Analysis
-
max time kernel
145s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
01-07-2024 05:00
Static task
static1
Behavioral task
behavioral1
Sample
372fe1262c0b32aeb9ae38aed4493c34192af277ed8508f4c3af65051f0d3c94_NeikiAnalytics.exe
Resource
win7-20240419-en
General
-
Target
372fe1262c0b32aeb9ae38aed4493c34192af277ed8508f4c3af65051f0d3c94_NeikiAnalytics.exe
-
Size
1.1MB
-
MD5
0f005e8816b7e6df233d5f9d4e4ae700
-
SHA1
7774a4687f25d9c82510a735c9420480d981ba7e
-
SHA256
372fe1262c0b32aeb9ae38aed4493c34192af277ed8508f4c3af65051f0d3c94
-
SHA512
82cb173a5c2b70f1cf26ca0ab4388a44c4d52b6360fd7d5342c8d06638fa23ae0d7bfe9db728022028baf2a7c3647c2e5cae580bfcd9f9b0882708f238cc883f
-
SSDEEP
24576:9wyjcbxnxofN2w47maVe6FPiFrFjWHRlMugdD+JsRgZRJ4fM430Eg6nET7M/IiN:9wSQxnxc27KFiPM8xlMPdlR8v4UC0Egv
Malware Config
Signatures
-
Executes dropped EXE 22 IoCs
Processes:
alg.exeDiagnosticsHub.StandardCollector.Service.exefxssvc.exeelevation_service.exeelevation_service.exemaintenanceservice.exemsdtc.exeOSE.EXEPerceptionSimulationService.exeperfhost.exelocator.exeSensorDataService.exesnmptrap.exespectrum.exessh-agent.exeTieringEngineService.exeAgentService.exevds.exevssvc.exewbengine.exeWmiApSrv.exeSearchIndexer.exepid process 4696 alg.exe 5016 DiagnosticsHub.StandardCollector.Service.exe 4144 fxssvc.exe 4112 elevation_service.exe 3080 elevation_service.exe 2252 maintenanceservice.exe 2388 msdtc.exe 1492 OSE.EXE 4140 PerceptionSimulationService.exe 2072 perfhost.exe 4456 locator.exe 468 SensorDataService.exe 1316 snmptrap.exe 4132 spectrum.exe 4708 ssh-agent.exe 3764 TieringEngineService.exe 3404 AgentService.exe 1392 vds.exe 3824 vssvc.exe 1328 wbengine.exe 2640 WmiApSrv.exe 2440 SearchIndexer.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in System32 directory 37 IoCs
Processes:
372fe1262c0b32aeb9ae38aed4493c34192af277ed8508f4c3af65051f0d3c94_NeikiAnalytics.exealg.exeDiagnosticsHub.StandardCollector.Service.exemsdtc.exedescription ioc process File opened for modification C:\Windows\system32\AppVClient.exe 372fe1262c0b32aeb9ae38aed4493c34192af277ed8508f4c3af65051f0d3c94_NeikiAnalytics.exe File opened for modification C:\Windows\system32\dllhost.exe 372fe1262c0b32aeb9ae38aed4493c34192af277ed8508f4c3af65051f0d3c94_NeikiAnalytics.exe File opened for modification C:\Windows\system32\fxssvc.exe 372fe1262c0b32aeb9ae38aed4493c34192af277ed8508f4c3af65051f0d3c94_NeikiAnalytics.exe File opened for modification C:\Windows\system32\TieringEngineService.exe 372fe1262c0b32aeb9ae38aed4493c34192af277ed8508f4c3af65051f0d3c94_NeikiAnalytics.exe File opened for modification C:\Windows\system32\AgentService.exe 372fe1262c0b32aeb9ae38aed4493c34192af277ed8508f4c3af65051f0d3c94_NeikiAnalytics.exe File opened for modification C:\Windows\System32\vds.exe 372fe1262c0b32aeb9ae38aed4493c34192af277ed8508f4c3af65051f0d3c94_NeikiAnalytics.exe File opened for modification C:\Windows\system32\SearchIndexer.exe 372fe1262c0b32aeb9ae38aed4493c34192af277ed8508f4c3af65051f0d3c94_NeikiAnalytics.exe File opened for modification C:\Windows\system32\SgrmBroker.exe alg.exe File opened for modification C:\Windows\system32\AppVClient.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Windows\system32\fxssvc.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Windows\system32\MSDtc\MSDTC.LOG msdtc.exe File opened for modification C:\Windows\system32\locator.exe 372fe1262c0b32aeb9ae38aed4493c34192af277ed8508f4c3af65051f0d3c94_NeikiAnalytics.exe File opened for modification C:\Windows\System32\snmptrap.exe 372fe1262c0b32aeb9ae38aed4493c34192af277ed8508f4c3af65051f0d3c94_NeikiAnalytics.exe File opened for modification C:\Windows\system32\vssvc.exe 372fe1262c0b32aeb9ae38aed4493c34192af277ed8508f4c3af65051f0d3c94_NeikiAnalytics.exe File opened for modification C:\Windows\system32\fxssvc.exe alg.exe File opened for modification C:\Windows\system32\AgentService.exe alg.exe File opened for modification C:\Windows\System32\alg.exe 372fe1262c0b32aeb9ae38aed4493c34192af277ed8508f4c3af65051f0d3c94_NeikiAnalytics.exe File opened for modification C:\Windows\system32\SgrmBroker.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Roaming\7e12c039c3136770.bin alg.exe File opened for modification C:\Windows\system32\wbengine.exe 372fe1262c0b32aeb9ae38aed4493c34192af277ed8508f4c3af65051f0d3c94_NeikiAnalytics.exe File opened for modification C:\Windows\system32\wbem\WmiApSrv.exe 372fe1262c0b32aeb9ae38aed4493c34192af277ed8508f4c3af65051f0d3c94_NeikiAnalytics.exe File opened for modification C:\Windows\system32\dllhost.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Windows\system32\msiexec.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Windows\system32\AgentService.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe 372fe1262c0b32aeb9ae38aed4493c34192af277ed8508f4c3af65051f0d3c94_NeikiAnalytics.exe File opened for modification C:\Windows\system32\msiexec.exe 372fe1262c0b32aeb9ae38aed4493c34192af277ed8508f4c3af65051f0d3c94_NeikiAnalytics.exe File opened for modification C:\Windows\system32\PerceptionSimulation\PerceptionSimulationService.exe 372fe1262c0b32aeb9ae38aed4493c34192af277ed8508f4c3af65051f0d3c94_NeikiAnalytics.exe File opened for modification C:\Windows\system32\SgrmBroker.exe 372fe1262c0b32aeb9ae38aed4493c34192af277ed8508f4c3af65051f0d3c94_NeikiAnalytics.exe File opened for modification C:\Windows\System32\SensorDataService.exe 372fe1262c0b32aeb9ae38aed4493c34192af277ed8508f4c3af65051f0d3c94_NeikiAnalytics.exe File opened for modification C:\Windows\system32\spectrum.exe 372fe1262c0b32aeb9ae38aed4493c34192af277ed8508f4c3af65051f0d3c94_NeikiAnalytics.exe File opened for modification C:\Windows\system32\msiexec.exe alg.exe File opened for modification C:\Windows\system32\AppVClient.exe alg.exe File opened for modification C:\Windows\System32\msdtc.exe 372fe1262c0b32aeb9ae38aed4493c34192af277ed8508f4c3af65051f0d3c94_NeikiAnalytics.exe File opened for modification C:\Windows\SysWow64\perfhost.exe 372fe1262c0b32aeb9ae38aed4493c34192af277ed8508f4c3af65051f0d3c94_NeikiAnalytics.exe File opened for modification C:\Windows\System32\OpenSSH\ssh-agent.exe 372fe1262c0b32aeb9ae38aed4493c34192af277ed8508f4c3af65051f0d3c94_NeikiAnalytics.exe File opened for modification C:\Windows\system32\dllhost.exe alg.exe File opened for modification C:\Windows\System32\SensorDataService.exe DiagnosticsHub.StandardCollector.Service.exe -
Drops file in Program Files directory 64 IoCs
Processes:
DiagnosticsHub.StandardCollector.Service.exe372fe1262c0b32aeb9ae38aed4493c34192af277ed8508f4c3af65051f0d3c94_NeikiAnalytics.exealg.exedescription ioc process File opened for modification C:\Program Files\Java\jre-1.8\bin\java.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\kinit.exe 372fe1262c0b32aeb9ae38aed4493c34192af277ed8508f4c3af65051f0d3c94_NeikiAnalytics.exe File opened for modification C:\Program Files\Internet Explorer\iexplore.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\klist.exe alg.exe File opened for modification C:\Program Files (x86)\Common Files\Oracle\Java\javapath\javaw.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\rmiregistry.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe 372fe1262c0b32aeb9ae38aed4493c34192af277ed8508f4c3af65051f0d3c94_NeikiAnalytics.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jps.exe alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeC2RClient.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\BlockGroup.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\java.exe 372fe1262c0b32aeb9ae38aed4493c34192af277ed8508f4c3af65051f0d3c94_NeikiAnalytics.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\java-rmi.exe alg.exe File opened for modification C:\Program Files\Mozilla Firefox\crashreporter.exe alg.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\ADelRCP.exe alg.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\arh.exe alg.exe File opened for modification C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_104468\javaws.exe 372fe1262c0b32aeb9ae38aed4493c34192af277ed8508f4c3af65051f0d3c94_NeikiAnalytics.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jarsigner.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\serialver.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\rmid.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\FullTrustNotifier.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\klist.exe 372fe1262c0b32aeb9ae38aed4493c34192af277ed8508f4c3af65051f0d3c94_NeikiAnalytics.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\java.exe 372fe1262c0b32aeb9ae38aed4493c34192af277ed8508f4c3af65051f0d3c94_NeikiAnalytics.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jarsigner.exe alg.exe File opened for modification C:\Program Files\Mozilla Firefox\minidump-analyzer.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\orbd.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\arh.exe 372fe1262c0b32aeb9ae38aed4493c34192af277ed8508f4c3af65051f0d3c94_NeikiAnalytics.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\InspectorOfficeGadget.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\javaws.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\kinit.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jjs.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\javaw.exe 372fe1262c0b32aeb9ae38aed4493c34192af277ed8508f4c3af65051f0d3c94_NeikiAnalytics.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\ktab.exe 372fe1262c0b32aeb9ae38aed4493c34192af277ed8508f4c3af65051f0d3c94_NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\pi_brokers\64BitMAPIBroker.exe alg.exe File opened for modification C:\Program Files\Google\Chrome\Application\110.0.5481.104\Installer\setup.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\rmiregistry.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\java-rmi.exe 372fe1262c0b32aeb9ae38aed4493c34192af277ed8508f4c3af65051f0d3c94_NeikiAnalytics.exe File opened for modification C:\Program Files\Mozilla Firefox\minidump-analyzer.exe 372fe1262c0b32aeb9ae38aed4493c34192af277ed8508f4c3af65051f0d3c94_NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe alg.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\wow_helper.exe alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\VSTO\10.0\VSTOInstaller.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARMHelper.exe alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\InspectorOfficeGadget.exe 372fe1262c0b32aeb9ae38aed4493c34192af277ed8508f4c3af65051f0d3c94_NeikiAnalytics.exe File opened for modification C:\Program Files\dotnet\dotnet.exe 372fe1262c0b32aeb9ae38aed4493c34192af277ed8508f4c3af65051f0d3c94_NeikiAnalytics.exe File opened for modification C:\Program Files\Internet Explorer\ExtExport.exe 372fe1262c0b32aeb9ae38aed4493c34192af277ed8508f4c3af65051f0d3c94_NeikiAnalytics.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\orbd.exe 372fe1262c0b32aeb9ae38aed4493c34192af277ed8508f4c3af65051f0d3c94_NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARM.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\rmid.exe 372fe1262c0b32aeb9ae38aed4493c34192af277ed8508f4c3af65051f0d3c94_NeikiAnalytics.exe File opened for modification C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jstat.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jmap.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\kinit.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javac.exe 372fe1262c0b32aeb9ae38aed4493c34192af277ed8508f4c3af65051f0d3c94_NeikiAnalytics.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\javacpl.exe 372fe1262c0b32aeb9ae38aed4493c34192af277ed8508f4c3af65051f0d3c94_NeikiAnalytics.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe alg.exe File opened for modification C:\Program Files\Mozilla Firefox\plugin-container.exe alg.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\FullTrustNotifier.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\servertool.exe 372fe1262c0b32aeb9ae38aed4493c34192af277ed8508f4c3af65051f0d3c94_NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\jp2launcher.exe 372fe1262c0b32aeb9ae38aed4493c34192af277ed8508f4c3af65051f0d3c94_NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdate.exe 372fe1262c0b32aeb9ae38aed4493c34192af277ed8508f4c3af65051f0d3c94_NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateComRegisterShell64.exe alg.exe -
Drops file in Windows directory 4 IoCs
Processes:
msdtc.exealg.exeDiagnosticsHub.StandardCollector.Service.exe372fe1262c0b32aeb9ae38aed4493c34192af277ed8508f4c3af65051f0d3c94_NeikiAnalytics.exedescription ioc process File opened for modification C:\Windows\DtcInstall.log msdtc.exe File opened for modification C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe alg.exe File opened for modification C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe 372fe1262c0b32aeb9ae38aed4493c34192af277ed8508f4c3af65051f0d3c94_NeikiAnalytics.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 64 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
SensorDataService.exespectrum.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 SensorDataService.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\FriendlyName SensorDataService.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName SensorDataService.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\FriendlyName spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 spectrum.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\FriendlyName spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A spectrum.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\FriendlyName SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A spectrum.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName spectrum.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\FriendlyName SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 SensorDataService.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
TieringEngineService.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz TieringEngineService.exe Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 TieringEngineService.exe -
Modifies data under HKEY_USERS 64 IoCs
Processes:
SearchProtocolHost.exefxssvc.exeSearchIndexer.exeSearchFilterHost.exedescription ioc process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-111 = "Microsoft Excel Macro-Enabled Template" SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{C120DE80-FDE4-49F5-A713-E902EF062B8A} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 01000000000000000838bdae73cbda01 SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{80009818-F38F-4AF1-87B5-EADAB9433E58} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 01000000000000006b36dcae73cbda01 SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@fxsresm.dll,-1132 = "Store in a folder" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32,@elscore.dll,-4 = "Microsoft Simplified Chinese to Traditional Chinese Transliteration" SearchIndexer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32,@elscore.dll,-8 = "Microsoft Malayalam to Latin Transliteration" SearchIndexer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@windows.storage.dll,-34583 = "Saved Pictures" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9902 = "Movie Clip" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.shtml\OpenWithList SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.shtml SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-131 = "Rich Text Format" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Windows\System32\ieframe.dll,-12385 = "Favorites Bar" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-115 = "Microsoft Excel 97-2003 Worksheet" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My SearchFilterHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@"C:\Windows\system32\windowspowershell\v1.0\powershell.exe",-105 = "Windows PowerShell XML Document" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Multimedia SearchFilterHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-103 = "Microsoft Excel Macro-Enabled Worksheet" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9938 = "3GPP2 Audio/Video" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32,@elscore.dll,-1 = "Microsoft Language Detection" SearchIndexer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-123 = "Microsoft Word Document" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-120 = "Microsoft Word 97 - 2003 Document" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum 64-bit\{E0F158E1-CB04-11D0-BD4E-00A0C911CE86}\Default DirectSound Device SearchFilterHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9905 = "Video Clip" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-121 = "Microsoft Word 97 - 2003 Template" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Windows\system32\windows.storage.dll,-10152 = "File folder" SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{33154C99-BF49-443D-A73C-303A23ABBE97} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 0100000000000000917ec0ad73cbda01 SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Multimedia\ActiveMovie SearchFilterHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-114 = "OpenDocument Spreadsheet" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9936 = "QuickTime Movie" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Windows\System32\ieframe.dll,-912 = "HTML Document" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates SearchFilterHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9932 = "MP4 Video" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-178 = "OpenDocument Presentation" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Windows\system32\cabview.dll,-20 = "Cabinet File" SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{E2FB4720-F45F-4A3C-8CB2-2060E12425C3} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 010000000000000043e1c2ad73cbda01 SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-107 = "Microsoft Excel Comma Separated Values File" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9923 = "Windows Media playlist" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft SearchFilterHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum 64-bit SearchFilterHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.htm\OpenWithList SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9939 = "ADTS Audio" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-194 = "Microsoft Excel Add-In" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Windows\System32\ieframe.dll,-913 = "MHTML Document" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-175 = "Microsoft PowerPoint Slide Show" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-116 = "Microsoft Excel Template" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@fxsresm.dll,-1133 = "Print" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32,@elscore.dll,-2 = "Microsoft Script Detection" SearchIndexer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie SearchFilterHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{5383EF74-273B-4278-AB0C-CDAA9FD5369E} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 01000000000000009690f2ad73cbda01 SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{97E467B4-98C6-4F19-9588-161B7773D6F6} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 0100000000000000b354f7ad73cbda01 SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32,@elscore.dll,-10 = "Microsoft Hangul Decomposition Transliteration" SearchIndexer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE SearchFilterHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mht SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum 64-bit\{4EFE2452-168A-11D1-BC76-00C04FB9453B}\Default MidiOut Device SearchFilterHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-127 = "OpenDocument Text" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@fxsresm.dll,-1131 = "Route through e-mail" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@windows.storage.dll,-21824 = "Camera Roll" SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{1E589E9D-8A8D-46D9-A2F9-E6D4F8161EE9} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 0100000000000000185b7bad73cbda01 SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{5985FC23-2588-4D9A-B38B-7E7AFFAB3155} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 0100000000000000ae92b4ad73cbda01 SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32,@elscore.dll,-5 = "Microsoft Transliteration Engine" SearchIndexer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Windows\System32\msxml3r.dll,-1 = "XML Document" SearchProtocolHost.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
Processes:
DiagnosticsHub.StandardCollector.Service.exepid process 5016 DiagnosticsHub.StandardCollector.Service.exe 5016 DiagnosticsHub.StandardCollector.Service.exe 5016 DiagnosticsHub.StandardCollector.Service.exe 5016 DiagnosticsHub.StandardCollector.Service.exe 5016 DiagnosticsHub.StandardCollector.Service.exe 5016 DiagnosticsHub.StandardCollector.Service.exe 5016 DiagnosticsHub.StandardCollector.Service.exe -
Suspicious behavior: LoadsDriver 2 IoCs
Processes:
pid process 672 672 -
Suspicious use of AdjustPrivilegeToken 41 IoCs
Processes:
372fe1262c0b32aeb9ae38aed4493c34192af277ed8508f4c3af65051f0d3c94_NeikiAnalytics.exefxssvc.exeTieringEngineService.exeAgentService.exevssvc.exewbengine.exeSearchIndexer.exealg.exeDiagnosticsHub.StandardCollector.Service.exedescription pid process Token: SeTakeOwnershipPrivilege 1944 372fe1262c0b32aeb9ae38aed4493c34192af277ed8508f4c3af65051f0d3c94_NeikiAnalytics.exe Token: SeAuditPrivilege 4144 fxssvc.exe Token: SeRestorePrivilege 3764 TieringEngineService.exe Token: SeManageVolumePrivilege 3764 TieringEngineService.exe Token: SeAssignPrimaryTokenPrivilege 3404 AgentService.exe Token: SeBackupPrivilege 3824 vssvc.exe Token: SeRestorePrivilege 3824 vssvc.exe Token: SeAuditPrivilege 3824 vssvc.exe Token: SeBackupPrivilege 1328 wbengine.exe Token: SeRestorePrivilege 1328 wbengine.exe Token: SeSecurityPrivilege 1328 wbengine.exe Token: 33 2440 SearchIndexer.exe Token: SeIncBasePriorityPrivilege 2440 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 2440 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 2440 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 2440 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 2440 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 2440 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 2440 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 2440 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 2440 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 2440 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 2440 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 2440 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 2440 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 2440 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 2440 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 2440 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 2440 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 2440 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 2440 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 2440 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 2440 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 2440 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 2440 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 2440 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 2440 SearchIndexer.exe Token: SeDebugPrivilege 4696 alg.exe Token: SeDebugPrivilege 4696 alg.exe Token: SeDebugPrivilege 4696 alg.exe Token: SeDebugPrivilege 5016 DiagnosticsHub.StandardCollector.Service.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
SearchIndexer.exedescription pid process target process PID 2440 wrote to memory of 4312 2440 SearchIndexer.exe SearchProtocolHost.exe PID 2440 wrote to memory of 4312 2440 SearchIndexer.exe SearchProtocolHost.exe PID 2440 wrote to memory of 4932 2440 SearchIndexer.exe SearchFilterHost.exe PID 2440 wrote to memory of 4932 2440 SearchIndexer.exe SearchFilterHost.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\372fe1262c0b32aeb9ae38aed4493c34192af277ed8508f4c3af65051f0d3c94_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\372fe1262c0b32aeb9ae38aed4493c34192af277ed8508f4c3af65051f0d3c94_NeikiAnalytics.exe"1⤵
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\alg.exeC:\Windows\System32\alg.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exeC:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s TapiSrv1⤵
-
C:\Windows\system32\fxssvc.exeC:\Windows\system32\fxssvc.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵
- Executes dropped EXE
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"1⤵
- Executes dropped EXE
-
C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"1⤵
- Executes dropped EXE
-
C:\Windows\System32\msdtc.exeC:\Windows\System32\msdtc.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
-
\??\c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"1⤵
- Executes dropped EXE
-
C:\Windows\system32\PerceptionSimulation\PerceptionSimulationService.exeC:\Windows\system32\PerceptionSimulation\PerceptionSimulationService.exe1⤵
- Executes dropped EXE
-
C:\Windows\SysWow64\perfhost.exeC:\Windows\SysWow64\perfhost.exe1⤵
- Executes dropped EXE
-
C:\Windows\system32\locator.exeC:\Windows\system32\locator.exe1⤵
- Executes dropped EXE
-
C:\Windows\System32\SensorDataService.exeC:\Windows\System32\SensorDataService.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
-
C:\Windows\System32\snmptrap.exeC:\Windows\System32\snmptrap.exe1⤵
- Executes dropped EXE
-
C:\Windows\system32\spectrum.exeC:\Windows\system32\spectrum.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
-
C:\Windows\System32\OpenSSH\ssh-agent.exeC:\Windows\System32\OpenSSH\ssh-agent.exe1⤵
- Executes dropped EXE
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s SharedRealitySvc1⤵
-
C:\Windows\system32\TieringEngineService.exeC:\Windows\system32\TieringEngineService.exe1⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\AgentService.exeC:\Windows\system32\AgentService.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵
- Executes dropped EXE
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵
- Executes dropped EXE
-
C:\Windows\system32\SearchIndexer.exeC:\Windows\system32\SearchIndexer.exe /Embedding1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\SearchProtocolHost.exe"C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe1_ Global\UsGthrCtrlFltPipeMssGthrPipe1 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon"2⤵
- Modifies data under HKEY_USERS
-
C:\Windows\system32\SearchFilterHost.exe"C:\Windows\system32\SearchFilterHost.exe" 0 916 920 928 8192 924 9002⤵
- Modifies data under HKEY_USERS
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exeFilesize
2.1MB
MD5c8e940e6f10b37577ecba1e76691c931
SHA1296783b0b450ab561b612ff30c118b60018b7d19
SHA256a8a60d5ab2df518fc118866b065e9161589a182d76451b24d60a6fc121708ddb
SHA512971ee5b7992580cbfeb25323743a8903e110c9518a822e8d0d5de0dfc65be2fc1b3c34cead7d9fc7560d653365e6e101986b9ee4b8891b53cc434eaf26354502
-
C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exeFilesize
797KB
MD5609f199dc25af95d8714540b47ca1b23
SHA1e7087079eebc9aa6ea535e9e1b65564837471ed5
SHA256eb835042922d3fda1d1e6fd93087dded0e5c95f38671bf4803a23683b0a216b8
SHA512c6272fd4c40a57f8e8cbbb43a058576f9abf26fbcdcdafbfc82c815251447ccb4b37c2436743e393c8fed063ce8c2c9a67fa3106bb2c68965b7519fb925d3a22
-
C:\Program Files\7-Zip\7z.exeFilesize
1.1MB
MD5e9751e72cae8301d265ab6c95b8be4e7
SHA1a7889110cd9086e36ab862d456a224b5b1e470af
SHA2569cc36a6a9fca9016a77f38e07b78c1e7c4c4184787456348ef8382eaee3fe389
SHA5129efd4deda0dae849550835105035c6b61499e8f1127a4ce45ae6ab1c7fc392780fa10ea6545930016ea086a3bb696bd9b2f03766c2de04b2c5da5a92d7a22da3
-
C:\Program Files\7-Zip\7zFM.exeFilesize
1.5MB
MD511a09479deecd3215ecc7d4e601eb8b3
SHA17f863a1946f927932630e9642807a0b8e6698499
SHA2563c7af4cf0bc7c8496d7faf798f59975e5ab72dc50bdcecead16aec5c2dfee511
SHA51275029f3ee717b83c36f63f5810dd7b5b2cd6a08e6733bd28436fc61ea3ad3efce9c9ed9a56bd679630488ed910de9162e9157f1221df6ce6b4b98a5ba9127a7a
-
C:\Program Files\7-Zip\7zG.exeFilesize
1.2MB
MD55bddc204fa61689a84d97a7aeed786f3
SHA116ada846d2f9f3db1eceab5822a56e5b92354948
SHA256f942ccac0a74308739631c9f9156af5d399430171244351522dbeabb0aab1b8e
SHA512831c2a2a0f9273e7c1d4de0cf648258a70ec3cf5655a000b769dcd4dd8f0e94ae4970ff2ddd51660c77ac71865c69e46c969c92d0e05a2bff5fc29dfbd1d4966
-
C:\Program Files\7-Zip\Uninstall.exeFilesize
582KB
MD5f00aeeb900f7f5dc54daa8c9b60c05cb
SHA1763a07b3c926c07ed39ec4947fa2ed6d4e5db02e
SHA2563adb7f10dee52b4184d489c1fe4f7bf7ef9fa180f5fd0ee8d1237e2b79534335
SHA512be9eae69c0f6f8f6f11ae5b2f9ae1ea32e736d8d6c579084fcaced6fbbcebbbd31e47e90f5d9a7b9e4d3a693bfbc4ed151ebe4084460b26f07535e27b669e81b
-
C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVShNotify.exeFilesize
840KB
MD58bfe13cba59379eedce9dc4e033cad0f
SHA12fee23d91c96291d5a130d476b3b5f2d8e2d742f
SHA256d7b1fa77b03803b77057b6e2dc1dd29883472d5a3c7024a9713cb49d67082ac2
SHA512690b17fc1472e923cd7d44c5a4f2ef933d2f3b77596f7d81e59027f22589a95a23595a7ad71f1a33d8ae0155095ded33df8b1d1bdd2f5a9ba86843eba07cea9c
-
C:\Program Files\Common Files\microsoft shared\ClickToRun\IntegratedOffice.exeFilesize
4.6MB
MD5ab8c637200f03b06c996d84d294ec15f
SHA1e6f7deef10d867099e1321cd9d130abbd41938bb
SHA256319edae5f3d652c91b28a633f3e9e9922685b8642acde296eef6b23a5677af55
SHA512e2211291286ff06ee9409bec3cc9a3d2273b548089c01bc53a38aa52c23768a37b0ba098b1d642ea949f7aa9148cb1405ec2490f37acfa71eb43b14a225a04d7
-
C:\Program Files\Common Files\microsoft shared\ClickToRun\MavInject32.exeFilesize
910KB
MD55c8b9a58d8c24523e876514167bc0d95
SHA196b0aefafeaadef525ad5e1c0f245f8a6c2bbae1
SHA2566056080d175a566386b0d3c96b46cafff1ef0cbe74ae52b530ecf306af764bd2
SHA51267ff85f012dee200abc111847e72add6f5ce03fb955a77bb21f4ec57bed1e112a2c8fddb598bd515418a22507a487a72e41bee7598d6e8685433b1ae4a2fb3e6
-
C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeC2RClient.exeFilesize
24.0MB
MD538257fdf5745ea068e4914228b3359de
SHA162c75e24dd0690693ccafeda437cd32cfee48698
SHA25609062730df3699f4d35bc3fa1b8947cccc32e37c6c34f08993ade22e60e54b0f
SHA51288930d90737a119a8f77fc6f8de29bc24d9a8b01eb11b002dc03a3a102bb5cf6825c057baf50af4a6873b5045b03bf83954ea4931c3c53d761b3d116f65b37c7
-
C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exeFilesize
2.7MB
MD58c7f51b60e56f4a937d3b42bf03abc3d
SHA15dcbe223216a1299e123ece750f0002e4aa24efb
SHA256d654d0226c3e4edb65a30aaec40eebb086c6291d1d84a4701f4a79451f6bc6a2
SHA512eb410105dfc40d776d2d0b8b0cd479827912f1cc5f9c36ba6a3270d04aef6b26328074aa8897999e9604c8d4c9f1b684993aa8083e34b66b537b1eab67129888
-
C:\Program Files\Common Files\microsoft shared\OFFICE16\LICLUA.EXEFilesize
1.1MB
MD5f6451223db36d90f8ca23ba4c8001cf5
SHA19485b96e775e8601ae0a3acc766f89e892b2ac95
SHA2564f2bdeffac55fad2d2ee8630e8938fd237fbc92c4188f2876079edf6c038da48
SHA51226d3cdc8fc7d2d6ecf3de568c2744a6e05b540f19e515937ac7d434a12a7a3cacf1006f914c068b375977d676b5848e34af1caa055b8c15db6de308898b98b2a
-
C:\Program Files\Common Files\microsoft shared\Source Engine\OSE.EXEFilesize
805KB
MD5c0989b4f47f95a0c73fe2a81c09a2408
SHA1cdcd9a1cc19ce78b10e1b1b6521c54e4b73e10db
SHA2569db7bc8afcb0b92e68ea131909b58618d57a32483998bbb0cfb04bd52894938b
SHA5122530ac85805e3ce10c6a6c1c9c1ef7290755d316d02f94e90b77c2ae6adf283f2c1214b3f229c3afbe9ab4cd6101a371ecb3e141adf89edc1c0dcfb1141e0747
-
C:\Program Files\Common Files\microsoft shared\VSTO\10.0\VSTOInstaller.exeFilesize
656KB
MD586f071066303c5076b486bca465ca872
SHA192a9f632136f0eb7f0a859c62d49fb8cdec7263c
SHA25621d0f45b0f9a29607416f08b607faeca937187a07dd78e9d23155f29464147f5
SHA512753a9d5ebd60420473db9f6c6e9af279c13d147141f7807c70d2702d63388f1030b26083689ccdaa20cbaeefc4724f037e4e3acd1b3d32ce0eadc4dfe4e3aa00
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\Installer\chrmstp.exeFilesize
5.4MB
MD5c6bdbe2d44bb12a90d4e1d1ae39914cd
SHA13e21ac9a98e872a7583a5889ab73dd3177bdb409
SHA2565d035e814cb9291c48e8f30ff2f2b195bafef14f95aa59763ee2387c89ea77c5
SHA512bcf198fa58a1b7b989667ff447fcfe6db3d4a9966c890c66e1a44d5e13b3cbf94ff660553627bdfd3b536fd1edc93906c55b2ceff56c60379a019b769317fa2d
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\Installer\setup.exeFilesize
5.4MB
MD55f5b8f62039f3be314b9c03ac57dd48b
SHA1234885722ad3f525a9e0edda7aae760b3d38402a
SHA256b4275be11563c4279bde005005662aebbf429377ae9571e34b2d86706756e4dd
SHA512311d8764b88fa209a6ee0908612d11ecd3a07e6850b6c85d27bb5fac405c788a948c9ceb1e6ad39db15e0a60b9fe50fe7d62531b5e2cdbcd37a8d99d26a7cf33
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\chrome_pwa_launcher.exeFilesize
2.0MB
MD5075deb816744add7bd2de8dafd175258
SHA1a18a53f81d9d550446468a4f915d8168781fcff9
SHA2568d21ad11d86d942170a579728eedb6dc36f86069dea9072c1bde086200c0cc2e
SHA512f4716d8b9178767956a5aa7431cd069fd17170d0f04e0ea741de12189510ad4d6ede0bd9ea3b1b63860bc7a81b210b5542c5da154f33fb3ca255f9ff0718c130
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exeFilesize
2.2MB
MD53a2ab679ac212e2845daf2fe415295c9
SHA1f4dd592759c35210ae9fc009f2220e645e8eab4c
SHA256750578f95b00a8a575dc33359fdeec4e4671fd4ea039ba1268c3769845c244c2
SHA5124e4827f83c529a54ac5b7b189990d0e40ca29c9d88e249deb015d529459a30f100323c35b3b3da33356c8204ba20425fb8378a528a1fb002846a5d5ce54bbdc8
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\notification_helper.exeFilesize
1.8MB
MD5de182c757a2f826813a2fe84d2da9943
SHA15147b07c4bb0770a0618f1d0992217f240982d71
SHA256680b595248ec5fabf88d4a56099bb837123e5c6ba31524ff8697a84fe477e4d0
SHA5122ac73f360aca83ccda4b4a6e651c3703b6e66070cce786db402f77cc12ccb2f179577562c9fb5db78c007561363fbeda0857e5d58ed81c3381042c4855b4fe4f
-
C:\Program Files\Google\Chrome\Application\chrome_proxy.exeFilesize
1.7MB
MD511a63e2614c93ed8ca07bf93e321466b
SHA1c5b6f2e6819362f32307d18cf6e567b9a99a2b71
SHA2568b7663b8ef91ed56b097de13870d7b2ca3161531cfff8a401b527ce75f113f6d
SHA512d32b9ac58d56cfbe4e1f614f935dbf1a8ada32fcbaab69350ae855e580187c5d62e4424110fef034478eb586c10e175e50a4b0d067a7710a1c6bfe22525c17ca
-
C:\Program Files\Java\jdk-1.8\bin\appletviewer.exeFilesize
581KB
MD5bf0f2f46499402939cbbf912b13fe746
SHA1340d1b690cc6b3ae369a1a4f3006dc6f5f54881e
SHA25699219424c3283e4ff51b45db8c0a7b5fca9e6bbe2677b7ae3d2b69e496068944
SHA512b9a8a349d2ed582c5cad77fd697cbe5e77314b26acce93479a07eb4b5c6f73b96c63cb532e775e8e336248fa3fcf178f6a323cce32934bc0f1149f1c7d8e5a90
-
C:\Program Files\Java\jdk-1.8\bin\extcheck.exeFilesize
581KB
MD5b2c16d8590f2dd18c4febfb3bed8e369
SHA11b88e8809d69e8d2e8242a8b1954ec0791770628
SHA2561d28f8bf97ef689f56ffdc6ea893f3ca47f3b010ca669a5f5e78f164d93de47b
SHA5122bb3b5bae3bba6458ef529a495097b113f14afc484d560afe2249f665c914be50a3a49a24f76a39a72d0f49238db2cbc6288e8286fcdcaaf4fb0f674f8b2eb7f
-
C:\Program Files\Java\jdk-1.8\bin\idlj.exeFilesize
581KB
MD5c479aa44f1e54ea514fa877a60fad85a
SHA15ebc7172c8dc4201bc9352e26f8ec5eef543a2c0
SHA256722e8ff6f060a33d6cd9023b39ba704626f2824f3dc69aa28e8130b3a06df52f
SHA512023e08c03d65eac1551b0eb4081351a0797bfa75e3fb207163850cfd85d9e66685882dc8188d7724a5c2cd0cfc435587ecc0487851b2395fe874900b44aeb0cd
-
C:\Program Files\Java\jdk-1.8\bin\jabswitch.exeFilesize
601KB
MD5493f8cf27aef5f52b06e76eafc95e532
SHA145251d275179444a83c2100e0950bde3800c5997
SHA256e52564b14f4f29c4c1c7d28ebb31615428f14b0adf4a8f2ad8267e923981ec88
SHA5120f61ae3b62d6fb1afe4181c109d2da6830d014b249a3fdbd0beda22f7217db2d46af74cb3ce4b492ae296145ebea26c11c42a91d839fd8a3d33dda6200123107
-
C:\Program Files\Java\jdk-1.8\bin\jar.exeFilesize
581KB
MD5a256e6a3741b4f13dc404be13fc8b303
SHA1989695fcfd70111c185e5030c3f1b497621e295d
SHA2560d3257588fbfee2cf08701515b8b9bcc7313e346a0f00be87666fd8c0ef8e290
SHA512bc721126ca7d56c6ab7a4f67721408047f8659bd965703db8f94874b22f2c040af75d4bc506a0e46ab761a4a27d0c523208e493245eb3f56ccdaacc9a2189a7d
-
C:\Program Files\Java\jdk-1.8\bin\jarsigner.exeFilesize
581KB
MD51e9a67d9c2e894f0ee4347de7bd71704
SHA1e61a9c75324e67929f807eee73735a68b4ab66f8
SHA25692575ed60d882d68f11231db685f210e16651d58138895a1b367bd8a2b32f3ae
SHA512c7260ed17b6657470b6632941d7339acb32b14e65b09c4bdc2ac5af7dd0a31d926d095ed0a565b47b92272cda297f87cd0e5739cf77b71211663d5185282a29e
-
C:\Program Files\Java\jdk-1.8\bin\java-rmi.exeFilesize
581KB
MD546dcaa30e6ef1b5d0a503c6289c772f8
SHA1f4be8f87e7e5c5a586eb593ca6ab73e39a2f6ee8
SHA256bb3c8c665926cdd1ad06cc7962658a22896aaf98140b3fd698a525b37ec41855
SHA512ee6f1d0c49f5d7ffe9bdf6533096892df2087b664a3d06f0cac2f1201ea39ac77122cfdc814b927055f6d4045053456e086f9b83234593ccbfeea0baea228342
-
C:\Program Files\Java\jdk-1.8\bin\java.exeFilesize
841KB
MD5a677147af7cf42b1a90a47519c67451a
SHA13bcc58f290134cb4fcdedf4709a7ee1d41b18df7
SHA2560a065d59ff5b7e99e08a62f458a9981b85eaec8e89aa47ce93b05886927450e5
SHA512a9ce322bbf335965f9ebfb22fa1fcc35b0021853bef66da33f66faf3205c3bab6dbb0fa7510c9c4374140d1a5c086509330d8be690c59ea64b501574df1e62dd
-
C:\Program Files\Java\jdk-1.8\bin\javac.exeFilesize
581KB
MD5ef73fdab4a21999b175b54e9cce7a34a
SHA1c59762fee0e13ee8ac646b576bb5ebe2693211b3
SHA25661b9aaf698ebc32d0e95ea96bde38803c82edce41fa50570a961a822c218d0a8
SHA5129f97a76e680a5d2dce76e8448792e8cfe6b08d1d11c7d94d2cfbfb5c8bf7fc5fdb4226266c691f77ecd1a8cba345ea744f8a526bf3ef6acb43d987a654445873
-
C:\Program Files\Java\jdk-1.8\bin\javadoc.exeFilesize
581KB
MD5dd8ec7209ffd48909875dad7f2634679
SHA15ad21b760ce73bdc66397c35ba472ae5f5a75f66
SHA2560fce712aac68942e98b78964bf23e1ea28fc29f8f07adf9a4e92069f88df0393
SHA512c0c9911b513dcb02a223b0ad8450d32d9e489dc8c0ac649bc5651bdf7a97f8b475bc155f2308c74fd6e15215d16e5c6ac70ab282e9fdeadcb8f484c9a6d95bb7
-
C:\Program Files\Java\jdk-1.8\bin\javafxpackager.exeFilesize
717KB
MD533ded8a568e102e724916f616a382774
SHA19181cfed5e424cb280758a5dd71c6e221c536f1f
SHA256a79dfeaf4eadffb9397914d581c83cb1effa9c1f85b5baf4e6943fb823d4a6f3
SHA5122282714eee7f146376bf7bcfdf67d479d1cb74740038b6c896f78a90869a500db75eac404f18f1a4cc3e54236045bfd817607a8eaacb6bd7147a7c25dfda884b
-
C:\Program Files\Java\jdk-1.8\bin\javah.exeFilesize
581KB
MD57debe89762b57d7ab0798ca9bb01cabb
SHA16a9cd3f3cc37c22d8e51d04d62b0ea3f5b14144f
SHA2561069be6549c2fd0c1f7fe909ca7e39f0e3ed71aa9d7a0f00b1f330c83c2a33a1
SHA5128e30681a4b055062376da1fd074f7fc2ac689f273119fb6079ebfd68184023297dd53d61858fe8628c3d13eb0931889d51fcbdd2728b068053458512193b2b4d
-
C:\Program Files\Java\jdk-1.8\bin\javap.exeFilesize
581KB
MD5fc06474d12bcef014dfdc87d09ae036a
SHA1d22cf49c929a48b1027f77c31fdb67605317bf5b
SHA2568a928dabf8edfce9a6684086237e2d727ef470765b70dd065c5a85e834768de9
SHA5124360cb514a118e5352f2a9868671fa5b46187c16182f01371d58059fa04429b70dc0d91a66e6a133954481b7050ff8e4065fb3d7b6aec486c288dee15c881c1a
-
C:\Program Files\Java\jdk-1.8\bin\javapackager.exeFilesize
717KB
MD57bc402bd8f1a8e27f10c645c54d47c23
SHA1df040017f3463ba7750ea103625d57aa999e02d5
SHA256df6ca853b234846f6c4f418c95901cdda4c36948e6bff511aad93763db3f8b5d
SHA5125ef65fb11544e10d44d3e3c4f29c1a47b58ca25d0ebc65bbc8d30d5833cd7601e461bbb571569cd5aac0ad0c97102f3ca41da358b2bf98b685fd38d327c31fdb
-
C:\Program Files\Java\jdk-1.8\bin\javaw.exeFilesize
841KB
MD5e1e51a2a9ebf988b9d7ef92dc5ab241b
SHA11ee626056f0aafbdc9b5bd66d479abd80ae13ea5
SHA2567b8f72f3066192578de1b9cb4a1df2c339741b3811d0051d250b3f76f6a72465
SHA512fa6fe102ff354a1aef16e08b68fafd242e43ca4ae26e2ec86e6f6584485aee63c71f3b66cc7d513d6f94c01e75af4a05108464377687432c57931fce5ca25e7a
-
C:\Program Files\Java\jdk-1.8\bin\javaws.exeFilesize
1020KB
MD5cabebae1bfeab444a99e6fd24d46f7e1
SHA138b9a624ed1c575598a823cef038f4cb649295e4
SHA256fb16d603e45dbbac3e3403e2adc2f7726af442f2802c4d7b663c9327a00edbf5
SHA512e336612c2bbe3627fd9c1ed3f71122d158fed508b240ee0d4039f22fd89288e714801c06f8646235521cbcb29af2b3b2b5ae1048be0f22bdea83044f02bd5c22
-
C:\Program Files\Java\jdk-1.8\bin\jcmd.exeFilesize
581KB
MD5fbe621160cd4e4957a4f45b4a30e5561
SHA1062b9c2a0ee6a05c471f335f51844e6f4047b81f
SHA2563d619f12eebaaeb8bb3b5f8356a1e318f4ffa9e2bd325dd17fc4c6b66ca722e5
SHA5126fe5e17d672763c295a5eddf4d2ffc38f9c2f2d03f586ba906372988980ea6088d4d2ea76789e3ceff724d334cd1ffa7d2fe8891c51860d8a4303994b97c5aef
-
C:\Program Files\Windows Media Player\wmpnetwk.exeFilesize
1.5MB
MD541e04cc7cde8cf21b64cc15f15f31200
SHA15f0ca886a48c610f189b20628c138e0448af4b72
SHA2569501ab2974880264b6aa6ea755dc088375a47e53afd73b0adccd46616b873e9b
SHA512451dc29bf49d9a8a0cdf683a54b6ccc075ecbcecacd0b7e0b568fbaf52d32af618a1d66bcc7a5b4285d56e9128e5431132405ee6972dde2b966c37fcd307be17
-
C:\Program Files\dotnet\dotnet.exeFilesize
701KB
MD5b94616910fef144b8b667cab6d652b20
SHA17a0badc38be583b21dd9e8cab62cd84c2e104e47
SHA2566dff61d258ab9201a75bb1192003c7d8de869bfc13f2ee537e2421a8722d8654
SHA512cf75122231a5be8d15f6090b9fe23b83ce46ad5d1e0ebb66f7a07d654ca0d69a09fb0b23ed4ba5e3f0c9445eb69f297682963681ae2cd7649a6d329cde583dab
-
C:\Windows\SysWOW64\perfhost.exeFilesize
588KB
MD576ec9ee6a758839a1a3357a90dc8da1a
SHA1702675a35cdbdbaf4c63cdb105891ce051d3762c
SHA2562505454ba6a426a145707c796f94c13f53c806ae6d4c4bb1bba282d4d35aa9ee
SHA5120d9f223540b71df2ee2800902d6a47bb9afed8db3c383caa6a001105447975bc1482881e30bba174a02378aee9558a3b1be0a5d2cfb3bb99fb7df5fc63088841
-
C:\Windows\System32\AgentService.exeFilesize
1.7MB
MD527182ba017d1d77e328fe5fee69e1732
SHA1b264f11d90512ece58f667736121a22064efc15c
SHA25643eb7d8af93573b4ee2be96252c944f2051eb31d1c5bccbe24c723f8a4c6a970
SHA512fbebf353fa35d511ce640a1aafee1783d4c57f23f30b3b6de43608bfcee05bfb73a4204bea6e74a3c9924df69231e213c4b8c6abe3cf2442bac72a856d872d65
-
C:\Windows\System32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exeFilesize
659KB
MD50fc93d7871bff36a9d35fdcea102c0f0
SHA1ab7ac2e6fd1c1a0cf93ffecc2bff6706c6bbcab5
SHA2562f94bbe4ef008e49eb583fc784e3a2ba17a22ea01a8769b463ed840cad793959
SHA512a66303503214a22d76ab320eec6f750e80405926470f205d21e9bc87b13ab824ba916b725dfd08a04d28a0689b7ef59ce1dd194b63e80c04ba3d3f9de10c083a
-
C:\Windows\System32\FXSSVC.exeFilesize
1.2MB
MD54bb2a9a10079fb0e041e73df721c49d5
SHA11d12128e0913f04b6a54b39a34dd6a006ae92966
SHA256a5eb1aeb67c162c9965d647fc385365392b980421176fc41251b105020aa646b
SHA512abbc74fe2268fd073110cc5a0bce0a2a44f134cc0c60852efa379d093009e48b214a39c6fe813e826a7baff3c7957b25d5bf57ac85e6c2515e27d4a67f2dd8eb
-
C:\Windows\System32\Locator.exeFilesize
578KB
MD57572ef1a23401527d8639a89806c6076
SHA1f367113cadcd0a2536df804b67d134c175e054da
SHA25604ecb284df1ea54a652f01d32d19c45077acca336966f83ecc3a046a3fc140c4
SHA5125469c8ad879feabe3ba44c31d35ca89a2aa6f331ed7de4f3fb081a0f95fc2077100999f103dc8b93112c096d1ea1b0b22a6cbceb3fcc9967a60f256f3505b448
-
C:\Windows\System32\OpenSSH\ssh-agent.exeFilesize
940KB
MD5398c41f8f7cae42f3a1c1726223d6659
SHA1b6826153be6f0527260fcc82ffe88f4330881dbd
SHA256f454cb10581e708d2e8b39f56200ee15c864d5aa38124b0e719549ea35c456d7
SHA51255622fd8b9f4f55b220c90519b1484df10305cc567b9b370b8c26f438251ad304d14643916b4f08e1b65f1e77ed2fdb469735487a5a6386e4a7c1bedd1e40bc7
-
C:\Windows\System32\PerceptionSimulation\PerceptionSimulationService.exeFilesize
671KB
MD5dff4c69fe4cca629fa73f61aab616b22
SHA1c1c1f6d27467085709e5b30c03cefdfd096ca0b6
SHA256d235218b17da069b8b31fe171c0b6ac6ac5b0124736c7decd85325f05e3be10d
SHA5127b491754a271a4cef69e7869f72688b6112606f73650f37bdb07e8b8307b5cb2ff0c5cb99a4d34cc1c59cee22eb25528273b5a732fb60328c6d64d1ad1919be2
-
C:\Windows\System32\SearchIndexer.exeFilesize
1.4MB
MD5e0ffbe10301263cffe56d6897935f29e
SHA194d8b58d2efcda847d25233ae4115b27f736daaa
SHA2560197acd6d0ecee19cc5acc0bd4d7bda2498f8fb3afc4d42ff3549f3442bcca5d
SHA5124452f83cafe11272a1d56ef5f72fd01e76430d0f46164b47bed3cc71d8b864e3671044f4d721787128b5da43d2c6ec769be490239b4ec502b183b5e83dc4a70b
-
C:\Windows\System32\SensorDataService.exeFilesize
1.8MB
MD561922884a208d10baf128dcfdff3a3b5
SHA11c2ccacedeb2e5506f96118093e0f359a57a639f
SHA256c89c0fee65136e858d3b4aed9e5f1319760f5b3dd25d617e9328069a0fabea99
SHA512946af6b055452dfb820eba6a93aaf663d5bf4daf78d1f6df46dba3b108d742006f6a15eaf705128549d60eb257b9e2fa7734b5987b7bfa506c470bd4be7c050e
-
C:\Windows\System32\Spectrum.exeFilesize
1.4MB
MD50aa538da8211f4268870478a380a7d70
SHA16d05475e1417a1bc6ff06aefac075b45c1bcf971
SHA25603b2b2aeb03df65dd1ecd99e071e4ed468f2f7162bd4661d09b57bb194de9a00
SHA512a4a338dc47b5ca22210ab80354bde3d359385d4c476695a0611150512eb21c9d15a652b904c9393ad63af6f7759d7a8535067db954ec1459e682bed0099df31d
-
C:\Windows\System32\TieringEngineService.exeFilesize
885KB
MD572c7ae3ebbb20ee7ca131d2a6a024e3f
SHA14c7554e6d7bba74072d39136284a454c2ba0b4cd
SHA256380203bb3d617844394ed2634e545fb708fd1c65ae29a8a4e8d8566bf69ff0c5
SHA51224212eb0d2cd4ca65c6cdc731d27d375e5101878a33ce1f675073243a5d7e1cf167d83925f6406e4077fcc401f1ecd1e6a857e9b6cd92748fc7c8e696a50fc38
-
C:\Windows\System32\VSSVC.exeFilesize
2.0MB
MD516e9b9ef28a6a11d46f1e27bdf369cca
SHA12644d7f255cb7d3b5e859e25b6e2b1f3a7966314
SHA2565df722ddc0b660de93ea8780b93cef717c28a83ab570e0019f2ebfcf4b61343e
SHA512f09facae70d1f2b34a02b69dc328ec7bb40c0d38081d286ca26ac53c17a48a974823575931c040bf7417b2001fbec2222998230f48604d5bdf7515394959caa9
-
C:\Windows\System32\alg.exeFilesize
661KB
MD5e03d4dfb144a0b7a65468fb98f084ce0
SHA1d20793d16b7d31b6b6ea212e9b8c00d7d80e2d8f
SHA2568c1c9668440e6076b58cfab11ca47fab59bf0a5a23f2f4f3df036551d931ed5b
SHA51238b95f1e8c0d8239bd73c25b4497973eca7768d6cf7ce25dcd00ec65c2c82c2bc176596b9ed06dee874b121fe12f517bbe067ec470d58fca14463c923be7baf2
-
C:\Windows\System32\msdtc.exeFilesize
712KB
MD5441b6362cf47e08324dfbae2815883a6
SHA1796cb4996dd4d5463adcf6e4c72f609eb629a515
SHA2567696d6b37d639b8e8eeccb7f2e152933e20e4a7f1ee0ac45c23f1295c631ca75
SHA512a322678ddbc4583fcd9d786a0ee267c11ef8790bc18b338ff8f523aeff21edd507ef19cd586bb0f8925815e803a27f7b0793624b7fa6fcb06ebd0f1f28755a4f
-
C:\Windows\System32\snmptrap.exeFilesize
584KB
MD57a2cca95d17d914aa58fd2f132591197
SHA137fd2994ce416778fa5d8e1671ed8bf115a5c8b2
SHA256a03dd9fa2909e518c39c6e4af768a1f487be997cae55994187113b81298328db
SHA5127912aac3596592a658dd23819853393d19c73beec27cda8b07b218a7d1321f1f2645934a75d7d3ed928a2d1354208b2c93cce99f461845f7ee56def6ffa9e637
-
C:\Windows\System32\vds.exeFilesize
1.3MB
MD5a43cea584f14641cddd2aac8b730e8d2
SHA1a191b64fc490b7a053e173d6334258011c43fdd3
SHA256e5f8b1f5f06f47893a2a77daecd3dc0787f296daa24275c19d3bc996fff9d4e1
SHA5129fa00b4bc81f822282fa2995ef7cc1d8ed0ade5bd35c1bb8f3318cc8bdb18f467fee91ab67fc1a15d19c6b7ecc70aeb2dcf390c4c9b8a6a9594ae3b3a5c3426b
-
C:\Windows\System32\wbem\WmiApSrv.exeFilesize
772KB
MD589e6d1dbbfedfc3c9fa042b2048660eb
SHA15da2ddad35b1223789df26c7a40230d9344e5291
SHA2563f78766946d926f55caa8888e703bc4a34e3f1c36ac26519574bff7ce5ad6b95
SHA51273cbdbfde9fa2b0f98d4c5398fc15f3222594c007fc83a35ca5c2bd6fb03e67ca8cd6b8223e0f811df5f2d462e0d32a3f5ab6d3a3bcea683469b1feccb4b9b35
-
C:\Windows\System32\wbengine.exeFilesize
2.1MB
MD57c2fdf7f0a594570d12c6a2feff0df0b
SHA1b4d8a0070eee4ecb78adf337073c16eb855984a3
SHA256609688dc05e6f258fcbfcb62708b66c86f2caa25d758de9c9477a9fd8de14526
SHA512f042ef9d96676e697c5e9e32a224fbd639190eeb2bee1f95554e111de3a2c9e257766b80850e86874748552e7dc8fa9a8964cc2533a46a4b8bc784f17f3fc492
-
C:\Windows\system32\AppVClient.exeFilesize
1.3MB
MD56a1de467d486ef5b79c17db5e715c1cb
SHA1eb38c23109a9dd1465d0fc201c417b9919948070
SHA2562039d5c7de97022e72d3be7c74e59f48ff332d5d68de19e3fd6fe6ad082681f8
SHA5127e55e17e66f385610bc4ae312a845ede7da3474b5a6fae6d05551e89bbef60d4d7cb87d1371a08c6158d7012e42e5a4e6250cf1528d583a733916feec46b5b02
-
C:\Windows\system32\SgrmBroker.exeFilesize
877KB
MD5daaa432aa8f7240e75e45151146a1046
SHA1ecd7b11839ce128eeb056c10528d0dd1a096b25d
SHA25683954e44eec5bcb9e06e99639c63ff54ae5e801f5189c019ae7ff65915073536
SHA5129f9a5922ab028abcb9835dbb1db3c23c66203fa1aac4c80c38d840ac42bb31a5cebcbf0e07cbbaba6bbbfac22d4a224a16b39fabcd0879f694840ec5cf68971f
-
C:\Windows\system32\msiexec.exeFilesize
635KB
MD5e2e0cafc2d269ffcb3bbcbf43b897e6b
SHA1f6dd24b9a5e5e4ec40e9fe7987faae022718ca14
SHA2562328d2767cbd6158e8588b92e1871352bff999382edecf91a1051f33d2f10c18
SHA5121d1442118f9aee77e25015a43a9fbe1a784c98a78332b92fbe9ef2fbfc72ad4a5785f477c53c20eb452491f4861d63651bbbea840215f89ba995b4dcf0c9dbd9
-
memory/468-612-0x0000000140000000-0x00000001401D7000-memory.dmpFilesize
1.8MB
-
memory/468-264-0x0000000140000000-0x00000001401D7000-memory.dmpFilesize
1.8MB
-
memory/468-149-0x0000000140000000-0x00000001401D7000-memory.dmpFilesize
1.8MB
-
memory/1316-510-0x0000000140000000-0x0000000140096000-memory.dmpFilesize
600KB
-
memory/1316-161-0x0000000140000000-0x0000000140096000-memory.dmpFilesize
600KB
-
memory/1328-240-0x0000000140000000-0x0000000140216000-memory.dmpFilesize
2.1MB
-
memory/1328-619-0x0000000140000000-0x0000000140216000-memory.dmpFilesize
2.1MB
-
memory/1392-216-0x0000000140000000-0x0000000140147000-memory.dmpFilesize
1.3MB
-
memory/1392-615-0x0000000140000000-0x0000000140147000-memory.dmpFilesize
1.3MB
-
memory/1492-101-0x0000000140000000-0x00000001400CF000-memory.dmpFilesize
828KB
-
memory/1492-215-0x0000000140000000-0x00000001400CF000-memory.dmpFilesize
828KB
-
memory/1944-534-0x0000000030000000-0x0000000030135000-memory.dmpFilesize
1.2MB
-
memory/1944-6-0x0000000002160000-0x00000000021C7000-memory.dmpFilesize
412KB
-
memory/1944-1-0x0000000002160000-0x00000000021C7000-memory.dmpFilesize
412KB
-
memory/1944-72-0x0000000030000000-0x0000000030135000-memory.dmpFilesize
1.2MB
-
memory/1944-0-0x0000000030000000-0x0000000030135000-memory.dmpFilesize
1.2MB
-
memory/2072-239-0x0000000000400000-0x0000000000497000-memory.dmpFilesize
604KB
-
memory/2072-127-0x0000000000400000-0x0000000000497000-memory.dmpFilesize
604KB
-
memory/2252-80-0x0000000002020000-0x0000000002080000-memory.dmpFilesize
384KB
-
memory/2252-73-0x0000000140000000-0x00000001400CF000-memory.dmpFilesize
828KB
-
memory/2252-74-0x0000000002020000-0x0000000002080000-memory.dmpFilesize
384KB
-
memory/2252-84-0x0000000002020000-0x0000000002080000-memory.dmpFilesize
384KB
-
memory/2252-85-0x0000000140000000-0x00000001400CF000-memory.dmpFilesize
828KB
-
memory/2388-89-0x0000000140000000-0x00000001400B9000-memory.dmpFilesize
740KB
-
memory/2388-200-0x0000000140000000-0x00000001400B9000-memory.dmpFilesize
740KB
-
memory/2388-90-0x0000000000D70000-0x0000000000DD0000-memory.dmpFilesize
384KB
-
memory/2440-270-0x0000000140000000-0x0000000140179000-memory.dmpFilesize
1.5MB
-
memory/2440-621-0x0000000140000000-0x0000000140179000-memory.dmpFilesize
1.5MB
-
memory/2640-620-0x0000000140000000-0x00000001400C6000-memory.dmpFilesize
792KB
-
memory/2640-252-0x0000000140000000-0x00000001400C6000-memory.dmpFilesize
792KB
-
memory/3080-68-0x00000000001A0000-0x0000000000200000-memory.dmpFilesize
384KB
-
memory/3080-61-0x0000000140000000-0x000000014022B000-memory.dmpFilesize
2.2MB
-
memory/3080-177-0x0000000140000000-0x000000014022B000-memory.dmpFilesize
2.2MB
-
memory/3080-62-0x00000000001A0000-0x0000000000200000-memory.dmpFilesize
384KB
-
memory/3404-201-0x0000000140000000-0x00000001401C0000-memory.dmpFilesize
1.8MB
-
memory/3404-213-0x0000000140000000-0x00000001401C0000-memory.dmpFilesize
1.8MB
-
memory/3764-189-0x0000000140000000-0x00000001400E2000-memory.dmpFilesize
904KB
-
memory/3764-614-0x0000000140000000-0x00000001400E2000-memory.dmpFilesize
904KB
-
memory/3824-228-0x0000000140000000-0x00000001401FC000-memory.dmpFilesize
2.0MB
-
memory/3824-616-0x0000000140000000-0x00000001401FC000-memory.dmpFilesize
2.0MB
-
memory/4112-56-0x0000000140000000-0x000000014024B000-memory.dmpFilesize
2.3MB
-
memory/4112-164-0x0000000140000000-0x000000014024B000-memory.dmpFilesize
2.3MB
-
memory/4112-57-0x0000000000850000-0x00000000008B0000-memory.dmpFilesize
384KB
-
memory/4112-50-0x0000000000850000-0x00000000008B0000-memory.dmpFilesize
384KB
-
memory/4132-607-0x0000000140000000-0x0000000140169000-memory.dmpFilesize
1.4MB
-
memory/4132-165-0x0000000140000000-0x0000000140169000-memory.dmpFilesize
1.4MB
-
memory/4140-227-0x0000000140000000-0x00000001400AB000-memory.dmpFilesize
684KB
-
memory/4140-115-0x0000000140000000-0x00000001400AB000-memory.dmpFilesize
684KB
-
memory/4144-45-0x0000000000EC0000-0x0000000000F20000-memory.dmpFilesize
384KB
-
memory/4144-48-0x0000000140000000-0x0000000140135000-memory.dmpFilesize
1.2MB
-
memory/4144-37-0x0000000000EC0000-0x0000000000F20000-memory.dmpFilesize
384KB
-
memory/4144-43-0x0000000000EC0000-0x0000000000F20000-memory.dmpFilesize
384KB
-
memory/4144-36-0x0000000140000000-0x0000000140135000-memory.dmpFilesize
1.2MB
-
memory/4456-251-0x0000000140000000-0x0000000140095000-memory.dmpFilesize
596KB
-
memory/4456-130-0x0000000140000000-0x0000000140095000-memory.dmpFilesize
596KB
-
memory/4696-18-0x0000000000520000-0x0000000000580000-memory.dmpFilesize
384KB
-
memory/4696-11-0x0000000000520000-0x0000000000580000-memory.dmpFilesize
384KB
-
memory/4696-88-0x0000000140000000-0x00000001400AA000-memory.dmpFilesize
680KB
-
memory/4696-20-0x0000000000520000-0x0000000000580000-memory.dmpFilesize
384KB
-
memory/4696-17-0x0000000140000000-0x00000001400AA000-memory.dmpFilesize
680KB
-
memory/4708-178-0x0000000140000000-0x0000000140102000-memory.dmpFilesize
1.0MB
-
memory/4708-613-0x0000000140000000-0x0000000140102000-memory.dmpFilesize
1.0MB
-
memory/5016-25-0x0000000140000000-0x00000001400A9000-memory.dmpFilesize
676KB
-
memory/5016-32-0x0000000000750000-0x00000000007B0000-memory.dmpFilesize
384KB
-
memory/5016-26-0x0000000000750000-0x00000000007B0000-memory.dmpFilesize
384KB
-
memory/5016-126-0x0000000140000000-0x00000001400A9000-memory.dmpFilesize
676KB