Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28-04-2024 10:04
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-28_55b242a8af0055b1bf0f6352c15ba9cf_bkransomware.exe
Resource
win7-20240221-en
General
-
Target
2024-04-28_55b242a8af0055b1bf0f6352c15ba9cf_bkransomware.exe
-
Size
712KB
-
MD5
55b242a8af0055b1bf0f6352c15ba9cf
-
SHA1
45ee7a8cf5637cefe449a62c3806fd6c887926e1
-
SHA256
06daf177c30b62c34f58e0c003f9891ed803d0e3b3a862bbd6ddd155720a91c5
-
SHA512
7afdb67874267d097551913760c972aaf9e1dceddad465d9a6b17e053e947be659c8dbe3b54678924a98b0b769bf8b2f49af4092d8892837fe1e310cbb4acd44
-
SSDEEP
12288:etOw6BaDravfgGchah+H/cXy5YFSRNEaNZ2ONbQo2bzTWSaVVQtGLfHtVclBq+0B:w6BeaHsK+fM2jEaNZBqoeW7V6tGLfHt9
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
Processes:
alg.exeaspnet_state.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exeehRecvr.exeehsched.exeelevation_service.exeIEEtwCollector.exeGROOVE.EXEmaintenanceservice.exemsdtc.exemsiexec.exeOSE.EXEmscorsvw.exeOSPPSVC.EXEperfhost.exemscorsvw.exemscorsvw.exelocator.exesnmptrap.exevds.exemscorsvw.exevssvc.exemscorsvw.exewbengine.exemscorsvw.exeWmiApSrv.exewmpnetwk.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exeSearchIndexer.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exepid process 468 2996 alg.exe 2632 aspnet_state.exe 2428 mscorsvw.exe 2420 mscorsvw.exe 464 mscorsvw.exe 2752 mscorsvw.exe 1648 ehRecvr.exe 2652 ehsched.exe 2240 elevation_service.exe 3028 IEEtwCollector.exe 2076 GROOVE.EXE 2084 maintenanceservice.exe 596 msdtc.exe 1136 msiexec.exe 2828 OSE.EXE 2968 mscorsvw.exe 2568 OSPPSVC.EXE 760 perfhost.exe 2732 mscorsvw.exe 1804 mscorsvw.exe 1836 locator.exe 788 snmptrap.exe 2116 vds.exe 2280 mscorsvw.exe 1096 vssvc.exe 2328 mscorsvw.exe 2940 wbengine.exe 1912 mscorsvw.exe 2384 WmiApSrv.exe 1688 wmpnetwk.exe 2144 mscorsvw.exe 2460 mscorsvw.exe 1856 mscorsvw.exe 1920 mscorsvw.exe 2088 SearchIndexer.exe 2456 mscorsvw.exe 1284 mscorsvw.exe 2000 mscorsvw.exe 2280 mscorsvw.exe 836 mscorsvw.exe 2648 mscorsvw.exe 960 mscorsvw.exe 580 mscorsvw.exe 2456 mscorsvw.exe 2032 mscorsvw.exe 2588 mscorsvw.exe 1768 mscorsvw.exe 432 mscorsvw.exe 2084 mscorsvw.exe 2260 mscorsvw.exe 1996 mscorsvw.exe 2764 mscorsvw.exe 2616 mscorsvw.exe 2552 mscorsvw.exe 1460 mscorsvw.exe 2336 mscorsvw.exe 2628 mscorsvw.exe 364 mscorsvw.exe 2292 mscorsvw.exe 1724 mscorsvw.exe 2328 mscorsvw.exe 2144 mscorsvw.exe 2944 mscorsvw.exe -
Loads dropped DLL 62 IoCs
Processes:
msiexec.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exepid process 468 468 468 468 468 468 468 1136 msiexec.exe 468 468 468 468 468 736 1460 mscorsvw.exe 1460 mscorsvw.exe 2628 mscorsvw.exe 2628 mscorsvw.exe 2292 mscorsvw.exe 2292 mscorsvw.exe 2328 mscorsvw.exe 2328 mscorsvw.exe 2944 mscorsvw.exe 2944 mscorsvw.exe 368 mscorsvw.exe 368 mscorsvw.exe 520 mscorsvw.exe 520 mscorsvw.exe 2484 mscorsvw.exe 2484 mscorsvw.exe 908 mscorsvw.exe 908 mscorsvw.exe 2788 mscorsvw.exe 2788 mscorsvw.exe 1344 mscorsvw.exe 1344 mscorsvw.exe 2160 mscorsvw.exe 2160 mscorsvw.exe 2224 mscorsvw.exe 2224 mscorsvw.exe 1436 mscorsvw.exe 1436 mscorsvw.exe 2756 mscorsvw.exe 2756 mscorsvw.exe 2084 mscorsvw.exe 2084 mscorsvw.exe 2496 mscorsvw.exe 2496 mscorsvw.exe 1912 mscorsvw.exe 1912 mscorsvw.exe 2228 mscorsvw.exe 2228 mscorsvw.exe 2144 mscorsvw.exe 2144 mscorsvw.exe 1944 mscorsvw.exe 1944 mscorsvw.exe 2524 mscorsvw.exe 2524 mscorsvw.exe 2032 mscorsvw.exe 2032 mscorsvw.exe 2664 mscorsvw.exe 2664 mscorsvw.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in System32 directory 21 IoCs
Processes:
2024-04-28_55b242a8af0055b1bf0f6352c15ba9cf_bkransomware.exeaspnet_state.exemsdtc.exeSearchProtocolHost.exeGROOVE.EXEdescription ioc process File opened for modification C:\Windows\system32\vssvc.exe 2024-04-28_55b242a8af0055b1bf0f6352c15ba9cf_bkransomware.exe File opened for modification C:\Windows\system32\wbem\WmiApSrv.exe 2024-04-28_55b242a8af0055b1bf0f6352c15ba9cf_bkransomware.exe File opened for modification C:\Windows\system32\fxssvc.exe aspnet_state.exe File opened for modification C:\Windows\system32\IEEtwCollector.exe aspnet_state.exe File opened for modification C:\Windows\system32\IEEtwCollector.exe 2024-04-28_55b242a8af0055b1bf0f6352c15ba9cf_bkransomware.exe File opened for modification C:\Windows\system32\MSDtc\MSDTC.LOG msdtc.exe File opened for modification C:\Windows\System32\msdtc.exe 2024-04-28_55b242a8af0055b1bf0f6352c15ba9cf_bkransomware.exe File opened for modification C:\Windows\system32\msiexec.exe 2024-04-28_55b242a8af0055b1bf0f6352c15ba9cf_bkransomware.exe File opened for modification C:\Windows\system32\locator.exe 2024-04-28_55b242a8af0055b1bf0f6352c15ba9cf_bkransomware.exe File opened for modification C:\Windows\System32\vds.exe 2024-04-28_55b242a8af0055b1bf0f6352c15ba9cf_bkransomware.exe File opened for modification C:\Windows\system32\SearchIndexer.exe 2024-04-28_55b242a8af0055b1bf0f6352c15ba9cf_bkransomware.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat SearchProtocolHost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Roaming\67d418d7ae4ef42b.bin aspnet_state.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat GROOVE.EXE File opened for modification C:\Windows\System32\snmptrap.exe 2024-04-28_55b242a8af0055b1bf0f6352c15ba9cf_bkransomware.exe File opened for modification C:\Windows\system32\dllhost.exe aspnet_state.exe File opened for modification C:\Windows\System32\alg.exe 2024-04-28_55b242a8af0055b1bf0f6352c15ba9cf_bkransomware.exe File opened for modification C:\Windows\SysWow64\perfhost.exe 2024-04-28_55b242a8af0055b1bf0f6352c15ba9cf_bkransomware.exe File opened for modification C:\Windows\system32\wbengine.exe 2024-04-28_55b242a8af0055b1bf0f6352c15ba9cf_bkransomware.exe File opened for modification C:\Windows\system32\dllhost.exe 2024-04-28_55b242a8af0055b1bf0f6352c15ba9cf_bkransomware.exe File opened for modification C:\Windows\system32\fxssvc.exe 2024-04-28_55b242a8af0055b1bf0f6352c15ba9cf_bkransomware.exe -
Drops file in Program Files directory 64 IoCs
Processes:
2024-04-28_55b242a8af0055b1bf0f6352c15ba9cf_bkransomware.exeaspnet_state.exedescription ioc process File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\chrome_pwa_launcher.exe 2024-04-28_55b242a8af0055b1bf0f6352c15ba9cf_bkransomware.exe File opened for modification C:\Program Files\Mozilla Firefox\updater.exe 2024-04-28_55b242a8af0055b1bf0f6352c15ba9cf_bkransomware.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateOnDemand.exe 2024-04-28_55b242a8af0055b1bf0f6352c15ba9cf_bkransomware.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\orbd.exe aspnet_state.exe File opened for modification C:\Program Files\VideoLAN\VLC\uninstall.exe aspnet_state.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\Adobe AIR Updater.exe aspnet_state.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\TabTip32.exe aspnet_state.exe File opened for modification C:\Program Files (x86)\Mozilla Maintenance Service\Uninstall.exe 2024-04-28_55b242a8af0055b1bf0f6352c15ba9cf_bkransomware.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome_proxy.exe aspnet_state.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jmap.exe aspnet_state.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javadoc.exe 2024-04-28_55b242a8af0055b1bf0f6352c15ba9cf_bkransomware.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\jp2launcher.exe 2024-04-28_55b242a8af0055b1bf0f6352c15ba9cf_bkransomware.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\launcher.exe 2024-04-28_55b242a8af0055b1bf0f6352c15ba9cf_bkransomware.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroBroker.exe 2024-04-28_55b242a8af0055b1bf0f6352c15ba9cf_bkransomware.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\servertool.exe aspnet_state.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\lib\nbexec.exe aspnet_state.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc.exe aspnet_state.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\LICLUA.EXE aspnet_state.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\java.exe 2024-04-28_55b242a8af0055b1bf0f6352c15ba9cf_bkransomware.exe File opened for modification C:\Program Files\Java\jre7\bin\orbd.exe 2024-04-28_55b242a8af0055b1bf0f6352c15ba9cf_bkransomware.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\rmiregistry.exe aspnet_state.exe File opened for modification C:\Program Files\Java\jre7\bin\unpack200.exe aspnet_state.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc-cache-gen.exe aspnet_state.exe File opened for modification C:\Program Files\Java\jre7\bin\kinit.exe 2024-04-28_55b242a8af0055b1bf0f6352c15ba9cf_bkransomware.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\javaws.exe aspnet_state.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\unpack200.exe aspnet_state.exe File opened for modification C:\Program Files\Java\jre7\bin\orbd.exe aspnet_state.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\serialver.exe 2024-04-28_55b242a8af0055b1bf0f6352c15ba9cf_bkransomware.exe File opened for modification C:\Program Files\Java\jre7\bin\policytool.exe 2024-04-28_55b242a8af0055b1bf0f6352c15ba9cf_bkransomware.exe File opened for modification C:\Program Files\Java\jre7\bin\unpack200.exe 2024-04-28_55b242a8af0055b1bf0f6352c15ba9cf_bkransomware.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jinfo.exe aspnet_state.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\javaw.exe aspnet_state.exe File opened for modification C:\Program Files\Mozilla Firefox\updater.exe aspnet_state.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateSetup.exe aspnet_state.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\lib\nbexec.exe 2024-04-28_55b242a8af0055b1bf0f6352c15ba9cf_bkransomware.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\ktab.exe aspnet_state.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Setup.exe aspnet_state.exe File opened for modification C:\Program Files (x86)\Internet Explorer\ielowutil.exe aspnet_state.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javah.exe 2024-04-28_55b242a8af0055b1bf0f6352c15ba9cf_bkransomware.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jconsole.exe 2024-04-28_55b242a8af0055b1bf0f6352c15ba9cf_bkransomware.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jinfo.exe 2024-04-28_55b242a8af0055b1bf0f6352c15ba9cf_bkransomware.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\tnameserv.exe 2024-04-28_55b242a8af0055b1bf0f6352c15ba9cf_bkransomware.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\javaw.exe 2024-04-28_55b242a8af0055b1bf0f6352c15ba9cf_bkransomware.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\template.exe 2024-04-28_55b242a8af0055b1bf0f6352c15ba9cf_bkransomware.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\java-rmi.exe aspnet_state.exe File opened for modification C:\Program Files\Java\jre7\bin\rmiregistry.exe aspnet_state.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\reader_sl.exe aspnet_state.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\Adobe AIR Application Installer.exe aspnet_state.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Oarpmany.exe aspnet_state.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javaws.exe 2024-04-28_55b242a8af0055b1bf0f6352c15ba9cf_bkransomware.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\kinit.exe 2024-04-28_55b242a8af0055b1bf0f6352c15ba9cf_bkransomware.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\xjc.exe 2024-04-28_55b242a8af0055b1bf0f6352c15ba9cf_bkransomware.exe File opened for modification C:\Program Files\Mozilla Firefox\private_browsing.exe 2024-04-28_55b242a8af0055b1bf0f6352c15ba9cf_bkransomware.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javah.exe aspnet_state.exe File opened for modification C:\Program Files\Mozilla Firefox\default-browser-agent.exe aspnet_state.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\LogTransport2.exe aspnet_state.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javaw.exe 2024-04-28_55b242a8af0055b1bf0f6352c15ba9cf_bkransomware.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jmap.exe 2024-04-28_55b242a8af0055b1bf0f6352c15ba9cf_bkransomware.exe File opened for modification C:\Program Files\Java\jre7\bin\tnameserv.exe 2024-04-28_55b242a8af0055b1bf0f6352c15ba9cf_bkransomware.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Updater6\Adobe_Updater.exe 2024-04-28_55b242a8af0055b1bf0f6352c15ba9cf_bkransomware.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateBroker.exe 2024-04-28_55b242a8af0055b1bf0f6352c15ba9cf_bkransomware.exe File opened for modification C:\Program Files\Mozilla Firefox\maintenanceservice_installer.exe aspnet_state.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32Info.exe aspnet_state.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\TextConv\WksConv\Wkconv.exe aspnet_state.exe -
Drops file in Windows directory 64 IoCs
Processes:
mscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exe2024-04-28_55b242a8af0055b1bf0f6352c15ba9cf_bkransomware.exemscorsvw.exemscorsvw.exemscorsvw.exeaspnet_state.exemscorsvw.exemscorsvw.exemscorsvw.exedescription ioc process File created C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngenofflinequeuelock.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index138.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index133.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index148.dat mscorsvw.exe File created C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngenrootstorelock.dat mscorsvw.exe File created C:\Windows\Microsoft.NET\ngenservice_pri3_lock.dat mscorsvw.exe File created C:\Windows\assembly\ngenlock.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index13a.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index142.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\index146.dat mscorsvw.exe File created C:\Windows\assembly\ngenlock.dat mscorsvw.exe File created C:\Windows\Microsoft.NET\Framework\v2.0.50727\ngenservicelock.dat mscorsvw.exe File created C:\Windows\assembly\ngenlock.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index13c.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index14a.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index149.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index14a.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index135.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index141.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\Temp\ZAP6A57.tmp\Microsoft.Office.Tools.Common.v9.0.dll mscorsvw.exe File created C:\Windows\Microsoft.NET\Framework\v2.0.50727\ngen_service.lock mscorsvw.exe File created C:\Windows\Microsoft.NET\ngennicupdatelock.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index135.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index138.dat mscorsvw.exe File created C:\Windows\assembly\ngenlock.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\index144.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\index13f.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\Temp\ZAP9CCC.tmp\Microsoft.VisualStudio.Tools.Applications.Adapter.v9.0.dll mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index134.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index13c.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\index142.dat mscorsvw.exe File created C:\Windows\assembly\GACLock.dat mscorsvw.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe 2024-04-28_55b242a8af0055b1bf0f6352c15ba9cf_bkransomware.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index137.dat mscorsvw.exe File created C:\Windows\assembly\GACLock.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index13e.dat mscorsvw.exe File created C:\Windows\assembly\ngenlock.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\Temp\ZAP76B6.tmp\Microsoft.Office.Tools.Outlook.v9.0.dll mscorsvw.exe File created C:\Windows\assembly\ngenlock.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\Temp\ZAP3840.tmp\stdole.dll mscorsvw.exe File created C:\Windows\assembly\GACLock.dat mscorsvw.exe File created C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngenservicelock.dat mscorsvw.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe aspnet_state.exe File created C:\Windows\assembly\GACLock.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\Temp\ZAP2674.tmp\Microsoft.VisualStudio.Tools.Office.HostAdapter.v10.0.dll mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index142.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index14b.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index137.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\Temp\ZAP1A06.tmp\Microsoft.VisualStudio.Tools.Applications.Contract.v10.0.dll mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index140.dat mscorsvw.exe File created C:\Windows\assembly\GACLock.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\index143.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index148.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index146.dat mscorsvw.exe File created C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngenservicelock.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index136.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\Temp\ZAPF8B.tmp\Microsoft.VisualStudio.Tools.Office.Word.AddInAdapter.v9.0.dll mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index139.dat mscorsvw.exe File created C:\Windows\assembly\ngenlock.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\index14b.dat mscorsvw.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe 2024-04-28_55b242a8af0055b1bf0f6352c15ba9cf_bkransomware.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\index13a.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\index148.dat mscorsvw.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\ngen_service.log mscorsvw.exe -
Modifies data under HKEY_USERS 64 IoCs
Processes:
SearchProtocolHost.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exeehRec.exemscorsvw.exewmpnetwk.exemscorsvw.exemscorsvw.exeGROOVE.EXEmscorsvw.exedescription ioc process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\SoundRecorder.exe,-32790 = "Record sound and save it on your computer." SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs mscorsvw.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\system32\Speech\SpeechUX\sapi.cpl,-5555 = "Windows Speech Recognition" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\system32\SnippingTool.exe,-15051 = "Snipping Tool" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs mscorsvw.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Program Files\Common Files\Microsoft Shared\Ink\ShapeCollector.exe,-298 = "Personalize Handwriting Recognition" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\system32\mstsc.exe,-4000 = "Remote Desktop Connection" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust mscorsvw.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\system32\SNTSearch.dll,-505 = "Sticky Notes" SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs mscorsvw.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@%windir%\system32\odbcint.dll,-1312 = "Maintains ODBC data sources and drivers." SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs mscorsvw.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@%CommonProgramFiles%\Microsoft Shared\Ink\ShapeCollector.exe,-299 = "Provide writing samples to help improve the recognition of your handwriting." SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@%systemroot%\system32\msconfig.exe,-1601 = "Perform advanced troubleshooting and system configuration" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs mscorsvw.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\SBE\SAL\CacheWaitForSize = "32" ehRec.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@%windir%\system32\mstsc.exe,-4001 = "Use your computer to connect to a computer that is located elsewhere and run programs or access files." SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\MediaPlayer\Health\{4BC0CFBD-646D-4F2D-9E5A-9B808B7E3447} wmpnetwk.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\system32\msinfo32.exe,-100 = "System Information" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings GROOVE.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates mscorsvw.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\system32\unregmp2.exe,-4 = "Windows Media Player" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople mscorsvw.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@%systemroot%\system32\Wdc.dll,-10025 = "Diagnose performance issues and collect performance data." SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\system32\gameux.dll,-10082 = "Games Explorer" SearchProtocolHost.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
Processes:
ehRec.exe2024-04-28_55b242a8af0055b1bf0f6352c15ba9cf_bkransomware.exeaspnet_state.exepid process 2300 ehRec.exe 1784 2024-04-28_55b242a8af0055b1bf0f6352c15ba9cf_bkransomware.exe 1784 2024-04-28_55b242a8af0055b1bf0f6352c15ba9cf_bkransomware.exe 1784 2024-04-28_55b242a8af0055b1bf0f6352c15ba9cf_bkransomware.exe 1784 2024-04-28_55b242a8af0055b1bf0f6352c15ba9cf_bkransomware.exe 1784 2024-04-28_55b242a8af0055b1bf0f6352c15ba9cf_bkransomware.exe 1784 2024-04-28_55b242a8af0055b1bf0f6352c15ba9cf_bkransomware.exe 1784 2024-04-28_55b242a8af0055b1bf0f6352c15ba9cf_bkransomware.exe 1784 2024-04-28_55b242a8af0055b1bf0f6352c15ba9cf_bkransomware.exe 1784 2024-04-28_55b242a8af0055b1bf0f6352c15ba9cf_bkransomware.exe 1784 2024-04-28_55b242a8af0055b1bf0f6352c15ba9cf_bkransomware.exe 1784 2024-04-28_55b242a8af0055b1bf0f6352c15ba9cf_bkransomware.exe 1784 2024-04-28_55b242a8af0055b1bf0f6352c15ba9cf_bkransomware.exe 1784 2024-04-28_55b242a8af0055b1bf0f6352c15ba9cf_bkransomware.exe 1784 2024-04-28_55b242a8af0055b1bf0f6352c15ba9cf_bkransomware.exe 1784 2024-04-28_55b242a8af0055b1bf0f6352c15ba9cf_bkransomware.exe 1784 2024-04-28_55b242a8af0055b1bf0f6352c15ba9cf_bkransomware.exe 1784 2024-04-28_55b242a8af0055b1bf0f6352c15ba9cf_bkransomware.exe 1784 2024-04-28_55b242a8af0055b1bf0f6352c15ba9cf_bkransomware.exe 1784 2024-04-28_55b242a8af0055b1bf0f6352c15ba9cf_bkransomware.exe 1784 2024-04-28_55b242a8af0055b1bf0f6352c15ba9cf_bkransomware.exe 1784 2024-04-28_55b242a8af0055b1bf0f6352c15ba9cf_bkransomware.exe 1784 2024-04-28_55b242a8af0055b1bf0f6352c15ba9cf_bkransomware.exe 1784 2024-04-28_55b242a8af0055b1bf0f6352c15ba9cf_bkransomware.exe 1784 2024-04-28_55b242a8af0055b1bf0f6352c15ba9cf_bkransomware.exe 1784 2024-04-28_55b242a8af0055b1bf0f6352c15ba9cf_bkransomware.exe 2632 aspnet_state.exe 2632 aspnet_state.exe 2632 aspnet_state.exe 2632 aspnet_state.exe 2632 aspnet_state.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
2024-04-28_55b242a8af0055b1bf0f6352c15ba9cf_bkransomware.exemscorsvw.exemscorsvw.exeEhTray.exeehRec.exemsiexec.exevssvc.exewbengine.exeSearchIndexer.exewmpnetwk.exeaspnet_state.exedescription pid process Token: SeTakeOwnershipPrivilege 1784 2024-04-28_55b242a8af0055b1bf0f6352c15ba9cf_bkransomware.exe Token: SeShutdownPrivilege 464 mscorsvw.exe Token: SeShutdownPrivilege 2752 mscorsvw.exe Token: 33 1640 EhTray.exe Token: SeIncBasePriorityPrivilege 1640 EhTray.exe Token: SeDebugPrivilege 2300 ehRec.exe Token: SeShutdownPrivilege 464 mscorsvw.exe Token: SeShutdownPrivilege 2752 mscorsvw.exe Token: SeShutdownPrivilege 464 mscorsvw.exe Token: SeShutdownPrivilege 464 mscorsvw.exe Token: SeShutdownPrivilege 2752 mscorsvw.exe Token: SeShutdownPrivilege 2752 mscorsvw.exe Token: SeRestorePrivilege 1136 msiexec.exe Token: SeTakeOwnershipPrivilege 1136 msiexec.exe Token: SeSecurityPrivilege 1136 msiexec.exe Token: 33 1640 EhTray.exe Token: SeIncBasePriorityPrivilege 1640 EhTray.exe Token: SeBackupPrivilege 1096 vssvc.exe Token: SeRestorePrivilege 1096 vssvc.exe Token: SeAuditPrivilege 1096 vssvc.exe Token: SeBackupPrivilege 2940 wbengine.exe Token: SeRestorePrivilege 2940 wbengine.exe Token: SeSecurityPrivilege 2940 wbengine.exe Token: SeManageVolumePrivilege 2088 SearchIndexer.exe Token: 33 2088 SearchIndexer.exe Token: SeIncBasePriorityPrivilege 2088 SearchIndexer.exe Token: 33 1688 wmpnetwk.exe Token: SeIncBasePriorityPrivilege 1688 wmpnetwk.exe Token: SeShutdownPrivilege 464 mscorsvw.exe Token: SeShutdownPrivilege 2752 mscorsvw.exe Token: SeDebugPrivilege 1784 2024-04-28_55b242a8af0055b1bf0f6352c15ba9cf_bkransomware.exe Token: SeDebugPrivilege 1784 2024-04-28_55b242a8af0055b1bf0f6352c15ba9cf_bkransomware.exe Token: SeDebugPrivilege 1784 2024-04-28_55b242a8af0055b1bf0f6352c15ba9cf_bkransomware.exe Token: SeDebugPrivilege 1784 2024-04-28_55b242a8af0055b1bf0f6352c15ba9cf_bkransomware.exe Token: SeDebugPrivilege 1784 2024-04-28_55b242a8af0055b1bf0f6352c15ba9cf_bkransomware.exe Token: SeShutdownPrivilege 464 mscorsvw.exe Token: SeShutdownPrivilege 2752 mscorsvw.exe Token: SeShutdownPrivilege 464 mscorsvw.exe Token: SeShutdownPrivilege 464 mscorsvw.exe Token: SeShutdownPrivilege 464 mscorsvw.exe Token: SeDebugPrivilege 2632 aspnet_state.exe Token: SeShutdownPrivilege 2752 mscorsvw.exe Token: SeShutdownPrivilege 2752 mscorsvw.exe Token: SeShutdownPrivilege 2752 mscorsvw.exe Token: SeShutdownPrivilege 464 mscorsvw.exe Token: SeShutdownPrivilege 2752 mscorsvw.exe Token: SeShutdownPrivilege 464 mscorsvw.exe Token: SeShutdownPrivilege 2752 mscorsvw.exe Token: SeShutdownPrivilege 464 mscorsvw.exe Token: SeShutdownPrivilege 2752 mscorsvw.exe Token: SeShutdownPrivilege 464 mscorsvw.exe Token: SeShutdownPrivilege 2752 mscorsvw.exe Token: SeShutdownPrivilege 464 mscorsvw.exe Token: SeShutdownPrivilege 2752 mscorsvw.exe Token: SeShutdownPrivilege 464 mscorsvw.exe Token: SeShutdownPrivilege 2752 mscorsvw.exe Token: SeShutdownPrivilege 464 mscorsvw.exe Token: SeShutdownPrivilege 2752 mscorsvw.exe Token: SeShutdownPrivilege 464 mscorsvw.exe Token: SeShutdownPrivilege 2752 mscorsvw.exe Token: SeShutdownPrivilege 464 mscorsvw.exe Token: SeShutdownPrivilege 2752 mscorsvw.exe Token: SeShutdownPrivilege 464 mscorsvw.exe Token: SeShutdownPrivilege 2752 mscorsvw.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
EhTray.exepid process 1640 EhTray.exe 1640 EhTray.exe -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
EhTray.exepid process 1640 EhTray.exe 1640 EhTray.exe -
Suspicious use of SetWindowsHookEx 23 IoCs
Processes:
SearchProtocolHost.exeSearchProtocolHost.exepid process 2756 SearchProtocolHost.exe 2756 SearchProtocolHost.exe 2756 SearchProtocolHost.exe 2756 SearchProtocolHost.exe 2756 SearchProtocolHost.exe 2988 SearchProtocolHost.exe 2988 SearchProtocolHost.exe 2988 SearchProtocolHost.exe 2988 SearchProtocolHost.exe 2988 SearchProtocolHost.exe 2988 SearchProtocolHost.exe 2988 SearchProtocolHost.exe 2988 SearchProtocolHost.exe 2988 SearchProtocolHost.exe 2988 SearchProtocolHost.exe 2988 SearchProtocolHost.exe 2988 SearchProtocolHost.exe 2988 SearchProtocolHost.exe 2988 SearchProtocolHost.exe 2988 SearchProtocolHost.exe 2988 SearchProtocolHost.exe 2988 SearchProtocolHost.exe 2756 SearchProtocolHost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
mscorsvw.exeSearchIndexer.exedescription pid process target process PID 464 wrote to memory of 2968 464 mscorsvw.exe mscorsvw.exe PID 464 wrote to memory of 2968 464 mscorsvw.exe mscorsvw.exe PID 464 wrote to memory of 2968 464 mscorsvw.exe mscorsvw.exe PID 464 wrote to memory of 2968 464 mscorsvw.exe mscorsvw.exe PID 464 wrote to memory of 2732 464 mscorsvw.exe mscorsvw.exe PID 464 wrote to memory of 2732 464 mscorsvw.exe mscorsvw.exe PID 464 wrote to memory of 2732 464 mscorsvw.exe mscorsvw.exe PID 464 wrote to memory of 2732 464 mscorsvw.exe mscorsvw.exe PID 464 wrote to memory of 1804 464 mscorsvw.exe mscorsvw.exe PID 464 wrote to memory of 1804 464 mscorsvw.exe mscorsvw.exe PID 464 wrote to memory of 1804 464 mscorsvw.exe mscorsvw.exe PID 464 wrote to memory of 1804 464 mscorsvw.exe mscorsvw.exe PID 464 wrote to memory of 2280 464 mscorsvw.exe mscorsvw.exe PID 464 wrote to memory of 2280 464 mscorsvw.exe mscorsvw.exe PID 464 wrote to memory of 2280 464 mscorsvw.exe mscorsvw.exe PID 464 wrote to memory of 2280 464 mscorsvw.exe mscorsvw.exe PID 464 wrote to memory of 2328 464 mscorsvw.exe mscorsvw.exe PID 464 wrote to memory of 2328 464 mscorsvw.exe mscorsvw.exe PID 464 wrote to memory of 2328 464 mscorsvw.exe mscorsvw.exe PID 464 wrote to memory of 2328 464 mscorsvw.exe mscorsvw.exe PID 464 wrote to memory of 1912 464 mscorsvw.exe mscorsvw.exe PID 464 wrote to memory of 1912 464 mscorsvw.exe mscorsvw.exe PID 464 wrote to memory of 1912 464 mscorsvw.exe mscorsvw.exe PID 464 wrote to memory of 1912 464 mscorsvw.exe mscorsvw.exe PID 464 wrote to memory of 2144 464 mscorsvw.exe mscorsvw.exe PID 464 wrote to memory of 2144 464 mscorsvw.exe mscorsvw.exe PID 464 wrote to memory of 2144 464 mscorsvw.exe mscorsvw.exe PID 464 wrote to memory of 2144 464 mscorsvw.exe mscorsvw.exe PID 464 wrote to memory of 2460 464 mscorsvw.exe mscorsvw.exe PID 464 wrote to memory of 2460 464 mscorsvw.exe mscorsvw.exe PID 464 wrote to memory of 2460 464 mscorsvw.exe mscorsvw.exe PID 464 wrote to memory of 2460 464 mscorsvw.exe mscorsvw.exe PID 464 wrote to memory of 1856 464 mscorsvw.exe mscorsvw.exe PID 464 wrote to memory of 1856 464 mscorsvw.exe mscorsvw.exe PID 464 wrote to memory of 1856 464 mscorsvw.exe mscorsvw.exe PID 464 wrote to memory of 1856 464 mscorsvw.exe mscorsvw.exe PID 464 wrote to memory of 1920 464 mscorsvw.exe mscorsvw.exe PID 464 wrote to memory of 1920 464 mscorsvw.exe mscorsvw.exe PID 464 wrote to memory of 1920 464 mscorsvw.exe mscorsvw.exe PID 464 wrote to memory of 1920 464 mscorsvw.exe mscorsvw.exe PID 464 wrote to memory of 2456 464 mscorsvw.exe mscorsvw.exe PID 464 wrote to memory of 2456 464 mscorsvw.exe mscorsvw.exe PID 464 wrote to memory of 2456 464 mscorsvw.exe mscorsvw.exe PID 464 wrote to memory of 2456 464 mscorsvw.exe mscorsvw.exe PID 464 wrote to memory of 1284 464 mscorsvw.exe mscorsvw.exe PID 464 wrote to memory of 1284 464 mscorsvw.exe mscorsvw.exe PID 464 wrote to memory of 1284 464 mscorsvw.exe mscorsvw.exe PID 464 wrote to memory of 1284 464 mscorsvw.exe mscorsvw.exe PID 464 wrote to memory of 2000 464 mscorsvw.exe mscorsvw.exe PID 464 wrote to memory of 2000 464 mscorsvw.exe mscorsvw.exe PID 464 wrote to memory of 2000 464 mscorsvw.exe mscorsvw.exe PID 464 wrote to memory of 2000 464 mscorsvw.exe mscorsvw.exe PID 464 wrote to memory of 2280 464 mscorsvw.exe mscorsvw.exe PID 464 wrote to memory of 2280 464 mscorsvw.exe mscorsvw.exe PID 464 wrote to memory of 2280 464 mscorsvw.exe mscorsvw.exe PID 464 wrote to memory of 2280 464 mscorsvw.exe mscorsvw.exe PID 2088 wrote to memory of 2756 2088 SearchIndexer.exe SearchProtocolHost.exe PID 2088 wrote to memory of 2756 2088 SearchIndexer.exe SearchProtocolHost.exe PID 2088 wrote to memory of 2756 2088 SearchIndexer.exe SearchProtocolHost.exe PID 2088 wrote to memory of 2604 2088 SearchIndexer.exe SearchFilterHost.exe PID 2088 wrote to memory of 2604 2088 SearchIndexer.exe SearchFilterHost.exe PID 2088 wrote to memory of 2604 2088 SearchIndexer.exe SearchFilterHost.exe PID 464 wrote to memory of 836 464 mscorsvw.exe mscorsvw.exe PID 464 wrote to memory of 836 464 mscorsvw.exe mscorsvw.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_55b242a8af0055b1bf0f6352c15ba9cf_bkransomware.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-28_55b242a8af0055b1bf0f6352c15ba9cf_bkransomware.exe"1⤵
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\alg.exeC:\Windows\System32\alg.exe1⤵
- Executes dropped EXE
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
-
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe1⤵
- Executes dropped EXE
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1e8 -InterruptEvent 1d4 -NGENProcess 1d8 -Pipe 1e4 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 258 -InterruptEvent 1d4 -NGENProcess 1d8 -Pipe 1e8 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1d4 -InterruptEvent 25c -NGENProcess 24c -Pipe 248 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 244 -InterruptEvent 258 -NGENProcess 260 -Pipe 1d4 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 258 -InterruptEvent 264 -NGENProcess 24c -Pipe 1f0 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 264 -InterruptEvent 26c -NGENProcess 250 -Pipe 268 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 264 -InterruptEvent 23c -NGENProcess 258 -Pipe 1d8 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 23c -InterruptEvent 240 -NGENProcess 26c -Pipe 260 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 240 -InterruptEvent 27c -NGENProcess 25c -Pipe 278 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 27c -InterruptEvent 284 -NGENProcess 250 -Pipe 280 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 284 -InterruptEvent 28c -NGENProcess 270 -Pipe 288 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 28c -InterruptEvent 294 -NGENProcess 258 -Pipe 290 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 284 -InterruptEvent 244 -NGENProcess 27c -Pipe 264 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 294 -InterruptEvent 240 -NGENProcess 258 -Pipe 284 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 240 -InterruptEvent 25c -NGENProcess 27c -Pipe 28c -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 244 -InterruptEvent 294 -NGENProcess 298 -Pipe 240 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 29c -InterruptEvent 294 -NGENProcess 244 -Pipe 27c -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 258 -InterruptEvent 274 -NGENProcess 250 -Pipe 29c -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 274 -InterruptEvent 24c -NGENProcess 244 -Pipe 26c -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2a0 -InterruptEvent 258 -NGENProcess 2a4 -Pipe 274 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 258 -InterruptEvent 2a8 -NGENProcess 244 -Pipe 23c -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2a8 -InterruptEvent 2b0 -NGENProcess 250 -Pipe 2ac -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2b4 -InterruptEvent 258 -NGENProcess 2b8 -Pipe 2a8 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 23c -InterruptEvent 2ac -NGENProcess 22c -Pipe 1f8 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2ac -InterruptEvent 1f0 -NGENProcess 26c -Pipe 268 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1f0 -InterruptEvent 1d4 -NGENProcess 278 -Pipe 1d8 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1d4 -InterruptEvent 248 -NGENProcess 22c -Pipe 280 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 248 -InterruptEvent 1e8 -NGENProcess 26c -Pipe 218 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1e8 -InterruptEvent 22c -NGENProcess 26c -Pipe 218 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 22c -InterruptEvent 1d0 -NGENProcess 21c -Pipe 1c4 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1d0 -InterruptEvent 21c -NGENProcess 1e8 -Pipe 23c -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 21c -InterruptEvent 250 -NGENProcess 26c -Pipe 278 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2b4 -InterruptEvent 1d0 -NGENProcess 260 -Pipe 250 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1d0 -InterruptEvent 2a4 -NGENProcess 1e8 -Pipe 22c -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2a4 -InterruptEvent 1e8 -NGENProcess 2b4 -Pipe 26c -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1e8 -InterruptEvent 2b8 -NGENProcess 260 -Pipe 21c -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2b8 -InterruptEvent 1e8 -NGENProcess 270 -Pipe 2a4 -Comment "NGen Worker Process"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1e8 -InterruptEvent 294 -NGENProcess 260 -Pipe 1d0 -Comment "NGen Worker Process"2⤵
- Loads dropped DLL
- Drops file in Windows directory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 294 -InterruptEvent 260 -NGENProcess 2b8 -Pipe 2b0 -Comment "NGen Worker Process"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 24c -InterruptEvent 260 -NGENProcess 294 -Pipe 270 -Comment "NGen Worker Process"2⤵
- Loads dropped DLL
- Drops file in Windows directory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 260 -InterruptEvent 294 -NGENProcess 1e8 -Pipe 2b8 -Comment "NGen Worker Process"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 294 -InterruptEvent 2c0 -NGENProcess 2ac -Pipe 2b4 -Comment "NGen Worker Process"2⤵
- Loads dropped DLL
- Drops file in Windows directory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2c0 -InterruptEvent 2ac -NGENProcess 260 -Pipe 258 -Comment "NGen Worker Process"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2ac -InterruptEvent 2cc -NGENProcess 1e8 -Pipe 2c8 -Comment "NGen Worker Process"2⤵
- Loads dropped DLL
- Drops file in Windows directory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2cc -InterruptEvent 2ac -NGENProcess 294 -Pipe 2c0 -Comment "NGen Worker Process"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2ac -InterruptEvent 2c4 -NGENProcess 1e8 -Pipe 260 -Comment "NGen Worker Process"2⤵
- Loads dropped DLL
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2c4 -InterruptEvent 1e8 -NGENProcess 2cc -Pipe 2d4 -Comment "NGen Worker Process"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2d8 -InterruptEvent 2d0 -NGENProcess 2dc -Pipe 2c4 -Comment "NGen Worker Process"2⤵
- Loads dropped DLL
- Drops file in Windows directory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2d0 -InterruptEvent 2dc -NGENProcess 294 -Pipe 2cc -Comment "NGen Worker Process"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2e0 -InterruptEvent 2bc -NGENProcess 2e4 -Pipe 2d0 -Comment "NGen Worker Process"2⤵
- Loads dropped DLL
- Drops file in Windows directory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2bc -InterruptEvent 2e4 -NGENProcess 1e8 -Pipe 294 -Comment "NGen Worker Process"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2e4 -InterruptEvent 1e8 -NGENProcess 2e0 -Pipe 2ec -Comment "NGen Worker Process"2⤵
- Loads dropped DLL
- Drops file in Windows directory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1e8 -InterruptEvent 2e0 -NGENProcess 2ac -Pipe 2e8 -Comment "NGen Worker Process"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2e0 -InterruptEvent 2f0 -NGENProcess 2bc -Pipe 244 -Comment "NGen Worker Process"2⤵
- Loads dropped DLL
- Drops file in Windows directory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2f0 -InterruptEvent 2bc -NGENProcess 1e8 -Pipe 24c -Comment "NGen Worker Process"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2bc -InterruptEvent 2f8 -NGENProcess 2ac -Pipe 2e4 -Comment "NGen Worker Process"2⤵
- Loads dropped DLL
- Drops file in Windows directory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2f8 -InterruptEvent 2ac -NGENProcess 2f0 -Pipe 2f4 -Comment "NGen Worker Process"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2ac -InterruptEvent 300 -NGENProcess 1e8 -Pipe 2e0 -Comment "NGen Worker Process"2⤵
- Loads dropped DLL
- Drops file in Windows directory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 300 -InterruptEvent 1e8 -NGENProcess 2f8 -Pipe 2fc -Comment "NGen Worker Process"2⤵
- Modifies data under HKEY_USERS
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1e8 -InterruptEvent 308 -NGENProcess 2f0 -Pipe 2bc -Comment "NGen Worker Process"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 308 -InterruptEvent 30c -NGENProcess 304 -Pipe 2d8 -Comment "NGen Worker Process"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 30c -InterruptEvent 314 -NGENProcess 2f8 -Pipe 310 -Comment "NGen Worker Process"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 314 -InterruptEvent 2ac -NGENProcess 1d4 -Pipe 2f0 -Comment "NGen Worker Process"2⤵
- Loads dropped DLL
- Drops file in Windows directory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2ac -InterruptEvent 1d4 -NGENProcess 30c -Pipe 1e8 -Comment "NGen Worker Process"2⤵
- Loads dropped DLL
- Drops file in Windows directory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1d4 -InterruptEvent 30c -NGENProcess 2dc -Pipe 2f8 -Comment "NGen Worker Process"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 30c -InterruptEvent 320 -NGENProcess 318 -Pipe 308 -Comment "NGen Worker Process"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 320 -InterruptEvent 324 -NGENProcess 31c -Pipe 314 -Comment "NGen Worker Process"2⤵
- Modifies data under HKEY_USERS
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 324 -InterruptEvent 328 -NGENProcess 2dc -Pipe 2ac -Comment "NGen Worker Process"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 328 -InterruptEvent 32c -NGENProcess 318 -Pipe 300 -Comment "NGen Worker Process"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 32c -InterruptEvent 330 -NGENProcess 31c -Pipe 1d4 -Comment "NGen Worker Process"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 330 -InterruptEvent 334 -NGENProcess 2dc -Pipe 30c -Comment "NGen Worker Process"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 334 -InterruptEvent 338 -NGENProcess 318 -Pipe 320 -Comment "NGen Worker Process"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 338 -InterruptEvent 32c -NGENProcess 31c -Pipe 340 -Comment "NGen Worker Process"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 324 -InterruptEvent 32c -NGENProcess 338 -Pipe 33c -Comment "NGen Worker Process"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 32c -InterruptEvent 328 -NGENProcess 31c -Pipe 304 -Comment "NGen Worker Process"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 348 -InterruptEvent 328 -NGENProcess 32c -Pipe 334 -Comment "NGen Worker Process"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 328 -InterruptEvent 2dc -NGENProcess 31c -Pipe 344 -Comment "NGen Worker Process"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2dc -InterruptEvent 350 -NGENProcess 324 -Pipe 318 -Comment "NGen Worker Process"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 350 -InterruptEvent 354 -NGENProcess 32c -Pipe 34c -Comment "NGen Worker Process"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 358 -InterruptEvent 350 -NGENProcess 354 -Pipe 31c -Comment "NGen Worker Process"2⤵
- Modifies data under HKEY_USERS
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 350 -InterruptEvent 354 -NGENProcess 35c -Pipe 360 -Comment "NGen Worker Process"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 348 -InterruptEvent 328 -NGENProcess 364 -Pipe 350 -Comment "NGen Worker Process"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 328 -InterruptEvent 338 -NGENProcess 35c -Pipe 324 -Comment "NGen Worker Process"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 368 -InterruptEvent 338 -NGENProcess 328 -Pipe 354 -Comment "NGen Worker Process"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 338 -InterruptEvent 36c -NGENProcess 35c -Pipe 370 -Comment "NGen Worker Process"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 36c -InterruptEvent 32c -NGENProcess 2dc -Pipe 358 -Comment "NGen Worker Process"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 32c -InterruptEvent 374 -NGENProcess 328 -Pipe 364 -Comment "NGen Worker Process"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 374 -InterruptEvent 378 -NGENProcess 35c -Pipe 330 -Comment "NGen Worker Process"2⤵
- Modifies data under HKEY_USERS
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 378 -InterruptEvent 37c -NGENProcess 2dc -Pipe 368 -Comment "NGen Worker Process"2⤵
- Modifies data under HKEY_USERS
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 37c -InterruptEvent 380 -NGENProcess 328 -Pipe 338 -Comment "NGen Worker Process"2⤵
- Modifies data under HKEY_USERS
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 380 -InterruptEvent 384 -NGENProcess 35c -Pipe 36c -Comment "NGen Worker Process"2⤵
- Modifies data under HKEY_USERS
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2dc -InterruptEvent 384 -NGENProcess 388 -Pipe 37c -Comment "NGen Worker Process"2⤵
- Modifies data under HKEY_USERS
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 384 -InterruptEvent 32c -NGENProcess 35c -Pipe 374 -Comment "NGen Worker Process"2⤵
- Modifies data under HKEY_USERS
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 32c -InterruptEvent 390 -NGENProcess 380 -Pipe 348 -Comment "NGen Worker Process"2⤵
- Modifies data under HKEY_USERS
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 32c -InterruptEvent 208 -NGENProcess 384 -Pipe 388 -Comment "NGen Worker Process"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 328 -InterruptEvent 208 -NGENProcess 32c -Pipe 390 -Comment "NGen Worker Process"2⤵
- Modifies data under HKEY_USERS
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 208 -InterruptEvent 2dc -NGENProcess 384 -Pipe 380 -Comment "NGen Worker Process"2⤵
- Modifies data under HKEY_USERS
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2dc -InterruptEvent 398 -NGENProcess 394 -Pipe 35c -Comment "NGen Worker Process"2⤵
- Modifies data under HKEY_USERS
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 398 -InterruptEvent 39c -NGENProcess 32c -Pipe 38c -Comment "NGen Worker Process"2⤵
- Modifies data under HKEY_USERS
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 39c -InterruptEvent 3a0 -NGENProcess 384 -Pipe 20c -Comment "NGen Worker Process"2⤵
- Loads dropped DLL
- Drops file in Windows directory
- Modifies data under HKEY_USERS
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3a0 -InterruptEvent 384 -NGENProcess 398 -Pipe 394 -Comment "NGen Worker Process"2⤵
- Modifies data under HKEY_USERS
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 384 -InterruptEvent 3a8 -NGENProcess 32c -Pipe 208 -Comment "NGen Worker Process"2⤵
- Loads dropped DLL
- Drops file in Windows directory
- Modifies data under HKEY_USERS
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3a8 -InterruptEvent 32c -NGENProcess 3a0 -Pipe 3a4 -Comment "NGen Worker Process"2⤵
- Modifies data under HKEY_USERS
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 32c -InterruptEvent 3b0 -NGENProcess 398 -Pipe 39c -Comment "NGen Worker Process"2⤵
- Loads dropped DLL
- Drops file in Windows directory
- Modifies data under HKEY_USERS
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3b0 -InterruptEvent 398 -NGENProcess 3a8 -Pipe 3ac -Comment "NGen Worker Process"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 398 -InterruptEvent 3b8 -NGENProcess 3a0 -Pipe 384 -Comment "NGen Worker Process"2⤵
- Modifies data under HKEY_USERS
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3b8 -InterruptEvent 3bc -NGENProcess 3b4 -Pipe 2dc -Comment "NGen Worker Process"2⤵
- Loads dropped DLL
- Drops file in Windows directory
- Modifies data under HKEY_USERS
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3c0 -InterruptEvent 398 -NGENProcess 3c4 -Pipe 3b8 -Comment "NGen Worker Process"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 398 -InterruptEvent 32c -NGENProcess 3b4 -Pipe 328 -Comment "NGen Worker Process"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 32c -InterruptEvent 3c8 -NGENProcess 3bc -Pipe 378 -Comment "NGen Worker Process"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3c8 -InterruptEvent 3cc -NGENProcess 3c4 -Pipe 3b0 -Comment "NGen Worker Process"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3d0 -InterruptEvent 32c -NGENProcess 3d4 -Pipe 3c8 -Comment "NGen Worker Process"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 32c -InterruptEvent 3a8 -NGENProcess 3c4 -Pipe 3c0 -Comment "NGen Worker Process"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3a8 -InterruptEvent 3d8 -NGENProcess 3cc -Pipe 3a0 -Comment "NGen Worker Process"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3d8 -InterruptEvent 3dc -NGENProcess 3d4 -Pipe 398 -Comment "NGen Worker Process"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3dc -InterruptEvent 3e0 -NGENProcess 3c4 -Pipe 3b4 -Comment "NGen Worker Process"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3e0 -InterruptEvent 3e4 -NGENProcess 3cc -Pipe 3d0 -Comment "NGen Worker Process"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3e4 -InterruptEvent 3e8 -NGENProcess 3d4 -Pipe 32c -Comment "NGen Worker Process"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3e8 -InterruptEvent 3ec -NGENProcess 3c4 -Pipe 3a8 -Comment "NGen Worker Process"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3f0 -InterruptEvent 3e4 -NGENProcess 3f4 -Pipe 3e8 -Comment "NGen Worker Process"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3e4 -InterruptEvent 3d8 -NGENProcess 3c4 -Pipe 3dc -Comment "NGen Worker Process"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3d8 -InterruptEvent 3f8 -NGENProcess 3ec -Pipe 3bc -Comment "NGen Worker Process"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3f8 -InterruptEvent 3fc -NGENProcess 3f4 -Pipe 3e0 -Comment "NGen Worker Process"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3fc -InterruptEvent 3f4 -NGENProcess 3e4 -Pipe 408 -Comment "NGen Worker Process"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3f4 -InterruptEvent 3c4 -NGENProcess 404 -Pipe 40c -Comment "NGen Worker Process"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3c4 -InterruptEvent 3f0 -NGENProcess 3cc -Pipe 3d4 -Comment "NGen Worker Process"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3f0 -InterruptEvent 410 -NGENProcess 3e4 -Pipe 3ec -Comment "NGen Worker Process"2⤵
- Loads dropped DLL
- Drops file in Windows directory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 414 -InterruptEvent 3cc -NGENProcess 3e4 -Pipe 3d8 -Comment "NGen Worker Process"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3cc -InterruptEvent 41c -NGENProcess 3f4 -Pipe 418 -Comment "NGen Worker Process"2⤵
- Loads dropped DLL
- Drops file in Windows directory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 41c -InterruptEvent 3f4 -NGENProcess 414 -Pipe 3c4 -Comment "NGen Worker Process"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3f4 -InterruptEvent 414 -NGENProcess 25c -Pipe 424 -Comment "NGen Worker Process"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 414 -InterruptEvent 25c -NGENProcess 3e4 -Pipe 428 -Comment "NGen Worker Process"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 25c -InterruptEvent 3fc -NGENProcess 410 -Pipe 420 -Comment "NGen Worker Process"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3fc -InterruptEvent 42c -NGENProcess 3f4 -Pipe 3cc -Comment "NGen Worker Process"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 42c -InterruptEvent 430 -NGENProcess 3e4 -Pipe 404 -Comment "NGen Worker Process"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 434 -InterruptEvent 3fc -NGENProcess 438 -Pipe 42c -Comment "NGen Worker Process"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3fc -InterruptEvent 3f8 -NGENProcess 3e4 -Pipe 414 -Comment "NGen Worker Process"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 43c -InterruptEvent 434 -NGENProcess 440 -Pipe 3fc -Comment "NGen Worker Process"2⤵
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 1dc -InterruptEvent 1c8 -NGENProcess 1cc -Pipe 1d8 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 1d4 -InterruptEvent 238 -NGENProcess 240 -Pipe 244 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
-
C:\Windows\ehome\ehRecvr.exeC:\Windows\ehome\ehRecvr.exe1⤵
- Executes dropped EXE
-
C:\Windows\ehome\ehsched.exeC:\Windows\ehome\ehsched.exe1⤵
- Executes dropped EXE
-
C:\Windows\eHome\EhTray.exe"C:\Windows\eHome\EhTray.exe" /nav:-21⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵
- Executes dropped EXE
-
C:\Windows\ehome\ehRec.exeC:\Windows\ehome\ehRec.exe -Embedding1⤵
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\IEEtwCollector.exeC:\Windows\system32\IEEtwCollector.exe /V1⤵
- Executes dropped EXE
-
C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE"C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE" /auditservice1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
-
C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"1⤵
- Executes dropped EXE
-
C:\Windows\System32\msdtc.exeC:\Windows\System32\msdtc.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
-
C:\Program Files (x86)\Common Files\Microsoft Shared\Source Engine\OSE.EXE"C:\Program Files (x86)\Common Files\Microsoft Shared\Source Engine\OSE.EXE"1⤵
- Executes dropped EXE
-
C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"1⤵
- Executes dropped EXE
-
C:\Windows\SysWow64\perfhost.exeC:\Windows\SysWow64\perfhost.exe1⤵
- Executes dropped EXE
-
C:\Windows\system32\locator.exeC:\Windows\system32\locator.exe1⤵
- Executes dropped EXE
-
C:\Windows\System32\snmptrap.exeC:\Windows\System32\snmptrap.exe1⤵
- Executes dropped EXE
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵
- Executes dropped EXE
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵
- Executes dropped EXE
-
C:\Program Files\Windows Media Player\wmpnetwk.exe"C:\Program Files\Windows Media Player\wmpnetwk.exe"1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\SearchIndexer.exeC:\Windows\system32\SearchIndexer.exe /Embedding1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\SearchProtocolHost.exe"C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe_S-1-5-21-330940541-141609230-1670313778-10001_ Global\UsGthrCtrlFltPipeMssGthrPipe_S-1-5-21-330940541-141609230-1670313778-10001 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon" "1"2⤵
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\SearchFilterHost.exe"C:\Windows\system32\SearchFilterHost.exe" 0 588 592 600 65536 5962⤵
-
C:\Windows\system32\SearchProtocolHost.exe"C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe2_ Global\UsGthrCtrlFltPipeMssGthrPipe2 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon"2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\Common Files\microsoft shared\Source Engine\OSE.EXEFilesize
706KB
MD5c3a95f05f82eacb3a462ab53f4cf99c7
SHA1be158108cafb559dec1d8cadd0d7a844fd9da7f4
SHA2566ba338fa5918aae1416e9e124fd970e3ef997a30ca0a887b4f301145dc31cffd
SHA51278e0bc0cad4ad189551ed6ba65bd060a4bf53d10fc575fcd73e368c63000598941f24c2130422c29f6e3a814d279465c1868286dc1bb49ec4ded500594087719
-
C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXEFilesize
30.1MB
MD5b6ec63ce594c2411290e5a120e6d0b37
SHA1bf71c62143160b508eb0499dae8eccd61cc77d5b
SHA256c1d7c26a315c8996dae3167f39f67e5171b64112c806094b4af5844fa356f0c6
SHA512fa3d8d1d5f279d7f55c688160c8211aae5564f9aced44dd2a3ae5a8afb0f268e57529bd4d6dd71eb0dbd7b8f821aea0b877ac57b1e1d590c6469a800ee0e9a03
-
C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exeFilesize
781KB
MD5b39cb88fbc63c9fe46e80330b749af67
SHA1f2e036c6e93227b618984b5d22da06dcfc6567ee
SHA256596a79ee4de5481d8171f45289be2ea65be3d3c78c6c50da71a3ee248984df8a
SHA512a354a4c240e3204a18ca48bf6cbe92238ae77e4cb54c1d53527a5ff9651065f778d81943552bbcee42e77f5b99840d973164692a666fa356813bc8c5566c79f7
-
C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXEFilesize
5.2MB
MD51bdfc1f2cf7cec1babdf2117cfcf88e9
SHA16a52977e9bfee998249df8da733524d5bd4600e0
SHA256a80efa3092dec6dc717ba9c5a1b236f51b4918b932e8c1f447b53f2b4a0d24f0
SHA512fc9a37529cb5df68c210cb030d188497ecae559333c061560f7fda6e5647789334427b07fb9db420c3eb94854f19364bcd52852f4f66375ce0fcb04670d25409
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exeFilesize
2.1MB
MD590eda4df3c4524c7088b519670d4b8b9
SHA16bb81e17329cd1c038a10e56065b8192ea89b8be
SHA256812c01d4a4b3597fe833cab5f8280e296d2f4bc1511b9a3a8608f4ba50c77781
SHA5126807d166de64d6beb0e93149b2519331f01a2624257a71dc1096966377147ed16db11218eae0740e66471d26cbf2538ea1e4a458c13e0f6eff7d92d00ce440e4
-
C:\Program Files\Windows Media Player\wmpnetwk.exeFilesize
2.0MB
MD52578a5fa93e6d47cbb038c70ffba2d76
SHA1b9dfc6049416ef89a94241f7afc0a69e2d3aa98f
SHA25625ce017cbaec5f8b58ea65215bf42267d257ce7030607ebba62cdecc1c1c8cdd
SHA512d7f19e725a5d2d199a886a0f57542e5cea461b0f9a902d517504de54aecd3063fe6ecd83ca656353fb83b0aaa0a8e6ab8fea1c6ef3bd5af63b2e8bb3731f991b
-
C:\ProgramData\Microsoft\Search\Data\Applications\Windows\MSS.logFilesize
1024KB
MD5e4e8bd22f7cb41cb482ed6d096f5454a
SHA1fd9e9fbb155380f3cebd918891f934e7e2b9939f
SHA2564e7e364eb559c776fce47c248d882a8f06d7dacc08355e2254d1893c742042e7
SHA512a7e93e1d162fe82c3ee30d315777bee259ea8bf362fe6309b18a5c7b28bd311fbcefb14442b1618e8d75e37faf03ac9542b1969c15b503aa589e128ee9b4d93a
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b91050d8b077a4e8.customDestinations-msFilesize
24B
MD5b9bd716de6739e51c620f2086f9c31e4
SHA19733d94607a3cba277e567af584510edd9febf62
SHA2567116ff028244a01f3d17f1d3bc2e1506bc9999c2e40e388458f0cccc4e117312
SHA512cef609e54c7a81a646ad38dba7ac0b82401b220773b9c792cefac80c6564753229f0c011b34ffb56381dd3154a19aee2bf5f602c4d1af01f2cf0fbc1574e4478
-
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ngen_service.logFilesize
872KB
MD533d35340229b4307f972402023566b84
SHA1b86856e5d1cb9b519271a35e2b02fa30abd1885c
SHA256351a6f35e1da283fd739774d4258b748d93caba9f491da1ad3c3c334e8db7fba
SHA51246ad842b40c5eede69c6e4c428e18cd79618385465e8f22c1121692a23bcee32f24e8ac0601a69a38d109c25f3a052ab81259532071bda752123ce4e7b90c4b9
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeFilesize
678KB
MD50cd65c74f51b918c6dae7d9b05ff06f0
SHA1a02f713e45d9bf68f024253a4305081e720b3f00
SHA256636d518980547f49427b351ead81963f557835467277bddb9f2ae5ade4407556
SHA512753989ce8d89d084a7900d1b197a0e77520b42950814f1d4d9d7a341d7f8d6b5ab8b67ef5f3280f7cf4ce8557c8768212bd5c16c948dcc16625855f9016d6318
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exeFilesize
625KB
MD5b4721cf9dc6ed0b1d90f059d630e22b9
SHA15ac8b4499c616786484ee1b6c4d6e381bdc1d0fc
SHA256c2f97ad0279dde3cdd2aae7adcd5a742e98ec3490639caaa26a668dba1b74195
SHA5128f556f160ab2f65c0f15d1135f7125472644cebb5ae5ca39cf77de23913a762bfe0e220a314b2d6db90e65152786351d295ed70a03f82126956a1f542c4066c5
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\ngen_service.logFilesize
1003KB
MD5deb198ff5d04931b2e122764fd8daa02
SHA13aa18d07ea6d231c9443ebaec3381acbbc97a9e3
SHA256470c09e90ef010530271d7b784dbef141cfe1c4c823f5a6bf706513c44e7db7f
SHA512d4098acd17ff5fc9dbc7fdd104f11bd6f44a7bba57fc0da01aa91a29f55463beef92d4c33bc8294001f737fb73b06776d90654afcde965913b945e56e4536cd2
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeFilesize
656KB
MD509cad7f4c142df35ccf00d496ea303e0
SHA1ba1b3fc46ffd3a40b76552f46524e49e66612f5e
SHA256985bc81b792f34f29d00431f5824ecfa11ed92090eefdb67e50b4541213d93bb
SHA5125470c43e79f9aa3594f80d688e800a7c9276f854bc2810819f3e385b4d271dbc280b05b6a1c23e43bd52a81326d2024d41b3af1baf31f9083e2aa7b6faa15ca9
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen_service.logFilesize
8KB
MD529807ebaadfc0e6f79559b1142f4d2b1
SHA10e66aeecda8190b68d8c5c40ec9e5bd581ff93fd
SHA2562bacbb7f66d0a017a291984490af52dfcb4a8bb221fdfac256eeb0278ae5f7e3
SHA512b44371d0739da9b6d570cf127e6ba75b450977401653fb9f1c45f5c1e911b7defb222a4e1dda9507e1d7e68936c183072dd9c7de322be8b13c6ba53b0e09c44e
-
C:\Windows\SysWOW64\perfhost.exeFilesize
587KB
MD56b156795e38382b41049a2e6032c61a7
SHA1a72b00b717417978bfaee00162afda2d962b572c
SHA2565ddbc45aea916360d39110b3c744eb05553143bac42cfd250d098c7b5358b977
SHA51221df499e1df14be714b59dcbe7a81afad050ee326cf2c5234b1cbffdd38e11106e9f9c9d63754a7c79ff4663fd7b9d4d57b507209f46cd931d6f35f93a8ce823
-
C:\Windows\System32\Locator.exeFilesize
577KB
MD5d13bd5c50bee7cbcf851f4849b3407b7
SHA1681085b103ed6c976496c588647c5a494222c727
SHA25696aa8cf4c99d496c3a6b47291c0dfc81a207d5e0911d906ab62fadf5732bf667
SHA512368725f081ae0dbe8496b3176ce01e0c6b68d29c86f1f1afcc2a7ef304f5b499dd76a30fa9092072c5298095520d75eaf362ad4bd7e2e31e9487ecceb0cc1222
-
C:\Windows\System32\SearchIndexer.exeFilesize
1.1MB
MD54f6e21123df58c508a980e28af4cf3c1
SHA19a81715113844264783822a8b45c066aa428c01d
SHA25619bee9974a9e970fc2f2b004383e6f90798aa336d96f6a7007724383baf63fa5
SHA5124f4defa0550cd6da88300ac160621580296cebdbf536c3b40ee2145cbb07ad3ea586a2ecb23e4096e9a7d486686291aed35636059dbbf8f9eed2f44b58ea92a4
-
C:\Windows\System32\VSSVC.exeFilesize
2.1MB
MD5d3b3055b1164446e69ed6a4b810a1b38
SHA16d680407dc8b08ddce4c1756b9431a4de7578b21
SHA2563800e521c26b8fd05afdb1c32082dc10cfe1cab6a5fede3eea06ef87149c9ad5
SHA5129307bc26c9f3f8151386ec281600e334ab33af3bcb6910a2d1569566853b1b753dcdaa653a812ab3eb3151f38e05e5588a4620f163ddcf6b36f2f761f0da64b4
-
C:\Windows\System32\vds.exeFilesize
1.1MB
MD531ea88aa33d27730e7a09445a31187bb
SHA1820a3041bb0412c87d1142248fb9202e75336cf7
SHA256fbcddbb8d159d4323f8a9221f88c35a4f0b267e8f9461619e388860964bbe62a
SHA51253fbf04ad1954805d9f6e3c461af2e1aa3dfd044f9a57c9b5140c7ecb352f85667e70a90b1d048e1056e8189576cfc8136941203ba48c8ed03268da762a93fa2
-
C:\Windows\System32\wbengine.exeFilesize
2.0MB
MD5f172887ed86e4b458410f149944a7511
SHA1ddd8b823efbbfc9321cf2b027ba5a5b35fe11c66
SHA256d22860f8b8d67c92ac6f75a75a33f21c28dc18de575f57607d384788fcedf4ed
SHA5120761369fba215add6a32dba60c8ead756e8e9f3414003bba4b8ecb88468d7ad9fd727ca013cfdd60cf388c1ef880cd8976ef8680b2ab53ce42058f556552aa76
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.Office.To#\135228e87b2c27d26b516ac0fc0ce667\Microsoft.Office.Tools.Word.v9.0.ni.dllFilesize
834KB
MD5c76656b09bb7df6bd2ac1a6177a0027c
SHA10c296994a249e8649b19be84dce27c9ddafef3e0
SHA256a0ae0aec5b203865fac761023741a59d274e2c41889aeb69140eb746d38f6ce0
SHA5128390879b8812fc98c17702a52259d510a7fe8bc3cf4972e89f705e93bc8fa98300c34d49f3aec869da8d9f786d33004742e4538019c0f852c61db89c302d5fdf
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.Office.To#\5766ec3721d18a48bec1ca1f60331e2d\Microsoft.Office.Tools.Common.v9.0.ni.dllFilesize
797KB
MD5aeb0b6e6c5d32d1ada231285ff2ae881
SHA11f04a1c059503896336406aed1dc93340e90b742
SHA2564c53ca542ac5ef9d822ef8cb3b0ecef3fb8b937d94c0a7b735bedb275c74a263
SHA512e55fd4c4d2966b3f0b6e88292fbd6c20ffa34766e076e763442c15212d19b6dea5d9dc9e7c359d999674a5b2c8a3849c2bbaaf83e7aa8c12715028b06b5a48e1
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.Office.To#\60214b09b490be856c4ee2b3398d71bd\Microsoft.Office.Tools.Outlook.v9.0.ni.dllFilesize
163KB
MD5e88828b5a35063aa16c68ffb8322215d
SHA18225660ba3a9f528cf6ac32038ae3e0ec98d2331
SHA25699facae4828c566c310a1ccf4059100067ab8bfb3d6e94e44dd9e189fd491142
SHA512e4d2f5a5aeaa29d4d3392588f15db0d514ca4c86c629f0986ee8dba61e34af5ca9e06b94479efd8dd154026ae0da276888a0214e167129db18316a17d9718a57
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.Office.To#\d7be05162f8d0fba8f4447db13f6695b\Microsoft.Office.Tools.Excel.v9.0.ni.dllFilesize
1.3MB
MD5006498313e139299a5383f0892c954b9
SHA17b3aa10930da9f29272154e2674b86876957ce3a
SHA256489fec79addba2de9141daa61062a05a95e96a196049ce414807bada572cc35c
SHA5126a15a10ae66ce0e5b18e060bb53c3108d09f6b07ee2c4a834856f0a35bec2453b32f891620e787731985719831302160678eb52acada102fdb0b87a14288d925
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.Office.To#\e1f8e4d08d4b7f811b7dbbacd324027b\Microsoft.Office.Tools.v9.0.ni.dllFilesize
148KB
MD5ac901cf97363425059a50d1398e3454b
SHA12f8bd4ac2237a7b7606cb77a3d3c58051793c5c7
SHA256f6c7aecb211d9aac911bf80c91e84a47a72ac52cbb523e34e9da6482c0b24c58
SHA5126a340b6d5fa8e214f2a58d8b691c749336df087fa75bcc8d8c46f708e4b4ff3d68a61a17d13ee62322b75cbc61d39f5a572588772f3c5d6e5ff32036e5bc5a00
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\03cad6bd8b37d21b28dcb4f955be2158\Microsoft.VisualStudio.Tools.Applications.Contract.v9.0.ni.dllFilesize
34KB
MD5c26b034a8d6ab845b41ed6e8a8d6001d
SHA13a55774cf22d3244d30f9eb5e26c0a6792a3e493
SHA256620b41f5e02df56c33919218bedc238ca7e76552c43da4f0f39a106835a4edc3
SHA512483424665c3bc79aeb1de6dfdd633c8526331c7b271b1ea6fe93ab298089e2aceefe7f9c7d0c6e33e604ca7b2ed62e7bb586147fecdf9a0eea60e8c03816f537
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\0cb958acb9cd4cacb46ebc0396e30aa3\Microsoft.VisualStudio.Tools.Office.Contract.v9.0.ni.dllFilesize
109KB
MD50fd0f978e977a4122b64ae8f8541de54
SHA1153d3390416fdeba1b150816cbbf968e355dc64f
SHA256211d2b83bb82042385757f811d90c5ae0a281f3abb3bf1c7901e8559db479e60
SHA512ceddfc031bfe4fcf5093d0bbc5697b5fb0cd69b03bc32612325a82ea273dae5daff7e670b0d45816a33307b8b042d27669f5d5391cb2bdcf3e5a0c847c6dcaa8
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\2352a79f70fc1f3da645fa7f2a864927\Microsoft.VisualStudio.Tools.Office.Outlook.HostAdapter.v10.0.ni.dllFilesize
83KB
MD58c826edd1a477ba031acf4ef65a791df
SHA1718c90dc1495b05af5b4e62eb6887b5b5ac8ea25
SHA256ad8a9e9c2cf7ea13d13f686074c73a4f998f9814b4be059346fb458910b7a96f
SHA51203fc18c6b19c542fc09baaa8d390111eada579673401723e73478daa16150d9cd498056d77bf27311d4548704f68445e530c839989db0d713b1d52eeba52876f
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\29af793fe6baa02f64e4856f5e5b9ebd\Microsoft.VisualStudio.Tools.Office.Word.HostAdapter.v10.0.ni.dllFilesize
187KB
MD573a4f536697061e2345afa20e3d2c941
SHA1ae63a878d733b06d0daf6098642cef50b6fdecdb
SHA25673de29c3c1235d253882b2c8e5a8ec3f7e13d39df08b14e3d8e721a8706fb893
SHA5121c1518af04d69bd49dcfae775fa8de3466b0539fa8e1d39822dee55ad1a9943554949200ed81dc3afd3ae63b60ca820be703aeb840462e3d88851cf7b49332b7
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\367516b7878af19f5c84c67f2cd277ae\Microsoft.VisualStudio.Tools.Office.Word.AddInAdapter.v9.0.ni.dllFilesize
41KB
MD53c269caf88ccaf71660d8dc6c56f4873
SHA1f9481bf17e10fe1914644e1b590b82a0ecc2c5c4
SHA256de21619e70f9ef8ccbb274bcd0d9d2ace1bae0442dfefab45976671587cf0a48
SHA512bd5be3721bf5bd4001127e0381a0589033cb17aa35852f8f073ba9684af7d8c5a0f3ee29987b345fc15fdf28c5b56686087001ef41221a2cfb16498cf4c016c6
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\48a294a6ff9cea6b26c38fc8b4f5e3e8\Microsoft.VisualStudio.Tools.Applications.Hosting.v10.0.ni.dllFilesize
356KB
MD587111e9d98dc79165dfc98a1fb93100b
SHA14f5182e5ce810f6ba3bdb3418ad33c916b6013c8
SHA256971188681028501d5ac8143b9127feb95d6982417590af42cf1a43483e38bd42
SHA512abbb246d620e8a2ab1973dde19ff56ea1c02afa39e889925fe2a1ba43af1ad4ff6eb017e68578ae520109b3e290b3d9054d7537eb2df0ede6e0fbca8519cc104
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\787526c375f27d452cde50fea4f7986b\Microsoft.VisualStudio.Tools.Applications.Adapter.v9.0.ni.dllFilesize
1.2MB
MD50637ad2bf6fc5ac1d29e547155bc818c
SHA1a502879466b6dd37eae5881bbb18353f97623852
SHA256868c297cb00b2d298f594ad7e3fd4e38aeaac78042613626d6f919b2bca25c4f
SHA5121d18a16ec3b91c3143c4371de305a7ea464d41661752ece65bf1ce19a8342a265c024a740afa6be8baf4d1edfdac6c6fcdad7395c1294342cd1f4388428e52c1
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\7c29ed34c94e285b4a8f5364b6888892\Microsoft.VisualStudio.Tools.Office.Excel.HostAdapter.v10.0.ni.dllFilesize
180KB
MD596ed4dca4a701f857bef3094e076ab5b
SHA17a9865a353090ade3a6fb3520636140f24804e98
SHA2568794a2738ab4270bd61845b6b652c9972f4cf8e8a14341db43de5d668ef9dd89
SHA5124a7e4ea7025a332233d1432d2a1b2160c6affe5712cb761096720a3bb8eb3f6fa5fefb4cd2efed7ab06f85259978213d047e24c73b5263b53ac8f1605e0d21f7
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\8c6bac317f75b51647ea3a8da141b143\Microsoft.VisualStudio.Tools.Office.AddInAdapter.v9.0.ni.dllFilesize
210KB
MD54f40997b51420653706cb0958086cd2d
SHA10069b956d17ce7d782a0e054995317f2f621b502
SHA2568cd6a0b061b43e0b660b81859c910290a3672b00d7647ba0e86eda6ddcc8c553
SHA512e18953d7a348859855e5f6e279bc9924fc3707b57a733ce9b8f7d21bd631d419f1ebfb29202608192eb346569ca9a55264f5b4c2aedd474c22060734a68a4ee6
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\9306fc630870a75ddd23441ad77bdc57\Microsoft.VisualStudio.Tools.Applications.Runtime.v10.0.ni.dllFilesize
53KB
MD5e3a7a2b65afd8ab8b154fdc7897595c3
SHA1b21eefd6e23231470b5cf0bd0d7363879a2ed228
SHA256e5faf5e8adf46a8246e6b5038409dadca46985a9951343a1936237d2c8d7a845
SHA5126537c7ed398deb23be1256445297cb7c8d7801bf6e163d918d8e258213708b28f7255ecff9fbd3431d8f5e5a746aa95a29d3a777b28fcd688777aed6d8205a33
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\a05ee2388c8a28fb3ac98ec65148e455\Microsoft.VisualStudio.Tools.Applications.AddInAdapter.v10.0.ni.dllFilesize
65KB
MD5da9f9a01a99bd98104b19a95eeef256c
SHA1272071d5bbc0c234bc2f63dfcd5a90f83079bbab
SHA256b06632dff444204f6e76b16198c31ab706ea52270d5e3ae81626dc1fc1fb1a4d
SHA512dcb3273e33b7df02461e81a4f65ae99c0a9ae98188a612ce6d605a058bd2dcb6ddb5b7c78abe1f0a955b7f0c07c323dbfd77a2b6a629a9c87e4ecc1c57e4d81d
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\a3fe770268542c0790770d0193860b7e\Microsoft.VisualStudio.Tools.Office.HostAdapter.v10.0.ni.dllFilesize
143KB
MD57acb812f331570959dbb781e516e10b2
SHA1ce58e115d10297051c1aff42a78f1261820c7f73
SHA256ac7421383c0e9e0ae8c99e2bae4af34d55d34d66df6cc1710ccde4438c3f9fa3
SHA512e76fcf2773d41bc2ba5b32c4ddfacb9b1610837fbad3f0e68c4a3a8fcb1bf64fa149c1eb191399a7b11339d8b23779f7d4bf60fadead6322e0e814ad602e03fb
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\afa5bb1a39443d7dc81dfff54073929b\Microsoft.VisualStudio.Tools.Office.Contract.v10.0.ni.dllFilesize
28KB
MD5aefc3f3c8e7499bad4d05284e8abd16c
SHA17ab718bde7fdb2d878d8725dc843cfeba44a71f7
SHA2564436550409cfb3d06b15dd0c3131e87e7002b0749c7c6e9dc3378c99dbec815d
SHA5121d7dbc9764855a9a1f945c1bc8e86406c0625f1381d71b3ea6924322fbe419d1c70c3f3efd57ee2cb2097bb9385e0bf54965ab789328a80eb4946849648fe20b
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\bf3e8ba642eaf9a5371982f211550c52\Microsoft.VisualStudio.Tools.Applications.Hosting.v9.0.ni.dllFilesize
278KB
MD5d74d434aa70ce827715b5e0ac7eda5be
SHA1b53f3374be4c96af51c78fd873de1360f17c200f
SHA25654701cbe719b08b2393b9f4a604c372f9a280b5d3dd520b563d2aea7d69a1496
SHA512631d09a0ff39ece829f5c23278c2c030e5ff758b285128edb7805682de75b5be1aedd914d2325f79ec98d0103660a39ae1f1a5782f5dad038b143f3774c098df
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\de06a98a598aa0ff716a25b24d56ad7f\Microsoft.VisualStudio.Tools.Applications.Contract.v10.0.ni.dllFilesize
27KB
MD59c60454398ce4bce7a52cbda4a45d364
SHA1da1e5de264a6f6051b332f8f32fa876d297bf620
SHA256edc90887d38c87282f49adbb12a94040f9ac86058bfae15063aaaff2672b54e1
SHA512533b7e9c55102b248f4a7560955734b4156eb4c02539c6f978aeacecff1ff182ba0f04a07d32ed90707a62d73191b0e2d2649f38ae1c3e7a5a4c0fbea9a94300
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\e0220058091b941725ef02be0b84abe7\Microsoft.VisualStudio.Tools.Applications.HostAdapter.v10.0.ni.dllFilesize
57KB
MD56eaaa1f987d6e1d81badf8665c55a341
SHA1e52db4ad92903ca03a5a54fdb66e2e6fad59efd5
SHA2564b78ffa5f0b6751aea11917db5961d566e2f59beaa054b41473d331fd392329e
SHA512dbedfa6c569670c22d34d923e22b7dae7332b932b809082dad87a1f0bb125c912db37964b5881667867ccf23dc5e5be596aad85485746f8151ce1c51ffd097b2
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\ee73646032cbb022d16771203727e3b2\Microsoft.VisualStudio.Tools.Applications.Runtime.v9.0.ni.dllFilesize
130KB
MD52735d2ab103beb0f7c1fbd6971838274
SHA16063646bc072546798bf8bf347425834f2bfad71
SHA256f00156860ec7e88f4ccb459ca29b7e0e5c169cdc8a081cb043603187d25d92b3
SHA512fe2ce60c7f61760a29344e254771d48995e983e158da0725818f37441f9690bda46545bf10c84b163f6afb163ffb504913d6ffddf84f72b062c7f233aed896de
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\f1a7ac664667f2d6bcd6c388b230c22b\Microsoft.VisualStudio.Tools.Applications.AddInAdapter.v9.0.ni.dllFilesize
59KB
MD58c69bbdfbc8cc3fa3fa5edcd79901e94
SHA1b8028f0f557692221d5c0160ec6ce414b2bdf19b
SHA256a21471690e7c32c80049e17c13624820e77bca6c9c38b83d9ea8a7248086660d
SHA512825f5b87b76303b62fc16a96b108fb1774c2aca52ac5e44cd0ac2fe2ee47d5d67947dfe7498e36bc849773f608ec5824711f8c36e375a378582eefb57c9c2557
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\fc36797f7054935a6033077612905a0f\Microsoft.VisualStudio.Tools.Office.Excel.AddInAdapter.v9.0.ni.dllFilesize
42KB
MD571d4273e5b77cf01239a5d4f29e064fc
SHA1e8876dea4e4c4c099e27234742016be3c80d8b62
SHA256f019899f829731f899a99885fd52fde1fe4a4f6fe3ecf7f7a7cfa78517c00575
SHA51241fe67cda988c53bd087df6296d1a242cddac688718ea5a5884a72b43e9638538e64d7a59e045c0b4d490496d884cf0ec694ddf7fcb41ae3b8cbc65b7686b180
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\ehiVidCtl\88e20c69254157d91b96eadc9444815d\ehiVidCtl.ni.dllFilesize
855KB
MD57812b0a90d92b4812d4063b89a970c58
SHA13c4a789b8d28a5bfa6a6191624e33b8f40e4c4ea
SHA256897626e6af00e85e627eeaa7f9563b245335242bc6196b36d0072e5b6d45e543
SHA512634a2395bada9227b1957f2b76ed7e19f12bfc4d71a145d182602a1b6e24d83e220ebfabd602b1995c360e1725a38a89ff58417b0295bb0da9ea35c41c21a6ed
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\stdole\2c6d60b55bbab22515c512080d4b3bae\stdole.ni.dllFilesize
43KB
MD53e72bdd0663c5b2bcd530f74139c83e3
SHA166069bcac0207512b9e07320f4fa5934650677d2
SHA2566a6ac3094130d1affd34aae5ba2bd8c889e2071eb4217a75d72b5560f884e357
SHA512b0a98db477fccae71b4ebfb8525ed52c10f1e7542f955b307f260e27e0758aa22896683302e34b0237e7e3bba9f5193ddcc7ff255c71fbaa1386988b0ec7d626
-
\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exeFilesize
648KB
MD54647654532b587c3fb7ef658875e73b2
SHA1b05b313be0be7a94526289bbc957348cb4a0c5e3
SHA256eb932a3d7d5240466ac34dd07073e9ac2f1e059daf32cd402786de7790d194c0
SHA51294461e73eeabb7367a1b15ab4eeb7780e032fbe0c75c09f6f87878cbe3526e0376bcbf7c46253b8ebce66243b5138725335ee157bd49c74d5a2c3e6d049a8ef1
-
\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exeFilesize
603KB
MD57cf3afe238172369a8111a106faa9a20
SHA10d09069571b634a036f0215ba6305e45b5115a52
SHA2562743749d04cee8df45db945b7849741052fae10ea55b80bbe3e218ec8d9f84ee
SHA5123df3cd7224c6d5bf70474954109a55a1205238c8e4a8025d13cd53d2b478def9c6b5fbaaff934d111d9c4f74f13916f156b8d48d6a2a35649e12a785c2cab7ab
-
\Windows\System32\alg.exeFilesize
644KB
MD52a736dd837e6a04a05bebf04aa75af85
SHA1963742020e652f3e3fa823bbcaab67ab07879325
SHA256871c7c55b523f344553e8f4970595c1c968248ce0623109c5ecf273f0f257f7c
SHA512e691b8ba7ce40d5aa20bfb1823742ce4e1afb555a68046230b63f8719f8a7dde22554086f39e85a2d272b814c4b2fcde348a8cc143a9a4029109cd0848f25ba0
-
\Windows\System32\ieetwcollector.exeFilesize
674KB
MD5e8ef4255b2fe6355aeb06e954976cc08
SHA1907486d1832de392ac3a673828a72d94a8ccc1e9
SHA256bc330cfa4a20a6878d46de09642fd24a907e7b1ba2f2bfe79775b890b3f7b3ff
SHA51258498043d427b6eaabe74267dcb1e5b9a60f95dd57bdde5312bb6c877bb5a53f7ddd2781ea08e02cda268778445c592979f6b70b781df9aa482b3897f157188b
-
\Windows\System32\msdtc.exeFilesize
705KB
MD53530d16a929f84c71b097b09ac4a78a0
SHA1ed34110273b8ad0cf5041cd8427706df1bdcf152
SHA2562ca121c0359cdbe4a591a0e3bfdabbfddd1c691abc5ffe7d72593a365c619709
SHA512da9fd301a1bd5ebc60f2554e2062224b9c3e5d635ae2c4a1d56c59171423a7f11383453c6ab46369b6975aeadf1c1fdb766efffa84bf94f2c38418ecb34d1a2d
-
\Windows\System32\msiexec.exeFilesize
691KB
MD5225bbbbad2238e553ff58b17bdebe380
SHA1e753a1e3abcf527f22bf529e7669d5958595bac9
SHA2566170d0cc215d9bcdbee12e0e8f04dfd976faffcf616df9356861615aa494d56a
SHA5129e4ae6f5a9f9661a14adbbee20213245a882cdae77f4f0e6590c7bd2cc9408fe4cb56fd4a39154fe9293db38d30b7ee00cef5f8f19152ddf48b48615c91109c5
-
\Windows\System32\snmptrap.exeFilesize
581KB
MD567b700a83797f15e655ea2adfc3e6a0b
SHA1659f54616bd88bc3ca5ac9e7d1a4b7917fd353b5
SHA256b282053eaeb5dff7508839d40bc98a4faa1787b4ed9976741c6091c37718b176
SHA512247d5347898af7621b4abb64a1d2483d9fd40a5aaecebfb21f1e7dd18daadf4580ee9398667b1ce1a38747c01c84401266c68ec59571a64d4b2e89c9166cebfc
-
\Windows\System32\wbem\WmiApSrv.exeFilesize
765KB
MD5936d86c581354d8f5946a74f492664ef
SHA10b71a58020be02b05f888a9b33e7332180a9ec2b
SHA25632e9ec84512e9dad792b3cb9911a5ac64a453804a24b671a0d5fce1ed599d884
SHA51234920862f86c048533c68b8e13dc90133a938081875467ad420db6c7e9db3c591438a88373c745bfeb6c2619a6f5d0a3c4896b94f618462d264eb6bac4b4881f
-
\Windows\ehome\ehrecvr.exeFilesize
1.2MB
MD59c404b3bdd7784ae9958db9835ef2c15
SHA10d211eb8fd5cf594de2a2b284fc663dfa31f3f0a
SHA2564ba7ca92f17422a22de2b0662163da8bbbc03f0c0d67d17684e5527823a423ce
SHA5124304c17d0b88c3b1ee8ca3379b06518cf443a5fbd27cebfa369dfb725019fd49209bcacde9128185c3610b16b73da825f7c55d2a7cf84eacd646b62720afdf96
-
\Windows\ehome\ehsched.exeFilesize
691KB
MD51f27852c3ae05d15d12ec35c087fa0d3
SHA19034c75fba86d1d37f2b04b1bc36bb265f72ed62
SHA25692137b57aafbf7068b2ff0f732b23b031d22c3e5b2e626a47a0a5975e248a7b6
SHA512991ca3146a2eb6713ed7f9795ef3a4018d030f074988312fa69c71a6a41540124889012a4460d94a7fe15a88141a33b6007ad03315f35cce195c65ac8f1f1b8d
-
memory/464-71-0x00000000004B0000-0x0000000000517000-memory.dmpFilesize
412KB
-
memory/464-182-0x0000000000400000-0x00000000004A8000-memory.dmpFilesize
672KB
-
memory/464-65-0x0000000000400000-0x00000000004A8000-memory.dmpFilesize
672KB
-
memory/464-66-0x00000000004B0000-0x0000000000517000-memory.dmpFilesize
412KB
-
memory/580-642-0x0000000000400000-0x00000000004A8000-memory.dmpFilesize
672KB
-
memory/580-622-0x0000000000400000-0x00000000004A8000-memory.dmpFilesize
672KB
-
memory/596-275-0x0000000140000000-0x00000001400B6000-memory.dmpFilesize
728KB
-
memory/596-170-0x0000000140000000-0x00000001400B6000-memory.dmpFilesize
728KB
-
memory/760-332-0x0000000001000000-0x0000000001096000-memory.dmpFilesize
600KB
-
memory/760-239-0x0000000001000000-0x0000000001096000-memory.dmpFilesize
600KB
-
memory/788-375-0x0000000100000000-0x0000000100096000-memory.dmpFilesize
600KB
-
memory/788-272-0x0000000100000000-0x0000000100096000-memory.dmpFilesize
600KB
-
memory/836-555-0x0000000000400000-0x00000000004A8000-memory.dmpFilesize
672KB
-
memory/836-567-0x0000000000400000-0x00000000004A8000-memory.dmpFilesize
672KB
-
memory/836-563-0x0000000003D30000-0x0000000003DEA000-memory.dmpFilesize
744KB
-
memory/960-626-0x0000000000400000-0x00000000004A8000-memory.dmpFilesize
672KB
-
memory/960-600-0x0000000000400000-0x00000000004A8000-memory.dmpFilesize
672KB
-
memory/1096-406-0x0000000100000000-0x0000000100219000-memory.dmpFilesize
2.1MB
-
memory/1096-305-0x0000000100000000-0x0000000100219000-memory.dmpFilesize
2.1MB
-
memory/1136-180-0x0000000100000000-0x00000001000B2000-memory.dmpFilesize
712KB
-
memory/1136-183-0x00000000004B0000-0x0000000000562000-memory.dmpFilesize
712KB
-
memory/1136-279-0x0000000100000000-0x00000001000B2000-memory.dmpFilesize
712KB
-
memory/1136-301-0x00000000004B0000-0x0000000000562000-memory.dmpFilesize
712KB
-
memory/1284-483-0x0000000000400000-0x00000000004A8000-memory.dmpFilesize
672KB
-
memory/1284-422-0x0000000000400000-0x00000000004A8000-memory.dmpFilesize
672KB
-
memory/1648-104-0x0000000000830000-0x0000000000890000-memory.dmpFilesize
384KB
-
memory/1648-206-0x0000000140000000-0x000000014013C000-memory.dmpFilesize
1.2MB
-
memory/1648-103-0x0000000140000000-0x000000014013C000-memory.dmpFilesize
1.2MB
-
memory/1648-110-0x0000000000830000-0x0000000000890000-memory.dmpFilesize
384KB
-
memory/1688-553-0x0000000100000000-0x000000010020A000-memory.dmpFilesize
2.0MB
-
memory/1688-333-0x0000000100000000-0x000000010020A000-memory.dmpFilesize
2.0MB
-
memory/1784-0-0x0000000000400000-0x0000000000584000-memory.dmpFilesize
1.5MB
-
memory/1784-6-0x0000000000250000-0x00000000002B7000-memory.dmpFilesize
412KB
-
memory/1784-7-0x0000000000250000-0x00000000002B7000-memory.dmpFilesize
412KB
-
memory/1784-91-0x0000000000400000-0x0000000000584000-memory.dmpFilesize
1.5MB
-
memory/1784-1-0x0000000000250000-0x00000000002B7000-memory.dmpFilesize
412KB
-
memory/1804-291-0x0000000000400000-0x00000000004A8000-memory.dmpFilesize
672KB
-
memory/1804-271-0x0000000000400000-0x00000000004A8000-memory.dmpFilesize
672KB
-
memory/1836-273-0x0000000100000000-0x0000000100095000-memory.dmpFilesize
596KB
-
memory/1856-387-0x0000000000400000-0x00000000004A8000-memory.dmpFilesize
672KB
-
memory/1856-377-0x0000000000400000-0x00000000004A8000-memory.dmpFilesize
672KB
-
memory/1912-324-0x0000000000400000-0x00000000004A8000-memory.dmpFilesize
672KB
-
memory/1912-355-0x0000000000400000-0x00000000004A8000-memory.dmpFilesize
672KB
-
memory/1920-385-0x0000000000400000-0x00000000004A8000-memory.dmpFilesize
672KB
-
memory/1920-412-0x0000000000400000-0x00000000004A8000-memory.dmpFilesize
672KB
-
memory/2000-491-0x0000000000400000-0x00000000004A8000-memory.dmpFilesize
672KB
-
memory/2000-535-0x0000000000400000-0x00000000004A8000-memory.dmpFilesize
672KB
-
memory/2032-666-0x0000000000400000-0x00000000004A8000-memory.dmpFilesize
672KB
-
memory/2032-658-0x0000000000400000-0x00000000004A8000-memory.dmpFilesize
672KB
-
memory/2076-154-0x000000002E000000-0x000000002FE1E000-memory.dmpFilesize
30.1MB
-
memory/2076-269-0x000000002E000000-0x000000002FE1E000-memory.dmpFilesize
30.1MB
-
memory/2084-173-0x0000000140000000-0x00000001400CA000-memory.dmpFilesize
808KB
-
memory/2084-166-0x0000000140000000-0x00000001400CA000-memory.dmpFilesize
808KB
-
memory/2088-389-0x0000000100000000-0x0000000100123000-memory.dmpFilesize
1.1MB
-
memory/2088-657-0x0000000100000000-0x0000000100123000-memory.dmpFilesize
1.1MB
-
memory/2116-384-0x0000000100000000-0x0000000100114000-memory.dmpFilesize
1.1MB
-
memory/2116-276-0x0000000100000000-0x0000000100114000-memory.dmpFilesize
1.1MB
-
memory/2144-366-0x0000000000400000-0x00000000004A8000-memory.dmpFilesize
672KB
-
memory/2144-350-0x0000000000400000-0x00000000004A8000-memory.dmpFilesize
672KB
-
memory/2240-238-0x0000000140000000-0x0000000140237000-memory.dmpFilesize
2.2MB
-
memory/2240-139-0x0000000140000000-0x0000000140237000-memory.dmpFilesize
2.2MB
-
memory/2280-533-0x0000000000400000-0x00000000004A8000-memory.dmpFilesize
672KB
-
memory/2280-280-0x0000000000400000-0x00000000004A8000-memory.dmpFilesize
672KB
-
memory/2280-557-0x0000000000400000-0x00000000004A8000-memory.dmpFilesize
672KB
-
memory/2280-304-0x0000000000400000-0x00000000004A8000-memory.dmpFilesize
672KB
-
memory/2328-323-0x0000000000400000-0x00000000004A8000-memory.dmpFilesize
672KB
-
memory/2328-302-0x0000000000400000-0x00000000004A8000-memory.dmpFilesize
672KB
-
memory/2384-328-0x0000000100000000-0x00000001000C4000-memory.dmpFilesize
784KB
-
memory/2384-531-0x0000000100000000-0x00000001000C4000-memory.dmpFilesize
784KB
-
memory/2420-46-0x00000000001E0000-0x0000000000240000-memory.dmpFilesize
384KB
-
memory/2420-77-0x0000000010000000-0x00000000100A7000-memory.dmpFilesize
668KB
-
memory/2420-53-0x00000000001E0000-0x0000000000240000-memory.dmpFilesize
384KB
-
memory/2420-45-0x0000000010000000-0x00000000100A7000-memory.dmpFilesize
668KB
-
memory/2420-52-0x00000000001E0000-0x0000000000240000-memory.dmpFilesize
384KB
-
memory/2428-31-0x00000000009B0000-0x0000000000A17000-memory.dmpFilesize
412KB
-
memory/2428-40-0x00000000009B0000-0x0000000000A17000-memory.dmpFilesize
412KB
-
memory/2428-95-0x0000000010000000-0x000000001009F000-memory.dmpFilesize
636KB
-
memory/2428-30-0x0000000010000000-0x000000001009F000-memory.dmpFilesize
636KB
-
memory/2456-639-0x0000000000400000-0x00000000004A8000-memory.dmpFilesize
672KB
-
memory/2456-407-0x0000000000400000-0x00000000004A8000-memory.dmpFilesize
672KB
-
memory/2456-661-0x0000000000400000-0x00000000004A8000-memory.dmpFilesize
672KB
-
memory/2456-425-0x0000000000400000-0x00000000004A8000-memory.dmpFilesize
672KB
-
memory/2460-376-0x0000000000400000-0x00000000004A8000-memory.dmpFilesize
672KB
-
memory/2568-327-0x0000000100000000-0x0000000100542000-memory.dmpFilesize
5.3MB
-
memory/2568-220-0x0000000100000000-0x0000000100542000-memory.dmpFilesize
5.3MB
-
memory/2588-683-0x0000000000400000-0x00000000004A8000-memory.dmpFilesize
672KB
-
memory/2632-18-0x0000000000E10000-0x0000000000E70000-memory.dmpFilesize
384KB
-
memory/2632-17-0x0000000140000000-0x000000014009D000-memory.dmpFilesize
628KB
-
memory/2632-130-0x0000000140000000-0x000000014009D000-memory.dmpFilesize
628KB
-
memory/2632-26-0x0000000000E10000-0x0000000000E70000-memory.dmpFilesize
384KB
-
memory/2648-604-0x0000000000400000-0x00000000004A8000-memory.dmpFilesize
672KB
-
memory/2648-576-0x0000000000400000-0x00000000004A8000-memory.dmpFilesize
672KB
-
memory/2652-211-0x0000000140000000-0x00000001400B2000-memory.dmpFilesize
712KB
-
memory/2652-116-0x0000000000850000-0x00000000008B0000-memory.dmpFilesize
384KB
-
memory/2652-122-0x0000000000850000-0x00000000008B0000-memory.dmpFilesize
384KB
-
memory/2652-124-0x0000000140000000-0x00000001400B2000-memory.dmpFilesize
712KB
-
memory/2732-263-0x0000000000400000-0x00000000004A8000-memory.dmpFilesize
672KB
-
memory/2752-83-0x0000000000200000-0x0000000000260000-memory.dmpFilesize
384KB
-
memory/2752-92-0x0000000140000000-0x00000001400AE000-memory.dmpFilesize
696KB
-
memory/2752-89-0x0000000000200000-0x0000000000260000-memory.dmpFilesize
384KB
-
memory/2828-191-0x000000002E000000-0x000000002E0B5000-memory.dmpFilesize
724KB
-
memory/2828-310-0x000000002E000000-0x000000002E0B5000-memory.dmpFilesize
724KB
-
memory/2940-421-0x0000000100000000-0x0000000100202000-memory.dmpFilesize
2.0MB
-
memory/2940-311-0x0000000100000000-0x0000000100202000-memory.dmpFilesize
2.0MB
-
memory/2968-209-0x0000000000400000-0x00000000004A8000-memory.dmpFilesize
672KB
-
memory/2968-252-0x0000000000400000-0x00000000004A8000-memory.dmpFilesize
672KB
-
memory/2996-115-0x0000000100000000-0x00000001000A4000-memory.dmpFilesize
656KB
-
memory/2996-13-0x0000000100000000-0x00000001000A4000-memory.dmpFilesize
656KB
-
memory/3028-143-0x0000000140000000-0x00000001400AE000-memory.dmpFilesize
696KB
-
memory/3028-242-0x0000000140000000-0x00000001400AE000-memory.dmpFilesize
696KB