Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
01-07-2024 03:42
Static task
static1
Behavioral task
behavioral1
Sample
32e9e2a1b7f8cfbb6347b01039bb01cb8295083119a3de419b215b9c351ee33e_NeikiAnalytics.exe
Resource
win7-20231129-en
General
-
Target
32e9e2a1b7f8cfbb6347b01039bb01cb8295083119a3de419b215b9c351ee33e_NeikiAnalytics.exe
-
Size
648KB
-
MD5
657f1b00bc17e21affbcfa9a2abb6100
-
SHA1
6c1fd507a702b2971a2200cb2e8b2aa895b82c81
-
SHA256
32e9e2a1b7f8cfbb6347b01039bb01cb8295083119a3de419b215b9c351ee33e
-
SHA512
e918537a89ba58d3e1597aaf13cab01466a1e567089a0c4101c002848a02f3e0a3bc2b7e6332c65e199cf93dbd355d932dfc89dee21fc100d009ebe6ef1b1f33
-
SSDEEP
12288:Eqz2DWUjYJlARaGdf1IrOrNhyRfLz707YH7lk9wl225CnPkKb5rdRYd:dz2DWwYvoKFLgYHJWwl24C15rDY
Malware Config
Signatures
-
Executes dropped EXE 22 IoCs
Processes:
alg.exeDiagnosticsHub.StandardCollector.Service.exefxssvc.exeelevation_service.exeelevation_service.exemaintenanceservice.exemsdtc.exeOSE.EXEPerceptionSimulationService.exeperfhost.exelocator.exeSensorDataService.exesnmptrap.exespectrum.exessh-agent.exeTieringEngineService.exeAgentService.exevds.exevssvc.exewbengine.exeWmiApSrv.exeSearchIndexer.exepid process 1668 alg.exe 3628 DiagnosticsHub.StandardCollector.Service.exe 1400 fxssvc.exe 2320 elevation_service.exe 3468 elevation_service.exe 548 maintenanceservice.exe 4488 msdtc.exe 4988 OSE.EXE 1824 PerceptionSimulationService.exe 1712 perfhost.exe 4976 locator.exe 760 SensorDataService.exe 4484 snmptrap.exe 3548 spectrum.exe 3436 ssh-agent.exe 4700 TieringEngineService.exe 4832 AgentService.exe 2264 vds.exe 3084 vssvc.exe 3656 wbengine.exe 4688 WmiApSrv.exe 1768 SearchIndexer.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in System32 directory 37 IoCs
Processes:
DiagnosticsHub.StandardCollector.Service.exeelevation_service.exe32e9e2a1b7f8cfbb6347b01039bb01cb8295083119a3de419b215b9c351ee33e_NeikiAnalytics.exemsdtc.exedescription ioc process File opened for modification C:\Windows\system32\fxssvc.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Windows\system32\SgrmBroker.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Windows\system32\msiexec.exe elevation_service.exe File opened for modification C:\Windows\system32\AgentService.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Windows\system32\AppVClient.exe elevation_service.exe File opened for modification C:\Windows\system32\dllhost.exe 32e9e2a1b7f8cfbb6347b01039bb01cb8295083119a3de419b215b9c351ee33e_NeikiAnalytics.exe File opened for modification C:\Windows\system32\fxssvc.exe 32e9e2a1b7f8cfbb6347b01039bb01cb8295083119a3de419b215b9c351ee33e_NeikiAnalytics.exe File opened for modification C:\Windows\System32\msdtc.exe 32e9e2a1b7f8cfbb6347b01039bb01cb8295083119a3de419b215b9c351ee33e_NeikiAnalytics.exe File opened for modification C:\Windows\system32\PerceptionSimulation\PerceptionSimulationService.exe 32e9e2a1b7f8cfbb6347b01039bb01cb8295083119a3de419b215b9c351ee33e_NeikiAnalytics.exe File opened for modification C:\Windows\System32\vds.exe 32e9e2a1b7f8cfbb6347b01039bb01cb8295083119a3de419b215b9c351ee33e_NeikiAnalytics.exe File opened for modification C:\Windows\system32\msiexec.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Windows\system32\MSDtc\MSDTC.LOG msdtc.exe File opened for modification C:\Windows\system32\spectrum.exe 32e9e2a1b7f8cfbb6347b01039bb01cb8295083119a3de419b215b9c351ee33e_NeikiAnalytics.exe File opened for modification C:\Windows\system32\AgentService.exe 32e9e2a1b7f8cfbb6347b01039bb01cb8295083119a3de419b215b9c351ee33e_NeikiAnalytics.exe File opened for modification C:\Windows\system32\AgentService.exe elevation_service.exe File opened for modification C:\Windows\System32\alg.exe 32e9e2a1b7f8cfbb6347b01039bb01cb8295083119a3de419b215b9c351ee33e_NeikiAnalytics.exe File opened for modification C:\Windows\system32\AppVClient.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Windows\system32\SgrmBroker.exe elevation_service.exe File opened for modification C:\Windows\system32\msiexec.exe 32e9e2a1b7f8cfbb6347b01039bb01cb8295083119a3de419b215b9c351ee33e_NeikiAnalytics.exe File opened for modification C:\Windows\system32\SgrmBroker.exe 32e9e2a1b7f8cfbb6347b01039bb01cb8295083119a3de419b215b9c351ee33e_NeikiAnalytics.exe File opened for modification C:\Windows\System32\OpenSSH\ssh-agent.exe 32e9e2a1b7f8cfbb6347b01039bb01cb8295083119a3de419b215b9c351ee33e_NeikiAnalytics.exe File opened for modification C:\Windows\system32\wbem\WmiApSrv.exe 32e9e2a1b7f8cfbb6347b01039bb01cb8295083119a3de419b215b9c351ee33e_NeikiAnalytics.exe File opened for modification C:\Windows\system32\locator.exe 32e9e2a1b7f8cfbb6347b01039bb01cb8295083119a3de419b215b9c351ee33e_NeikiAnalytics.exe File opened for modification C:\Windows\system32\TieringEngineService.exe 32e9e2a1b7f8cfbb6347b01039bb01cb8295083119a3de419b215b9c351ee33e_NeikiAnalytics.exe File opened for modification C:\Windows\system32\vssvc.exe 32e9e2a1b7f8cfbb6347b01039bb01cb8295083119a3de419b215b9c351ee33e_NeikiAnalytics.exe File opened for modification C:\Windows\system32\wbengine.exe 32e9e2a1b7f8cfbb6347b01039bb01cb8295083119a3de419b215b9c351ee33e_NeikiAnalytics.exe File opened for modification C:\Windows\system32\dllhost.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe 32e9e2a1b7f8cfbb6347b01039bb01cb8295083119a3de419b215b9c351ee33e_NeikiAnalytics.exe File opened for modification C:\Windows\SysWow64\perfhost.exe 32e9e2a1b7f8cfbb6347b01039bb01cb8295083119a3de419b215b9c351ee33e_NeikiAnalytics.exe File opened for modification C:\Windows\System32\SensorDataService.exe 32e9e2a1b7f8cfbb6347b01039bb01cb8295083119a3de419b215b9c351ee33e_NeikiAnalytics.exe File opened for modification C:\Windows\system32\SearchIndexer.exe 32e9e2a1b7f8cfbb6347b01039bb01cb8295083119a3de419b215b9c351ee33e_NeikiAnalytics.exe File opened for modification C:\Windows\system32\dllhost.exe elevation_service.exe File opened for modification C:\Windows\system32\fxssvc.exe elevation_service.exe File opened for modification C:\Windows\system32\AppVClient.exe 32e9e2a1b7f8cfbb6347b01039bb01cb8295083119a3de419b215b9c351ee33e_NeikiAnalytics.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Roaming\e912650ec8648821.bin DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Windows\System32\snmptrap.exe 32e9e2a1b7f8cfbb6347b01039bb01cb8295083119a3de419b215b9c351ee33e_NeikiAnalytics.exe File opened for modification C:\Windows\System32\SensorDataService.exe elevation_service.exe -
Drops file in Program Files directory 64 IoCs
Processes:
32e9e2a1b7f8cfbb6347b01039bb01cb8295083119a3de419b215b9c351ee33e_NeikiAnalytics.exeDiagnosticsHub.StandardCollector.Service.exeelevation_service.exedescription ioc process File opened for modification C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe 32e9e2a1b7f8cfbb6347b01039bb01cb8295083119a3de419b215b9c351ee33e_NeikiAnalytics.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\javacpl.exe 32e9e2a1b7f8cfbb6347b01039bb01cb8295083119a3de419b215b9c351ee33e_NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32Info.exe 32e9e2a1b7f8cfbb6347b01039bb01cb8295083119a3de419b215b9c351ee33e_NeikiAnalytics.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\javaws.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jar.exe elevation_service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jstack.exe 32e9e2a1b7f8cfbb6347b01039bb01cb8295083119a3de419b215b9c351ee33e_NeikiAnalytics.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\servertool.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\tnameserv.exe elevation_service.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\jjs.exe elevation_service.exe File opened for modification C:\Program Files (x86)\Internet Explorer\ExtExport.exe elevation_service.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\servertool.exe 32e9e2a1b7f8cfbb6347b01039bb01cb8295083119a3de419b215b9c351ee33e_NeikiAnalytics.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\tnameserv.exe 32e9e2a1b7f8cfbb6347b01039bb01cb8295083119a3de419b215b9c351ee33e_NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Common Files\Java\Java Update\jaureg.exe 32e9e2a1b7f8cfbb6347b01039bb01cb8295083119a3de419b215b9c351ee33e_NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Mozilla Maintenance Service\Uninstall.exe 32e9e2a1b7f8cfbb6347b01039bb01cb8295083119a3de419b215b9c351ee33e_NeikiAnalytics.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\rmic.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\rmid.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\rmiregistry.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleCrashHandler.exe elevation_service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\idlj.exe 32e9e2a1b7f8cfbb6347b01039bb01cb8295083119a3de419b215b9c351ee33e_NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\pi_brokers\32BitMAPIBroker.exe elevation_service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\servertool.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateComRegisterShell64.exe elevation_service.exe File opened for modification C:\Program Files\Google\Chrome\Application\110.0.5481.104\Installer\setup.exe 32e9e2a1b7f8cfbb6347b01039bb01cb8295083119a3de419b215b9c351ee33e_NeikiAnalytics.exe File opened for modification C:\Program Files\Mozilla Firefox\crashreporter.exe 32e9e2a1b7f8cfbb6347b01039bb01cb8295083119a3de419b215b9c351ee33e_NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrServicesUpdater.exe 32e9e2a1b7f8cfbb6347b01039bb01cb8295083119a3de419b215b9c351ee33e_NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe 32e9e2a1b7f8cfbb6347b01039bb01cb8295083119a3de419b215b9c351ee33e_NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdate.exe 32e9e2a1b7f8cfbb6347b01039bb01cb8295083119a3de419b215b9c351ee33e_NeikiAnalytics.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe elevation_service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javaw.exe 32e9e2a1b7f8cfbb6347b01039bb01cb8295083119a3de419b215b9c351ee33e_NeikiAnalytics.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\kinit.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Common Files\microsoft shared\VSTO\10.0\VSTOInstaller.exe elevation_service.exe File opened for modification C:\Program Files\Google\Chrome\Application\110.0.5481.104\Installer\setup.exe elevation_service.exe File opened for modification C:\Program Files\Internet Explorer\iediagcmd.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jinfo.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jjs.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files (x86)\Internet Explorer\ielowutil.exe elevation_service.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\pack200.exe 32e9e2a1b7f8cfbb6347b01039bb01cb8295083119a3de419b215b9c351ee33e_NeikiAnalytics.exe File opened for modification C:\Program Files\Mozilla Firefox\minidump-analyzer.exe elevation_service.exe File opened for modification C:\Program Files\7-Zip\7z.exe 32e9e2a1b7f8cfbb6347b01039bb01cb8295083119a3de419b215b9c351ee33e_NeikiAnalytics.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jabswitch.exe elevation_service.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\java-rmi.exe elevation_service.exe File opened for modification C:\Program Files\Internet Explorer\ieinstal.exe elevation_service.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\javacpl.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\pack200.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\keytool.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\VideoLAN\VLC\uninstall.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\kinit.exe elevation_service.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe elevation_service.exe File opened for modification C:\Program Files\Mozilla Firefox\maintenanceservice.exe 32e9e2a1b7f8cfbb6347b01039bb01cb8295083119a3de419b215b9c351ee33e_NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\FullTrustNotifier.exe 32e9e2a1b7f8cfbb6347b01039bb01cb8295083119a3de419b215b9c351ee33e_NeikiAnalytics.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\orbd.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroTextExtractor.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\InputPersonalization.exe elevation_service.exe File opened for modification C:\Program Files (x86)\Google\Update\DisabledGoogleUpdate.exe elevation_service.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\javaws.exe 32e9e2a1b7f8cfbb6347b01039bb01cb8295083119a3de419b215b9c351ee33e_NeikiAnalytics.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\keytool.exe 32e9e2a1b7f8cfbb6347b01039bb01cb8295083119a3de419b215b9c351ee33e_NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleCrashHandler64.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\dotnet\dotnet.exe 32e9e2a1b7f8cfbb6347b01039bb01cb8295083119a3de419b215b9c351ee33e_NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\ADelRCP.exe elevation_service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\serialver.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\rmic.exe 32e9e2a1b7f8cfbb6347b01039bb01cb8295083119a3de419b215b9c351ee33e_NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleCrashHandler64.exe 32e9e2a1b7f8cfbb6347b01039bb01cb8295083119a3de419b215b9c351ee33e_NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Internet Explorer\iexplore.exe 32e9e2a1b7f8cfbb6347b01039bb01cb8295083119a3de419b215b9c351ee33e_NeikiAnalytics.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ShapeCollector.exe DiagnosticsHub.StandardCollector.Service.exe -
Drops file in Windows directory 4 IoCs
Processes:
DiagnosticsHub.StandardCollector.Service.exeelevation_service.exe32e9e2a1b7f8cfbb6347b01039bb01cb8295083119a3de419b215b9c351ee33e_NeikiAnalytics.exemsdtc.exedescription ioc process File opened for modification C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe elevation_service.exe File opened for modification C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe 32e9e2a1b7f8cfbb6347b01039bb01cb8295083119a3de419b215b9c351ee33e_NeikiAnalytics.exe File opened for modification C:\Windows\DtcInstall.log msdtc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 64 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
spectrum.exeSensorDataService.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 SensorDataService.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\FriendlyName spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A spectrum.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 SensorDataService.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 SensorDataService.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\FriendlyName SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A SensorDataService.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\FriendlyName SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 SensorDataService.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\FriendlyName spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C spectrum.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\FriendlyName spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C SensorDataService.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
TieringEngineService.exedescription ioc process Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 TieringEngineService.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz TieringEngineService.exe -
Modifies data under HKEY_USERS 64 IoCs
Processes:
SearchFilterHost.exeSearchProtocolHost.exefxssvc.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software SearchFilterHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{3DBEE9A1-C471-4B95-BBCA-F39310064458} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 01000000000000000a892ee068cbda01 SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Windows\System32\ieframe.dll,-912 = "HTML Document" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE SearchFilterHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-125 = "Microsoft Word Template" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xht\OpenWithList SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.html SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Windows\System32\mshta.exe,-6412 = "HTML Application" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp2 SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Windows\system32\windows.storage.dll,-10152 = "File folder" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-131 = "Rich Text Format" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@windows.storage.dll,-21825 = "3D Objects" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.DVR-MS\OpenWithList SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-111 = "Microsoft Excel Macro-Enabled Template" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9936 = "QuickTime Movie" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-182 = "Microsoft PowerPoint Template" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum 64-bit SearchFilterHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie SearchFilterHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Multimedia\ActiveMovie SearchFilterHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{AEB16279-B750-48F1-8586-97956060175A} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 0100000000000000bb2f18e168cbda01 SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Windows\System32\ieframe.dll,-12385 = "Favorites Bar" SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{F81B1B56-7613-4EE4-BC05-1FAB5DE5C07E} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 0100000000000000bb30f9e068cbda01 SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp2\OpenWithList SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-177 = "Microsoft PowerPoint Macro-Enabled Slide Show" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Windows\system32\zipfldr.dll,-10195 = "Compressed (zipped) Folder" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.DVR-MS SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.au\OpenWithList SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{A38B883C-1682-497E-97B0-0A3A9E801682} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 010000000000000029272ce068cbda01 SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\MPEG2Demultiplexer SearchFilterHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Multimedia SearchFilterHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Windows\System32\ieframe.dll,-915 = "XHTML Document" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xhtml SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@fxsresm.dll,-1130 = "Microsoft Modem Device Provider" fxssvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{5383EF74-273B-4278-AB0C-CDAA9FD5369E} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 01000000000000006aba02e168cbda01 SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{E2FB4720-F45F-4A3C-8CB2-2060E12425C3} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 010000000000000041046ee168cbda01 SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@"C:\Windows\system32\windowspowershell\v1.0\powershell.exe",-103 = "Windows PowerShell Script" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum 64-bit\{4EFE2452-168A-11D1-BC76-00C04FB9453B}\Default MidiOut Device SearchFilterHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-120 = "Microsoft Word 97 - 2003 Document" SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{01BE4CFB-129A-452B-A209-F9D40B3B84A5} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 010000000000000085f41ce168cbda01 SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-127 = "OpenDocument Text" SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{1E589E9D-8A8D-46D9-A2F9-E6D4F8161EE9} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 0100000000000000d6430ce168cbda01 SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-180 = "Microsoft PowerPoint 97-2003 Template" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xht SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-184 = "Microsoft PowerPoint Macro-Enabled Design Template" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-103 = "Microsoft Excel Macro-Enabled Worksheet" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-113 = "Microsoft Excel Binary Worksheet" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-101 = "Microsoft Excel Worksheet" SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{5985FC23-2588-4D9A-B38B-7E7AFFAB3155} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 010000000000000021422be168cbda01 SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mht\OpenWithList SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{8082C5E6-4C27-48EC-A809-B8E1122E8F97} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 0100000000000000f11862e168cbda01 SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.html\OpenWithList SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9914 = "Windows Media Audio/Video file" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9902 = "Movie Clip" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.au SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum 64-bit\{E0F158E1-CB04-11D0-BD4E-00A0C911CE86}\Default DirectSound Device SearchFilterHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft SearchFilterHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My SearchFilterHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9932 = "MP4 Video" SearchProtocolHost.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
Processes:
DiagnosticsHub.StandardCollector.Service.exeelevation_service.exepid process 3628 DiagnosticsHub.StandardCollector.Service.exe 3628 DiagnosticsHub.StandardCollector.Service.exe 3628 DiagnosticsHub.StandardCollector.Service.exe 3628 DiagnosticsHub.StandardCollector.Service.exe 3628 DiagnosticsHub.StandardCollector.Service.exe 3628 DiagnosticsHub.StandardCollector.Service.exe 3628 DiagnosticsHub.StandardCollector.Service.exe 2320 elevation_service.exe 2320 elevation_service.exe 2320 elevation_service.exe 2320 elevation_service.exe 2320 elevation_service.exe 2320 elevation_service.exe 2320 elevation_service.exe -
Suspicious behavior: LoadsDriver 2 IoCs
Processes:
pid process 664 664 -
Suspicious use of AdjustPrivilegeToken 39 IoCs
Processes:
32e9e2a1b7f8cfbb6347b01039bb01cb8295083119a3de419b215b9c351ee33e_NeikiAnalytics.exefxssvc.exeTieringEngineService.exeAgentService.exevssvc.exewbengine.exeSearchIndexer.exeDiagnosticsHub.StandardCollector.Service.exeelevation_service.exedescription pid process Token: SeTakeOwnershipPrivilege 408 32e9e2a1b7f8cfbb6347b01039bb01cb8295083119a3de419b215b9c351ee33e_NeikiAnalytics.exe Token: SeAuditPrivilege 1400 fxssvc.exe Token: SeRestorePrivilege 4700 TieringEngineService.exe Token: SeManageVolumePrivilege 4700 TieringEngineService.exe Token: SeAssignPrimaryTokenPrivilege 4832 AgentService.exe Token: SeBackupPrivilege 3084 vssvc.exe Token: SeRestorePrivilege 3084 vssvc.exe Token: SeAuditPrivilege 3084 vssvc.exe Token: SeBackupPrivilege 3656 wbengine.exe Token: SeRestorePrivilege 3656 wbengine.exe Token: SeSecurityPrivilege 3656 wbengine.exe Token: 33 1768 SearchIndexer.exe Token: SeIncBasePriorityPrivilege 1768 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1768 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1768 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1768 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1768 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1768 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1768 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1768 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1768 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1768 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1768 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1768 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1768 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1768 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1768 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1768 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1768 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1768 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1768 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1768 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1768 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1768 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1768 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1768 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1768 SearchIndexer.exe Token: SeDebugPrivilege 3628 DiagnosticsHub.StandardCollector.Service.exe Token: SeDebugPrivilege 2320 elevation_service.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
SearchIndexer.exedescription pid process target process PID 1768 wrote to memory of 1324 1768 SearchIndexer.exe SearchProtocolHost.exe PID 1768 wrote to memory of 1324 1768 SearchIndexer.exe SearchProtocolHost.exe PID 1768 wrote to memory of 3240 1768 SearchIndexer.exe SearchFilterHost.exe PID 1768 wrote to memory of 3240 1768 SearchIndexer.exe SearchFilterHost.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\32e9e2a1b7f8cfbb6347b01039bb01cb8295083119a3de419b215b9c351ee33e_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\32e9e2a1b7f8cfbb6347b01039bb01cb8295083119a3de419b215b9c351ee33e_NeikiAnalytics.exe"1⤵
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\alg.exeC:\Windows\System32\alg.exe1⤵
- Executes dropped EXE
-
C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exeC:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s TapiSrv1⤵
-
C:\Windows\system32\fxssvc.exeC:\Windows\system32\fxssvc.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"1⤵
- Executes dropped EXE
-
C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"1⤵
- Executes dropped EXE
-
C:\Windows\System32\msdtc.exeC:\Windows\System32\msdtc.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
-
\??\c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"1⤵
- Executes dropped EXE
-
C:\Windows\system32\PerceptionSimulation\PerceptionSimulationService.exeC:\Windows\system32\PerceptionSimulation\PerceptionSimulationService.exe1⤵
- Executes dropped EXE
-
C:\Windows\SysWow64\perfhost.exeC:\Windows\SysWow64\perfhost.exe1⤵
- Executes dropped EXE
-
C:\Windows\system32\locator.exeC:\Windows\system32\locator.exe1⤵
- Executes dropped EXE
-
C:\Windows\System32\SensorDataService.exeC:\Windows\System32\SensorDataService.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
-
C:\Windows\System32\snmptrap.exeC:\Windows\System32\snmptrap.exe1⤵
- Executes dropped EXE
-
C:\Windows\system32\spectrum.exeC:\Windows\system32\spectrum.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
-
C:\Windows\System32\OpenSSH\ssh-agent.exeC:\Windows\System32\OpenSSH\ssh-agent.exe1⤵
- Executes dropped EXE
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s SharedRealitySvc1⤵
-
C:\Windows\system32\TieringEngineService.exeC:\Windows\system32\TieringEngineService.exe1⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\AgentService.exeC:\Windows\system32\AgentService.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵
- Executes dropped EXE
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵
- Executes dropped EXE
-
C:\Windows\system32\SearchIndexer.exeC:\Windows\system32\SearchIndexer.exe /Embedding1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\SearchProtocolHost.exe"C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe1_ Global\UsGthrCtrlFltPipeMssGthrPipe1 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon"2⤵
- Modifies data under HKEY_USERS
-
C:\Windows\system32\SearchFilterHost.exe"C:\Windows\system32\SearchFilterHost.exe" 0 800 804 812 8192 808 7842⤵
- Modifies data under HKEY_USERS
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exeFilesize
2.1MB
MD58aeb70cabf4c0bf8661f7e5773509e56
SHA137b8b9495105664393ffc908305a058387141300
SHA25690a66312d81c8c072ebc8054f1cd35166cb2320d060869b6e400d959907e128e
SHA5121f56af5aef467b44bb01d80e7e5796986b145c9608385a7edec5090c2969e51448850fd3ee0f25a2342421d90ee29ab72adc810185db92721643e4d05b97d5e7
-
C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exeFilesize
797KB
MD5bc5a54c12a2f270ef4edd14327e69ec3
SHA153ab14440d5eb9b3e38746c6d90a9ff7c961a856
SHA256b9e80cb93bd337d39a22441083f1b731f7ca95227632d32c79e2a5d851b30dd6
SHA5125412dcb4987333084ae6e682aaa8478acb6b6adf5cb04a79f6d5c518268a790bfe08bb1c350946778149c9ce49747eeb9eeb7070324e5f6ac31d45d46d940f80
-
C:\Program Files\7-Zip\7z.exeFilesize
1.1MB
MD5cda448c7405e821407add0b081b32c52
SHA1a1e574a4d646f88143a8911d6e9e7183f44e692c
SHA2567066e19a739cf1bddb69a049c3371d14b0b36f0f11bf51566f00dc04e1c4c485
SHA5121688023458e9f9c5fe7ead671ce5e07975ea28a597c15a87a6e998d1d5c1bedab49a9c0f0a11339eca3d018302c3e4cbca453d4f4725d55d03174bf93280e568
-
C:\Program Files\7-Zip\7zFM.exeFilesize
1.5MB
MD5e0f3b427bb035aef6b2b04a5739cabc1
SHA11ac02f9d7fc34eaf4e5a2f220e4f2829a461bfe1
SHA25684bf4261ed051b348f3a6439430a1eb53559157e5d13c4fd03faad9c1b19557e
SHA512b9da106407bf1b127ad61576687dc5524b0971266b99691e181feb4982ff082c949f98ee7357e3a90186fbd62992e243c52e6180d8d86f2d9d032bac1ee6603f
-
C:\Program Files\7-Zip\7zG.exeFilesize
1.2MB
MD5173fb4a6e9b4a9e7229b3fd77045376a
SHA1ae7dda39aecf7cb36614890b0f3b22d995e0cf0b
SHA2565453ea89c999c162dd52268f9cda53f441a9c2cb624e7694956a6bbb5b30439d
SHA512ecf3d452db08f489f356b4c952b2b2aae907f44342de0b2750d699618921915743c7b43d69dcb68a009fdc7f5fc662d4e4329c9c31b4919b494b8277887d7be6
-
C:\Program Files\7-Zip\Uninstall.exeFilesize
582KB
MD5abac6ace4eb0291ec652194e1f735e41
SHA199ecc73c196da15c4b2800a1798118eab3b082f3
SHA2565715bcba2c16131043fae7a43f60fc4f8456318d6d2a707d35ea897a91543d26
SHA51293bf996a4bd706ffd5cf28bb0ed69cfffe093991e2257bc69cb68154dd72487e88c547e0f9a5aa2e8ca82fa4b5efe79824fbb39f9a2f52f9f9fd8eacf3711814
-
C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVShNotify.exeFilesize
840KB
MD5e045594a59d03bcf7970f1436421fdf5
SHA132bb5c3fec2504a6b240e77bb669007ceee3b2dd
SHA2565b00b2e907a15d6f84061aa7b3ab984c2f899a74ba369471c521fe3b3a99863f
SHA512ce8422c6a765e92058a5940e7527a25fd310bf3f0b51d17434826f8a7baf628cc0324cf987c6c6b515f182fdba39e8afaadf181360abb578fdc13289b1b5d076
-
C:\Program Files\Common Files\microsoft shared\ClickToRun\IntegratedOffice.exeFilesize
4.6MB
MD5e9a0058420aff0efabbe5c8753b7fe40
SHA1f0a7ed51f9c381fe12aa41ede2f0a0f1b2446538
SHA256b7ad81cc80588a4da0eb9fb2ae993b0ee22d6894eec8ed463102046ab7f2f10e
SHA51248b30b778d67ad57b302c73ecd9f3e27ed2483e6daef90ae3fb21416e4ebda2f0e88b02f46c3240e918e79636d7de2ecf866b679e0f7338f87c5106278718dd9
-
C:\Program Files\Common Files\microsoft shared\ClickToRun\MavInject32.exeFilesize
910KB
MD586dbbeaa0ebdc52f46a9f516acd31fa1
SHA122ba4997d3bec6aefe892c07abc1c7bf6f2975a0
SHA256570953fff57743d548ab9dd4aec79fc01d955d6a9c664448e6dc288e3aa0384b
SHA5126c51a01b026969a498be380447f52290b48c42ecddc510b9872692266df968e49b1604d709b6c7c61776240707bd095fd0c480a7fefa905adc5a405a216cea26
-
C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeC2RClient.exeFilesize
24.0MB
MD52ccee3b023b0d6ad43ebba9282cfcd96
SHA12d651ec1f90086bf2e10d09779fb76e6c1cad59e
SHA25668298446fb6e1d9d2ddcb5b681bd6e30f0d0d55707e2dd4e3adabc796159a43f
SHA5126cfbd4b8e4171f0666ad3d0864107f172c07e64f6b4cdb7db63f35783e8036d26840ccfb72653be8b40d0b6d4a4fa1ecfb3d685cf70aecd907d7b43916994230
-
C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exeFilesize
2.7MB
MD5d93d44d245a58a1ada16e0820aed0e6b
SHA1e9b237771e2fbe4b326e5954d4f15f92f6c6a820
SHA2564eb3a093666be4f50128afbd4a45bd5c39b2bfd5195db9ace5db57ef434c9548
SHA512c057ab4a42ba022af5cdfbddc4319d750be887817f01f34079a99a1c4c901cfc76d011f7ae04ccd3b472d570489cda460b8c701e3d9e369f79169b30adb7b01b
-
C:\Program Files\Common Files\microsoft shared\OFFICE16\LICLUA.EXEFilesize
1.1MB
MD5b0914cf85602b3ab0b825b678fa62a6c
SHA1f2ea9ae77b71f0eeeb8af9a8ad3e4a73557eb42c
SHA2562dffbb28bcf64ed07e5e4e3a3798c214445a753dea2a4936e6b75799175b8f45
SHA5120f4e070269dd4d9a8fab9c5228a6d1aefbd3a707d11c15a6f1963c11343101f6a560887954c6b3082c17455f0c49095a6da78a385971ab298283232c7fba2000
-
C:\Program Files\Common Files\microsoft shared\Source Engine\OSE.EXEFilesize
805KB
MD5fdbfea658877ef72cc68c8f7f390eb82
SHA1bec5ce0a9e87177c2352fc5d4325e3f8d16e9c79
SHA256cc54f95e24620a104e28d94a961721dc1f820ab23085875b1c4f1a09aa382961
SHA512967505db95d89cf6f93547c51d990d7e0a733324ad4cdc3902713e9d42d35ff0749afc495a97a828d48a3c676c9676da034bc6a03bf1a23e28be6e9a808b7bc6
-
C:\Program Files\Common Files\microsoft shared\VSTO\10.0\VSTOInstaller.exeFilesize
656KB
MD5daecd18063a16801402ce0748600ce1d
SHA126887e77c02f0e9e8325d18293265abdd384ef20
SHA256393026d71e5499b6e22148405beab741ababe3c71d219e8665ca0de0ce15ec13
SHA512f9792a7a17031d78b3b5bda5caaf79293d59311e77ac2ad393e980adadf1c25dbfdeac321712fd03b781e89972a0bce999f295837126f39c1e9200dd9fc8276c
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\Installer\chrmstp.exeFilesize
5.4MB
MD5f9ec8c8dfe914ccfe57990235fdb6210
SHA1dae7f383e9a43060a72ea4451f7ef9d04f8439d9
SHA25603b6836eae55797c48765fab671ea6e60e1379a9a7af6567a8f17d688cee4285
SHA51250f750ace473359dff4c308eab60cc5d650232fcb260058713b43e0d7af40cd89116c109c2d528599347024abd8c5698444a51a275f3a7ce0d094c49ba0f49a1
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\Installer\setup.exeFilesize
5.4MB
MD5490697681828422e45cffe8b9f2bd81a
SHA158e139639c86ab495fb0cac6bdeb4fb8d3d194c6
SHA256e736dd0ab382b154bf3325f7ad154a05a7b315a247b0977dfa8765aae816f5f5
SHA51228401dbcb7d4f7e3f577d0a30308f4e516a51a11ab2c9d945601bfb9896e12b5835eb6f2dda09bf96590075aa996d847523eabdc2b454ef1f36f27dfeca706db
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\chrome_pwa_launcher.exeFilesize
2.0MB
MD53976390c4ee98b4f7febb8f5a2b3c4f1
SHA1edd297da7db72a61a9acaa9e6fac39633dbf0708
SHA256fa756f3484fc6a27d83f382cf0afbf0248bbd7463566088948cdca00281518c9
SHA512529e94e1fee89b0e6fb8382fdf854c7f6cefe5c825b97623e7ede2d779e6b8319e255dd0a6d0bed96c4ae466da9bda2ce1709730f5278df23248e1accc69fcfa
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exeFilesize
2.2MB
MD5866f27b046cb7d14b761f9bd6d6abccc
SHA1a017de0e763de3c2c1f07945cbfd3f74c05c9623
SHA2561892965b4a34a965207db19c7dbc8e7ce597d425eb0a36629d18fa773be06b98
SHA512d79c63b995a210179fd136589d7dff8da226a0b4493382aa2381a08a296be3dd3c1df7600379ecaa10c67a9ff4ae05b616bb851e122214a82b44c372fc01267c
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\notification_helper.exeFilesize
1.8MB
MD532732416118456a59e148cacc3186cd2
SHA16e357ded4ad419d7ccda6cb9885190f959e6d4c2
SHA256495a29ffd8ee2f1e26ec0a1528231f76950e321caecb83bf0586c87eab5144de
SHA512a6aeb11190de97483bbe9f012167b7f5279e98314a527ae5c760bcbdb1d73bf1ed7a4d71ed583237a41335cb547bff4a48e97518bbd4fe8a5c880148b39467d7
-
C:\Program Files\Google\Chrome\Application\chrome_proxy.exeFilesize
1.7MB
MD5045f7d6d0da068e284ffe0dc1e03b478
SHA15d1acc123fdb527046afa30a779775817aec27b6
SHA256870cc3a8339fa425f42f3c049488943a0f6c6a8ed405f561960b4a47eccbcd2b
SHA512422340c851a53e13ea078e1b54fa3c4bfcd94ce8bd25f67d131e67ad315465909258964d6e639df7aa855117746946ddef0097b58c6919991319657133c8dded
-
C:\Program Files\Java\jdk-1.8\bin\appletviewer.exeFilesize
581KB
MD543e0fec8aa89650337c8daa3b8c902b4
SHA19ffead08b8de1719e3a0b3d2bc3564d068d71a15
SHA2568f7d20493f38a3454bf0859ae9987ba11503b0a5865f80452e6270e349784638
SHA512f071f756d7a5a395d8bb0374b1c4c004b9c0d45172d5804381814af734d8b9f1382f4bc34ce301bd2095f3e59c7fe7e17c9a29d41745144819f0ced56236bc11
-
C:\Program Files\Java\jdk-1.8\bin\extcheck.exeFilesize
581KB
MD54550574665e854003aa2a118bc703b59
SHA1e18fa7ce9f2532a11debf27fb9b14b9165076f96
SHA256d3e057306b40430dec6cbcd13740759165746427081d9cfa15cfad6bf6e20fd9
SHA5125c9c6ac95b8598a9fb4fcffc27974679159af0bd98d588a35fc0d63494e7bc0e8946c6fefdcc6c99dd8611481e72d1695b6cdd211ff907cc50916cd2e02c937c
-
C:\Program Files\Java\jdk-1.8\bin\idlj.exeFilesize
581KB
MD51e2b72d2bd8d21919a5f4ddf7cd7defb
SHA1c5acd2c636f8d1e80d92b81e018410aaeeb5ad82
SHA25648d99a98c4d0c0a1ec4692467b82901fd187a49b66dbb76637ff466aa5fe3485
SHA51294980a86278681b51fd7665afcfc3d2de143cb095154b320c572369b454c79d283474a21237b40881d37cedd43b5cb516c91a075baa32dc8da398da84540532a
-
C:\Program Files\Java\jdk-1.8\bin\jabswitch.exeFilesize
601KB
MD572f731cb3e19fef2f8f1264e533a9a12
SHA17269bf99eddb5ea8aeb9dae0ac8101c17edc8354
SHA2569f8730298ceebe580425d2190d43aa50df95ab920fdd7148481f94bfa1531830
SHA5122870199e0346451e975b306ae21f17259a7878f425f716aebbadcfdc1ebcf0723a8b8985ca23afde1dfc29f49a078e5b6f99caa75056fe37b33da94d21278323
-
C:\Program Files\Java\jdk-1.8\bin\jar.exeFilesize
581KB
MD5ecd07d61c82a0426ea6eed4898d9ad47
SHA147c5e307fc7cad9af793a776d63f73f7c5227b81
SHA256b3b03c2c6afe8cb0441fb37c71f43a3589fb812eead7989ff73fcfc41f4c18c8
SHA5128331e0394a34b61b4efda3d073775a8774d283b07942bb31124b816e0958b0aeccdcf20374af997b960ce533ff74d97ae046c74ca22ab2b19b7b8b13dacd7ebb
-
C:\Program Files\Java\jdk-1.8\bin\jarsigner.exeFilesize
581KB
MD51a98603c7b6166e6a33a243197ab7cca
SHA12f00c74fe5830b5187fadc865ff3d97f3bfb5f14
SHA256205cc4ffa26d27f65e3d572f24a3a1ec8d813b997877c321dc98c56356aa4d1a
SHA512590cabfabac24bd9d6fb4173d0891a521b81d27b4701f0257f613238f756b7604074db09d0aa357ee554a68ebc3ae3bc4f146f61ee267e0b2bae65bd46b3d418
-
C:\Program Files\Java\jdk-1.8\bin\java-rmi.exeFilesize
581KB
MD596e7c5b017d0f2e6e5f2269593578f02
SHA1fa387bbc04e18aec956751a26ab3d4d3e9724ba8
SHA25621947dbaf718fcc7dca97f4ecb45c47a287bd1fc4a4a30000f502e422323826b
SHA5124062897f0646f4e072f7e34b3674c4842a7615c9c99bf4048d8b43dcd7b3ac8d2d1a25781ef5fdb0e7defa0f611904cf10ecb7826f03b2abfa032eef73b8c6bc
-
C:\Program Files\Java\jdk-1.8\bin\java.exeFilesize
841KB
MD572a4e41636cbd9b25f801063fc24f22c
SHA17090a5bd387fc1ab3fd275af849a2de5efce7a97
SHA25607deb941f3f295a137b12ea83a34977f38ac3b3227ae83d88f5f984c2a459c89
SHA512174567490a776e96d3535dcbaaf8af61347878d4e9393521d3a9869c2d41568861c8a2b899bad63269d493818b6b1f410e6e382a589db6745fd71eff57244b6a
-
C:\Program Files\Java\jdk-1.8\bin\javac.exeFilesize
581KB
MD54fedd3f2b251c5eeab73b956cf805ce9
SHA1f925d70df9b5f946aafbd8ccb9552918d6e1aa07
SHA256816fa4419f7b7aac0e244e5249eb0ccfcf14f1a1d9e7f35174348bc5ca1bc683
SHA5122a85c6d66ca94aee948254ad17f8f4461de953cc0d154db6ddd4dbfca306d143daffa27cda5000963a043025bc7364665678493bf437df9f6b2124e09bf7e1c9
-
C:\Program Files\Java\jdk-1.8\bin\javadoc.exeFilesize
581KB
MD5a815e35e304a76cc0821c07ccea12789
SHA1e2ff90aafd86184152541c33f0c80960f7c4d1db
SHA2565c8589ad4b3942a6c4b811e2544e4ee07fe7f22d1c6c1ed7787aaabc01603d13
SHA512e17c6dc9f0fdab55e70a6bf876a621db4ed4891c382b22e044c19d893cfae5e08bd284e5ea72a8f9b79a320a5244b88785d17ad00331a5f004c6df926531e407
-
C:\Program Files\Java\jdk-1.8\bin\javafxpackager.exeFilesize
717KB
MD58d089ea6a77b0f642423b200137aaa39
SHA1de13d3fed66a5c6b5affa72866106ecca2f6097f
SHA25655d406a22f79bc51677e2381c4e25ffa7d1b4e050434093b45dfc42711661600
SHA512131c33c55ae7a7601a7fdc1b8de86d7a74fc213899a5e33f333933fab4f4c9d12f9551c08976fb6ccdea244c5c2be61a258795e157835b69dc0dda2e6b51f117
-
C:\Program Files\Java\jdk-1.8\bin\javah.exeFilesize
581KB
MD5ea2205eda3794e8a4f54c8c8b06beb24
SHA16a15ace842a406a5019799873123896a044e76c0
SHA256455d32837a74c773b32a77b30d378700cc0ce7ab5078774b8fa419582d960fe1
SHA512a22e740f5b41ca3bb512fe7f70680a7e8b7cf8a1c40680b44cc401affdde7bb8fd65785d967f6de9c53e71a8496388a6076f9b9b8e39828c26be1b96b18481f8
-
C:\Program Files\Java\jdk-1.8\bin\javap.exeFilesize
581KB
MD57768caeeb984f769f77d884b7bde189f
SHA1d7768a81cb96632b791794dbb15594dc4e463273
SHA25610e36df662d0de42b08a7d0ad77166ce6950f73ac3b6ed9b43d1b67be1d7d7c0
SHA512c55e1d6f556443aa3380d6ff40a2b07f4b4338c267fd8e385055e0e6d07c58e736b87df56c232b05980665ccaf2b77f2b587459ffe4ab82d3a7e5b3724b3502d
-
C:\Program Files\Java\jdk-1.8\bin\javapackager.exeFilesize
717KB
MD58fa073dab44886c01049105da70359db
SHA11b046297be3101e30b3c39f17966b7c53fc69687
SHA2562498cc4a36e3d2d0522967afefdc6478e019a7f65053cef0a34a23c97ae91e4e
SHA5126fa0a5e3e4f6f1d883303079ded672002c2261d4bc108dfb82a5f711c497874aae2ab8c04af512502e281a2e99a5eea176d6959970e5a29a8183bb14957b4ac4
-
C:\Program Files\Java\jdk-1.8\bin\javaw.exeFilesize
841KB
MD5ba9cc062bbc200da15652049fd33d417
SHA15aa838eda36e35194364bd08f178cea2abd0abda
SHA2561534e114212f3f74e02a90d82c849f5ca74500d69140227fbca2a8ca0bdc468e
SHA51236690f41b7f91a75649c361e68f9431b11427202f07e31608c3091f756dae8e7996dffd1b251f34550da282558f028eacdc88b7e5ecb9a50a56430ff3ad83f0f
-
C:\Program Files\Java\jdk-1.8\bin\javaws.exeFilesize
1020KB
MD50d4c2fc09ef9288928c538dbadcf6964
SHA1e3f71983232e6b880d751260eb3f97ad3250a91d
SHA2566c2ecca618f174b406e5bedd5ce4dd7e1080920785a1f898c2f0af8ef09e5fe7
SHA512e63645d9639d271339024133468d5c26e8ef706f796d787db3ea7677680f54b51b5a450fedb8f548e13348e2f88a5b40342f5c08fcc6f5f2b71f75dc290796ca
-
C:\Program Files\Java\jdk-1.8\bin\jcmd.exeFilesize
581KB
MD5c785bb762dbc5d6ee2f08267367470b1
SHA147001401f4858d8ed3e79c93c4d7bbaf9db9f722
SHA256da59548b1288b49b54233fd0720c9a0ad6d47182622b828154f7cd1dfc50d51c
SHA512e8ad2e3428f368fc26287ed03daf02d685c0ac7b4d61b14b0b970a6a036c1c61fc75ca4b74874f1480ec98bc3585ea8ae4d0dc73e3b45858ba5e8d221ec1af9b
-
C:\Program Files\Windows Media Player\wmpnetwk.exeFilesize
1.5MB
MD52027b926bc5024cbb64d970e9dc8d2f9
SHA10402541f4338fbbd9fe2243da08268cc8c432d1b
SHA256a72330beb461b2f865597267ec8f9cb570f2476da0ffd31c85f7eb2222d91963
SHA51279b07559252f4a9c3cd4f8159ca6a042246506eb3f2a490afd5f3c3e31901913cb25be7658fc96d03ea4d62dee9bcc6f600e857fe017e94038d5524448570cfe
-
C:\Program Files\dotnet\dotnet.exeFilesize
701KB
MD521869936433c3cbe52cf9ebe99d97d9d
SHA1a356d9ed6c25fcaa419bd49eba7af5765f82f1cf
SHA25649cd360c745da5a1ca619b903813ebf5d19e979c9429a653f25620a505a34dad
SHA51275174813aecc0c77ab87f5199592036edd8891e1643beafae6b51053330b25883b9051d9458fc6f26e2d5c96ec168b0ed3f3f533bb02279a6c44ef0b2429295f
-
C:\Windows\SysWOW64\perfhost.exeFilesize
588KB
MD5ee0e2f1b0294fc9f03cf3b2ccff81814
SHA1e1824611bf983d54e82cc25f53b4dd505d21a5ff
SHA2562ae33c39c5328fbccbc4e5618db0240671f562cbfff2d128a280457ae99be79d
SHA512711735711da613eb7d17a6b72ae01ad47b1bb34f105bd8d0c056f20222fe3eaad0165d1abfba8f7f16b21cff7df03a854cc37da4dfcc15c7f642d17249adc151
-
C:\Windows\System32\AgentService.exeFilesize
1.7MB
MD56d85c0056b3585ab98aa3ff9dede9d4a
SHA1b89d4343fac19e8836f6be82057b398e02fa39e9
SHA256081b2181f114a7a4a48ee7061a050477e8e4c63d593c62a23916661d42e77290
SHA512eda93bb683f632ab7a3c7cda636a062beabbb1577058ab3f103eafa15103cd052c6f93e00ecec01ac8ecd06f2c00f6de0bf0b06ccb942078302524b612bc4a97
-
C:\Windows\System32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exeFilesize
659KB
MD52e231b5b114a47e8c60cc0036aac7652
SHA159ddb2315c4373a8accf0aa5e9cb223cde30c192
SHA256e17db99c2b2e4eea10f97bae94c891b4260c7dd827b7bbd42d981c61eb110920
SHA5122252a5c147c563ca03a8847383e28d80e13b4a1b319074525f5357c02ed7416d11f901df58558c96635f5ff6ae11cc21031a1c93f2dacafc4ee2440f94a6a0a0
-
C:\Windows\System32\FXSSVC.exeFilesize
1.2MB
MD5624f29906c35fd854f996b9f7d132005
SHA1b86456a13268dc1675c3ea2f8d6119eaa9c3a262
SHA25668a09df324348a24730948a3301a40c119c4d18e11cbe0e7ccbc334234ba4366
SHA5129f331a6b154f96136e71b5324e56c6237e9f4917bf362b72d09c5bd2bdba0e68ea04e4acec22316e472abb2a97f118763c2866f4ab88f0fb0182c2198d3d49da
-
C:\Windows\System32\Locator.exeFilesize
578KB
MD5724bb6935c7fb7b17b402abb3a1ab180
SHA1aab67d95868eb5a754eb3db5e88bba455d2a8e2a
SHA256a90e5a14e814f99e07cf1229ec6c6485af1fc788d93e79959f3d18143c187521
SHA512afad0a65eced315886916d11aa705c12cd22f2849cfb66aa5fb970b86128d0f5a18699570b71d668d78d1d8b277aabf39dc995559241ffca069ddc5cbdc15684
-
C:\Windows\System32\OpenSSH\ssh-agent.exeFilesize
940KB
MD501912bf86449eea5f19d6f6333336cc4
SHA154c3a469101f777c2096053ed64c8d9502d930aa
SHA256b200036bbe5b0cf86d0d8a5080032307594a06b0865bc866680e938e25b2b148
SHA5126b6d3f985f267f1193226e39bfce46518de4345d17a6ab942e5f535885645a587ec098691af2f72ac316fd7bdfb3ca770acc0a9509965596762c59229fa4497a
-
C:\Windows\System32\PerceptionSimulation\PerceptionSimulationService.exeFilesize
671KB
MD50ced067776924f1f789606043cc5f714
SHA1a340e8e84ba2c7da7533d7e6f76c18f400cfbad4
SHA256189c88097fb08ca3dc62561424820951ef5b4ab58eadb0d05c06f5c07212e022
SHA512577b54d13c26be95e2cfd5e9724bd510e536ad1db4c94dfc959e5455cd5e7fbabde862ed04c917e55e5ab689b12358a391a40addc1bd7ccc556c38005a191e49
-
C:\Windows\System32\SearchIndexer.exeFilesize
1.4MB
MD5ee9c0dedf55856948ff8134bc69a80dd
SHA1bfef2773216a366931dc9b737216181ce3dee018
SHA256d746875fad57ff1845d574d1e2adf1d20dc45346e0833120afb51bd542a2c479
SHA512e6d82d3766b60ee4cc19486555aec12b99934a54929839a5ffc7dc9d961ba84e5bd4397fce1364b9d5edd5a19fe8ed12ee34359f7197fd4f381d6497ec4339e8
-
C:\Windows\System32\SensorDataService.exeFilesize
1.8MB
MD51b3386cdc2f835f451df6d5fbb2f6054
SHA14060c971293f03249eb734c55acd5106f482d6c9
SHA25641a1d4624b64c82ef59d4409997af16f4793704344c054c82c323321c3433090
SHA512bbf4cda59b699a5c2fa8a0ff64717baa3883b8c779de300be97a035ecbb0648fc8fcda7eaca7360e1ed2d3cafa777b4842098ca66fdb880ae033a4db78b4dd16
-
C:\Windows\System32\Spectrum.exeFilesize
1.4MB
MD5bdf746b81ccc82fee4ad5c29059cf847
SHA1f4dc33e8995216bfc267cfcf8eebfe95c749bec8
SHA2560c4f401ba7acf5891301281f01c00c761aafe19cffffb1eb1a03703e55afaab0
SHA51294136cf23c9c2d8540c508a34d136f8d97b185e4ed3b44ce6c7bd6feab19ade39bb44640c76ba6b0bfdbb89c9a36dc5ace5c83c867fac91002a013e103aba4d9
-
C:\Windows\System32\TieringEngineService.exeFilesize
885KB
MD5500543b6394f91d17ec1e924b22cbaad
SHA1f1eb438eab1d79ea72fdacdbd964f1315fdd36f3
SHA256c9a3a307fcc9d425d5d634b7237ba6655490717c8c3f62c5ba53f50817d143b6
SHA51223014de46e27028f328f4ccc42194801e74a7a4ad6485456b12936cf2227d3e1f63778df184ca4f09bfcb34847f5eb02f0bd2c79634520264e1c29b2e3524d02
-
C:\Windows\System32\VSSVC.exeFilesize
2.0MB
MD50417c975821905ddcaf82874b8e8ae3c
SHA1e4b348062d6461549fa2debe3a979ac400873253
SHA256cdd8bf1cbe75f29bd13f6b5e6cea814b1a0b3112ed90745f829a69dac0b7c94d
SHA512512d06ed859fa665ba57353e3ae1f555d40ce2a9fa60ffcd23b643466b2b041d366c84ad29abf67d78d27c888006703dffb2a18632b6a33cc7da8c4ede0dceca
-
C:\Windows\System32\alg.exeFilesize
661KB
MD50e54c9b27bfe892959f1a260dd875a69
SHA191b6eb4f0384e30f3e19152327789f44f70aa8a0
SHA256e54436172f1e6c160154cf21b86fe2b4c0508df1d430d1b5a91a04ae0d7ce430
SHA512b5daaa2d26bf4d81b8b486eb394b2628b9b3a6d97c96560b919fabe2b13a96df8bd11186446f4e8a72a85a7382a8cfbfe3625e8a115375a3aa3a5bd98e3b0e1f
-
C:\Windows\System32\msdtc.exeFilesize
712KB
MD5048fdd071d5c94b710c8b9f313f2a0ed
SHA1df126813be8a2c39b306591b0ae5cbb209de7c6e
SHA256605f368f4936e474962db3bbb7363b1d8c198e6ae69302ff7dbba801f671587b
SHA512479ca3e81b50fe2a8750f56ec6ddc65c19866ae9bc2e11fbe634c423855167715001a23926f69a8e4a4183275955aedc8a5dfe48d40b42a9588a9ac35b55eee0
-
C:\Windows\System32\snmptrap.exeFilesize
584KB
MD56a1fb67d7406646852676832c280ed6d
SHA1544996d0614f9fb61fc1dc876a9dd13093bc093f
SHA256b34eee071b5c59ba9de7209d2af9d6d6452f6932bf966b9818808abc1d7a8865
SHA512a1b94bf381d514e2d77beb9af6275caaf867fdd85031aa89eead10d5ff877abfb468b99eed734c6a3e130e6e1e588f953c15dcc4b1d9ad8967dc29d0b4b8259e
-
C:\Windows\System32\vds.exeFilesize
1.3MB
MD56843c5ec5d20f62d30d6122f477f7c53
SHA185f533774a79d99b457266ede96aa96ab8a7cdbc
SHA256bf6e3945a4bb5e24d042e4a87718a1c0bd003dc253cdb01f50aec266632d1347
SHA51234ffd86b027037b51724dc9cfa40ab3e6b0cfe06a45cd78a52da682364e2bcaf56fbfcd4d94cafa2786b8ef6d0a0255500680f6528f18c49cf2b31c9838560ef
-
C:\Windows\System32\wbem\WmiApSrv.exeFilesize
772KB
MD5cf7b8646b6e947688019c9db3890686e
SHA111625379969b8a216aeaf295f35e48f00260a3d3
SHA256b8d6f3aa352d81c72be61db2e1b4b6b7ff082a6ef33b0bdcd1884290061f1957
SHA5120ae990388e362bb1ebe94551597dfc8fd1c1df334171b66ff24cf70bde20339e3558096992dff01e014b48f2afd9daf0c90830e2aeae2cfb9240d1c1e95ff58b
-
C:\Windows\System32\wbengine.exeFilesize
2.1MB
MD5b0398e5462f3cd124696b757c578e0e2
SHA1587d9a833d22372fce079647985c77a1274202d5
SHA2560c95267941c6e01c641ba7e56243a9a9cffad89cd96b1a50c110af90c5c9f045
SHA5126d3fa350227b4ff07dcb9aee939027b083f02e9f484227acaa037226e05ecfbfed6491045d7e11b69ab330fecb31c31ae2f411413fa64926630ee52143667785
-
C:\Windows\system32\AppVClient.exeFilesize
1.3MB
MD5d6eeb59a79d77cf3bf578b15a099cc3a
SHA13c4fae71f0708541a9b32faf3d61f40c4ddc9ae6
SHA256b503a0c69d20ad404c2657cc545d5305a429f81d92d886f3a59affcf83106cc0
SHA512071e5662623a695da7fb85b1850cfefa0ad1dc27b1ef2d115b8c56398a0fb682d60e8b7d8c33e797551d3b17dbafc087ecff71c1c210afdaeb08d5cd6278aa36
-
C:\Windows\system32\SgrmBroker.exeFilesize
877KB
MD545e1e5d662bdcb532736cfae2c6e20d7
SHA188c20ae1ad86f8112684b06e66665b90a5fb145b
SHA256da184ddf87506f2b9314ffc0a8131f1b61da81a956e4bb6ad63fb257f40a3ed4
SHA51275e3c18921663a2d0b82d46c02e2e5f1ea97878c62763637eecc8135d7156c877adc6f7b41e91c16448b68bd8b83ba4af98fba1100114f6a7f2f16620ca65e94
-
C:\Windows\system32\msiexec.exeFilesize
635KB
MD57c42dbf1f11be7a11b0339b1f79484de
SHA12593efb959f1dcbe77a9ef4cc1b817109deb2918
SHA2563354409eba549026ecd4f08572d6fed0546a444b0de815334fba1cfa9b3b63a5
SHA51223d59313fd64824e2ba387e92921ee2ceb25afe2d18f0e80355d63586068f3cc56c38fae74d6a19781a7c39d5cb9e06fd0dafc7236eea3b7ddc8d1e997496126
-
memory/408-0-0x0000000000990000-0x00000000009F0000-memory.dmpFilesize
384KB
-
memory/408-439-0x0000000010000000-0x00000000100A7000-memory.dmpFilesize
668KB
-
memory/408-441-0x0000000000990000-0x00000000009F0000-memory.dmpFilesize
384KB
-
memory/408-8-0x0000000010000000-0x00000000100A7000-memory.dmpFilesize
668KB
-
memory/408-6-0x0000000000990000-0x00000000009F0000-memory.dmpFilesize
384KB
-
memory/548-55-0x0000000140000000-0x00000001400CF000-memory.dmpFilesize
828KB
-
memory/548-65-0x0000000001D10000-0x0000000001D70000-memory.dmpFilesize
384KB
-
memory/548-62-0x0000000001D10000-0x0000000001D70000-memory.dmpFilesize
384KB
-
memory/548-56-0x0000000001D10000-0x0000000001D70000-memory.dmpFilesize
384KB
-
memory/548-69-0x0000000140000000-0x00000001400CF000-memory.dmpFilesize
828KB
-
memory/760-116-0x0000000140000000-0x00000001401D7000-memory.dmpFilesize
1.8MB
-
memory/760-482-0x0000000140000000-0x00000001401D7000-memory.dmpFilesize
1.8MB
-
memory/1400-32-0x0000000140000000-0x0000000140135000-memory.dmpFilesize
1.2MB
-
memory/1400-29-0x0000000140000000-0x0000000140135000-memory.dmpFilesize
1.2MB
-
memory/1668-99-0x0000000140000000-0x00000001400AA000-memory.dmpFilesize
680KB
-
memory/1668-12-0x0000000140000000-0x00000001400AA000-memory.dmpFilesize
680KB
-
memory/1712-101-0x0000000000400000-0x0000000000497000-memory.dmpFilesize
604KB
-
memory/1712-162-0x0000000000400000-0x0000000000497000-memory.dmpFilesize
604KB
-
memory/1712-103-0x0000000000680000-0x00000000006E7000-memory.dmpFilesize
412KB
-
memory/1712-107-0x0000000000680000-0x00000000006E7000-memory.dmpFilesize
412KB
-
memory/1768-170-0x0000000140000000-0x0000000140179000-memory.dmpFilesize
1.5MB
-
memory/1768-490-0x0000000140000000-0x0000000140179000-memory.dmpFilesize
1.5MB
-
memory/1824-97-0x0000000140000000-0x00000001400AB000-memory.dmpFilesize
684KB
-
memory/1824-158-0x0000000140000000-0x00000001400AB000-memory.dmpFilesize
684KB
-
memory/1824-88-0x0000000000BB0000-0x0000000000C10000-memory.dmpFilesize
384KB
-
memory/1824-94-0x0000000000BB0000-0x0000000000C10000-memory.dmpFilesize
384KB
-
memory/2264-156-0x0000000140000000-0x0000000140147000-memory.dmpFilesize
1.3MB
-
memory/2264-484-0x0000000140000000-0x0000000140147000-memory.dmpFilesize
1.3MB
-
memory/2320-39-0x0000000140000000-0x000000014024B000-memory.dmpFilesize
2.3MB
-
memory/2320-40-0x0000000000510000-0x0000000000570000-memory.dmpFilesize
384KB
-
memory/2320-121-0x0000000140000000-0x000000014024B000-memory.dmpFilesize
2.3MB
-
memory/2320-33-0x0000000000510000-0x0000000000570000-memory.dmpFilesize
384KB
-
memory/3084-159-0x0000000140000000-0x00000001401FC000-memory.dmpFilesize
2.0MB
-
memory/3084-485-0x0000000140000000-0x00000001401FC000-memory.dmpFilesize
2.0MB
-
memory/3436-481-0x0000000140000000-0x0000000140102000-memory.dmpFilesize
1.0MB
-
memory/3436-143-0x0000000140000000-0x0000000140102000-memory.dmpFilesize
1.0MB
-
memory/3468-134-0x0000000140000000-0x000000014022B000-memory.dmpFilesize
2.2MB
-
memory/3468-50-0x00000000001A0000-0x0000000000200000-memory.dmpFilesize
384KB
-
memory/3468-44-0x00000000001A0000-0x0000000000200000-memory.dmpFilesize
384KB
-
memory/3468-52-0x0000000140000000-0x000000014022B000-memory.dmpFilesize
2.2MB
-
memory/3548-436-0x0000000140000000-0x0000000140169000-memory.dmpFilesize
1.4MB
-
memory/3548-122-0x0000000140000000-0x0000000140169000-memory.dmpFilesize
1.4MB
-
memory/3628-100-0x0000000140000000-0x00000001400A9000-memory.dmpFilesize
676KB
-
memory/3628-16-0x00000000004C0000-0x0000000000520000-memory.dmpFilesize
384KB
-
memory/3628-24-0x0000000140000000-0x00000001400A9000-memory.dmpFilesize
676KB
-
memory/3628-25-0x00000000004C0000-0x0000000000520000-memory.dmpFilesize
384KB
-
memory/3656-163-0x0000000140000000-0x0000000140216000-memory.dmpFilesize
2.1MB
-
memory/3656-488-0x0000000140000000-0x0000000140216000-memory.dmpFilesize
2.1MB
-
memory/4484-364-0x0000000140000000-0x0000000140096000-memory.dmpFilesize
600KB
-
memory/4484-118-0x0000000140000000-0x0000000140096000-memory.dmpFilesize
600KB
-
memory/4488-149-0x0000000140000000-0x00000001400B9000-memory.dmpFilesize
740KB
-
memory/4488-70-0x0000000140000000-0x00000001400B9000-memory.dmpFilesize
740KB
-
memory/4688-489-0x0000000140000000-0x00000001400C6000-memory.dmpFilesize
792KB
-
memory/4688-166-0x0000000140000000-0x00000001400C6000-memory.dmpFilesize
792KB
-
memory/4700-147-0x0000000140000000-0x00000001400E2000-memory.dmpFilesize
904KB
-
memory/4700-483-0x0000000140000000-0x00000001400E2000-memory.dmpFilesize
904KB
-
memory/4832-150-0x0000000140000000-0x00000001401C0000-memory.dmpFilesize
1.8MB
-
memory/4832-152-0x0000000140000000-0x00000001401C0000-memory.dmpFilesize
1.8MB
-
memory/4976-112-0x0000000140000000-0x0000000140095000-memory.dmpFilesize
596KB
-
memory/4988-84-0x00000000004F0000-0x0000000000550000-memory.dmpFilesize
384KB
-
memory/4988-154-0x0000000140000000-0x00000001400CF000-memory.dmpFilesize
828KB
-
memory/4988-77-0x0000000140000000-0x00000001400CF000-memory.dmpFilesize
828KB
-
memory/4988-78-0x00000000004F0000-0x0000000000550000-memory.dmpFilesize
384KB