad6980d829f1c3781

                                                                            • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe

                                                                              Filesize

                                                                              2.1MB

                                                                              MD5

                                                                              16603ad850760e804134c4cd8331543e

                                                                              SHA1

                                                                              4af16418d6041a7377299e5ab5967ab4c78b8f89

                                                                              SHA256

                                                                              22a141e1ff749b4d2975a4eba4c9dd5b95917d8243026504cc77e8f55eb62a42

                                                                              SHA512

                                                                              9d89326592283e658194ec2729e5f2e8645c89543345d14bcc63f5add0827123f1da9d7073d45087d76b6eee008a8bbb417f0ce102db7e7e65a548b74e8fe49f

                                                                            • C:\Program Files\Windows Media Player\wmpnetwk.exe

                                                                              Filesize

                                                                              2.0MB

                                                                              MD5

                                                                              6a02399a2098efd8b6f79fe7d9a380bd

                                                                              SHA1

                                                                              2fcf1b1fe8e6eb74b09ff3f8f9b9eed7bca06ff3

                                                                              SHA256

                                                                              c95d0330103bbad702762ca98e80cb7d789a2bf5e68d849d3db91db0b022a00e

                                                                              SHA512

                                                                              c36a577af00016931c55983c555baa23791415812ed8dbd40e7df17ccd631ea4f99a8fff5749b80326d6b7eb733677a7b2dbf1971f9fd294652e02a4d0a30cf6

                                                                            • C:\ProgramData\Microsoft\Search\Data\Applications\Windows\MSS.log

                                                                              Filesize

                                                                              1024KB

                                                                              MD5

                                                                              51da34a4f22540e7676f7e66bbb3d544

                                                                              SHA1

                                                                              963a8594079797affc9f8761097d2923fbdaaa79

                                                                              SHA256

                                                                              9f28ece875b6bbe68f45aa53fc6d82f4891ba8112988e67c9d09c564ff6fced6

                                                                              SHA512

                                                                              33cc454adcbf59703a93e68a0523ff49a6e5dea120cfb16f4e5b74417b0bff426e8cf6c6adca7cc92c2a7f65ce626e7eece84b8f3f5c4199afce2a7a6c6f524f

                                                                            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b91050d8b077a4e8.customDestinations-ms

                                                                              Filesize

                                                                              24B

                                                                              MD5

                                                                              b9bd716de6739e51c620f2086f9c31e4

                                                                              SHA1

                                                                              9733d94607a3cba277e567af584510edd9febf62

                                                                              SHA256

                                                                              7116ff028244a01f3d17f1d3bc2e1506bc9999c2e40e388458f0cccc4e117312

                                                                              SHA512

                                                                              cef609e54c7a81a646ad38dba7ac0b82401b220773b9c792cefac80c6564753229f0c011b34ffb56381dd3154a19aee2bf5f602c4d1af01f2cf0fbc1574e4478

                                                                            • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ngen_service.log

                                                                              Filesize

                                                                              872KB

                                                                              MD5

                                                                              1f0d70f0fc12653f318efe66936498c0

                                                                              SHA1

                                                                              854453fbec5ac022e048aeca142c771bbd7572ea

                                                                              SHA256

                                                                              e0bf0de27acef04ba8bcc59dc85cf148c4d87729df9e41aef10ff41e11bd2d11

                                                                              SHA512

                                                                              86f46aefd2b06220d8bbc024105483d05b79cef28cd049b9e71d493322c4e739a29ebe7752135bbad6210856024eed45f59a5387d26ac520c2efb6e1d0ae2d7d

                                                                            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe

                                                                              Filesize

                                                                              1.3MB

                                                                              MD5

                                                                              e7c092821eb89ecec0057091316b0970

                                                                              SHA1

                                                                              ebd94dd45f283f7bb0fa3555140092cf9a4dd76c

                                                                              SHA256

                                                                              0a12cbd388518a23dcaea310fc02b09fb8c262f16b684bd62651f1874355a03c

                                                                              SHA512

                                                                              4dbd888d6f623f3ef7b2c1310d2f9ebd73c5370d0c31ca308de91a56fffc04db8b400af92a3f49831b9854d96b7bc2546de631f95ef89f8203299983690dcb94

                                                                            • C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe

                                                                              Filesize

                                                                              1.3MB

                                                                              MD5

                                                                              b5fb76dc7b0ad2a9edb8ae106fe829b4

                                                                              SHA1

                                                                              b32ea49665483a8071952d4e0db9e3e5210033dc

                                                                              SHA256

                                                                              1b9b7537e626b8544a8387994a170f6d4489b016d2b5c36ca507270cff05491a

                                                                              SHA512

                                                                              1d01a2037a54ca3e849c142b078f3aea521c5dbdb5c382a71de46beeb0c82df722daf86e6971b14c7fbffdd27114c6aabeae3103bd9b1aca2d03500dd528c968

                                                                            • C:\Windows\Microsoft.NET\Framework\v2.0.50727\ngen_service.log

                                                                              Filesize

                                                                              1003KB

                                                                              MD5

                                                                              fbae57b2530bf03edee9c6994ec39a75

                                                                              SHA1

                                                                              04140e1af9bd9b2287eb896749ebe8800ce6b4bf

                                                                              SHA256

                                                                              9ad66abbc1d83e9c25b61e76f5dbb37a706dba83c5bc955499b068a40d0e9140

                                                                              SHA512

                                                                              1f1db3ce149ec973cfaf624d2f5f42adc20fc6afdbfb5428432031686cd9b7511b0e8ecc415fd65415e4cc60c8e7641e1a6c71255ea3d72f60277871a63b518a

                                                                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe

                                                                              Filesize

                                                                              1.3MB

                                                                              MD5

                                                                              bce32e45c01d408d653207b95b3b74a0

                                                                              SHA1

                                                                              1e79d9885d8469a8880f274b8bd9d0a17b9b01d9

                                                                              SHA256

                                                                              571b377aa53a5ec8cd387bd2d7f2facda70493dc567a45027f3dc182e59ae11e

                                                                              SHA512

                                                                              fb602c2bea60fd8bcf0548268f64e2f669c45c2fdb295d2a25296183d233a0c53d55acdcef7f855862ac94494454fc2b966dced843d7105b09586d53a99490cb

                                                                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen_service.log

                                                                              Filesize

                                                                              8KB

                                                                              MD5

                                                                              1ac73c6af4d39f1bfecda24748d2d048

                                                                              SHA1

                                                                              e6a683f4f6bc7b386a1082322588a09775a27f9e

                                                                              SHA256

                                                                              8167d0ad6c1294ebed2fda4e690cfae19e6465059915f6b3db40a3fdb7cd54ed

                                                                              SHA512

                                                                              bef4de23ed8d1e26b2ef85f961aee9f909ae1429343a060680626da0fb920c5416dd29dd22443a977e50d755d928f70355ab0e9e2680fe97af1ead2d300c1d7f

                                                                            • C:\Windows\SysWOW64\perfhost.exe

                                                                              Filesize

                                                                              1.2MB

                                                                              MD5

                                                                              7273368e1ea9812ecc71cd7c7c76fd82

                                                                              SHA1

                                                                              39cb31bf7d0ef9149e7b8757a428fb176174cda5

                                                                              SHA256

                                                                              1883c1bd0eeeb67bc4bec5eecccaabd2161bd14f3084a50231d2b921ccd6e2bd

                                                                              SHA512

                                                                              fdd6e89af92acd9137ba9b5ab638fcae63b05adb9cfc85346ffba51dff1831199abf0ee811eea91d07ee9f66f4eb22f6140aea38eb204ae86db745fe7813f417

                                                                            • C:\Windows\System32\SearchIndexer.exe

                                                                              Filesize

                                                                              1.1MB

                                                                              MD5

                                                                              867470775a87c68ab9888464a29ddf53

                                                                              SHA1

                                                                              7bbd7d31edd1ffa328c7a5412d4a1249c5163247

                                                                              SHA256

                                                                              a92cd9d5de40db3de348d093434529ca87216e4661bf95c516b63226b8d889a6

                                                                              SHA512

                                                                              7555bc3944095383174bb9cb781e274dc244afa31a17652905bf48097454f375b8381e5cc09c3944114a61761c52eb7cce4e5783c03d017b3db97b860b283100

                                                                            • C:\Windows\System32\VSSVC.exe

                                                                              Filesize

                                                                              2.1MB

                                                                              MD5

                                                                              ec3ecdd75b6320d8414dd534e4eeb921

                                                                              SHA1

                                                                              b88faeac402b700623859e748b055fa9890c6466

                                                                              SHA256

                                                                              f3cde1022986d2c5650e0ea67012d223a5d55dda112845477f9df1de3d7a1413

                                                                              SHA512

                                                                              ea03e6df15edba5db3d105cee50ee0e59a9762e1c4aefa010a5fbadeac7e0d08b5478b0fa4684cb5476a3a126854792bb01746d3332fdf47a2f74579ba859cc9

                                                                            • C:\Windows\System32\alg.exe

                                                                              Filesize

                                                                              1.3MB

                                                                              MD5

                                                                              9ecdece52ced512584e897972c738099

                                                                              SHA1

                                                                              3b5d34a1228e7d3d35f185377ad0d1b5f07e9379

                                                                              SHA256

                                                                              4ce7150214120f0f2abf85840f139da68fc742663bcdbcaedc7d4851caa04be3

                                                                              SHA512

                                                                              887ca324c2c5fe08628c45fe76d03f3d8e08187fa365cf5990ff168db5d293e372018f538c822d051db24dc88157b625b04e2614d0ce082f0e61284268ab4036

                                                                            • C:\Windows\System32\ieetwcollector.exe

                                                                              Filesize

                                                                              1.3MB

                                                                              MD5

                                                                              14c4885fca55e46641ad1287d7d99ea4

                                                                              SHA1

                                                                              6341f7ea6f532a7124aa0fc8c64a648d835ea160

                                                                              SHA256

                                                                              1c436a6c25bd1984a39445f5acbd15f4306d795629491b7c6feaf1d006b80bfb

                                                                              SHA512

                                                                              4ea72ce29a041c89a87860ce1e381457a20a463f2f1299ec33bae1a03b55975ed957ebece9d582b96576b56f343274570270e9351efa0d5ef795ad78391c450e

                                                                            • C:\Windows\System32\msdtc.exe

                                                                              Filesize

                                                                              1.4MB

                                                                              MD5

                                                                              20543909d375fc044dad85d9f4d665d4

                                                                              SHA1

                                                                              b06b04f977d5713a837186926041ae4e427784ae

                                                                              SHA256

                                                                              647c464c08c2290467fbc9e5dcfd9252f4ed1232a92518e9abc037a1f33d3aae

                                                                              SHA512

                                                                              61d3f87f4d3ae5caa7d2ee0fbdb21ff0b363c3870356201e8fafec576dc0c53f6d3ab8e497ecd54fd829c73ca5306c5519064aa7ee502f34e5c07d412ca0c4fc

                                                                            • C:\Windows\System32\snmptrap.exe

                                                                              Filesize

                                                                              1.2MB

                                                                              MD5

                                                                              288390a3d11a8a8d36b300bcf7b17713

                                                                              SHA1

                                                                              b3f6716a9d64f6993279c9d17ccfae0db0a98a46

                                                                              SHA256

                                                                              8a808b3bbe2c0b7889744339dfb9e1cb550ed3c0fbf26bd9a5bf574783caf7c5

                                                                              SHA512

                                                                              07ca70e23e2f1592d80d53536c133a93ae4c759f2ec8071d4b65bdbbefbc1e54e660f34cf65136be0b2372ec5a3d31e215de0dd9c8854a730aff7c7bf0110edc

                                                                            • C:\Windows\System32\vds.exe

                                                                              Filesize

                                                                              1.7MB

                                                                              MD5

                                                                              20ef3289ad6abaeeec4d1638f7b894b9

                                                                              SHA1

                                                                              9da9ba39743c881f58d5c3ada76ab94b8f1e5fc0

                                                                              SHA256

                                                                              0204ad3159fe50d4360464576c83d8e7846dc919433155ac5430da5129089fec

                                                                              SHA512

                                                                              499874aca0ac14c1a92209d210ff9bff34f0e63cf9e401484d328e6dac782a517879477e70f4e53ecd94aaba0feacb7b23dddcdaa23a4a453f30aed69ac2d9f2

                                                                            • C:\Windows\System32\wbengine.exe

                                                                              Filesize

                                                                              2.0MB

                                                                              MD5

                                                                              28beee044d03fd309d946c4ad50a4d15

                                                                              SHA1

                                                                              33f7c76541a6feec9c902c32624de9d8b3e00dcc

                                                                              SHA256

                                                                              28e782441bc37e76c6e643b6293a26e6eb639c2e9a466be1dfd5640dfc0bf561

                                                                              SHA512

                                                                              976e17c1203c535db1354c9dd6a6dfe60b8ac150140d45235ba718d920f96a6a5670b8fffdd7c90e377a8a9fcb006321e07ce9702abf86abbc7f80325c52652a

                                                                            • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.Office.To#\135228e87b2c27d26b516ac0fc0ce667\Microsoft.Office.Tools.Word.v9.0.ni.dll

                                                                              Filesize

                                                                              834KB

                                                                              MD5

                                                                              c76656b09bb7df6bd2ac1a6177a0027c

                                                                              SHA1

                                                                              0c296994a249e8649b19be84dce27c9ddafef3e0

                                                                              SHA256

                                                                              a0ae0aec5b203865fac761023741a59d274e2c41889aeb69140eb746d38f6ce0

                                                                              SHA512

                                                                              8390879b8812fc98c17702a52259d510a7fe8bc3cf4972e89f705e93bc8fa98300c34d49f3aec869da8d9f786d33004742e4538019c0f852c61db89c302d5fdf

                                                                            • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.Office.To#\5766ec3721d18a48bec1ca1f60331e2d\Microsoft.Office.Tools.Common.v9.0.ni.dll

                                                                              Filesize

                                                                              797KB

                                                                              MD5

                                                                              aeb0b6e6c5d32d1ada231285ff2ae881

                                                                              SHA1

                                                                              1f04a1c059503896336406aed1dc93340e90b742

                                                                              SHA256

                                                                              4c53ca542ac5ef9d822ef8cb3b0ecef3fb8b937d94c0a7b735bedb275c74a263

                                                                              SHA512

                                                                              e55fd4c4d2966b3f0b6e88292fbd6c20ffa34766e076e763442c15212d19b6dea5d9dc9e7c359d999674a5b2c8a3849c2bbaaf83e7aa8c12715028b06b5a48e1

                                                                            • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.Office.To#\60214b09b490be856c4ee2b3398d71bd\Microsoft.Office.Tools.Outlook.v9.0.ni.dll

                                                                              Filesize

                                                                              163KB

                                                                              MD5

                                                                              e88828b5a35063aa16c68ffb8322215d

                                                                              SHA1

                                                                              8225660ba3a9f528cf6ac32038ae3e0ec98d2331

                                                                              SHA256

                                                                              99facae4828c566c310a1ccf4059100067ab8bfb3d6e94e44dd9e189fd491142

                                                                              SHA512

                                                                              e4d2f5a5aeaa29d4d3392588f15db0d514ca4c86c629f0986ee8dba61e34af5ca9e06b94479efd8dd154026ae0da276888a0214e167129db18316a17d9718a57

                                                                            • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.Office.To#\d7be05162f8d0fba8f4447db13f6695b\Microsoft.Office.Tools.Excel.v9.0.ni.dll

                                                                              Filesize

                                                                              1.3MB

                                                                              MD5

                                                                              006498313e139299a5383f0892c954b9

                                                                              SHA1

                                                                              7b3aa10930da9f29272154e2674b86876957ce3a

                                                                              SHA256

                                                                              489fec79addba2de9141daa61062a05a95e96a196049ce414807bada572cc35c

                                                                              SHA512

                                                                              6a15a10ae66ce0e5b18e060bb53c3108d09f6b07ee2c4a834856f0a35bec2453b32f891620e787731985719831302160678eb52acada102fdb0b87a14288d925

                                                                            • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.Office.To#\e1f8e4d08d4b7f811b7dbbacd324027b\Microsoft.Office.Tools.v9.0.ni.dll

                                                                              Filesize

                                                                              148KB

                                                                              MD5

                                                                              ac901cf97363425059a50d1398e3454b

                                                                              SHA1

                                                                              2f8bd4ac2237a7b7606cb77a3d3c58051793c5c7

                                                                              SHA256

                                                                              f6c7aecb211d9aac911bf80c91e84a47a72ac52cbb523e34e9da6482c0b24c58

                                                                              SHA512

                                                                              6a340b6d5fa8e214f2a58d8b691c749336df087fa75bcc8d8c46f708e4b4ff3d68a61a17d13ee62322b75cbc61d39f5a572588772f3c5d6e5ff32036e5bc5a00

                                                                            • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\03cad6bd8b37d21b28dcb4f955be2158\Microsoft.VisualStudio.Tools.Applications.Contract.v9.0.ni.dll

                                                                              Filesize

                                                                              34KB

                                                                              MD5

                                                                              c26b034a8d6ab845b41ed6e8a8d6001d

                                                                              SHA1

                                                                              3a55774cf22d3244d30f9eb5e26c0a6792a3e493

                                                                              SHA256

                                                                              620b41f5e02df56c33919218bedc238ca7e76552c43da4f0f39a106835a4edc3

                                                                              SHA512

                                                                              483424665c3bc79aeb1de6dfdd633c8526331c7b271b1ea6fe93ab298089e2aceefe7f9c7d0c6e33e604ca7b2ed62e7bb586147fecdf9a0eea60e8c03816f537

                                                                            • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\0cb958acb9cd4cacb46ebc0396e30aa3\Microsoft.VisualStudio.Tools.Office.Contract.v9.0.ni.dll

                                                                              Filesize

                                                                              109KB

                                                                              MD5

                                                                              0fd0f978e977a4122b64ae8f8541de54

                                                                              SHA1

                                                                              153d3390416fdeba1b150816cbbf968e355dc64f

                                                                              SHA256

                                                                              211d2b83bb82042385757f811d90c5ae0a281f3abb3bf1c7901e8559db479e60

                                                                              SHA512

                                                                              ceddfc031bfe4fcf5093d0bbc5697b5fb0cd69b03bc32612325a82ea273dae5daff7e670b0d45816a33307b8b042d27669f5d5391cb2bdcf3e5a0c847c6dcaa8

                                                                            • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\2102a4a38acd7bf79758180885aa7e88\Microsoft.VisualStudio.Tools.Office.Word.HostAdapter.v10.0.ni.dll

                                                                              Filesize

                                                                              187KB

                                                                              MD5

                                                                              dc4889183c67d84b78ff859a329098ed

                                                                              SHA1

                                                                              cdba335df48aca20ed5f50f7b44f19c7f6db09d4

                                                                              SHA256

                                                                              6ed8214fce2905b06a79ce819ed767702614fda3e1310c886294d71cf6efed29

                                                                              SHA512

                                                                              fd833eef90a6456d263dde0a1fb497574af4d60fac0ebba80fe8769032df8d98bf308c57225b25130000f037a96661cb347d18aa1958145d304b44df33a0df5c

                                                                            • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\34e2d8d2ea73913ea442b865efafa9be\Microsoft.VisualStudio.Tools.Office.Excel.HostAdapter.v10.0.ni.dll

                                                                              Filesize

                                                                              180KB

                                                                              MD5

                                                                              c8dd364c1aa7475035959dac9612f8e5

                                                                              SHA1

                                                                              eef844743dfef1de637b38a454f3008e6b192d6f

                                                                              SHA256

                                                                              0e15232ce531d9ccde79c889d4fd5dc750cfbe65bff5ae17dad8d9e855bb421e

                                                                              SHA512

                                                                              fe216cd1adb8f6db4846908b81612bf7a8542e23ab81131050762e11c916843dadc27a7f400d02e3ef6edb419bc7372e10fb7346b24992d2d043951541942001

                                                                            • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\367516b7878af19f5c84c67f2cd277ae\Microsoft.VisualStudio.Tools.Office.Word.AddInAdapter.v9.0.ni.dll

                                                                              Filesize

                                                                              41KB

                                                                              MD5

                                                                              3c269caf88ccaf71660d8dc6c56f4873

                                                                              SHA1

                                                                              f9481bf17e10fe1914644e1b590b82a0ecc2c5c4

                                                                              SHA256

                                                                              de21619e70f9ef8ccbb274bcd0d9d2ace1bae0442dfefab45976671587cf0a48

                                                                              SHA512

                                                                              bd5be3721bf5bd4001127e0381a0589033cb17aa35852f8f073ba9684af7d8c5a0f3ee29987b345fc15fdf28c5b56686087001ef41221a2cfb16498cf4c016c6

                                                                            • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\4d420aa31d320cdf2e1ce2aefe7bc119\Microsoft.VisualStudio.Tools.Office.HostAdapter.v10.0.ni.dll

                                                                              Filesize

                                                                              143KB

                                                                              MD5

                                                                              6f9f108fa2279e1c28463809d1ade2ae

                                                                              SHA1

                                                                              f4a84ed2ee86aca38d3eb4cb8447cae3c7120e1d

                                                                              SHA256

                                                                              bdcf89d2d6f43ae146e1008fceff57d91e78c517a37df09a4d7bb18a935a96c8

                                                                              SHA512

                                                                              9a21732e365f20811a617d579f63a6879ffa0d727d786ea824c651992d079690a476453a365fa52fcffa722e575ce52087ee3757ad90db3ba308fda6567ace3f

                                                                            • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\8c6bac317f75b51647ea3a8da141b143\Microsoft.VisualStudio.Tools.Office.AddInAdapter.v9.0.ni.dll

                                                                              Filesize

                                                                              210KB

                                                                              MD5

                                                                              4f40997b51420653706cb0958086cd2d

                                                                              SHA1

                                                                              0069b956d17ce7d782a0e054995317f2f621b502

                                                                              SHA256

                                                                              8cd6a0b061b43e0b660b81859c910290a3672b00d7647ba0e86eda6ddcc8c553

                                                                              SHA512

                                                                              e18953d7a348859855e5f6e279bc9924fc3707b57a733ce9b8f7d21bd631d419f1ebfb29202608192eb346569ca9a55264f5b4c2aedd474c22060734a68a4ee6

                                                                            • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\929f437eaab6783b208bcd8f27e99fa8\Microsoft.VisualStudio.Tools.Office.Outlook.HostAdapter.v10.0.ni.dll

                                                                              Filesize

                                                                              83KB

                                                                              MD5

                                                                              61c010b4348555bab9ce20a2490a2cdc

                                                                              SHA1

                                                                              94a925e951beaee0372b96ba925ac8476e25c3ed

                                                                              SHA256

                                                                              330bf08e2cee36948f5af303f989cc4d8d607b0494a253b60ad25bf03b6be881

                                                                              SHA512

                                                                              c65300886af88a3bb12f8d1cb55a81cd3dc36ffe63dc713895c71bb38949a77d3248ae2222523cc3312aeaee67193e81c499e53ddcce54572263786aa6c0eef3

                                                                            • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\9306fc630870a75ddd23441ad77bdc57\Microsoft.VisualStudio.Tools.Applications.Runtime.v10.0.ni.dll

                                                                              Filesize

                                                                              53KB

                                                                              MD5

                                                                              e3a7a2b65afd8ab8b154fdc7897595c3

                                                                              SHA1

                                                                              b21eefd6e23231470b5cf0bd0d7363879a2ed228

                                                                              SHA256

                                                                              e5faf5e8adf46a8246e6b5038409dadca46985a9951343a1936237d2c8d7a845

                                                                              SHA512

                                                                              6537c7ed398deb23be1256445297cb7c8d7801bf6e163d918d8e258213708b28f7255ecff9fbd3431d8f5e5a746aa95a29d3a777b28fcd688777aed6d8205a33

                                                                            • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\afa5bb1a39443d7dc81dfff54073929b\Microsoft.VisualStudio.Tools.Office.Contract.v10.0.ni.dll

                                                                              Filesize

                                                                              28KB

                                                                              MD5

                                                                              aefc3f3c8e7499bad4d05284e8abd16c

                                                                              SHA1

                                                                              7ab718bde7fdb2d878d8725dc843cfeba44a71f7

                                                                              SHA256

                                                                              4436550409cfb3d06b15dd0c3131e87e7002b0749c7c6e9dc3378c99dbec815d

                                                                              SHA512

                                                                              1d7dbc9764855a9a1f945c1bc8e86406c0625f1381d71b3ea6924322fbe419d1c70c3f3efd57ee2cb2097bb9385e0bf54965ab789328a80eb4946849648fe20b

                                                                            • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\de06a98a598aa0ff716a25b24d56ad7f\Microsoft.VisualStudio.Tools.Applications.Contract.v10.0.ni.dll

                                                                              Filesize

                                                                              27KB

                                                                              MD5

                                                                              9c60454398ce4bce7a52cbda4a45d364

                                                                              SHA1

                                                                              da1e5de264a6f6051b332f8f32fa876d297bf620

                                                                              SHA256

                                                                              edc90887d38c87282f49adbb12a94040f9ac86058bfae15063aaaff2672b54e1

                                                                              SHA512

                                                                              533b7e9c55102b248f4a7560955734b4156eb4c02539c6f978aeacecff1ff182ba0f04a07d32ed90707a62d73191b0e2d2649f38ae1c3e7a5a4c0fbea9a94300

                                                                            • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\e0220058091b941725ef02be0b84abe7\Microsoft.VisualStudio.Tools.Applications.HostAdapter.v10.0.ni.dll

                                                                              Filesize

                                                                              57KB

                                                                              MD5

                                                                              6eaaa1f987d6e1d81badf8665c55a341

                                                                              SHA1

                                                                              e52db4ad92903ca03a5a54fdb66e2e6fad59efd5

                                                                              SHA256

                                                                              4b78ffa5f0b6751aea11917db5961d566e2f59beaa054b41473d331fd392329e

                                                                              SHA512

                                                                              dbedfa6c569670c22d34d923e22b7dae7332b932b809082dad87a1f0bb125c912db37964b5881667867ccf23dc5e5be596aad85485746f8151ce1c51ffd097b2

                                                                            • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\ee73646032cbb022d16771203727e3b2\Microsoft.VisualStudio.Tools.Applications.Runtime.v9.0.ni.dll

                                                                              Filesize

                                                                              130KB

                                                                              MD5

                                                                              2735d2ab103beb0f7c1fbd6971838274

                                                                              SHA1

                                                                              6063646bc072546798bf8bf347425834f2bfad71

                                                                              SHA256

                                                                              f00156860ec7e88f4ccb459ca29b7e0e5c169cdc8a081cb043603187d25d92b3

                                                                              SHA512

                                                                              fe2ce60c7f61760a29344e254771d48995e983e158da0725818f37441f9690bda46545bf10c84b163f6afb163ffb504913d6ffddf84f72b062c7f233aed896de

                                                                            • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\f1a7ac664667f2d6bcd6c388b230c22b\Microsoft.VisualStudio.Tools.Applications.AddInAdapter.v9.0.ni.dll

                                                                              Filesize

                                                                              59KB

                                                                              MD5

                                                                              8c69bbdfbc8cc3fa3fa5edcd79901e94

                                                                              SHA1

                                                                              b8028f0f557692221d5c0160ec6ce414b2bdf19b

                                                                              SHA256

                                                                              a21471690e7c32c80049e17c13624820e77bca6c9c38b83d9ea8a7248086660d

                                                                              SHA512

                                                                              825f5b87b76303b62fc16a96b108fb1774c2aca52ac5e44cd0ac2fe2ee47d5d67947dfe7498e36bc849773f608ec5824711f8c36e375a378582eefb57c9c2557

                                                                            • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\fc36797f7054935a6033077612905a0f\Microsoft.VisualStudio.Tools.Office.Excel.AddInAdapter.v9.0.ni.dll

                                                                              Filesize

                                                                              42KB

                                                                              MD5

                                                                              71d4273e5b77cf01239a5d4f29e064fc

                                                                              SHA1

                                                                              e8876dea4e4c4c099e27234742016be3c80d8b62

                                                                              SHA256

                                                                              f019899f829731f899a99885fd52fde1fe4a4f6fe3ecf7f7a7cfa78517c00575

                                                                              SHA512

                                                                              41fe67cda988c53bd087df6296d1a242cddac688718ea5a5884a72b43e9638538e64d7a59e045c0b4d490496d884cf0ec694ddf7fcb41ae3b8cbc65b7686b180

                                                                            • C:\Windows\assembly\NativeImages_v2.0.50727_32\ehiVidCtl\88e20c69254157d91b96eadc9444815d\ehiVidCtl.ni.dll

                                                                              Filesize

                                                                              855KB

                                                                              MD5

                                                                              7812b0a90d92b4812d4063b89a970c58

                                                                              SHA1

                                                                              3c4a789b8d28a5bfa6a6191624e33b8f40e4c4ea

                                                                              SHA256

                                                                              897626e6af00e85e627eeaa7f9563b245335242bc6196b36d0072e5b6d45e543

                                                                              SHA512

                                                                              634a2395bada9227b1957f2b76ed7e19f12bfc4d71a145d182602a1b6e24d83e220ebfabd602b1995c360e1725a38a89ff58417b0295bb0da9ea35c41c21a6ed

                                                                            • C:\Windows\assembly\NativeImages_v2.0.50727_32\stdole\2c6d60b55bbab22515c512080d4b3bae\stdole.ni.dll

                                                                              Filesize

                                                                              43KB

                                                                              MD5

                                                                              3e72bdd0663c5b2bcd530f74139c83e3

                                                                              SHA1

                                                                              66069bcac0207512b9e07320f4fa5934650677d2

                                                                              SHA256

                                                                              6a6ac3094130d1affd34aae5ba2bd8c889e2071eb4217a75d72b5560f884e357

                                                                              SHA512

                                                                              b0a98db477fccae71b4ebfb8525ed52c10f1e7542f955b307f260e27e0758aa22896683302e34b0237e7e3bba9f5193ddcc7ff255c71fbaa1386988b0ec7d626

                                                                            • C:\Windows\ehome\ehrecvr.exe

                                                                              Filesize

                                                                              1.2MB

                                                                              MD5

                                                                              b77c223c66d0d6bcbb1d7d8cf9925290

                                                                              SHA1

                                                                              bfc2a6b666ba81fd33b8a3646175a597cc4c7458

                                                                              SHA256

                                                                              2a5f431ba5f4e10bae0c1a6fac64a3b2e5751d56fc911e69504304d23befdfe1

                                                                              SHA512

                                                                              e454712e2e6b19a3dfb409e7ecb30f36928dbf7c267e846c796a50cfc8ac12219e2d0d4f3d874cbf366c69e9b8b782f3a602dc17aacf1ca07ff3fcbc2bb44c75

                                                                            • C:\Windows\ehome\ehsched.exe

                                                                              Filesize

                                                                              1.3MB

                                                                              MD5

                                                                              a39a5f963ee5aea25bc040ddcefb09e1

                                                                              SHA1

                                                                              2e578776bc7f6447ab571adc36daa9615e7d2866

                                                                              SHA256

                                                                              e9c5ad387271ab1297f4862bd08e087e09d643491c57f658890a9cc383702a0c

                                                                              SHA512

                                                                              be7980e5c26a8c9e10c4649b80c0a325357e311c89026b152a65f3ec149511758ff833f101e63993c2c5907ac55a2573e677e25bdeafe80514a355334deb9fe5

                                                                            • C:\Windows\tasksche.exe

                                                                              Filesize

                                                                              3.4MB

                                                                              MD5

                                                                              fc0195c3fbc9d1ba19811d3c36b2bea4

                                                                              SHA1

                                                                              d618abf74712f8730fbad1d0988d1c30e1ec036b

                                                                              SHA256

                                                                              0c2837a2d107e6f9b508e63a48da7ef89e902907df6102a9de2fd2509316f739

                                                                              SHA512

                                                                              01423a0dd12ce2b337ef97087073945c9282cc0c51d8be12c43425e3357292b92f29ed43af52e7d6ff34adbb1cc10f8b34d2362995b3a9248bad71337b92d965

                                                                            • \Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe

                                                                              Filesize

                                                                              1.3MB

                                                                              MD5

                                                                              72fc715acd49c04715ab45e197d6d85e

                                                                              SHA1

                                                                              03694cdbf7900030109b363e342c6791d1a3a933

                                                                              SHA256

                                                                              5c6eda699554aae908e4809223b1e9b875f7920bedb2164b36c269a33bb5dbe5

                                                                              SHA512

                                                                              1f774958703dd731d897a9e5b8b0424ec2a859d56829531f576a2a7007481153a7e1be9fc166677581d1a5841ea1d34ddcf52b2cf90edc11aa374cf6d8ed8bc7

                                                                            • \Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe

                                                                              Filesize

                                                                              1.3MB

                                                                              MD5

                                                                              9cf6b6a510dd189e2b37cc68f40683c1

                                                                              SHA1

                                                                              b31679e29a7736c201613efedf61b20c995d5c14

                                                                              SHA256

                                                                              8f5c79af5876e679f76c5d5756e8a9fb8e273eff932429cb0857e71e1a789f5e

                                                                              SHA512

                                                                              4a5c7e2ac6d634fc35b04273b0ace9deeecb7ea52e57dedbdeb935c68292f93ea5847b9090dff45e91bd123b117cb794e181a0e82b8333b52788b26308e132e8

                                                                            • \Windows\System32\Locator.exe

                                                                              Filesize

                                                                              1.2MB

                                                                              MD5

                                                                              461d2fe8eff31a3637bc2100c92e4202

                                                                              SHA1

                                                                              aea3aa75fc9c0ee11d878cd7c6a30ff63843fb2a

                                                                              SHA256

                                                                              c724f86683ab9a87cdbfdd48a3f2174979a698bb7c76a37bea3d76eb8d407966

                                                                              SHA512

                                                                              0705337be184eb02f7a273ca9e8ac72b1051bbcd56c5f4011e7ff2700b2b99cce5ac35ce6665e7cc08298c68053dadb5ae14c6f7a48428b79a941dc4cbf0ea1c

                                                                            • \Windows\System32\msiexec.exe

                                                                              Filesize

                                                                              1.3MB

                                                                              MD5

                                                                              1704fd4b827740e6fe3ab6ef57f65c9b

                                                                              SHA1

                                                                              44ceabfcdad46389a73766be5501e1a0ecdd1b2f

                                                                              SHA256

                                                                              9f5fc6c13db4cbece36bb7adf4859799da8616ab5e9e3f1a277f3e105f5b23ae

                                                                              SHA512

                                                                              ff581fc3edad29e711fc8575b90aed1c8a4543c32f4f37dfe72285199743ceea81f53c51b26fc1615ef4a21c9d7836fb3f0538d8afd5140f36ee01468d4bbef6

                                                                            • \Windows\System32\wbem\WmiApSrv.exe

                                                                              Filesize

                                                                              1.4MB

                                                                              MD5

                                                                              d66fc6202efb86b3c6df9aec9c3f90c5

                                                                              SHA1

                                                                              5ba491673c2e7daffb5f9fbf702afe708b484273

                                                                              SHA256

                                                                              7d3b1b4c64e4ca683c8922ab1cd233907e9268cb9ebb6b02201a916d2bab7113

                                                                              SHA512

                                                                              6c12907704c2ea5399f4bd350e8fd0d04d94d3997b055d46ad09080041aa855e7b173ba8150618e44b8101768564d7dc97ecc536809117ab884463e046e7ccfe

                                                                            • memory/544-130-0x0000000000330000-0x0000000000390000-memory.dmp

                                                                              Filesize

                                                                              384KB

                                                                            • memory/544-123-0x0000000000330000-0x0000000000390000-memory.dmp

                                                                              Filesize

                                                                              384KB

                                                                            • memory/544-201-0x0000000140000000-0x0000000140237000-memory.dmp

                                                                              Filesize

                                                                              2.2MB

                                                                            • memory/544-132-0x0000000140000000-0x0000000140237000-memory.dmp

                                                                              Filesize

                                                                              2.2MB

                                                                            • memory/616-748-0x0000000140000000-0x0000000140209000-memory.dmp

                                                                              Filesize

                                                                              2.0MB

                                                                            • memory/616-115-0x0000000000170000-0x00000000001D0000-memory.dmp

                                                                              Filesize

                                                                              384KB

                                                                            • memory/616-117-0x0000000140000000-0x0000000140209000-memory.dmp

                                                                              Filesize

                                                                              2.0MB

                                                                            • memory/616-108-0x0000000000170000-0x00000000001D0000-memory.dmp

                                                                              Filesize

                                                                              384KB

                                                                            • memory/616-188-0x0000000140000000-0x0000000140209000-memory.dmp

                                                                              Filesize

                                                                              2.0MB

                                                                            • memory/1008-167-0x0000000140000000-0x000000014020D000-memory.dmp

                                                                              Filesize

                                                                              2.1MB

                                                                            • memory/1008-245-0x0000000140000000-0x000000014020D000-memory.dmp

                                                                              Filesize

                                                                              2.1MB

                                                                            • memory/1116-881-0x0000000001DB0000-0x0000000001E3C000-memory.dmp

                                                                              Filesize

                                                                              560KB

                                                                            • memory/1116-884-0x0000000001DB0000-0x0000000001E9C000-memory.dmp

                                                                              Filesize

                                                                              944KB

                                                                            • memory/1116-878-0x0000000000D90000-0x0000000000D9A000-memory.dmp

                                                                              Filesize

                                                                              40KB

                                                                            • memory/1116-879-0x0000000000D90000-0x0000000000DAE000-memory.dmp

                                                                              Filesize

                                                                              120KB

                                                                            • memory/1116-890-0x0000000001DB0000-0x0000000001E16000-memory.dmp

                                                                              Filesize

                                                                              408KB

                                                                            • memory/1116-880-0x0000000000D90000-0x0000000000DAA000-memory.dmp

                                                                              Filesize

                                                                              104KB

                                                                            • memory/1116-59-0x0000000000400000-0x00000000005FF000-memory.dmp

                                                                              Filesize

                                                                              2.0MB

                                                                            • memory/1116-889-0x0000000000E30000-0x0000000000E5A000-memory.dmp

                                                                              Filesize

                                                                              168KB

                                                                            • memory/1116-888-0x0000000000D90000-0x0000000000D98000-memory.dmp

                                                                              Filesize

                                                                              32KB

                                                                            • memory/1116-882-0x0000000001DB0000-0x0000000001E54000-memory.dmp

                                                                              Filesize

                                                                              656KB

                                                                            • memory/1116-887-0x0000000000E30000-0x0000000000E54000-memory.dmp

                                                                              Filesize

                                                                              144KB

                                                                            • memory/1116-886-0x0000000001DB0000-0x0000000001E38000-memory.dmp

                                                                              Filesize

                                                                              544KB

                                                                            • memory/1116-65-0x0000000000350000-0x00000000003B6000-memory.dmp

                                                                              Filesize

                                                                              408KB

                                                                            • memory/1116-885-0x0000000000D90000-0x0000000000DA0000-memory.dmp

                                                                              Filesize

                                                                              64KB

                                                                            • memory/1116-162-0x0000000000400000-0x00000000005FF000-memory.dmp

                                                                              Filesize

                                                                              2.0MB

                                                                            • memory/1116-60-0x0000000000350000-0x00000000003B6000-memory.dmp

                                                                              Filesize

                                                                              408KB

                                                                            • memory/1116-883-0x0000000001DB0000-0x0000000001F4E000-memory.dmp

                                                                              Filesize

                                                                              1.6MB

                                                                            • memory/1580-280-0x0000000001000000-0x00000000011ED000-memory.dmp

                                                                              Filesize

                                                                              1.9MB

                                                                            • memory/1580-203-0x0000000001000000-0x00000000011ED000-memory.dmp

                                                                              Filesize

                                                                              1.9MB

                                                                            • memory/1604-51-0x0000000010000000-0x00000000101FE000-memory.dmp

                                                                              Filesize

                                                                              2.0MB

                                                                            • memory/1604-88-0x0000000010000000-0x00000000101FE000-memory.dmp

                                                                              Filesize

                                                                              2.0MB

                                                                            • memory/1664-44-0x0000000010000000-0x00000000101F6000-memory.dmp

                                                                              Filesize

                                                                              2.0MB

                                                                            • memory/1664-75-0x0000000010000000-0x00000000101F6000-memory.dmp

                                                                              Filesize

                                                                              2.0MB

                                                                            • memory/1696-261-0x0000000000580000-0x0000000000789000-memory.dmp

                                                                              Filesize

                                                                              2.0MB

                                                                            • memory/1696-187-0x0000000000580000-0x0000000000789000-memory.dmp

                                                                              Filesize

                                                                              2.0MB

                                                                            • memory/1696-260-0x0000000100000000-0x0000000100209000-memory.dmp

                                                                              Filesize

                                                                              2.0MB

                                                                            • memory/1696-186-0x0000000100000000-0x0000000100209000-memory.dmp

                                                                              Filesize

                                                                              2.0MB

                                                                            • memory/1728-262-0x0000000000400000-0x00000000005FF000-memory.dmp

                                                                              Filesize

                                                                              2.0MB

                                                                            • memory/1728-308-0x0000000000400000-0x00000000005FF000-memory.dmp

                                                                              Filesize

                                                                              2.0MB

                                                                            • memory/1804-749-0x0000000100000000-0x0000000100123000-memory.dmp

                                                                              Filesize

                                                                              1.1MB

                                                                            • memory/1804-294-0x0000000100000000-0x0000000100123000-memory.dmp

                                                                              Filesize

                                                                              1.1MB

                                                                            • memory/1808-579-0x0000000003D30000-0x0000000003DEA000-memory.dmp

                                                                              Filesize

                                                                              744KB

                                                                            • memory/1852-271-0x0000000100000000-0x000000010020A000-memory.dmp

                                                                              Filesize

                                                                              2.0MB

                                                                            • memory/1852-719-0x0000000100000000-0x000000010020A000-memory.dmp

                                                                              Filesize

                                                                              2.0MB

                                                                            • memory/1868-232-0x0000000100000000-0x0000000100219000-memory.dmp

                                                                              Filesize

                                                                              2.1MB

                                                                            • memory/1868-443-0x0000000100000000-0x0000000100219000-memory.dmp

                                                                              Filesize

                                                                              2.1MB

                                                                            • memory/1948-83-0x0000000000630000-0x0000000000690000-memory.dmp

                                                                              Filesize

                                                                              384KB

                                                                            • memory/1948-85-0x0000000140000000-0x0000000140205000-memory.dmp

                                                                              Filesize

                                                                              2.0MB

                                                                            • memory/1948-77-0x0000000000630000-0x0000000000690000-memory.dmp

                                                                              Filesize

                                                                              384KB

                                                                            • memory/1968-266-0x0000000100000000-0x000000010021B000-memory.dmp

                                                                              Filesize

                                                                              2.1MB

                                                                            • memory/1968-667-0x0000000100000000-0x000000010021B000-memory.dmp

                                                                              Filesize

                                                                              2.1MB

                                                                            • memory/1980-86-0x0000000100000000-0x00000001001FB000-memory.dmp

                                                                              Filesize

                                                                              2.0MB

                                                                            • memory/1980-12-0x0000000100000000-0x00000001001FB000-memory.dmp

                                                                              Filesize

                                                                              2.0MB

                                                                            • memory/2188-216-0x000000002E000000-0x000000002FE1E000-memory.dmp

                                                                              Filesize

                                                                              30.1MB

                                                                            • memory/2188-148-0x000000002E000000-0x000000002FE1E000-memory.dmp

                                                                              Filesize

                                                                              30.1MB

                                                                            • memory/2224-270-0x000000002E000000-0x000000002E20C000-memory.dmp

                                                                              Filesize

                                                                              2.0MB

                                                                            • memory/2224-199-0x000000002E000000-0x000000002E20C000-memory.dmp

                                                                              Filesize

                                                                              2.0MB

                                                                            • memory/2272-137-0x0000000140000000-0x0000000140205000-memory.dmp

                                                                              Filesize

                                                                              2.0MB

                                                                            • memory/2272-752-0x0000000140000000-0x0000000140205000-memory.dmp

                                                                              Filesize

                                                                              2.0MB

                                                                            • memory/2272-206-0x0000000140000000-0x0000000140205000-memory.dmp

                                                                              Filesize

                                                                              2.0MB

                                                                            • memory/2304-293-0x0000000100000000-0x00000001001EC000-memory.dmp

                                                                              Filesize

                                                                              1.9MB

                                                                            • memory/2304-208-0x0000000100000000-0x00000001001EC000-memory.dmp

                                                                              Filesize

                                                                              1.9MB

                                                                            • memory/2352-373-0x0000000000400000-0x00000000005FF000-memory.dmp

                                                                              Filesize

                                                                              2.0MB

                                                                            • memory/2352-317-0x0000000000400000-0x00000000005FF000-memory.dmp

                                                                              Filesize

                                                                              2.0MB

                                                                            • memory/2412-247-0x0000000000400000-0x00000000005FF000-memory.dmp

                                                                              Filesize

                                                                              2.0MB

                                                                            • memory/2412-264-0x0000000000400000-0x00000000005FF000-memory.dmp

                                                                              Filesize

                                                                              2.0MB

                                                                            • memory/2424-17-0x0000000000810000-0x0000000000870000-memory.dmp

                                                                              Filesize

                                                                              384KB

                                                                            • memory/2424-25-0x0000000000810000-0x0000000000870000-memory.dmp

                                                                              Filesize

                                                                              384KB

                                                                            • memory/2424-16-0x0000000140000000-0x00000001401F4000-memory.dmp

                                                                              Filesize

                                                                              2.0MB

                                                                            • memory/2424-114-0x0000000140000000-0x00000001401F4000-memory.dmp

                                                                              Filesize

                                                                              2.0MB

                                                                            • memory/2448-217-0x0000000100000000-0x00000001001ED000-memory.dmp

                                                                              Filesize

                                                                              1.9MB

                                                                            • memory/2448-316-0x0000000100000000-0x00000001001ED000-memory.dmp

                                                                              Filesize

                                                                              1.9MB

                                                                            • memory/2532-220-0x0000000100000000-0x000000010026B000-memory.dmp

                                                                              Filesize

                                                                              2.4MB

                                                                            • memory/2532-399-0x0000000100000000-0x000000010026B000-memory.dmp

                                                                              Filesize

                                                                              2.4MB

                                                                            • memory/2568-43-0x0000000000400000-0x0000000000AFA000-memory.dmp

                                                                              Filesize

                                                                              7.0MB

                                                                            • memory/2568-8-0x0000000000400000-0x0000000000AFA000-memory.dmp

                                                                              Filesize

                                                                              7.0MB

                                                                            • memory/2568-5-0x0000000000BE0000-0x0000000000C46000-memory.dmp

                                                                              Filesize

                                                                              408KB

                                                                            • memory/2568-0-0x0000000000BE0000-0x0000000000C46000-memory.dmp

                                                                              Filesize

                                                                              408KB

                                                                            • memory/2600-184-0x0000000140000000-0x0000000140221000-memory.dmp

                                                                              Filesize

                                                                              2.1MB

                                                                            • memory/2600-159-0x0000000140000000-0x0000000140221000-memory.dmp

                                                                              Filesize

                                                                              2.1MB

                                                                            • memory/2696-522-0x0000000100000000-0x0000000100202000-memory.dmp

                                                                              Filesize

                                                                              2.0MB

                                                                            • memory/2696-235-0x0000000100000000-0x0000000100202000-memory.dmp

                                                                              Filesize

                                                                              2.0MB

                                                                            • memory/2848-198-0x0000000000400000-0x00000000005FF000-memory.dmp

                                                                              Filesize

                                                                              2.0MB

                                                                            • memory/2848-249-0x0000000000400000-0x00000000005FF000-memory.dmp

                                                                              Filesize

                                                                              2.0MB

                                                                            • memory/2916-131-0x0000000000400000-0x0000000000AFA000-memory.dmp

                                                                              Filesize

                                                                              7.0MB

                                                                            • memory/2916-136-0x0000000000400000-0x0000000000AFA000-memory.dmp

                                                                              Filesize

                                                                              7.0MB

                                                                            • memory/2916-28-0x0000000000B00000-0x0000000000B66000-memory.dmp

                                                                              Filesize

                                                                              408KB

                                                                            • memory/2916-33-0x0000000000B00000-0x0000000000B66000-memory.dmp

                                                                              Filesize

                                                                              408KB

                                                                            • memory/2916-35-0x0000000000400000-0x0000000000AFA000-memory.dmp

                                                                              Filesize

                                                                              7.0MB

                                                                            • memory/3036-168-0x0000000140000000-0x000000014013C000-memory.dmp

                                                                              Filesize

                                                                              1.2MB

                                                                            • memory/3036-96-0x0000000140000000-0x000000014013C000-memory.dmp

                                                                              Filesize

                                                                              1.2MB

                                                                            • memory/3036-103-0x0000000000270000-0x00000000002D0000-memory.dmp

                                                                              Filesize

                                                                              384KB

                                                                            • memory/3036-97-0x0000000000270000-0x00000000002D0000-memory.dmp

                                                                              Filesize

                                                                              384KB

                                                                            • memory/3036-120-0x0000000001390000-0x00000000013A0000-memory.dmp

                                                                              Filesize

                                                                              64KB

                                                                            • memory/3036-119-0x0000000001380000-0x0000000001390000-memory.dmp

                                                                              Filesize

                                                                              64KB

                                                                            • memory/3036-826-0x0000000140000000-0x000000014013C000-memory.dmp

                                                                              Filesize

                                                                              1.2MB