Analysis
-
max time kernel
146s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
01-07-2024 04:32
Static task
static1
Behavioral task
behavioral1
Sample
35946d85fce79300996c5913eb023b040f3a459fd6a910bdd8fd0b7dd9fdcc12_NeikiAnalytics.exe
Resource
win7-20240508-en
General
-
Target
35946d85fce79300996c5913eb023b040f3a459fd6a910bdd8fd0b7dd9fdcc12_NeikiAnalytics.exe
-
Size
648KB
-
MD5
d99a4d42147831c6f1db6e31e3a3d1e0
-
SHA1
dfc3197b9eb6db088c5230bf4afae9d682f22772
-
SHA256
35946d85fce79300996c5913eb023b040f3a459fd6a910bdd8fd0b7dd9fdcc12
-
SHA512
6ff24fbc0f17a6f017fb81733e3bc21e3de9e9ac5b77537bdde258363574b62fafd1ea5f97ba5cf54625b337785c9cd1b03d8e4a99fb551e75332dfa3629db24
-
SSDEEP
12288:hqz2DWUyOdlI7KcBBxeXZY7Zoxxau7gnijY5C1uP8xwB:cz2DW3ZGXkHu7gi05yu5
Malware Config
Signatures
-
Executes dropped EXE 22 IoCs
Processes:
alg.exeDiagnosticsHub.StandardCollector.Service.exefxssvc.exeelevation_service.exeelevation_service.exemaintenanceservice.exemsdtc.exeOSE.EXEPerceptionSimulationService.exeperfhost.exelocator.exeSensorDataService.exesnmptrap.exespectrum.exessh-agent.exeTieringEngineService.exeAgentService.exevds.exevssvc.exewbengine.exeWmiApSrv.exeSearchIndexer.exepid process 1352 alg.exe 4196 DiagnosticsHub.StandardCollector.Service.exe 2960 fxssvc.exe 684 elevation_service.exe 3472 elevation_service.exe 4024 maintenanceservice.exe 4960 msdtc.exe 32 OSE.EXE 1832 PerceptionSimulationService.exe 3128 perfhost.exe 2624 locator.exe 432 SensorDataService.exe 876 snmptrap.exe 64 spectrum.exe 3356 ssh-agent.exe 1524 TieringEngineService.exe 1912 AgentService.exe 4576 vds.exe 4344 vssvc.exe 4452 wbengine.exe 4936 WmiApSrv.exe 4988 SearchIndexer.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in System32 directory 37 IoCs
Processes:
35946d85fce79300996c5913eb023b040f3a459fd6a910bdd8fd0b7dd9fdcc12_NeikiAnalytics.exeDiagnosticsHub.StandardCollector.Service.exemsdtc.exealg.exedescription ioc process File opened for modification C:\Windows\system32\vssvc.exe 35946d85fce79300996c5913eb023b040f3a459fd6a910bdd8fd0b7dd9fdcc12_NeikiAnalytics.exe File opened for modification C:\Windows\System32\SensorDataService.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Windows\system32\SgrmBroker.exe 35946d85fce79300996c5913eb023b040f3a459fd6a910bdd8fd0b7dd9fdcc12_NeikiAnalytics.exe File opened for modification C:\Windows\System32\snmptrap.exe 35946d85fce79300996c5913eb023b040f3a459fd6a910bdd8fd0b7dd9fdcc12_NeikiAnalytics.exe File opened for modification C:\Windows\system32\TieringEngineService.exe 35946d85fce79300996c5913eb023b040f3a459fd6a910bdd8fd0b7dd9fdcc12_NeikiAnalytics.exe File opened for modification C:\Windows\SysWow64\perfhost.exe 35946d85fce79300996c5913eb023b040f3a459fd6a910bdd8fd0b7dd9fdcc12_NeikiAnalytics.exe File opened for modification C:\Windows\System32\SensorDataService.exe 35946d85fce79300996c5913eb023b040f3a459fd6a910bdd8fd0b7dd9fdcc12_NeikiAnalytics.exe File opened for modification C:\Windows\system32\AgentService.exe 35946d85fce79300996c5913eb023b040f3a459fd6a910bdd8fd0b7dd9fdcc12_NeikiAnalytics.exe File opened for modification C:\Windows\system32\wbengine.exe 35946d85fce79300996c5913eb023b040f3a459fd6a910bdd8fd0b7dd9fdcc12_NeikiAnalytics.exe File opened for modification C:\Windows\system32\fxssvc.exe 35946d85fce79300996c5913eb023b040f3a459fd6a910bdd8fd0b7dd9fdcc12_NeikiAnalytics.exe File opened for modification C:\Windows\system32\MSDtc\MSDTC.LOG msdtc.exe File opened for modification C:\Windows\system32\PerceptionSimulation\PerceptionSimulationService.exe 35946d85fce79300996c5913eb023b040f3a459fd6a910bdd8fd0b7dd9fdcc12_NeikiAnalytics.exe File opened for modification C:\Windows\System32\alg.exe 35946d85fce79300996c5913eb023b040f3a459fd6a910bdd8fd0b7dd9fdcc12_NeikiAnalytics.exe File opened for modification C:\Windows\System32\msdtc.exe 35946d85fce79300996c5913eb023b040f3a459fd6a910bdd8fd0b7dd9fdcc12_NeikiAnalytics.exe File opened for modification C:\Windows\System32\OpenSSH\ssh-agent.exe 35946d85fce79300996c5913eb023b040f3a459fd6a910bdd8fd0b7dd9fdcc12_NeikiAnalytics.exe File opened for modification C:\Windows\system32\AgentService.exe alg.exe File opened for modification C:\Windows\system32\AgentService.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Windows\system32\dllhost.exe 35946d85fce79300996c5913eb023b040f3a459fd6a910bdd8fd0b7dd9fdcc12_NeikiAnalytics.exe File opened for modification C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe 35946d85fce79300996c5913eb023b040f3a459fd6a910bdd8fd0b7dd9fdcc12_NeikiAnalytics.exe File opened for modification C:\Windows\system32\AppVClient.exe alg.exe File opened for modification C:\Windows\System32\vds.exe 35946d85fce79300996c5913eb023b040f3a459fd6a910bdd8fd0b7dd9fdcc12_NeikiAnalytics.exe File opened for modification C:\Windows\system32\SearchIndexer.exe 35946d85fce79300996c5913eb023b040f3a459fd6a910bdd8fd0b7dd9fdcc12_NeikiAnalytics.exe File opened for modification C:\Windows\system32\fxssvc.exe alg.exe File opened for modification C:\Windows\system32\SgrmBroker.exe alg.exe File opened for modification C:\Windows\system32\msiexec.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Windows\system32\AppVClient.exe 35946d85fce79300996c5913eb023b040f3a459fd6a910bdd8fd0b7dd9fdcc12_NeikiAnalytics.exe File opened for modification C:\Windows\system32\msiexec.exe 35946d85fce79300996c5913eb023b040f3a459fd6a910bdd8fd0b7dd9fdcc12_NeikiAnalytics.exe File opened for modification C:\Windows\system32\spectrum.exe 35946d85fce79300996c5913eb023b040f3a459fd6a910bdd8fd0b7dd9fdcc12_NeikiAnalytics.exe File opened for modification C:\Windows\system32\dllhost.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Windows\system32\SgrmBroker.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Roaming\2d32b68dc8648821.bin alg.exe File opened for modification C:\Windows\system32\dllhost.exe alg.exe File opened for modification C:\Windows\system32\AppVClient.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Windows\system32\locator.exe 35946d85fce79300996c5913eb023b040f3a459fd6a910bdd8fd0b7dd9fdcc12_NeikiAnalytics.exe File opened for modification C:\Windows\system32\msiexec.exe alg.exe File opened for modification C:\Windows\system32\fxssvc.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Windows\system32\wbem\WmiApSrv.exe 35946d85fce79300996c5913eb023b040f3a459fd6a910bdd8fd0b7dd9fdcc12_NeikiAnalytics.exe -
Drops file in Program Files directory 64 IoCs
Processes:
35946d85fce79300996c5913eb023b040f3a459fd6a910bdd8fd0b7dd9fdcc12_NeikiAnalytics.exealg.exeDiagnosticsHub.StandardCollector.Service.exedescription ioc process File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\wow_helper.exe 35946d85fce79300996c5913eb023b040f3a459fd6a910bdd8fd0b7dd9fdcc12_NeikiAnalytics.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\unpack200.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\unpack200.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Internet Explorer\iediagcmd.exe 35946d85fce79300996c5913eb023b040f3a459fd6a910bdd8fd0b7dd9fdcc12_NeikiAnalytics.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\orbd.exe 35946d85fce79300996c5913eb023b040f3a459fd6a910bdd8fd0b7dd9fdcc12_NeikiAnalytics.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\javacpl.exe 35946d85fce79300996c5913eb023b040f3a459fd6a910bdd8fd0b7dd9fdcc12_NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\arh.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jstat.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\javaws.exe 35946d85fce79300996c5913eb023b040f3a459fd6a910bdd8fd0b7dd9fdcc12_NeikiAnalytics.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\pack200.exe alg.exe File opened for modification C:\Program Files\dotnet\dotnet.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\javaw.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\java.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\xjc.exe 35946d85fce79300996c5913eb023b040f3a459fd6a910bdd8fd0b7dd9fdcc12_NeikiAnalytics.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\java-rmi.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\ktab.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Eula.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\jjs.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\klist.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\unpack200.exe alg.exe File opened for modification C:\Program Files (x86)\Google\Update\Download\{8A69D345-D564-463C-AFF1-A69D9E530F96}\110.0.5481.104\chrome_installer.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\java-rmi.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\dotnet\dotnet.exe 35946d85fce79300996c5913eb023b040f3a459fd6a910bdd8fd0b7dd9fdcc12_NeikiAnalytics.exe File opened for modification C:\Program Files\Mozilla Firefox\uninstall\helper.exe 35946d85fce79300996c5913eb023b040f3a459fd6a910bdd8fd0b7dd9fdcc12_NeikiAnalytics.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\unpack200.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files (x86)\Common Files\Oracle\Java\javapath\javaws.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\java-rmi.exe 35946d85fce79300996c5913eb023b040f3a459fd6a910bdd8fd0b7dd9fdcc12_NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Google\Update\Install\{14DF0EF0-439C-4CF1-9E8A-D1E954BF645B}\chrome_installer.exe 35946d85fce79300996c5913eb023b040f3a459fd6a910bdd8fd0b7dd9fdcc12_NeikiAnalytics.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\tnameserv.exe alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\InputPersonalization.exe 35946d85fce79300996c5913eb023b040f3a459fd6a910bdd8fd0b7dd9fdcc12_NeikiAnalytics.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jdeps.exe 35946d85fce79300996c5913eb023b040f3a459fd6a910bdd8fd0b7dd9fdcc12_NeikiAnalytics.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\ktab.exe alg.exe File opened for modification C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\OFFICE16\LICLUA.EXE DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\rmid.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\ssvagent.exe 35946d85fce79300996c5913eb023b040f3a459fd6a910bdd8fd0b7dd9fdcc12_NeikiAnalytics.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\orbd.exe alg.exe File opened for modification C:\Program Files (x86)\Internet Explorer\ielowutil.exe alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe 35946d85fce79300996c5913eb023b040f3a459fd6a910bdd8fd0b7dd9fdcc12_NeikiAnalytics.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\klist.exe 35946d85fce79300996c5913eb023b040f3a459fd6a910bdd8fd0b7dd9fdcc12_NeikiAnalytics.exe File opened for modification C:\Program Files\Windows Media Player\wmpnetwk.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Google\Chrome\Application\110.0.5481.104\Installer\chrmstp.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\javaw.exe 35946d85fce79300996c5913eb023b040f3a459fd6a910bdd8fd0b7dd9fdcc12_NeikiAnalytics.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\jjs.exe 35946d85fce79300996c5913eb023b040f3a459fd6a910bdd8fd0b7dd9fdcc12_NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleCrashHandler64.exe 35946d85fce79300996c5913eb023b040f3a459fd6a910bdd8fd0b7dd9fdcc12_NeikiAnalytics.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\kinit.exe alg.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\FullTrustNotifier.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\extcheck.exe 35946d85fce79300996c5913eb023b040f3a459fd6a910bdd8fd0b7dd9fdcc12_NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateComRegisterShell64.exe 35946d85fce79300996c5913eb023b040f3a459fd6a910bdd8fd0b7dd9fdcc12_NeikiAnalytics.exe File opened for modification C:\Program Files\Common Files\microsoft shared\Source Engine\OSE.EXE DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\policytool.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Mozilla Firefox\maintenanceservice_installer.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files (x86)\Common Files\Oracle\Java\javapath\javaw.exe 35946d85fce79300996c5913eb023b040f3a459fd6a910bdd8fd0b7dd9fdcc12_NeikiAnalytics.exe File opened for modification C:\Program Files\Google\Chrome\Application\110.0.5481.104\Installer\chrmstp.exe alg.exe File opened for modification C:\Program Files\Mozilla Firefox\updater.exe alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\IntegratedOffice.exe 35946d85fce79300996c5913eb023b040f3a459fd6a910bdd8fd0b7dd9fdcc12_NeikiAnalytics.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\java-rmi.exe 35946d85fce79300996c5913eb023b040f3a459fd6a910bdd8fd0b7dd9fdcc12_NeikiAnalytics.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\jabswitch.exe 35946d85fce79300996c5913eb023b040f3a459fd6a910bdd8fd0b7dd9fdcc12_NeikiAnalytics.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\javaws.exe 35946d85fce79300996c5913eb023b040f3a459fd6a910bdd8fd0b7dd9fdcc12_NeikiAnalytics.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc.exe 35946d85fce79300996c5913eb023b040f3a459fd6a910bdd8fd0b7dd9fdcc12_NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Common Files\Java\Java Update\jucheck.exe alg.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroLayoutRecognizer\AcroLayoutRecognizer.exe 35946d85fce79300996c5913eb023b040f3a459fd6a910bdd8fd0b7dd9fdcc12_NeikiAnalytics.exe -
Drops file in Windows directory 4 IoCs
Processes:
35946d85fce79300996c5913eb023b040f3a459fd6a910bdd8fd0b7dd9fdcc12_NeikiAnalytics.exemsdtc.exealg.exeDiagnosticsHub.StandardCollector.Service.exedescription ioc process File opened for modification C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe 35946d85fce79300996c5913eb023b040f3a459fd6a910bdd8fd0b7dd9fdcc12_NeikiAnalytics.exe File opened for modification C:\Windows\DtcInstall.log msdtc.exe File opened for modification C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe alg.exe File opened for modification C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe DiagnosticsHub.StandardCollector.Service.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 64 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
SensorDataService.exespectrum.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 spectrum.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\FriendlyName SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A SensorDataService.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\FriendlyName spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 SensorDataService.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\FriendlyName SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A spectrum.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\FriendlyName SensorDataService.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A spectrum.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A spectrum.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
TieringEngineService.exedescription ioc process Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 TieringEngineService.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz TieringEngineService.exe -
Modifies data under HKEY_USERS 64 IoCs
Processes:
SearchProtocolHost.exeSearchFilterHost.exefxssvc.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-116 = "Microsoft Excel Template" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aif\OpenWithList SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates SearchFilterHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9925 = "MP3 Format Sound" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\MPEG2Demultiplexer SearchFilterHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{A38B883C-1682-497E-97B0-0A3A9E801682} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 01000000000000001a0536b76fcbda01 SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-114 = "OpenDocument Spreadsheet" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE SearchFilterHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Windows\System32\ieframe.dll,-912 = "HTML Document" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-174 = "Microsoft PowerPoint Presentation" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Windows\system32\zipfldr.dll,-10195 = "Compressed (zipped) Folder" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@fxsresm.dll,-1134 = "Microsoft Routing Extension" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@fxsresm.dll,-1131 = "Route through e-mail" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-140 = "Microsoft OneNote Section" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mhtml\OpenWithList SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Windows\System32\ieframe.dll,-913 = "MHTML Document" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum 64-bit\{4EFE2452-168A-11D1-BC76-00C04FB9453B}\Default MidiOut Device SearchFilterHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.html SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{5985FC23-2588-4D9A-B38B-7E7AFFAB3155} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 0100000000000000d8a85db86fcbda01 SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-125 = "Microsoft Word Template" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pdf SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-180 = "Microsoft PowerPoint 97-2003 Template" SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{3DBEE9A1-C471-4B95-BBCA-F39310064458} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 0100000000000000fc4031b76fcbda01 SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft SearchFilterHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mhtml SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Windows\System32\ieframe.dll,-914 = "SVG Document" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Program Files\Common Files\system\wab32res.dll,-10100 = "Contacts" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Multimedia\ActiveMovie SearchFilterHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9935 = "MPEG-2 TS Video" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9911 = "Windows Media Audio shortcut" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-184 = "Microsoft PowerPoint Macro-Enabled Design Template" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@"C:\Windows\system32\windowspowershell\v1.0\powershell.exe",-103 = "Windows PowerShell Script" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@windows.storage.dll,-21825 = "3D Objects" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-113 = "Microsoft Excel Binary Worksheet" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-175 = "Microsoft PowerPoint Slide Show" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-111 = "Microsoft Excel Macro-Enabled Template" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9933 = "MPEG-4 Audio" SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{C120DE80-FDE4-49F5-A713-E902EF062B8A} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 010000000000000067c55cb96fcbda01 SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-127 = "OpenDocument Text" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-121 = "Microsoft Word 97 - 2003 Template" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-172 = "Microsoft PowerPoint 97-2003 Slide Show" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie SearchFilterHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.html\OpenWithList SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{01BE4CFB-129A-452B-A209-F9D40B3B84A5} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 0100000000000000bc465bb86fcbda01 SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9934 = "AVCHD Video" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aif SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My SearchFilterHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-103 = "Microsoft Excel Macro-Enabled Worksheet" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Windows\system32\windows.storage.dll,-10152 = "File folder" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9902 = "Movie Clip" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-176 = "Microsoft PowerPoint Macro-Enabled Presentation" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-101 = "Microsoft Excel Worksheet" SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{F81B1B56-7613-4EE4-BC05-1FAB5DE5C07E} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 01000000000000006486f9b76fcbda01 SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\MPEG2Demultiplexer SearchFilterHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{1E589E9D-8A8D-46D9-A2F9-E6D4F8161EE9} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 0100000000000000a15d11b86fcbda01 SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@windows.storage.dll,-21824 = "Camera Roll" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9938 = "3GPP2 Audio/Video" SearchProtocolHost.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
Processes:
DiagnosticsHub.StandardCollector.Service.exepid process 4196 DiagnosticsHub.StandardCollector.Service.exe 4196 DiagnosticsHub.StandardCollector.Service.exe 4196 DiagnosticsHub.StandardCollector.Service.exe 4196 DiagnosticsHub.StandardCollector.Service.exe 4196 DiagnosticsHub.StandardCollector.Service.exe 4196 DiagnosticsHub.StandardCollector.Service.exe 4196 DiagnosticsHub.StandardCollector.Service.exe -
Suspicious behavior: LoadsDriver 2 IoCs
Processes:
pid process 660 660 -
Suspicious use of AdjustPrivilegeToken 41 IoCs
Processes:
35946d85fce79300996c5913eb023b040f3a459fd6a910bdd8fd0b7dd9fdcc12_NeikiAnalytics.exefxssvc.exeTieringEngineService.exeAgentService.exevssvc.exewbengine.exeSearchIndexer.exealg.exeDiagnosticsHub.StandardCollector.Service.exedescription pid process Token: SeTakeOwnershipPrivilege 1312 35946d85fce79300996c5913eb023b040f3a459fd6a910bdd8fd0b7dd9fdcc12_NeikiAnalytics.exe Token: SeAuditPrivilege 2960 fxssvc.exe Token: SeRestorePrivilege 1524 TieringEngineService.exe Token: SeManageVolumePrivilege 1524 TieringEngineService.exe Token: SeAssignPrimaryTokenPrivilege 1912 AgentService.exe Token: SeBackupPrivilege 4344 vssvc.exe Token: SeRestorePrivilege 4344 vssvc.exe Token: SeAuditPrivilege 4344 vssvc.exe Token: SeBackupPrivilege 4452 wbengine.exe Token: SeRestorePrivilege 4452 wbengine.exe Token: SeSecurityPrivilege 4452 wbengine.exe Token: 33 4988 SearchIndexer.exe Token: SeIncBasePriorityPrivilege 4988 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4988 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4988 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4988 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4988 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4988 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4988 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4988 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4988 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4988 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4988 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4988 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4988 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4988 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4988 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4988 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4988 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4988 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4988 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4988 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4988 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4988 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4988 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4988 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4988 SearchIndexer.exe Token: SeDebugPrivilege 1352 alg.exe Token: SeDebugPrivilege 1352 alg.exe Token: SeDebugPrivilege 1352 alg.exe Token: SeDebugPrivilege 4196 DiagnosticsHub.StandardCollector.Service.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
SearchIndexer.exedescription pid process target process PID 4988 wrote to memory of 1404 4988 SearchIndexer.exe SearchProtocolHost.exe PID 4988 wrote to memory of 1404 4988 SearchIndexer.exe SearchProtocolHost.exe PID 4988 wrote to memory of 3488 4988 SearchIndexer.exe SearchFilterHost.exe PID 4988 wrote to memory of 3488 4988 SearchIndexer.exe SearchFilterHost.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\35946d85fce79300996c5913eb023b040f3a459fd6a910bdd8fd0b7dd9fdcc12_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\35946d85fce79300996c5913eb023b040f3a459fd6a910bdd8fd0b7dd9fdcc12_NeikiAnalytics.exe"1⤵
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\alg.exeC:\Windows\System32\alg.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exeC:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s TapiSrv1⤵
-
C:\Windows\system32\fxssvc.exeC:\Windows\system32\fxssvc.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵
- Executes dropped EXE
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"1⤵
- Executes dropped EXE
-
C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"1⤵
- Executes dropped EXE
-
C:\Windows\System32\msdtc.exeC:\Windows\System32\msdtc.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
-
\??\c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"1⤵
- Executes dropped EXE
-
C:\Windows\system32\PerceptionSimulation\PerceptionSimulationService.exeC:\Windows\system32\PerceptionSimulation\PerceptionSimulationService.exe1⤵
- Executes dropped EXE
-
C:\Windows\SysWow64\perfhost.exeC:\Windows\SysWow64\perfhost.exe1⤵
- Executes dropped EXE
-
C:\Windows\system32\locator.exeC:\Windows\system32\locator.exe1⤵
- Executes dropped EXE
-
C:\Windows\System32\SensorDataService.exeC:\Windows\System32\SensorDataService.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
-
C:\Windows\System32\snmptrap.exeC:\Windows\System32\snmptrap.exe1⤵
- Executes dropped EXE
-
C:\Windows\system32\spectrum.exeC:\Windows\system32\spectrum.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
-
C:\Windows\System32\OpenSSH\ssh-agent.exeC:\Windows\System32\OpenSSH\ssh-agent.exe1⤵
- Executes dropped EXE
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s SharedRealitySvc1⤵
-
C:\Windows\system32\TieringEngineService.exeC:\Windows\system32\TieringEngineService.exe1⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\AgentService.exeC:\Windows\system32\AgentService.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵
- Executes dropped EXE
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵
- Executes dropped EXE
-
C:\Windows\system32\SearchIndexer.exeC:\Windows\system32\SearchIndexer.exe /Embedding1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\SearchProtocolHost.exe"C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe1_ Global\UsGthrCtrlFltPipeMssGthrPipe1 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon"2⤵
- Modifies data under HKEY_USERS
-
C:\Windows\system32\SearchFilterHost.exe"C:\Windows\system32\SearchFilterHost.exe" 0 912 916 924 8192 920 8962⤵
- Modifies data under HKEY_USERS
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exeFilesize
2.1MB
MD5e55ccda244825b9c8b843d51a5cd7b51
SHA1469f8aad5fd366fcc4d242b42d8804275e1df398
SHA2561394741122d8a5a6d7bd4dbe1216e246cb6f1b72a671653feb5768fdfad5c458
SHA5126f629956bd948bc5d78af3656b1afd17316e878932079b4735f9b9288e833818c7cdb2d1be5fc72c50ecc916d7213b69ff6bf2e3feb25367d281a54d2cd634ec
-
C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exeFilesize
797KB
MD5fcc1dc9520c991ebe51206e4a7565e47
SHA1ed5269e35375e2f08f2e3a56f13330cc13f99f2d
SHA2567b75dfbfd07021929da0e0601d05aa168ce05b0b1029788ff6acc3ff3cd1b2ab
SHA512e2438203efe9da84a867a19208420391ccc3fe1292c30bcd04db08cd0db7b1e60b168d0bc693e5c9fe6991af7bc6ba0026a352ba3ecafb35733959bb0a9e124a
-
C:\Program Files\7-Zip\7z.exeFilesize
1.1MB
MD513e88b4caff8c89455eea3810bf27037
SHA1d9950b454e0014c01f9a9a4a28e7a7c48fea92a2
SHA256128ae52e2ee2b61806422953714d84447085836cc9cf034fe705424418fc7a6d
SHA5121fdef72953785d406131e4fbcec531f4d4348b710f4b25a5cde9e2149cd1553c0271209b93593e272cb958f1a2215ae763c7eff2c4e4b0deb607c7711e52cc85
-
C:\Program Files\7-Zip\7zFM.exeFilesize
1.5MB
MD53c564350f09639201c9ed3268cb9f03c
SHA13e6b47f8d5da9ebe5ca6f6a2b6b140a29dcbc061
SHA256e2106d0932bcd642e7cea55f5a8e015b3969001be3306eaf9b9c4aebd07ee2af
SHA5125847273fb402a07aff51cdeec3276148d44be8a38c599882754e64cb5fe0efe692b86df09f9cf4d9356bad68d0177d28e058a30fe7ee4734705569214d76b608
-
C:\Program Files\7-Zip\7zG.exeFilesize
1.2MB
MD576286bada6aee830f13b219070b1dfc3
SHA15109a4d5964d68910ef7ddef78fb2af00d2583c3
SHA256e371b3c99bfe1fe593e66fb0a6f11c5c4f430ff2e7dd12e3022df3d86f594e46
SHA5125becd95bb9159c5f2446844b4cf13ee7e48c7d30b0a910f181cbb35c7289586c754fa4dd997bc5d9e5c0ce2232edbfcc538301dc40a0b89f75109176957315d8
-
C:\Program Files\7-Zip\Uninstall.exeFilesize
582KB
MD5e0a00ecb9d0b6d229f6162268750fc12
SHA14c1bb0797d7854752e692c5eb8d8c4f57f8b8876
SHA2566d7700e7c8b7ab70654c72b45d4b61c25da7619c0ba81177865bfc490d819362
SHA5128a2d9a93bcadc8bf83f227af512677242015555bc025a8ae4154a47e1b7ae6a99f27d6ba51f14a0da90e8c754c38c1dd973803c59d4150c31ec4d417c0e8019e
-
C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVShNotify.exeFilesize
840KB
MD5992451844c095b5c6ff5ae8c186bb4d8
SHA14b1e5788272c41732b75677bbe9c97a132e8bfec
SHA256e88d20e379f8eec05db27264b143704d876fa6e8fe1512644241f651cb04b4ea
SHA51221727ecfd516659161ad8f50c2a5eb81337ec7fe8546dec3583b80d406ee3eeb1f462c994f079c2ce93aa0a18309eb4f16a126830a61b5c77da3e1be4b68c997
-
C:\Program Files\Common Files\microsoft shared\ClickToRun\IntegratedOffice.exeFilesize
4.6MB
MD55542a8061b61a244bf4d466a192bd462
SHA1f5a0971a605bba0a788a59e752cbcef5ae33a9ae
SHA2565e650272ecf5f09ba19bc3edad5ba24508a076e8ebdee2df903a68508c2b1acb
SHA51257558042ecd3dc648af1445b5c058b345defb4f4e02e22ae5cefe03be58c053d4f8ebe9bd890b4c4fae21c3000a7cf5143ea0d8a17c54fc6fd9d2e596f5a7309
-
C:\Program Files\Common Files\microsoft shared\ClickToRun\MavInject32.exeFilesize
910KB
MD510de1cae9114f247df60b027c5ee567b
SHA15dbb9577756f7edda4c90169b91b13d4e1c4e269
SHA2569b2d3dc7013b41ce67902a111f2fd289e3d4dc830efdbf80765a711d115f0049
SHA5124bd1dfae637f874d3ea3be2fa42aa2df64e298fde8c6ec7bf2ab2a3da9641f173cb1b17e89e1dde237b08c25ccd9e90575ad4a7c223d5f88d1a38eb602b4bf44
-
C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeC2RClient.exeFilesize
24.0MB
MD5c6eb35031ecc3ac7ed5358617104e2ab
SHA1d7a47ec149ee291a54936ab3cf5ccc47c68b6191
SHA256cecdfa8fbd8ceb2bcf34e496f280e76393bf069e2f24776e092f193bdef54af0
SHA5125ee1eb1ed380058dc895a8a4144be2e1936957c429aeb9c44f1176dea56c1a42a9cd6f03b5ec8f369e049bc3f826d177b8d357beaf0814f2528c7b80e6992fdf
-
C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exeFilesize
2.7MB
MD5d623ac64c3e5fbc7f0c3127b3a438d53
SHA115dbface9feb0831b3e1f3d186a0f2dce121d44b
SHA25624f5fb9a486ca31d24e67bc8e789c4d36aa18efe8c8384ebebc65d2cd5d7bf8a
SHA512323e176be64a61adbed0b684ee7cd290a7a53ea556512f9ea5bf6ef86aeb4dbf4db5230e7b9abc818cef5d663af709f9ac2b1214f19311d50b9e447102bebe8e
-
C:\Program Files\Common Files\microsoft shared\OFFICE16\LICLUA.EXEFilesize
1.1MB
MD5efe66617cc1ad3e1d8e7e3117a0fbf74
SHA1a45a91fbcd1b1157b2770737ce42e963c042a82f
SHA256990cf605c57b266e2ff9955e742c4fb732c5c2002fdc6e3c05c01d537820bb4c
SHA5123ea46f8a04f2524332b4c54b5d72ff8b20b0d1bab32de5c2b1b65ad5d6cad09836ee416e3cdc10c819c862835367ab7769dffa07cc3a96220ec311e5d9f28a87
-
C:\Program Files\Common Files\microsoft shared\Source Engine\OSE.EXEFilesize
805KB
MD53ef2bcb16ea8a604d1d2875c25e00993
SHA1e46afcf63ec9612f0f5c533e83d835ec6ec96644
SHA256d970e90c6aa32e5f85295f502567957292069b2559cdf9d721164ea29790dc70
SHA51244802de5906ab10510a84a7dd4e27aaf6bc935a4df34298ef78b38718898586bcee1e5c32a4f43e3888d45fdb8f730ef382a51dce19852cc6fa2185e17388993
-
C:\Program Files\Common Files\microsoft shared\VSTO\10.0\VSTOInstaller.exeFilesize
656KB
MD5571807763237715209ac432d0d9cb511
SHA1df1e37f67fc755438129196c8d880668ed2676e8
SHA256a640fb7a65e57e0a438e5c52914730f950b4c1558a9ddc687dc0531ebdf7c6de
SHA512bb3675ee20286ba7581eaeb37e38840b230d82d3e2f52d9fbd84c436d78b9b66fbca8b22eb30446bae98055244e89254011b397d12d305eeef173d1333cfd781
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\Installer\chrmstp.exeFilesize
5.4MB
MD5a55fbb076daeadf91b51168121d913a8
SHA109c09e863cd2bd5b6eaad849413c1ebbdc809f08
SHA256d9c063cf09de4bdc46f69bb504eecac32f49ba5d51644800b3644d03a9c4c2b6
SHA512f04155c988ee653f788a8c55b598b00c331b32101973b617c9b694570751cba260c1915f0b3cdefcb88d657ee9fe8338b95b4d28d4cb51b50e639ea65a5eea53
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\Installer\setup.exeFilesize
5.4MB
MD5c97f6a7d1ea51b1012318a87e20147e5
SHA1b8147831c240e3fab8082b82e186014a4b2d624a
SHA2561b5a62750b98c304f3dc76e9b4044b92490087940545a3fb74b03a0f3f5bc20d
SHA5126a87641339088fbeccd33f8a588cf3a3dfeb5f9885a511c957a5959648a4de52494043b7576038dc7791d485a94492bb18c9989735c875b8e36817dc73c23172
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\chrome_pwa_launcher.exeFilesize
2.0MB
MD5184add6a963753dbeaf646d58eb43cba
SHA104e73456a7de204e26b14dc0792559c20fbd0276
SHA2569ae59c22992cd37c503a6f538b2dd2f383791e59b01719fc1f8a98773b3b4600
SHA51259be91813afa61967ce837387571f5d84e547a386d11953fdb070db0e98963ba4295cc5db901b0149627a3ded1adb2cc44d11855fffc66b089dde7598f2c20b5
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exeFilesize
2.2MB
MD57785f83e0b2529e45a2051a54c8cb7b1
SHA1edbd4e45ce7e8dc62f803eb910734037ab60ee91
SHA256204cf2ae2814554c9d34db3b3a3eba36495732d468a60ea50173170caedaf786
SHA512e13845fdc66ecfd52e85ba4671f6d28e0f1c1733d679c3efb84e0b2e3a4f5c9723efd0c00f9497db0aa173de4d8c7197f50af0e6effba440bf83c6e682c76a95
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\notification_helper.exeFilesize
1.8MB
MD5ac083d68e08cd887dda3e6cb4b3439c3
SHA115e2505c395763ec59f0c3cc75c7cf34c9eee0de
SHA256187448bccc9c1159c17aaec0cbdf15b8ec96d6648cb476c97d999a3176790659
SHA51255054e9c90c4bd8debe513ec07d003abb05c1a5fb0a3cd5c375f5c2537ee4fcf694b315010e2bb9d816d62b3acd14d6a466971ae694dae1e460574517ad5dd29
-
C:\Program Files\Google\Chrome\Application\chrome_proxy.exeFilesize
1.7MB
MD5f8fda224ba27dccb284c48bf35ac0d2a
SHA1c6818595b8a8cb8c615b6a68278c3412e9c63def
SHA256b35c809caea830d2e7e029d12ca6d8cdf31135130a45e43f1848d672326570b9
SHA512b91ba49b57166fc69bb59abb861ec9418761e9725ab66cba8a3badd3301f2dd02f361e1e6049c0c20f786ea172b210d01c12fdd180879088ce8aad742ed41fa4
-
C:\Program Files\Java\jdk-1.8\bin\appletviewer.exeFilesize
581KB
MD5c5dda4fa61fdcad72b82a1ba838bef32
SHA166efc466ba03936d121296dc94f64df61dd8f479
SHA25624194fe179edc05e0eea927be089d915b045b3f039f92f72edfba220c89639f3
SHA512c9ebcc417ef15220dd9534d8eec9df476d64c942c8af3fbff506d296bf47fbbd7e2e7d0b8baa171532f812ca608ba336228f84b2a9dbf01099a6f1e8eae1039c
-
C:\Program Files\Java\jdk-1.8\bin\extcheck.exeFilesize
581KB
MD533e8a1619f06be85d045e8b8c0bff96a
SHA1c550a05da45ac78d35c0d50980759460a889582e
SHA256003d097c6666f1d421bda6c7cc3847f568c79e71404a4a43923450ee88cc02f6
SHA5128cac0f2769bb1b948b4ca8627e8c998283edd044c4c5f0784db9e9817ed3beec5599aefb7458dea2c4d3d3e9b6ae4a4ef39cd0a6aa21c011a4c62877a71a55eb
-
C:\Program Files\Java\jdk-1.8\bin\idlj.exeFilesize
581KB
MD55e88decdec16c43b657442e81feec392
SHA1594af295a696173561e5fe608b819966b4e12b78
SHA2563e691bf6dbd28c62da4a57af060ac30c7165123537bc590da226ab314b30702d
SHA512f534659b5388590f7dcfd1c0ef4203bda1b500492177aa7252ad89f4e46279a36e428842cb171da733024c9910f726d40cfd56e1820642cadea54048097e3dee
-
C:\Program Files\Java\jdk-1.8\bin\jabswitch.exeFilesize
601KB
MD5b1a650ee9c40ffbbd6da72eea9af27ec
SHA1a9e968ea9d113f1e7f11646342bf4772f7e95483
SHA256cf97c5af642bfc29ae1cb77cc557faf390c781b446c103cff4604d37f9d1f7b4
SHA5120c99f4f1a31facc87078f8fea6c60ffac5f6002af1bedc9124b850a1bf1960f78d9e48a485d13ceec5ecf76a66b9486ee75074a5f937b14f2a5ab3efd5e789c8
-
C:\Program Files\Java\jdk-1.8\bin\jar.exeFilesize
581KB
MD50ae1fbf34b3eee233aab945a35160a37
SHA1be4ac8cfedb460389ea1ae519b2dc20034c5113e
SHA256850afde08361b7721b8c18bed4a69fde14b98a44493f94cb90c21cd4500fe5e8
SHA5125cd67cc929c24cd14e9a22ab426a6dbe20c52b208ab6825df6e6879a04ebd4a200ebe3545c8fe1f04613dc15a6225d050568384e21de29526993f088ce0ef677
-
C:\Program Files\Java\jdk-1.8\bin\jarsigner.exeFilesize
581KB
MD5339703eaed098fbd4d0b120514c66121
SHA1f45b28fc562492b5b27cb50b4a79a08a032b2c45
SHA25655f841f08c893dc45b299fd2ae9f5fe761a4ffdbf841b6dfa257e3d1b0e698b7
SHA512522d6ab98c5d029577eb537ed245a087102b65ed17cd3fa415b47e0ce0cd0f0dd325bba004d5748ae282153cba24d8c73bbf43d25dda448b197b0f2ad3d5a986
-
C:\Program Files\Java\jdk-1.8\bin\java-rmi.exeFilesize
581KB
MD5cdef35b79f025d6fd3c048743969811d
SHA18b1dde57e64854f5e6af62dc0b054040d7412eda
SHA2569dda70fcdbd312319d1091039c2a5749990495b70c60c572205c5cd8cbed548f
SHA512c98c3d0e06b1665e6e904abd176bdcca20763a99343121e68290bbec4250f7ae8fc1d6f6d842f13e29b195c84699e4b8cfef71aa530f7ca660d33d24aa6be997
-
C:\Program Files\Java\jdk-1.8\bin\java.exeFilesize
841KB
MD54f4f3c775a1c7a14f92aab029535283c
SHA1aeaccd11579bc2f08adea1f000a0f7f60e5c5e79
SHA256b2eea3f0280b8a731139bd8f14da01de2374401300e64428be680b812b8393f2
SHA512a39328c37801b20c6e6024366273e3250327aa8b2cd2d0a1c7f53d161d80f4cc268ff2585a9aa5589969389ebe3b2a93a854332ddab5a60d2a2a068a225c3abf
-
C:\Program Files\Java\jdk-1.8\bin\javac.exeFilesize
581KB
MD5a6f587b2768985fcf50963829d4ddb27
SHA18c3b04e7f71797b4c6cdf07a207c467aa2a202ac
SHA256105c2ed725d69ea4260220a9be1c4da643717c2cfa8e95cafb89791651d067dd
SHA512d2f5540d6dfbed526d74a6df82729b273adc5b93cd14827ffbf66598b5a49b1497802cbdaf816ed57197e87f639904c6760548017c0ded650174f347f851cc41
-
C:\Program Files\Java\jdk-1.8\bin\javadoc.exeFilesize
581KB
MD5d01294fbc92a0be7fc0b5dc4fa589a03
SHA166d31e743cf31580459dacc706c060994def08d0
SHA256d4ebf0e0b5a6f6920233d551fa6f1ee5e5d72d9bca2807d4f719a5bf6742a207
SHA512455bd9b00dc634a3e9c6ae605961db1d0b2cbd040a6fde945c43e3249cde1d10dd426ea1c61af6431b1c88b194301bcc3276f86894bffdc213bbba40fbc864ce
-
C:\Program Files\Java\jdk-1.8\bin\javafxpackager.exeFilesize
717KB
MD546cb6bbd3e55a1e4fa28784dc512d40d
SHA13a2e03f1bf516af5e2df203f32e105d665766ec9
SHA25695284d6ba45bb416f017ea8960adbb3aa8f5cb9252ad67a354f9db48af9e5355
SHA512c583d443d10a87b041a63442f122088f276b9dae49e4cd169c8734e3ba938776697ef0e96781380bb9d6f63037e467dc015a079dd03cb9058424b945325c05dc
-
C:\Program Files\Java\jdk-1.8\bin\javah.exeFilesize
581KB
MD5c70fb8bb794e2f699ba87b70aa43d17c
SHA1431c5d78572e7e3c746e46616330079001009898
SHA256f11d7d6971506750f58dce237d2971653d6d70b39843d877659f1a38b3f7152b
SHA512a91e9342bc591d4fb2d004a50e87b2c1e6c7bfedc2ff576fd58d8bbb083803aa8e29bd9fab226c3e946e8664428298f0dc4bf8841fc6220e483557a32999c6aa
-
C:\Program Files\Java\jdk-1.8\bin\javap.exeFilesize
581KB
MD58d31dcb7bc6eb38749fdff92b298b330
SHA11df88c4769f4b6dcbdfc9d9df28a10ed3ab86b88
SHA256346c6b5d9a156e2c2141e123d197e1378f7af0ee676b6dce4952e497390d09f2
SHA512e9045a4ca58f2e08e4555bd97644e2c60cf0d369cf3ca59e7221b794406caabae80c751d0ef41981928a5aa9bd14b929982b42a4c269ab786c94de04ef5331a2
-
C:\Program Files\Java\jdk-1.8\bin\javapackager.exeFilesize
717KB
MD5d7feff6f10808c31a1bc85052a9aee82
SHA1734e4354ec5a60be032b43660fada29e7d18d4a3
SHA2567c3c75ebdc8c8edadd8bc1603f3bf9931c9b686641f6d2e587516fd23b5d2532
SHA5128e36601ce8273b13531e5306be7485de83dc3039567c06e773309d1c706ba10eaba87d8c9d2a2765d6b7fe275161356b66fe90cb87c3d8e0e3d4dfdf6a3318f6
-
C:\Program Files\Java\jdk-1.8\bin\javaw.exeFilesize
841KB
MD5ef57a1ab593aaa4c1b679d63e5c33b5e
SHA1828eb55203d7c3542e9ac762d9341b201312dc0c
SHA256bdd3404509f2db50b046ecddbd840d054dbd6a6c72ab7e68865ac6b3acbbc54d
SHA51283c4cc6d092baee2aaab69b454b6905168d6ef2d4e39fc6b97cee9277250fd238387da9c53209ef6d95143858ccd7427b0a64f4e517591b3d17dfc01d93e43da
-
C:\Program Files\Java\jdk-1.8\bin\javaws.exeFilesize
1020KB
MD5bb3adb84134c1b9a5f2ef0c28c602bdb
SHA1133752645228cd721768a7e2773e3f1fe7a8f4c7
SHA2561100e94f3b5c10ddd0ed4fbe84c6c2d3d6b14ca22a68bd17fc9ccfc2daa6705b
SHA512918cdd6e7d2359c1753b9955d243ed2d3f6a210fee3edc88d190d6421dd766a8f1cb58cddec8ff3ad7a150bdd0ecf710bc362822eb22ca5053e3516ecf9e00a4
-
C:\Program Files\Java\jdk-1.8\bin\jcmd.exeFilesize
581KB
MD5a6e3337b6358c661d527680ccf345f3d
SHA10aa5e7acaca65e4cddeee15164355145b8c97666
SHA256a2316fff182f77e906f401283510fa821d7cf33afbc5f7851b586fdb0e98ce62
SHA5127f0dfdb7065b0ae548230f835fbd2133f9608f5090fa76bab499a9191a565f36b8745307d349daca921f4aa0010b22424034e5ca4e1919f96052a3858abb7988
-
C:\Program Files\Windows Media Player\wmpnetwk.exeFilesize
1.5MB
MD51016619b17d92d5b2a22cab4d44759f5
SHA1f61d13f0bb362b6a1d88111f3cd2aa99b3b3eaee
SHA256b52748217fdb753a2038487806d80bf1d69f1e7174f895e75bbb99a6e05c9311
SHA5126ed5d9be6e22da69c0b297707973a34473613fde2509520a8826ae6e7874cf1f94b7e5afd9d92775af82b950cd5889bc793bb41944658f0aaa03b0e65bdfb373
-
C:\Program Files\dotnet\dotnet.exeFilesize
701KB
MD56bda9b60c938fb125c3863367b54e38a
SHA1d23e62932ac65b12bfb07c3685930ef47eebf55d
SHA256610b3738f22014fb76a5f491816d4211fafe1ac3dfca14b6781ffe0b853d0480
SHA51236926fb68e74c3396e796f1cbd3683ad08cb0af1054f40a83a20fee81289c7cc4892d3fe530eb47a3e95a4b0d55f70807a312e8dde67a37230e87252e87eb464
-
C:\Windows\SysWOW64\perfhost.exeFilesize
588KB
MD5ce4b5099f3bc732a17d0b7f67dd3fae8
SHA1ae35d56a25f82f264d5797d613e79baeb2ac84af
SHA2569f7dd142a467601a0d14c6d16af5250616e40f2276cb2f720cf19e4a195d7a88
SHA5121aab7457dec8f6d0a01e17ee6fb494b6db2b81220dddc953b60236b692bbc34f257e2cba0858e80807651e47e53eaeb91cf96b8306c5f4a4c8d63a457dba817e
-
C:\Windows\System32\AgentService.exeFilesize
1.7MB
MD5f924505f944b3a8ad47fe211205cd878
SHA1e5e7d6e2fa936f0057c1e853a28b908117a2577b
SHA256bae8b2fbf0b0878247370886592298d2cec8853cc7071c87ec33e4c9443b4f32
SHA5126bf9e3d5f6e94debf959dee22f64cca1348e8fe29955af2f1600f4dd4aef5cdcb9dd10b19ee07878feb5eb1db7119935a4a3198e912b797d2ed69e46fba825d5
-
C:\Windows\System32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exeFilesize
659KB
MD5c288814c2a63f2d14c255b804ce8bf44
SHA1a814f151ae9942cc045b93b31a69c5d6b9244fbd
SHA2568dde56287096794c06eb0ec04e420b970e23bdb3307f194c1d09620dae9f84c1
SHA512b040f234500f35ebd719db8d865ae08a2b59da9eb4110117effc0a2a82436f6218d88848291d12602ef73b1303f27ea5ed5b446e93c8328de059818978c4ac8d
-
C:\Windows\System32\FXSSVC.exeFilesize
1.2MB
MD5f91d3d296cea7919574ba78f65654a4c
SHA1690b7ba0701ba82fca2d441c225d8b27feb11293
SHA256ba96c96ff0e801ef019719c49859d41fb449e82f86107ce65123ed4865d43673
SHA512dcc03f2640f80fc238b18c018865c6c4f1680348d28c383dac98a51c1151a15f878035d792c2f72d752c8ed23ab2d4bf8813f79bf2fb86fbc2a2eb2707fd7cad
-
C:\Windows\System32\Locator.exeFilesize
578KB
MD5bc0c5d0d57dcb18fbc92e426895b8b03
SHA1927a559f475490487c691233c4a845930c852a11
SHA25642b06b541d6cb975a8ac8b70c24ce58c076b98ed69d5f6492f6929dcecdbd17e
SHA512dfa25b6e6cfccd13cedc3544f4e53ec26f396f4036136adf80c441aacbc36dfa80d2cab8298fa322b4ff30fcc5fff69423a83f222ebca6c2663af3a1914f143f
-
C:\Windows\System32\OpenSSH\ssh-agent.exeFilesize
940KB
MD5a15cb9693b2c85f441e4c25b2be88b3c
SHA198db5e0a348252fd88fe743bfb7c76e6ff9d4894
SHA2569d7e2f39026f2406d70efbf137d3ef0febb3549316b741b7c38a2b4b5e33d0e1
SHA51286103320297483bc973aa807f789f088283f9fee98eed41378ef71a7c3933ee8fe0121f19a581f5942c5ddbc05fdf7a6353b05afa9fee38f4e41e0963eec3134
-
C:\Windows\System32\PerceptionSimulation\PerceptionSimulationService.exeFilesize
671KB
MD5be6d39963983f2d780a38bbcf2c4857d
SHA1bd5ff9344f636d24b43dd62f7b12ccb1a896b554
SHA25660ae23ee74bbac23051291b95c204c49b5f882dd1496c404d43631875f2e7262
SHA5125370fb198882d6774e02a8498d8c1cc220c75ed5a584cf5217d4a3b1b3665a773dd0f4464b238597946cd0ce4e57cde7002218d90ea9dfcc9b1760326d98af61
-
C:\Windows\System32\SearchIndexer.exeFilesize
1.4MB
MD53d906526fd88628124607c624aeaee90
SHA1f61f6b5bdcc9ea0a92825283a0f9fa46cbd80079
SHA256e614434050096b6ca46367a7bd998496ab8c120c690fc615cb126e3820743485
SHA5126321ef50307f7dd12001297f1d545d94c7644890cc05c36cd9f989012b32f07b6b00dea6c36f69625d2f9681a7d7c51a3efbce6cee12af6d147174c4e326cd52
-
C:\Windows\System32\SensorDataService.exeFilesize
1.8MB
MD5b087a46be3a25a7d352c3ca02b9bcd2d
SHA10f15b58e4eab246694e0d2bd1f994593b8340e08
SHA256061fc9214f330a1fd0ce88ffb6f6ab688936b0077929ad2258a8383480fc70c8
SHA51294c5ee4eda416ffaef9a0a4ca9dca6da501b37eeafb7e922414aed9a76313bb92e8eb097286931365218268b96a50fa722405919ce60188785219de25e607202
-
C:\Windows\System32\Spectrum.exeFilesize
1.4MB
MD526a9479aad33550a9447523576cd5b7c
SHA14624705f85228ca2d78ee3d17e3fcd3fe87ad45f
SHA2563b5d93ebe1c5a06253bc07a35adaaff7123561b77ae76ea51c9989e0b1a4421c
SHA512fac16f543a4bdbd0fe1e01bf0d7a7e37035683322f4b10050843ff83caffc99e91ee2d10616ff13414c80898639b02065e9939cd335c327bebe3532cfdfdfe00
-
C:\Windows\System32\TieringEngineService.exeFilesize
885KB
MD5f436307d1ab1b0c1dafb2c47b76e86e5
SHA1f5ecebd0ab3158e146029f7a202e66c9f431e4ed
SHA256af43f3260159f1b2048df3dcc545ba740c734341a18dddd0cc8d91d4316186fd
SHA512599b1f07bdee7e73fafecda120efb6fef009096554a4c6698baa89f9ad3fef75121d53fd993ede46833e279cf8960f572b52168fde5b3591198e76101197c76f
-
C:\Windows\System32\VSSVC.exeFilesize
2.0MB
MD52d8708ebe3b354ff390cc649d03ad12f
SHA15a830dfcb226501a0feba1104b95c3e73f3a75a6
SHA256a9d0c837b61122643ff9c27cad4addf48a7f2f10e3377fa66808858d0b3c4eb6
SHA51269b2489fd2161053807e197624cb224eeb85dcafbdf96c2ae95225d52d57434ead078522a4fc378264a732a47aeedb059ed84673ad6e8451b216665cd7623f3a
-
C:\Windows\System32\alg.exeFilesize
661KB
MD55f47c1f01e36f7708798120b9c1746f3
SHA1937acf4b4bd78f0900039292c7f0a38df6d1bd10
SHA2569fb337e95a39cf7a3660aecd5d07a00253a55fcb30cb27db53970ff862eab028
SHA512252ca5305d838a24017e617919a62705e1a6ca75e67e687214b3919a0596227971d1c842412bc4df79488e1f08d926bd46f7835b9745567441233166705b5bd4
-
C:\Windows\System32\msdtc.exeFilesize
712KB
MD55bb5daf38a251cc9d252a6e86c181f9e
SHA14d8d1b8dc62f144204c26648cd504890ce13fe55
SHA2561e3cbb615c093b94bcf3d214fcaa0ccb65ce7c1f6a03600b229ef7e4dee84091
SHA512ce1bc2c8ff31f28b5bdd241e54d2cf4f47ac4e7676c35d4f5d7d6c032f4da011cac3ebbcc4c7b6340a6b7f57224cfe36100f6505958b0386c42d0348b6847a1c
-
C:\Windows\System32\snmptrap.exeFilesize
584KB
MD57c2506ccc62ecb3c469044ae27a10872
SHA13530c6c51bdb1dc2e239d501d854096ac74cb27d
SHA256db32217eb06eca67a1f4b896ceb9a7c9519256e747601bd2a9f8e18868046e67
SHA512a8ac885da6044a03ec5650e9b0be2e282eaaa74a23bbc59a9df86981278f46ec46b80f47844a4cc701186ee9926ac77d1734379a93ca29517d2f3281bf67cc77
-
C:\Windows\System32\vds.exeFilesize
1.3MB
MD5c6cbe00b0226bb3d4899e1e488677cc2
SHA1ed02a0339c8d9c7bc2113921d33da3ed07d4dd47
SHA2563dedeb35212296cebd3da191a1dc78cc1349200d34846918ba744c33f5becf9d
SHA512fbef2b2000f2538e0077a7da4e85e3929dccbd81d478bd95afd6af8a888e88f96f720adaf0bb9955b8e5637b82f7b7a9089e679007a4d0bea0ffcceae1b17b26
-
C:\Windows\System32\wbem\WmiApSrv.exeFilesize
772KB
MD52ae8e9b0c3cb3260947e43fcb2f3ca5e
SHA14837396970936de65a4b62cbc53f855d406f9fbe
SHA256767167fad72b9a30a3e62107ac169c130afd8285a2d074f152f49d85cf0cb3e6
SHA512afdf5134dc4711d32ed75811243e447b03e19e9e4fbdafc4304b4330d2e1bb6c5b8a78612865c9306bfdc11d5c75bc5ed35dc8f39e8efc1b57a791ad97a4467a
-
C:\Windows\System32\wbengine.exeFilesize
2.1MB
MD5db4fa61db41f8d8883fc72d62d16fa25
SHA124d80e44d7a0b24cbb64c9619297ffc822e3f7dc
SHA25617829e17ae38973796b9399d053852e2a9e8e36d03c4fcb194f86768c195c698
SHA5126bc948619b84b72607cae8550c7e5843b2cf6aee47d751d131a4c33d5f325445783b49677cbc4c4ae65d5e2a9742c35c1a60b200fb94555294b7c83996c7ee37
-
C:\Windows\system32\AppVClient.exeFilesize
1.3MB
MD50ec49a98b7dc16a34431e095dc4d9799
SHA1cbcab5fa404e72decd0f0f37e785ed32d37d2c42
SHA256f080926a8295a0e77fd50b805bb3c41a153f84de6afb57bc23f4cde5eb425b68
SHA5124eb53556b4a98d425b0ea971fa1fd6ebaa9b91579a717ee64c77945fa1a0b8de11be523400b30daa31d141e886de13e2bb59a1d164a77e6012b81bd53bdfbaf2
-
C:\Windows\system32\SgrmBroker.exeFilesize
877KB
MD5032696f35c407382142b70556694da8a
SHA1747ae5f4130ea5a1a42d3a0e58c761264f50aeda
SHA25619e28267c042d4457bf6746189256491e8210f41660e752e74b0f0c8b2a0e62b
SHA512cdc928819b25512602c53953ad6af203d41ab50f4d34c2b0e2131560e7cbf5c3d858782bffc8859b1938d9f59dc499a1daf4ea369787a03a0f846b3ee774ae09
-
C:\Windows\system32\msiexec.exeFilesize
635KB
MD5db1549179714c26b7b243e41b9217f67
SHA1a3a3e7fa6073897282fc12fb1dab70483843c43a
SHA2562add39cd08f570025728d8070981cdc6e28fe02ad871278c52975f927c7e6d9c
SHA512e7d3fc37654119df4ea92ab76c9e0a957bd9a09287bf467d5b6bd756cc435b45d03f2bb97d0c566b653eb740dc8cf193b5caefa6b5841568fe919fe4596d5b40
-
memory/32-222-0x0000000140000000-0x00000001400CF000-memory.dmpFilesize
828KB
-
memory/32-113-0x0000000140000000-0x00000001400CF000-memory.dmpFilesize
828KB
-
memory/64-551-0x0000000140000000-0x0000000140169000-memory.dmpFilesize
1.4MB
-
memory/64-167-0x0000000140000000-0x0000000140169000-memory.dmpFilesize
1.4MB
-
memory/432-143-0x0000000140000000-0x00000001401D7000-memory.dmpFilesize
1.8MB
-
memory/432-619-0x0000000140000000-0x00000001401D7000-memory.dmpFilesize
1.8MB
-
memory/432-270-0x0000000140000000-0x00000001401D7000-memory.dmpFilesize
1.8MB
-
memory/684-51-0x0000000140000000-0x000000014024B000-memory.dmpFilesize
2.3MB
-
memory/684-56-0x0000000000D80000-0x0000000000DE0000-memory.dmpFilesize
384KB
-
memory/684-166-0x0000000140000000-0x000000014024B000-memory.dmpFilesize
2.3MB
-
memory/684-49-0x0000000000D80000-0x0000000000DE0000-memory.dmpFilesize
384KB
-
memory/876-452-0x0000000140000000-0x0000000140096000-memory.dmpFilesize
600KB
-
memory/876-155-0x0000000140000000-0x0000000140096000-memory.dmpFilesize
600KB
-
memory/1312-0-0x0000000010000000-0x00000000100A7000-memory.dmpFilesize
668KB
-
memory/1312-98-0x0000000010000000-0x00000000100A7000-memory.dmpFilesize
668KB
-
memory/1312-2-0x00000000021E0000-0x0000000002240000-memory.dmpFilesize
384KB
-
memory/1312-9-0x00000000021E0000-0x0000000002240000-memory.dmpFilesize
384KB
-
memory/1312-513-0x00000000021E0000-0x0000000002240000-memory.dmpFilesize
384KB
-
memory/1312-510-0x0000000010000000-0x00000000100A7000-memory.dmpFilesize
668KB
-
memory/1352-116-0x0000000140000000-0x00000001400AA000-memory.dmpFilesize
680KB
-
memory/1352-13-0x00000000006F0000-0x0000000000750000-memory.dmpFilesize
384KB
-
memory/1352-21-0x0000000140000000-0x00000001400AA000-memory.dmpFilesize
680KB
-
memory/1352-22-0x00000000006F0000-0x0000000000750000-memory.dmpFilesize
384KB
-
memory/1524-197-0x0000000140000000-0x00000001400E2000-memory.dmpFilesize
904KB
-
memory/1524-620-0x0000000140000000-0x00000001400E2000-memory.dmpFilesize
904KB
-
memory/1832-117-0x0000000140000000-0x00000001400AB000-memory.dmpFilesize
684KB
-
memory/1832-228-0x0000000140000000-0x00000001400AB000-memory.dmpFilesize
684KB
-
memory/1912-215-0x0000000140000000-0x00000001401C0000-memory.dmpFilesize
1.8MB
-
memory/1912-210-0x0000000140000000-0x00000001401C0000-memory.dmpFilesize
1.8MB
-
memory/2624-251-0x0000000140000000-0x0000000140095000-memory.dmpFilesize
596KB
-
memory/2624-140-0x0000000140000000-0x0000000140095000-memory.dmpFilesize
596KB
-
memory/2960-38-0x0000000140000000-0x0000000140135000-memory.dmpFilesize
1.2MB
-
memory/2960-39-0x0000000000EF0000-0x0000000000F50000-memory.dmpFilesize
384KB
-
memory/2960-45-0x0000000000EF0000-0x0000000000F50000-memory.dmpFilesize
384KB
-
memory/2960-61-0x0000000140000000-0x0000000140135000-memory.dmpFilesize
1.2MB
-
memory/2960-59-0x0000000000EF0000-0x0000000000F50000-memory.dmpFilesize
384KB
-
memory/3128-130-0x0000000000400000-0x0000000000497000-memory.dmpFilesize
604KB
-
memory/3356-616-0x0000000140000000-0x0000000140102000-memory.dmpFilesize
1.0MB
-
memory/3356-180-0x0000000140000000-0x0000000140102000-memory.dmpFilesize
1.0MB
-
memory/3472-63-0x00000000001A0000-0x0000000000200000-memory.dmpFilesize
384KB
-
memory/3472-70-0x00000000001A0000-0x0000000000200000-memory.dmpFilesize
384KB
-
memory/3472-179-0x0000000140000000-0x000000014022B000-memory.dmpFilesize
2.2MB
-
memory/3472-71-0x0000000140000000-0x000000014022B000-memory.dmpFilesize
2.2MB
-
memory/4024-80-0x00000000016D0000-0x0000000001730000-memory.dmpFilesize
384KB
-
memory/4024-85-0x00000000016D0000-0x0000000001730000-memory.dmpFilesize
384KB
-
memory/4024-87-0x0000000140000000-0x00000001400CF000-memory.dmpFilesize
828KB
-
memory/4024-83-0x0000000140000000-0x00000001400CF000-memory.dmpFilesize
828KB
-
memory/4024-74-0x00000000016D0000-0x0000000001730000-memory.dmpFilesize
384KB
-
memory/4196-27-0x0000000140000000-0x00000001400A9000-memory.dmpFilesize
676KB
-
memory/4196-34-0x00000000004C0000-0x0000000000520000-memory.dmpFilesize
384KB
-
memory/4196-129-0x0000000140000000-0x00000001400A9000-memory.dmpFilesize
676KB
-
memory/4196-28-0x00000000004C0000-0x0000000000520000-memory.dmpFilesize
384KB
-
memory/4344-229-0x0000000140000000-0x00000001401FC000-memory.dmpFilesize
2.0MB
-
memory/4344-622-0x0000000140000000-0x00000001401FC000-memory.dmpFilesize
2.0MB
-
memory/4452-240-0x0000000140000000-0x0000000140216000-memory.dmpFilesize
2.1MB
-
memory/4452-625-0x0000000140000000-0x0000000140216000-memory.dmpFilesize
2.1MB
-
memory/4576-621-0x0000000140000000-0x0000000140147000-memory.dmpFilesize
1.3MB
-
memory/4576-225-0x0000000140000000-0x0000000140147000-memory.dmpFilesize
1.3MB
-
memory/4936-260-0x0000000140000000-0x00000001400C6000-memory.dmpFilesize
792KB
-
memory/4936-626-0x0000000140000000-0x00000001400C6000-memory.dmpFilesize
792KB
-
memory/4960-99-0x0000000140000000-0x00000001400B9000-memory.dmpFilesize
740KB
-
memory/4960-89-0x0000000000720000-0x0000000000780000-memory.dmpFilesize
384KB
-
memory/4988-273-0x0000000140000000-0x0000000140179000-memory.dmpFilesize
1.5MB
-
memory/4988-627-0x0000000140000000-0x0000000140179000-memory.dmpFilesize
1.5MB