Analysis
-
max time kernel
150s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
19/02/2024, 13:32
Static task
static1
Behavioral task
behavioral1
Sample
2ad8d4b2d22a5ac04ff9251bb152ab4b5894a136a8a28a86e160f2056e5d2eff.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2ad8d4b2d22a5ac04ff9251bb152ab4b5894a136a8a28a86e160f2056e5d2eff.exe
Resource
win10v2004-20231215-en
General
-
Target
2ad8d4b2d22a5ac04ff9251bb152ab4b5894a136a8a28a86e160f2056e5d2eff.exe
-
Size
1.8MB
-
MD5
e16cd7909cefbb58eadfd41e044e150b
-
SHA1
7615c19dadf1ad5560414099233b52963de6158b
-
SHA256
2ad8d4b2d22a5ac04ff9251bb152ab4b5894a136a8a28a86e160f2056e5d2eff
-
SHA512
6e526ca13ee53d14b5e66a13cd22b7838ed1fbe3cf8a7a5c4368c03abc052157a22504e163edac0ab03ee5feb6ec1f044372a39e25db69177ead05f657912a9b
-
SSDEEP
49152:aKJ0WR7AFPyyiSruXKpk3WFDL9zxnSg6ZU6CENlc7dpJLrQWd:aKlBAFPydSS6W6X9lnH69CEN6rV
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 484 Process not Found 2680 alg.exe 2344 aspnet_state.exe 1636 mscorsvw.exe 2092 mscorsvw.exe 340 mscorsvw.exe 1452 mscorsvw.exe 2760 ehRecvr.exe 988 ehsched.exe 1564 elevation_service.exe 312 IEEtwCollector.exe 2252 GROOVE.EXE 1584 maintenanceservice.exe 2704 msdtc.exe 2604 msiexec.exe 1632 OSE.EXE 2400 OSPPSVC.EXE 1860 perfhost.exe 1340 locator.exe 948 snmptrap.exe 2472 dllhost.exe 348 mscorsvw.exe 1884 mscorsvw.exe 2736 mscorsvw.exe 2464 mscorsvw.exe 348 mscorsvw.exe 1336 mscorsvw.exe 3068 mscorsvw.exe 2972 mscorsvw.exe 1308 mscorsvw.exe 2692 mscorsvw.exe 2248 mscorsvw.exe 1372 mscorsvw.exe 1504 mscorsvw.exe 2308 mscorsvw.exe 2128 mscorsvw.exe 1928 mscorsvw.exe 1672 mscorsvw.exe 1604 mscorsvw.exe 2676 mscorsvw.exe 1580 mscorsvw.exe 2888 mscorsvw.exe 1372 mscorsvw.exe 2564 mscorsvw.exe 1552 mscorsvw.exe 628 mscorsvw.exe 2380 mscorsvw.exe 320 mscorsvw.exe 1444 mscorsvw.exe 1288 mscorsvw.exe 764 mscorsvw.exe 2392 mscorsvw.exe 1140 mscorsvw.exe 2952 mscorsvw.exe 1580 mscorsvw.exe 2856 mscorsvw.exe 2564 mscorsvw.exe 348 mscorsvw.exe 2236 mscorsvw.exe 2920 mscorsvw.exe 2688 mscorsvw.exe 1556 mscorsvw.exe 1824 mscorsvw.exe 2512 mscorsvw.exe -
Loads dropped DLL 47 IoCs
pid Process 484 Process not Found 484 Process not Found 484 Process not Found 484 Process not Found 484 Process not Found 484 Process not Found 484 Process not Found 2604 msiexec.exe 484 Process not Found 484 Process not Found 484 Process not Found 764 mscorsvw.exe 764 mscorsvw.exe 1140 mscorsvw.exe 1140 mscorsvw.exe 1580 mscorsvw.exe 1580 mscorsvw.exe 2564 mscorsvw.exe 2564 mscorsvw.exe 2236 mscorsvw.exe 2236 mscorsvw.exe 2688 mscorsvw.exe 2688 mscorsvw.exe 1824 mscorsvw.exe 1824 mscorsvw.exe 1264 mscorsvw.exe 1264 mscorsvw.exe 2764 mscorsvw.exe 2764 mscorsvw.exe 2024 mscorsvw.exe 2024 mscorsvw.exe 1880 mscorsvw.exe 1880 mscorsvw.exe 1540 mscorsvw.exe 1540 mscorsvw.exe 1264 mscorsvw.exe 1264 mscorsvw.exe 2596 mscorsvw.exe 2596 mscorsvw.exe 2172 mscorsvw.exe 2172 mscorsvw.exe 1560 mscorsvw.exe 1560 mscorsvw.exe 2932 mscorsvw.exe 2932 mscorsvw.exe 1872 mscorsvw.exe 1872 mscorsvw.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in System32 directory 18 IoCs
description ioc Process File opened for modification C:\Windows\System32\alg.exe 2ad8d4b2d22a5ac04ff9251bb152ab4b5894a136a8a28a86e160f2056e5d2eff.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Roaming\c93405ecbfe435d8.bin alg.exe File opened for modification C:\Windows\system32\dllhost.exe 2ad8d4b2d22a5ac04ff9251bb152ab4b5894a136a8a28a86e160f2056e5d2eff.exe File opened for modification C:\Windows\system32\IEEtwCollector.exe 2ad8d4b2d22a5ac04ff9251bb152ab4b5894a136a8a28a86e160f2056e5d2eff.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat GROOVE.EXE File opened for modification C:\Windows\SysWow64\perfhost.exe 2ad8d4b2d22a5ac04ff9251bb152ab4b5894a136a8a28a86e160f2056e5d2eff.exe File opened for modification C:\Windows\system32\MSDtc\MSDTC.LOG msdtc.exe File opened for modification C:\Windows\system32\fxssvc.exe mscorsvw.exe File opened for modification C:\Windows\system32\fxssvc.exe mscorsvw.exe File opened for modification C:\Windows\system32\IEEtwCollector.exe mscorsvw.exe File opened for modification C:\Windows\system32\fxssvc.exe 2ad8d4b2d22a5ac04ff9251bb152ab4b5894a136a8a28a86e160f2056e5d2eff.exe File opened for modification C:\Windows\system32\msiexec.exe 2ad8d4b2d22a5ac04ff9251bb152ab4b5894a136a8a28a86e160f2056e5d2eff.exe File opened for modification C:\Windows\system32\locator.exe 2ad8d4b2d22a5ac04ff9251bb152ab4b5894a136a8a28a86e160f2056e5d2eff.exe File opened for modification C:\Windows\System32\snmptrap.exe 2ad8d4b2d22a5ac04ff9251bb152ab4b5894a136a8a28a86e160f2056e5d2eff.exe File opened for modification C:\Windows\system32\fxssvc.exe alg.exe File opened for modification C:\Windows\System32\msdtc.exe 2ad8d4b2d22a5ac04ff9251bb152ab4b5894a136a8a28a86e160f2056e5d2eff.exe File opened for modification C:\Windows\system32\dllhost.exe alg.exe File opened for modification C:\Windows\system32\IEEtwCollector.exe mscorsvw.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32Info.exe alg.exe File opened for modification C:\Program Files (x86)\Google\Update\Download\{8A69D345-D564-463C-AFF1-A69D9E530F96}\106.0.5249.119\chrome_installer.exe alg.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javafxpackager.exe mscorsvw.exe File created C:\Program Files (x86)\Google\Temp\GUMF7B.tmp\goopdateres_ro.dll 2ad8d4b2d22a5ac04ff9251bb152ab4b5894a136a8a28a86e160f2056e5d2eff.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\javacpl.exe alg.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc.exe alg.exe File created C:\Program Files (x86)\Google\Temp\GUMF7B.tmp\goopdateres_sl.dll 2ad8d4b2d22a5ac04ff9251bb152ab4b5894a136a8a28a86e160f2056e5d2eff.exe File opened for modification C:\Program Files\7-Zip\7z.exe alg.exe File opened for modification C:\Program Files\Java\jre7\bin\javaws.exe alg.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\template.exe mscorsvw.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Eula.exe mscorsvw.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Updater6\Adobe_Updater.exe mscorsvw.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javap.exe alg.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\idlj.exe mscorsvw.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\Adobe AIR Updater.exe mscorsvw.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\unpack200.exe mscorsvw.exe File opened for modification C:\Program Files\Java\jre7\bin\java-rmi.exe mscorsvw.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateComRegisterShell64.exe mscorsvw.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jstack.exe mscorsvw.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\kinit.exe mscorsvw.exe File opened for modification C:\Program Files\Internet Explorer\iexplore.exe alg.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\servertool.exe alg.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\appletviewer.exe mscorsvw.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\ssvagent.exe mscorsvw.exe File opened for modification C:\Program Files\Mozilla Firefox\default-browser-agent.exe mscorsvw.exe File created C:\Program Files (x86)\Google\Temp\GUMF7B.tmp\goopdateres_am.dll 2ad8d4b2d22a5ac04ff9251bb152ab4b5894a136a8a28a86e160f2056e5d2eff.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\ktab.exe mscorsvw.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\rmid.exe mscorsvw.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Setup.exe alg.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\lib\nbexec64.exe mscorsvw.exe File created C:\Program Files (x86)\Google\Temp\GUMF7B.tmp\goopdateres_sv.dll 2ad8d4b2d22a5ac04ff9251bb152ab4b5894a136a8a28a86e160f2056e5d2eff.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe 2ad8d4b2d22a5ac04ff9251bb152ab4b5894a136a8a28a86e160f2056e5d2eff.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jdb.exe alg.exe File opened for modification C:\Program Files\Mozilla Firefox\minidump-analyzer.exe mscorsvw.exe File opened for modification C:\Program Files\Java\jre7\bin\jp2launcher.exe mscorsvw.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Smart Tag\SmartTagInstall.exe mscorsvw.exe File created C:\Program Files (x86)\Google\Temp\GUMF7B.tmp\psmachine.dll 2ad8d4b2d22a5ac04ff9251bb152ab4b5894a136a8a28a86e160f2056e5d2eff.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jinfo.exe mscorsvw.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\keytool.exe mscorsvw.exe File opened for modification C:\Program Files\Java\jre7\bin\kinit.exe mscorsvw.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\rmic.exe mscorsvw.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\DW\DWTRIG20.EXE mscorsvw.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\MSOXMLED.EXE mscorsvw.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleCrashHandler.exe mscorsvw.exe File created C:\Program Files (x86)\Google\Temp\GUMF7B.tmp\goopdateres_lv.dll 2ad8d4b2d22a5ac04ff9251bb152ab4b5894a136a8a28a86e160f2056e5d2eff.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\rmid.exe alg.exe File opened for modification C:\Program Files (x86)\Internet Explorer\ieinstal.exe alg.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleCrashHandler64.exe mscorsvw.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jvisualvm.exe mscorsvw.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\notification_helper.exe alg.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\java.exe mscorsvw.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javap.exe mscorsvw.exe File created C:\Program Files (x86)\Google\Temp\GUMF7B.tmp\goopdateres_sr.dll 2ad8d4b2d22a5ac04ff9251bb152ab4b5894a136a8a28a86e160f2056e5d2eff.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\MSOICONS.EXE alg.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jarsigner.exe mscorsvw.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe mscorsvw.exe File opened for modification C:\Program Files\DVD Maker\DVDMaker.exe mscorsvw.exe File opened for modification C:\Program Files\Java\jre7\bin\javacpl.exe mscorsvw.exe File opened for modification C:\Program Files\Mozilla Firefox\private_browsing.exe mscorsvw.exe File opened for modification C:\Program Files\Java\jre7\bin\kinit.exe mscorsvw.exe File opened for modification C:\Program Files\Mozilla Firefox\private_browsing.exe mscorsvw.exe File opened for modification C:\Program Files (x86)\Common Files\Microsoft Shared\Source Engine\OSE.EXE 2ad8d4b2d22a5ac04ff9251bb152ab4b5894a136a8a28a86e160f2056e5d2eff.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\airappinstaller.exe alg.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe mscorsvw.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File created C:\Windows\Microsoft.NET\ngenservice_pri1_lock.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index136.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\index13c.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index13b.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index13e.dat mscorsvw.exe File opened for modification C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe alg.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\index135.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\Temp\ZAPDD35.tmp\Microsoft.VisualStudio.Tools.Office.AddInAdapter.v9.0.dll mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\Temp\ZAPE456.tmp\Microsoft.VisualStudio.Tools.Office.Word.AddInAdapter.v9.0.dll mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\Temp\ZAPE975.tmp\Microsoft.VisualStudio.Tools.Applications.Runtime.v10.0.dll mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index140.dat mscorsvw.exe File created C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngenrootstorelock.dat mscorsvw.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe 2ad8d4b2d22a5ac04ff9251bb152ab4b5894a136a8a28a86e160f2056e5d2eff.exe File created C:\Windows\Microsoft.NET\ngennicupdatelock.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index142.dat mscorsvw.exe File opened for modification C:\Windows\ehome\ehRecvr.exe 2ad8d4b2d22a5ac04ff9251bb152ab4b5894a136a8a28a86e160f2056e5d2eff.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index13b.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\index13d.dat mscorsvw.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ngen_service.log mscorsvw.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ngenservicelock.dat mscorsvw.exe File created C:\Windows\Microsoft.NET\ngenservice_pri3_lock.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\index137.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\Temp\ZAPE6F5.tmp\Microsoft.Office.Tools.v9.0.dll mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\index13a.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\Temp\ZAPF75A.tmp\Microsoft.VisualStudio.Tools.Applications.HostAdapter.v10.0.dll mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index143.dat mscorsvw.exe File opened for modification C:\Windows\Registration\{02D4B3F1-FD88-11D1-960D-00805FC79235}.{14732BF8-C926-423E-98DB-CBF565BAED78}.crmlog dllhost.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index135.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index143.dat mscorsvw.exe File created C:\Windows\assembly\ngenlock.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index143.dat mscorsvw.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe mscorsvw.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index13d.dat mscorsvw.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe 2ad8d4b2d22a5ac04ff9251bb152ab4b5894a136a8a28a86e160f2056e5d2eff.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\ngen_service.log mscorsvw.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen_service.log mscorsvw.exe File created C:\Windows\Microsoft.NET\ngennicupdatelock.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index135.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index13f.dat mscorsvw.exe File opened for modification C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index134.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index13b.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\Temp\ZAPEEE1.tmp\Microsoft.VisualStudio.Tools.Applications.Contract.v10.0.dll mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index13c.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index13e.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\index142.dat mscorsvw.exe File created C:\Windows\assembly\ngenlock.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index145.dat mscorsvw.exe File opened for modification C:\Windows\ehome\ehsched.exe mscorsvw.exe File created C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngenservicelock.dat mscorsvw.exe File created C:\Windows\assembly\ngenlock.dat mscorsvw.exe File created C:\Windows\assembly\ngenlock.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index142.dat mscorsvw.exe File opened for modification C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe 2ad8d4b2d22a5ac04ff9251bb152ab4b5894a136a8a28a86e160f2056e5d2eff.exe File created C:\Windows\assembly\GACLock.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\Temp\ZAPE070.tmp\Microsoft.VisualStudio.Tools.Office.Excel.AddInAdapter.v9.0.dll mscorsvw.exe File created C:\Windows\assembly\ngenlock.dat mscorsvw.exe File created C:\Windows\assembly\ngenlock.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\Temp\ZAPF2D7.tmp\Microsoft.VisualStudio.Tools.Office.Contract.v10.0.dll mscorsvw.exe File created C:\Windows\assembly\GACLock.dat mscorsvw.exe File created C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngenofflinequeuelock.dat mscorsvw.exe File opened for modification C:\Windows\ehome\ehsched.exe mscorsvw.exe File created C:\Windows\assembly\ngenlock.dat mscorsvw.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CRLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CRLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\Certificates mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\Certificates mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CRLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\Certificates mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CRLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CRLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CRLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\Certificates mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CRLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CRLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\Certificates mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\Certificates mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CRLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\Certificates mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\Certificates mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings GROOVE.EXE Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\OfficeSoftwareProtectionPlatform OSPPSVC.EXE Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\Certificates mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CRLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\Certificates mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CRLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CRLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\Certificates mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed mscorsvw.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1832 ehRec.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 2268 2ad8d4b2d22a5ac04ff9251bb152ab4b5894a136a8a28a86e160f2056e5d2eff.exe Token: SeShutdownPrivilege 340 mscorsvw.exe Token: SeShutdownPrivilege 1452 mscorsvw.exe Token: 33 2156 EhTray.exe Token: SeIncBasePriorityPrivilege 2156 EhTray.exe Token: SeDebugPrivilege 1832 ehRec.exe Token: 33 2156 EhTray.exe Token: SeIncBasePriorityPrivilege 2156 EhTray.exe Token: SeRestorePrivilege 2604 msiexec.exe Token: SeTakeOwnershipPrivilege 2604 msiexec.exe Token: SeSecurityPrivilege 2604 msiexec.exe Token: SeShutdownPrivilege 340 mscorsvw.exe Token: SeShutdownPrivilege 1452 mscorsvw.exe Token: SeShutdownPrivilege 340 mscorsvw.exe Token: SeShutdownPrivilege 340 mscorsvw.exe Token: SeShutdownPrivilege 1452 mscorsvw.exe Token: SeShutdownPrivilege 1452 mscorsvw.exe Token: SeDebugPrivilege 2680 alg.exe Token: SeShutdownPrivilege 340 mscorsvw.exe Token: SeShutdownPrivilege 1452 mscorsvw.exe Token: SeDebugPrivilege 340 mscorsvw.exe Token: SeShutdownPrivilege 340 mscorsvw.exe Token: SeShutdownPrivilege 1452 mscorsvw.exe Token: SeShutdownPrivilege 340 mscorsvw.exe Token: SeShutdownPrivilege 340 mscorsvw.exe Token: SeShutdownPrivilege 340 mscorsvw.exe Token: SeShutdownPrivilege 1452 mscorsvw.exe Token: SeShutdownPrivilege 1452 mscorsvw.exe Token: SeShutdownPrivilege 1452 mscorsvw.exe Token: SeShutdownPrivilege 340 mscorsvw.exe Token: SeShutdownPrivilege 1452 mscorsvw.exe Token: SeShutdownPrivilege 340 mscorsvw.exe Token: SeShutdownPrivilege 1452 mscorsvw.exe Token: SeShutdownPrivilege 340 mscorsvw.exe Token: SeShutdownPrivilege 1452 mscorsvw.exe Token: SeShutdownPrivilege 340 mscorsvw.exe Token: SeShutdownPrivilege 1452 mscorsvw.exe Token: SeShutdownPrivilege 340 mscorsvw.exe Token: SeShutdownPrivilege 1452 mscorsvw.exe Token: SeShutdownPrivilege 340 mscorsvw.exe Token: SeShutdownPrivilege 1452 mscorsvw.exe Token: SeShutdownPrivilege 340 mscorsvw.exe Token: SeShutdownPrivilege 1452 mscorsvw.exe Token: SeShutdownPrivilege 340 mscorsvw.exe Token: SeShutdownPrivilege 1452 mscorsvw.exe Token: SeShutdownPrivilege 340 mscorsvw.exe Token: SeShutdownPrivilege 1452 mscorsvw.exe Token: SeShutdownPrivilege 340 mscorsvw.exe Token: SeShutdownPrivilege 1452 mscorsvw.exe Token: SeShutdownPrivilege 340 mscorsvw.exe Token: SeShutdownPrivilege 1452 mscorsvw.exe Token: SeShutdownPrivilege 340 mscorsvw.exe Token: SeShutdownPrivilege 1452 mscorsvw.exe Token: SeShutdownPrivilege 340 mscorsvw.exe Token: SeShutdownPrivilege 1452 mscorsvw.exe Token: SeShutdownPrivilege 340 mscorsvw.exe Token: SeShutdownPrivilege 1452 mscorsvw.exe Token: SeShutdownPrivilege 340 mscorsvw.exe Token: SeShutdownPrivilege 1452 mscorsvw.exe Token: SeShutdownPrivilege 340 mscorsvw.exe Token: SeShutdownPrivilege 340 mscorsvw.exe Token: SeShutdownPrivilege 1452 mscorsvw.exe Token: SeShutdownPrivilege 340 mscorsvw.exe Token: SeShutdownPrivilege 1452 mscorsvw.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2156 EhTray.exe 2156 EhTray.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 2156 EhTray.exe 2156 EhTray.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 340 wrote to memory of 348 340 mscorsvw.exe 50 PID 340 wrote to memory of 348 340 mscorsvw.exe 50 PID 340 wrote to memory of 348 340 mscorsvw.exe 50 PID 340 wrote to memory of 348 340 mscorsvw.exe 50 PID 340 wrote to memory of 1884 340 mscorsvw.exe 51 PID 340 wrote to memory of 1884 340 mscorsvw.exe 51 PID 340 wrote to memory of 1884 340 mscorsvw.exe 51 PID 340 wrote to memory of 1884 340 mscorsvw.exe 51 PID 340 wrote to memory of 2736 340 mscorsvw.exe 52 PID 340 wrote to memory of 2736 340 mscorsvw.exe 52 PID 340 wrote to memory of 2736 340 mscorsvw.exe 52 PID 340 wrote to memory of 2736 340 mscorsvw.exe 52 PID 340 wrote to memory of 2464 340 mscorsvw.exe 53 PID 340 wrote to memory of 2464 340 mscorsvw.exe 53 PID 340 wrote to memory of 2464 340 mscorsvw.exe 53 PID 340 wrote to memory of 2464 340 mscorsvw.exe 53 PID 340 wrote to memory of 348 340 mscorsvw.exe 54 PID 340 wrote to memory of 348 340 mscorsvw.exe 54 PID 340 wrote to memory of 348 340 mscorsvw.exe 54 PID 340 wrote to memory of 348 340 mscorsvw.exe 54 PID 340 wrote to memory of 1336 340 mscorsvw.exe 55 PID 340 wrote to memory of 1336 340 mscorsvw.exe 55 PID 340 wrote to memory of 1336 340 mscorsvw.exe 55 PID 340 wrote to memory of 1336 340 mscorsvw.exe 55 PID 340 wrote to memory of 3068 340 mscorsvw.exe 56 PID 340 wrote to memory of 3068 340 mscorsvw.exe 56 PID 340 wrote to memory of 3068 340 mscorsvw.exe 56 PID 340 wrote to memory of 3068 340 mscorsvw.exe 56 PID 340 wrote to memory of 2972 340 mscorsvw.exe 57 PID 340 wrote to memory of 2972 340 mscorsvw.exe 57 PID 340 wrote to memory of 2972 340 mscorsvw.exe 57 PID 340 wrote to memory of 2972 340 mscorsvw.exe 57 PID 340 wrote to memory of 1308 340 mscorsvw.exe 58 PID 340 wrote to memory of 1308 340 mscorsvw.exe 58 PID 340 wrote to memory of 1308 340 mscorsvw.exe 58 PID 340 wrote to memory of 1308 340 mscorsvw.exe 58 PID 340 wrote to memory of 2692 340 mscorsvw.exe 59 PID 340 wrote to memory of 2692 340 mscorsvw.exe 59 PID 340 wrote to memory of 2692 340 mscorsvw.exe 59 PID 340 wrote to memory of 2692 340 mscorsvw.exe 59 PID 340 wrote to memory of 2248 340 mscorsvw.exe 60 PID 340 wrote to memory of 2248 340 mscorsvw.exe 60 PID 340 wrote to memory of 2248 340 mscorsvw.exe 60 PID 340 wrote to memory of 2248 340 mscorsvw.exe 60 PID 340 wrote to memory of 1372 340 mscorsvw.exe 61 PID 340 wrote to memory of 1372 340 mscorsvw.exe 61 PID 340 wrote to memory of 1372 340 mscorsvw.exe 61 PID 340 wrote to memory of 1372 340 mscorsvw.exe 61 PID 340 wrote to memory of 1504 340 mscorsvw.exe 62 PID 340 wrote to memory of 1504 340 mscorsvw.exe 62 PID 340 wrote to memory of 1504 340 mscorsvw.exe 62 PID 340 wrote to memory of 1504 340 mscorsvw.exe 62 PID 340 wrote to memory of 2308 340 mscorsvw.exe 63 PID 340 wrote to memory of 2308 340 mscorsvw.exe 63 PID 340 wrote to memory of 2308 340 mscorsvw.exe 63 PID 340 wrote to memory of 2308 340 mscorsvw.exe 63 PID 340 wrote to memory of 2128 340 mscorsvw.exe 64 PID 340 wrote to memory of 2128 340 mscorsvw.exe 64 PID 340 wrote to memory of 2128 340 mscorsvw.exe 64 PID 340 wrote to memory of 2128 340 mscorsvw.exe 64 PID 340 wrote to memory of 1928 340 mscorsvw.exe 65 PID 340 wrote to memory of 1928 340 mscorsvw.exe 65 PID 340 wrote to memory of 1928 340 mscorsvw.exe 65 PID 340 wrote to memory of 1928 340 mscorsvw.exe 65 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\2ad8d4b2d22a5ac04ff9251bb152ab4b5894a136a8a28a86e160f2056e5d2eff.exe"C:\Users\Admin\AppData\Local\Temp\2ad8d4b2d22a5ac04ff9251bb152ab4b5894a136a8a28a86e160f2056e5d2eff.exe"1⤵
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2268
-
C:\Windows\System32\alg.exeC:\Windows\System32\alg.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2680
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe1⤵
- Executes dropped EXE
PID:2344
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1636
-
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2092
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:340 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1e4 -InterruptEvent 1d0 -NGENProcess 1d4 -Pipe 1e0 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:348
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1dc -InterruptEvent 248 -NGENProcess 250 -Pipe 254 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1884
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 240 -InterruptEvent 24c -NGENProcess 244 -Pipe 1dc -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2736
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1ec -InterruptEvent 240 -NGENProcess 1d0 -Pipe 238 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2464
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 240 -InterruptEvent 25c -NGENProcess 1e4 -Pipe 1d4 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:348
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 25c -InterruptEvent 260 -NGENProcess 244 -Pipe 248 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1336
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 260 -InterruptEvent 264 -NGENProcess 1d0 -Pipe 24c -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:3068
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 264 -InterruptEvent 26c -NGENProcess 1e4 -Pipe 268 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2972
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 26c -InterruptEvent 270 -NGENProcess 23c -Pipe 250 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1308
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 270 -InterruptEvent 244 -NGENProcess 1d0 -Pipe 240 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2692
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 244 -InterruptEvent 274 -NGENProcess 260 -Pipe 1ec -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2248
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 274 -InterruptEvent 278 -NGENProcess 23c -Pipe 25c -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1372
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 278 -InterruptEvent 27c -NGENProcess 1d0 -Pipe 264 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1504
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 27c -InterruptEvent 280 -NGENProcess 260 -Pipe 26c -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2308
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 284 -InterruptEvent 278 -NGENProcess 288 -Pipe 27c -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2128
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 278 -InterruptEvent 28c -NGENProcess 260 -Pipe 270 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1928
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 244 -InterruptEvent 284 -NGENProcess 290 -Pipe 278 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1672
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 284 -InterruptEvent 294 -NGENProcess 260 -Pipe 280 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1604
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 298 -InterruptEvent 244 -NGENProcess 29c -Pipe 284 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2676
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 298 -InterruptEvent 23c -NGENProcess 274 -Pipe 260 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1580
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 23c -InterruptEvent 28c -NGENProcess 244 -Pipe 288 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2888
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 28c -InterruptEvent 244 -NGENProcess 2a0 -Pipe 2a4 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1372
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 244 -InterruptEvent 1e4 -NGENProcess 294 -Pipe 29c -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2564
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 28c -InterruptEvent 218 -NGENProcess 2ac -Pipe 254 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2380
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 218 -InterruptEvent 2c8 -NGENProcess 244 -Pipe 2c4 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:320
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2c8 -InterruptEvent 2d0 -NGENProcess 2b8 -Pipe 2cc -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1444
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2d0 -InterruptEvent 2b8 -NGENProcess 28c -Pipe 2d4 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1288
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2ac -InterruptEvent 218 -NGENProcess 2d8 -Pipe 2d0 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:764
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 218 -InterruptEvent 2b8 -NGENProcess 2d8 -Pipe 2bc -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2392
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2e0 -InterruptEvent 2c8 -NGENProcess 2e4 -Pipe 218 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:1140
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2c8 -InterruptEvent 2e4 -NGENProcess 2b4 -Pipe 2d8 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2952
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2e4 -InterruptEvent 2ec -NGENProcess 2b8 -Pipe 2e8 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:1580
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2f0 -InterruptEvent 2c8 -NGENProcess 2f4 -Pipe 2e4 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2856
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1cc -InterruptEvent 2c8 -NGENProcess 2f0 -Pipe 2b8 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:2564
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2dc -InterruptEvent 2c0 -NGENProcess 2fc -Pipe 1cc -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:348
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 300 -InterruptEvent 2f4 -NGENProcess 2fc -Pipe 2f0 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:2236
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2dc -InterruptEvent 2f8 -NGENProcess 2fc -Pipe 2ec -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2920
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2c8 -InterruptEvent 2e0 -NGENProcess 304 -Pipe 2dc -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:2688
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 25c -InterruptEvent 2b4 -NGENProcess 264 -Pipe 2c8 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1556
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 26c -InterruptEvent 2b4 -NGENProcess 25c -Pipe 304 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:1824
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2b4 -InterruptEvent 25c -NGENProcess 300 -Pipe 264 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2512
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2f4 -InterruptEvent 25c -NGENProcess 2b4 -Pipe 2fc -Comment "NGen Worker Process"2⤵
- Loads dropped DLL
- Drops file in Windows directory
PID:1264
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 25c -InterruptEvent 2b4 -NGENProcess 26c -Pipe 300 -Comment "NGen Worker Process"2⤵PID:2008
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 244 -InterruptEvent 2f4 -NGENProcess 28c -Pipe 25c -Comment "NGen Worker Process"2⤵
- Loads dropped DLL
- Drops file in Windows directory
PID:2764
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2f4 -InterruptEvent 28c -NGENProcess 1e8 -Pipe 26c -Comment "NGen Worker Process"2⤵PID:304
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 308 -InterruptEvent 244 -NGENProcess 30c -Pipe 2f4 -Comment "NGen Worker Process"2⤵
- Loads dropped DLL
- Drops file in Windows directory
PID:2024
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 244 -InterruptEvent 30c -NGENProcess 2b4 -Pipe 1e8 -Comment "NGen Worker Process"2⤵PID:2676
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 30c -InterruptEvent 314 -NGENProcess 2e0 -Pipe 2f8 -Comment "NGen Worker Process"2⤵
- Loads dropped DLL
- Drops file in Windows directory
PID:1880
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 310 -InterruptEvent 31c -NGENProcess 314 -Pipe 30c -Comment "NGen Worker Process"2⤵PID:1660
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 31c -InterruptEvent 2c0 -NGENProcess 244 -Pipe 2b4 -Comment "NGen Worker Process"2⤵
- Loads dropped DLL
- Drops file in Windows directory
PID:1540
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2c0 -InterruptEvent 244 -NGENProcess 310 -Pipe 318 -Comment "NGen Worker Process"2⤵PID:2684
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 244 -InterruptEvent 324 -NGENProcess 22c -Pipe 2e0 -Comment "NGen Worker Process"2⤵
- Loads dropped DLL
- Drops file in Windows directory
PID:1264
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 324 -InterruptEvent 22c -NGENProcess 2c0 -Pipe 308 -Comment "NGen Worker Process"2⤵PID:1840
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 328 -InterruptEvent 320 -NGENProcess 32c -Pipe 324 -Comment "NGen Worker Process"2⤵
- Loads dropped DLL
- Drops file in Windows directory
PID:2596
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 228 -InterruptEvent 31c -NGENProcess 330 -Pipe 328 -Comment "NGen Worker Process"2⤵PID:2636
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 28c -InterruptEvent 244 -NGENProcess 334 -Pipe 228 -Comment "NGen Worker Process"2⤵
- Loads dropped DLL
- Drops file in Windows directory
PID:2172
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 330 -InterruptEvent 2c0 -NGENProcess 334 -Pipe 310 -Comment "NGen Worker Process"2⤵PID:3044
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 314 -InterruptEvent 32c -NGENProcess 33c -Pipe 330 -Comment "NGen Worker Process"2⤵
- Loads dropped DLL
- Drops file in Windows directory
PID:1560
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 22c -InterruptEvent 338 -NGENProcess 340 -Pipe 314 -Comment "NGen Worker Process"2⤵
- Modifies data under HKEY_USERS
PID:1808
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 320 -InterruptEvent 334 -NGENProcess 344 -Pipe 22c -Comment "NGen Worker Process"2⤵PID:992
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 31c -InterruptEvent 33c -NGENProcess 348 -Pipe 320 -Comment "NGen Worker Process"2⤵PID:1244
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 244 -InterruptEvent 340 -NGENProcess 34c -Pipe 31c -Comment "NGen Worker Process"2⤵PID:1620
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2c0 -InterruptEvent 344 -NGENProcess 350 -Pipe 244 -Comment "NGen Worker Process"2⤵
- Loads dropped DLL
- Drops file in Windows directory
PID:2932
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 32c -InterruptEvent 348 -NGENProcess 354 -Pipe 2c0 -Comment "NGen Worker Process"2⤵
- Loads dropped DLL
PID:1872
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 348 -InterruptEvent 354 -NGENProcess 34c -Pipe 350 -Comment "NGen Worker Process"2⤵PID:2280
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 354 -InterruptEvent 35c -NGENProcess 344 -Pipe 358 -Comment "NGen Worker Process"2⤵PID:2768
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 33c -InterruptEvent 348 -NGENProcess 360 -Pipe 354 -Comment "NGen Worker Process"2⤵
- Modifies data under HKEY_USERS
PID:672
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 348 -InterruptEvent 338 -NGENProcess 344 -Pipe 28c -Comment "NGen Worker Process"2⤵PID:2772
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 338 -InterruptEvent 364 -NGENProcess 35c -Pipe 34c -Comment "NGen Worker Process"2⤵PID:652
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 364 -InterruptEvent 36c -NGENProcess 360 -Pipe 368 -Comment "NGen Worker Process"2⤵PID:2948
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 354 -InterruptEvent 36c -NGENProcess 364 -Pipe 32c -Comment "NGen Worker Process"2⤵PID:1676
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 344 -InterruptEvent 348 -NGENProcess 374 -Pipe 354 -Comment "NGen Worker Process"2⤵PID:2920
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 348 -InterruptEvent 340 -NGENProcess 364 -Pipe 35c -Comment "NGen Worker Process"2⤵PID:1580
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 378 -InterruptEvent 344 -NGENProcess 37c -Pipe 348 -Comment "NGen Worker Process"2⤵PID:1584
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 344 -InterruptEvent 33c -NGENProcess 364 -Pipe 370 -Comment "NGen Worker Process"2⤵PID:2360
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 380 -InterruptEvent 378 -NGENProcess 384 -Pipe 344 -Comment "NGen Worker Process"2⤵PID:2128
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 378 -InterruptEvent 338 -NGENProcess 364 -Pipe 360 -Comment "NGen Worker Process"2⤵PID:2580
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 388 -InterruptEvent 380 -NGENProcess 38c -Pipe 378 -Comment "NGen Worker Process"2⤵PID:672
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 380 -InterruptEvent 390 -NGENProcess 364 -Pipe 374 -Comment "NGen Worker Process"2⤵PID:940
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 36c -InterruptEvent 388 -NGENProcess 394 -Pipe 380 -Comment "NGen Worker Process"2⤵
- Modifies data under HKEY_USERS
PID:692
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 338 -InterruptEvent 384 -NGENProcess 398 -Pipe 36c -Comment "NGen Worker Process"2⤵PID:2056
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 37c -InterruptEvent 364 -NGENProcess 39c -Pipe 338 -Comment "NGen Worker Process"2⤵PID:1884
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 364 -InterruptEvent 38c -NGENProcess 398 -Pipe 340 -Comment "NGen Worker Process"2⤵PID:2476
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3a0 -InterruptEvent 37c -NGENProcess 3a4 -Pipe 364 -Comment "NGen Worker Process"2⤵PID:1580
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 37c -InterruptEvent 390 -NGENProcess 398 -Pipe 33c -Comment "NGen Worker Process"2⤵PID:2700
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 390 -InterruptEvent 3ac -NGENProcess 38c -Pipe 3a8 -Comment "NGen Worker Process"2⤵PID:1880
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 388 -InterruptEvent 3ac -NGENProcess 390 -Pipe 39c -Comment "NGen Worker Process"2⤵PID:2008
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3a4 -InterruptEvent 3a0 -NGENProcess 3b4 -Pipe 388 -Comment "NGen Worker Process"2⤵
- Modifies data under HKEY_USERS
PID:1560
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 394 -InterruptEvent 38c -NGENProcess 3b8 -Pipe 3a4 -Comment "NGen Worker Process"2⤵
- Modifies data under HKEY_USERS
PID:1724
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 398 -InterruptEvent 390 -NGENProcess 3bc -Pipe 394 -Comment "NGen Worker Process"2⤵
- Modifies data under HKEY_USERS
PID:1592
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 384 -InterruptEvent 3b4 -NGENProcess 3c0 -Pipe 398 -Comment "NGen Worker Process"2⤵
- Modifies data under HKEY_USERS
PID:1984
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3bc -InterruptEvent 3b4 -NGENProcess 37c -Pipe 3b8 -Comment "NGen Worker Process"2⤵
- Modifies data under HKEY_USERS
PID:2920
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3b4 -InterruptEvent 3ac -NGENProcess 3c0 -Pipe 3a0 -Comment "NGen Worker Process"2⤵
- Modifies data under HKEY_USERS
PID:2496
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3c8 -InterruptEvent 3bc -NGENProcess 3cc -Pipe 3b4 -Comment "NGen Worker Process"2⤵
- Modifies data under HKEY_USERS
PID:1636
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 38c -InterruptEvent 3bc -NGENProcess 3c8 -Pipe 3c0 -Comment "NGen Worker Process"2⤵
- Modifies data under HKEY_USERS
PID:2916
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3b0 -InterruptEvent 3c4 -NGENProcess 3d4 -Pipe 38c -Comment "NGen Worker Process"2⤵
- Modifies data under HKEY_USERS
PID:1084
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3c4 -InterruptEvent 390 -NGENProcess 3c8 -Pipe 37c -Comment "NGen Worker Process"2⤵
- Modifies data under HKEY_USERS
PID:2712
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 390 -InterruptEvent 3dc -NGENProcess 3bc -Pipe 3d8 -Comment "NGen Worker Process"2⤵
- Modifies data under HKEY_USERS
PID:2032
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3dc -InterruptEvent 3ac -NGENProcess 384 -Pipe 3d4 -Comment "NGen Worker Process"2⤵PID:2152
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1452 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 1d0 -InterruptEvent 1bc -NGENProcess 1c0 -Pipe 1cc -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1552
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 1c8 -InterruptEvent 230 -NGENProcess 238 -Pipe 23c -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:628
-
-
C:\Windows\ehome\ehRecvr.exeC:\Windows\ehome\ehRecvr.exe1⤵
- Executes dropped EXE
PID:2760
-
C:\Windows\ehome\ehsched.exeC:\Windows\ehome\ehsched.exe1⤵
- Executes dropped EXE
PID:988
-
C:\Windows\eHome\EhTray.exe"C:\Windows\eHome\EhTray.exe" /nav:-21⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2156
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵
- Executes dropped EXE
PID:1564
-
C:\Windows\ehome\ehRec.exeC:\Windows\ehome\ehRec.exe -Embedding1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1832
-
C:\Windows\system32\IEEtwCollector.exeC:\Windows\system32\IEEtwCollector.exe /V1⤵
- Executes dropped EXE
PID:312
-
C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE"C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE" /auditservice1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:2252
-
C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"1⤵
- Executes dropped EXE
PID:1584
-
C:\Windows\System32\msdtc.exeC:\Windows\System32\msdtc.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2704
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2604
-
C:\Program Files (x86)\Common Files\Microsoft Shared\Source Engine\OSE.EXE"C:\Program Files (x86)\Common Files\Microsoft Shared\Source Engine\OSE.EXE"1⤵
- Executes dropped EXE
PID:1632
-
C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:2400
-
C:\Windows\SysWow64\perfhost.exeC:\Windows\SysWow64\perfhost.exe1⤵
- Executes dropped EXE
PID:1860
-
C:\Windows\system32\locator.exeC:\Windows\system32\locator.exe1⤵
- Executes dropped EXE
PID:1340
-
C:\Windows\System32\snmptrap.exeC:\Windows\System32\snmptrap.exe1⤵
- Executes dropped EXE
PID:948
-
C:\Windows\system32\dllhost.exeC:\Windows\system32\dllhost.exe /Processid:{02D4B3F1-FD88-11D1-960D-00805FC79235}1⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2472
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD5c6186a43a43dc751c0946193e8fe1b39
SHA199c872a705bdd5d506ea3d1354bbf6af3fcf1fe7
SHA2569e3531558b8cadcf7736017de2ff5a2c7331b25e32fbb661d3e999bed5a9bc26
SHA5125df01b62eef8196183f6f9e1f6f667da4c53a4dcd08035171322609595d24cd3ce10207eb6c5fe2f35e291e7408f9c94192b2efc8fcc1a24e4c9b45932b8ee0a
-
Filesize
3.8MB
MD5e5e7b1e2ab64f47340ca194cf8388a27
SHA144170564602fa0de33703d8baeda08774b2f538c
SHA2560f1703a4076e13385776bf7c8768f62224f04c6f7383090d255462d69ab23915
SHA51208f9d97e8684e27fedd790f124cae0d3e96e12045ac0526f5f013154ec736b1129ac1cdac1d15aa5b3d5be0374af8f0d2947cfb88a96bcf70064b50e014ab285
-
Filesize
1.4MB
MD504342931c410bf7acb2d735b4cd4b9e7
SHA139a88e1afccdc0f325579b60330a7a8d150e0e99
SHA256b0e034cad8e4b4db37b4c7484aaf4f9e98f5283c4299a6e977ee80096559ae2b
SHA5120844fc1994be5e9f1b2f52dcd308dbec4cafb519dbfdad6f781532cae807e3e5040f02803ee664f4c7c009112052dad9f57dad1249dfbded3194c95f8fe4032a
-
Filesize
1.2MB
MD5a5a85585c9ae9f5bc2e456c32d6290aa
SHA15b20a3b9ccc14313d039049066fd43e79db249c5
SHA2563decdf56304a7ced21668b843a56a9f44c4a971ca183161e2f491adbf7938587
SHA512c6f078983d19534b067d97eaab3e6b39aca2d093bafd8b5d700a3041c7741ba242023589006425b8f7073413e92e93d07783fbeeb5cc842b4769ae977241c10b
-
Filesize
1.5MB
MD5d674b2b562f8e14d6355ef319b0b3e7e
SHA120a136b544e8dbd30f9aa2822202b09677f0d582
SHA256efd51d8ccb67970aaba18f6b9f92776f49365b76a0fadc32a3db7d83748a450b
SHA5123f2df158fc06ff8d25c23c7cef0d71ee097e5425777aa5b5785ecb6159215db796bd7857926179654a153b2ca7bca8f9889954f00a7985843c4364bc027dd8da
-
Filesize
2.1MB
MD5682874ac3b777337d76783439fec3ec1
SHA10857f25b920b7c8b7858d19744a41ccaf42566c7
SHA2566819392dd6e2e17a9579be285e4ae52594e82f642155bcd0a03ebb17e5bd7ae4
SHA51289cb564ddd2a1d4ec68a9e9ccb0d6249f22fdbbcd00d680193cd7a29529f73b9b8a10a783af0d49a8e2fac1afffdb313f37ba17815c616d8ada3dcb75d968267
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b91050d8b077a4e8.customDestinations-ms
Filesize24B
MD5b9bd716de6739e51c620f2086f9c31e4
SHA19733d94607a3cba277e567af584510edd9febf62
SHA2567116ff028244a01f3d17f1d3bc2e1506bc9999c2e40e388458f0cccc4e117312
SHA512cef609e54c7a81a646ad38dba7ac0b82401b220773b9c792cefac80c6564753229f0c011b34ffb56381dd3154a19aee2bf5f602c4d1af01f2cf0fbc1574e4478
-
Filesize
872KB
MD5ca2ee12c768a4d58bfb3195b4ec2472a
SHA1eb74a611cb9ccfec19147bd81ae5c316ca8166b3
SHA2563b4f056f45510ffa4a4c34ad2f6f8cdd263171b52fb26ce28f64255585b86089
SHA51244066665d36b8229ae12cd9f2e97e47cc020cebbcac71547fdca976f4f23e060f6f046f70f12690484616bf16b90b15c393ee1f4ae836bf677e8906074ea7c97
-
Filesize
1.3MB
MD5adcee33238bf09f49e97389f381ea7b6
SHA19d1a2d8191d49a1ec8e0bd347cd3a49fabeca997
SHA256182033ed2fbd2810ca549ba3635cea9dfb96e1e6390de04548d08d54fa22d92f
SHA512422b87346f6c19e3d9dd0f2de7af674985dc28a2306285e6635d2f58625874d1e995a2467e4c8c9d0c03673e09250498f8472279dadbbc0a1f6ca8b6682394e7
-
Filesize
1.2MB
MD574be3dd949aa16e1610f3abfcf86d240
SHA1577d2304ce1ef49736b6687c488101557b9edaeb
SHA2569321d7156144ba66a6b9642238d3dd03c97fd0eb37859430a10142362ff4195c
SHA512d21f4e40d0af4f2367309ed5c1efc1e3dfd8b929fb131950cf9f66b656fd21b186484ca8d180e73853b013cbac7b4be9fd5a825832065e88e0912933c17fce38
-
Filesize
1003KB
MD577402c8bfeb45b164371af1029f7e6e2
SHA19beb906e00a5a226938b12a2cac789ab665c238c
SHA2560dff30066728ad1907bb0d3d0f3a170f6d6f48e9bd021ee543e3609dd1528445
SHA512969d2d073503257adcec7c0d736c920b77aa63835612df2f2ebc935dd358ae8eaf25a7dd35f69c7908b81475fada0fb0a8e8c7e2057af3e493a5ea963dc51020
-
Filesize
1.3MB
MD5551f619213a838bd62d77daa0d04838b
SHA1b6a185904dea0cc4114656f6db8adaf9b7b7c23f
SHA2561eef4d02d4dc6b7bec129e7c237537a948386288c7a32a50763b38b4a980c55c
SHA512a18b0ddb5a3890b74fd120d463f424ffa0528190320f71af217e084cb660e346dbbb4aed94ed5ab27aea67fa403c39dad3eca583c68ad7526036328398908d45
-
Filesize
676KB
MD53f59f65f816cce5d3fad717b500a71e3
SHA126d4e76b8a5851e5fab5efca0278d1d212f7a3ee
SHA2567bf861f8fd4392316e8d0059f89508533f2853e6c79d5950b175cdb23dfa3763
SHA512b0374fd0057fc4ca82b3e228fa009c4b85bbc7759e9e43da190c74acc3f1eecf27137e99157f679e2f281e6c9a673839bc78557033555b77fa9af88741fcb085
-
Filesize
1024KB
MD5ec48d242d9293ba0bff46173900eec8f
SHA180c34950b882e6aa51eda8ec4e1b8faecac7caf1
SHA2568e9f426a5d4925ad21a80f67970b1294ae9bd8e5206f2baca62684180b5c21c7
SHA512f796518b699032c570ae8122cfd24e7ccecbc7ac42776576d3085ca8532fbef55f289892eb4d4e4d354ac6d36473e00b00fee846393549cd68d163cf7cb6a8a4
-
Filesize
8KB
MD58f138c73acd5babfeecdd5c4bfb8cba5
SHA1e59234333e231addb7e8bf09570437e56ab881a2
SHA256f21eaf0969bdb20558c45d4de0fe0f7be8f6ecdad1c887ce611d20eb5363f0ca
SHA51240b1d04029b7e98f6bf953bf617e89dc45360addb5b0bf53b0e1927abfa25bd4ab4abf8030ed0bd98cad3d8a38e54da0389e6275cbec42fc9ef3d493f070b11f
-
Filesize
1.2MB
MD5fdd51f3e3ccbead2305f811831504543
SHA1aa32d3d706ea29083fbf21a313ccfe84eb6168a3
SHA256ae17e5d898a2162862d80794a46b1ac55adb075000a6fa6cc5383385cd45b86c
SHA5124414cac43c1c017e85b3c90841ba52e9bd39004a0571ae20e8df44729dc7c1a2c885d0a6069bf65eb32fd5bfa588f2f5f1c42d6e54133a59d05ca270751f249a
-
Filesize
1.2MB
MD5f846e45b5f82d8163804408d1f18a8f7
SHA119a23c7a6dd88c3d915963b8b8cb98e229b644d5
SHA2564077961c01ae01dd59a006f80a50abd9b1adc5e3e2ae64e1634e0e9b7d4b94ad
SHA51229b55bc19ea3f7c6a758ae1a7fb2b3bbdbee6a6b1b00449835f1a4a2fb6c5fa9ff847d101209fa0277be560a65a34ac5c8cce3a9a81d46c2947cb97448282884
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.Office.To#\e1f8e4d08d4b7f811b7dbbacd324027b\Microsoft.Office.Tools.v9.0.ni.dll
Filesize148KB
MD5ac901cf97363425059a50d1398e3454b
SHA12f8bd4ac2237a7b7606cb77a3d3c58051793c5c7
SHA256f6c7aecb211d9aac911bf80c91e84a47a72ac52cbb523e34e9da6482c0b24c58
SHA5126a340b6d5fa8e214f2a58d8b691c749336df087fa75bcc8d8c46f708e4b4ff3d68a61a17d13ee62322b75cbc61d39f5a572588772f3c5d6e5ff32036e5bc5a00
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\00cf0faa3d37faa0ea2d240c1ca307ef\Microsoft.VisualStudio.Tools.Office.HostAdapter.v10.0.ni.dll
Filesize143KB
MD575c84340d765d73eac1c743a31b6571a
SHA152aeef700a52b8e687316f42816eb9c0599354df
SHA256b72a1f7da8b3c3dc95c2252319f6f3e71c81ed8bd59a5b31bd2861e14c364459
SHA5129a9cdbc3a103e733150fae265c594dd7378ca402521387e466732f2431472a6a0e6cb4dfe02fe9f5b975a1739c685471ad2a4dddcdf6f12c4b5be469832fd5f1
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\03cad6bd8b37d21b28dcb4f955be2158\Microsoft.VisualStudio.Tools.Applications.Contract.v9.0.ni.dll
Filesize34KB
MD5c26b034a8d6ab845b41ed6e8a8d6001d
SHA13a55774cf22d3244d30f9eb5e26c0a6792a3e493
SHA256620b41f5e02df56c33919218bedc238ca7e76552c43da4f0f39a106835a4edc3
SHA512483424665c3bc79aeb1de6dfdd633c8526331c7b271b1ea6fe93ab298089e2aceefe7f9c7d0c6e33e604ca7b2ed62e7bb586147fecdf9a0eea60e8c03816f537
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\0cb958acb9cd4cacb46ebc0396e30aa3\Microsoft.VisualStudio.Tools.Office.Contract.v9.0.ni.dll
Filesize109KB
MD50fd0f978e977a4122b64ae8f8541de54
SHA1153d3390416fdeba1b150816cbbf968e355dc64f
SHA256211d2b83bb82042385757f811d90c5ae0a281f3abb3bf1c7901e8559db479e60
SHA512ceddfc031bfe4fcf5093d0bbc5697b5fb0cd69b03bc32612325a82ea273dae5daff7e670b0d45816a33307b8b042d27669f5d5391cb2bdcf3e5a0c847c6dcaa8
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\367516b7878af19f5c84c67f2cd277ae\Microsoft.VisualStudio.Tools.Office.Word.AddInAdapter.v9.0.ni.dll
Filesize41KB
MD53c269caf88ccaf71660d8dc6c56f4873
SHA1f9481bf17e10fe1914644e1b590b82a0ecc2c5c4
SHA256de21619e70f9ef8ccbb274bcd0d9d2ace1bae0442dfefab45976671587cf0a48
SHA512bd5be3721bf5bd4001127e0381a0589033cb17aa35852f8f073ba9684af7d8c5a0f3ee29987b345fc15fdf28c5b56686087001ef41221a2cfb16498cf4c016c6
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\8c6bac317f75b51647ea3a8da141b143\Microsoft.VisualStudio.Tools.Office.AddInAdapter.v9.0.ni.dll
Filesize210KB
MD54f40997b51420653706cb0958086cd2d
SHA10069b956d17ce7d782a0e054995317f2f621b502
SHA2568cd6a0b061b43e0b660b81859c910290a3672b00d7647ba0e86eda6ddcc8c553
SHA512e18953d7a348859855e5f6e279bc9924fc3707b57a733ce9b8f7d21bd631d419f1ebfb29202608192eb346569ca9a55264f5b4c2aedd474c22060734a68a4ee6
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\9306fc630870a75ddd23441ad77bdc57\Microsoft.VisualStudio.Tools.Applications.Runtime.v10.0.ni.dll
Filesize53KB
MD5e3a7a2b65afd8ab8b154fdc7897595c3
SHA1b21eefd6e23231470b5cf0bd0d7363879a2ed228
SHA256e5faf5e8adf46a8246e6b5038409dadca46985a9951343a1936237d2c8d7a845
SHA5126537c7ed398deb23be1256445297cb7c8d7801bf6e163d918d8e258213708b28f7255ecff9fbd3431d8f5e5a746aa95a29d3a777b28fcd688777aed6d8205a33
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\afa5bb1a39443d7dc81dfff54073929b\Microsoft.VisualStudio.Tools.Office.Contract.v10.0.ni.dll
Filesize28KB
MD5aefc3f3c8e7499bad4d05284e8abd16c
SHA17ab718bde7fdb2d878d8725dc843cfeba44a71f7
SHA2564436550409cfb3d06b15dd0c3131e87e7002b0749c7c6e9dc3378c99dbec815d
SHA5121d7dbc9764855a9a1f945c1bc8e86406c0625f1381d71b3ea6924322fbe419d1c70c3f3efd57ee2cb2097bb9385e0bf54965ab789328a80eb4946849648fe20b
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\cd6d459672d7b9e4cde4e68c74da1e46\Microsoft.VisualStudio.Tools.Office.Excel.HostAdapter.v10.0.ni.dll
Filesize180KB
MD5d0b49aedc832fa34a6b535fdd0a6f0da
SHA15524c45cf0c3f741dc5f3e9d8723fc9b259b2a21
SHA256b9d32bf688cae1b9efd16a11ef26f5a246292dba160b8e7793377de76826f564
SHA512481791f2665bca77575105da6b0e2083dca3b0a23f303365c5523225bc232ead586d1aabd9264a0f418fba1e0297451948774646fbb1f418fdfaac69e7020f3a
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\d4b9f24135109423a9640792ba1b99ac\Microsoft.VisualStudio.Tools.Office.Outlook.HostAdapter.v10.0.ni.dll
Filesize83KB
MD5c52a710daa23c533ef9810caa9fa7eee
SHA198489f6c102eb911cf4ff79a1ddcd21833cd580b
SHA2562ef170dc387bd0dae8e03b7b5b6653e313055ef2b4db403c2bdc54bc05eccf20
SHA51247ffd8df6307f9b20cad6a51f0e72e530e705dfeb6e86595cc2c9ffc23c258b580ad472fdf02cf5d4052b989c8ef7d25ca59afb792d096e8d4aab8f308590950
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\de06a98a598aa0ff716a25b24d56ad7f\Microsoft.VisualStudio.Tools.Applications.Contract.v10.0.ni.dll
Filesize27KB
MD59c60454398ce4bce7a52cbda4a45d364
SHA1da1e5de264a6f6051b332f8f32fa876d297bf620
SHA256edc90887d38c87282f49adbb12a94040f9ac86058bfae15063aaaff2672b54e1
SHA512533b7e9c55102b248f4a7560955734b4156eb4c02539c6f978aeacecff1ff182ba0f04a07d32ed90707a62d73191b0e2d2649f38ae1c3e7a5a4c0fbea9a94300
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\e0220058091b941725ef02be0b84abe7\Microsoft.VisualStudio.Tools.Applications.HostAdapter.v10.0.ni.dll
Filesize57KB
MD56eaaa1f987d6e1d81badf8665c55a341
SHA1e52db4ad92903ca03a5a54fdb66e2e6fad59efd5
SHA2564b78ffa5f0b6751aea11917db5961d566e2f59beaa054b41473d331fd392329e
SHA512dbedfa6c569670c22d34d923e22b7dae7332b932b809082dad87a1f0bb125c912db37964b5881667867ccf23dc5e5be596aad85485746f8151ce1c51ffd097b2
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\e4cf87a3a8192b067d081842e477a80c\Microsoft.VisualStudio.Tools.Office.Word.HostAdapter.v10.0.ni.dll
Filesize187KB
MD58dd5154c0cc7682c828d36a5d09b4271
SHA1cc9cfcf61e9bc5967f6420904d203482859dad81
SHA2565908040a6a12e9d5fbb7cf821585db4e681e5e0abf435c8f187cdbb3e99b999a
SHA512e7bfadfceb3028798216d7241b6d0317cc21d53176d74860234d3878960d444cb87a2988d2be71eb3bab44bea5028c35a118b8e345b2c4c84fd47d11741b77a0
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\ee73646032cbb022d16771203727e3b2\Microsoft.VisualStudio.Tools.Applications.Runtime.v9.0.ni.dll
Filesize130KB
MD52735d2ab103beb0f7c1fbd6971838274
SHA16063646bc072546798bf8bf347425834f2bfad71
SHA256f00156860ec7e88f4ccb459ca29b7e0e5c169cdc8a081cb043603187d25d92b3
SHA512fe2ce60c7f61760a29344e254771d48995e983e158da0725818f37441f9690bda46545bf10c84b163f6afb163ffb504913d6ffddf84f72b062c7f233aed896de
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\f1a7ac664667f2d6bcd6c388b230c22b\Microsoft.VisualStudio.Tools.Applications.AddInAdapter.v9.0.ni.dll
Filesize59KB
MD58c69bbdfbc8cc3fa3fa5edcd79901e94
SHA1b8028f0f557692221d5c0160ec6ce414b2bdf19b
SHA256a21471690e7c32c80049e17c13624820e77bca6c9c38b83d9ea8a7248086660d
SHA512825f5b87b76303b62fc16a96b108fb1774c2aca52ac5e44cd0ac2fe2ee47d5d67947dfe7498e36bc849773f608ec5824711f8c36e375a378582eefb57c9c2557
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\fc36797f7054935a6033077612905a0f\Microsoft.VisualStudio.Tools.Office.Excel.AddInAdapter.v9.0.ni.dll
Filesize42KB
MD571d4273e5b77cf01239a5d4f29e064fc
SHA1e8876dea4e4c4c099e27234742016be3c80d8b62
SHA256f019899f829731f899a99885fd52fde1fe4a4f6fe3ecf7f7a7cfa78517c00575
SHA51241fe67cda988c53bd087df6296d1a242cddac688718ea5a5884a72b43e9638538e64d7a59e045c0b4d490496d884cf0ec694ddf7fcb41ae3b8cbc65b7686b180
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\ehiVidCtl\88e20c69254157d91b96eadc9444815d\ehiVidCtl.ni.dll
Filesize855KB
MD57812b0a90d92b4812d4063b89a970c58
SHA13c4a789b8d28a5bfa6a6191624e33b8f40e4c4ea
SHA256897626e6af00e85e627eeaa7f9563b245335242bc6196b36d0072e5b6d45e543
SHA512634a2395bada9227b1957f2b76ed7e19f12bfc4d71a145d182602a1b6e24d83e220ebfabd602b1995c360e1725a38a89ff58417b0295bb0da9ea35c41c21a6ed
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\stdole\2c6d60b55bbab22515c512080d4b3bae\stdole.ni.dll
Filesize43KB
MD53e72bdd0663c5b2bcd530f74139c83e3
SHA166069bcac0207512b9e07320f4fa5934650677d2
SHA2566a6ac3094130d1affd34aae5ba2bd8c889e2071eb4217a75d72b5560f884e357
SHA512b0a98db477fccae71b4ebfb8525ed52c10f1e7542f955b307f260e27e0758aa22896683302e34b0237e7e3bba9f5193ddcc7ff255c71fbaa1386988b0ec7d626
-
Filesize
1.2MB
MD59f7f6e6f60190dbb238ea7c49c8449d5
SHA10ac27fde849075c1036ac858486fc648dde241fc
SHA256cde0d4b4bc42b25ee1dde53476137610efe5235742b2d2a79841e368ae2f545f
SHA512be9a44ec8be762682ad8521a1c68872b7bfacb482cf18beecdcee43d8ffda1768094ae73d02f135083bad62a08a280950bf56b1388412c73b1745e1afa3b4dc6
-
Filesize
1.3MB
MD5259d29bf3bcab8986095313e0eb68ce1
SHA11ac22193f1bb60113a70f7f4b11fbb40e396ec57
SHA2567a9db7d90b93587da71d910f5d39d1598f347b8750afc7c7c051e8f7b71f2728
SHA5126ce0896f837b2148ae5c276ea7804488b05ae9a683f2b926ae997ceafc15d226f0bb28f660f8b27768ee23bbd592df9031b51bd87a6b591d4b1b01342b44161b
-
Filesize
846KB
MD5c3a7620ba5ee7895dbd79d27802dcd9d
SHA1c2995c1a469eadb29d094aba2731eb73fc01fd5d
SHA2567687ce1fc87aee0b48e6d61fce47cc16e1a171ba9f033634913c4d8c46b393ea
SHA51213789157f81abb8c9e6d12c1b5cc37138ce1b595ba9273e4c59e10a6b900ad62a0553f42dc3d457ccdf0d2f325c75522e4b7dec529e6415447b1a74c1adae644
-
Filesize
1.3MB
MD509ef5c50dd617da3a9d0f1283c3a8295
SHA1e6c0368a2bc11a0de522caf55187705f213ca282
SHA256b8e9505744a3a50ae52d6eda32e0cadb47d8b423cd3e338ff7604ce3a6a63a7c
SHA5129a3639e0cf78dab6941ed35c3846897e7b2acc96db1e7a93c2e8006d8d60d811d344f517f03cf46301b66a607389d8e00b9d43f7d0f6464574312a7fe0ee933c
-
Filesize
1.2MB
MD5b042fb80cf6cf82d732a65a2cb7665f3
SHA198a0379611551a8d4de1a32b171ddface51906fd
SHA256aa4a1c1c0e4b4d18cfb7f659419db281e4d06efa853eeb797cdc2037e75be472
SHA51232ee022629026cad298fe40a63ba17c49a22660e13a3753ed6051800d2d92b1a5a3038f9a2ad36d5bf080e5b4cc4a76949a3ee7e11a14e5ffa0492755b2e4b03
-
Filesize
1.3MB
MD54b26a8c26ad700e8aeb89cfaa056cb36
SHA1577c80b40494ad3ea2816b5b175656aa332344cd
SHA25619be4f496ab4307b98479782257fc38cb84ad4427806d3db261c331d3878ad22
SHA51290219794bd1e0fbc8154a6f6ab8a521813b24a047711ed5ee06c5ddc0c1e88269cf36261016b310584dce99d7c21b9667dbc49e8254887bbc5abb7716ef91fb3
-
Filesize
1.2MB
MD57551de770874c32d3106e34732343b1a
SHA1a3f8eb613b2fe5ba33419a3a4d6c9ccddbd1537a
SHA256fa3719740c94be6187c2ba3b6ce1b0387e20fb1cd7bde5784c834a01a33a4864
SHA51251fd32625afdd8132424ddae1a42323413b7f3e0f3826c21ebc2da7f4d4fc3543ac7007673d33884425b558e8aaafe064716e1213e359fa22308b33ee6e62977
-
Filesize
1.3MB
MD5660ccc6efe36bd9ca126f51d85fbb627
SHA147691d24909cb9989edeeddab1f6fa70e662ef71
SHA256550990c0eddabab772a18c1399b39de4b7f03da9bfcb9ba9836ba18e010636a4
SHA51250dc92e696919f38fe45665cefd96af651436e7ef7b9f0f7fd4c2878ace9194f2758c0adc8a0790ebf97bbc7f5aee48d0f81259aad49a0f0bc457711211321f6
-
Filesize
1.3MB
MD583c5764890310824b9644f5090510ed3
SHA1a65e0aafd8ed1f78255ad9d0854d42829c34fea1
SHA2566d65d0a26ccd0daba74c82ca32ecf8c236be35d29e44ff9b94fcac8daea624fd
SHA5123936a40a763f3c06e0535ddf8a961e73f5e0cc32360461edb03995cc73b3f4288fa21fec3b17224477df79ce6c58a0e95fef7acbfdef2692e0f22a509a183b13
-
Filesize
1.3MB
MD5318457dbdc0bfe79bd8be8fef13f05d0
SHA15f63e9e1622cb707df0a4c2aa70cf528302b932e
SHA256c58283ea45616a1e80d3d40f24f437931bb6c4f7e8116119d26b252a325f4533
SHA5121277431a6b90105a67c79b71c67dcbf5a1249351cf90c4fdc449b04da23c4d56f31016d976615796176636b801a020494361cad2d30862466f793fbc957f0ed3
-
Filesize
1.2MB
MD570dbe4082b960d299f895505ce1aa0ee
SHA17cc90509064af59d8ed4126ad715fab84d159246
SHA256ddfd3abf1b15e4efa34794808156eb50078012ba3f8e4f474b8d2ba68899dcd8
SHA5128ae3e82808e38ca78a843f727dc4be48bc51cbc35fb38fc8ff253fe7b650c6dc0c3146164da6af3e134d411389988ce79f0b98d17b91e18f8616c87a02c7a3e5