Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
04/01/2024, 11:28
Static task
static1
Behavioral task
behavioral1
Sample
6c8e20fb2cf8122c324eeb05dcd6802b880907507c99baa872d5cb7c7ec5dfa7.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
6c8e20fb2cf8122c324eeb05dcd6802b880907507c99baa872d5cb7c7ec5dfa7.exe
Resource
win10v2004-20231215-en
General
-
Target
6c8e20fb2cf8122c324eeb05dcd6802b880907507c99baa872d5cb7c7ec5dfa7.exe
-
Size
1.8MB
-
MD5
00924229de55853e894c45b78b186d0d
-
SHA1
5a22120a81f0056c345eb99041fb40258937ad84
-
SHA256
6c8e20fb2cf8122c324eeb05dcd6802b880907507c99baa872d5cb7c7ec5dfa7
-
SHA512
fb04c5a6a221210ed74a54adb5aef2fd6ba12710e16f0fe65f2b1eb0b88a18edbebb330ad8723ee28ada28222d8628f5a94dd295f7272c394d3dd0f94a4d0689
-
SSDEEP
49152:sx5SUW/cxUitIGLsF0nb+tJVYleAMz77+WA8ErvL73RLSo+2fhl:svbjVkjjCAzJ4rvvRe12fD
Malware Config
Signatures
-
Executes dropped EXE 51 IoCs
pid Process 472 Process not Found 2940 alg.exe 540 aspnet_state.exe 2900 mscorsvw.exe 2400 mscorsvw.exe 2560 mscorsvw.exe 1480 mscorsvw.exe 1924 ehRecvr.exe 2284 ehsched.exe 2212 dllhost.exe 2696 elevation_service.exe 2688 mscorsvw.exe 2888 GROOVE.EXE 1936 maintenanceservice.exe 2016 mscorsvw.exe 1824 OSE.EXE 2100 OSPPSVC.EXE 1624 mscorsvw.exe 1896 mscorsvw.exe 844 mscorsvw.exe 1596 mscorsvw.exe 2740 mscorsvw.exe 1644 mscorsvw.exe 1688 mscorsvw.exe 2644 mscorsvw.exe 2520 mscorsvw.exe 2636 mscorsvw.exe 936 mscorsvw.exe 2308 mscorsvw.exe 2392 mscorsvw.exe 832 mscorsvw.exe 1924 mscorsvw.exe 1812 mscorsvw.exe 2196 mscorsvw.exe 2404 mscorsvw.exe 2856 mscorsvw.exe 1748 mscorsvw.exe 2844 mscorsvw.exe 1432 mscorsvw.exe 2660 mscorsvw.exe 2160 mscorsvw.exe 608 mscorsvw.exe 2808 mscorsvw.exe 2528 mscorsvw.exe 2588 mscorsvw.exe 2108 mscorsvw.exe 1364 mscorsvw.exe 2876 mscorsvw.exe 2664 mscorsvw.exe 2392 mscorsvw.exe 1648 mscorsvw.exe -
Loads dropped DLL 11 IoCs
pid Process 472 Process not Found 472 Process not Found 472 Process not Found 472 Process not Found 472 Process not Found 2588 mscorsvw.exe 2588 mscorsvw.exe 1364 mscorsvw.exe 1364 mscorsvw.exe 2664 mscorsvw.exe 2664 mscorsvw.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in System32 directory 5 IoCs
description ioc Process File opened for modification C:\Windows\System32\alg.exe 6c8e20fb2cf8122c324eeb05dcd6802b880907507c99baa872d5cb7c7ec5dfa7.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Roaming\b05e45f53db14c9a.bin alg.exe File opened for modification C:\Windows\system32\dllhost.exe 6c8e20fb2cf8122c324eeb05dcd6802b880907507c99baa872d5cb7c7ec5dfa7.exe File opened for modification C:\Windows\system32\dllhost.exe alg.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat GROOVE.EXE -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\Google\Temp\GUM583E.tmp\goopdateres_sr.dll 6c8e20fb2cf8122c324eeb05dcd6802b880907507c99baa872d5cb7c7ec5dfa7.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\ktab.exe mscorsvw.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\airappinstaller.exe mscorsvw.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\template.exe mscorsvw.exe File created C:\Program Files (x86)\Google\Temp\GUM583E.tmp\goopdateres_mr.dll 6c8e20fb2cf8122c324eeb05dcd6802b880907507c99baa872d5cb7c7ec5dfa7.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\A3DUtility.exe alg.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdate.exe alg.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleCrashHandler.exe mscorsvw.exe File opened for modification C:\Program Files\Java\jre7\bin\unpack200.exe alg.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\kinit.exe mscorsvw.exe File opened for modification C:\Program Files\Java\jre7\bin\javaws.exe mscorsvw.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\jp2launcher.exe alg.exe File opened for modification C:\Program Files\Mozilla Firefox\default-browser-agent.exe alg.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc-cache-gen.exe alg.exe File opened for modification C:\Program Files (x86)\Google\Update\Download\{8A69D345-D564-463C-AFF1-A69D9E530F96}\106.0.5249.119\chrome_installer.exe alg.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jinfo.exe mscorsvw.exe File created C:\Program Files (x86)\Google\Temp\GUM583E.tmp\goopdateres_hr.dll 6c8e20fb2cf8122c324eeb05dcd6802b880907507c99baa872d5cb7c7ec5dfa7.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jmc.exe alg.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\xjc.exe alg.exe File opened for modification C:\Program Files\Mozilla Firefox\crashreporter.exe alg.exe File opened for modification C:\Program Files (x86)\Google\Update\DisabledGoogleUpdate.exe mscorsvw.exe File opened for modification C:\Program Files\Internet Explorer\iexplore.exe alg.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Icons\SC_Reader.exe alg.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\MSInfo\msinfo32.exe alg.exe File opened for modification C:\Program Files\Mozilla Firefox\plugin-container.exe alg.exe File created C:\Program Files (x86)\Google\Temp\GUM583E.tmp\goopdateres_nl.dll 6c8e20fb2cf8122c324eeb05dcd6802b880907507c99baa872d5cb7c7ec5dfa7.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe alg.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\template.exe alg.exe File opened for modification C:\Program Files (x86)\Google\Update\Install\{457A3A65-A1DA-4079-AD34-F52C28F93A8D}\chrome_installer.exe mscorsvw.exe File created C:\Program Files (x86)\Google\Temp\GUM583E.tmp\goopdateres_sw.dll 6c8e20fb2cf8122c324eeb05dcd6802b880907507c99baa872d5cb7c7ec5dfa7.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jcmd.exe mscorsvw.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VSTO\10.0\VSTOInstaller.exe mscorsvw.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateSetup.exe alg.exe File opened for modification C:\Program Files (x86)\Internet Explorer\ieinstal.exe mscorsvw.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\klist.exe alg.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\unpack200.exe alg.exe File opened for modification C:\Program Files\Mozilla Firefox\updater.exe alg.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\LogTransport2.exe mscorsvw.exe File created C:\Program Files (x86)\Google\Temp\GUM583E.tmp\GoogleUpdateBroker.exe 6c8e20fb2cf8122c324eeb05dcd6802b880907507c99baa872d5cb7c7ec5dfa7.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VSTA\8.0\x86\vsta_ep32.exe alg.exe File opened for modification C:\Program Files\Mozilla Firefox\minidump-analyzer.exe mscorsvw.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\extcheck.exe alg.exe File opened for modification C:\Program Files\Java\jre7\bin\jp2launcher.exe alg.exe File opened for modification C:\Program Files\Java\jre7\bin\pack200.exe alg.exe File opened for modification C:\Program Files\DVD Maker\DVDMaker.exe alg.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc.exe alg.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jstack.exe mscorsvw.exe File opened for modification C:\Program Files\Java\jre7\bin\jabswitch.exe mscorsvw.exe File opened for modification C:\Program Files\Java\jre7\bin\policytool.exe mscorsvw.exe File created C:\Program Files (x86)\Google\Temp\GUM583E.tmp\goopdateres_fr.dll 6c8e20fb2cf8122c324eeb05dcd6802b880907507c99baa872d5cb7c7ec5dfa7.exe File created C:\Program Files (x86)\Google\Temp\GUM583E.tmp\goopdateres_it.dll 6c8e20fb2cf8122c324eeb05dcd6802b880907507c99baa872d5cb7c7ec5dfa7.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javah.exe mscorsvw.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\ktab.exe mscorsvw.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc-cache-gen.exe mscorsvw.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Eula.exe mscorsvw.exe File opened for modification C:\Program Files\7-Zip\7zG.exe alg.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\Adobe AIR Application Installer.exe alg.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\kinit.exe mscorsvw.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\DW\DWTRIG20.EXE alg.exe File opened for modification C:\Program Files\Java\jre7\bin\rmid.exe mscorsvw.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\tnameserv.exe mscorsvw.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\keytool.exe alg.exe File opened for modification C:\Program Files\Java\jre7\bin\ssvagent.exe mscorsvw.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\tnameserv.exe alg.exe -
Drops file in Windows directory 55 IoCs
description ioc Process File opened for modification C:\Windows\Registration\{02D4B3F1-FD88-11D1-960D-00805FC79235}.{2CB65EE4-7337-49DD-B7D7-331FA19D41B1}.crmlog dllhost.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index142.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index146.dat mscorsvw.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe 6c8e20fb2cf8122c324eeb05dcd6802b880907507c99baa872d5cb7c7ec5dfa7.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe 6c8e20fb2cf8122c324eeb05dcd6802b880907507c99baa872d5cb7c7ec5dfa7.exe File created C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngenrootstorelock.dat mscorsvw.exe File opened for modification C:\Windows\ehome\ehsched.exe 6c8e20fb2cf8122c324eeb05dcd6802b880907507c99baa872d5cb7c7ec5dfa7.exe File created C:\Windows\Microsoft.NET\ngenservice_pri1_lock.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\Temp\ZAP8E0D.tmp\Microsoft.VisualStudio.Tools.Applications.AddInAdapter.v9.0.dll mscorsvw.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\ngen_service.log mscorsvw.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\index145.dat mscorsvw.exe File created C:\Windows\assembly\GACLock.dat mscorsvw.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe 6c8e20fb2cf8122c324eeb05dcd6802b880907507c99baa872d5cb7c7ec5dfa7.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ngen_service.lock mscorsvw.exe File created C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngenrootstorelock.dat mscorsvw.exe File created C:\Windows\assembly\GACLock.dat mscorsvw.exe File created C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngenservicelock.dat mscorsvw.exe File created C:\Windows\Microsoft.NET\ngennicupdatelock.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\index144.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index144.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index144.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index143.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index144.dat mscorsvw.exe File created C:\Windows\Microsoft.NET\Framework\v2.0.50727\ngen_service.lock mscorsvw.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen_service.log mscorsvw.exe File opened for modification C:\Windows\ehome\ehRecvr.exe 6c8e20fb2cf8122c324eeb05dcd6802b880907507c99baa872d5cb7c7ec5dfa7.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe mscorsvw.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe 6c8e20fb2cf8122c324eeb05dcd6802b880907507c99baa872d5cb7c7ec5dfa7.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe 6c8e20fb2cf8122c324eeb05dcd6802b880907507c99baa872d5cb7c7ec5dfa7.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ngen_service.log mscorsvw.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ngenservicelock.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\Temp\ZAP93B7.tmp\Microsoft.VisualStudio.Tools.Office.AddInAdapter.v9.0.dll mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index145.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index143.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index145.dat mscorsvw.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen_service.log mscorsvw.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe alg.exe File created C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngenofflinequeuelock.dat mscorsvw.exe File opened for modification C:\Windows\ehome\ehsched.exe mscorsvw.exe File created C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngenservicelock.dat mscorsvw.exe File created C:\Windows\Registration\{02D4B3F1-FD88-11D1-960D-00805FC79235}.{2CB65EE4-7337-49DD-B7D7-331FA19D41B1}.crmlog dllhost.exe File created C:\Windows\Microsoft.NET\ngenservice_pri3_lock.dat mscorsvw.exe File created C:\Windows\assembly\ngenlock.dat mscorsvw.exe File created C:\Windows\assembly\ngenlock.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\index146.dat mscorsvw.exe File created C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngenofflinequeuelock.dat mscorsvw.exe File opened for modification C:\Windows\ehome\ehRecvr.exe mscorsvw.exe File created C:\Windows\assembly\ngenlock.dat mscorsvw.exe File created C:\Windows\assembly\GACLock.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\Temp\ZAP9981.tmp\Microsoft.VisualStudio.Tools.Office.Excel.AddInAdapter.v9.0.dll mscorsvw.exe File created C:\Windows\Microsoft.NET\Framework\v2.0.50727\ngenservicelock.dat mscorsvw.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe alg.exe File created C:\Windows\Microsoft.NET\ngenservice_pri1_lock.dat mscorsvw.exe File created C:\Windows\Microsoft.NET\ngennicupdatelock.dat mscorsvw.exe -
Modifies data under HKEY_USERS 30 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software ehRecvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE\SAL\FileGrowthBudgetMs = "45000" ehRec.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE\SAL\SwagBitsPerSecond = "19922944" ehRec.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE\SAL\LogInitialPageCount = "16" ehRec.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE\SAL ehRec.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE\SAL\ShadowFileMaxClients = "32" ehRec.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE\SAL\CommitMaxCheckPointPageCount = "7" ehRec.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings GROOVE.EXE Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE ehRec.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE\SAL\LogMinJobWaitTimeMs = "3000" ehRec.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE\SAL\CommitMaxCheckPoitnRateMs = "10000" ehRec.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE\SAL\NvpRecCount = "32" ehRec.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE\SAL\CriticalLowDiskSpace = "1073741824" ehRec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum 64-bit ehRecvr.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\ActiveMovie ehRecvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE\SAL\NvpRecWaitForCounts = "32" ehRec.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE\SAL\FileInlineGrowthQuantumSeconds = "30" ehRec.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE\SAL\LogMaxJobDemoteTimeMs = "5000" ehRec.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE\SAL\FileGrowthQuantumSeconds = "180" ehRec.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE\SAL\CacheWaitForSize = "32" ehRec.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE\SAL\NvpClientsCount = "32" ehRec.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\OfficeSoftwareProtectionPlatform\VLRenewalSchedule = 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 OSPPSVC.EXE Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\ActiveMovie\devenum 64-bit ehRecvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE\SAL\FileDiscontinuitiesPerSecond = "20" ehRec.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE\SAL\CacheHashTableSize = "67" ehRec.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\OfficeSoftwareProtectionPlatform OSPPSVC.EXE Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft ehRecvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE\SAL\CacheLongPageCount = "32" ehRec.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\ActiveMovie\devenum 64-bit\Version = "7" ehRecvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE\SAL\CacheShortPageCount = "64" ehRec.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2632 ehRec.exe -
Suspicious use of AdjustPrivilegeToken 47 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 2508 6c8e20fb2cf8122c324eeb05dcd6802b880907507c99baa872d5cb7c7ec5dfa7.exe Token: SeShutdownPrivilege 2560 mscorsvw.exe Token: SeShutdownPrivilege 1480 mscorsvw.exe Token: SeShutdownPrivilege 1480 mscorsvw.exe Token: SeShutdownPrivilege 2560 mscorsvw.exe Token: SeShutdownPrivilege 2560 mscorsvw.exe Token: SeShutdownPrivilege 2560 mscorsvw.exe Token: SeShutdownPrivilege 1480 mscorsvw.exe Token: SeShutdownPrivilege 1480 mscorsvw.exe Token: 33 2792 EhTray.exe Token: SeIncBasePriorityPrivilege 2792 EhTray.exe Token: SeDebugPrivilege 2632 ehRec.exe Token: 33 2792 EhTray.exe Token: SeIncBasePriorityPrivilege 2792 EhTray.exe Token: SeShutdownPrivilege 1480 mscorsvw.exe Token: SeDebugPrivilege 2940 alg.exe Token: SeShutdownPrivilege 1480 mscorsvw.exe Token: SeDebugPrivilege 2560 mscorsvw.exe Token: SeShutdownPrivilege 1480 mscorsvw.exe Token: SeShutdownPrivilege 1480 mscorsvw.exe Token: SeShutdownPrivilege 1480 mscorsvw.exe Token: SeShutdownPrivilege 1480 mscorsvw.exe Token: SeShutdownPrivilege 1480 mscorsvw.exe Token: SeShutdownPrivilege 1480 mscorsvw.exe Token: SeShutdownPrivilege 1480 mscorsvw.exe Token: SeShutdownPrivilege 2560 mscorsvw.exe Token: SeShutdownPrivilege 1480 mscorsvw.exe Token: SeShutdownPrivilege 1480 mscorsvw.exe Token: SeShutdownPrivilege 1480 mscorsvw.exe Token: SeShutdownPrivilege 1480 mscorsvw.exe Token: SeShutdownPrivilege 1480 mscorsvw.exe Token: SeShutdownPrivilege 1480 mscorsvw.exe Token: SeShutdownPrivilege 1480 mscorsvw.exe Token: SeShutdownPrivilege 1480 mscorsvw.exe Token: SeShutdownPrivilege 1480 mscorsvw.exe Token: SeShutdownPrivilege 1480 mscorsvw.exe Token: SeShutdownPrivilege 1480 mscorsvw.exe Token: SeShutdownPrivilege 1480 mscorsvw.exe Token: SeShutdownPrivilege 1480 mscorsvw.exe Token: SeShutdownPrivilege 1480 mscorsvw.exe Token: SeShutdownPrivilege 1480 mscorsvw.exe Token: SeShutdownPrivilege 1480 mscorsvw.exe Token: SeShutdownPrivilege 1480 mscorsvw.exe Token: SeShutdownPrivilege 1480 mscorsvw.exe Token: SeShutdownPrivilege 1480 mscorsvw.exe Token: SeShutdownPrivilege 1480 mscorsvw.exe Token: SeShutdownPrivilege 1480 mscorsvw.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2792 EhTray.exe 2792 EhTray.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 2792 EhTray.exe 2792 EhTray.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1480 wrote to memory of 2688 1480 mscorsvw.exe 39 PID 1480 wrote to memory of 2688 1480 mscorsvw.exe 39 PID 1480 wrote to memory of 2688 1480 mscorsvw.exe 39 PID 1480 wrote to memory of 2016 1480 mscorsvw.exe 43 PID 1480 wrote to memory of 2016 1480 mscorsvw.exe 43 PID 1480 wrote to memory of 2016 1480 mscorsvw.exe 43 PID 2560 wrote to memory of 1624 2560 mscorsvw.exe 48 PID 2560 wrote to memory of 1624 2560 mscorsvw.exe 48 PID 2560 wrote to memory of 1624 2560 mscorsvw.exe 48 PID 2560 wrote to memory of 1624 2560 mscorsvw.exe 48 PID 2560 wrote to memory of 1896 2560 mscorsvw.exe 49 PID 2560 wrote to memory of 1896 2560 mscorsvw.exe 49 PID 2560 wrote to memory of 1896 2560 mscorsvw.exe 49 PID 2560 wrote to memory of 1896 2560 mscorsvw.exe 49 PID 2560 wrote to memory of 844 2560 mscorsvw.exe 50 PID 2560 wrote to memory of 844 2560 mscorsvw.exe 50 PID 2560 wrote to memory of 844 2560 mscorsvw.exe 50 PID 2560 wrote to memory of 844 2560 mscorsvw.exe 50 PID 2560 wrote to memory of 1596 2560 mscorsvw.exe 51 PID 2560 wrote to memory of 1596 2560 mscorsvw.exe 51 PID 2560 wrote to memory of 1596 2560 mscorsvw.exe 51 PID 2560 wrote to memory of 1596 2560 mscorsvw.exe 51 PID 2560 wrote to memory of 2740 2560 mscorsvw.exe 52 PID 2560 wrote to memory of 2740 2560 mscorsvw.exe 52 PID 2560 wrote to memory of 2740 2560 mscorsvw.exe 52 PID 2560 wrote to memory of 2740 2560 mscorsvw.exe 52 PID 2560 wrote to memory of 1644 2560 mscorsvw.exe 53 PID 2560 wrote to memory of 1644 2560 mscorsvw.exe 53 PID 2560 wrote to memory of 1644 2560 mscorsvw.exe 53 PID 2560 wrote to memory of 1644 2560 mscorsvw.exe 53 PID 2560 wrote to memory of 1688 2560 mscorsvw.exe 54 PID 2560 wrote to memory of 1688 2560 mscorsvw.exe 54 PID 2560 wrote to memory of 1688 2560 mscorsvw.exe 54 PID 2560 wrote to memory of 1688 2560 mscorsvw.exe 54 PID 2560 wrote to memory of 2644 2560 mscorsvw.exe 55 PID 2560 wrote to memory of 2644 2560 mscorsvw.exe 55 PID 2560 wrote to memory of 2644 2560 mscorsvw.exe 55 PID 2560 wrote to memory of 2644 2560 mscorsvw.exe 55 PID 2560 wrote to memory of 2520 2560 mscorsvw.exe 56 PID 2560 wrote to memory of 2520 2560 mscorsvw.exe 56 PID 2560 wrote to memory of 2520 2560 mscorsvw.exe 56 PID 2560 wrote to memory of 2520 2560 mscorsvw.exe 56 PID 2560 wrote to memory of 2636 2560 mscorsvw.exe 57 PID 2560 wrote to memory of 2636 2560 mscorsvw.exe 57 PID 2560 wrote to memory of 2636 2560 mscorsvw.exe 57 PID 2560 wrote to memory of 2636 2560 mscorsvw.exe 57 PID 2560 wrote to memory of 936 2560 mscorsvw.exe 58 PID 2560 wrote to memory of 936 2560 mscorsvw.exe 58 PID 2560 wrote to memory of 936 2560 mscorsvw.exe 58 PID 2560 wrote to memory of 936 2560 mscorsvw.exe 58 PID 2560 wrote to memory of 2308 2560 mscorsvw.exe 59 PID 2560 wrote to memory of 2308 2560 mscorsvw.exe 59 PID 2560 wrote to memory of 2308 2560 mscorsvw.exe 59 PID 2560 wrote to memory of 2308 2560 mscorsvw.exe 59 PID 2560 wrote to memory of 2392 2560 mscorsvw.exe 60 PID 2560 wrote to memory of 2392 2560 mscorsvw.exe 60 PID 2560 wrote to memory of 2392 2560 mscorsvw.exe 60 PID 2560 wrote to memory of 2392 2560 mscorsvw.exe 60 PID 2560 wrote to memory of 832 2560 mscorsvw.exe 61 PID 2560 wrote to memory of 832 2560 mscorsvw.exe 61 PID 2560 wrote to memory of 832 2560 mscorsvw.exe 61 PID 2560 wrote to memory of 832 2560 mscorsvw.exe 61 PID 2560 wrote to memory of 1924 2560 mscorsvw.exe 62 PID 2560 wrote to memory of 1924 2560 mscorsvw.exe 62 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\6c8e20fb2cf8122c324eeb05dcd6802b880907507c99baa872d5cb7c7ec5dfa7.exe"C:\Users\Admin\AppData\Local\Temp\6c8e20fb2cf8122c324eeb05dcd6802b880907507c99baa872d5cb7c7ec5dfa7.exe"1⤵
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2508
-
C:\Windows\System32\alg.exeC:\Windows\System32\alg.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2940
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe1⤵
- Executes dropped EXE
PID:540
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2900
-
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2400
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe1⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1e4 -InterruptEvent 1d0 -NGENProcess 1d4 -Pipe 1e0 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1624
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 248 -InterruptEvent 250 -NGENProcess 1e4 -Pipe 1ec -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1896
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 250 -InterruptEvent 260 -NGENProcess 238 -Pipe 25c -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:844
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 260 -InterruptEvent 268 -NGENProcess 244 -Pipe 264 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1596
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 26c -InterruptEvent 250 -NGENProcess 270 -Pipe 260 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2740
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 26c -InterruptEvent 1a8 -NGENProcess 240 -Pipe 244 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1644
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 23c -InterruptEvent 274 -NGENProcess 1e4 -Pipe 26c -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1688
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2d4 -InterruptEvent 2c4 -NGENProcess 2c8 -Pipe 2d0 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2644
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 180 -InterruptEvent 248 -NGENProcess 2f0 -Pipe 2d4 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2520
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2d8 -InterruptEvent 248 -NGENProcess 180 -Pipe 2ec -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2636
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2d8 -InterruptEvent 2f0 -NGENProcess 204 -Pipe 2e0 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:936
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2c4 -InterruptEvent 2f0 -NGENProcess 2d8 -Pipe 2e8 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2308
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2dc -InterruptEvent 2e4 -NGENProcess 2cc -Pipe 2c4 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2392
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2e4 -InterruptEvent 2f4 -NGENProcess 2d8 -Pipe 2c0 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:832
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2f8 -InterruptEvent 2dc -NGENProcess 2fc -Pipe 2e4 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1924
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2f8 -InterruptEvent 204 -NGENProcess 208 -Pipe 2d8 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1812
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2f8 -InterruptEvent 254 -NGENProcess 300 -Pipe 2dc -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2196
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2fc -InterruptEvent 254 -NGENProcess 2f8 -Pipe 204 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2404
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 180 -InterruptEvent 2c8 -NGENProcess 304 -Pipe 2fc -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2856
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2f8 -InterruptEvent 208 -NGENProcess 2f4 -Pipe 180 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1748
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 208 -InterruptEvent 2cc -NGENProcess 300 -Pipe 248 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2844
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2cc -InterruptEvent 254 -NGENProcess 2f0 -Pipe 308 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1432
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 254 -InterruptEvent 310 -NGENProcess 2c8 -Pipe 30c -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2660
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 1d4 -InterruptEvent 1c0 -NGENProcess 1c4 -Pipe 1d0 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2688
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 244 -InterruptEvent 1c0 -NGENProcess 1c4 -Pipe 1d4 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2016
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 1e4 -InterruptEvent 1a0 -NGENProcess 21c -Pipe 20c -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2160
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 1a0 -InterruptEvent 254 -NGENProcess 1b0 -Pipe 250 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:608
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 254 -InterruptEvent 25c -NGENProcess 22c -Pipe 258 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2808
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 264 -InterruptEvent 230 -NGENProcess 22c -Pipe 1a0 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2528
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 21c -InterruptEvent 218 -NGENProcess 24c -Pipe 264 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:2588
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 1b0 -InterruptEvent 24c -NGENProcess 254 -Pipe 25c -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2108
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 26c -InterruptEvent 230 -NGENProcess 270 -Pipe 1b0 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:1364
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 260 -InterruptEvent 218 -NGENProcess 274 -Pipe 26c -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2876
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 274 -InterruptEvent 270 -NGENProcess 260 -Pipe 218 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:2664
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 270 -InterruptEvent 260 -NGENProcess 268 -Pipe 230 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2392
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 1dc -InterruptEvent 288 -NGENProcess 1e4 -Pipe 270 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1648
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 288 -InterruptEvent 1e4 -NGENProcess 274 -Pipe 280 -Comment "NGen Worker Process"2⤵PID:1052
-
-
C:\Windows\ehome\ehRecvr.exeC:\Windows\ehome\ehRecvr.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:1924
-
C:\Windows\ehome\ehsched.exeC:\Windows\ehome\ehsched.exe1⤵
- Executes dropped EXE
PID:2284
-
C:\Windows\system32\dllhost.exeC:\Windows\system32\dllhost.exe /Processid:{02D4B3F1-FD88-11D1-960D-00805FC79235}1⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2212
-
C:\Windows\eHome\EhTray.exe"C:\Windows\eHome\EhTray.exe" /nav:-21⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2792
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵
- Executes dropped EXE
PID:2696
-
C:\Windows\ehome\ehRec.exeC:\Windows\ehome\ehRec.exe -Embedding1⤵
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2632
-
C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE"C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE" /auditservice1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:2888
-
C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"1⤵
- Executes dropped EXE
PID:1936
-
C:\Program Files (x86)\Common Files\Microsoft Shared\Source Engine\OSE.EXE"C:\Program Files (x86)\Common Files\Microsoft Shared\Source Engine\OSE.EXE"1⤵
- Executes dropped EXE
PID:1824
-
C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:2100
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD502a5b9cebecb5e6d9f12285b525891ee
SHA13583bab55dd4840f2c0e5c0c3f0a91382ce40f6d
SHA256d7091d6939974c4e1e0596863cec4fba8a23bbff5f7fb4768a7237034f5146e3
SHA512fd31e1ccb165e3113c26f93cde64502fe630a5f5b0ec012dc8e69d00bad086a3648bd5eb9e2a7df749cc58f0dc5feb028a23fa5f03b7247fc361a9cd038cd1fa
-
Filesize
1.6MB
MD536197bd36e24b23d6c2845b2246f46dc
SHA18619575deb4bd3c3e0a25228eabdcebd3d87921a
SHA2565c06be6250a6107ec0c9980b3994d8e7ed6976cc376067572994682d5e0a2a32
SHA5120d03a247e260140747cf0d307e2b5e5457f088c7305fe957b94f1903e5d84826f8edfb449d54ccd861e4902fc481fbed5fa2e5836a2ee6f3b5c2c8e506c97253
-
Filesize
1.3MB
MD5a72f217090697abc25f552e42346d4cc
SHA19f98f710651a4e06ed36665fd42546bfcc157288
SHA25693b3404a6bf21c75238b6b0344158129e876d4c41b276a36335155bd68a05ab7
SHA512315c86862f4043a3d19f3659dc6f837e14e0dcac4978269b3b583b16a48fcff8d0d7b64132b667cfa323679dc7c449b039e67d5a60a3c5d792631fc9c1794909
-
Filesize
1.6MB
MD51d0c077a93a9e84e05c7adce9d3660b3
SHA16d8ae06435da34274e907d9deb3a8a6a70481841
SHA256c72d0ec883df0d1e2039d637c265543273b56766ee2fa941edf15a24c6a0f1b5
SHA512afab13f53a53e954ab2d553c291c7b56f448b31108f76922938cbdae5ff67a45419a77f0f0dedc7209e9fcf77610a449d0aaee734c8f4968d1af2afcf5f2500d
-
Filesize
64KB
MD5af80c6c40fc62dc6ad85f9d4394ad7a1
SHA103937da2065bb301490fcfaa40027d1c78c7d3e3
SHA256bc26b2b8070689268647ca93b2a2275fa9a2b275ec885f5aa24e41000c06fdbb
SHA512ec34dca982bf4fc28aa2cc535425c19dfa91be43a670795140aca072249afc5063fccc047b65f7f2549d6e26d27a070d9493e009dba62cfec13b146e7aad2e97
-
Filesize
128KB
MD5aa4a24c584ec69e33cd92d79c10aef1a
SHA17b5e332c61864fc571be721da260e8f5c2a3559a
SHA2568e760e1e999c71af33f0a3f855c70cd2fbf758f7221397ede48a81ebdd2bfc93
SHA5124a63a933e9ed6fa5299d0e94776c8f8411df7d6a2463b06a3e2f65959eb5add9c64dedb462a32847d0e6240f4c99682a4ba50fb334aca2a54ae5cbd124881447
-
Filesize
1.3MB
MD549b5859c30d7f3995898942e41dce808
SHA1321ccae79b5f39e63936a7e2e1ef3fff19b7c18e
SHA2561319f0c56c792181952fe033ad74bc92b0dd1b06d1a3125e088edd943bed2546
SHA512a2e5f72ad53801c06834e56c4f742a1833df31f30ecf56ada5519cd4c0260c4990042e282436c15d20268377da441be0ec207a03cef476d9d9ac087160c6a798
-
Filesize
1.7MB
MD52a9ac0985db1e532c3b647da3c17eb22
SHA1e64c4bba2549bc1bfbf0139b106fcd4b1fec914e
SHA2567416621fd5e4949403e18f6863a670c7b02afad0a006c356a5a1435356386bb6
SHA5123fa929bfd0ba3cbfe622cc192531ead5e650d3ff1368173ced89f98408a1a8452d03fd348d4fe2e8e0b72755c2f7eaeee33aa2d0a6d0d52340a7142b8dd77a5d
-
Filesize
1.4MB
MD5f7b696f47646047d1cd4c8519d3d2ac6
SHA1f5ceb271f1dbde834b2123c89fd90907854174a9
SHA2564c7b187260f8670a653740693cf74b1de7a6ae5b4533d9a1d34ef886a351c497
SHA512be6f168251703cb5e8e5ca5c10dd6374deae70052cc05bf4cb80a3fb676f80f4ddd89a2f3a1277c87dfeadd1188ccf00fbef8300cd4a81abb7b59fb3db24a5f6
-
Filesize
1.2MB
MD55f1c08b5534a364050b6b727509d498d
SHA11a03e29c7734de40d54a6ae4c7252b7280c27dfa
SHA256afd7b31cb056d4d4c1b00bd109b4c57f5435c8cd900b62b67606f2a39367eeaa
SHA5120f6c092892f287e8cacfb304a91b8d78ce39e94e105fdc52f43dec9152841e7513595714ad52831e9ed425f8fc320e692e48e9ea6fe9e0c1f68e7519c1bca7ea
-
Filesize
1.1MB
MD59959eac2adaf12c8f40faefba65ebc52
SHA1bf409c44d0bf9c2c0d978f4569c19285caefb75f
SHA256df20eee38533e1d02e04e65bc22bbcb374d043e835447f1b194bd03735c01037
SHA5123ee48a94abab6c5cbef25d90ccd00ef941f64455b63cb2533aed265517dc3e26f443ca20c4f293b8b4321d74ed10b0109ff27e83b9ff4181569eee3ac2372514
-
Filesize
320KB
MD5c08c43a381b63244e27df8689d60bca0
SHA140ec6d00e7b002c92b09ad87bcc43d85580c2e7c
SHA256c0ebe49ba53b58e13db26126256ea9c22b38f8d363e76aad2293ecf630c71fe0
SHA512b936a4a241f8783f3ff244d6c5594f90a01a73bc50a68464ec3464ceb4116e92cde223f54c8e69e913dc59c64ba84c003fc5cbd743b9a9f8ea0a6a2a4fef6c04
-
Filesize
4.8MB
MD563e7f54c9f4b190ff24294c35d7b6bf0
SHA19fb6bcef779308582493e02ec6c7ba2a5ac52995
SHA256e6adf47e2dfdbcb448d780e3130c41fb43cd7cc946625bd1a71d39bee065f310
SHA51268d0c54d9eb3a6ede0c76a920b053a703344d283c028998bedf814c4d93184174f091e534c88b581bfada79d511373da2bbaaf1b48328e31f4e062b72215769f
-
Filesize
4.8MB
MD537686e108af600873fe63cbd6cccf581
SHA100d37a93ee6b430432d14bb26f86efe44e098019
SHA25629dc63f0e8b56914c6d811a10fc5c5401d6f27e31826d507c68e9782be6ed4bf
SHA51232d8f979f0818d8da47f45bfad49c88b711853418e7a268b98eab9ca68be78ba4a420a838568837b21642556bbf9927d7b65793c638b5675bedc039f808e0413
-
Filesize
2.2MB
MD57f9159c089d3f19c968cb910d6de2763
SHA171a34dc925a185891584cbb86a4f9f3f87e0b54d
SHA256ff5d3a4bd4c49a2afc2165e530e5c32f21a45461253d0418993c3a58fe4f76ff
SHA5129a07083c9f14b1e5c1990cac1d31d6223206416431065063820946a4093a724230450078f2f9496cb0711b3597fa0d4e3ad4bb9f0fcfe1ba375f2adca79b675d
-
Filesize
2.1MB
MD54ecf391c17d071832331832652e3efe0
SHA1d343d93284df19cb15f81f7fc5a403f1b414638c
SHA256438888271ea08286d22664d8cecf302a6a53622dbf454eabac0d8d26ad2d06de
SHA512e6d3d21398c35b58deef650ee676ff20f8ce2e34c9775056619cd76c72713e7c16a1917aec78de2bce29151bb8327286d2c3fa86a842b6a945b6575c02337d67
-
Filesize
1.8MB
MD53d8ef4dc60931e14041b72000493c5f4
SHA15017730d887c6fda3417809e194dd50031c0f059
SHA2569aaf2a670a9a837b882ada4858081fcf52fb964f61499a1e0cb86c5e7f7e9beb
SHA5121e367adeafa8186c02cb7149a32becad408b2ed050230186bca7a67d658417c47102f297c3e3736e75d19de4805516ae6bd4987790c403b6df95878dd78f69d7
-
Filesize
1.5MB
MD59b05ff55c3370349508b22248b5a732c
SHA1a4e36eb875008a7435f078baac58c0e558abb964
SHA25638962bfe39518ae6c0bc652a856be3251e2272d9e1575877467fa3295fd8ab53
SHA512985e56edf2356c0ffb0f9088fc55be889025524bc92bad8ef8e91574529dbd36340dc4268d174289e5585f32964369e181066353873545198ceba88e2489dc68
-
Filesize
1.1MB
MD5a53ffa9e3c06e6d8870b68658c1c964d
SHA132a9c704cc87c8031280db85b92da82e0253a04e
SHA256841455bdcaf31465a424bf9d89c8d88f748544c1a856aed335655c25d241a2c5
SHA5122cf33a9c0c7f3637b6ed9a01e214d1a12331e227bbca967e3b6a6951acf61a19ef47e0c00ead1eb3f8d51607b6687aa634ad083db048142e505c990a495aad77
-
Filesize
1.1MB
MD5420b09b9d44be2ecc8a0db87eb5a9f1f
SHA1825f0aa0a7c67f20da20a7bd4594c44786a1fbf7
SHA25640b5e9ea7a556483ecacee42d5516d04406855d53592d507d45b152f192d2dae
SHA512ae7854ed0e9a36262a5cb46deecad5c1848ec555fa818b1d5442d2676991dbff3cf2696c0388fa66f99d5c0c15791c1ae73a361f71d68a57dcb4d5ff3e45a233
-
Filesize
1.1MB
MD5d10acb7751865bd300a51b6928b6e9d5
SHA13745e51d71f4376828d1d1a57ba97b83b6ed53b4
SHA2562f85b97f4034fbe62e1fafc1a9395904001bd71d0cea241bde0ad4481086c85a
SHA512d911a3deb5c4882bd4077ca42cb26b342462e75556782f8c8ff5e8b33cba1f5de11cb2be949cd45392e038bc65e63e51868d6f10c44332a065036f3c7b61c823
-
Filesize
1.1MB
MD5e868806d39180c8d70ae15fe29aac1a3
SHA154d6b7d28197c99f571491939f8a2631b4b1b114
SHA256a47c70d465055a62603b5aeea81d6d53c282d4c3bdb79e8a059d2054e5c2e6a7
SHA512e4c3005fa54bd4d94c22aef59de7b01eaa6298e3d42189c5b2b47285629d7c52bd8d11d047c57f10b9aca88832eb6375d7db7d8a33d77e364ffca71c65dc9d0d
-
Filesize
1.2MB
MD57819d4dcb1ef467aba958eb1fa8ee61d
SHA174d74b233c9183e7c0bed2ce5c9d86dd18e5f35a
SHA256832d438da02c8f1d4d035d72860c2c6a0d352ce72b5c06073297312ede92b1a2
SHA5128f1511cc40a41a805ce4bbdbb187cd9c53d43fe46f5d0e3e18bef0e0897c3cca00027fd708380ae3c8fdbe38fe109db83dc48d9cc383995da8702a0f10f5d93a
-
Filesize
1.1MB
MD50134c9198d86f542d9efd6b440696694
SHA1d775f31334edd30d79e8830d0aee449e66831d8d
SHA25679e470ff5771ea45e51b7067d2d5cc46e5d7eb60c2e98bc4df1bb6d4368a994c
SHA5125c08095d34ba8d93605f96b6552c6206b61830a277a372b3eed14264a192960a8bfcc58ef5e233492ce080d6b8fbe00762633889da44fd7224128b715bb60032
-
Filesize
1.1MB
MD53a7ce43bdc07efaae5f8c9d2896468d4
SHA16ca20f208faf310b71237043ff4c7dbd28eb646e
SHA2562e5ec6b60f0edabe6ddb01fd90d543bf7d016230b157e1fb2d742964ab0b7801
SHA5121cce0b7a54e57e5a75ecc7ad672f3f2be3f68705e4ef5005d76051909f980839aa4a90282f063f0f2ac4b95dc95f20a6fd01a29d67b5ba12259d809ffd06519a
-
Filesize
1.1MB
MD51068398e46165f17460d27db065cc205
SHA1b9a6b9b45099de6c0a32b6c53369003f0f6cb251
SHA2560e2f19c1206aec75c88e6bb720e01e1eff4f7e7a91f8213df5a26466e6e5f0aa
SHA512962ee4cdcc0c0b8f346864ba9cba2032f00504b04f4bec9d65f8ac7febc153b44bf437b24e47c69dabadd6fd5f7e4d857de235b917cf5e5f0645095c64ab6216
-
Filesize
1.3MB
MD532b2bb1442b3d7e6c552e3acb75e1263
SHA15a2424c7608f92833c4ca2e86058939ae3233e9d
SHA256832b9a529494eab08f6aea266fd8bbfb71b8a8b52ca797685477b70a806dfa1b
SHA512f7782ea932ed55b60ad3e5feb5ffdee1b9b0d7a5c40f049ae3e2abac4c80aabec937a34711420490766ebe76e4a5c4789a9fc5f6c8c0ae012eb15b648f8940e1
-
Filesize
1.1MB
MD52062b161a358ba7f5b8cd52b6c087998
SHA17b9289abb60750292b290d5f771a0eedacfd2048
SHA256d5e741d1bab0037b8eb0da117a621d95645cdd0c554f349a72ef91c7f214b907
SHA51244d6954cd1393f36ef2dcb79ed7bcf449cee23c7ebe0667ce34553e7c9e71d48f91d8a41991b985dd7895c8cd1d859052dd505ca4eea5c8d6a6775adf2cebbef
-
Filesize
1.1MB
MD5875098b2364da88f5137a56d09396e14
SHA1549dcf3b6d33811ab69f422f103f3fd7e3717230
SHA256ed457f026628e918ffe371cb4d74c6fb6ae9b2a23c81daeacd36a11175e91531
SHA512b8836f8858510f3efa697cda57ed10568069e5d512f1e344d376463c14f67bfe795bd4ff195465265a119e144cf50d29d2c42711dc2ea7f53902fc7dc194cd7c
-
Filesize
1.2MB
MD5c004cb399065e466f2d0f1bff6c9786b
SHA10b610b4cd2e0b87b73640e3a45f658299d1abd49
SHA25627e51934ccbf5eb5a6eed226011bf4f0d5205c356824975273a240f921f9e5fe
SHA512636e905a34378fa04e38d1793b898cdfb09c82de1532cde3e034b67b366f47596eb239dd5a24a07be283b8708f2d4ef073ba5308456521fde9ee23ec2e3a2c08
-
Filesize
1.1MB
MD5598a6dbaba8a9a6e1b9e655b38dd923e
SHA1794fb5cc3d192d7350adfda43ac0d98a8b24c159
SHA256a90453fa6c566ddba35e04380061435a6b5966eced30c7b26e7b78b88647dc03
SHA51257b115f64661774f5a24f06c98ee82410384d23721ef1f16ee5fcfdd437eca55cde7ec7e36984ff4d2ed9885ff7f175011d7aad1318764262c2286cb91b9f0d0
-
Filesize
1.1MB
MD57ff09905009db808a75222eee29e0ebe
SHA18fde6b9e3a710a360a8278c55da3e57c4b6c6417
SHA256ab927fa72a867545a551e6a8a583915796081afd5f2d02d02b3cfa2f894954b6
SHA512c509271fb17c5c3e6bf523b612c20c8273afaf03d7ca4bd49d709eb71dc8163a4398a80517169ed7eeda0474ee48987490df7cf5da5184d8f67dcebcff251b7f
-
Filesize
1.3MB
MD5cfcbf5ed9397efa9887fa152d98f01e5
SHA189a3a0f90795b33f3ae7c619c41d6f0ce94ca56d
SHA2563b788ad1bf933cd57c6c4abf0b5e8192439504c8a935a07f7e23dc873807834e
SHA512b8c8b6942377176b025db0abafb935377e5cb997bc5a53bdee78062ecdd569122e645fd3486e15d65f8822e653aad08dfefbb50dab4de5af2a2eecc1f6a37d8c
-
Filesize
872KB
MD5f2c5db8475179f9369346be2c57dfc67
SHA165d4cb173c361bdf22b6887914cfb9aa058151a1
SHA256530edb2ee90c407b44178231b023d3ce2ede54c2022c0c422e77d98ee1ad9393
SHA5126399408b31d2dccc785b4ef24a0370726071bbb446327ced935ce25e4e3367656608b58df3e04ac8bff7a9206ed04f63b6f774e669784a3b0551567d3ac117a1
-
Filesize
1.2MB
MD526765e51a87c49b02fdd30c4571a8e68
SHA187bd57413567118ba6d35a9f92890665cae96d46
SHA2567f73739784bb32e98cb549bfd840fc4fb1925543b9ae905da97b603e5d31217d
SHA51212c81a2438af4ba48789aa841f9dab22005f0ae721cbf2ef29286836feeac08468381c6f7c16620fcdebd10744394a5d126ef583ce65ad6da0198dea079b227c
-
Filesize
49KB
MD5992df8989319f3c2aed2d9f67b44fb73
SHA15a1311363e884b5e533d7900b860ae32133af73b
SHA2562bd22e38aa4f2cd0f7f0d96c9b750e7f0b04181c34abf250b5247c1bdfbf7f85
SHA512fa1ca5c177c6b143fd527b7816d7f135d183ab3f82832dc3b84b9128817ea793c0be622e4971f8e253aed2c48783103d0b22b456baa0905081dec1bf4f2103db
-
Filesize
1.2MB
MD58895667090886b1d25e9189eb359204d
SHA17b86ddfa8102e7aeb6320d4182bb651b7773bac1
SHA256a955e8f6ffeba7319c192d26bd8230f6e11139051e5d05dfc0cce806e6c184f3
SHA512cb4b0b1cf224e8b0a8f969a8cfd8f4fcb9a6eb8331e6e851b5955a593ee3b740fe0e7f169155320425a9d8b724a8c2c625a6d7e321bb82cfb9ffeb4841912252
-
Filesize
8KB
MD5df67eff422d9e34b3cd92f6a666d1d28
SHA12fdf4b1fbd88fcb482bed473e3675645b40bd09d
SHA25664cc91014d3708b963a0872bf41edd420e909caccde0f130ef4a730b865055db
SHA51257b90285763bfba50593f5faed9495a421cd613288c33fef455360629f5f78ce70d4331dd94ef4f75e8736e089c3bd8d3516bda50eaa6f8da6e7baf3993eb114
-
Filesize
1.2MB
MD5b3555c2c45c64f36a75f01363e484062
SHA1acdc147c8f2efdb994cfc13d46f9234abac8f217
SHA25670731eac33e017ac252cf0629876631ea0a391688787e59e22418e01697170d1
SHA512bfcd75ff866e5b43ef9f9bf142fc6ee002bb592a2e9af1db4c520d543f7e52ccb464d6c24fdb81e69b8b0f3f886157e90471d0e97757c1f531ef1fea8b2462a3
-
Filesize
1003KB
MD525f142096d985b90c0a930cc4897f6fe
SHA18a570a79ad505f4531704f30bf1b4d2b72147050
SHA256f06f0835675dc063bd9fa52ee13b3b90cf8cb55004e6476a6550d5666fa40d76
SHA5129c19a8b5723d1e7ffd2decff499b0cbffb18a2391080343323536bd71a2cff3b517083b7f8df9eda65b258455a99de4869c721df9c7d99e453aee830344d6cff
-
Filesize
1.2MB
MD59d18b6d8f9f08a8c1dc7863280c735e1
SHA119576289f6cb5ae77af48868e351a775ba2c671b
SHA256bf1a86e713b8aea290563e4d8043d81073c96cdc560e5cb87470011761f2a4ef
SHA5121e7b40925cad72bfe09aa851441fdc180fb257ed67b17f97dc33079d474eccb531cbcfeb5cfd0e27fff2b7bc654f255151b12c8fa14a2459e5d852e6f63114c1
-
C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft.VisualStu#\06216e3a9e4ca262bc1e9a3818ced7fe\Microsoft.VisualStudio.Tools.Office.Excel.AddInAdapter.v9.0.ni.dll
Filesize58KB
MD53d6987fc36386537669f2450761cdd9d
SHA17a35de593dce75d1cb6a50c68c96f200a93eb0c9
SHA25634c0302fcf7d2237f914aaa484b24f5a222745f21f5b5806b9c519538665d9cb
SHA5121d74371f0b6c68ead18b083c08b7e44fcaf930a16e0641ad6cd8d8defb4bde838377741e5b827f7f05d4f0ad4550b509ba6dff787f51fc6830d8f2c88dbf0e11
-
C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft.VisualStu#\a58534126a42a5dbdef4573bac06c734\Microsoft.VisualStudio.Tools.Office.Word.AddInAdapter.v9.0.ni.dll
Filesize58KB
MD5a8b651d9ae89d5e790ab8357edebbffe
SHA1500cff2ba14e4c86c25c045a51aec8aa6e62d796
SHA2561c8239c49fb10c715b52e60afd0e6668592806ef447ad0c52599231f995a95d7
SHA512b4d87ee520353113bb5cf242a855057627fde9f79b74031ba11d5feee1a371612154940037954cd1e411da0c102f616be72617a583512420fd1fc743541a10ce
-
C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft.VisualStu#\bd1950e68286b869edc77261e0821c93\Microsoft.VisualStudio.Tools.Applications.AddInAdapter.v9.0.ni.dll
Filesize85KB
MD55180107f98e16bdca63e67e7e3169d22
SHA1dd2e82756dcda2f5a82125c4d743b4349955068d
SHA256d0658cbf473ef3666c758d28a1c4bcdcb25b2e515ad5251127d0906e65938f01
SHA51227d785971c28181cf9115ab14de066931c4d81f8d357ea8b9eabfe0f70bd5848023b69948ac6a586989e892bcde40999f8895a0bd2e7a28bac7f2fa64bb22363
-
C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft.VisualStu#\dbe51d156773fefd09c7a52feeb8ff79\Microsoft.VisualStudio.Tools.Office.AddInAdapter.v9.0.ni.dll
Filesize298KB
MD55fd34a21f44ccbeda1bf502aa162a96a
SHA11f3b1286c01dea47be5e65cb72956a2355e1ae5e
SHA2565d88539a1b7be77e11fe33572606c1093c54a80eea8bd3662f2ef5078a35ce01
SHA51258c3904cd1a06fbd3a432b3b927e189a744282cc105eda6f0d7f406971ccbc942c7403c2dcbb2d042981cf53419ca5e2cf4d9f57175e45cc5c484b0c121bb125
-
Filesize
896KB
MD5b59dd5d9b6e0a8128899d4c9a12018ae
SHA14f632e1c8e9e4710c446f6f0e7c35f714f7a3e56
SHA2566e6a40e3a42ce0fffbf9ebce957fd9e90b9af3c5782a53856365975b0c5cad80
SHA512606a1e080ab8cdd4ee1bf4d2833de5315600b52a470e2050f651596959b1762708744495745f90b049ff5a6e17de2c372833f9044e1fe66a038ea554cd41d628
-
Filesize
1.3MB
MD577698a88c54b00a85664041d044849a6
SHA180182e69d254a1249ac970c1aca2407d1ac2cda3
SHA25662c3b48146a9d0d3be530f06e673093937c94dae2b8f145c33244f1bb481afb9
SHA512ae2dc161e5ca313e817f2df643b1570d31e144c98f920bc8b4b92ad2852bcef1e558bfefd53e8e4c81b88bee7b5e482c508ba1b02df05d41828f81aa44d2626b
-
Filesize
1.2MB
MD52578ab4817fef2a68dcebc1198231527
SHA1aad0453c73e7f0f90903bbce6de04e326a7f9c23
SHA256650d1e37a444986e1ad49c079b055f3485b9bb381625225614f0934a7e60664c
SHA5121f6562e77284472c64816c486e71235e434d43c121342d5a225e1ca90127c8749b1a0f1e7aa5b875965a44e4b38d0c9cb3b2dee3b2ce04164f60ab5ea05c06cb
-
Filesize
1.2MB
MD5f41d5e430c22e4035659d3d405621a72
SHA12da0d17038999b655789f4d4aa5105e80fee85da
SHA2563557eeb9bff312d219a06cd6da588721bb3646c99a276ee3d83315a52d8b1b0f
SHA512e5b76de7299f10d2b3c0400f51e85c162afb31ca38f712f14c8443a7eecb7625c87ff5012bf5281824091fc2247f16b8c1195a4947879118a4a141ebc81502b5
-
Filesize
1.1MB
MD5cad5b03cf0d7934c4e4d5c404693abff
SHA11794ba742e693fb445a30a5a1342a75f3748cb7d
SHA2560f9bc2c49e7d4d45302ffc0ec41d9fe0c526cc2a3d0532de6f7ae02e0c2c235b
SHA512e8e4a56bc7455a3c77140a943997c0b1203c49631310080d3d980030b70989ae2dbbc278a7438ae87f60efb25232b9be03fa97200060b9e363127bc51ed72745
-
Filesize
1.2MB
MD5452921c9d8e8f73a83ac7f6b9d6de5f4
SHA1f3b762e0d4ce6a0d2e241b04208f2d1e0bbeb38b
SHA256c83480215be6076c3c53945d7c5d62b8a32bdd38099a07c45ba32ac637cb0ba0
SHA51216ad00b02102c34fd98e05c24eab231ba39dbe41c6296bf8ccc9b464b3dfe718000c9f9c0ffffc36f04c9126226c65a3567519d1cf3d1c5d408787684ec67fe4
-
Filesize
128KB
MD5ce80ac3ab04088f077a2fc0e8a187132
SHA1535c8c44edad489d5087dc2e725088025779de96
SHA2568f5f04f6b7e2775d34fae443f21b19543386aef9757bea6f2e68c312bc6ce46b
SHA512d5d568ed2e16660c85ec3b484a28ac22f0faa2255810a21c1a8d32594fc7e2bb950ba2f9da766a49a33bb6cf451d73baedcb59fbaac1946091b5cf3525656aee