Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
162s -
max time network
176s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
23/12/2023, 03:46
Static task
static1
Behavioral task
behavioral1
Sample
933c2e0b0aa78700a07e8662506560b63ba739eea4d4e645ade31d5bdf19637c.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
933c2e0b0aa78700a07e8662506560b63ba739eea4d4e645ade31d5bdf19637c.exe
Resource
win10v2004-20231215-en
General
-
Target
933c2e0b0aa78700a07e8662506560b63ba739eea4d4e645ade31d5bdf19637c.exe
-
Size
1.8MB
-
MD5
2034b332031cc05fd48eda0e085485d3
-
SHA1
9229f4ff7eeda168f30d434b936f08ff18699c1e
-
SHA256
933c2e0b0aa78700a07e8662506560b63ba739eea4d4e645ade31d5bdf19637c
-
SHA512
00ac78422daf00347cb151a4cfc67e37fb6e48252aa8f463b8d30771599a4e9e57b0bde2fbe945e60663081deedd0d5b002506a04b153c7f99f4eaaf0128e807
-
SSDEEP
49152:yKJ0WR7AFPyyiSruXKpk3WFDL9zxnS16AVel/:yKlBAFPydSS6W6X9lny6H/
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 468 Process not Found 2928 alg.exe 1628 aspnet_state.exe 2084 mscorsvw.exe 2076 mscorsvw.exe 2376 elevation_service.exe 1764 GROOVE.EXE 1224 maintenanceservice.exe 2244 OSE.EXE 572 OSPPSVC.EXE 1668 mscorsvw.exe 2808 mscorsvw.exe 1260 mscorsvw.exe 1596 mscorsvw.exe 1376 mscorsvw.exe 2128 mscorsvw.exe 2840 mscorsvw.exe 2548 mscorsvw.exe 2532 mscorsvw.exe 1948 mscorsvw.exe 2876 mscorsvw.exe 1008 mscorsvw.exe 2632 mscorsvw.exe 1512 mscorsvw.exe 1980 mscorsvw.exe 2664 mscorsvw.exe 2784 mscorsvw.exe 2840 mscorsvw.exe 3012 mscorsvw.exe 2176 mscorsvw.exe 1868 mscorsvw.exe 2476 mscorsvw.exe 1772 mscorsvw.exe 2204 mscorsvw.exe 2252 mscorsvw.exe 3064 mscorsvw.exe 2224 mscorsvw.exe 1256 mscorsvw.exe 2096 mscorsvw.exe 2476 mscorsvw.exe 2660 mscorsvw.exe 1792 mscorsvw.exe 2948 mscorsvw.exe 2200 mscorsvw.exe 1672 mscorsvw.exe 1812 mscorsvw.exe 624 mscorsvw.exe 3012 mscorsvw.exe 1132 mscorsvw.exe 2368 mscorsvw.exe 388 mscorsvw.exe 1936 mscorsvw.exe 2188 mscorsvw.exe 328 mscorsvw.exe 268 mscorsvw.exe 660 mscorsvw.exe 1492 mscorsvw.exe 2876 mscorsvw.exe 2452 mscorsvw.exe 616 mscorsvw.exe 2264 mscorsvw.exe 2632 mscorsvw.exe 2404 mscorsvw.exe 1804 mscorsvw.exe -
Loads dropped DLL 33 IoCs
pid Process 468 Process not Found 2476 mscorsvw.exe 2476 mscorsvw.exe 1792 mscorsvw.exe 1792 mscorsvw.exe 2200 mscorsvw.exe 2200 mscorsvw.exe 1812 mscorsvw.exe 1812 mscorsvw.exe 3012 mscorsvw.exe 3012 mscorsvw.exe 2368 mscorsvw.exe 2368 mscorsvw.exe 1936 mscorsvw.exe 1936 mscorsvw.exe 328 mscorsvw.exe 328 mscorsvw.exe 660 mscorsvw.exe 660 mscorsvw.exe 2876 mscorsvw.exe 2876 mscorsvw.exe 616 mscorsvw.exe 616 mscorsvw.exe 2632 mscorsvw.exe 2632 mscorsvw.exe 1804 mscorsvw.exe 1804 mscorsvw.exe 1860 mscorsvw.exe 1860 mscorsvw.exe 3008 mscorsvw.exe 3008 mscorsvw.exe 2360 mscorsvw.exe 2360 mscorsvw.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat GROOVE.EXE File opened for modification C:\Windows\System32\alg.exe 933c2e0b0aa78700a07e8662506560b63ba739eea4d4e645ade31d5bdf19637c.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Roaming\1ce612b0223c682a.bin alg.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\Google\Temp\GUMA535.tmp\psmachine_64.dll 933c2e0b0aa78700a07e8662506560b63ba739eea4d4e645ade31d5bdf19637c.exe File opened for modification C:\Program Files\7-Zip\7zG.exe alg.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Source Engine\OSE.EXE alg.exe File created C:\Program Files (x86)\Google\Temp\GUMA535.tmp\goopdateres_pl.dll 933c2e0b0aa78700a07e8662506560b63ba739eea4d4e645ade31d5bdf19637c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\appletviewer.exe alg.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\klist.exe mscorsvw.exe File created C:\Program Files (x86)\Google\Temp\GUMA535.tmp\goopdateres_ca.dll 933c2e0b0aa78700a07e8662506560b63ba739eea4d4e645ade31d5bdf19637c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jstack.exe mscorsvw.exe File opened for modification C:\Program Files\Java\jre7\bin\kinit.exe mscorsvw.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\tnameserv.exe alg.exe File opened for modification C:\Program Files\Java\jre7\bin\java-rmi.exe alg.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\schemagen.exe alg.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\keytool.exe alg.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VSTA\8.0\x86\vsta_ep32.exe alg.exe File opened for modification C:\Program Files\VideoLAN\VLC\uninstall.exe mscorsvw.exe File opened for modification C:\Program Files\Mozilla Firefox\plugin-container.exe alg.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jvisualvm.exe mscorsvw.exe File opened for modification C:\Program Files\7-Zip\7z.exe alg.exe File opened for modification C:\Program Files\Mozilla Firefox\pingsender.exe alg.exe File opened for modification C:\Program Files\Java\jre7\bin\java-rmi.exe mscorsvw.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\A3DUtility.exe mscorsvw.exe File opened for modification C:\Program Files\Mozilla Firefox\minidump-analyzer.exe mscorsvw.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroTextExtractor.exe alg.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\ssvagent.exe mscorsvw.exe File opened for modification C:\Program Files\Mozilla Firefox\firefox.exe alg.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\wsgen.exe mscorsvw.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\rmid.exe mscorsvw.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\rmiregistry.exe mscorsvw.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc.exe alg.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AdobeCollabSync.exe alg.exe File opened for modification C:\Program Files (x86)\Internet Explorer\ielowutil.exe alg.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\servertool.exe mscorsvw.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jps.exe mscorsvw.exe File opened for modification C:\Program Files\Java\jre7\bin\javaw.exe mscorsvw.exe File opened for modification C:\Program Files\Java\jre7\bin\pack200.exe mscorsvw.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AdobeCollabSync.exe mscorsvw.exe File created C:\Program Files (x86)\Google\Temp\GUMA535.tmp\goopdateres_pt-BR.dll 933c2e0b0aa78700a07e8662506560b63ba739eea4d4e645ade31d5bdf19637c.exe File opened for modification C:\Program Files\Mozilla Firefox\maintenanceservice_installer.exe alg.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Eula.exe alg.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\policytool.exe mscorsvw.exe File created C:\Program Files (x86)\Google\Temp\GUMA535.tmp\goopdateres_vi.dll 933c2e0b0aa78700a07e8662506560b63ba739eea4d4e645ade31d5bdf19637c.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateBroker.exe alg.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javafxpackager.exe mscorsvw.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jar.exe alg.exe File opened for modification C:\Program Files\Mozilla Firefox\maintenanceservice_installer.exe mscorsvw.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\kinit.exe alg.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\{AC76BA86-7AD7-1033-7B44-A90000000001}\Setup.exe alg.exe File opened for modification C:\Program Files\Java\jre7\bin\orbd.exe mscorsvw.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\policytool.exe mscorsvw.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\rmiregistry.exe alg.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\java-rmi.exe mscorsvw.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Eula.exe mscorsvw.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe mscorsvw.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\Adobe AIR Updater.exe mscorsvw.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateOnDemand.exe mscorsvw.exe File created C:\Program Files (x86)\Google\Temp\GUMA535.tmp\GoogleUpdateBroker.exe 933c2e0b0aa78700a07e8662506560b63ba739eea4d4e645ade31d5bdf19637c.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\Adobe AIR Updater.exe alg.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateSetup.exe alg.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\launcher.exe mscorsvw.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\keytool.exe mscorsvw.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\lib\nbexec.exe mscorsvw.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\klist.exe alg.exe File opened for modification C:\Program Files (x86)\Mozilla Maintenance Service\Uninstall.exe alg.exe File opened for modification C:\Program Files\Internet Explorer\ielowutil.exe mscorsvw.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index13b.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index141.dat mscorsvw.exe File created C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngenrootstorelock.dat mscorsvw.exe File created C:\Windows\Microsoft.NET\ngennicupdatelock.dat mscorsvw.exe File created C:\Windows\Microsoft.NET\ngennicupdatelock.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index134.dat mscorsvw.exe File created C:\Windows\assembly\GACLock.dat mscorsvw.exe File created C:\Windows\assembly\GACLock.dat mscorsvw.exe File created C:\Windows\assembly\ngenlock.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index136.dat mscorsvw.exe File created C:\Windows\assembly\ngenlock.dat mscorsvw.exe File created C:\Windows\assembly\GACLock.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index143.dat mscorsvw.exe File created C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngenservicelock.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\index135.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index133.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\Temp\ZAPC3DB.tmp\Microsoft.VisualStudio.Tools.Office.Contract.v10.0.dll mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index13f.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index142.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\Temp\ZAPDD64.tmp\Microsoft.VisualStudio.Tools.Office.Word.HostAdapter.v10.0.dll mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index135.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\Temp\ZAPC736.tmp\Microsoft.VisualStudio.Tools.Office.Contract.v9.0.dll mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index140.dat mscorsvw.exe File created C:\Windows\assembly\ngenlock.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\Temp\ZAPA766.tmp\Microsoft.VisualStudio.Tools.Office.Excel.AddInAdapter.v9.0.dll mscorsvw.exe File created C:\Windows\assembly\GACLock.dat mscorsvw.exe File created C:\Windows\assembly\GACLock.dat mscorsvw.exe File created C:\Windows\assembly\ngenlock.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\index140.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index142.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\index136.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\index13b.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index13c.dat mscorsvw.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe 933c2e0b0aa78700a07e8662506560b63ba739eea4d4e645ade31d5bdf19637c.exe File created C:\Windows\Microsoft.NET\ngenservice_pri3_lock.dat mscorsvw.exe File created C:\Windows\assembly\ngenlock.dat mscorsvw.exe File created C:\Windows\assembly\ngenlock.dat mscorsvw.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe alg.exe File created C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngenrootstorelock.dat mscorsvw.exe File created C:\Windows\Microsoft.NET\ngenservice_pri1_lock.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\index138.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\Temp\ZAPBCAB.tmp\Microsoft.VisualStudio.Tools.Applications.Contract.v10.0.dll mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\Temp\ZAPC014.tmp\Microsoft.VisualStudio.Tools.Applications.Contract.v9.0.dll mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\index142.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index135.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index137.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\Temp\ZAPAF91.tmp\Microsoft.Office.Tools.v9.0.dll mscorsvw.exe File created C:\Windows\assembly\GACLock.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index13a.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\index137.dat mscorsvw.exe File created C:\Windows\assembly\ngenlock.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\Temp\ZAPD47E.tmp\Microsoft.VisualStudio.Tools.Office.HostAdapter.v10.0.dll mscorsvw.exe File created C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngenofflinequeuelock.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index138.dat mscorsvw.exe File created C:\Windows\assembly\ngenlock.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index13f.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index140.dat mscorsvw.exe File created C:\Windows\assembly\ngenlock.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index138.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index139.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index13e.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\index144.dat mscorsvw.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe alg.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index13a.dat mscorsvw.exe -
Modifies data under HKEY_USERS 46 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CRLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CRLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\OfficeSoftwareProtectionPlatform OSPPSVC.EXE Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\OfficeSoftwareProtectionPlatform\VLRenewalSchedule = 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 OSPPSVC.EXE Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CRLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CRLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\Certificates mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\Certificates mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CRLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CRLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\Certificates mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CRLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CRLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\Certificates mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\Certificates mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\Certificates mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\Certificates mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings GROOVE.EXE Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\Certificates mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\Certificates mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CRLs mscorsvw.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 2516 933c2e0b0aa78700a07e8662506560b63ba739eea4d4e645ade31d5bdf19637c.exe Token: SeShutdownPrivilege 2084 mscorsvw.exe Token: SeShutdownPrivilege 2076 mscorsvw.exe Token: SeShutdownPrivilege 2084 mscorsvw.exe Token: SeShutdownPrivilege 2076 mscorsvw.exe Token: SeShutdownPrivilege 2084 mscorsvw.exe Token: SeShutdownPrivilege 2084 mscorsvw.exe Token: SeShutdownPrivilege 2076 mscorsvw.exe Token: SeShutdownPrivilege 2076 mscorsvw.exe Token: SeDebugPrivilege 2928 alg.exe Token: SeShutdownPrivilege 2084 mscorsvw.exe Token: SeShutdownPrivilege 2076 mscorsvw.exe Token: SeDebugPrivilege 2084 mscorsvw.exe Token: SeShutdownPrivilege 2084 mscorsvw.exe Token: SeShutdownPrivilege 2076 mscorsvw.exe Token: SeShutdownPrivilege 2084 mscorsvw.exe Token: SeShutdownPrivilege 2084 mscorsvw.exe Token: SeShutdownPrivilege 2084 mscorsvw.exe Token: SeShutdownPrivilege 2084 mscorsvw.exe Token: SeShutdownPrivilege 2084 mscorsvw.exe Token: SeShutdownPrivilege 2084 mscorsvw.exe Token: SeShutdownPrivilege 2084 mscorsvw.exe Token: SeShutdownPrivilege 2084 mscorsvw.exe Token: SeShutdownPrivilege 2084 mscorsvw.exe Token: SeShutdownPrivilege 2084 mscorsvw.exe Token: SeShutdownPrivilege 2084 mscorsvw.exe Token: SeShutdownPrivilege 2084 mscorsvw.exe Token: SeShutdownPrivilege 2076 mscorsvw.exe Token: SeShutdownPrivilege 2076 mscorsvw.exe Token: SeShutdownPrivilege 2076 mscorsvw.exe Token: SeShutdownPrivilege 2084 mscorsvw.exe Token: SeShutdownPrivilege 2076 mscorsvw.exe Token: SeShutdownPrivilege 2076 mscorsvw.exe Token: SeShutdownPrivilege 2084 mscorsvw.exe Token: SeShutdownPrivilege 2076 mscorsvw.exe Token: SeShutdownPrivilege 2084 mscorsvw.exe Token: SeShutdownPrivilege 2076 mscorsvw.exe Token: SeShutdownPrivilege 2084 mscorsvw.exe Token: SeShutdownPrivilege 2076 mscorsvw.exe Token: SeShutdownPrivilege 2084 mscorsvw.exe Token: SeShutdownPrivilege 2076 mscorsvw.exe Token: SeShutdownPrivilege 2084 mscorsvw.exe Token: SeShutdownPrivilege 2076 mscorsvw.exe Token: SeShutdownPrivilege 2084 mscorsvw.exe Token: SeShutdownPrivilege 2076 mscorsvw.exe Token: SeShutdownPrivilege 2084 mscorsvw.exe Token: SeShutdownPrivilege 2076 mscorsvw.exe Token: SeShutdownPrivilege 2084 mscorsvw.exe Token: SeShutdownPrivilege 2076 mscorsvw.exe Token: SeShutdownPrivilege 2084 mscorsvw.exe Token: SeShutdownPrivilege 2076 mscorsvw.exe Token: SeShutdownPrivilege 2084 mscorsvw.exe Token: SeShutdownPrivilege 2076 mscorsvw.exe Token: SeShutdownPrivilege 2084 mscorsvw.exe Token: SeShutdownPrivilege 2076 mscorsvw.exe Token: SeShutdownPrivilege 2084 mscorsvw.exe Token: SeShutdownPrivilege 2076 mscorsvw.exe Token: SeShutdownPrivilege 2084 mscorsvw.exe Token: SeShutdownPrivilege 2076 mscorsvw.exe Token: SeShutdownPrivilege 2084 mscorsvw.exe Token: SeShutdownPrivilege 2076 mscorsvw.exe Token: SeShutdownPrivilege 2084 mscorsvw.exe Token: SeShutdownPrivilege 2076 mscorsvw.exe Token: SeShutdownPrivilege 2084 mscorsvw.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2084 wrote to memory of 1668 2084 mscorsvw.exe 39 PID 2084 wrote to memory of 1668 2084 mscorsvw.exe 39 PID 2084 wrote to memory of 1668 2084 mscorsvw.exe 39 PID 2084 wrote to memory of 1668 2084 mscorsvw.exe 39 PID 2084 wrote to memory of 2808 2084 mscorsvw.exe 40 PID 2084 wrote to memory of 2808 2084 mscorsvw.exe 40 PID 2084 wrote to memory of 2808 2084 mscorsvw.exe 40 PID 2084 wrote to memory of 2808 2084 mscorsvw.exe 40 PID 2084 wrote to memory of 1260 2084 mscorsvw.exe 41 PID 2084 wrote to memory of 1260 2084 mscorsvw.exe 41 PID 2084 wrote to memory of 1260 2084 mscorsvw.exe 41 PID 2084 wrote to memory of 1260 2084 mscorsvw.exe 41 PID 2084 wrote to memory of 1596 2084 mscorsvw.exe 42 PID 2084 wrote to memory of 1596 2084 mscorsvw.exe 42 PID 2084 wrote to memory of 1596 2084 mscorsvw.exe 42 PID 2084 wrote to memory of 1596 2084 mscorsvw.exe 42 PID 2084 wrote to memory of 1376 2084 mscorsvw.exe 43 PID 2084 wrote to memory of 1376 2084 mscorsvw.exe 43 PID 2084 wrote to memory of 1376 2084 mscorsvw.exe 43 PID 2084 wrote to memory of 1376 2084 mscorsvw.exe 43 PID 2084 wrote to memory of 2128 2084 mscorsvw.exe 44 PID 2084 wrote to memory of 2128 2084 mscorsvw.exe 44 PID 2084 wrote to memory of 2128 2084 mscorsvw.exe 44 PID 2084 wrote to memory of 2128 2084 mscorsvw.exe 44 PID 2084 wrote to memory of 2840 2084 mscorsvw.exe 56 PID 2084 wrote to memory of 2840 2084 mscorsvw.exe 56 PID 2084 wrote to memory of 2840 2084 mscorsvw.exe 56 PID 2084 wrote to memory of 2840 2084 mscorsvw.exe 56 PID 2084 wrote to memory of 2548 2084 mscorsvw.exe 46 PID 2084 wrote to memory of 2548 2084 mscorsvw.exe 46 PID 2084 wrote to memory of 2548 2084 mscorsvw.exe 46 PID 2084 wrote to memory of 2548 2084 mscorsvw.exe 46 PID 2084 wrote to memory of 2532 2084 mscorsvw.exe 47 PID 2084 wrote to memory of 2532 2084 mscorsvw.exe 47 PID 2084 wrote to memory of 2532 2084 mscorsvw.exe 47 PID 2084 wrote to memory of 2532 2084 mscorsvw.exe 47 PID 2084 wrote to memory of 1948 2084 mscorsvw.exe 48 PID 2084 wrote to memory of 1948 2084 mscorsvw.exe 48 PID 2084 wrote to memory of 1948 2084 mscorsvw.exe 48 PID 2084 wrote to memory of 1948 2084 mscorsvw.exe 48 PID 2084 wrote to memory of 2876 2084 mscorsvw.exe 49 PID 2084 wrote to memory of 2876 2084 mscorsvw.exe 49 PID 2084 wrote to memory of 2876 2084 mscorsvw.exe 49 PID 2084 wrote to memory of 2876 2084 mscorsvw.exe 49 PID 2084 wrote to memory of 1008 2084 mscorsvw.exe 50 PID 2084 wrote to memory of 1008 2084 mscorsvw.exe 50 PID 2084 wrote to memory of 1008 2084 mscorsvw.exe 50 PID 2084 wrote to memory of 1008 2084 mscorsvw.exe 50 PID 2084 wrote to memory of 2632 2084 mscorsvw.exe 51 PID 2084 wrote to memory of 2632 2084 mscorsvw.exe 51 PID 2084 wrote to memory of 2632 2084 mscorsvw.exe 51 PID 2084 wrote to memory of 2632 2084 mscorsvw.exe 51 PID 2084 wrote to memory of 1512 2084 mscorsvw.exe 52 PID 2084 wrote to memory of 1512 2084 mscorsvw.exe 52 PID 2084 wrote to memory of 1512 2084 mscorsvw.exe 52 PID 2084 wrote to memory of 1512 2084 mscorsvw.exe 52 PID 2084 wrote to memory of 1980 2084 mscorsvw.exe 53 PID 2084 wrote to memory of 1980 2084 mscorsvw.exe 53 PID 2084 wrote to memory of 1980 2084 mscorsvw.exe 53 PID 2084 wrote to memory of 1980 2084 mscorsvw.exe 53 PID 2084 wrote to memory of 2664 2084 mscorsvw.exe 54 PID 2084 wrote to memory of 2664 2084 mscorsvw.exe 54 PID 2084 wrote to memory of 2664 2084 mscorsvw.exe 54 PID 2084 wrote to memory of 2664 2084 mscorsvw.exe 54 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\933c2e0b0aa78700a07e8662506560b63ba739eea4d4e645ade31d5bdf19637c.exe"C:\Users\Admin\AppData\Local\Temp\933c2e0b0aa78700a07e8662506560b63ba739eea4d4e645ade31d5bdf19637c.exe"1⤵
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2516
-
C:\Windows\System32\alg.exeC:\Windows\System32\alg.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2928
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe1⤵
- Executes dropped EXE
PID:1628
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe1⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1e8 -InterruptEvent 1d4 -NGENProcess 1d8 -Pipe 1e4 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1668
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 258 -InterruptEvent 1d4 -NGENProcess 1d8 -Pipe 1e8 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2808
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1d4 -InterruptEvent 248 -NGENProcess 24c -Pipe 244 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1260
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 248 -InterruptEvent 25c -NGENProcess 1f0 -Pipe 240 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1596
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 25c -InterruptEvent 264 -NGENProcess 1d8 -Pipe 260 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1376
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1e8 -InterruptEvent 248 -NGENProcess 268 -Pipe 25c -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2128
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 24c -InterruptEvent 23c -NGENProcess 26c -Pipe 1e8 -Comment "NGen Worker Process"2⤵PID:2840
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 23c -InterruptEvent 254 -NGENProcess 268 -Pipe 1f0 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2548
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 254 -InterruptEvent 270 -NGENProcess 248 -Pipe 258 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2532
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 270 -InterruptEvent 278 -NGENProcess 26c -Pipe 274 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1948
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 278 -InterruptEvent 1d4 -NGENProcess 264 -Pipe 268 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2876
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1d4 -InterruptEvent 254 -NGENProcess 24c -Pipe 280 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1008
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1d8 -InterruptEvent 278 -NGENProcess 284 -Pipe 1d4 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2632
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 23c -InterruptEvent 27c -NGENProcess 288 -Pipe 1d8 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1512
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 27c -InterruptEvent 248 -NGENProcess 284 -Pipe 26c -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1980
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 284 -InterruptEvent 278 -NGENProcess 27c -Pipe 248 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2664
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 298 -InterruptEvent 28c -NGENProcess 29c -Pipe 284 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2784
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 294 -InterruptEvent 288 -NGENProcess 2a0 -Pipe 298 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2840
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 288 -InterruptEvent 2a4 -NGENProcess 29c -Pipe 270 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:3012
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2a4 -InterruptEvent 2a8 -NGENProcess 278 -Pipe 264 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2176
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 28c -InterruptEvent 288 -NGENProcess 2ac -Pipe 2a4 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1868
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 24c -InterruptEvent 2a0 -NGENProcess 2b0 -Pipe 28c -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2476
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 254 -InterruptEvent 278 -NGENProcess 2b4 -Pipe 24c -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1772
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 21c -InterruptEvent 240 -NGENProcess 260 -Pipe 1c4 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:3064
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 240 -InterruptEvent 2c4 -NGENProcess 2b8 -Pipe 2c0 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2224
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2c4 -InterruptEvent 2cc -NGENProcess 2a8 -Pipe 2c8 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1256
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2d4 -InterruptEvent 2cc -NGENProcess 240 -Pipe 250 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2096
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 260 -InterruptEvent 21c -NGENProcess 2bc -Pipe 2d4 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:2476
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 21c -InterruptEvent 2cc -NGENProcess 2bc -Pipe 2a8 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2660
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2dc -InterruptEvent 27c -NGENProcess 2e0 -Pipe 21c -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:1792
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2d8 -InterruptEvent 2b8 -NGENProcess 2e4 -Pipe 2dc -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2948
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2b8 -InterruptEvent 2e8 -NGENProcess 2e0 -Pipe 2c4 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:2200
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2cc -InterruptEvent 2f0 -NGENProcess 2e8 -Pipe 240 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1672
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1ec -InterruptEvent 280 -NGENProcess 268 -Pipe 22c -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:1812
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 280 -InterruptEvent 268 -NGENProcess 218 -Pipe 2cc -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:624
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 268 -InterruptEvent 2e8 -NGENProcess 1d4 -Pipe 2b8 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:3012
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 27c -InterruptEvent 2ec -NGENProcess 2e8 -Pipe 1ec -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1132
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2a0 -InterruptEvent 268 -NGENProcess 2d8 -Pipe 27c -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:2368
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 268 -InterruptEvent 2d8 -NGENProcess 280 -Pipe 2e8 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:388
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2d8 -InterruptEvent 2e4 -NGENProcess 2ec -Pipe 2e0 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:1936
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2d0 -InterruptEvent 2f8 -NGENProcess 2e4 -Pipe 2a0 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2188
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2f8 -InterruptEvent 2bc -NGENProcess 268 -Pipe 218 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:328
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2bc -InterruptEvent 268 -NGENProcess 2d0 -Pipe 2f0 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:268
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 268 -InterruptEvent 300 -NGENProcess 2e4 -Pipe 2f4 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:660
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 308 -InterruptEvent 2fc -NGENProcess 2e4 -Pipe 2bc -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1492
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2d8 -InterruptEvent 2f8 -NGENProcess 1d4 -Pipe 308 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:2876
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2d0 -InterruptEvent 268 -NGENProcess 30c -Pipe 2d8 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2452
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 304 -InterruptEvent 2e4 -NGENProcess 310 -Pipe 2d0 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:616
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 30c -InterruptEvent 280 -NGENProcess 310 -Pipe 2ec -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2264
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 300 -InterruptEvent 280 -NGENProcess 30c -Pipe 314 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:2632
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2fc -InterruptEvent 304 -NGENProcess 31c -Pipe 300 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2404
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 304 -InterruptEvent 320 -NGENProcess 30c -Pipe 2f8 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:1804
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 328 -InterruptEvent 1d4 -NGENProcess 30c -Pipe 2fc -Comment "NGen Worker Process"2⤵PID:1048
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1d4 -InterruptEvent 268 -NGENProcess 304 -Pipe 280 -Comment "NGen Worker Process"2⤵
- Loads dropped DLL
- Drops file in Windows directory
PID:1860
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 31c -InterruptEvent 328 -NGENProcess 32c -Pipe 1d4 -Comment "NGen Worker Process"2⤵PID:660
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 328 -InterruptEvent 330 -NGENProcess 304 -Pipe 320 -Comment "NGen Worker Process"2⤵
- Loads dropped DLL
- Drops file in Windows directory
PID:3008
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 334 -InterruptEvent 31c -NGENProcess 338 -Pipe 328 -Comment "NGen Worker Process"2⤵PID:2212
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 31c -InterruptEvent 324 -NGENProcess 304 -Pipe 268 -Comment "NGen Worker Process"2⤵
- Loads dropped DLL
- Drops file in Windows directory
PID:2360
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 33c -InterruptEvent 334 -NGENProcess 340 -Pipe 31c -Comment "NGen Worker Process"2⤵
- Modifies data under HKEY_USERS
PID:916
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 30c -InterruptEvent 334 -NGENProcess 33c -Pipe 304 -Comment "NGen Worker Process"2⤵PID:368
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2e4 -InterruptEvent 334 -NGENProcess 30c -Pipe 340 -Comment "NGen Worker Process"2⤵PID:2728
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 32c -InterruptEvent 348 -NGENProcess 34c -Pipe 2e4 -Comment "NGen Worker Process"2⤵PID:2112
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe1⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2076 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 1dc -InterruptEvent 1c8 -NGENProcess 1cc -Pipe 1d8 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2204
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 244 -InterruptEvent 1c8 -NGENProcess 1cc -Pipe 1dc -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2252
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵
- Executes dropped EXE
PID:2376
-
C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE"C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE" /auditservice1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:1764
-
C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"1⤵
- Executes dropped EXE
PID:1224
-
C:\Program Files (x86)\Common Files\Microsoft Shared\Source Engine\OSE.EXE"C:\Program Files (x86)\Common Files\Microsoft Shared\Source Engine\OSE.EXE"1⤵
- Executes dropped EXE
PID:2244
-
C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:572
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
598KB
MD5d9281a13b088ef494a8c9ec77da5ef09
SHA1d30d6e0fd0169a0edd8eb937b681c25ba06ee568
SHA256c4b6e5eaa17ca3e42acb7a3d25a20615592701f2ec979c6703c6d1d2a85258d9
SHA512f468d56ac665e2b24eb7016d2f49f9bd7200d901058f8942d34c858bc32d80a1c2390ffb9cfcf9a74fa2a404513a415b5ca9d55d1616fefacbe095aadefabd83
-
Filesize
384KB
MD5de9b88825cfb54bbca87fca4aeb642e2
SHA1ffa36d9dc574b54ef7e48e624590f11a5abd777f
SHA256865632df7e9d81a7d33b9f5ab8b5dc7188ab12f014ff7f649b3a7b804b57e585
SHA512a35234344a91fa73dff4f4bb6d3a9534746de3812ccf1ebb6ecd92e41766484066bf5fb1e56d63efc23a784daff2aa79ad63ae1108804e8147a8b3d92fb1cfa3
-
Filesize
364KB
MD5889268e248334f15b169d944938488f4
SHA1479077b817327963aeecc539bee4d363a17a75d9
SHA256de9cdf1012a7f903b113b6a9ad66245effaf0308f817df1b2fd9a3ac138cda4a
SHA5129616dda6dd0a89a0bf6cbfa79f28e58d09d950c89d9c1988d634ecbed8d57129ac395d7b52d31ad0f0cad0d6862c46acbc8d089f0e9adf3ce69e9b58ecf2ae9b
-
Filesize
531KB
MD55263cb7020fba3637e6c17c6407f438b
SHA1f1f6cdfce02165489648b1f96ef2fc179cc16f0a
SHA2562aa13d1056aec463862116c8f9fd4ebffe469d1ba08042b6263002fceb867e4b
SHA512b629874e4bbd9ce93486bdc81855adf4c3aa977ef325234f3e66cd43fa934f24e0e94b2ea6e3f7c3fedc7cf2521f1f9ede516048945e8c445dbf4b6bf91bf8fc
-
Filesize
253KB
MD528ea8e4ab96d37804df3bc9685456471
SHA15f77b6cf3fbe197db6edc49b2f2f48e58e1daeba
SHA2564043a4769edb3f3b5861adc158d124f1998546496f5b39dd4a3c0702733ccebf
SHA512fac529d961b40fe74b7daffbd3b22f426e0c26b33667016b41ed73317b9527cf9b108f0ff1eeb4bcaf386598eb405c722b1311e9042053d3466596c1d9d6de9e
-
Filesize
136KB
MD57a325c9b8d614ff79beb5c8af193fdb2
SHA1f1f844148acaf1873656a912f0cd7635843076d0
SHA256acb7218645a8db11f4d39925a69935f5a0c243397672f721511a4eea4671f27a
SHA512e0ebbb957165574b6fea7cbbdb3293a586ac7083a66e2b853df1c985d4c3ae1ff1007075d1945e5e024875afe9441c6dacacbdf273c2a36cab3938c22f955406
-
Filesize
352KB
MD57f671368da5ac028e6218498fd49ee79
SHA194bae65aea15da0fcd9b7125da1a32bfc2678f24
SHA25642494259b28be2abd8f078b67258cf5892ea84baa75f3e583f28e5ab69096f77
SHA51209e2f3f1f7e0f54cefa303862c3610fc64940963fcb70d97b1cb49280b3f5fef9f4a8dc0ac308adc370a43dd5716753eb8001b9f20916e0bbe999f9b760fbda2
-
Filesize
1.2MB
MD5c617f41da23cfe1a79d127f9fe3ed832
SHA13731ca607e6ebbfaf39b66499565bb3cf2833b14
SHA256a2a7893020387988f575bd5af01b46a7670b3c6f9c428f5bb5f11135adf181af
SHA512098db694c2c443bda36087395af8b3946f56f76a9b73d632129ab442e0b017aa136e2d77afedc845893a0022c1e34e70b2536118776e603123d5b76dd30f3230
-
Filesize
395KB
MD5fdaa371b3dcc87a08e52be844f696f58
SHA14f23ffb3e006488bf9dc44e24c959612ede29561
SHA256800b643471978c2db04a8cb2885bced74954adb4c7d3375290458a3a4c4e1c53
SHA5127615c8ee529a81ebdff77dd48934dce2c6196d61e1a0f5769884bbc140e7403802db2235934c54adc9a94cf350ea4b5aa4ab3894ea0b122adc70ba421869cc34
-
Filesize
284KB
MD571a91ca13d5f214ef9cc36d5e339e648
SHA1a20f63929c72edfda93d57494f3acd45d868d97d
SHA2568b14218251b7fa5a955f6380912c58e14b2fbea49e1b0a1dc96e64fb584aa8ae
SHA512bb8695b8f8b83e86d6130b48aa26081ef1924dc1cc2b32513296a90c6c667b25a69b388ee005a4dcb29dc6430dc2fc4699ffed3c7d7f35df198e0c3202679e8f
-
Filesize
328KB
MD5683a9c287c4810e475e6dcfb20e2b3a5
SHA11e0c09ac1ed0c213e48bddd6339aa552427c5b00
SHA2567539f9745dcdfdfb2323e3b69b109a9526251c6d72d616e35ad2a50d6c98ba34
SHA512b4180ff7a0ccb75eaa91a809a960e7e544df27cce3c937d39be3663d33c3dc3575b9f720c5083c10e5486f9e72ecc092f1c6b5225f1e55368593ba63edb30013
-
Filesize
245KB
MD514069de7cd311b4087514bf027ba3edd
SHA1945e4babf30c87ec3ecf97c7bcb82863d26521d4
SHA25646197d7622b16890bf7292b3bc8d737c13c049d8a5c9cf9414258a75b9583d2a
SHA5129dbcca0eb9f06c2a69466cead83ec3e76526d725940dce3c419710dab32c1052b13a64ea1ffeb3597b52fa4d52ec67ef07417a5e14b83b5ba3ea09967bd1b0ec
-
Filesize
64KB
MD503b291f6f1d16b249159111aeee210cc
SHA1041c2d17e52796223f2eff6db23445edbba32da7
SHA256568c109ed4a0f02c3a98f50e0651e262dfa5b5c91ad7ed7392c0719106e32a79
SHA51227a47c283fd1e9412b1c685a7395070fd9d23b799d004c24b25caf4dc3dc7b8c9daddf5024b79c25ebf034a22da00dac40292fcab8a95b71e39c1c69575c69f6
-
Filesize
417KB
MD5c8e185414da1d9d1a73b624993268dbf
SHA1b1065e8254d8e67d9af4c87d628ee459b3ac1bd7
SHA25680a414a1e4bfce0be559d4e75a29d3e09dc77aa6669fbbdb8f786b74af5e22e2
SHA51244d38357961408c4a1fba7841249e9c168fdcc16f52b4a0160457d33e5eb4fdf88b1f700d4dc67ea6b522bae28ced49a700c9e1413db1dd3dd039f6c275b1e40
-
Filesize
376KB
MD570303ac1cfeb159186bd25377a18cf89
SHA1ac0c5361b9f9696e2a275e8ea73ff9ddd3a0c905
SHA256bfcfd1cae740df405fb6dde3b92151c326f039f78b96d372887223ae0f74f6bb
SHA5121e3b8836be2e43cf85031876402f97ad3d9a5651fc98cc4fbf7679bc65eec524f62a0a723f9b948ecda0b65f5f9790173bbefb3c707c99e7582c43faa1ee6972
-
Filesize
345KB
MD5068ab1918dfe225f70656c97f7b02584
SHA1e58486467465f28c6b264a16e6f9c54a319e0578
SHA256cb4c38dfe9b27db27408f97a8ca58ecc15171c4de42f67b76ebf703619231224
SHA512d19e5accff90872c4e1e226a9c2617df6eaa24331030569ecd42144ed60fc1c949b2dd647929920bf2d78539ef8d7668bb193adb5a37860c3257ac5270805a67
-
Filesize
460KB
MD5e28ee117b0db2217d2a02ee5b9488ae0
SHA165fe26f09621a8ee9cd86432424b81007b3f6958
SHA256ef43af78294b38647da55d003919dd3099d76cfde8d77650525c11ea83c72f5b
SHA5120e5068bff704b2c5e8408d5850f425f635f3a5e514156a881a48f90be3dc46a88f1a9a0753678ae3e460c5874cdb13e48211a422eeff15761dce49be99f06c35
-
Filesize
401KB
MD545b8bd549e5fe95da2e409c720d2f01f
SHA16c9b16354ea6b3d1110c561567e2f520595c68c9
SHA2561789eb5b5092372c1346ca0e04a5f8caebcaf42082636b84151aa491d6daa69c
SHA51228ab44300ea9892c8558ec3e07bc8acfc5b8fca0390d9a87b231c7c2a7e40f2b4948cb170e47788159ee623aaf9db26d0cc067f5b934e1955e21aaee96cfb923
-
Filesize
366KB
MD5bcbc463afafc5118f819424d96a63cfc
SHA128df2703bbff5c892067413575834b3acc7889c9
SHA256fec434334d41cd080bbc9502e913b4bed10439fe525a60b5541838454ffeccfc
SHA512a90b2b1ad9b213e4fa0516fad754444feb9418ff6d1a205d94011171956f0a842327b26807886cec010abdca76b74df93cf42ced141c6531f31d34024099a6d7
-
Filesize
374KB
MD5c3ad17f9659757ccd2a0c1f1f9103cac
SHA14623ff2506a0730f4d9739c6eaf1b4f34cbf51cb
SHA256a0e5276309869a815781877b7460359d76b15f38a978a093ead4a7ec6c8377a2
SHA51247ff2a6e6e0add682377c6959ffa8ac35a397fb84e0304d1b9fc9eccd38bb2556bce05a321012330e94646198dc26ec4646cfa73939b9b41708a155f57e2daeb
-
Filesize
385KB
MD5ba26b5bb86d7c0de84c0171918fd1d0d
SHA134823a82239fbd9ab5925c59b8f5d7bd06913ff1
SHA256ba9d497fc0d8ee63d8562bcb6de2501595c48808d4307a027e35e83718ab0abf
SHA512e92b5e6f948ddcaaf32a61a3b53af18c5610e00f4c60f663bd2db043e2a01a54aac209c0fae98353cf60d7cba44a67fe59bd58cb69eed4d872ec3027a7c12ff9
-
Filesize
334KB
MD552f0f19a9ed5204a7940bb92ef284cbe
SHA1d997963a18f39d2b2bac6bcb625afb30c203e4a9
SHA2560e6e4c46a26229af480310c5865282ac4d0f25b301d996c90d2540d0e260a865
SHA512ab721b29cd202c7e4942187427d3bb5d1823fc87dacbc27c4628654b77963ca066b6c255ce3b4d18529351d4baf6621626459b0186b9ca6148b0b2d955a57dac
-
Filesize
320KB
MD5d46280343571559cdc93f7e933e87a2d
SHA15f2cbfb00f035ee25e664c6ac762d7dd9788182e
SHA2560501cd3f67f6bfd13ddc65957fdd3f86b005fcbfbe63bb9c0fb7c2b6f1581f8d
SHA51287e3fe80bffe55da8aaca82dcb3278ef68b094a75b44b2f02669ce5df840ea9ab3170452fd7ff0f54aa573b877792caab75f90ba4402fe3e2d8505080eaf22ff
-
Filesize
362KB
MD5c115680fd9382efe07fe0e49a7f08d22
SHA1c2b9125bde883a721671793b6692894dcc5bbae2
SHA2563e78b661c5d22ef9187fc224085a583ff9b9c8995b2a8d80f69b91d581aafef0
SHA51269ba64a2f2c294949f56abe79effec42f27bda18e84e3af6d88171a7bd27a13b516963bcf07d93d168d28085d7acd414fa26aec2f90ca56274795782a5220b7c
-
Filesize
281KB
MD58a3b5f8803d75979661115d3f647acef
SHA1a2ad4d6b07857a1b3cba9e2472c6aa1f4e6cc2d2
SHA256f0a6376d75eed3c998695f47fdd28e740e3fb84acd0447592d3f40b06ea05b54
SHA51273bc4b35b6fe1f0b20bbe5445fcf6c7f7efe7080d10af6ed202007a21c8c2909dc6da83bc1d69b66de5623e59a53cd0a81eadba0eb2986952079ff3178f8f6cb
-
Filesize
350KB
MD5ae3bad03cf71db6d65ab31cdc09858f4
SHA11bbb557d320e58796cc8ded959bc7ff46065d389
SHA256a56306c462b6773f9aef4f8ce7f29836d9e10c3d051b69c86d1cf64fe3523d4b
SHA5120be7d8c6eb0c443946593144df213a0020378b3464dbc076c472c7718c77f6a3c2edd6e62f98bebfe4d2a43ff3cded71fa2de8e0e7da6d35c9bb70d2c3f62998
-
Filesize
442KB
MD57f951f92c5be02842f92d847c56ab641
SHA1a1e016f87142cf20d2cb68ba536b0df1ca66c395
SHA25669da52c07f0aa5d707631acf38f29b741c503157ba46f5d70bc4561bd3f81aa2
SHA5123ab2245a0535374488cbf965b5bf133f2497c51589b2702e550cf83b5121f34f9ad02105cf16ebe896e1625393518569557c69400f4e41edc9b0b2e2de9f31f0
-
Filesize
306KB
MD535fa436d482ce8707b89638baa89aa72
SHA1b88b06f1ce08f9f7a4c3bd388e997f48c5eb6f57
SHA25651a8ea7b388fadc7612593ee09c0def9042b08c9131899dc824090f2660bd425
SHA512fa3afd6cdeea51a1c5f290cf5cfa5152f53783844c0f67b485b220bb3d1d9f9fe6a9ee0355324974a99649416347d943f96630a8ec7a13ac1e91e7ee7171f97a
-
Filesize
250KB
MD5af59dbe63695c2e74da0f3fa6b6a33dc
SHA1300e90f5a711ed85a7816b2a020f010343486ad1
SHA2561daff3ebf0c964d388db094fc4210b4e2186b1c2e8d4b5614eac43135c0e09e5
SHA51247d6c879d10a45b59bccd979eba57e7d42756b76dcb9fe79585b233b8a40032b3427824ba5564961b915673c77cba9e6a344e875cb6535a8af400dc79a6a1f56
-
Filesize
316KB
MD51d0ae5a85aa59c0fbbd6ad9ab3df5c18
SHA1ed1ebdeef279c3f13ad2286190e6cc14112396f0
SHA256aa11f6400e13b4f3c5b4834fa91d5a0c81c7fe14368719c8cb7812815aa3c0ba
SHA512f4e393aeeabed8d35c12f74f2b20c65d7bf6b95ca6569849f777417a087b2477bffbc4603cfacbb2e455c60bcb1ff669d1ce90d418720d6c4872c10b57d88a6a
-
Filesize
199KB
MD584687c4fc37c44b21e27940644d18486
SHA1d28a4ede35c18102c9bbd5a89cbdb0b94ff86c7b
SHA256c4ce6c256ee9812689af18b77ae7836befad4c06fa10fbfe2cf244c4f63c64f0
SHA5125830d8bce768c9e8cbfc5705467e7430e0a44d9611304e5ca657c90d859200cd4fd3be3d88fa55dbdee0296ce257acf995f784733c76f4bdb3b3a3d95a80bb7e
-
Filesize
476KB
MD562df0589a7ee05a7f449f732d725efb4
SHA1f3a79844758b6007e35405f731fca6c06ecac7db
SHA25677665a3e7c308d04ed8cf24f1338e38368d423cd09289aa512be9ed35c933be2
SHA512a2d7b09ed1e499cbc5f6702f601acf8c638a3065f0a857b4fc37f31e8c1cd73454fe9241f6908487a58e0fdfb85b412eec10405ed8edc94f2696d9edeca39c3b
-
Filesize
1.5MB
MD504c0ae158e90e2ab477fdcf370a33fbf
SHA171e4ac9bcfe564d32db25b3bdfbfe832c168bf93
SHA25655af8c3ad9d396fd4436c018083330c68d5a38d713fcec9ea60dc6c81ba95792
SHA51264a299fd18c0e8e40dcdae981e9ccff51631e2239fe232d3f7f38813eb2d56c273a86c3a76d16f8a4e1e2080f1565b96af4f0fe58f8903bbea9c6adcd238c27d
-
Filesize
1.3MB
MD548c46b1ebc3878c205c4569a0c07a8ba
SHA1f712d9d2a7040ef4bf0abcd861b6317d3664732d
SHA256eac43fa1927f2867bd2a03c82c255ef1bcd2b1fad9c073eb380cebc830d1a485
SHA512c21a7ad913074a02691a5573961b4eddb18290e99ecb6f4faca7d253d52058b54215ce95a59ad1e164d8b2b582640133a650b16aa4fe5c92df3904714c5fbeeb
-
Filesize
124KB
MD519dcb3562aa7d413acc6884874b1d795
SHA19bdee2153d07d1dca5f0e22cdabab2c3ed9aac29
SHA256709a14fa18dd2bea7bc8634c87f822d76004dbb54ff15571761c2775cfa07848
SHA512b5f7a4e7accb0803de946cb8a72a586e22193135ead22f07ac6f1989899723aa1d5c45b3db39dc65d19fbd74e77a66dba654a1f8956a87264e850781f9e0ef19
-
Filesize
145KB
MD5e10556e3e2736ff267f522cb81dac78d
SHA13497fe71085c2d0df16031d8b21dc0bbd4721831
SHA2567bc67f4638fe15bbb5e8400d37cab3a5d55d355e45771b16d6731721fa96a550
SHA512963fa8eed9dccc18e2fc482078ba718d83c27c0f328c4188d0121850d90e968fc2a43ff4a95fec71974a026c35a6eb73e0562fadb1c681560434fb352b949618
-
Filesize
1.3MB
MD5c0472d19f076af19ca0f03a82b5faf84
SHA157a275be39c2c626ace5a4f5ced3aadf35017fcd
SHA256eb7f4ca39ef948d74c5c3508f0df2ad4278cd10b2d933ddba6ca5344dfd5f86d
SHA512ac2008aba46f86622dc612838d1a2e79a1e0ca424590baa566f79e4e7368f7734ff103aee66018ce95c29f87a181a0923f038c9b4d826c01b4333af57cbea6a7
-
Filesize
1.5MB
MD589e3e86ddc8b6edc28992492057650cf
SHA1168b8e57891bd5e1ca69706adb0d583133ad4034
SHA256b7d4124a83c71520d1beedb6cb179b0f9423158bfed45b1f082afe4fdb69e4b8
SHA51295c7839d74115d45ea897a73080ce99b290557b4dd3180e7f7de2270f505f5603656769a6a8b1cd8caeebb2efedb53ffa15d58a0ea0b9305719f183cddb89c41
-
Filesize
299KB
MD56e84cf978b01ded993e24c5e1d389c46
SHA121cb437188e5062272b67e37e2b2980649410d2e
SHA256a533e7e22cadcbc42c32a511e41e2dacd5e929f8751144b0facfd0fb8274444e
SHA512c589cad5b8c9a3e58b39094c7d6cc27e2d7423ecd11c621b599615300a0ba23e013cd36d73873d91a25fc9fa6bb8ac79fac39a71ec6b3168b62fd887149d86ea
-
Filesize
127KB
MD5b518c48e3cff2288165f65d222714805
SHA1af2921c72a816ab59bacc24a1a3674a416b13545
SHA256ea7fd72568a58de85b6b2521db61f329ed475ec761afbc7434dac916b4722611
SHA512db848e1a9d00edc7874c25ff42cd29880223b0635e023fd347de362dee8144828b5f4dd2d674a0e8a5a6ce4c05847948716240fe0b91db7bf5875f77eada2399
-
Filesize
238KB
MD58d7ba98c3f508d0fdaf5b2c3272b70df
SHA1da8406280e86f983ca9b42987c7485c29b5d6111
SHA25677cdcce36bc9a6e084e363e8e2e62c1e3a38882cb44eb6e1a2db758a3f0d5d7e
SHA512f3e493172176dc247bd802f2735ed0cbfaafba65995b78a1a39c23ddad7e5568fe195b0951fece81593f28d320c9b0e4e82c59943eb593f359846ca4b8bbf2dc
-
Filesize
151KB
MD5ac7004fbe01361c6944376b8ccbd6122
SHA1b5c0e097f6b8da6af7ce1feb9c0aca8143ebe91f
SHA2565d3ce336824890b2a43f648274ca055f23463f3afb70630618a9fa186772a698
SHA512286abb5c5cf252324eb833b4549a40801014a8bee4922a1e03f89c353bb9884fed50b537abeb094a422dc1d34a70aebec41bfc75972afcf3e40a0006ccec362c
-
Filesize
67KB
MD566d2172c5f4650c6a9e8f078bc1f5ae7
SHA186bfef2b282fab53d4ebe43246e7452546167faf
SHA2562b070015f1180ea594f1664dd0703b4a09253e2b92e5b1034957df8046abb09f
SHA512ad889b302cec657f9566498a5dbf017b8c05196a4f8bd91883ed7d31f078cfedd676839fcd3fdcaaca384e308a3d9a1f9f9e9c51c710f056271d4b09ac3e5f7c
-
Filesize
225KB
MD5d70f471b38fc5270b0b070b1d169ad91
SHA1556a91def43aede5462d549845e1d150ac87e279
SHA25695fd5a4505b8ee558a8c43c2a74f9057de98ff823b9fb51baaac16946f25efbd
SHA512830f7198666a1989ebbf4a2277d3c3d7ec101926e6ad3cbf366e0ee7751f830fea772fe049ea15078db0db6612b180e5f81aae9c7b34f9dc1239ec25cf3d860b
-
Filesize
188KB
MD5c39397462a77f99142d66117a4f36fca
SHA15acff020527af666b82426f1d6ad6d04447b62a5
SHA256f6ae9b06b80b4457c43e5537e4c9cb8d47a1ec1866b9ff793bbd380e8a39e4e0
SHA51207b4bacd347899052e7ece95d056511221302feb400756878de454d6fd6f2942fdc96009c79c79407c513b184cf2ee3c4e3e1a4d946eac4053b93658182d45e7
-
Filesize
269KB
MD5bca88a4c80dafe40cbaabcdc302063a7
SHA1145e79a060336f62a6f817ac42b48ccc696ccd92
SHA2568a04199107a697d21c981f9d124aa2707af84579e033ca9f53f8c7e7e3b5320d
SHA512d07f29a34c93994690cf5a636cb7e91bfb1493020cf4811100a39984bd1be0750304df479fc731919973e11284234186a43ffba92f0b2d5e9a07fed9d086e43f
-
Filesize
142KB
MD550d7c647fae46ea12a33ee7fbdc68f9e
SHA1cdceaba1293f417193ee3d1ebe947b3d8870e948
SHA25633b19bb0622f9dcd8e40f57e462419e663276d859424f4883a66a51ea15deaed
SHA512323d0678dbb8ab50cdc616dd34442560758ee4374f2fae05079be8270638b2f31519fb72a08314ab4f307fb9cec7239eb2703291feafaa1240b21ac0d07e0ee2
-
Filesize
72KB
MD57ea0ac4df66afa4316b2b55da8dfb0e7
SHA1436faf9ca82dd8688f348cb06bd1f7c92c7b34e5
SHA256d6b5929fc8e09c132031985c129073301f8001a37adc69d32e1850841756c412
SHA512eb64922b466b231af0a54fe557c8c6bef6df65c77463283a35f082f3a4c4356cbbfb64ee083d806d56a0aca9a01b3b3ec43da5cb53daa52b9b44093c4b5e4fd4
-
Filesize
184KB
MD512622f2ef9e48deb5c05f99ce4e5037d
SHA1b2dbb3f197ccd577702f527127f891dac96c0279
SHA256f789bd266df44846c1107971af8b0ddbaa90bb5971352a2e9558bc7bd76547cf
SHA51247c19d20c3d1c35152259e4b3266218270e5b0907d2b81e95726dd72810c46f2ad192c908503f66b120c3ae0da1ff3506e06486cf0f9acb4c97967a8e5532609
-
Filesize
74KB
MD5bf864e38ad90177a965d70b863edc173
SHA1747063721b8beee9bc64dc12c02bbe799020273d
SHA2567eb24c1939a01c16892e763b67b9b693bd0c83ce10d09eb38bb352827613a763
SHA51263467367fd970ba78d1e362208dc0377c5645c82221579f12d14bdfefb0091d356295fb3ae4bfb9f3bfe0bacf8024e6d68c12f8847bfd1101309c49ad5b8ca13
-
Filesize
126KB
MD5fbe2095f7f85980dca14fb02e684d9cd
SHA1ae645bb88ca5fae866f17722a08ef9709a4abb53
SHA256e0496cd57b1b217a9186695c760e014c52a5ee206a9c9fd902d660b885259198
SHA51254864468516161e4b7d21350b575ce5ac87950fc0f70a731eb994f424851bde79b1b33f7aa8514201ed390e9540e76e5adbafb144a2d62fa3dff11634fb9fb17
-
Filesize
198KB
MD528043c826f01ec2a124292de6bf3bf02
SHA106038f53f24fb78d39816444779969b8c02322ab
SHA256bf4432e731c708b692ce13d74d76bfd99f6e32209db8b2dd2146fa33ae254278
SHA512fefe0138f28302f4e9bfd2fa4f93c9084bed0b6c7a671613673f74448eb787b44117903886625ac09c96306eb1b527b2352537cbe6bcdc6da7e3d4ff13c7adea
-
Filesize
82KB
MD5189c4d87759d9891dcec82270e2c9484
SHA1f19816b4026e9c0bdf5ab15989ddea764da03a9b
SHA2561cc0b8eef53fb23b58e3cab7ec24a194977fe203a6d54f21fa755ae8e11e457f
SHA5127e5b85c9255fbdf25041bb921c7f559af1e37e47951fe17e72e31a2760ecc1963b1603665b3e4180b9cd8dc1e935f4d6bfdc8ae18583de8d9c270f3ebfb9dd28
-
Filesize
120KB
MD55d7e159adfec7898e612bcede65a3f19
SHA152c8359fc583b4f4014124450c1da95c43c863b2
SHA2562a4765297cf9896a1cbf624201a11b1e1cccb903a472fb447452f93daa153d12
SHA512782e3a7ea55d09cae57129f3d218577cd0933e75d9138f0aa9c1c5cc1389a7a7aff96413a7ed7bf802ec67b9b5e5bef9f2d58e8c793c0d28f329c3b8b430e800
-
Filesize
91KB
MD5b90f8a1b3843b0be916647c7f1656e64
SHA18943e4e1d82a19ba5de8069702146abdc83aafd0
SHA25615e8799302da7cfae11eab003ee15bae14347ec1a0dfafcc9cdae1143f77e00b
SHA51208edc4e758c3bd917a8297b3cae066e659bda955de218a0f2f2475f78e6105033439b6302cde30ab9d131d19cc1d454196ea177e9e12228723572567b216ff47
-
Filesize
66KB
MD56edfb659cf1c339a53a4e4d4bbe68d28
SHA17c708e4a44298f915abcfc448aee892c4c3c1364
SHA25621cd5b9ba6c5a5f62dfd2490ab64171c23718e1b654d1d1a22a9b6491734a42a
SHA512500484254320710d2a722da1cf03fa9368ffe24a3e2e7a383ec9bb62ae749c0d6a8070b3b39cb6971ce8d566d175be70ddbab7d5657ecae22d9e34610b57ec20
-
Filesize
56KB
MD53029dd665333b141e295f7a5291dc713
SHA1d12b641dfbbe88df15abad17d97b32edd27dd656
SHA2567c17dac0212de9e78e8d9dc330fa37012ed7edac256f6a3b063c75c1f6bd1680
SHA512d20494f508ee8d197923dda97f89a03349058395d17b5b424cb392af265764feef27ce6d48e5718693c3c406af7559b4dfdeae9712c9608efd01da524a7d7652
-
Filesize
236KB
MD5277999adcfc3255e1c82956108e645e9
SHA1d845d2935d1b007ddb7d8af5d6f118f0d389fab5
SHA2562da35f156facd73e219f102e257089769075321a98f4f22bf15ce3c478a29b73
SHA51244e2ad572f2fb362747bb89864064a02e4e917cc5ed4990df0d6c50180a98755d5c0303947c7afd873ec3a8710fd0b2cd47950878a980f8941134a339dac78e0
-
Filesize
347KB
MD55c2a748c45abddbd76d3e2c49e0f36ba
SHA190ea7a3fef298fb8a409a03985b9daa1b7564787
SHA2563580e2bea7dbe2aba7ff5571d6a857c96ceacf4ea97f70518154ddf1a695ce7b
SHA5120744c831531bfead36e706a5eec2ea71691860bfe6ed989a5cc62078acd93357f2c73219a087e71b4c310b1b263829c09bf051fcb03b1cf828fe9fd25fc539f5
-
Filesize
208KB
MD5fe1aa02435204b6b7532222f13b4c1b8
SHA1e26acc1ea4b85d7d590331ed3dd46c1165017290
SHA2568811dd12bace64ef6ede7a0b667e5eddccaea49825506afb5a053c138c36f674
SHA51291ebb5149234a8878aaee4de2c5a725786ce9758bc0c9d2f2377f63ea535bceb74b75b71e819fc589b8fdf663006140be64cc8f4c0d3236e6bb6c72224b2d821
-
Filesize
231KB
MD5667b9e6c74819b7bc9ae19079197931c
SHA113963e0e16542eae2c2fa7f6de5da870f8a38222
SHA25684d6f65d9a6c9a74fec3e28881669c2b7a60f0361625f6f0d329a6efb89fa127
SHA512521e331321cb68a9dc4a2daa4d5e947883eccc12525864d8322b7d1a4b7ad83cb852ea7847ad7ddf52e866ffe04d0cf730b4fbe945c03ac7268bf074bf1c67d4
-
Filesize
8KB
MD5da8a1599b18d3ca1598448efa6d8acb5
SHA14116e8c6e4e0eff959a250b0fc0fec636f6873a9
SHA256cfc115f861707969e62eb3ba83a65ce8620b517eed60638eda048d274d13db70
SHA512b7503c7dc7cf3ce342f10a053b66354668e546e4a8678a0841fd6a99c9aad0f5bd6c443d7bdaba86bef7bfb76eeec9324946c25b8987143f7e84a5e81438a691
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.Office.To#\e1f8e4d08d4b7f811b7dbbacd324027b\Microsoft.Office.Tools.v9.0.ni.dll
Filesize148KB
MD5ac901cf97363425059a50d1398e3454b
SHA12f8bd4ac2237a7b7606cb77a3d3c58051793c5c7
SHA256f6c7aecb211d9aac911bf80c91e84a47a72ac52cbb523e34e9da6482c0b24c58
SHA5126a340b6d5fa8e214f2a58d8b691c749336df087fa75bcc8d8c46f708e4b4ff3d68a61a17d13ee62322b75cbc61d39f5a572588772f3c5d6e5ff32036e5bc5a00
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\03cad6bd8b37d21b28dcb4f955be2158\Microsoft.VisualStudio.Tools.Applications.Contract.v9.0.ni.dll
Filesize34KB
MD5c26b034a8d6ab845b41ed6e8a8d6001d
SHA13a55774cf22d3244d30f9eb5e26c0a6792a3e493
SHA256620b41f5e02df56c33919218bedc238ca7e76552c43da4f0f39a106835a4edc3
SHA512483424665c3bc79aeb1de6dfdd633c8526331c7b271b1ea6fe93ab298089e2aceefe7f9c7d0c6e33e604ca7b2ed62e7bb586147fecdf9a0eea60e8c03816f537
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\0cb958acb9cd4cacb46ebc0396e30aa3\Microsoft.VisualStudio.Tools.Office.Contract.v9.0.ni.dll
Filesize109KB
MD50fd0f978e977a4122b64ae8f8541de54
SHA1153d3390416fdeba1b150816cbbf968e355dc64f
SHA256211d2b83bb82042385757f811d90c5ae0a281f3abb3bf1c7901e8559db479e60
SHA512ceddfc031bfe4fcf5093d0bbc5697b5fb0cd69b03bc32612325a82ea273dae5daff7e670b0d45816a33307b8b042d27669f5d5391cb2bdcf3e5a0c847c6dcaa8
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\1f5d757f0db1005daa2dee10d6117655\Microsoft.VisualStudio.Tools.Office.HostAdapter.v10.0.ni.dll
Filesize143KB
MD50357fac505a1028f1b803e4170de3a62
SHA10ce8e6445a23e02b8b23e964e3cced0f304f556d
SHA256c0d079e51a8b642b9e7fea65b241204f4d890ec4f81030b6e1cfc86ac8a2c435
SHA512ebde8c35ffeb88ffdcf14b0e7ef669acd641822e9b3a919aeb8a29b01237a8b3b44e3a446d4a6b2fb53781e944dee94ae471b94ee12e27a279169d51a87acb12
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\367516b7878af19f5c84c67f2cd277ae\Microsoft.VisualStudio.Tools.Office.Word.AddInAdapter.v9.0.ni.dll
Filesize41KB
MD53c269caf88ccaf71660d8dc6c56f4873
SHA1f9481bf17e10fe1914644e1b590b82a0ecc2c5c4
SHA256de21619e70f9ef8ccbb274bcd0d9d2ace1bae0442dfefab45976671587cf0a48
SHA512bd5be3721bf5bd4001127e0381a0589033cb17aa35852f8f073ba9684af7d8c5a0f3ee29987b345fc15fdf28c5b56686087001ef41221a2cfb16498cf4c016c6
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\875b762fa06327d271447dab3604f706\Microsoft.VisualStudio.Tools.Office.Word.HostAdapter.v10.0.ni.dll
Filesize187KB
MD5b8b6d715fa8acb3220f47b612fd1c0a7
SHA1cc8588603b34905da0fcf2d1bdea4784887319eb
SHA256fb124b574790ef172abcd776bd1ca09b27cbfe90eff13ae1803f07ef5648fdae
SHA512d6ba58a98617e3e8962783795e98ae38e5d5a9a1fc30f857a7e40cf2b23773a047be531ca1b4e4f3a9b37097a90c0362cf2b8cc3d947099cd76192d91642d87c
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\8c6bac317f75b51647ea3a8da141b143\Microsoft.VisualStudio.Tools.Office.AddInAdapter.v9.0.ni.dll
Filesize210KB
MD54f40997b51420653706cb0958086cd2d
SHA10069b956d17ce7d782a0e054995317f2f621b502
SHA2568cd6a0b061b43e0b660b81859c910290a3672b00d7647ba0e86eda6ddcc8c553
SHA512e18953d7a348859855e5f6e279bc9924fc3707b57a733ce9b8f7d21bd631d419f1ebfb29202608192eb346569ca9a55264f5b4c2aedd474c22060734a68a4ee6
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\9306fc630870a75ddd23441ad77bdc57\Microsoft.VisualStudio.Tools.Applications.Runtime.v10.0.ni.dll
Filesize53KB
MD5e3a7a2b65afd8ab8b154fdc7897595c3
SHA1b21eefd6e23231470b5cf0bd0d7363879a2ed228
SHA256e5faf5e8adf46a8246e6b5038409dadca46985a9951343a1936237d2c8d7a845
SHA5126537c7ed398deb23be1256445297cb7c8d7801bf6e163d918d8e258213708b28f7255ecff9fbd3431d8f5e5a746aa95a29d3a777b28fcd688777aed6d8205a33
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\afa5bb1a39443d7dc81dfff54073929b\Microsoft.VisualStudio.Tools.Office.Contract.v10.0.ni.dll
Filesize28KB
MD5aefc3f3c8e7499bad4d05284e8abd16c
SHA17ab718bde7fdb2d878d8725dc843cfeba44a71f7
SHA2564436550409cfb3d06b15dd0c3131e87e7002b0749c7c6e9dc3378c99dbec815d
SHA5121d7dbc9764855a9a1f945c1bc8e86406c0625f1381d71b3ea6924322fbe419d1c70c3f3efd57ee2cb2097bb9385e0bf54965ab789328a80eb4946849648fe20b
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\de06a98a598aa0ff716a25b24d56ad7f\Microsoft.VisualStudio.Tools.Applications.Contract.v10.0.ni.dll
Filesize27KB
MD59c60454398ce4bce7a52cbda4a45d364
SHA1da1e5de264a6f6051b332f8f32fa876d297bf620
SHA256edc90887d38c87282f49adbb12a94040f9ac86058bfae15063aaaff2672b54e1
SHA512533b7e9c55102b248f4a7560955734b4156eb4c02539c6f978aeacecff1ff182ba0f04a07d32ed90707a62d73191b0e2d2649f38ae1c3e7a5a4c0fbea9a94300
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\e0220058091b941725ef02be0b84abe7\Microsoft.VisualStudio.Tools.Applications.HostAdapter.v10.0.ni.dll
Filesize57KB
MD56eaaa1f987d6e1d81badf8665c55a341
SHA1e52db4ad92903ca03a5a54fdb66e2e6fad59efd5
SHA2564b78ffa5f0b6751aea11917db5961d566e2f59beaa054b41473d331fd392329e
SHA512dbedfa6c569670c22d34d923e22b7dae7332b932b809082dad87a1f0bb125c912db37964b5881667867ccf23dc5e5be596aad85485746f8151ce1c51ffd097b2
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\e2de462e9ca695667d360c4de35ad773\Microsoft.VisualStudio.Tools.Office.Excel.HostAdapter.v10.0.ni.dll
Filesize180KB
MD54cbf0224ccd372f025ee15257724803a
SHA1592d0fa42aed04ba56d6788538ed754174d47d5a
SHA25663b62d69e464e8eaf0496859b136432037ecc8bd6e29dd24eae4e8781658ab56
SHA512b44e181b152aedd63b84db84f08fc70c77a2a5cedc0f2764fff4ba34c74b7ccddcd8c969277b07f40498a22409bc21b199aa002ee464bff52643ef58051bb654
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\e9a9a89db7ef34e6218086e4d0b301a6\Microsoft.VisualStudio.Tools.Office.Outlook.HostAdapter.v10.0.ni.dll
Filesize83KB
MD59b381b3401f6252892750319e71e0985
SHA16a9032fa08c8682e2fe112aa33559e5e989583e0
SHA2562cf3ddd09017309a442d3ed213e04d0b5c271b19b437a5348cc6b40b4b1728a5
SHA512094686784eb5b1e8e059a519ced6c099709f2895f9c30a951a382656b5462ac08eace79f7a7c2c810071278f2fbf86f385fc9830d990b52aa641ce0d195c13bf
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\ee73646032cbb022d16771203727e3b2\Microsoft.VisualStudio.Tools.Applications.Runtime.v9.0.ni.dll
Filesize130KB
MD52735d2ab103beb0f7c1fbd6971838274
SHA16063646bc072546798bf8bf347425834f2bfad71
SHA256f00156860ec7e88f4ccb459ca29b7e0e5c169cdc8a081cb043603187d25d92b3
SHA512fe2ce60c7f61760a29344e254771d48995e983e158da0725818f37441f9690bda46545bf10c84b163f6afb163ffb504913d6ffddf84f72b062c7f233aed896de
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\f1a7ac664667f2d6bcd6c388b230c22b\Microsoft.VisualStudio.Tools.Applications.AddInAdapter.v9.0.ni.dll
Filesize59KB
MD58c69bbdfbc8cc3fa3fa5edcd79901e94
SHA1b8028f0f557692221d5c0160ec6ce414b2bdf19b
SHA256a21471690e7c32c80049e17c13624820e77bca6c9c38b83d9ea8a7248086660d
SHA512825f5b87b76303b62fc16a96b108fb1774c2aca52ac5e44cd0ac2fe2ee47d5d67947dfe7498e36bc849773f608ec5824711f8c36e375a378582eefb57c9c2557
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\fc36797f7054935a6033077612905a0f\Microsoft.VisualStudio.Tools.Office.Excel.AddInAdapter.v9.0.ni.dll
Filesize42KB
MD571d4273e5b77cf01239a5d4f29e064fc
SHA1e8876dea4e4c4c099e27234742016be3c80d8b62
SHA256f019899f829731f899a99885fd52fde1fe4a4f6fe3ecf7f7a7cfa78517c00575
SHA51241fe67cda988c53bd087df6296d1a242cddac688718ea5a5884a72b43e9638538e64d7a59e045c0b4d490496d884cf0ec694ddf7fcb41ae3b8cbc65b7686b180
-
Filesize
641KB
MD50cff89da1f7356f21e98ef45ecfb84b1
SHA1df4f74ad497a9f813a344ea088d1eec56e6dcef1
SHA25605424b7ab9eedab8d4dfdcc281f61db6b334db12a0baa75da290eef0bf01bbfa
SHA5125a5f942c126ddafa3d1de14d4b766a5301960e7b68fae61b4882b4617d0d2ea63f8c52309ecc738f4ac8d518c8281735f9201ccfb5eceb7aee4a9cace18d28b6
-
Filesize
1.5MB
MD5de8d9a48196b4cc70d3867700f7de527
SHA1df548f81fa01d2a374306a446b94b5f0d74ea15c
SHA2565afd6125947a28128a13c0eb03fbedd95e872bf26f6dd6f20860e552fd01752a
SHA512e96f67e96d0d159ad19e06c66f3de3e42ea6d22f26a13c830a5a2dcdb6f1ac256f21ecbeca39c13eca18d561f37ae720f66816370af400c323852601a0502d5e