Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
152s -
max time network
161s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
28/01/2024, 15:32
Static task
static1
Behavioral task
behavioral1
Sample
318b21423daa09cf973520c78d7c770d04817302bfd8b1f79393f7f42904970a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
318b21423daa09cf973520c78d7c770d04817302bfd8b1f79393f7f42904970a.exe
Resource
win10v2004-20231215-en
General
-
Target
318b21423daa09cf973520c78d7c770d04817302bfd8b1f79393f7f42904970a.exe
-
Size
1.8MB
-
MD5
5c0701e1e660047d8e45b074994b751a
-
SHA1
b981d2c77bf530c4b79051d577d6927d7ece3840
-
SHA256
318b21423daa09cf973520c78d7c770d04817302bfd8b1f79393f7f42904970a
-
SHA512
4c877dd1c32f58b6907f4a7cd4466ed7e885987936f2f8f8cefefed91a4773912e470d2f5999aff2f785b34c49d4c18444c682e390c8d78504f5a0e37fddf3eb
-
SSDEEP
49152:kKJ0WR7AFPyyiSruXKpk3WFDL9zxnSu/snji6attJM:kKlBAFPydSS6W6X9lnpEnW6at
Malware Config
Signatures
-
Executes dropped EXE 63 IoCs
pid Process 468 Process not Found 2600 alg.exe 1940 aspnet_state.exe 2312 mscorsvw.exe 2376 mscorsvw.exe 1868 elevation_service.exe 288 GROOVE.EXE 1812 maintenanceservice.exe 2292 OSE.EXE 2208 mscorsvw.exe 1684 OSPPSVC.EXE 2816 mscorsvw.exe 2576 mscorsvw.exe 1360 mscorsvw.exe 3040 mscorsvw.exe 1536 mscorsvw.exe 552 mscorsvw.exe 2716 mscorsvw.exe 2624 mscorsvw.exe 1048 mscorsvw.exe 1496 mscorsvw.exe 2532 mscorsvw.exe 832 mscorsvw.exe 1432 mscorsvw.exe 2940 mscorsvw.exe 2232 mscorsvw.exe 2756 mscorsvw.exe 2400 mscorsvw.exe 268 mscorsvw.exe 1748 mscorsvw.exe 296 mscorsvw.exe 2668 mscorsvw.exe 1572 mscorsvw.exe 2004 mscorsvw.exe 1724 mscorsvw.exe 1152 mscorsvw.exe 1196 mscorsvw.exe 2132 mscorsvw.exe 2328 mscorsvw.exe 2964 mscorsvw.exe 1676 mscorsvw.exe 1364 mscorsvw.exe 2544 mscorsvw.exe 2804 mscorsvw.exe 2456 mscorsvw.exe 364 mscorsvw.exe 2888 mscorsvw.exe 1760 mscorsvw.exe 1756 mscorsvw.exe 1712 mscorsvw.exe 840 mscorsvw.exe 2716 mscorsvw.exe 2620 mscorsvw.exe 2016 mscorsvw.exe 568 mscorsvw.exe 1528 mscorsvw.exe 1632 mscorsvw.exe 2684 mscorsvw.exe 1340 mscorsvw.exe 2416 mscorsvw.exe 2880 mscorsvw.exe 2656 mscorsvw.exe 2124 mscorsvw.exe -
Loads dropped DLL 25 IoCs
pid Process 468 Process not Found 2964 mscorsvw.exe 2964 mscorsvw.exe 1364 mscorsvw.exe 1364 mscorsvw.exe 2804 mscorsvw.exe 2804 mscorsvw.exe 364 mscorsvw.exe 364 mscorsvw.exe 1760 mscorsvw.exe 1760 mscorsvw.exe 1712 mscorsvw.exe 1712 mscorsvw.exe 2716 mscorsvw.exe 2716 mscorsvw.exe 2016 mscorsvw.exe 2016 mscorsvw.exe 1528 mscorsvw.exe 1528 mscorsvw.exe 2684 mscorsvw.exe 2684 mscorsvw.exe 2416 mscorsvw.exe 2416 mscorsvw.exe 2656 mscorsvw.exe 2656 mscorsvw.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\System32\alg.exe 318b21423daa09cf973520c78d7c770d04817302bfd8b1f79393f7f42904970a.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Roaming\eacb05e53f41c52b.bin alg.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat GROOVE.EXE -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jre7\bin\javaws.exe alg.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe mscorsvw.exe File created C:\Program Files (x86)\Google\Temp\GUM5F11.tmp\goopdateres_is.dll 318b21423daa09cf973520c78d7c770d04817302bfd8b1f79393f7f42904970a.exe File created C:\Program Files (x86)\Google\Temp\GUM5F11.tmp\goopdateres_lv.dll 318b21423daa09cf973520c78d7c770d04817302bfd8b1f79393f7f42904970a.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Updater6\AdobeUpdaterInstallMgr.exe mscorsvw.exe File opened for modification C:\Program Files (x86)\Internet Explorer\ExtExport.exe mscorsvw.exe File created C:\Program Files (x86)\Google\Temp\GUM5F11.tmp\psuser.dll 318b21423daa09cf973520c78d7c770d04817302bfd8b1f79393f7f42904970a.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\rmiregistry.exe alg.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\orbd.exe mscorsvw.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\klist.exe mscorsvw.exe File created C:\Program Files (x86)\Google\Temp\GUM5F11.tmp\goopdateres_et.dll 318b21423daa09cf973520c78d7c770d04817302bfd8b1f79393f7f42904970a.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc-cache-gen.exe mscorsvw.exe File created C:\Program Files (x86)\Google\Temp\GUM5F11.tmp\goopdateres_zh-CN.dll 318b21423daa09cf973520c78d7c770d04817302bfd8b1f79393f7f42904970a.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome_proxy.exe mscorsvw.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Eula.exe mscorsvw.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\{AC76BA86-7AD7-1033-7B44-A90000000001}\Setup.exe mscorsvw.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\keytool.exe alg.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\MSOXMLED.EXE alg.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\kinit.exe alg.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\DW\DW20.EXE mscorsvw.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\orbd.exe mscorsvw.exe File opened for modification C:\Program Files\Mozilla Firefox\maintenanceservice.exe mscorsvw.exe File created C:\Program Files (x86)\Google\Temp\GUM5F11.tmp\goopdateres_fil.dll 318b21423daa09cf973520c78d7c770d04817302bfd8b1f79393f7f42904970a.exe File opened for modification C:\Program Files\Java\jre7\bin\javaw.exe alg.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroBroker.exe alg.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\policytool.exe mscorsvw.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\kinit.exe alg.exe File opened for modification C:\Program Files\Internet Explorer\iexplore.exe mscorsvw.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\lib\nbexec.exe mscorsvw.exe File created C:\Program Files (x86)\Google\Temp\GUM5F11.tmp\goopdateres_en.dll 318b21423daa09cf973520c78d7c770d04817302bfd8b1f79393f7f42904970a.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\ktab.exe alg.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\tnameserv.exe alg.exe File created C:\Program Files (x86)\Google\Temp\GUM5F11.tmp\goopdateres_no.dll 318b21423daa09cf973520c78d7c770d04817302bfd8b1f79393f7f42904970a.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe alg.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\policytool.exe alg.exe File created C:\Program Files (x86)\Google\Temp\GUM5F11.tmp\goopdateres_ro.dll 318b21423daa09cf973520c78d7c770d04817302bfd8b1f79393f7f42904970a.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\A3DUtility.exe alg.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jcmd.exe alg.exe File opened for modification C:\Program Files\Java\jre7\bin\java.exe alg.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\TabTip32.exe mscorsvw.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VSTO\10.0\VSTOInstaller.exe mscorsvw.exe File created C:\Program Files (x86)\Google\Temp\GUM5F11.tmp\goopdateres_ja.dll 318b21423daa09cf973520c78d7c770d04817302bfd8b1f79393f7f42904970a.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\jp2launcher.exe alg.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Setup.exe alg.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\java.exe mscorsvw.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateBroker.exe alg.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\javaw.exe mscorsvw.exe File opened for modification C:\Program Files\Java\jre7\bin\rmiregistry.exe mscorsvw.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleCrashHandler.exe mscorsvw.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jstack.exe mscorsvw.exe File created C:\Program Files (x86)\Google\Temp\GUM5F11.tmp\psuser_64.dll 318b21423daa09cf973520c78d7c770d04817302bfd8b1f79393f7f42904970a.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\java.exe alg.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javafxpackager.exe alg.exe File opened for modification C:\Program Files\Java\jre7\bin\orbd.exe alg.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\notification_helper.exe alg.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\unpack200.exe alg.exe File opened for modification C:\Program Files\Java\jre7\bin\java-rmi.exe mscorsvw.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\pipanel.exe mscorsvw.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\serialver.exe mscorsvw.exe File opened for modification C:\Program Files\Java\jre7\bin\pack200.exe mscorsvw.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\LICLUA.EXE mscorsvw.exe File opened for modification C:\Program Files (x86)\Internet Explorer\ieinstal.exe mscorsvw.exe File opened for modification C:\Program Files (x86)\Internet Explorer\ieinstal.exe alg.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\notification_helper.exe mscorsvw.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File created C:\Windows\assembly\ngenlock.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\Temp\ZAP389D.tmp\Microsoft.VisualStudio.Tools.Office.AddInAdapter.v9.0.dll mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index147.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index14c.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\index144.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index148.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index148.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index14b.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index14a.dat mscorsvw.exe File created C:\Windows\assembly\ngenlock.dat mscorsvw.exe File created C:\Windows\assembly\GACLock.dat mscorsvw.exe File created C:\Windows\assembly\GACLock.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index142.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index143.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index149.dat mscorsvw.exe File created C:\Windows\assembly\ngenlock.dat mscorsvw.exe File created C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngenrootstorelock.dat mscorsvw.exe File created C:\Windows\Microsoft.NET\ngenservice_pri1_lock.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index14b.dat mscorsvw.exe File created C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngenofflinequeuelock.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index144.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index145.dat mscorsvw.exe File created C:\Windows\assembly\ngenlock.dat mscorsvw.exe File created C:\Windows\assembly\ngenlock.dat mscorsvw.exe File created C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngenservicelock.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\index149.dat mscorsvw.exe File created C:\Windows\assembly\GACLock.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index147.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index145.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index149.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index14b.dat mscorsvw.exe File created C:\Windows\assembly\GACLock.dat mscorsvw.exe File created C:\Windows\Microsoft.NET\ngenservice_pri3_lock.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index14a.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index147.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index14e.dat mscorsvw.exe File created C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngenrootstorelock.dat mscorsvw.exe File created C:\Windows\Microsoft.NET\ngennicupdatelock.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\index145.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\Temp\ZAP68A2.tmp\Microsoft.VisualStudio.Tools.Applications.Runtime.v9.0.dll mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\Temp\ZAP7E44.tmp\Microsoft.VisualStudio.Tools.Office.Contract.v10.0.dll mscorsvw.exe File created C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngenservicelock.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index145.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index143.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\index146.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\Temp\ZAP5773.tmp\Microsoft.VisualStudio.Tools.Applications.Runtime.v10.0.dll mscorsvw.exe File created C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngenofflinequeuelock.dat mscorsvw.exe File created C:\Windows\Microsoft.NET\ngennicupdatelock.dat mscorsvw.exe File created C:\Windows\assembly\ngenlock.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\Temp\ZAP88BF.tmp\Microsoft.VisualStudio.Tools.Office.Contract.v9.0.dll mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index14f.dat mscorsvw.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index144.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index149.dat mscorsvw.exe File created C:\Windows\assembly\ngenlock.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index14d.dat mscorsvw.exe File created C:\Windows\Microsoft.NET\ngenservice_pri1_lock.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\Temp\ZAP4E8D.tmp\Microsoft.Office.Tools.v9.0.dll mscorsvw.exe File created C:\Windows\assembly\ngenlock.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\index14c.dat mscorsvw.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen_service.log mscorsvw.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen_service.log mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index144.dat mscorsvw.exe File created C:\Windows\assembly\ngenlock.dat mscorsvw.exe -
Modifies data under HKEY_USERS 3 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings GROOVE.EXE Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\OfficeSoftwareProtectionPlatform OSPPSVC.EXE Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\OfficeSoftwareProtectionPlatform\VLRenewalSchedule = 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 OSPPSVC.EXE -
Suspicious use of AdjustPrivilegeToken 63 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 2864 318b21423daa09cf973520c78d7c770d04817302bfd8b1f79393f7f42904970a.exe Token: SeShutdownPrivilege 2312 mscorsvw.exe Token: SeShutdownPrivilege 2376 mscorsvw.exe Token: SeShutdownPrivilege 2312 mscorsvw.exe Token: SeShutdownPrivilege 2376 mscorsvw.exe Token: SeShutdownPrivilege 2312 mscorsvw.exe Token: SeShutdownPrivilege 2376 mscorsvw.exe Token: SeShutdownPrivilege 2312 mscorsvw.exe Token: SeShutdownPrivilege 2376 mscorsvw.exe Token: SeShutdownPrivilege 2376 mscorsvw.exe Token: SeDebugPrivilege 2600 alg.exe Token: SeShutdownPrivilege 2312 mscorsvw.exe Token: SeShutdownPrivilege 2376 mscorsvw.exe Token: SeShutdownPrivilege 2376 mscorsvw.exe Token: SeShutdownPrivilege 2376 mscorsvw.exe Token: SeShutdownPrivilege 2376 mscorsvw.exe Token: SeShutdownPrivilege 2376 mscorsvw.exe Token: SeShutdownPrivilege 2376 mscorsvw.exe Token: SeShutdownPrivilege 2376 mscorsvw.exe Token: SeShutdownPrivilege 2376 mscorsvw.exe Token: SeShutdownPrivilege 2376 mscorsvw.exe Token: SeShutdownPrivilege 2376 mscorsvw.exe Token: SeShutdownPrivilege 2376 mscorsvw.exe Token: SeDebugPrivilege 2312 mscorsvw.exe Token: SeShutdownPrivilege 2376 mscorsvw.exe Token: SeShutdownPrivilege 2376 mscorsvw.exe Token: SeShutdownPrivilege 2376 mscorsvw.exe Token: SeShutdownPrivilege 2376 mscorsvw.exe Token: SeShutdownPrivilege 2376 mscorsvw.exe Token: SeShutdownPrivilege 2376 mscorsvw.exe Token: SeShutdownPrivilege 2376 mscorsvw.exe Token: SeShutdownPrivilege 2376 mscorsvw.exe Token: SeShutdownPrivilege 2376 mscorsvw.exe Token: SeShutdownPrivilege 2376 mscorsvw.exe Token: SeShutdownPrivilege 2376 mscorsvw.exe Token: SeShutdownPrivilege 2376 mscorsvw.exe Token: SeShutdownPrivilege 2376 mscorsvw.exe Token: SeShutdownPrivilege 2376 mscorsvw.exe Token: SeShutdownPrivilege 2376 mscorsvw.exe Token: SeShutdownPrivilege 2376 mscorsvw.exe Token: SeShutdownPrivilege 2376 mscorsvw.exe Token: SeShutdownPrivilege 2376 mscorsvw.exe Token: SeShutdownPrivilege 2376 mscorsvw.exe Token: SeShutdownPrivilege 2376 mscorsvw.exe Token: SeShutdownPrivilege 2376 mscorsvw.exe Token: SeShutdownPrivilege 2376 mscorsvw.exe Token: SeShutdownPrivilege 2376 mscorsvw.exe Token: SeShutdownPrivilege 2376 mscorsvw.exe Token: SeShutdownPrivilege 2376 mscorsvw.exe Token: SeShutdownPrivilege 2376 mscorsvw.exe Token: SeShutdownPrivilege 2376 mscorsvw.exe Token: SeShutdownPrivilege 2376 mscorsvw.exe Token: SeShutdownPrivilege 2376 mscorsvw.exe Token: SeShutdownPrivilege 2376 mscorsvw.exe Token: SeShutdownPrivilege 2376 mscorsvw.exe Token: SeShutdownPrivilege 2376 mscorsvw.exe Token: SeShutdownPrivilege 2312 mscorsvw.exe Token: SeShutdownPrivilege 2376 mscorsvw.exe Token: SeShutdownPrivilege 2376 mscorsvw.exe Token: SeShutdownPrivilege 2376 mscorsvw.exe Token: SeShutdownPrivilege 2376 mscorsvw.exe Token: SeShutdownPrivilege 2376 mscorsvw.exe Token: SeShutdownPrivilege 2376 mscorsvw.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2376 wrote to memory of 2208 2376 mscorsvw.exe 36 PID 2376 wrote to memory of 2208 2376 mscorsvw.exe 36 PID 2376 wrote to memory of 2208 2376 mscorsvw.exe 36 PID 2376 wrote to memory of 2816 2376 mscorsvw.exe 38 PID 2376 wrote to memory of 2816 2376 mscorsvw.exe 38 PID 2376 wrote to memory of 2816 2376 mscorsvw.exe 38 PID 2312 wrote to memory of 2576 2312 mscorsvw.exe 39 PID 2312 wrote to memory of 2576 2312 mscorsvw.exe 39 PID 2312 wrote to memory of 2576 2312 mscorsvw.exe 39 PID 2312 wrote to memory of 2576 2312 mscorsvw.exe 39 PID 2312 wrote to memory of 1360 2312 mscorsvw.exe 40 PID 2312 wrote to memory of 1360 2312 mscorsvw.exe 40 PID 2312 wrote to memory of 1360 2312 mscorsvw.exe 40 PID 2312 wrote to memory of 1360 2312 mscorsvw.exe 40 PID 2312 wrote to memory of 3040 2312 mscorsvw.exe 42 PID 2312 wrote to memory of 3040 2312 mscorsvw.exe 42 PID 2312 wrote to memory of 3040 2312 mscorsvw.exe 42 PID 2312 wrote to memory of 3040 2312 mscorsvw.exe 42 PID 2312 wrote to memory of 1536 2312 mscorsvw.exe 44 PID 2312 wrote to memory of 1536 2312 mscorsvw.exe 44 PID 2312 wrote to memory of 1536 2312 mscorsvw.exe 44 PID 2312 wrote to memory of 1536 2312 mscorsvw.exe 44 PID 2312 wrote to memory of 552 2312 mscorsvw.exe 45 PID 2312 wrote to memory of 552 2312 mscorsvw.exe 45 PID 2312 wrote to memory of 552 2312 mscorsvw.exe 45 PID 2312 wrote to memory of 552 2312 mscorsvw.exe 45 PID 2312 wrote to memory of 2716 2312 mscorsvw.exe 46 PID 2312 wrote to memory of 2716 2312 mscorsvw.exe 46 PID 2312 wrote to memory of 2716 2312 mscorsvw.exe 46 PID 2312 wrote to memory of 2716 2312 mscorsvw.exe 46 PID 2312 wrote to memory of 2624 2312 mscorsvw.exe 47 PID 2312 wrote to memory of 2624 2312 mscorsvw.exe 47 PID 2312 wrote to memory of 2624 2312 mscorsvw.exe 47 PID 2312 wrote to memory of 2624 2312 mscorsvw.exe 47 PID 2312 wrote to memory of 1048 2312 mscorsvw.exe 48 PID 2312 wrote to memory of 1048 2312 mscorsvw.exe 48 PID 2312 wrote to memory of 1048 2312 mscorsvw.exe 48 PID 2312 wrote to memory of 1048 2312 mscorsvw.exe 48 PID 2312 wrote to memory of 1496 2312 mscorsvw.exe 49 PID 2312 wrote to memory of 1496 2312 mscorsvw.exe 49 PID 2312 wrote to memory of 1496 2312 mscorsvw.exe 49 PID 2312 wrote to memory of 1496 2312 mscorsvw.exe 49 PID 2312 wrote to memory of 2532 2312 mscorsvw.exe 50 PID 2312 wrote to memory of 2532 2312 mscorsvw.exe 50 PID 2312 wrote to memory of 2532 2312 mscorsvw.exe 50 PID 2312 wrote to memory of 2532 2312 mscorsvw.exe 50 PID 2312 wrote to memory of 832 2312 mscorsvw.exe 51 PID 2312 wrote to memory of 832 2312 mscorsvw.exe 51 PID 2312 wrote to memory of 832 2312 mscorsvw.exe 51 PID 2312 wrote to memory of 832 2312 mscorsvw.exe 51 PID 2312 wrote to memory of 1432 2312 mscorsvw.exe 52 PID 2312 wrote to memory of 1432 2312 mscorsvw.exe 52 PID 2312 wrote to memory of 1432 2312 mscorsvw.exe 52 PID 2312 wrote to memory of 1432 2312 mscorsvw.exe 52 PID 2312 wrote to memory of 2940 2312 mscorsvw.exe 53 PID 2312 wrote to memory of 2940 2312 mscorsvw.exe 53 PID 2312 wrote to memory of 2940 2312 mscorsvw.exe 53 PID 2312 wrote to memory of 2940 2312 mscorsvw.exe 53 PID 2312 wrote to memory of 2232 2312 mscorsvw.exe 54 PID 2312 wrote to memory of 2232 2312 mscorsvw.exe 54 PID 2312 wrote to memory of 2232 2312 mscorsvw.exe 54 PID 2312 wrote to memory of 2232 2312 mscorsvw.exe 54 PID 2312 wrote to memory of 2756 2312 mscorsvw.exe 55 PID 2312 wrote to memory of 2756 2312 mscorsvw.exe 55 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\318b21423daa09cf973520c78d7c770d04817302bfd8b1f79393f7f42904970a.exe"C:\Users\Admin\AppData\Local\Temp\318b21423daa09cf973520c78d7c770d04817302bfd8b1f79393f7f42904970a.exe"1⤵
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
PID:2864
-
C:\Windows\System32\alg.exeC:\Windows\System32\alg.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
PID:2600
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe1⤵
- Executes dropped EXE
PID:1940
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe1⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1ec -InterruptEvent 1d8 -NGENProcess 1dc -Pipe 1e8 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2576
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 25c -InterruptEvent 1d8 -NGENProcess 1dc -Pipe 1ec -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1360
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1d8 -InterruptEvent 24c -NGENProcess 250 -Pipe 248 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:3040
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 260 -InterruptEvent 25c -NGENProcess 264 -Pipe 1d8 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1536
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 25c -InterruptEvent 268 -NGENProcess 250 -Pipe 244 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:552
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 254 -InterruptEvent 260 -NGENProcess 26c -Pipe 25c -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2716
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 260 -InterruptEvent 270 -NGENProcess 250 -Pipe 24c -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2624
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 270 -InterruptEvent 278 -NGENProcess 258 -Pipe 274 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1048
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 27c -InterruptEvent 278 -NGENProcess 270 -Pipe 264 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1496
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 240 -InterruptEvent 278 -NGENProcess 27c -Pipe 258 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2532
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 27c -InterruptEvent 284 -NGENProcess 270 -Pipe 280 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:832
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 290 -InterruptEvent 284 -NGENProcess 27c -Pipe 254 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1432
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 284 -InterruptEvent 28c -NGENProcess 270 -Pipe 250 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2940
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 298 -InterruptEvent 290 -NGENProcess 29c -Pipe 284 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2232
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 290 -InterruptEvent 29c -NGENProcess 240 -Pipe 2a0 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2756
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 294 -InterruptEvent 29c -NGENProcess 290 -Pipe 268 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2400
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 29c -InterruptEvent 260 -NGENProcess 240 -Pipe 27c -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:268
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 260 -InterruptEvent 2ac -NGENProcess 26c -Pipe 2a8 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1748
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2ac -InterruptEvent 2b0 -NGENProcess 298 -Pipe 28c -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:296
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 270 -InterruptEvent 1b0 -NGENProcess 2b8 -Pipe 2ac -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2668
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1b0 -InterruptEvent 26c -NGENProcess 2b4 -Pipe 2a4 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1572
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 26c -InterruptEvent 290 -NGENProcess 240 -Pipe 294 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2004
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2bc -InterruptEvent 290 -NGENProcess 26c -Pipe 298 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1724
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 1d0 -InterruptEvent 1bc -NGENProcess 1c0 -Pipe 1cc -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2208
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 240 -InterruptEvent 1bc -NGENProcess 1c0 -Pipe 1d0 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2816
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 240 -InterruptEvent 1ac -NGENProcess 1b8 -Pipe 234 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1152
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 1ac -InterruptEvent 258 -NGENProcess 240 -Pipe 254 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1196
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 248 -InterruptEvent 1f0 -NGENProcess 1bc -Pipe 260 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2132
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 1b8 -InterruptEvent 230 -NGENProcess 244 -Pipe 248 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2328
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 24c -InterruptEvent 25c -NGENProcess 250 -Pipe 1b8 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:2964
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 258 -InterruptEvent 250 -NGENProcess 1bc -Pipe 1f0 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1676
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 268 -InterruptEvent 250 -NGENProcess 258 -Pipe 25c -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:1364
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 250 -InterruptEvent 258 -NGENProcess 1f4 -Pipe 1bc -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2544
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 270 -InterruptEvent 264 -NGENProcess 274 -Pipe 250 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:2804
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 1ac -InterruptEvent 230 -NGENProcess 278 -Pipe 270 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2456
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 26c -InterruptEvent 1f4 -NGENProcess 27c -Pipe 1ac -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:364
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 278 -InterruptEvent 268 -NGENProcess 27c -Pipe 244 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2888
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 240 -InterruptEvent 274 -NGENProcess 284 -Pipe 278 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:1760
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 258 -InterruptEvent 280 -NGENProcess 288 -Pipe 240 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1756
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 280 -InterruptEvent 28c -NGENProcess 284 -Pipe 264 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:1712
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 290 -InterruptEvent 258 -NGENProcess 294 -Pipe 280 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:840
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 230 -InterruptEvent 268 -NGENProcess 298 -Pipe 290 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:2716
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 274 -InterruptEvent 284 -NGENProcess 29c -Pipe 230 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2620
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 274 -InterruptEvent 26c -NGENProcess 294 -Pipe 298 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:2016
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 26c -InterruptEvent 288 -NGENProcess 284 -Pipe 28c -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:568
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2a4 -InterruptEvent 288 -NGENProcess 26c -Pipe 258 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:1528
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 284 -InterruptEvent 2a8 -NGENProcess 26c -Pipe 268 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1632
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2a8 -InterruptEvent 2b0 -NGENProcess 2ac -Pipe 1f4 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:2684
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2b4 -InterruptEvent 284 -NGENProcess 2b8 -Pipe 2a8 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1340
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 29c -InterruptEvent 27c -NGENProcess 2bc -Pipe 2b4 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:2416
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 288 -InterruptEvent 2ac -NGENProcess 2c0 -Pipe 29c -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2880
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2ac -InterruptEvent 2c4 -NGENProcess 2bc -Pipe 294 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:2656
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2ac -InterruptEvent 1b0 -NGENProcess 288 -Pipe 284 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2124
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵
- Executes dropped EXE
PID:1868
-
C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE"C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE" /auditservice1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:288
-
C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"1⤵
- Executes dropped EXE
PID:1812
-
C:\Program Files (x86)\Common Files\Microsoft Shared\Source Engine\OSE.EXE"C:\Program Files (x86)\Common Files\Microsoft Shared\Source Engine\OSE.EXE"1⤵
- Executes dropped EXE
PID:2292
-
C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:1684
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD57e8c24ce534b4af26f582144c526a415
SHA127938569b0e2797bf07b8a45cdd8903685542c18
SHA256f489d6ccf93f273af392429222d9a10215dde98a656b3548123766afd465ce8e
SHA5120600d4d68c2f3041ac2bc9c6bc8d8d6ddc0505157df425a9bbe01b5b85be931659070fc5ac33eb294284de983fc2e2ba69c7a1f0c47994e85c295cd06e12c56a
-
Filesize
1024KB
MD570a19d171affb07d4bedeee18c1c5f4b
SHA1e6f1876bb1532638bf55e568a867509542a2fa03
SHA256879b9b2c5a1eeb98d3d2e84f1a149152cd01f0c719a6be20107a0851bd4c8597
SHA512a98c7ce6029b39db94d51c2db03460a88f075b161a49f2e4a88e3057cd8cc745664282a5ab6b004d3885806ed30ffd1b905048169e810f49b7eadbd68873c97f
-
Filesize
736KB
MD554803b0785e9938feea93295222691ca
SHA12818885bc686da80e799e29624d18ff70409d6af
SHA2563c9b36e4967f1dc4aab33d11e232df7b557e9d41a02f2eb737bd7f39b0700c5b
SHA5121ccf7bc2b4820d028ed93f0f009fc18b7d1db56e4714a76a0cb4fe7c3ff63cae103d6b7cca46c94c9bd996b554fc0de1059404bf4f40dc5a37be30d7aa7f187d
-
Filesize
762KB
MD57f612e9b93dcf2dbb8c2297c4d30d5e5
SHA1f2c7887d1ec2e9bf5e75877bd6cbaec95decda14
SHA25621ffb07c03fa56cff1f140adc45cb6282515c07b00b735f88e19ad9d5d3ec176
SHA512d278d54dc86aa830f38d1b353518006d9f7d5841fc35b99b18b1cac4a142e859bb5c1104a376de1cf568e00141e1a4145d794713b0089ea1a5332724f5651202
-
Filesize
520KB
MD53348bc2c8f83d07e953f6fd8a49cae76
SHA14f55e367a8ab8a3885f74433e6dd5ff5e93ab689
SHA2567788ecd2c824e86403690be372cc16fb5b595d633a85e3f7a287971ace79aa4f
SHA5128283a872cfa966af65149706701225e293e5f5142719edaa898069923f5235bdcc529150abee9c7f151ff9e9e5130acfbe7a02a336f80d6f0498b1252e80f3ff
-
Filesize
2.5MB
MD5c67f677a30be0a5742f7a6e8a4ed9032
SHA10660e3cdf0163fd1a73172b170b1aa0f3954813c
SHA256264842caf8dd27e6815dafb46c03307d31e27b438f5c21cf77cab3b2744bb934
SHA512a6d2c5b3e9848057e97de6013f4d5c5d3ef8c236483b1146c522f225a436ceaa88b430e802ff44145b466f813d71fe33d83c968afbaefbe986976cc3d5ac435c
-
Filesize
1.5MB
MD59d80bfcf507eee70ab2ed77c589eede3
SHA12eb79fde3171eecb3ebde1b3c54c7544c7843ee0
SHA256e2cb6899c1cb174cd95ec918840be9b79636832e62a7c4cb669d7ad844f365fc
SHA5126c80a69ffba3608953441cfbce8f8e56478082b6f1c1f486ce995208ca1523a9d332e13f729a880aff26e6fc3d4b37a45ea83a4fc3a9ba2bfee37d9020192159
-
Filesize
1.3MB
MD57e05c595d04f7a08dda5e773fd392cc4
SHA1d4d9d185b0d684399a632172a86cb4636ff6986f
SHA2565cceb13c19a8ef1cb5d3b7c8db66ae800b4b522ced16b84e753b37b38a88218b
SHA5122cf61ce5a7a42dc6cc16b591e31d21e0ba6940de06ea64b401d5656ded00843ac12336c4e20c22a4cf3215ae2e448aa450bb274b0b6e8b62be7e97efffce9367
-
Filesize
960KB
MD5ed90dfc8e82c3e9620fd7ad4752052fe
SHA1be9e1d8dc1d846b24c67fc2113eedf2096633869
SHA256b12b8cc3089f39c2b9efc51956cd266e314eb911e2b9659093d14f4644fbb1da
SHA512b63443603480bf42280e9d9923b2eb74fab22d54684605ee1316993648023affc839a9a50c055ae5bb223425b6d8023631fd3e0468dbca183eca901475ecba97
-
Filesize
1.2MB
MD55469155946b1302f0104f169527d4328
SHA16c6f3ed691931c7f113477eadcd529c92875c6ef
SHA256ea32befc43c1b7895491af250db8c37ee4f55c1cea90aa40874c5d19bda31f81
SHA512a4f19750a54e6bd7dc50456b320e4609416f8988c5f2f3949eaa764950ad6a0572810f51fa938d0e34dc8287426850209c753188a0b1f0fb2e0fc95d34ecc861
-
Filesize
1.2MB
MD581e124d10cc443ad8760326a29ad40b1
SHA179134cd84f8a832975a10c9be68545b22244e541
SHA256b016fe692dd4ae883fa9d2d62d03e562cfff3ac7e49ba095ebfa571f94273391
SHA51268cd8cb876e82b2598ebf58ae9e9be0982f7590f776bec372269305458de3dc6c49c09748020deb3c6fe9f1afc364dda2f7bd9bf18ee2c9ae19d176679dc087c
-
Filesize
837KB
MD5851d9dcde0c1983c385bf7f429533a51
SHA108077fd87251b67224268eafc57358da3f3539d1
SHA25643c8fdd5997001f191f1b7353a97bb66f8742457ed97f94c025fcfe79584c485
SHA512474964c531ab29f4b52cab62b6580667b23fa8e5aeb9e47db05ba259e204fab8d4a01f999c43b9230248d893d518c36dc44c1301f2188dfa5c0fb2fee393a893
-
Filesize
1KB
MD5f510b20b489396494c4ae81c301782eb
SHA1e4da3f36f2a11c1d4e1a57dfd04a6cc3e55bad30
SHA2565ab999f0e8a8114f153ce93fb35a7d1b82823e6fc4905adca64a91ff80d190f8
SHA5129b3b9aa8738557754accaf8f8e161ea46dd01c76a905c753e1cee9356a6ea7bd24b853124113e9a597e86cd6b7754bd28b84ebf47c912389a2cb37ca94df3820
-
Filesize
1.1MB
MD524447e8bc0e9058580cd551cd2c7d67c
SHA178562cc9782d0cba8832898dfb9592ae61bf8f50
SHA2567321d483666817802e6d592033efcfd384a31e2b970bb230d35b551dc7cb5355
SHA512cfa0e3867d7266f7740ff303a7bb286250d475be1c75be0c37c46e0572e9dd8fef421487dd5bf735f574b49e96392b6c311828821537f74872f566cc115d1517
-
Filesize
1023KB
MD5eb0c18b59d13ccc962425b92ba6560aa
SHA1f9322e5f22c40e8f7beda706f70f3a4bc5e2c150
SHA2562b74912864b4445b5d32e1964517d09340c7d0ba97b302a5f791ac55c5981116
SHA5123bd6f0f26467ae5d0475bebd7ca0ef2d4fc3e1d9e52f9bfb0be7a80f7c25c8f4b6b0f16ffe7b2d24c77c396d1ac795ae2db1f9478e7bc321279b8d6cd3746ca3
-
Filesize
1.2MB
MD57e10e29e22edab09114e0af30208ff3f
SHA1a2fb1a14da20ae778e6c527f952f7b24baf3b033
SHA25626689524fad33a1521e408122da6174173572a325a158bae4347e82598f90b82
SHA5122388ec7caf72614410774fcfffc67ddabe170bfd7807f361e257cbf1f6f0eda100e0f7f8e5f1904d4c335ef68246c63b0fbc987c5d4d9f7c67033169ec837844
-
Filesize
1.4MB
MD5f1ba898c4677cfac58304e8470131974
SHA123ec61e8c05913c87bedaaf647bbbdcab26200ca
SHA25684d513260c973383cd77217633e686110fcbc099f85395a447a06853a844c7e2
SHA5125fb5e1d640b4ffc645efe85ce2fdabbe5434bd98b3e1faa4ac0d8c46ccf1c5a4e5084dd1a8efd59795c0147aff8dd27d3638f79010fdd89337753d59360f904b
-
Filesize
887KB
MD546d44aecf53d7712a1ddce02a7549f41
SHA1aa8a04129d231916dcc9437e0e4afd6ebbde15e1
SHA2564654739de3ca4c9819cba07646fcb4c75bb312f54b2bf563d2036adfd231f451
SHA512af27251e20ece94511f2b324aee814bcc7e11ff0c8b999ace124ea7034c925c0049194edbc5e7cea8ca2b194f71d7cc0c803cd5b6fead40eeb66eebd4f5fc70d
-
Filesize
892KB
MD508470c0c71a5c63696f765c8b0c8efea
SHA1161d11a71ebf95689ae3445d7c5eb216f066059d
SHA256df46d8e3b60617dc6603c059323ba4713162cb948662df53ecd574d5791e132d
SHA5124f0c77fb429e7957c63802b6b0ab15f4f508172f2875a13110b44273fd2557c8ffd27d9b2941979c0cb64b2d97416d9d8092944a69e3b4b1ba43538f3eb0c2b5
-
Filesize
1001KB
MD5b395417ccbfc1d7fc3b020965560573f
SHA16c5850fa067d34329b8f9af4bb5b6bd7a1d61e1d
SHA256aad5cdd2cc949889e8346660491a8e71eca2bc08c00b45401dbddeaa6b8e94aa
SHA5122b93958023d2e61b27682108fbdeee1d528f3f3ef2235240ac53f420602d41cf228cfddb02bab02a222f585c741e115289b63a884f6b6825ad905e4283e9a136
-
Filesize
587KB
MD5bf643f57fa56a64ae6677ca2dab8c97a
SHA1333375857923717904768d861ae67d3c6f74c279
SHA2562888e60f9db6f700e29682a350c66ec2317dac09738a06d22d0fface3336c4a0
SHA512d08857820cd83653fd50773b298e82f8912a691945c972937aa2d993a384f0d89a0efa7db61f05b3dd39eeed972876003d9e2e5bf3fe1d54687f9a1e35028040
-
Filesize
521KB
MD5207065f0fa8ab3f7df9f2ffa62c72105
SHA14bfa9c9135b43c3a6a551e0bb12bddd344dca00f
SHA256758cf3e6aea9c677b67326528cd3579f23d7a640d8e7b8b31879c56fee252e48
SHA51267af5d1b07feac9c994414c9a5c6d8440cfc9390025873c79253caa2374f163b00bfb5e18c0a177edff8f8b19cdde098f01ce44dafc315dbce42e244b0aee7cf
-
Filesize
1.3MB
MD5236535495b3ae42a49f7e440d6a8476c
SHA1e0e524e69f9d95f319b088bb0ccc74928ad33159
SHA25685f6a7efd09dbadb953d5ee9d56e90607c3bfdc88adf18c4a8b0f8e08bce9042
SHA512a43a96b97cb008ec876f1fdcad725cfce44435a1726852d7e822d934dfc6b96660d93b6a16e4f3795ecd0444b6efbc8e5ef978d7c97204bb747bdbf1eee0e735
-
Filesize
1.3MB
MD502da83819b7ba9a7ea0d44f4428b6f02
SHA14af1552b1a377d61ada9a1ca1843439028bf92b0
SHA256725a0d2314561f8e377075807105f84c69e0d1c582648f506908d5136dc82f54
SHA51283cb6dae6f81bfed2538112a2ac02d2a8b62f9bc41348b1fd88a15a52010259209573ab04d032aa9031649cfd971bb60ec088cf150b490b912c0454282b2dc2b
-
Filesize
789KB
MD52977adb5fae0819d12d35b283c843ccb
SHA137b243d0f9545cd51a144b01982f5d6debd672ca
SHA25638c16583498584f95c4f384bb0bb94a480d6ea629edaf56ce07c0f5500294dc9
SHA512320883ac404c87f01c78a4832ccc08178a0719a28026e7e14146431dfc56aa001961ce89fb4754cee19b707ef2b89ed1096f1287e36d947514e53eff58e2735d
-
Filesize
849KB
MD5052630bb6a80b89d937ba80c3a5bee1e
SHA1b51e8e77f564cecdc555b0a40625dce911afbe16
SHA25621dda714f9d158bc6ebc4eb512fa43dbe9ad1369352c89f252c976182a9c587e
SHA512f89efb70f5798295619a7bee7c2489322f6536fa363b67e58ed86177de84f1aa1360f5b80738870a4a56b1ee8b2c7d6881bf9fa89c36fad7deef017975e8ab29
-
Filesize
1.0MB
MD55fe716c980bc92037ee2f7f1a7d2a21e
SHA18a57b234b9f6d8dd460e2316e9e91a09d5e094f5
SHA256a93503ad01509772997b017d7f18e3b58f30f15ca822c7982e9b242b04eff806
SHA512e6f7a96f87e0cd1e4ff398e2b66952fa9e3a78459a632ecd3ad73dab87afb5eae1ac6ae5363e92c711dbec0f89aa30183047971eeccb00c0ea3233188b7cbe48
-
Filesize
721KB
MD516893b0c67197c9524488c6741798dfe
SHA1eb763c6d130c3878398e2889c4beb4ac2d39366a
SHA2561775d30df630f9fa0ae1ccff7ec274aff0d70c65c9162aae2f9f871be4abdb09
SHA5126fb95a2fb0e24162ef7129d5ff0c0471c122aadf0e02e6876893f958f9a1ce899aa955ebe5feb3de056e68df751812cc19fee746c4b436b249d207b6de138841
-
Filesize
743KB
MD52bd4ac365a706886261baf4ac541936c
SHA1ced068e2211166675d7c37720ccfa79646074f87
SHA25651ac7d1d5ecea55a3a683741f5b949615fcf6c3660733060ef56899707d289e7
SHA512a961705b3c2d56bdab78aaf6f79cecda7f5944d02cafa9c4c8f4da19a191218c939334039400c34afbff90bb89867ef702acd3048777baca99e7e12894d9cae1
-
Filesize
402KB
MD536b2a6c9185479195f6f25c1d8c888b6
SHA102a8a81c2fb7e75517729a7d1bac354c70d4676f
SHA2565a225b94de1b83f096a2a3118690446cf6127d5008964791f54c3d4b1ac8a9f2
SHA512736a7bb35b1f26f269de5c07455743a803b2921dc2fc910659a841f110522e49e9e6962d2983ba132d97544706b6b94da3f403c8e389d451eabd1cf33a565a5a
-
Filesize
65KB
MD58b5b248fea2e670858e7257a3e439ba7
SHA1e04c450c103642e7515ced7a45a5514d39ad4829
SHA256b0af19baeb25ac3e54f33661360d6d7937c39bdf5744dda7b0b5fd17d2109e7f
SHA5129c4350b69062bc9ed9eea22971c95c62a2d70c57ee4d8940d9ac06ec8e2bdd192c43efc57be8ea402e329bb3f9ab95b55ac3ec1ab342fdb52d1d7d424699f77a
-
Filesize
1.5MB
MD53b6479b953bc1b0a4a04dbf398459f65
SHA1c51319a87d95ac5c0fb55943d5337d42a857d185
SHA256ae492db429d7f1098b3798c60fa003a6af94edfb9f9597d3abf72777997a7876
SHA512e2087e16f7930cad5a3e52bf442f95e007ffe21b0f421233e1ad870880fcea57ba326b39489146050d1644ea26fc83f3ad675acb17a105e31d58f716cd4ba244
-
Filesize
463KB
MD59b747273d6da227a05360bdae73d7f6d
SHA1cabd5ece286f02dc434832edc409e99ccd90765f
SHA2564a80bd9ee8a784cb2ce090da6d45541c9285c37d2dab2089fcf90f64b4b15f1a
SHA512bb669c66734821fd959751a18b60ae29df63f6a659707f731763f0547fe03e16b7430f3de2aa0a7860aee0de0ff81b3ccdeefe6ca7de3bfe9d807abebcdadad6
-
Filesize
380KB
MD529f6e8e784fcc2b52dda6aa865f6a0e6
SHA1d57a807d9baffdcac0a57df435c6928a3d0d7b50
SHA256b9e251eca0f7547f0d8c24ca96d78a1f4e0f91bbe03d44a32cf80ac0648e6932
SHA5127560a5835e80805620c84f87a56b1965a4f69497399a9024ce9530203a5e41fd725ace8e945a6dc5b3e6a225cf03c4de6f3f10ebebee6f701f39a992c7e76b43
-
Filesize
8KB
MD50a3e6136ee18b8a2d3f93f7d22f29185
SHA1c41508c01008d626d969f4afe4f32f816bb1e122
SHA25642e39b8532140e2437ea051136dbd3ba152856b0413334c6d28855492125f187
SHA51288ff5f7a95f808e0e193b2879ed70904077af0e3d54235f6ec27ea38c341e7eb14abb5c330600477c93cfcacb29a00f053b5275cd663b46192a4941ec1d923ad
-
Filesize
1.5MB
MD51b82dfca23e39354a0f25e0d03e51df0
SHA10679a704e146dd11365e3ab6e913149cff6cc255
SHA25636e6a3c0874f96cd91b9d779936e02c2375b1649be6e504417076765273ec94e
SHA512e12854eba288dcec68104507f262032684c15dbb832d1ccb7843bb035b8d582d86ac6d0df6932f50e2b758eef625e90cf7552dc82fc41f86cfb437639bcb0bc7
-
Filesize
1.5MB
MD565343896f04ff1b6723a0476b4d5c46a
SHA160a6da133590d839daa7292bf03371937762b770
SHA256789159c7578bf50a5512605aee6ee704c7893a2380455979d04c302fa5647018
SHA512330f9ab4246963408def4ee325f9d3483da5bb20d4e867d2362cf0548be8543810204040f9bf312973bd452e76cdaa1dc869a3506ec686e5a9c2800b55ad24a0
-
Filesize
1.0MB
MD5d797c49a91df85d0af86e34b869f4773
SHA1ab179f392dd8963310a12638339e048d1e7785c2
SHA256b0cd94b7130054a915021865b33c10a738ebc43dffa8eb864e38f6d2ccd8b49e
SHA5125b925b9b6c052c2a644cffffaf2cc46773e46d7648209357e39b413cd687803eead77a771fcdd938226c3f3f10eba8526056f6b3b1232d27de166e5ae7228795
-
Filesize
280KB
MD5c90841e2248a1dcada1d00e081239303
SHA18e70b19ff9b3dcd5752fa656b2a578ed5a4a3904
SHA25612620d8258e84f5262b0d82cede3d66a01b345cc66f13b9d57bd8e06daff622a
SHA5120dcf98aee87d6ec92a4a923b2ce21d3fa8a6080edb3018e5de560b130ab5d625737f32af787cb34a47914526c23d77bf6d46eace65c14cdab6db6b14c8edf8d7
-
Filesize
4KB
MD55e2c003dd5f5d45b5136177f8bbff4b3
SHA174c1146ad5ba2e3763bdd3cde6d6a848518f4ba2
SHA256a5261ae71de61899ff5c8437a9c96b36d3ca5b77fc5e3ed453b1f591f939d1f3
SHA512b0777f711cd80f40d0da8f6f086d372c22cd011f3a15798a3be75439ecdc11e0d557b8886a9f3b0a9f6b7c1fef888f2c7442e181283122fb173dbb31c1358e30
-
Filesize
488KB
MD54f46e048c19ecbc1e96be289988f75be
SHA146491d8ccf840abfa5298bf80bd387d284369664
SHA2563143e6e037024ef521ca9cd07d4ffb2c25c4766b1450f744031cc793309a32ef
SHA5127d8498f621c8cef9db0decadd5038fb01d6c8c7429c9782e76424c2362446cd725cc87c6358f44d8023e2a6100f0951a570f0c751b29e2f84dfdb3dfe0f545e0
-
Filesize
65KB
MD503714adb7ef134808ad574b140a265f1
SHA1e6db5214e1a459ffc9a47c98ca6c3be814072c0a
SHA25626e96fd4dd26a31cdd50b10ef1fab72dc6d012ce6ab375eaf7d472c1d1add718
SHA512d5c0e49310b90bf14242da15332f983200a3c02494e67844e7bf381820308efccc9eafb84f13cd59443f1cc0a2d5d86d901969ab11402e369d1e40b824df55ad
-
Filesize
213KB
MD5a634b39122e2ea3fde7a748440f51c26
SHA166665014ce1505e248e7d4a0fa280065f54bb169
SHA256ea9238b89073be5c5e64ee8761e0d0fd50ee07a405b83c69369dd5ef89cb3e5a
SHA512b82ba46bc130e3ca738c00dfa68fe69752b30b0126b323a2155d1ccd48890355112bd474849610d35b2d55f8b8e063663926cef699106d87273860a994faf342
-
Filesize
436KB
MD554a18fc4b595b9f6ccf7b48bf768de04
SHA12f9a9cd325da57bbd766fece31ad11a479cc7ff0
SHA2563ab514d17d8386f87eb7df881b1040e35e192453a34d302d846a01b312037168
SHA512f3061048b40fe363a8953dfbef8b5b29eaebcb759d457f46bf2e2d1ec6088753f7bc5b318fd356f9a9f880f30640aa570bd954deca1909b98eb04295632f20d9
-
Filesize
140KB
MD5e9d8a9790ef7664a795a6642783f458b
SHA142d06d74ac911e013323aa3f7e1ab63950ce09a8
SHA256adadc507ea702e2bd257e8c20c4f49e3d89b4cad310f998dffa8b3f69f48c63b
SHA512713e2cf86127200b89e69a68ce66594e8633f957ebff1e05eec54db2c00b39a1dbe4aa694f523e65b7a1e4bdcdc2813b8e7a3614c684cd043ec1dfe2654200ee
-
Filesize
14KB
MD5314b327c273614055324eba7291abe74
SHA12e6271cc5d67c96ced41e30689aa4d1dc3adbeb7
SHA256a2540dd1c987f22bd0206812f2acd6cfa37ebe3637970fb6c38d35d8b318e1ec
SHA512a12cec3f742f0cafacc80260436d0511acab270fd0d23de40b94d0d976da0d3a5dfaf8aa70e630548b46ee3f70f02197f1d73b0d72a8151188cdfee6b78a4265
-
Filesize
319KB
MD50f405690bd6ab9531462a86ad35bb06a
SHA1df4e14b6131decb56e4503fed483b8724a25cec5
SHA2564fdc6ad89682a8f8b1c98638759ccc3c83a8837754652256b5d6e25f165e8776
SHA51265fd51254d1c10bba00a12ec152307d4a82aca000c919dd6f6fba89ca49b8eb2ad19605d5270a57da310bf6255e1299dc918bf24a154b5c57d03d0029499b071
-
Filesize
54KB
MD5388f8e51c14352e0517ba2d9bebe7543
SHA158fdd97e8b15c30ef665c932c7e6576f84b9180f
SHA256e558e05b8ac8eb41818490023d49d4bc3128d185f44afe9b3f0da02f66c47abe
SHA5120deffd7d470f0d9afec32976b539310be5cb2366166df838525ca5cb369dce891b0858b975a4c22e5f7ed9fa7eee26cf69a440d6b484b2dc831daf5be6ee6bc4
-
Filesize
1.5MB
MD59f7cea6377152b65bad16a18ec2caded
SHA135c7adff51fcf8d251421be15e2309e4734eda9b
SHA2569816c68d63aab45d32a3f7144b73c8d2ca6c10d4751bfe4643e2f898cdbb1c8c
SHA512b5370d34b06f190a12d88afd3ec07b2be3a154b69fa4bb6c4ff1e66a85607e503f2a9177f2195815efca1ea260212fb3ab1f7ce2b64dd80a5ce1e80a4f802c72
-
Filesize
1.5MB
MD55123471217a5262e6e540d4fee0770a4
SHA1adcdb39aad60764b6e8d94a189e423b5bd3754ad
SHA25686c23b42545920587689c78ad1fdab944b24a29490f8500926dc2a0406abfe02
SHA512b8d5bdebb8d5e6fb6e9660d9e61192b64c72caf2002a9cc59bd69e6815769625b69f4a3b5d0b4599ddb51925ced813e08f14ade9edd8db207649b8828e827d04
-
C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft.Office.To#\82425dbc07ec64ab599534080b6fbc08\Microsoft.Office.Tools.v9.0.ni.dll
Filesize248KB
MD54bbf44ea6ee52d7af8e58ea9c0caa120
SHA1f7dcafcf850b4081b61ec7d313d7ec35d6ac66d2
SHA256c89c478c2d7134cd28b3d28d4216ad6aa41de3edd9d87a227ec19cf1cbf3fb08
SHA512c82356750a03bd6f92f03c67acdd5e1085fbd70533a8b314ae54676f37762d9ca5fa91574529b147d3e1c983bf042106b75f41206f5ddc37094a5e1c327c0fd3
-
C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft.VisualStu#\06216e3a9e4ca262bc1e9a3818ced7fe\Microsoft.VisualStudio.Tools.Office.Excel.AddInAdapter.v9.0.ni.dll
Filesize58KB
MD53d6987fc36386537669f2450761cdd9d
SHA17a35de593dce75d1cb6a50c68c96f200a93eb0c9
SHA25634c0302fcf7d2237f914aaa484b24f5a222745f21f5b5806b9c519538665d9cb
SHA5121d74371f0b6c68ead18b083c08b7e44fcaf930a16e0641ad6cd8d8defb4bde838377741e5b827f7f05d4f0ad4550b509ba6dff787f51fc6830d8f2c88dbf0e11
-
C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft.VisualStu#\077a55be734d6ef6e2de59fa7325dac5\Microsoft.VisualStudio.Tools.Office.Contract.v9.0.ni.dll
Filesize205KB
MD50a41e63195a60814fe770be368b4992f
SHA1d826fd4e4d1c9256abd6c59ce8adb6074958a3e7
SHA2564a8ccb522a4076bcd5f217437c195b43914ea26da18096695ee689355e2740e1
SHA5121c916165eb5a2e30d4c6a67f2023ab5df4e393e22d9d8123aa5b9b8522fdb5dfe539bcb772a6e55219b23d865ee1438d066e78f0cb138a4a61cc2a1cecf54728
-
C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft.VisualStu#\2951791a1aa22719b6fdcb816f7e6c04\Microsoft.VisualStudio.Tools.Office.Contract.v10.0.ni.dll
Filesize43KB
MD568c51bcdc03e97a119431061273f045a
SHA16ecba97b7be73bf465adf3aa1d6798fedcc1e435
SHA2564a3aa6bd2a02778759886aaa884d1e8e4a089a1e0578c973fcb4fc885901ebaf
SHA512d71d6275c6f389f6b7becb54cb489da149f614454ae739e95c33a32ed805820bef14c98724882c4ebb51b4705f41b3cdb5a8ed134411011087774cac6e9d23e8
-
C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft.VisualStu#\369a81b278211f8d96a305e918172713\Microsoft.VisualStudio.Tools.Applications.Runtime.v9.0.ni.dll
Filesize198KB
MD59d9305a1998234e5a8f7047e1d8c0efe
SHA1ba7e589d4943cd4fc9f26c55e83c77559e7337a8
SHA256469ff9727392795925c7fe5625afcf508ba07e145c7940e4a12dbd6f14afc268
SHA51258b8cc718ae1a72a9d596f7779aeb0d5492a19e5d668828fd6cff1aa37181cc62878799b4c97beec9c71c67a0c215162ff544b2417f6017cd892a1ce64f7878c
-
C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft.VisualStu#\6e100177db1ef25970ca4a9eba03c352\Microsoft.VisualStudio.Tools.Applications.Contract.v9.0.ni.dll
Filesize70KB
MD557b601497b76f8cd4f0486d8c8bf918e
SHA1da797c446d4ca5a328f6322219f14efe90a5be54
SHA2561380d349abb6d461254118591637c8198859d8aadfdb098b8d532fdc4d776e2d
SHA5121347793a9dbff305975f4717afa9ee56443bc48586d35a64e8a375535fa9e0f6333e13c2267d5dbb7fe868aa863b23034a2e655dcd68b59dca75f17a4cbc1850
-
C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft.VisualStu#\77f00d3b4d847c1dd38a1c69e4ef5cb1\Microsoft.VisualStudio.Tools.Applications.Runtime.v10.0.ni.dll
Filesize87KB
MD5ed5c3f3402e320a8b4c6a33245a687d1
SHA14da11c966616583a817e98f7ee6fce6cde381dae
SHA256b58d8890d884e60af0124555472e23dee55905e678ec9506a3fbe00fffab0a88
SHA512d664b1f9f37c50d0e730a25ff7b79618f1ca99a0f1df0b32a4c82c95b2d15b6ef04ce5560db7407c6c3d2dff70514dac77cb0598f6d32b25362ae83fedb2bc2a
-
C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft.VisualStu#\9e076728e51ab285a8bc0f0b0a226e2c\Microsoft.VisualStudio.Tools.Applications.HostAdapter.v10.0.ni.dll
Filesize82KB
MD52eeeff61d87428ae7a2e651822adfdc4
SHA166f3811045a785626e6e1ea7bab7e42262f4c4c1
SHA25637f2ee9f8794df6d51a678c62b4838463a724fdf1bd65277cd41feaf2e6c9047
SHA512cadf3a04aa6dc2b6b781c292d73e195be5032b755616f4b49c6bdde8b3ae297519fc255b0a46280b60aaf45d4dedb9b828d33f1400792b87074f01bbab19e41a
-
C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft.VisualStu#\a58534126a42a5dbdef4573bac06c734\Microsoft.VisualStudio.Tools.Office.Word.AddInAdapter.v9.0.ni.dll
Filesize58KB
MD5a8b651d9ae89d5e790ab8357edebbffe
SHA1500cff2ba14e4c86c25c045a51aec8aa6e62d796
SHA2561c8239c49fb10c715b52e60afd0e6668592806ef447ad0c52599231f995a95d7
SHA512b4d87ee520353113bb5cf242a855057627fde9f79b74031ba11d5feee1a371612154940037954cd1e411da0c102f616be72617a583512420fd1fc743541a10ce
-
C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft.VisualStu#\bd1950e68286b869edc77261e0821c93\Microsoft.VisualStudio.Tools.Applications.AddInAdapter.v9.0.ni.dll
Filesize85KB
MD55180107f98e16bdca63e67e7e3169d22
SHA1dd2e82756dcda2f5a82125c4d743b4349955068d
SHA256d0658cbf473ef3666c758d28a1c4bcdcb25b2e515ad5251127d0906e65938f01
SHA51227d785971c28181cf9115ab14de066931c4d81f8d357ea8b9eabfe0f70bd5848023b69948ac6a586989e892bcde40999f8895a0bd2e7a28bac7f2fa64bb22363
-
C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft.VisualStu#\dbe51d156773fefd09c7a52feeb8ff79\Microsoft.VisualStudio.Tools.Office.AddInAdapter.v9.0.ni.dll
Filesize298KB
MD55fd34a21f44ccbeda1bf502aa162a96a
SHA11f3b1286c01dea47be5e65cb72956a2355e1ae5e
SHA2565d88539a1b7be77e11fe33572606c1093c54a80eea8bd3662f2ef5078a35ce01
SHA51258c3904cd1a06fbd3a432b3b927e189a744282cc105eda6f0d7f406971ccbc942c7403c2dcbb2d042981cf53419ca5e2cf4d9f57175e45cc5c484b0c121bb125
-
C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft.VisualStu#\fe8d06712eb58d0150803744020b072a\Microsoft.VisualStudio.Tools.Applications.Contract.v10.0.ni.dll
Filesize43KB
MD5dd1dfa421035fdfb6fd96d301a8c3d96
SHA1d535030ad8d53d57f45bc14c7c7b69efd929efb3
SHA256f71293fe6cf29af54d61bd2070df0a5ff17a661baf1b0b6c1d3393fd23ccd30c
SHA5128e0f2bee9801a4eba974132811d7274e52e6e17ccd60e8b3f74959994f007bdb0c60eb9facb6321c0fdfbcc44e9a77d8c5c776d998ccce256fa864338a6f63b1
-
Filesize
1.5MB
MD599e2517eeb037bacda85f9793203b48e
SHA14498273e6e7d62d6e154d447a79e5a81a7e0763d
SHA2567514698aa616607cbdacbe261afaf74c5214bdae55dc1b49f8522520d05a8c9f
SHA51231c768b91297bb4824d6433b4c80032d637a3cda958cb5d31ef0e0c29aab40c0764153704b170630ae2f62116c5a21ef9f258846c26fb2451b735574c03ab3c1
-
Filesize
640KB
MD508a5e045e1f5af113680b0f7b9c2536a
SHA14913a4cea0e87fdd64e95e097f9961ecdf8f094d
SHA2565a0a9adc1d86d270b6b4008f136d4914f843507aacac3defaab8ff47dee0a830
SHA5129c48cb2aaa95e33f61463ff3e52e6088e2597bf244bfe04ee2b21d32df3aa91501fc163a94265b4c79abc7203a6f2a6d92a59a8bf93b8ec19ab05478bc70f9ce