Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
27/01/2024, 17:32
Static task
static1
Behavioral task
behavioral1
Sample
3134e4e72112e321b2f42db3808315436b04653126118a8754ec44e72696b536.exe
Resource
win7-20231129-en
General
-
Target
3134e4e72112e321b2f42db3808315436b04653126118a8754ec44e72696b536.exe
-
Size
1.8MB
-
MD5
081eb50889093f0b10a83844e01560be
-
SHA1
4f34f297f81bc3b2ce80d8dcb1a2e734a2348588
-
SHA256
3134e4e72112e321b2f42db3808315436b04653126118a8754ec44e72696b536
-
SHA512
dec5f0fa50a68727742679ea38ff355438c28f3847dd2829cc1b56a3246564f452f7e5c19ff570f78e842190fc35f3b6dc8a5020d339bb105291928e435c4c0f
-
SSDEEP
49152:Jx5SUW/cxUitIGLsF0nb+tJVYleAMz77+WA3B5LG83QtHHI/QW/e:JvbjVkjjCAzJYB5f3QhHMQW
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 476 Process not Found 2820 alg.exe 2936 aspnet_state.exe 2760 mscorsvw.exe 1516 mscorsvw.exe 1824 mscorsvw.exe 1736 mscorsvw.exe 108 ehRecvr.exe 380 ehsched.exe 352 elevation_service.exe 3068 IEEtwCollector.exe 1600 GROOVE.EXE 1288 SearchFilterHost.exe 2688 msdtc.exe 2528 msiexec.exe 2020 OSE.EXE 2628 OSPPSVC.EXE 1560 perfhost.exe 580 locator.exe 1404 snmptrap.exe 1944 vds.exe 2560 vssvc.exe 2616 wbengine.exe 1972 WmiApSrv.exe 1512 wmpnetwk.exe 1592 SearchIndexer.exe 3168 dllhost.exe 3380 mscorsvw.exe 3536 mscorsvw.exe 3836 mscorsvw.exe 4004 mscorsvw.exe 2300 mscorsvw.exe 1960 mscorsvw.exe 3144 mscorsvw.exe 3212 mscorsvw.exe 3460 mscorsvw.exe 3612 mscorsvw.exe 3724 mscorsvw.exe 3832 mscorsvw.exe 3868 mscorsvw.exe 4036 mscorsvw.exe 4048 mscorsvw.exe 2796 mscorsvw.exe 2976 mscorsvw.exe 3192 mscorsvw.exe 1652 mscorsvw.exe 3340 mscorsvw.exe 3424 mscorsvw.exe 3632 mscorsvw.exe 3740 mscorsvw.exe 3876 mscorsvw.exe 3932 mscorsvw.exe 3984 mscorsvw.exe 3868 mscorsvw.exe 3836 mscorsvw.exe 2812 mscorsvw.exe 3376 mscorsvw.exe 1068 mscorsvw.exe 3572 mscorsvw.exe 3676 mscorsvw.exe 3624 mscorsvw.exe 3488 mscorsvw.exe 1480 mscorsvw.exe 3800 mscorsvw.exe -
Loads dropped DLL 64 IoCs
pid Process 476 Process not Found 476 Process not Found 476 Process not Found 476 Process not Found 476 Process not Found 476 Process not Found 476 Process not Found 2528 msiexec.exe 476 Process not Found 476 Process not Found 476 Process not Found 476 Process not Found 476 Process not Found 748 Process not Found 476 Process not Found 3376 mscorsvw.exe 3376 mscorsvw.exe 3572 mscorsvw.exe 3572 mscorsvw.exe 3624 mscorsvw.exe 3624 mscorsvw.exe 1480 mscorsvw.exe 1480 mscorsvw.exe 2508 mscorsvw.exe 2508 mscorsvw.exe 3472 mscorsvw.exe 3472 mscorsvw.exe 2016 mscorsvw.exe 2016 mscorsvw.exe 3208 mscorsvw.exe 3208 mscorsvw.exe 2656 mscorsvw.exe 2656 mscorsvw.exe 828 mscorsvw.exe 828 mscorsvw.exe 2612 mscorsvw.exe 2612 mscorsvw.exe 3540 mscorsvw.exe 3540 mscorsvw.exe 1124 mscorsvw.exe 1124 mscorsvw.exe 3200 mscorsvw.exe 3200 mscorsvw.exe 2756 mscorsvw.exe 2756 mscorsvw.exe 3180 mscorsvw.exe 3180 mscorsvw.exe 1368 mscorsvw.exe 1368 mscorsvw.exe 1588 mscorsvw.exe 1588 mscorsvw.exe 3416 mscorsvw.exe 3416 mscorsvw.exe 1776 mscorsvw.exe 1776 mscorsvw.exe 2004 mscorsvw.exe 2004 mscorsvw.exe 1160 mscorsvw.exe 1160 mscorsvw.exe 3656 dw20.exe 3656 dw20.exe 3812 mscorsvw.exe 3812 mscorsvw.exe 3540 mscorsvw.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in System32 directory 26 IoCs
description ioc Process File opened for modification C:\Windows\system32\IEEtwCollector.exe aspnet_state.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7B2238AACCEDC3F1FFE8E7EB5F575EC9 mscorsvw.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat GROOVE.EXE File opened for modification C:\Windows\system32\dllhost.exe alg.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat SearchProtocolHost.exe File opened for modification C:\Windows\system32\fxssvc.exe 3134e4e72112e321b2f42db3808315436b04653126118a8754ec44e72696b536.exe File opened for modification C:\Windows\SysWow64\perfhost.exe 3134e4e72112e321b2f42db3808315436b04653126118a8754ec44e72696b536.exe File opened for modification C:\Windows\system32\fxssvc.exe aspnet_state.exe File opened for modification C:\Windows\System32\alg.exe 3134e4e72112e321b2f42db3808315436b04653126118a8754ec44e72696b536.exe File opened for modification C:\Windows\system32\locator.exe 3134e4e72112e321b2f42db3808315436b04653126118a8754ec44e72696b536.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7B2238AACCEDC3F1FFE8E7EB5F575EC9 mscorsvw.exe File opened for modification C:\Windows\system32\fxssvc.exe mscorsvw.exe File opened for modification C:\Windows\system32\vssvc.exe 3134e4e72112e321b2f42db3808315436b04653126118a8754ec44e72696b536.exe File opened for modification C:\Windows\system32\wbem\WmiApSrv.exe 3134e4e72112e321b2f42db3808315436b04653126118a8754ec44e72696b536.exe File opened for modification C:\Windows\system32\fxssvc.exe alg.exe File opened for modification C:\Windows\system32\IEEtwCollector.exe mscorsvw.exe File opened for modification C:\Windows\system32\IEEtwCollector.exe 3134e4e72112e321b2f42db3808315436b04653126118a8754ec44e72696b536.exe File opened for modification C:\Windows\system32\msiexec.exe 3134e4e72112e321b2f42db3808315436b04653126118a8754ec44e72696b536.exe File opened for modification C:\Windows\System32\vds.exe 3134e4e72112e321b2f42db3808315436b04653126118a8754ec44e72696b536.exe File opened for modification C:\Windows\system32\wbengine.exe 3134e4e72112e321b2f42db3808315436b04653126118a8754ec44e72696b536.exe File opened for modification C:\Windows\System32\snmptrap.exe 3134e4e72112e321b2f42db3808315436b04653126118a8754ec44e72696b536.exe File opened for modification C:\Windows\system32\SearchIndexer.exe 3134e4e72112e321b2f42db3808315436b04653126118a8754ec44e72696b536.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Roaming\39aac38f56fe8faa.bin alg.exe File opened for modification C:\Windows\system32\dllhost.exe 3134e4e72112e321b2f42db3808315436b04653126118a8754ec44e72696b536.exe File opened for modification C:\Windows\System32\msdtc.exe 3134e4e72112e321b2f42db3808315436b04653126118a8754ec44e72696b536.exe File opened for modification C:\Windows\system32\MSDtc\MSDTC.LOG msdtc.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Internet Explorer\ieinstal.exe 3134e4e72112e321b2f42db3808315436b04653126118a8754ec44e72696b536.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\kinit.exe alg.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\tnameserv.exe aspnet_state.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jvisualvm.exe mscorsvw.exe File opened for modification C:\Program Files\Java\jre7\bin\rmid.exe alg.exe File opened for modification C:\Program Files\Internet Explorer\ieinstal.exe aspnet_state.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\schemagen.exe aspnet_state.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroBroker.exe mscorsvw.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\chrmstp.exe 3134e4e72112e321b2f42db3808315436b04653126118a8754ec44e72696b536.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\servertool.exe aspnet_state.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\mip.exe aspnet_state.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateBroker.exe aspnet_state.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\java-rmi.exe mscorsvw.exe File created C:\Program Files (x86)\Google\Temp\GUM1017.tmp\GoogleUpdateComRegisterShell64.exe 3134e4e72112e321b2f42db3808315436b04653126118a8754ec44e72696b536.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\serialver.exe alg.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javah.exe aspnet_state.exe File opened for modification C:\Program Files\Java\jre7\bin\orbd.exe mscorsvw.exe File created C:\Program Files (x86)\Google\Temp\GUM1017.tmp\GoogleUpdate.exe 3134e4e72112e321b2f42db3808315436b04653126118a8754ec44e72696b536.exe File created C:\Program Files (x86)\Google\Temp\GUM1017.tmp\goopdateres_ja.dll 3134e4e72112e321b2f42db3808315436b04653126118a8754ec44e72696b536.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\TextConv\WksConv\Wkconv.exe alg.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\Adobe AIR Updater.exe aspnet_state.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe mscorsvw.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\A3DUtility.exe mscorsvw.exe File created C:\Program Files (x86)\Google\Temp\GUM1017.tmp\goopdateres_fr.dll 3134e4e72112e321b2f42db3808315436b04653126118a8754ec44e72696b536.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe aspnet_state.exe File opened for modification C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe mscorsvw.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\wsimport.exe 3134e4e72112e321b2f42db3808315436b04653126118a8754ec44e72696b536.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javaw.exe alg.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc.exe alg.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe aspnet_state.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\rmic.exe 3134e4e72112e321b2f42db3808315436b04653126118a8754ec44e72696b536.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\ktab.exe alg.exe File created C:\Program Files (x86)\Google\Temp\GUM1017.tmp\goopdateres_ar.dll 3134e4e72112e321b2f42db3808315436b04653126118a8754ec44e72696b536.exe File opened for modification C:\Program Files\Java\jre7\bin\java-rmi.exe alg.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\klist.exe aspnet_state.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\Adobe AIR Application Installer.exe aspnet_state.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\TextConv\WksConv\Wkconv.exe aspnet_state.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\keytool.exe 3134e4e72112e321b2f42db3808315436b04653126118a8754ec44e72696b536.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\servertool.exe mscorsvw.exe File created C:\Program Files (x86)\Google\Temp\GUM1017.tmp\goopdateres_de.dll 3134e4e72112e321b2f42db3808315436b04653126118a8754ec44e72696b536.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\rmic.exe alg.exe File opened for modification C:\Program Files\Java\jre7\bin\policytool.exe alg.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\FLTLDR.EXE alg.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jstatd.exe aspnet_state.exe File opened for modification C:\Program Files\Java\jre7\bin\javaws.exe aspnet_state.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\appletviewer.exe mscorsvw.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\pack200.exe mscorsvw.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\LICLUA.EXE aspnet_state.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateOnDemand.exe aspnet_state.exe File opened for modification C:\Program Files\Java\jre7\bin\policytool.exe mscorsvw.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jmc.exe 3134e4e72112e321b2f42db3808315436b04653126118a8754ec44e72696b536.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\airappinstaller.exe alg.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\servertool.exe aspnet_state.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\{AC76BA86-7AD7-1033-7B44-A90000000001}\Setup.exe aspnet_state.exe File opened for modification C:\Program Files\Java\jre7\bin\javaws.exe mscorsvw.exe File created C:\Program Files (x86)\Google\Temp\GUM1017.tmp\GoogleCrashHandler.exe 3134e4e72112e321b2f42db3808315436b04653126118a8754ec44e72696b536.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\appletviewer.exe aspnet_state.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\pack200.exe mscorsvw.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\MSOXMLED.EXE mscorsvw.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\kinit.exe 3134e4e72112e321b2f42db3808315436b04653126118a8754ec44e72696b536.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jvisualvm.exe alg.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jps.exe aspnet_state.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jrunscript.exe aspnet_state.exe File opened for modification C:\Program Files\Mozilla Firefox\maintenanceservice_installer.exe mscorsvw.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File created C:\Windows\assembly\NativeImages_v2.0.50727_32\index13a.dat mscorsvw.exe File created C:\Windows\assembly\GACLock.dat mscorsvw.exe File created C:\Windows\assembly\GACLock.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index149.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index148.dat mscorsvw.exe File created C:\Windows\assembly\GACLock.dat mscorsvw.exe File created C:\Windows\assembly\ngenlock.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index147.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\index149.dat mscorsvw.exe File opened for modification C:\Windows\ehome\ehRecvr.exe 3134e4e72112e321b2f42db3808315436b04653126118a8754ec44e72696b536.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\index13c.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\index147.dat mscorsvw.exe File created C:\Windows\assembly\GACLock.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index13d.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\index148.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index14e.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index150.dat mscorsvw.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index142.dat mscorsvw.exe File created C:\Windows\assembly\ngenlock.dat mscorsvw.exe File created C:\Windows\assembly\ngenlock.dat mscorsvw.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index135.dat mscorsvw.exe File created C:\Windows\assembly\GACLock.dat mscorsvw.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe alg.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index13a.dat mscorsvw.exe File created C:\Windows\assembly\ngenlock.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\Temp\ZAP5AC.tmp\Microsoft.Office.Tools.Excel.v9.0.dll mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index153.dat mscorsvw.exe File created C:\Windows\Microsoft.NET\ngenservice_pri3_lock.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index145.dat mscorsvw.exe File created C:\Windows\assembly\GACLock.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\Temp\ZAP34E6.tmp\Microsoft.VisualStudio.Tools.Applications.Hosting.v9.0.dll mscorsvw.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe 3134e4e72112e321b2f42db3808315436b04653126118a8754ec44e72696b536.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index14b.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\Temp\ZAP391A.tmp\Microsoft.VisualStudio.Tools.Applications.ServerDocument.v10.0.dll mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index153.dat mscorsvw.exe File created C:\Windows\assembly\GACLock.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\index137.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\index140.dat mscorsvw.exe File created C:\Windows\assembly\ngenlock.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index147.dat mscorsvw.exe File created C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngenservicelock.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\Temp\ZAPABF8.tmp\Microsoft.VisualStudio.Tools.Applications.Runtime.v10.0.dll mscorsvw.exe File created C:\Windows\assembly\GACLock.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index13a.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index13d.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\index14f.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index142.dat mscorsvw.exe File created C:\Windows\assembly\GACLock.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\Temp\ZAPEA1.tmp\Microsoft.Office.Tools.Word.v9.0.dll mscorsvw.exe File opened for modification C:\Windows\ehome\ehRecvr.exe aspnet_state.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\index135.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index139.dat mscorsvw.exe File created C:\Windows\assembly\ngenlock.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index135.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index13e.dat mscorsvw.exe File created C:\Windows\assembly\GACLock.dat mscorsvw.exe File created C:\Windows\assembly\ngenlock.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\Temp\ZAPA0B2.tmp\Microsoft.VisualStudio.Tools.Office.AddInAdapter.v9.0.dll mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index13f.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index148.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index14e.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index143.dat mscorsvw.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\Certificates mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CRLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CRLs mscorsvw.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\system32\SampleRes.dll,-107 = "Lighthouse" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\Certificates mscorsvw.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\system32\msra.exe,-100 = "Windows Remote Assistance" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\system32\wdc.dll,-10021 = "Performance Monitor" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\system32\miguiresource.dll,-101 = "Event Viewer" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CTLs mscorsvw.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32,@elscore.dll,-2 = "Microsoft Script Detection" SearchIndexer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{F81B1B56-7613-4EE4-BC05-1FAB5DE5C07E} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 0100000000000000501e92e54651da01 SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CRLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CRLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\Certificates mscorsvw.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust mscorsvw.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%systemroot%\system32\dfrgui.exe,-172 = "Defragments your disks so that your computer runs faster and more efficiently." SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CRLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CRLs mscorsvw.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Program Files\Windows Journal\Journal.exe,-3074 = "Windows Journal" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CRLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\Certificates mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CRLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CRLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\Certificates mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CRLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CRLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\Certificates mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\Certificates mscorsvw.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\gameux.dll,-10310 = "The aim of the game in Spider Solitaire is to remove cards from play in the fewest moves possible. Line up runs of cards from king through ace, in the same suit, to remove them." SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates mscorsvw.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\Certificates mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CRLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\Certificates mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CTLs mscorsvw.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\system32\pmcsnap.dll,-700 = "Print Management" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CRLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CRLs mscorsvw.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\system32\SampleRes.dll,-142 = "Wildlife" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CTLs mscorsvw.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CRLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed mscorsvw.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2280 ehRec.exe 2936 aspnet_state.exe 2936 aspnet_state.exe 2936 aspnet_state.exe 2936 aspnet_state.exe 2936 aspnet_state.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 2232 3134e4e72112e321b2f42db3808315436b04653126118a8754ec44e72696b536.exe Token: SeShutdownPrivilege 1824 mscorsvw.exe Token: SeShutdownPrivilege 1736 mscorsvw.exe Token: 33 1124 EhTray.exe Token: SeIncBasePriorityPrivilege 1124 EhTray.exe Token: SeDebugPrivilege 2280 ehRec.exe Token: 33 1124 EhTray.exe Token: SeIncBasePriorityPrivilege 1124 EhTray.exe Token: SeRestorePrivilege 2528 msiexec.exe Token: SeTakeOwnershipPrivilege 2528 msiexec.exe Token: SeSecurityPrivilege 2528 msiexec.exe Token: SeBackupPrivilege 2560 vssvc.exe Token: SeRestorePrivilege 2560 vssvc.exe Token: SeAuditPrivilege 2560 vssvc.exe Token: SeBackupPrivilege 2616 wbengine.exe Token: SeRestorePrivilege 2616 wbengine.exe Token: SeSecurityPrivilege 2616 wbengine.exe Token: SeShutdownPrivilege 1824 mscorsvw.exe Token: 33 1512 wmpnetwk.exe Token: SeIncBasePriorityPrivilege 1512 wmpnetwk.exe Token: SeShutdownPrivilege 1736 mscorsvw.exe Token: SeManageVolumePrivilege 1592 SearchIndexer.exe Token: 33 1592 SearchIndexer.exe Token: SeIncBasePriorityPrivilege 1592 SearchIndexer.exe Token: SeShutdownPrivilege 1824 mscorsvw.exe Token: SeShutdownPrivilege 1824 mscorsvw.exe Token: SeShutdownPrivilege 1736 mscorsvw.exe Token: SeShutdownPrivilege 1736 mscorsvw.exe Token: SeDebugPrivilege 2820 alg.exe Token: SeShutdownPrivilege 1824 mscorsvw.exe Token: SeShutdownPrivilege 1736 mscorsvw.exe Token: SeDebugPrivilege 2936 aspnet_state.exe Token: SeShutdownPrivilege 1824 mscorsvw.exe Token: SeShutdownPrivilege 1736 mscorsvw.exe Token: SeShutdownPrivilege 1824 mscorsvw.exe Token: SeShutdownPrivilege 1824 mscorsvw.exe Token: SeShutdownPrivilege 1824 mscorsvw.exe Token: SeShutdownPrivilege 1824 mscorsvw.exe Token: SeShutdownPrivilege 1736 mscorsvw.exe Token: SeShutdownPrivilege 1736 mscorsvw.exe Token: SeShutdownPrivilege 1736 mscorsvw.exe Token: SeShutdownPrivilege 1824 mscorsvw.exe Token: SeShutdownPrivilege 1736 mscorsvw.exe Token: SeShutdownPrivilege 1824 mscorsvw.exe Token: SeShutdownPrivilege 1736 mscorsvw.exe Token: SeShutdownPrivilege 1824 mscorsvw.exe Token: SeShutdownPrivilege 1736 mscorsvw.exe Token: SeShutdownPrivilege 1824 mscorsvw.exe Token: SeShutdownPrivilege 1736 mscorsvw.exe Token: SeShutdownPrivilege 1824 mscorsvw.exe Token: SeShutdownPrivilege 1736 mscorsvw.exe Token: SeShutdownPrivilege 1824 mscorsvw.exe Token: SeShutdownPrivilege 1736 mscorsvw.exe Token: SeShutdownPrivilege 1824 mscorsvw.exe Token: SeShutdownPrivilege 1736 mscorsvw.exe Token: SeShutdownPrivilege 1824 mscorsvw.exe Token: SeShutdownPrivilege 1736 mscorsvw.exe Token: SeShutdownPrivilege 1824 mscorsvw.exe Token: SeShutdownPrivilege 1736 mscorsvw.exe Token: SeShutdownPrivilege 1824 mscorsvw.exe Token: SeShutdownPrivilege 1736 mscorsvw.exe Token: SeShutdownPrivilege 1824 mscorsvw.exe Token: SeShutdownPrivilege 1736 mscorsvw.exe Token: SeShutdownPrivilege 1824 mscorsvw.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1124 EhTray.exe 1124 EhTray.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1124 EhTray.exe 1124 EhTray.exe -
Suspicious use of SetWindowsHookEx 27 IoCs
pid Process 1856 SearchProtocolHost.exe 1856 SearchProtocolHost.exe 1856 SearchProtocolHost.exe 1856 SearchProtocolHost.exe 1856 SearchProtocolHost.exe 3088 SearchProtocolHost.exe 3088 SearchProtocolHost.exe 3088 SearchProtocolHost.exe 3088 SearchProtocolHost.exe 3088 SearchProtocolHost.exe 3088 SearchProtocolHost.exe 3088 SearchProtocolHost.exe 3088 SearchProtocolHost.exe 3088 SearchProtocolHost.exe 3088 SearchProtocolHost.exe 3088 SearchProtocolHost.exe 3088 SearchProtocolHost.exe 3088 SearchProtocolHost.exe 3088 SearchProtocolHost.exe 3088 SearchProtocolHost.exe 3088 SearchProtocolHost.exe 3088 SearchProtocolHost.exe 3088 SearchProtocolHost.exe 3088 SearchProtocolHost.exe 3088 SearchProtocolHost.exe 3088 SearchProtocolHost.exe 1856 SearchProtocolHost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1592 wrote to memory of 1856 1592 SearchIndexer.exe 48 PID 1592 wrote to memory of 1856 1592 SearchIndexer.exe 48 PID 1592 wrote to memory of 1856 1592 SearchIndexer.exe 48 PID 1592 wrote to memory of 1288 1592 SearchIndexer.exe 49 PID 1592 wrote to memory of 1288 1592 SearchIndexer.exe 49 PID 1592 wrote to memory of 1288 1592 SearchIndexer.exe 49 PID 1824 wrote to memory of 3380 1824 mscorsvw.exe 57 PID 1824 wrote to memory of 3380 1824 mscorsvw.exe 57 PID 1824 wrote to memory of 3380 1824 mscorsvw.exe 57 PID 1824 wrote to memory of 3380 1824 mscorsvw.exe 57 PID 1824 wrote to memory of 3536 1824 mscorsvw.exe 58 PID 1824 wrote to memory of 3536 1824 mscorsvw.exe 58 PID 1824 wrote to memory of 3536 1824 mscorsvw.exe 58 PID 1824 wrote to memory of 3536 1824 mscorsvw.exe 58 PID 1824 wrote to memory of 3836 1824 mscorsvw.exe 59 PID 1824 wrote to memory of 3836 1824 mscorsvw.exe 59 PID 1824 wrote to memory of 3836 1824 mscorsvw.exe 59 PID 1824 wrote to memory of 3836 1824 mscorsvw.exe 59 PID 1824 wrote to memory of 4004 1824 mscorsvw.exe 61 PID 1824 wrote to memory of 4004 1824 mscorsvw.exe 61 PID 1824 wrote to memory of 4004 1824 mscorsvw.exe 61 PID 1824 wrote to memory of 4004 1824 mscorsvw.exe 61 PID 1824 wrote to memory of 2300 1824 mscorsvw.exe 63 PID 1824 wrote to memory of 2300 1824 mscorsvw.exe 63 PID 1824 wrote to memory of 2300 1824 mscorsvw.exe 63 PID 1824 wrote to memory of 2300 1824 mscorsvw.exe 63 PID 1824 wrote to memory of 1960 1824 mscorsvw.exe 64 PID 1824 wrote to memory of 1960 1824 mscorsvw.exe 64 PID 1824 wrote to memory of 1960 1824 mscorsvw.exe 64 PID 1824 wrote to memory of 1960 1824 mscorsvw.exe 64 PID 1592 wrote to memory of 3088 1592 SearchIndexer.exe 65 PID 1592 wrote to memory of 3088 1592 SearchIndexer.exe 65 PID 1592 wrote to memory of 3088 1592 SearchIndexer.exe 65 PID 1824 wrote to memory of 3144 1824 mscorsvw.exe 66 PID 1824 wrote to memory of 3144 1824 mscorsvw.exe 66 PID 1824 wrote to memory of 3144 1824 mscorsvw.exe 66 PID 1824 wrote to memory of 3144 1824 mscorsvw.exe 66 PID 1824 wrote to memory of 3212 1824 mscorsvw.exe 67 PID 1824 wrote to memory of 3212 1824 mscorsvw.exe 67 PID 1824 wrote to memory of 3212 1824 mscorsvw.exe 67 PID 1824 wrote to memory of 3212 1824 mscorsvw.exe 67 PID 1824 wrote to memory of 3460 1824 mscorsvw.exe 68 PID 1824 wrote to memory of 3460 1824 mscorsvw.exe 68 PID 1824 wrote to memory of 3460 1824 mscorsvw.exe 68 PID 1824 wrote to memory of 3460 1824 mscorsvw.exe 68 PID 1824 wrote to memory of 3612 1824 mscorsvw.exe 69 PID 1824 wrote to memory of 3612 1824 mscorsvw.exe 69 PID 1824 wrote to memory of 3612 1824 mscorsvw.exe 69 PID 1824 wrote to memory of 3612 1824 mscorsvw.exe 69 PID 1824 wrote to memory of 3724 1824 mscorsvw.exe 70 PID 1824 wrote to memory of 3724 1824 mscorsvw.exe 70 PID 1824 wrote to memory of 3724 1824 mscorsvw.exe 70 PID 1824 wrote to memory of 3724 1824 mscorsvw.exe 70 PID 1824 wrote to memory of 3832 1824 mscorsvw.exe 71 PID 1824 wrote to memory of 3832 1824 mscorsvw.exe 71 PID 1824 wrote to memory of 3832 1824 mscorsvw.exe 71 PID 1824 wrote to memory of 3832 1824 mscorsvw.exe 71 PID 1824 wrote to memory of 3868 1824 mscorsvw.exe 72 PID 1824 wrote to memory of 3868 1824 mscorsvw.exe 72 PID 1824 wrote to memory of 3868 1824 mscorsvw.exe 72 PID 1824 wrote to memory of 3868 1824 mscorsvw.exe 72 PID 1824 wrote to memory of 4036 1824 mscorsvw.exe 73 PID 1824 wrote to memory of 4036 1824 mscorsvw.exe 73 PID 1824 wrote to memory of 4036 1824 mscorsvw.exe 73 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\3134e4e72112e321b2f42db3808315436b04653126118a8754ec44e72696b536.exe"C:\Users\Admin\AppData\Local\Temp\3134e4e72112e321b2f42db3808315436b04653126118a8754ec44e72696b536.exe"1⤵
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2232
-
C:\Windows\System32\alg.exeC:\Windows\System32\alg.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2820
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2936
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1736 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 1cc -InterruptEvent 1b8 -NGENProcess 1bc -Pipe 1c8 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:3876
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 1c4 -InterruptEvent 228 -NGENProcess 230 -Pipe 234 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:3932
-
-
C:\Windows\ehome\ehsched.exeC:\Windows\ehome\ehsched.exe1⤵
- Executes dropped EXE
PID:380
-
C:\Windows\system32\IEEtwCollector.exeC:\Windows\system32\IEEtwCollector.exe /V1⤵
- Executes dropped EXE
PID:3068
-
C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE"C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE" /auditservice1⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1600
-
C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"1⤵PID:1288
-
C:\Program Files (x86)\Common Files\Microsoft Shared\Source Engine\OSE.EXE"C:\Program Files (x86)\Common Files\Microsoft Shared\Source Engine\OSE.EXE"1⤵
- Executes dropped EXE
PID:2020
-
C:\Windows\SysWow64\perfhost.exeC:\Windows\SysWow64\perfhost.exe1⤵
- Executes dropped EXE
PID:1560
-
C:\Windows\System32\snmptrap.exeC:\Windows\System32\snmptrap.exe1⤵
- Executes dropped EXE
PID:1404
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵
- Executes dropped EXE
PID:1944
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2560
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2616
-
C:\Windows\system32\locator.exeC:\Windows\system32\locator.exe1⤵
- Executes dropped EXE
PID:580
-
C:\Windows\system32\SearchIndexer.exeC:\Windows\system32\SearchIndexer.exe /Embedding1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Windows\system32\SearchProtocolHost.exe"C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe_S-1-5-21-3627615824-4061627003-3019543961-10001_ Global\UsGthrCtrlFltPipeMssGthrPipe_S-1-5-21-3627615824-4061627003-3019543961-10001 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon" "1"2⤵
- Suspicious use of SetWindowsHookEx
PID:1856
-
-
C:\Windows\system32\SearchFilterHost.exe"C:\Windows\system32\SearchFilterHost.exe" 0 584 588 596 65536 5922⤵
- Executes dropped EXE
PID:1288
-
-
C:\Windows\system32\SearchProtocolHost.exe"C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe2_ Global\UsGthrCtrlFltPipeMssGthrPipe2 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon"2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:3088
-
-
C:\Program Files\Windows Media Player\wmpnetwk.exe"C:\Program Files\Windows Media Player\wmpnetwk.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1512
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵
- Executes dropped EXE
PID:1972
-
C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"1⤵
- Executes dropped EXE
PID:2628
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2528
-
C:\Windows\System32\msdtc.exeC:\Windows\System32\msdtc.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2688
-
C:\Windows\ehome\ehRec.exeC:\Windows\ehome\ehRec.exe -Embedding1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2280
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵
- Executes dropped EXE
PID:352
-
C:\Windows\eHome\EhTray.exe"C:\Windows\eHome\EhTray.exe" /nav:-21⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1124
-
C:\Windows\ehome\ehRecvr.exeC:\Windows\ehome\ehRecvr.exe1⤵
- Executes dropped EXE
PID:108
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1e8 -InterruptEvent 1d4 -NGENProcess 1d8 -Pipe 1e4 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:3380
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1e0 -InterruptEvent 24c -NGENProcess 254 -Pipe 258 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:3536
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 24c -InterruptEvent 244 -NGENProcess 1f0 -Pipe 23c -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:3836
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 244 -InterruptEvent 25c -NGENProcess 1e8 -Pipe 248 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:4004
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 25c -InterruptEvent 264 -NGENProcess 240 -Pipe 260 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2300
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 264 -InterruptEvent 1d8 -NGENProcess 1d4 -Pipe 1f0 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1960
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 268 -InterruptEvent 25c -NGENProcess 26c -Pipe 264 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:3144
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 25c -InterruptEvent 270 -NGENProcess 1d4 -Pipe 254 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:3212
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 274 -InterruptEvent 268 -NGENProcess 278 -Pipe 25c -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:3460
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 268 -InterruptEvent 24c -NGENProcess 1d4 -Pipe 1d8 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:3612
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1e8 -InterruptEvent 274 -NGENProcess 27c -Pipe 268 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:3724
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 274 -InterruptEvent 27c -NGENProcess 1d4 -Pipe 280 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:3832
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 26c -InterruptEvent 27c -NGENProcess 274 -Pipe 244 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:3868
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 278 -InterruptEvent 27c -NGENProcess 1d4 -Pipe 284 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:4036
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1e0 -InterruptEvent 26c -NGENProcess 28c -Pipe 278 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:4048
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 26c -InterruptEvent 290 -NGENProcess 1d4 -Pipe 24c -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2796
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 294 -InterruptEvent 290 -NGENProcess 26c -Pipe 240 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2976
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1e8 -InterruptEvent 290 -NGENProcess 294 -Pipe 1d4 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:3192
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 29c -InterruptEvent 27c -NGENProcess 298 -Pipe 290 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1652
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 270 -InterruptEvent 27c -NGENProcess 29c -Pipe 294 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:3340
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 28c -InterruptEvent 2a0 -NGENProcess 2a8 -Pipe 270 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:3424
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1e0 -InterruptEvent 2a0 -NGENProcess 28c -Pipe 29c -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:3632
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 274 -InterruptEvent 2ac -NGENProcess 2b0 -Pipe 1e0 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:3740
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1ec -InterruptEvent 1b4 -NGENProcess 220 -Pipe 1c8 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:3984
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1b4 -InterruptEvent 1d8 -NGENProcess 29c -Pipe 268 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:3868
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 25c -InterruptEvent 1ec -NGENProcess 254 -Pipe 1b4 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:3836
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1ec -InterruptEvent 254 -NGENProcess 22c -Pipe 264 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2812
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 278 -InterruptEvent 284 -NGENProcess 1f0 -Pipe 1ec -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:3376
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 244 -InterruptEvent 1f0 -NGENProcess 280 -Pipe 25c -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1068
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1f0 -InterruptEvent 248 -NGENProcess 284 -Pipe 220 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:3572
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 23c -InterruptEvent 244 -NGENProcess 258 -Pipe 1f0 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:3676
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 260 -InterruptEvent 244 -NGENProcess 23c -Pipe 284 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:3624
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 29c -InterruptEvent 254 -NGENProcess 1c4 -Pipe 260 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:3488
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 254 -InterruptEvent 1d8 -NGENProcess 23c -Pipe 280 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1480
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 244 -InterruptEvent 258 -NGENProcess 23c -Pipe 1d0 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:3800
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 258 -InterruptEvent 248 -NGENProcess 2a8 -Pipe 224 -Comment "NGen Worker Process"2⤵
- Loads dropped DLL
- Drops file in Windows directory
PID:2508
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 248 -InterruptEvent 2a8 -NGENProcess 244 -Pipe 1d8 -Comment "NGen Worker Process"2⤵PID:3932
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 22c -InterruptEvent 2a8 -NGENProcess 248 -Pipe 1c4 -Comment "NGen Worker Process"2⤵
- Loads dropped DLL
- Drops file in Windows directory
PID:3472
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 244 -InterruptEvent 2ac -NGENProcess 248 -Pipe 23c -Comment "NGen Worker Process"2⤵PID:4084
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 254 -InterruptEvent 258 -NGENProcess 298 -Pipe 244 -Comment "NGen Worker Process"2⤵
- Loads dropped DLL
- Drops file in Windows directory
PID:2016
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2a4 -InterruptEvent 2b4 -NGENProcess 2a0 -Pipe 22c -Comment "NGen Worker Process"2⤵PID:3164
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 29c -InterruptEvent 248 -NGENProcess 27c -Pipe 2a4 -Comment "NGen Worker Process"2⤵
- Loads dropped DLL
- Drops file in Windows directory
PID:3208
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 248 -InterruptEvent 27c -NGENProcess 298 -Pipe 2a0 -Comment "NGen Worker Process"2⤵PID:3596
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2a8 -InterruptEvent 27c -NGENProcess 248 -Pipe 258 -Comment "NGen Worker Process"2⤵
- Loads dropped DLL
- Drops file in Windows directory
PID:2656
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2b4 -InterruptEvent 29c -NGENProcess 2bc -Pipe 2a8 -Comment "NGen Worker Process"2⤵PID:3648
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2ac -InterruptEvent 298 -NGENProcess 2c0 -Pipe 2b4 -Comment "NGen Worker Process"2⤵
- Loads dropped DLL
- Drops file in Windows directory
PID:828
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2bc -InterruptEvent 2b8 -NGENProcess 2c0 -Pipe 26c -Comment "NGen Worker Process"2⤵PID:3032
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 254 -InterruptEvent 248 -NGENProcess 2c8 -Pipe 2bc -Comment "NGen Worker Process"2⤵
- Loads dropped DLL
- Drops file in Windows directory
PID:2612
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1e8 -InterruptEvent 2c4 -NGENProcess 2cc -Pipe 254 -Comment "NGen Worker Process"2⤵PID:3004
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2c4 -InterruptEvent 2d0 -NGENProcess 2c8 -Pipe 27c -Comment "NGen Worker Process"2⤵
- Loads dropped DLL
- Drops file in Windows directory
PID:3540
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2d4 -InterruptEvent 1e8 -NGENProcess 2d8 -Pipe 2c4 -Comment "NGen Worker Process"2⤵PID:3748
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 29c -InterruptEvent 1e8 -NGENProcess 2d4 -Pipe 2c8 -Comment "NGen Worker Process"2⤵
- Loads dropped DLL
PID:1124
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 29c -InterruptEvent 2ac -NGENProcess 2c0 -Pipe 2d8 -Comment "NGen Worker Process"2⤵PID:1516
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2cc -InterruptEvent 2ac -NGENProcess 29c -Pipe 1e8 -Comment "NGen Worker Process"2⤵
- Loads dropped DLL
- Drops file in Windows directory
PID:3200
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 29c -InterruptEvent 2c0 -NGENProcess 2cc -Pipe 2ac -Comment "NGen Worker Process"2⤵PID:3328
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2ec -InterruptEvent 2c0 -NGENProcess 29c -Pipe 2e0 -Comment "NGen Worker Process"2⤵
- Loads dropped DLL
PID:2756
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2cc -InterruptEvent 2f0 -NGENProcess 29c -Pipe 2e8 -Comment "NGen Worker Process"2⤵PID:3444
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2f0 -InterruptEvent 2d0 -NGENProcess 2f4 -Pipe 2d4 -Comment "NGen Worker Process"2⤵
- Loads dropped DLL
- Drops file in Windows directory
PID:3180
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2c0 -InterruptEvent 298 -NGENProcess 2f4 -Pipe 2f8 -Comment "NGen Worker Process"2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:1096
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 248 -InterruptEvent 2cc -NGENProcess 300 -Pipe 2c0 -Comment "NGen Worker Process"2⤵PID:1044
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2ec -InterruptEvent 2f0 -NGENProcess 304 -Pipe 248 -Comment "NGen Worker Process"2⤵PID:1644
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2f0 -InterruptEvent 308 -NGENProcess 300 -Pipe 2b8 -Comment "NGen Worker Process"2⤵PID:1532
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 29c -InterruptEvent 308 -NGENProcess 2f0 -Pipe 298 -Comment "NGen Worker Process"2⤵
- Loads dropped DLL
- Drops file in Windows directory
PID:1368
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 308 -InterruptEvent 2f0 -NGENProcess 2f4 -Pipe 300 -Comment "NGen Worker Process"2⤵
- Loads dropped DLL
- Drops file in Windows directory
PID:1588
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 314 -InterruptEvent 2cc -NGENProcess 318 -Pipe 308 -Comment "NGen Worker Process"2⤵PID:3352
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2cc -InterruptEvent 2d0 -NGENProcess 2f4 -Pipe 2ec -Comment "NGen Worker Process"2⤵PID:1732
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 31c -InterruptEvent 2d0 -NGENProcess 2cc -Pipe 2f0 -Comment "NGen Worker Process"2⤵
- Modifies data under HKEY_USERS
PID:3376
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 304 -InterruptEvent 2d0 -NGENProcess 31c -Pipe 2f4 -Comment "NGen Worker Process"2⤵PID:3664
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 328 -InterruptEvent 29c -NGENProcess 2cc -Pipe 320 -Comment "NGen Worker Process"2⤵PID:3084
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 29c -InterruptEvent 318 -NGENProcess 31c -Pipe 314 -Comment "NGen Worker Process"2⤵PID:3848
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 310 -InterruptEvent 328 -NGENProcess 32c -Pipe 29c -Comment "NGen Worker Process"2⤵PID:3336
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 328 -InterruptEvent 2fc -NGENProcess 31c -Pipe 30c -Comment "NGen Worker Process"2⤵PID:1604
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 330 -InterruptEvent 2fc -NGENProcess 328 -Pipe 318 -Comment "NGen Worker Process"2⤵PID:1416
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 304 -InterruptEvent 2d0 -NGENProcess 338 -Pipe 330 -Comment "NGen Worker Process"2⤵PID:4016
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2d0 -InterruptEvent 33c -NGENProcess 328 -Pipe 324 -Comment "NGen Worker Process"2⤵PID:2204
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 33c -InterruptEvent 340 -NGENProcess 310 -Pipe 2cc -Comment "NGen Worker Process"2⤵PID:4088
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 340 -InterruptEvent 344 -NGENProcess 338 -Pipe 2fc -Comment "NGen Worker Process"2⤵PID:2300
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 334 -InterruptEvent 33c -NGENProcess 348 -Pipe 340 -Comment "NGen Worker Process"2⤵PID:3228
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 31c -InterruptEvent 328 -NGENProcess 34c -Pipe 334 -Comment "NGen Worker Process"2⤵PID:3276
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 32c -InterruptEvent 338 -NGENProcess 350 -Pipe 31c -Comment "NGen Worker Process"2⤵
- Modifies data under HKEY_USERS
PID:2648
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 310 -InterruptEvent 348 -NGENProcess 354 -Pipe 32c -Comment "NGen Worker Process"2⤵PID:3332
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 348 -InterruptEvent 304 -NGENProcess 350 -Pipe 344 -Comment "NGen Worker Process"2⤵PID:2188
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 304 -InterruptEvent 35c -NGENProcess 338 -Pipe 358 -Comment "NGen Worker Process"2⤵PID:3548
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 33c -InterruptEvent 348 -NGENProcess 360 -Pipe 304 -Comment "NGen Worker Process"2⤵PID:3768
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 348 -InterruptEvent 364 -NGENProcess 338 -Pipe 354 -Comment "NGen Worker Process"2⤵PID:2024
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2d0 -InterruptEvent 33c -NGENProcess 368 -Pipe 348 -Comment "NGen Worker Process"2⤵PID:292
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 35c -InterruptEvent 34c -NGENProcess 36c -Pipe 2d0 -Comment "NGen Worker Process"2⤵PID:2128
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 34c -InterruptEvent 370 -NGENProcess 368 -Pipe 350 -Comment "NGen Worker Process"2⤵PID:4040
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 374 -InterruptEvent 370 -NGENProcess 34c -Pipe 364 -Comment "NGen Worker Process"2⤵
- Modifies data under HKEY_USERS
PID:1604
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 370 -InterruptEvent 34c -NGENProcess 378 -Pipe 37c -Comment "NGen Worker Process"2⤵PID:1424
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 33c -InterruptEvent 34c -NGENProcess 370 -Pipe 360 -Comment "NGen Worker Process"2⤵
- Modifies data under HKEY_USERS
PID:3840
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 378 -InterruptEvent 34c -NGENProcess 384 -Pipe 368 -Comment "NGen Worker Process"2⤵
- Modifies data under HKEY_USERS
PID:3136
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 35c -InterruptEvent 380 -NGENProcess 36c -Pipe 378 -Comment "NGen Worker Process"2⤵
- Modifies data under HKEY_USERS
PID:4052
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 338 -InterruptEvent 370 -NGENProcess 388 -Pipe 35c -Comment "NGen Worker Process"2⤵PID:328
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 310 -InterruptEvent 370 -NGENProcess 338 -Pipe 36c -Comment "NGen Worker Process"2⤵
- Modifies data under HKEY_USERS
PID:3276
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 370 -InterruptEvent 374 -NGENProcess 388 -Pipe 33c -Comment "NGen Worker Process"2⤵PID:3016
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 390 -InterruptEvent 310 -NGENProcess 394 -Pipe 370 -Comment "NGen Worker Process"2⤵
- Modifies data under HKEY_USERS
PID:2032
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 310 -InterruptEvent 34c -NGENProcess 388 -Pipe 38c -Comment "NGen Worker Process"2⤵
- Modifies data under HKEY_USERS
PID:3672
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 398 -InterruptEvent 390 -NGENProcess 39c -Pipe 310 -Comment "NGen Worker Process"2⤵
- Modifies data under HKEY_USERS
PID:3548
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 380 -InterruptEvent 390 -NGENProcess 398 -Pipe 388 -Comment "NGen Worker Process"2⤵
- Loads dropped DLL
- Drops file in Windows directory
- Modifies data under HKEY_USERS
PID:3416
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 328 -InterruptEvent 384 -NGENProcess 3a4 -Pipe 380 -Comment "NGen Worker Process"2⤵
- Modifies data under HKEY_USERS
PID:3336
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 338 -InterruptEvent 39c -NGENProcess 3a8 -Pipe 328 -Comment "NGen Worker Process"2⤵
- Loads dropped DLL
- Drops file in Windows directory
- Modifies data under HKEY_USERS
PID:1776
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 394 -InterruptEvent 398 -NGENProcess 3ac -Pipe 338 -Comment "NGen Worker Process"2⤵
- Modifies data under HKEY_USERS
PID:1328
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 398 -InterruptEvent 34c -NGENProcess 3a8 -Pipe 374 -Comment "NGen Worker Process"2⤵
- Loads dropped DLL
- Drops file in Windows directory
- Modifies data under HKEY_USERS
PID:2004
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3b0 -InterruptEvent 394 -NGENProcess 3b4 -Pipe 398 -Comment "NGen Worker Process"2⤵PID:3792
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 394 -InterruptEvent 390 -NGENProcess 3a8 -Pipe 3a0 -Comment "NGen Worker Process"2⤵
- Modifies data under HKEY_USERS
PID:2848
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3b8 -InterruptEvent 3b0 -NGENProcess 3bc -Pipe 394 -Comment "NGen Worker Process"2⤵
- Loads dropped DLL
- Drops file in Windows directory
- Modifies data under HKEY_USERS
PID:1160
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3b0 -InterruptEvent 3bc -NGENProcess 34c -Pipe 3a8 -Comment "NGen Worker Process"2⤵PID:1104
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3c0 -InterruptEvent 3a4 -NGENProcess 3c4 -Pipe 3b0 -Comment "NGen Worker Process"2⤵PID:3372
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3a4 -InterruptEvent 3ac -NGENProcess 34c -Pipe 39c -Comment "NGen Worker Process"2⤵PID:2144
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3c8 -InterruptEvent 3c0 -NGENProcess 3cc -Pipe 3a4 -Comment "NGen Worker Process"2⤵PID:1436
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3b4 -InterruptEvent 3c0 -NGENProcess 3c8 -Pipe 34c -Comment "NGen Worker Process"2⤵PID:3900
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3c0 -InterruptEvent 430 -NGENProcess 3cc -Pipe 42c -Comment "NGen Worker Process"2⤵PID:2256
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 434 -InterruptEvent 430 -NGENProcess 3c0 -Pipe 420 -Comment "NGen Worker Process"2⤵PID:2992
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 430 -InterruptEvent 428 -NGENProcess 3cc -Pipe 3d0 -Comment "NGen Worker Process"2⤵PID:932
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 43c -InterruptEvent 428 -NGENProcess 430 -Pipe 3b4 -Comment "NGen Worker Process"2⤵PID:2376
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 424 -InterruptEvent 390 -NGENProcess 444 -Pipe 43c -Comment "NGen Worker Process"2⤵PID:4012
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 438 -InterruptEvent 3cc -NGENProcess 448 -Pipe 424 -Comment "NGen Worker Process"2⤵PID:1044
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3cc -InterruptEvent 44c -NGENProcess 444 -Pipe 3c8 -Comment "NGen Worker Process"2⤵PID:3976
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3c0 -InterruptEvent 438 -NGENProcess 450 -Pipe 3cc -Comment "NGen Worker Process"2⤵PID:3832
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 438 -InterruptEvent 454 -NGENProcess 444 -Pipe 390 -Comment "NGen Worker Process"2⤵PID:3368
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 434 -InterruptEvent 454 -NGENProcess 438 -Pipe 440 -Comment "NGen Worker Process"2⤵PID:3220
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 44c -InterruptEvent 454 -NGENProcess 444 -Pipe 434 -Comment "NGen Worker Process"2⤵PID:1904
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 454 -InterruptEvent 448 -NGENProcess 438 -Pipe 450 -Comment "NGen Worker Process"2⤵PID:3460
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 460 -InterruptEvent 44c -NGENProcess 464 -Pipe 454 -Comment "NGen Worker Process"2⤵PID:1516
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 44c -InterruptEvent 430 -NGENProcess 438 -Pipe 45c -Comment "NGen Worker Process"2⤵PID:1960
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 468 -InterruptEvent 460 -NGENProcess 46c -Pipe 44c -Comment "NGen Worker Process"2⤵PID:2704
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 5603⤵
- Loads dropped DLL
PID:3656
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3c0 -InterruptEvent 428 -NGENProcess 44c -Pipe 438 -Comment "NGen Worker Process"2⤵PID:3084
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 428 -InterruptEvent 444 -NGENProcess 470 -Pipe 430 -Comment "NGen Worker Process"2⤵
- Loads dropped DLL
- Drops file in Windows directory
PID:3812
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 46c -InterruptEvent 468 -NGENProcess 470 -Pipe 458 -Comment "NGen Worker Process"2⤵PID:1856
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 468 -InterruptEvent 464 -NGENProcess 474 -Pipe 460 -Comment "NGen Worker Process"2⤵PID:3252
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 478 -InterruptEvent 46c -NGENProcess 47c -Pipe 468 -Comment "NGen Worker Process"2⤵PID:3380
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 46c -InterruptEvent 448 -NGENProcess 474 -Pipe 428 -Comment "NGen Worker Process"2⤵PID:3868
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 480 -InterruptEvent 478 -NGENProcess 484 -Pipe 46c -Comment "NGen Worker Process"2⤵PID:656
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 478 -InterruptEvent 44c -NGENProcess 474 -Pipe 3c0 -Comment "NGen Worker Process"2⤵
- Loads dropped DLL
- Drops file in Windows directory
PID:3540
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 48c -InterruptEvent 478 -NGENProcess 448 -Pipe 44c -Comment "NGen Worker Process"2⤵PID:2796
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 478 -InterruptEvent 490 -NGENProcess 474 -Pipe 470 -Comment "NGen Worker Process"2⤵
- Drops file in Windows directory
PID:1204
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 48c -InterruptEvent 484 -NGENProcess 480 -Pipe 444 -Comment "NGen Worker Process"2⤵PID:3192
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 484 -InterruptEvent 498 -NGENProcess 464 -Pipe 494 -Comment "NGen Worker Process"2⤵PID:3300
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 498 -InterruptEvent 49c -NGENProcess 448 -Pipe 47c -Comment "NGen Worker Process"2⤵PID:380
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 474 -InterruptEvent 484 -NGENProcess 4a0 -Pipe 498 -Comment "NGen Worker Process"2⤵
- Drops file in Windows directory
PID:3544
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 4a4 -InterruptEvent 474 -NGENProcess 448 -Pipe 484 -Comment "NGen Worker Process"2⤵PID:828
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 474 -InterruptEvent 488 -NGENProcess 4a0 -Pipe 464 -Comment "NGen Worker Process"2⤵
- Drops file in Windows directory
PID:4032
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 4ac -InterruptEvent 478 -NGENProcess 480 -Pipe 488 -Comment "NGen Worker Process"2⤵PID:2288
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 490 -InterruptEvent 4a8 -NGENProcess 4b0 -Pipe 4ac -Comment "NGen Worker Process"2⤵PID:3716
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 4a8 -InterruptEvent 4b4 -NGENProcess 480 -Pipe 48c -Comment "NGen Worker Process"2⤵
- Drops file in Windows directory
PID:2128
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 4b8 -InterruptEvent 4a8 -NGENProcess 4a4 -Pipe 4b4 -Comment "NGen Worker Process"2⤵PID:1888
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 478 -InterruptEvent 49c -NGENProcess 4bc -Pipe 4b8 -Comment "NGen Worker Process"2⤵PID:952
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 480 -InterruptEvent 4a4 -NGENProcess 4b0 -Pipe 448 -Comment "NGen Worker Process"2⤵PID:376
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 4a4 -InterruptEvent 4c4 -NGENProcess 4a8 -Pipe 4c0 -Comment "NGen Worker Process"2⤵PID:1720
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 4c4 -InterruptEvent 474 -NGENProcess 490 -Pipe 4bc -Comment "NGen Worker Process"2⤵PID:3028
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 4c8 -InterruptEvent 4a4 -NGENProcess 4cc -Pipe 4c4 -Comment "NGen Worker Process"2⤵
- Modifies data under HKEY_USERS
PID:1548
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 4a0 -InterruptEvent 4a4 -NGENProcess 4c8 -Pipe 490 -Comment "NGen Worker Process"2⤵
- Drops file in Windows directory
- Modifies data under HKEY_USERS
PID:3596
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 4a4 -InterruptEvent 4d0 -NGENProcess 4a0 -Pipe 478 -Comment "NGen Worker Process"2⤵PID:2664
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 4a8 -InterruptEvent 4d0 -NGENProcess 4a4 -Pipe 480 -Comment "NGen Worker Process"2⤵PID:2220
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 4d0 -InterruptEvent 1e0 -NGENProcess 4a0 -Pipe 4c8 -Comment "NGen Worker Process"2⤵PID:3560
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 4d8 -InterruptEvent 4a8 -NGENProcess 4dc -Pipe 4d0 -Comment "NGen Worker Process"2⤵PID:3900
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 4a8 -InterruptEvent 4e0 -NGENProcess 4a0 -Pipe 474 -Comment "NGen Worker Process"2⤵
- Drops file in Windows directory
PID:2748
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 4e4 -InterruptEvent 4a8 -NGENProcess 4a4 -Pipe 4e0 -Comment "NGen Worker Process"2⤵PID:1472
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 4a8 -InterruptEvent 4e8 -NGENProcess 4a0 -Pipe 1e0 -Comment "NGen Worker Process"2⤵
- Modifies data under HKEY_USERS
PID:4016
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 4ec -InterruptEvent 4e8 -NGENProcess 4a8 -Pipe 49c -Comment "NGen Worker Process"2⤵
- Drops file in Windows directory
- Modifies data under HKEY_USERS
PID:4020
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 4f4 -InterruptEvent 4ec -NGENProcess 4a0 -Pipe 4e8 -Comment "NGen Worker Process"2⤵PID:1620
-
-
C:\Windows\system32\dllhost.exeC:\Windows\system32\dllhost.exe /Processid:{02D4B3F1-FD88-11D1-960D-00805FC79235}1⤵
- Executes dropped EXE
PID:3168
-
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe1⤵
- Executes dropped EXE
PID:1516
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe1⤵
- Executes dropped EXE
PID:2760
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60KB
MD5ca8daec54e75ff8c6575bb327c35bbfa
SHA14ff59410b0b5bfa31f462802078982910860044e
SHA256b2fb522965ef690d27746e8bf82f5498aaef541c12715a7273637d7308305b48
SHA512ffd5534723c98bfb696238ac6ecaad3a684de943c554acabc873162e84456bc48d8c2462165caa7b4a4e28a9c8df4637a86ed4d26872fb673c2359318064a229
-
Filesize
93KB
MD5bfd73c4f091872840f1d3f98db00b471
SHA14943e4d0379bfd6344107b29ad6d5e3507ccbf31
SHA256ac1a231f44138de010a6c9467cb05aa89e6ed040750f6a0d70ada8650d064f42
SHA512825f65c4dda313dc9dc0df74be11923f783b1ae214d86c48ead57894075db40624e73c7c88c2c3fbe7d6399edaa41141b370931fbfcf12afb607acc510f2f06e
-
Filesize
64KB
MD52c7c46379c90bedf93dbccf33f790183
SHA1c8ae7cdab39ae9b6c6176402a5bc63ed258accd7
SHA256737ea9c14d5c1ebfdd4bd808163550587885fd99078475a37fb2e7c49fd250dd
SHA51211684727b62701b3b514447dbeced38590adf3718234ef9de8df2b0e19d524351e525f11a70646c46f095b4914df908b75b6367d2b3076ffcfbb8f7e1c94361a
-
Filesize
169KB
MD52343da0b5ca5d7c9aff06bfaf825fc2b
SHA197814ccf5ce2e9703b6e348593655918b13ed113
SHA25691b7e57dbde9e74deb3794769f4fb27d29ed6ad6309be9ffdb281c7bd01c0c33
SHA512a91a4f3980631e3caea234a84864a2aeee1d53030709d8290169f52f4f69ec1dc6f23dd7ac390de876a23fae475fb4fd538d99d007a278dd090748e7b9436c05
-
Filesize
125KB
MD54c2f9035dd13f4c8f20b2612c9a07eb9
SHA17f2aeca276daf0884332a50d5553f3715f8d4a24
SHA2566ec67e1bce24a76ecffb481fcb112973c3474cde99df333fcbee62734d56d633
SHA5125b0341c643ad55c98bf4a7df8ff12406c384cc0de11fe7fc57345f4c6e619f0ef006ea06bda9549c87a524ab61c7740f24896d502a146917c02fde503cb77b17
-
Filesize
7KB
MD5ce57dd118c7f650616e8b4df987dbbc5
SHA1e98cb2d9571e29fbb6b962a66a9fa000d9291368
SHA25675a84058d7063c52f1e82af330af4269f95454f67020c2a60a6c434e72c0697e
SHA5124f127db95573408e79fd8e16a504db8452cc576834ea0f24397c27c7a9952c66469cd215f06b6e9b1ed0dbfb8e10756738d30c4ec47a94221840efca77531f69
-
Filesize
45KB
MD5fb49180b23c6ac0dd1c708570375a8e8
SHA1b92e4636def0d814290b4d72aefa758ecb984ff1
SHA256f71d3957f53c39e8575a22c9551c25425a28a0c0590803b89b15183104209732
SHA512c71afe20006096373b7eabf0027437ea98be060b0dd5a2ad58784bcd433561a54969951bbbc3b73a9d8c76005433b970a5aacea2dda397baf0495662db9fc59f
-
Filesize
45KB
MD5ce5cffb2934a36ff5710a7b114784735
SHA17a6e89ec0af35b0b3c51bd024dde8a2c5963426a
SHA256c2c33cc31e577f5fc09519f49fe15bb3eb50ba567faf253df2c6d5c3ee1adbea
SHA5120f37a5d40c261025e8e230b79e8fc88cabca3c3bfa28b6ea9f25b0a1dac2ea174c634f35f62b2160534ab6e24453a3b170e8fac7af28b4716912120913e7b28d
-
Filesize
132KB
MD5af5ad62c2ecdd1a30eccfb20e11ac948
SHA1f11dd05bdf4fd0bb637a4458be8e7059fa71bf72
SHA2561e382b72c551097d3d355ca0d8f5e788e0642e053831cbd29ba0a0233e0d1178
SHA512e51cb5bb5578a2ccf006e10a8470fc942c7725f4892b89dfd1a3cd0fedee9d81cbafc0707e1a1343f5a175ce08cff40a1531bc3c574b9af94e9fa4f34941cee2
-
Filesize
47KB
MD578c7a73b99fcc52014c35582c1366c92
SHA1c8f1a8eb96c2b147d96cac6fd74ae294857204b0
SHA2562a0d6eb019988702bbd8b1baf0118c8a1768745f471e491cb30c7d5a09aaa2f3
SHA512d26cd7be0f2a68792a08f16622f1a66dd1176c74ef378956d6a5cc14c56f9b73294a8aa1fbf2d9c8c60e12b26f187aebf68d6a9e0533763a279bde6704a79dc8
-
Filesize
89KB
MD5ee7d93ea8307e2874791da6826e6f544
SHA1527a7336b1783b2e17ea98743797e40a7467e69a
SHA256de7e7ef1f3b2a9f8370d0872d26d4dbad5a6e303eb88c6da784384c97d5f8681
SHA51219e259d2d26c17e11f07c0340572a4e757441c0c1d1544fe1e1ecaf070b841fb769232a571ba4a3a7e1dd69cd2e52764de669784d37c62bbdf9b15d7f23c9cc9
-
Filesize
64KB
MD563358fd2ba492595ae906ff64c90daa7
SHA1d92722199a1daf6b38ad40440e3c360a923010ed
SHA2561fc779bdc04c2fe47dad0f068d2bff8f2b6b84be048df9aae1fe8eb5188a8a81
SHA512d690001f16c01d9bcf53f7f75156fb998cb9606ddae66e1aaa609b6a62e5b047afd2223634f2f9b8d17e54c0ea674dc6b798ef93315dc7409cfa3908d2ec495c
-
Filesize
90KB
MD5084918a7edc43cbb781b1dad708a04e1
SHA117fc83eb0afd717aec6a796ad5b2a2b2d055e2ce
SHA2569c8ded8a19831bee25140b0f7be5cdb0c0994b7c7f157308a9777ad0edb8d240
SHA512e14f2ba4982286aef86d9267ac1a787b3f9bf6c43f0a9c5ed4ef84bf58093305ec60198b643e168dac9a0bebf3ff0e5e3752bda32e3e566c5cff559ee5842d4c
-
Filesize
80KB
MD5cbd4a74b34175699f9987c5d394420f5
SHA193f6ba467702827ece887b3fb6c3c5f6a450ab2a
SHA2563e3e21a4606c75cd3ceab8ee49b52229bd21825bdea3dcab1e648972b2e0ac47
SHA5125f37b54c5cb4a40f752a80b88b5f64a6ca2cef44d673e784889ef0ef8723086be183751b1f154da4b06f8be49c7bce4f87d47881f193f0f837fe29de708a9781
-
Filesize
14KB
MD5bc3f264adb3fafcbf591b460297bd0e0
SHA1510ae3825a2a43659d07c5d3d28b9ea9b5335458
SHA256d5ba4f855c46a02c10a3a106b87d6ca76a6352a5c976e1debf7d471c034f65fe
SHA5123cbd5e2845d2f9673d376976f71b068c8bc8e28c474ce82ca9606cb2b0e02a6558789c5b08244de1951a78a6024b1620334bb1fde73ec299abb3132c3bef8ca1
-
Filesize
47KB
MD5ddba4dd03095a01151ce68506de5582b
SHA198a5dc8b3b0b359b106b9c8b14cdc7df1fff96c9
SHA2568628c3ce6a12f904abc4bffef5b98ced2963648b1d5ec073ad1dc4f19e5f6dcc
SHA51202d096c1a8ac8b4e7e7a30fb6fa61ebd135f0af6136c003f75f79b49bdd2ddfb8c9bb25bba9c47545e9e5e533255c277a35eecbfb337d1e0bd85abffa7aa597f
-
Filesize
70KB
MD59e881e8480f9d5f61b241ebb81a3af76
SHA162e557333fd25c3cd52319af15681dfc0675801d
SHA256434a267462deda1d3d390e2f7b1013a9bb436e44436d30aa13ba28960e68ddbc
SHA5120997bd5cc09af340fe7800c2bf7247e67007348b094b308c31bc7073cfbd67b64a190f649466a0fe504018cf9bfb016e1ba3976307866066f21ef4c13d9520c5
-
Filesize
82KB
MD5fdd701d9fa07ab8663879440c0e1e749
SHA1ac63475ce2d2fa15752e49f33d3754ad3525d3da
SHA25612f7ac8be5289cf7ced3276471d4211553b8a7e0150d70abc8370becb24cc68f
SHA512d18d79d5eab2cae00af384b152cbb027b2d1029e181a6f614125a8a65e0040e158ec980e6e500eb39217d548ab4a3b7cc0193313f246c0ba2862ef7dc2378f54
-
Filesize
66KB
MD5eca20b8de5df5d874f2d4da75756662d
SHA132d711104dc8ec292c78cd7d761b33a1fe13f0cf
SHA256011dbf047570309adfd6469afb6b4753c3ee6ae02335f1ca1ff6052606b1f3b1
SHA512991af209ba37a90e5033c2af59edcbddcb48bb3471fb3ffb75fca8c477760afdd5e1c1284d25494cb6983a7ededc86d8c4adc9af5bdb79e48a28b30f7df21b47
-
Filesize
9KB
MD508c2e2b69f7f2ad8fc20e337f2540a82
SHA1ee5e349f3ff62625f7397038736bb52660b480dc
SHA2564e24b7ba9dadace6811ffa7b2aefb9f14567a6dd9dd500a0449a79db5f596f6a
SHA512e049b50bf6fcea070bc25824fef2640709676374fd8202ce2c3981b68a10cbd7b66db16ac964acbc7b834aa5151b9d7e49211fb2bb6a409b73adfecb2ffef6bf
-
Filesize
35KB
MD5652356a86b0cf6f01a2d6d769241b467
SHA1453193bce8df3bbce93655a130b5768b6d7ae385
SHA25677b5bda8b8b09c6057f8d927eb81c738e9261d77d1562596edb737a43fa66d99
SHA512a5014bffb39040647b187c9eb885231b91575d33ea221b6ebc5ff8cfb4a1d9a8316f9605c1558e6a1d1a3ff689bb40001fa008d4fbf2c85b55049dc697e6debb
-
Filesize
92KB
MD5ff27a9a09f04ba912d494352509606ac
SHA1c3913ec6f55394b59380c61698111b78d8f08901
SHA256e8a71aa1632dfa5701a498f1137c98b803806267b204a4a5acb8535c70d8d23c
SHA5126ab96a8e092b89dbedc07b755a2124199a7d9c009918222cc5ef58d3092c2a323e11abdf76ed5377d88b359eb9b892078aa59908f047666b0bd77af2cfb37d31
-
Filesize
102KB
MD55058d5a263be155b861039435a487414
SHA15383b8fc2b9fa1150958c60716395c4772af9d8e
SHA2567486dbcb7fd4f159cbf4e8b4cff236abd209f14e7d3c99b858e569dfb45b7aa9
SHA512bb5dd05cd926ecca5e06b6295d90b8cda8c87f018bff38a6cbacfe6645c7247fb64addd0f3366434f1332fc897f75b922ada1afa1ff9f1449112a6aee9bd4f69
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b91050d8b077a4e8.customDestinations-ms
Filesize24B
MD5b9bd716de6739e51c620f2086f9c31e4
SHA19733d94607a3cba277e567af584510edd9febf62
SHA2567116ff028244a01f3d17f1d3bc2e1506bc9999c2e40e388458f0cccc4e117312
SHA512cef609e54c7a81a646ad38dba7ac0b82401b220773b9c792cefac80c6564753229f0c011b34ffb56381dd3154a19aee2bf5f602c4d1af01f2cf0fbc1574e4478
-
Filesize
406KB
MD5ef61e6a62c917144fa2790930c69504e
SHA12a0e34c1b8e3622161836e67e7b033710a6e49f0
SHA2564ce930faf3d837ada9d87bf2ef7ebc742e37fe29a03879c49b08e6a74a837987
SHA512a733c826e0a94db21f4e364bde6e1a12c945b3fd9e211543f78021922b673542d03473bf22edbdc2a169af9443898b51cb115fdd9d9d4901c3bc9599a1a79837
-
Filesize
391KB
MD51766e0f00721b8fca076b61bae40d7ad
SHA1a8944972b2ec42ef6c845e969297c885a3ff781a
SHA2565bcd704696d135446910354c110f6f17c4aa2cf29ae651ea0c39e51b8430c06d
SHA51200f10b223c0ab4827609e97a67a8ad8f35750fd4d4baa6d36e6b803740b8bf3d06c1cbba82c65ad7c7c68d1fd2bd920a014e039e9322bb9a26e311a3f00d8e4d
-
Filesize
36KB
MD5630cba8d639f5346d6f2d20f75b2c4b9
SHA141bb2b61c5e9850220bc4bde60f3c8832e357683
SHA256435e2448e85fa3f40ad7053270e71a8af92b57d64f1a97fe9f932ac0bcd3b7b8
SHA5128fc36aaf36232b5ee02653c3ec0a640be717d21c264464a6bf55c53bbea089c639ce3083f444bde4b2173dd430edac5a0e3358e9582f9e363493f0c223faeab0
-
Filesize
324KB
MD5eebba21f7a6266df1c742c8d35408a37
SHA1c1aa86ff7c1bd384b223bde700992dda3f2f2c37
SHA256aff621ff67ebb5000818d90368292c6ff019733699c15c69092e5e830f4201d3
SHA512cfe79c92d19a644f459f6f8e2726bfd2e5db2cf366c2991d1a757aa3ca7bb1211464ed4a2e3d8823cc3abeff026fb194c77cb4b2a8f3baa44259bc394a72865d
-
Filesize
128KB
MD599cea4605d54e1b6f0f6055ef54d1043
SHA198dd255630d23a22edd4324f570bbcbd6fb7c59f
SHA256adc2c101b1d4edc927079b99404703a631e55924198f67bd2abab520b14600d9
SHA5126ebcc3352ed5804d7529ef348d1a84334a2a219bed8eb4c47d5fb1964f3697bad3044297bf6b80727d01210abbf435f354c98875a8ee81d072d999e9ff7cd626
-
Filesize
120KB
MD51a7dc327531171c4f9024b50c1bc3393
SHA1fff1629cd75f7580c999ecef18a4b2ca2f3d440c
SHA256b8129c18285bfcadfc65ce1021450392f1d5de7a018a1dc1cea105cca9ed5785
SHA512ffb6907aeabc8699b784a4386efae95d480dc8adee396eb1e8d7c068475b588c8ccdd4f184fb53f74fee63d5214a5d0102152f5b946e7f2eae3d2362ff0d7af5
-
Filesize
391KB
MD5754c516464f7218132797d7fb3ef272c
SHA1ddde27a8dcf5f72fbd11e2bfd019eaa9a97401bb
SHA256206f38ba6e470af57c752637e6dd7d3c3b71df7975c2db23230839308fd98c7a
SHA5124e6aee387383456fc37e02d045a3f772fd59220ff26659920c79c2ee7d9ca24db6d6d5844c1b5ea5f378b9a10ede6b60228b47ccadb0c7fa09897ed50162eac5
-
Filesize
281KB
MD55f98b9c7bf40bb668100c2de1c84fab4
SHA14f18614c05ebec811c458e6e0755a23a8f7c99f0
SHA2569f485be8d2aae95db5fb0d88502836577dbbdd79846dbeb3084a1eda61070e12
SHA51279ba8b77f1ccd43ccff1c078089826c94867ad11d8020f46cd4e2d09d9092373f75402aa28603f167c49f61e258dc1247bd477cc06c7552aa75d73eaec473ef9
-
Filesize
218KB
MD53157dffe8582e121213c77c1fce2e00d
SHA1ff15092f0b984cc8e65754a256fcfbbb32a8d1c0
SHA256bc43b405fe8ebaf05c6b6030839c439961f5bf6e37794036d7187df30ae2d1fa
SHA51260f67a449b97e20380bcbb8d6f918973f83568c87c97da7cde9a9ad7383d30fae4e55f377659a3d79eaa3b8d5dd72e04fb49f1ac7374e2c3f5f0a039812f6db1
-
Filesize
136KB
MD536e2b24284ebc0bec1006558e638f74d
SHA131488fc226aa3876bc4b53e8ae0f718ce5f8c884
SHA2564601b2795ca89f3514e3cda64e81be4da3547821036d2cb6982e4dc661326fd8
SHA51242c74df4293e9571a4b428dc899e5a0b1fa12897fba12407684cbab11fbd8d7cd5a5902464b21e144c61982f325cd49b265aac44229e0533ff9a8d316a59afd0
-
Filesize
227KB
MD52d059fc85ce4bedb2b9f7e6fa8c8a3f0
SHA14f6342666e27a7ce9f969bab98767b47f2a3a1cb
SHA256206da01adc11f620c8eaa9e1b236ecbe61df648a98ff2cf5a3a7b7bb646cf6c8
SHA51271787e38f0425086853109c7a532764e92a7b16627b1c4b3c406beba815f8a96ae1f001c364c68b2cd323c796137764489e39ac01f5e8e806f34d4d80b52bbd6
-
Filesize
8KB
MD54065152596df13bc2742eff8c5465731
SHA1306b5f9a0635a4130ccd43d804c4a249d168b339
SHA2566cd7df056293d98f1d6da31967edf720de4509c656e0526bc0de1be317df4952
SHA5126e97aea82f45d7a1012cca180955360dab70c4a19d3bcc85fa1b31fed3eb615c7b2e266fe8f465969559dd5e1d5462fa03cbf88ac0bcfd8daa17d9bf1657fe63
-
Filesize
93KB
MD57ba8806fc89eb3f503d468ea4fd16314
SHA108bd4835b33fd0c47871ca5cbf0b4d6081f82945
SHA2568615d473b09c24f925e9fe7c7c9484920e1dda43f97aeaf31e20649031cca315
SHA512c5fd0525d3b11b8191c57bc0b10a432e92556e0e87b3d764f03223ab7a7c5a30c8f5fa5ccb321eda2803f7ae68413ea568d8c41028a840eb58c4ab2809377176
-
Filesize
149KB
MD5190098fda9dbf34ef4b7c7030e32179c
SHA14bdd554a191e927c5d698ca8864fa451a946b5e9
SHA25635ff236fac5e6d36cda60b7a19a11e5399355349fa2c1de0bcf5e84098f4f45e
SHA5121e840da6905b935982e18c84d528627643648b5261a91d6c433871756d38f7960af8e566a1149e113b315f3603ae5499833df3b547d483c733ca93b37757b407
-
Filesize
92KB
MD58100710fa066300c017c54849e0d0edc
SHA19b78c1b587c9826c4a0decad1dbbe4a7af2bd6fe
SHA256ee321ae75ec742ef0dc4d1da0218bb862dee4e0adbc88cde6736819df36f8012
SHA5128f0c97d4c94154f4fc6a9acb673ee06aa2045bb79cbe7990454589a1340f6401050a1a2592c0111ec0220ae412465f96e3b5474f2010a915950dedb88ce3975d
-
Filesize
194KB
MD5d9bd6d8d5b5ac63dc3d3ebf4af0932be
SHA182e2db5bcdaa67e4fb81c5364b0fc09d102ec0ea
SHA256c8054520096cc7954760ab946fdecef45ec7078ef5f9d7c2b65747b632cb7f19
SHA5129ad37624996c779d05d0659e75c68c676d1438136a80875cb8d258cd7c7ed6a36618e6b18b2e1ce6a629e5e047f7ab09e5b4dc204839f09ebe905f884920bd37
-
Filesize
426KB
MD5c9e159eb7e25f5001eff2ba779fdac74
SHA19c22ea14d2659ed871b7769de664f43fb40379ae
SHA256cd359b98601c203500554c8915d4b8257e7361db1e93d19992b58dc93ced377c
SHA512a5ed213995d151bb56408357d46869574b86234f04bf5549ba73e46bccaa08d1e375b1905aa0d64e7ace502e54a5d38228246a55e2ec3b95343f7bc0837e663b
-
Filesize
1KB
MD577acf42084f56d89f06febd3a93480a8
SHA1911f6532dbbf508906e1f32d2db1120673e929c5
SHA256b278ad110bcd65a1d274923458be4caaa3c34f54451b451482a8d6e2c39e0404
SHA512b88259571039f3a0bbc2801947114fcd12f6f8b951d907c4d1d15030e70817ce837acb1380fa062ab1b2d8ec8f44d8abfc6405390a9759885d97bc5c35a5e1e3
-
Filesize
67KB
MD56b256131a8deacbdf723e3213681c1c1
SHA15c05d052aae835d5c1571c464027874d88e75eed
SHA256974597a71911ada7c575c483aca4f79a72d8d0dc3f982ff604da441eabf13983
SHA51287d23e4296f943f0545c7c880cd0953b000d71b76e10341501336f1b1ccbba031207779cc5506ef2db8d4bc03e338ac8cc6039448d6da8ce5bb79c9e68f59bbb
-
Filesize
23KB
MD594a5272ced0b0da94cfce881265e61fe
SHA13c14cb46c3f844280b36a0f7410481d09c3bb0f4
SHA256811ae6ff464b2e509760e576a377bfc8cc9433705a5025aacb5adb820cba6fd8
SHA5123be79d3879c5927e1a5efd9ce4abd1a956974e37efe29a316afa9cd91a99edb561881da83b545c9c3482a6f54ed6b1e7a6dce9a89c15290a28ebd9ee83b7de41
-
Filesize
263KB
MD5a84d9eabcf7b3cd0c49e880fb7963ff0
SHA16de88573ee9bfe34c5e1b4d61f46a0bbc8943baa
SHA256c84bf3e30254b5280271160895f4a3ab40dd08dbeedb229d2e947b5741dd8a37
SHA51217ab998a3e50e7a2a4ff256115cac87e2e091f78232e35258da4b0700a687c956257c09b407ced7e22bc8b2df89d7413218c6cf061d7bd9b8396db1714f3d691
-
Filesize
114KB
MD5b4757cc2b730efbc804384a2f915eebb
SHA18821c52afacae460c0f2cf0d4632e68086dc90dd
SHA2561aac9ef2d49508eb18b3ac091df00104aa521762a9ee587edd37c461d26f7de5
SHA5122b054ca5d7183dcff1de1eca5f7ca2167c42a2ac4a3baebc6d58e287ac5a2b9a622fb8f52f9ec8ee2b6e95948007713750a5131fe1b48c2403142e7369628819
-
Filesize
144KB
MD54061acf18041df27066d4753d3df5d4e
SHA1e186df687a1ecdd549f4a1f98fef5bcc7a79a491
SHA2562e8d64bc0b8778cd7d0449fd682ae1c46b9cec7edbb220602960f147ec88d25f
SHA512764e34364397a9f59afe6d330f41cb0026b94a4c3957708969b70b93bf744bf824b4678e6895fb9fd48a6815993be707262b0c35eb915a9af223db787d115ce9
-
Filesize
119KB
MD527aff254cb767ed0c0d1d2617c202630
SHA11d5574690b5cb776b0bd93664f94997bf2314b7f
SHA256710750abb6ba1617b7f4312176fe05f5096c9c7dc4ca53a35b3ba2faadd4dfe8
SHA5120d471fdabe714ed5b22203650aa2cd7afd013afebfc08c9510bad6153eec95fb8de970f3b6f7dc3a1d329cf3f51bacfe8c78334f2d8562707c43238f6bdd232f
-
Filesize
119KB
MD5e13212e18d57a9d7eed39cc63e8260f4
SHA1957e60c1b8dbfd36c36ba82fe24a976649a287aa
SHA25661950aee44e226cf7468f82981667f55b5cff190b80134100492605d15c24cab
SHA512ab0b421d9b63a9a03a0510fb96f7f6c909854aef52c59cb2f92d7ea1fefd003e225e51a893a398035b3bf35a0f36cd8666fa02df0ea3ed569969ee6009ec018a
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.Office.To#\135228e87b2c27d26b516ac0fc0ce667\Microsoft.Office.Tools.Word.v9.0.ni.dll
Filesize834KB
MD5c76656b09bb7df6bd2ac1a6177a0027c
SHA10c296994a249e8649b19be84dce27c9ddafef3e0
SHA256a0ae0aec5b203865fac761023741a59d274e2c41889aeb69140eb746d38f6ce0
SHA5128390879b8812fc98c17702a52259d510a7fe8bc3cf4972e89f705e93bc8fa98300c34d49f3aec869da8d9f786d33004742e4538019c0f852c61db89c302d5fdf
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.Office.To#\5766ec3721d18a48bec1ca1f60331e2d\Microsoft.Office.Tools.Common.v9.0.ni.dll
Filesize797KB
MD5aeb0b6e6c5d32d1ada231285ff2ae881
SHA11f04a1c059503896336406aed1dc93340e90b742
SHA2564c53ca542ac5ef9d822ef8cb3b0ecef3fb8b937d94c0a7b735bedb275c74a263
SHA512e55fd4c4d2966b3f0b6e88292fbd6c20ffa34766e076e763442c15212d19b6dea5d9dc9e7c359d999674a5b2c8a3849c2bbaaf83e7aa8c12715028b06b5a48e1
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.Office.To#\60214b09b490be856c4ee2b3398d71bd\Microsoft.Office.Tools.Outlook.v9.0.ni.dll
Filesize163KB
MD5e88828b5a35063aa16c68ffb8322215d
SHA18225660ba3a9f528cf6ac32038ae3e0ec98d2331
SHA25699facae4828c566c310a1ccf4059100067ab8bfb3d6e94e44dd9e189fd491142
SHA512e4d2f5a5aeaa29d4d3392588f15db0d514ca4c86c629f0986ee8dba61e34af5ca9e06b94479efd8dd154026ae0da276888a0214e167129db18316a17d9718a57
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.Office.To#\d7be05162f8d0fba8f4447db13f6695b\Microsoft.Office.Tools.Excel.v9.0.ni.dll
Filesize1.3MB
MD5006498313e139299a5383f0892c954b9
SHA17b3aa10930da9f29272154e2674b86876957ce3a
SHA256489fec79addba2de9141daa61062a05a95e96a196049ce414807bada572cc35c
SHA5126a15a10ae66ce0e5b18e060bb53c3108d09f6b07ee2c4a834856f0a35bec2453b32f891620e787731985719831302160678eb52acada102fdb0b87a14288d925
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.Office.To#\e1f8e4d08d4b7f811b7dbbacd324027b\Microsoft.Office.Tools.v9.0.ni.dll
Filesize148KB
MD5ac901cf97363425059a50d1398e3454b
SHA12f8bd4ac2237a7b7606cb77a3d3c58051793c5c7
SHA256f6c7aecb211d9aac911bf80c91e84a47a72ac52cbb523e34e9da6482c0b24c58
SHA5126a340b6d5fa8e214f2a58d8b691c749336df087fa75bcc8d8c46f708e4b4ff3d68a61a17d13ee62322b75cbc61d39f5a572588772f3c5d6e5ff32036e5bc5a00
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\03cad6bd8b37d21b28dcb4f955be2158\Microsoft.VisualStudio.Tools.Applications.Contract.v9.0.ni.dll
Filesize34KB
MD5c26b034a8d6ab845b41ed6e8a8d6001d
SHA13a55774cf22d3244d30f9eb5e26c0a6792a3e493
SHA256620b41f5e02df56c33919218bedc238ca7e76552c43da4f0f39a106835a4edc3
SHA512483424665c3bc79aeb1de6dfdd633c8526331c7b271b1ea6fe93ab298089e2aceefe7f9c7d0c6e33e604ca7b2ed62e7bb586147fecdf9a0eea60e8c03816f537
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\0503dc26dfc226b4ada28533cbd5a68a\Microsoft.VisualStudio.Tools.Office.HostAdapter.v10.0.ni.dll
Filesize143KB
MD5d635a1084b2bb3bc1fb85fbfa41207d5
SHA1531e5e0cf12c1b0f94ac66ae6a3753ed1bdbddbd
SHA2569f67fec307e56f624e87eeb72749c21e39a8a3b1bc4325ccaab5e9284495ad2b
SHA5127b248a13fe7f65e701fbc9d3cb7db31fbaa9542fdfb024a0d75d2b2c27990d104a39f80a5e95488e8494842823886f369d5620d4e362003433671e0a6969942f
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\0cb958acb9cd4cacb46ebc0396e30aa3\Microsoft.VisualStudio.Tools.Office.Contract.v9.0.ni.dll
Filesize109KB
MD50fd0f978e977a4122b64ae8f8541de54
SHA1153d3390416fdeba1b150816cbbf968e355dc64f
SHA256211d2b83bb82042385757f811d90c5ae0a281f3abb3bf1c7901e8559db479e60
SHA512ceddfc031bfe4fcf5093d0bbc5697b5fb0cd69b03bc32612325a82ea273dae5daff7e670b0d45816a33307b8b042d27669f5d5391cb2bdcf3e5a0c847c6dcaa8
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\181356b1bbb85fe2401c4dfad1a45133\Microsoft.VisualStudio.Tools.Office.Excel.AddInProxy.v9.0.ni.dll
Filesize158KB
MD5a763a9348ab4ee3bd593bb17d854e51b
SHA14d0c97ba6877e2f9ab32fe1316936a4f2e0ff2c9
SHA256b2f9dce9baca3e56fb3587ffe30ca38eb0f89ed30985b328a853778480c0f87b
SHA512e8d3896d4bd788d3ed923e0c9d3ba19fe9fc507060e2e5e8e410964f4c9d7331928324a79336079ccc84c050d8f0acfb03126a2e3622daac3846b0bfd028f602
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\2db2902ccf784a1e15e8281c1e38fd3f\Microsoft.VisualStudio.Tools.Office.Word.HostAdapter.v10.0.ni.dll
Filesize187KB
MD5e995ccbd175d2c6578d752a1ebc8db59
SHA15af345c83de8c2271c8e4d7cc1fc32d920dab423
SHA25612651cbf368720a281968b42b93a0236ca1dac7a0fe580924eed4463d2608bdf
SHA51250ecb3c913bf7285fd40b9e3b7353d75cb0bdbe7ed91e4881ac547baa2209a9c430f54c71c505b76bd4748a64ab758a597fc53f76246a465e092c75983d94479
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\367516b7878af19f5c84c67f2cd277ae\Microsoft.VisualStudio.Tools.Office.Word.AddInAdapter.v9.0.ni.dll
Filesize41KB
MD53c269caf88ccaf71660d8dc6c56f4873
SHA1f9481bf17e10fe1914644e1b590b82a0ecc2c5c4
SHA256de21619e70f9ef8ccbb274bcd0d9d2ace1bae0442dfefab45976671587cf0a48
SHA512bd5be3721bf5bd4001127e0381a0589033cb17aa35852f8f073ba9684af7d8c5a0f3ee29987b345fc15fdf28c5b56686087001ef41221a2cfb16498cf4c016c6
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\43ac81bed18b52d77a8011ada80939b5\Microsoft.VisualStudio.Tools.Office.AppInfoDocument.v9.0.ni.dll
Filesize296KB
MD57687295a6e19cc656b077e6a61629d4e
SHA1fa1025de5cffb56a3d1f8cae9d09b7171b33326e
SHA256ad8d210d001d3298ad4e1cbf08449b2cbd2b358d28cfad99db78639627a7cb86
SHA51219de95fd90bc6f091e785074ee71dc15d450d65fbdea933e26650fb9c747d81ae2fca7f5f83192f17451a49a314d264cabea2202c805b6ffab729d381675734c
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\48a294a6ff9cea6b26c38fc8b4f5e3e8\Microsoft.VisualStudio.Tools.Applications.Hosting.v10.0.ni.dll
Filesize356KB
MD587111e9d98dc79165dfc98a1fb93100b
SHA14f5182e5ce810f6ba3bdb3418ad33c916b6013c8
SHA256971188681028501d5ac8143b9127feb95d6982417590af42cf1a43483e38bd42
SHA512abbb246d620e8a2ab1973dde19ff56ea1c02afa39e889925fe2a1ba43af1ad4ff6eb017e68578ae520109b3e290b3d9054d7537eb2df0ede6e0fbca8519cc104
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\5c8b40c69a2293c8f499b38b25c41117\Microsoft.VisualStudio.Tools.Office.Word.AddInProxy.v9.0.ni.dll
Filesize157KB
MD57bdf8e0c9aa04b71a52dd964005f4363
SHA1a87e809146d3c70093a189c37f0a96b8bd0ce525
SHA2560406be7235661a62f68bff4c7640b4e241a0c392d548bf242ed08ba0eeaee66b
SHA5124983ebf42241723cf258407c7d2a0773f395c861741f4e98bd7ac86e1ef0a597f89263bb5a986b69ffd43836a5e49d8f03342736b4c3183ea0c58b8099af2051
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\5f2320d38621eb541713e6cd421c2b8a\Microsoft.VisualStudio.Tools.Applications.ServerDocument.v10.0.ni.dll
Filesize648KB
MD57ebbba07bc6d54efd912bcd78b560b7b
SHA1a6aee1a80ddcdf201301ac29293c62d58bcc941d
SHA256637dc357ff9011902186f2fd128ca74ac84fdb6d984f15036803b6a8fe28868a
SHA5122139a0d520ed70b72dc76fdd0555185386c9c22de1e1fb7eaac0607b313500c44f856c76ac6e2cd72148ea0b86b10bdd2b0ab7daacfc945cb66a637b8d99cfe8
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\8c6bac317f75b51647ea3a8da141b143\Microsoft.VisualStudio.Tools.Office.AddInAdapter.v9.0.ni.dll
Filesize210KB
MD54f40997b51420653706cb0958086cd2d
SHA10069b956d17ce7d782a0e054995317f2f621b502
SHA2568cd6a0b061b43e0b660b81859c910290a3672b00d7647ba0e86eda6ddcc8c553
SHA512e18953d7a348859855e5f6e279bc9924fc3707b57a733ce9b8f7d21bd631d419f1ebfb29202608192eb346569ca9a55264f5b4c2aedd474c22060734a68a4ee6
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\9248a710d7fe2485a557ce5d3cbcf2df\Microsoft.VisualStudio.Tools.Office.Runtime.v10.0.ni.dll
Filesize607KB
MD5e9ca062e4958cc25400c804029a5bf62
SHA11ed4374d0d0f568936fdebe17d9110481d6b3344
SHA256a09436c1df8fcd8ecd1732d6e4e68f32b092e71e0c5d3308b0f3f20abd03d4e0
SHA51243a9ea20d1e636201c0ce7098c198b893465b45f747ed2a002e8dd0bfc7739c28e166d259faf3a0087ae1fe59c74cc8e598f2b283cc7ebc345b6f3b5c388e520
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\9306fc630870a75ddd23441ad77bdc57\Microsoft.VisualStudio.Tools.Applications.Runtime.v10.0.ni.dll
Filesize53KB
MD5e3a7a2b65afd8ab8b154fdc7897595c3
SHA1b21eefd6e23231470b5cf0bd0d7363879a2ed228
SHA256e5faf5e8adf46a8246e6b5038409dadca46985a9951343a1936237d2c8d7a845
SHA5126537c7ed398deb23be1256445297cb7c8d7801bf6e163d918d8e258213708b28f7255ecff9fbd3431d8f5e5a746aa95a29d3a777b28fcd688777aed6d8205a33
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\a05ee2388c8a28fb3ac98ec65148e455\Microsoft.VisualStudio.Tools.Applications.AddInAdapter.v10.0.ni.dll
Filesize65KB
MD5da9f9a01a99bd98104b19a95eeef256c
SHA1272071d5bbc0c234bc2f63dfcd5a90f83079bbab
SHA256b06632dff444204f6e76b16198c31ab706ea52270d5e3ae81626dc1fc1fb1a4d
SHA512dcb3273e33b7df02461e81a4f65ae99c0a9ae98188a612ce6d605a058bd2dcb6ddb5b7c78abe1f0a955b7f0c07c323dbfd77a2b6a629a9c87e4ecc1c57e4d81d
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\afa5bb1a39443d7dc81dfff54073929b\Microsoft.VisualStudio.Tools.Office.Contract.v10.0.ni.dll
Filesize28KB
MD5aefc3f3c8e7499bad4d05284e8abd16c
SHA17ab718bde7fdb2d878d8725dc843cfeba44a71f7
SHA2564436550409cfb3d06b15dd0c3131e87e7002b0749c7c6e9dc3378c99dbec815d
SHA5121d7dbc9764855a9a1f945c1bc8e86406c0625f1381d71b3ea6924322fbe419d1c70c3f3efd57ee2cb2097bb9385e0bf54965ab789328a80eb4946849648fe20b
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\b4ab14212519ebbcf943af1487e2f962\Microsoft.VisualStudio.Tools.Office.Outlook.HostAdapter.v10.0.ni.dll
Filesize83KB
MD59bf8303fc3f37bd4614aba8770ceb830
SHA1620761512288839ce84aef424411565dbd99cf5d
SHA256e605aed2d90cc57d8e8d690bcc522baf46afa8891dc921fce226c86758403220
SHA5120da0bb167f09dd409f7c6e9a05d9d5fb92c020087eecf14d1615a6579ed04484e87ddbac0e2423d8c2d5ecdc8bfb2131e65628d30dfe5cb5dc75db5f1c1ecdae
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\b8e029b1434d965380b363483e376df0\Microsoft.VisualStudio.Tools.Applications.ServerDocument.v9.0.ni.dll
Filesize329KB
MD5eb09a7062a66a50fe2cb16c4a80561a7
SHA133b4c71ced7644be9802374a4f04c866394daaca
SHA256e94a4ad1ef9de2886a231e857c8691328c2e6e344cc9e82440e5c45b8a788256
SHA512c57a4c626c87032ca422df04ce7c3322662a9b0c6c06a46e93f08ca8f431295c9ae802cd79f53cae5de2b39a30bbeb756c966880e874ed44115cf511cc1ff920
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\bb63c81d306795319eaf7af25f67342a\Microsoft.VisualStudio.Tools.Office.ContainerControl.v10.0.ni.dll
Filesize141KB
MD558cacef7cbc000bb5ddeedc08a598f36
SHA1f8963d4ac1f7b72c2ee4a0a6d45b921f4f88bab7
SHA256124a0869df89ec2c9f0b307dd6b6d17e1e1e7ad638e0b4abf4483c15f842d270
SHA5129cf04e365abcdcfcb9c1f927da83a2dfe0791cccb80cd84ed63b03264d1e253060c455ed8664f35aee0a59e8c172f859ba49c67c9eec811a53e656c076c6bf66
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\bf3e8ba642eaf9a5371982f211550c52\Microsoft.VisualStudio.Tools.Applications.Hosting.v9.0.ni.dll
Filesize278KB
MD5d74d434aa70ce827715b5e0ac7eda5be
SHA1b53f3374be4c96af51c78fd873de1360f17c200f
SHA25654701cbe719b08b2393b9f4a604c372f9a280b5d3dd520b563d2aea7d69a1496
SHA512631d09a0ff39ece829f5c23278c2c030e5ff758b285128edb7805682de75b5be1aedd914d2325f79ec98d0103660a39ae1f1a5782f5dad038b143f3774c098df
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\d65a332484d5e6f9dfc625b3a3a6d668\Microsoft.VisualStudio.Tools.Office.Excel.HostAdapter.v10.0.ni.dll
Filesize180KB
MD5cd08f54589a07dd3cd306db76921597e
SHA10abf0a8b182df3a54ee9d96fb8d84ee06131b0c2
SHA25648ff64cc35648593eccc7d220a47102941d2607175bece03f260783a843d0e23
SHA51211511508441098b5c982f47cec39e06f10c65fb17b606559bd358e6dc4ed401481c07afd09c92b57172a5a6754be60b7298ad79d6dcb44ea6e67bf3564e28398
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\de06a98a598aa0ff716a25b24d56ad7f\Microsoft.VisualStudio.Tools.Applications.Contract.v10.0.ni.dll
Filesize27KB
MD59c60454398ce4bce7a52cbda4a45d364
SHA1da1e5de264a6f6051b332f8f32fa876d297bf620
SHA256edc90887d38c87282f49adbb12a94040f9ac86058bfae15063aaaff2672b54e1
SHA512533b7e9c55102b248f4a7560955734b4156eb4c02539c6f978aeacecff1ff182ba0f04a07d32ed90707a62d73191b0e2d2649f38ae1c3e7a5a4c0fbea9a94300
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\e0220058091b941725ef02be0b84abe7\Microsoft.VisualStudio.Tools.Applications.HostAdapter.v10.0.ni.dll
Filesize57KB
MD56eaaa1f987d6e1d81badf8665c55a341
SHA1e52db4ad92903ca03a5a54fdb66e2e6fad59efd5
SHA2564b78ffa5f0b6751aea11917db5961d566e2f59beaa054b41473d331fd392329e
SHA512dbedfa6c569670c22d34d923e22b7dae7332b932b809082dad87a1f0bb125c912db37964b5881667867ccf23dc5e5be596aad85485746f8151ce1c51ffd097b2
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\ee73646032cbb022d16771203727e3b2\Microsoft.VisualStudio.Tools.Applications.Runtime.v9.0.ni.dll
Filesize130KB
MD52735d2ab103beb0f7c1fbd6971838274
SHA16063646bc072546798bf8bf347425834f2bfad71
SHA256f00156860ec7e88f4ccb459ca29b7e0e5c169cdc8a081cb043603187d25d92b3
SHA512fe2ce60c7f61760a29344e254771d48995e983e158da0725818f37441f9690bda46545bf10c84b163f6afb163ffb504913d6ffddf84f72b062c7f233aed896de
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\f1a7ac664667f2d6bcd6c388b230c22b\Microsoft.VisualStudio.Tools.Applications.AddInAdapter.v9.0.ni.dll
Filesize59KB
MD58c69bbdfbc8cc3fa3fa5edcd79901e94
SHA1b8028f0f557692221d5c0160ec6ce414b2bdf19b
SHA256a21471690e7c32c80049e17c13624820e77bca6c9c38b83d9ea8a7248086660d
SHA512825f5b87b76303b62fc16a96b108fb1774c2aca52ac5e44cd0ac2fe2ee47d5d67947dfe7498e36bc849773f608ec5824711f8c36e375a378582eefb57c9c2557
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\fc36797f7054935a6033077612905a0f\Microsoft.VisualStudio.Tools.Office.Excel.AddInAdapter.v9.0.ni.dll
Filesize42KB
MD571d4273e5b77cf01239a5d4f29e064fc
SHA1e8876dea4e4c4c099e27234742016be3c80d8b62
SHA256f019899f829731f899a99885fd52fde1fe4a4f6fe3ecf7f7a7cfa78517c00575
SHA51241fe67cda988c53bd087df6296d1a242cddac688718ea5a5884a72b43e9638538e64d7a59e045c0b4d490496d884cf0ec694ddf7fcb41ae3b8cbc65b7686b180
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\ehiVidCtl\88e20c69254157d91b96eadc9444815d\ehiVidCtl.ni.dll
Filesize855KB
MD57812b0a90d92b4812d4063b89a970c58
SHA13c4a789b8d28a5bfa6a6191624e33b8f40e4c4ea
SHA256897626e6af00e85e627eeaa7f9563b245335242bc6196b36d0072e5b6d45e543
SHA512634a2395bada9227b1957f2b76ed7e19f12bfc4d71a145d182602a1b6e24d83e220ebfabd602b1995c360e1725a38a89ff58417b0295bb0da9ea35c41c21a6ed
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\stdole\2c6d60b55bbab22515c512080d4b3bae\stdole.ni.dll
Filesize43KB
MD53e72bdd0663c5b2bcd530f74139c83e3
SHA166069bcac0207512b9e07320f4fa5934650677d2
SHA2566a6ac3094130d1affd34aae5ba2bd8c889e2071eb4217a75d72b5560f884e357
SHA512b0a98db477fccae71b4ebfb8525ed52c10f1e7542f955b307f260e27e0758aa22896683302e34b0237e7e3bba9f5193ddcc7ff255c71fbaa1386988b0ec7d626
-
Filesize
372KB
MD58313937680ec5d98b74f5bd894170c61
SHA188c166496ba889eae80b41874f512a30b6198ca5
SHA256d3ec0b0fbf2bb536a5c6c797482574964a1574c4ca36ed9eafbc41d92c363929
SHA512fc13e0268f945d5030b458314b3412bf2207e2c86968e03296e06e80df8c58f484fa73b335280cf3285cbe413d9a75f039feef9e0e31c605839f802aa52dd965
-
Filesize
85KB
MD58e9b8a38acbc17f3ff4e96d223105ac4
SHA1f9ffabbc03ade74ee5ff77fe3a83b6f34414ad93
SHA25687d03b97ee139688bef5e3ef573a44ab210fb0211132109ad8e5f4d7eaecd7ff
SHA512ebffff07bf99657e3300de434fb0f402a6044222643a0797517170a2fd9d1d18027b3404eb39ecde9927c9e4b345958e736571b4c85ce1c82ca79d6a46756107
-
Filesize
48KB
MD56f43d4ac689db5ccde1a4703f6c9525f
SHA1ac45ffca6ec295730365808cd126d213fb8145b3
SHA2563971543e4a3f834c15815d7eb9b5a1a56caa1b83ba33a458898c21e53080b8ad
SHA512341881ce3d51a14ab9afb8f295530455c70f9061facc9746f184074e2c1b353dede1fe996076f5a3933f777a06abf64242deeaf591a242e0ad5742faf826d75b
-
Filesize
177KB
MD58226a734025bfe3c31be91517244b676
SHA18bf653e2a8041beffc33bba2026b8e92aef60b8c
SHA25663e0940cb8486225ded9c788fda94342d58c7e765d6732b12ba098b6fad0d010
SHA51249dc9dfb42acb777ade2d8e78ccb30fda4b62f8505a7df2acef254c510b345a2bb3a8fb865418029874253941f4410e903219d5ec34cac85500cebbbf10eeb0f
-
Filesize
73KB
MD5def6153b0e67b5755c066294a79a9934
SHA11b1f725df1bcb8e415f39d5f124dbc0ec1ced257
SHA256d8b4847ead8d6e308e1daeca90300031376d57c09ee1c208054a5c25e86549ad
SHA512478dff0fbd5402cc2aa76b7b9067e4c736d616d40ed7f77e94bfaf44a503a5828a54fc1efc3509616e9e4b0868f891b60960e5ef9816c9dbaef566d2318dfff9
-
Filesize
63KB
MD5e5dc6dde51d44921fb0f5be4e60ba46b
SHA12ff0f667807f3853a487068862b5f066c3c0c3ea
SHA2568351e1ea8cf4cf1d184b6a7427b0b8ae7b03315bab51fb284e1996080d892177
SHA5128f4cff657c5a97c3b492a30fdaf801bf5499b7587198dc3a9923c707118839e2ca0e1fbebfaeca4ba0d5617de25c7da33b6054cd7b9c4f4e41bcaa8f6445d49a
-
Filesize
763KB
MD51012275d45dcda2492c3f97f475d92f5
SHA1b32d45d9fea8a2c4e7cbc767ecbe0f4b00b53d32
SHA25688b5b816c75fd64d0da711515944a1384d5f7c23276b06081528f92008633280
SHA51209d4798158b5bd9cd03b55464f8e974e44dc8529fe70f2a5bfba07f82f23a6d4010c03a6f958ab5afee0a3c7c627042d1bc6cf59b54ab4c4a7d7a9b0816a78ca
-
Filesize
363KB
MD507c240fb6b4329a7a7c9f9e6bbeaf40c
SHA1186724afdeaca68777e70d50bbcc64175f4f26b5
SHA256ef5f1a398ef5942d4e2916a16b2a7d7ac07d4694a7e644cc38a60f87c16815d1
SHA5120b64ce679624fd8903fa674a086977191303a56bb8ae5fafb1ff27e8b445a055b5f329e952df8c30630598c55d85e87629f473d1b881582f159a25fd9f71baec
-
Filesize
47KB
MD5cd0700792cce28828b0880b886b34bc1
SHA1dac1f05d5584a933a6ef433aebd3d12d43881c91
SHA2563a4d022f2af452c9fa3b9968419e19e9dec23c8239203db5f0be34d19d3d238a
SHA5122126641d32dfc5548e7d4c09b87304635de3f4d8064d98b80287191e013797f32810e7335781e2df23b62fb02010f0e05fb7aca98acce42ad0a8392b66dfead3
-
Filesize
925KB
MD59128d38c4a61f8da879fae87dc07e129
SHA12c73a3ce98473ff9b4143568c0ad9e5308eeeeaf
SHA256f9365ce8de59d82d8633ca58663eb8bee40683c8568397d4f7750a2aeae27117
SHA51246421a3e478bb76c60de16db62911314cdf7b8559e65d89be8543b5ab76c30e028886eeed6c27a932b49a08fe49b467f9e1f7c7087b42a9039958ce4b776dcab
-
Filesize
33KB
MD56cab47cde59d06a8bd8e9fc1bf9cebe4
SHA13c5bbbf8337d047d929204112d12379a76543a5b
SHA256ef50e88067064301ee3e1ea1ff0ef529244f763adeaeb7183c6de182a85df365
SHA512bee63c4063c70f0688c6e767134efddbc68898fc3db24d944c70d4f6df6675384a9f43a2fb9dfc0d10bdcf2fbde2797a0d1cfa03c770eaf3dd0bfbcf1223f6bb
-
Filesize
77KB
MD593358fc8ed87a32a7a3820b15bd5dcab
SHA166f2ed9f36944074d342a103fff2f13a5ed8eede
SHA256f5c674088000c862a03ef2c9bf3457c75318e30ae8cee42c6bca0308cecfe7c0
SHA512b11cd05a0e2c64378a7d88ffe0c7377baa47b40e1fb9e762d6423f830e17167e56583e9249f0598766b46df46504000036731f45ceb892350d321d98795b6738
-
Filesize
172KB
MD555b6a91fbc1486bec6c089f55c93a2dc
SHA16263eaa7ac6f752bf412ddfe2b393a28d8ae30fb
SHA2564e166797387eb19c965a6beef154ae461eea295ddbad827b5bd2d7e47dc90190
SHA512c23797980c597da62e550d1ba4201ccb020bab4fa11b732e38221ee69264c516d8167e0e06a73871bd5187ac324e44e9f3c5dfa7b85beea319cebcce76708e5c
-
Filesize
194KB
MD58c17b80691594131d64e478d8d8bfd90
SHA11a6f8b49b14839f07ee8d0ff5482545b16bce34b
SHA25689a4db158aa03b87edca652f735713b0515529e62936cd4790f46b32e53e5ddb
SHA512ceec76ad8420348c1ba897e461576cf34466989c3a3a0a55873ba10fbaacf5ac6f7663b5d5f271f6deec487683a40030b58372580a6940730c75e7efefacf55b
-
Filesize
15KB
MD52cc60f15ae13311156154b5a156783e3
SHA1aeff8beee0c622ed370e54eeced0fe23bca7dc32
SHA256e98f4045ba5bf437d98647fa4686c52325c6b5e6cc469767ca9059b306373bb5
SHA512d795a7a731ce8127e39faf5c9f7c7986ca215953ce44f22392a0de946daaca567f23ca1523f40adc40cebe3f41010ce085048a59436928b60d7095194d5ffea9
-
Filesize
136KB
MD542013b138e6edacaa96e38bf74f0a25a
SHA1ad79765fc065d04ddd88921badd385fb9d3d28ef
SHA2560ddb54287c39d84c4964d0f0e8d630fd701e76d106d06d7841b3f94178885a73
SHA51212577c4f5e20ae5d4d477a88c528384382e7e626632d6a0295ed3ddc29f62e3a4c7315601f13dd6c8cd06a028a7413fe348cfc8412350e568974ed4eac8b5878
-
Filesize
7KB
MD5981e148485dee2a1063827edf56c0938
SHA11e475dc8933fe86be305bf8809d99a2b4beaf1ed
SHA256838374f5cd446de41e5bd9062cde31f95120750a391db31d587bbcf0265c8045
SHA512b8b16ccabdf0f1fd09f7ca9372c5bef1e31444cd9bd04a514ba340002afbf7a3a456e99b91194596fbe956e4280590f5b9dacd3484e0d72af40687abd99a5b1d
-
Filesize
96KB
MD57f187c8bdcad23fec1a0873b92f331ac
SHA12f190671555e421e83ed2faed6edb6c5dc9a9f5b
SHA2565bca3954090fc9ccf3168606e9b2e31ffb33ccf22ff358bb5ab56db1ac234696
SHA512a5e4b08ccd7b9dfe4544264551a272a4a15efc6a9fe18b95c4cc078b8b15b35261e89b243ffce09bec0c1e94550b972214dd7e56d9ccd09307349029fa5ea5e7
-
Filesize
383KB
MD5c9e994671c1d433c00da0c18e445b94c
SHA14e7f4815efe9fc9d5fc1701bb5260e0a8af250e2
SHA256255a337ac91b31e549384a8c09f1cafa12689f5d3922e44f905cb279a2eccf56
SHA512bbe3170d3ebbf86aabbbe03320ee8fcb933c9bd4dca8c88232e70d29b346bca46b50bd8fa655ff75a4655f93877b36bd3f51f9de952a65ffbe145f7e15498c7c
-
Filesize
60KB
MD526518ce8c04522cd07a3ab177a94bc41
SHA1f98fe00108696fc368c2e058ed689f692986f016
SHA2561667697f47e8524bc7f2ae1a64f7d0f296a93d24f707711260e93b713c1bc20c
SHA5120ccd831942abf56ecaa1b0bd038d9938a1bc98ca67b395cf0ed5832b3cb6b0073d54f63cfb0fecd221d9494b10f8d4fb29b1006a15e3fbacd19846b1bbac8ff8