Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
28-04-2024 19:01
Static task
static1
Behavioral task
behavioral1
Sample
18b3df4f20fa935ece0cae9bdf027148fe6f49dad2e18deb10f80d1cf30a7b32.exe
Resource
win7-20240419-en
General
-
Target
18b3df4f20fa935ece0cae9bdf027148fe6f49dad2e18deb10f80d1cf30a7b32.exe
-
Size
1.5MB
-
MD5
3a7f20463ef7270d2dd7f0d00ad8bef4
-
SHA1
6345eab12d880a10630c4eced3dc0516f23c34be
-
SHA256
18b3df4f20fa935ece0cae9bdf027148fe6f49dad2e18deb10f80d1cf30a7b32
-
SHA512
4fabf72776af9e53b14c15c4cd20fe0691e15b2c96237c5f38d1a3272c1747b9cc3095311fdb38a919390988f60287b4cf7b0fa18ef46d75ec7f1cea53eedadd
-
SSDEEP
24576:LGmZbMDi1W7bwDyTNjx+mZCkt76f/24pN+XNqNG6hditW:CmiDfIDif9Ckt7c20+9qNxUW
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
Processes:
alg.exeaspnet_state.exemscorsvw.exemscorsvw.exeelevation_service.exeGROOVE.EXEmaintenanceservice.exeOSE.EXEOSPPSVC.EXEmscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exedllhost.exeehRecvr.exeehsched.exeIEEtwCollector.exemsdtc.exemsiexec.exeperfhost.exelocator.exesnmptrap.exevds.exevssvc.exewbengine.exeWmiApSrv.exewmpnetwk.exeSearchIndexer.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exepid process 480 2100 alg.exe 2732 aspnet_state.exe 2508 mscorsvw.exe 2512 mscorsvw.exe 1136 elevation_service.exe 2804 GROOVE.EXE 2408 maintenanceservice.exe 1624 OSE.EXE 832 OSPPSVC.EXE 860 mscorsvw.exe 3032 mscorsvw.exe 2740 mscorsvw.exe 2496 mscorsvw.exe 1196 mscorsvw.exe 1808 mscorsvw.exe 2224 mscorsvw.exe 2836 mscorsvw.exe 580 mscorsvw.exe 752 mscorsvw.exe 1764 mscorsvw.exe 300 mscorsvw.exe 2936 mscorsvw.exe 2256 mscorsvw.exe 1704 mscorsvw.exe 3032 mscorsvw.exe 2600 mscorsvw.exe 1408 mscorsvw.exe 2392 mscorsvw.exe 1832 mscorsvw.exe 2852 mscorsvw.exe 320 mscorsvw.exe 2916 mscorsvw.exe 1776 mscorsvw.exe 656 mscorsvw.exe 2248 mscorsvw.exe 2996 mscorsvw.exe 804 dllhost.exe 1936 ehRecvr.exe 828 ehsched.exe 664 IEEtwCollector.exe 2880 msdtc.exe 2440 msiexec.exe 2884 perfhost.exe 1488 locator.exe 1492 snmptrap.exe 2876 vds.exe 2260 vssvc.exe 2536 wbengine.exe 1620 WmiApSrv.exe 1644 wmpnetwk.exe 996 SearchIndexer.exe 896 mscorsvw.exe 1848 mscorsvw.exe 2492 mscorsvw.exe 2296 mscorsvw.exe 1292 mscorsvw.exe 2680 mscorsvw.exe 268 mscorsvw.exe 2868 mscorsvw.exe 1552 mscorsvw.exe 2284 mscorsvw.exe 2452 mscorsvw.exe 1700 mscorsvw.exe -
Loads dropped DLL 57 IoCs
Processes:
msiexec.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exepid process 480 480 480 480 480 480 480 480 2440 msiexec.exe 480 480 480 480 480 744 1292 mscorsvw.exe 1292 mscorsvw.exe 268 mscorsvw.exe 268 mscorsvw.exe 1552 mscorsvw.exe 1552 mscorsvw.exe 2452 mscorsvw.exe 2452 mscorsvw.exe 2360 mscorsvw.exe 2360 mscorsvw.exe 2708 mscorsvw.exe 2708 mscorsvw.exe 1700 mscorsvw.exe 1700 mscorsvw.exe 2216 mscorsvw.exe 2216 mscorsvw.exe 2628 mscorsvw.exe 2628 mscorsvw.exe 2836 mscorsvw.exe 2836 mscorsvw.exe 2868 mscorsvw.exe 2868 mscorsvw.exe 988 mscorsvw.exe 988 mscorsvw.exe 2528 mscorsvw.exe 2528 mscorsvw.exe 1836 mscorsvw.exe 1836 mscorsvw.exe 1604 mscorsvw.exe 1604 mscorsvw.exe 2896 mscorsvw.exe 2896 mscorsvw.exe 1120 mscorsvw.exe 1120 mscorsvw.exe 1604 mscorsvw.exe 1604 mscorsvw.exe 1292 mscorsvw.exe 1292 mscorsvw.exe 2284 mscorsvw.exe 2284 mscorsvw.exe 664 mscorsvw.exe 664 mscorsvw.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in System32 directory 20 IoCs
Processes:
alg.exeaspnet_state.exeSearchProtocolHost.exe18b3df4f20fa935ece0cae9bdf027148fe6f49dad2e18deb10f80d1cf30a7b32.exemscorsvw.exeGROOVE.EXEmsdtc.exedescription ioc process File opened for modification C:\Windows\system32\config\systemprofile\AppData\Roaming\e5a8a121c1bd2e0a.bin alg.exe File opened for modification C:\Windows\system32\fxssvc.exe aspnet_state.exe File opened for modification C:\Windows\system32\msiexec.exe aspnet_state.exe File opened for modification C:\Windows\System32\snmptrap.exe aspnet_state.exe File opened for modification C:\Windows\system32\wbengine.exe aspnet_state.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat SearchProtocolHost.exe File opened for modification C:\Windows\System32\alg.exe 18b3df4f20fa935ece0cae9bdf027148fe6f49dad2e18deb10f80d1cf30a7b32.exe File opened for modification C:\Windows\system32\dllhost.exe aspnet_state.exe File opened for modification C:\Windows\System32\msdtc.exe aspnet_state.exe File opened for modification C:\Windows\SysWow64\perfhost.exe aspnet_state.exe File opened for modification C:\Windows\system32\locator.exe aspnet_state.exe File opened for modification C:\Windows\system32\SearchIndexer.exe aspnet_state.exe File opened for modification C:\Windows\system32\fxssvc.exe mscorsvw.exe File opened for modification C:\Windows\system32\IEEtwCollector.exe mscorsvw.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat GROOVE.EXE File opened for modification C:\Windows\system32\IEEtwCollector.exe aspnet_state.exe File opened for modification C:\Windows\System32\vds.exe aspnet_state.exe File opened for modification C:\Windows\system32\MSDtc\MSDTC.LOG msdtc.exe File opened for modification C:\Windows\system32\vssvc.exe aspnet_state.exe File opened for modification C:\Windows\system32\wbem\WmiApSrv.exe aspnet_state.exe -
Drops file in Program Files directory 64 IoCs
Processes:
alg.exeaspnet_state.exemscorsvw.exedescription ioc process File opened for modification C:\Program Files\Mozilla Firefox\maintenanceservice_installer.exe alg.exe File opened for modification C:\Program Files\Mozilla Firefox\plugin-container.exe aspnet_state.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\MSOXMLED.EXE mscorsvw.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javadoc.exe alg.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javah.exe alg.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jstat.exe alg.exe File opened for modification C:\Program Files\Java\jre7\bin\java-rmi.exe alg.exe File opened for modification C:\Program Files\7-Zip\7z.exe mscorsvw.exe File opened for modification C:\Program Files\Java\jre7\bin\orbd.exe aspnet_state.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\MSOXMLED.EXE aspnet_state.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe mscorsvw.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VSTO\10.0\VSTOInstaller.exe alg.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateOnDemand.exe alg.exe File opened for modification C:\Program Files (x86)\Internet Explorer\ielowutil.exe alg.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\launcher.exe aspnet_state.exe File opened for modification C:\Program Files\Java\jre7\bin\java.exe aspnet_state.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\Adobe AIR Application Installer.exe mscorsvw.exe File opened for modification C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe alg.exe File opened for modification C:\Program Files (x86)\Google\Update\Download\{8A69D345-D564-463C-AFF1-A69D9E530F96}\106.0.5249.119\chrome_installer.exe alg.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateOnDemand.exe aspnet_state.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\schemagen.exe mscorsvw.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\{AC76BA86-7AD7-1033-7B44-A90000000001}\Setup.exe aspnet_state.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\orbd.exe mscorsvw.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\rmid.exe mscorsvw.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AdobeCollabSync.exe mscorsvw.exe File opened for modification C:\Program Files\Mozilla Firefox\crashreporter.exe alg.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\reader_sl.exe alg.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OfficeSoftwareProtectionPlatform\OSPPREARM.EXE alg.exe File opened for modification C:\Program Files\Java\jre7\bin\ssvagent.exe aspnet_state.exe File opened for modification C:\Program Files\Mozilla Firefox\maintenanceservice_installer.exe mscorsvw.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdate.exe alg.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javac.exe aspnet_state.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\template.exe aspnet_state.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javaw.exe mscorsvw.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\lib\nbexec.exe mscorsvw.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jar.exe alg.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\native2ascii.exe alg.exe File opened for modification C:\Program Files\Mozilla Firefox\uninstall\helper.exe alg.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\extcheck.exe mscorsvw.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\ssvagent.exe mscorsvw.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\wsgen.exe alg.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\template.exe alg.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jrunscript.exe aspnet_state.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\LogTransport2.exe mscorsvw.exe File opened for modification C:\Program Files\Java\jre7\bin\javaw.exe aspnet_state.exe File opened for modification C:\Program Files\Mozilla Firefox\pingsender.exe aspnet_state.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe aspnet_state.exe File opened for modification C:\Program Files\7-Zip\7zG.exe alg.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\javacpl.exe alg.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\rmid.exe alg.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Source Engine\OSE.EXE aspnet_state.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\pack200.exe mscorsvw.exe File opened for modification C:\Program Files\Java\jre7\bin\pack200.exe mscorsvw.exe File opened for modification C:\Program Files\Mozilla Firefox\firefox.exe mscorsvw.exe File opened for modification C:\Program Files\Java\jre7\bin\orbd.exe alg.exe File opened for modification C:\Program Files\Java\jre7\bin\ssvagent.exe alg.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe aspnet_state.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\Adobe AIR Updater.exe aspnet_state.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\TabTip32.exe aspnet_state.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome_proxy.exe alg.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jconsole.exe alg.exe File opened for modification C:\Program Files\Java\jre7\bin\pack200.exe alg.exe File opened for modification C:\Program Files\Mozilla Firefox\updater.exe mscorsvw.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\orbd.exe aspnet_state.exe -
Drops file in Windows directory 64 IoCs
Processes:
mscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exeaspnet_state.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exealg.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exedllhost.exedescription ioc process File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index14d.dat mscorsvw.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\ngen_service.log mscorsvw.exe File created C:\Windows\assembly\ngenlock.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\index144.dat mscorsvw.exe File created C:\Windows\assembly\GACLock.dat mscorsvw.exe File opened for modification C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe aspnet_state.exe File created C:\Windows\assembly\GACLock.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\index14d.dat mscorsvw.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen_service.log mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\Temp\ZAP6A28.tmp\Microsoft.VisualStudio.Tools.Office.Word.AddInAdapter.v9.0.dll mscorsvw.exe File created C:\Windows\assembly\GACLock.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index14b.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index14e.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index153.dat mscorsvw.exe File opened for modification C:\Windows\ehome\ehsched.exe aspnet_state.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index142.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index145.dat mscorsvw.exe File created C:\Windows\assembly\ngenlock.dat mscorsvw.exe File opened for modification C:\Windows\ehome\ehRecvr.exe mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index143.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index14a.dat mscorsvw.exe File created C:\Windows\assembly\GACLock.dat mscorsvw.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index14e.dat mscorsvw.exe File created C:\Windows\assembly\ngenlock.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index155.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\Temp\ZAP6C79.tmp\Microsoft.VisualStudio.Tools.Applications.Runtime.v10.0.dll mscorsvw.exe File created C:\Windows\assembly\GACLock.dat mscorsvw.exe File created C:\Windows\assembly\ngenlock.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\Temp\ZAP6FE3.tmp\Microsoft.VisualStudio.Tools.Office.Contract.v10.0.dll mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index150.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index153.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index154.dat mscorsvw.exe File created C:\Windows\assembly\ngenlock.dat mscorsvw.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe alg.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\index14c.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index14b.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\Temp\ZAP73D9.tmp\Microsoft.VisualStudio.Tools.Office.Excel.HostAdapter.v10.0.dll mscorsvw.exe File created C:\Windows\assembly\ngenlock.dat mscorsvw.exe File created C:\Windows\assembly\ngenlock.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\index151.dat mscorsvw.exe File created C:\Windows\assembly\ngenlock.dat mscorsvw.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe alg.exe File created C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngenofflinequeuelock.dat mscorsvw.exe File created C:\Windows\Microsoft.NET\ngennicupdatelock.dat mscorsvw.exe File created C:\Windows\assembly\GACLock.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\index153.dat mscorsvw.exe File created C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngenservicelock.dat mscorsvw.exe File opened for modification C:\Windows\ehome\ehRecvr.exe aspnet_state.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index14c.dat mscorsvw.exe File created C:\Windows\assembly\ngenlock.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index152.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index154.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index157.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\Temp\ZAP6E8B.tmp\Microsoft.VisualStudio.Tools.Applications.Contract.v10.0.dll mscorsvw.exe File created C:\Windows\assembly\ngenlock.dat mscorsvw.exe File created C:\Windows\assembly\ngenlock.dat mscorsvw.exe File created C:\Windows\assembly\GACLock.dat mscorsvw.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe alg.exe File opened for modification C:\Windows\Registration\{02D4B3F1-FD88-11D1-960D-00805FC79235}.{0B9945C4-DBB8-442E-BFE7-3182B49FC5FB}.crmlog dllhost.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index144.dat mscorsvw.exe File created C:\Windows\assembly\GACLock.dat mscorsvw.exe File created C:\Windows\assembly\ngenlock.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\index157.dat mscorsvw.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies data under HKEY_USERS 64 IoCs
Processes:
SearchIndexer.exeSearchProtocolHost.exemscorsvw.exemscorsvw.exewmpnetwk.exeSearchFilterHost.exemscorsvw.exeehRec.exemscorsvw.exeOSPPSVC.EXEmscorsvw.exeehRecvr.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap SearchIndexer.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\system32\msconfig.exe,-126 = "System Configuration" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\system32\gameux.dll,-10058 = "Purble Place" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\system32\gameux.dll,-10055 = "FreeCell" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CRLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople mscorsvw.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%systemroot%\system32\rstrui.exe,-102 = "Restore system to a chosen restore point." SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software wmpnetwk.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\system32\MCTRes.dll,-200005 = "Websites for United States" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software SearchFilterHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\gameux.dll,-10300 = "Play the classic strategy game of Checkers against online opponents. Be the first to capture all your opponent’s pieces, or leave them with no more moves, to win the game." SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%windir%\system32\odbcint.dll,-1312 = "Maintains ODBC data sources and drivers." SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CRLs mscorsvw.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE\SAL\CacheLongPageCount = "32" ehRec.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE\SAL\NvpRecWaitForCounts = "32" ehRec.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CRLs mscorsvw.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%windir%\system32\mblctr.exe,-1004 = "Opens the Windows Mobility Center so you can adjust display brightness, volume, power options, and other mobile PC settings." SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%systemroot%\syswow64\unregmp2.exe,-155 = "Play digital media including music, videos, CDs, and DVDs." SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CTLs mscorsvw.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE\SAL\CriticalLowDiskSpace = "1073741824" ehRec.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\system32\SampleRes.dll,-117 = "Maid with the Flaxen Hair" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\system32\gameux.dll,-10057 = "Minesweeper" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\system32\mycomput.dll,-300 = "Computer Management" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%systemroot%\ehome\ehres.dll,-116 = "Opens your home entertainment option for digital and on-demand media, including TV, movies, music and pictures." SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\Certificates mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CRLs mscorsvw.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\OfficeSoftwareProtectionPlatform\VLRenewalSchedule = 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 OSPPSVC.EXE Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32,@elscore.dll,-4 = "Microsoft Simplified Chinese to Traditional Chinese Transliteration" SearchIndexer.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\system32\SampleRes.dll,-104 = "Jellyfish" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\System32\isoburn.exe,-350 = "Disc Image File" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Program Files\Windows Sidebar\sidebar.exe,-1005 = "Desktop Gadget Gallery" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\Certificates mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Direct3D\MostRecentApplication SearchFilterHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\System32\ieframe.dll,-914 = "SVG Document" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\system32\SnippingTool.exe,-15051 = "Snipping Tool" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\Certificates mscorsvw.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{1E589E9D-8A8D-46D9-A2F9-E6D4F8161EE9} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 0100000000000000f031dca69e99da01 SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Program Files\Common Files\System\wab32res.dll,-4602 = "Contact file" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CRLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software ehRecvr.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\system32\SampleRes.dll,-142 = "Wildlife" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%windir%\system32\wucltux.dll,-2 = "Delivers software updates and drivers, and provides automatic updating options." SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\system32\Speech\SpeechUX\sapi.cpl,-5555 = "Windows Speech Recognition" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\System32\syncCenter.dll,-3001 = "Sync files between your computer and network folders" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\Certificates mscorsvw.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%windir%\system32\miguiresource.dll,-202 = "Schedule computer tasks to run automatically." SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\system32\iscsicpl.dll,-5001 = "iSCSI Initiator" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\Certificates mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed mscorsvw.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE\SAL\LogMinJobWaitTimeMs = "3000" ehRec.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\SoundRecorder.exe,-32790 = "Record sound and save it on your computer." SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\gameux.dll,-10305 = "Hearts is a trick-based card game in which the goal is to get rid of cards while avoiding points. The player with the lowest number of points wins." SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CRLs mscorsvw.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{E37A73F8-FB01-43DC-914E-AAEE76095AB9} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 010000000000000070b7e5a69e99da01 SearchProtocolHost.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
Processes:
18b3df4f20fa935ece0cae9bdf027148fe6f49dad2e18deb10f80d1cf30a7b32.exeehRec.exeaspnet_state.exepid process 1600 18b3df4f20fa935ece0cae9bdf027148fe6f49dad2e18deb10f80d1cf30a7b32.exe 1600 18b3df4f20fa935ece0cae9bdf027148fe6f49dad2e18deb10f80d1cf30a7b32.exe 1600 18b3df4f20fa935ece0cae9bdf027148fe6f49dad2e18deb10f80d1cf30a7b32.exe 1576 ehRec.exe 2732 aspnet_state.exe 2732 aspnet_state.exe 2732 aspnet_state.exe 2732 aspnet_state.exe 2732 aspnet_state.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
18b3df4f20fa935ece0cae9bdf027148fe6f49dad2e18deb10f80d1cf30a7b32.exemscorsvw.exemscorsvw.exealg.exeaspnet_state.exeEhTray.exemsiexec.exeehRec.exevssvc.exewbengine.exewmpnetwk.exeSearchIndexer.exedescription pid process Token: SeTakeOwnershipPrivilege 1600 18b3df4f20fa935ece0cae9bdf027148fe6f49dad2e18deb10f80d1cf30a7b32.exe Token: SeShutdownPrivilege 2512 mscorsvw.exe Token: SeShutdownPrivilege 2508 mscorsvw.exe Token: SeShutdownPrivilege 2512 mscorsvw.exe Token: SeShutdownPrivilege 2508 mscorsvw.exe Token: SeShutdownPrivilege 2512 mscorsvw.exe Token: SeShutdownPrivilege 2512 mscorsvw.exe Token: SeShutdownPrivilege 2508 mscorsvw.exe Token: SeShutdownPrivilege 2508 mscorsvw.exe Token: SeShutdownPrivilege 2512 mscorsvw.exe Token: SeDebugPrivilege 2100 alg.exe Token: SeShutdownPrivilege 2508 mscorsvw.exe Token: SeShutdownPrivilege 2512 mscorsvw.exe Token: SeTakeOwnershipPrivilege 2732 aspnet_state.exe Token: 33 1632 EhTray.exe Token: SeIncBasePriorityPrivilege 1632 EhTray.exe Token: SeRestorePrivilege 2440 msiexec.exe Token: SeTakeOwnershipPrivilege 2440 msiexec.exe Token: SeSecurityPrivilege 2440 msiexec.exe Token: SeDebugPrivilege 1576 ehRec.exe Token: SeBackupPrivilege 2260 vssvc.exe Token: SeRestorePrivilege 2260 vssvc.exe Token: SeAuditPrivilege 2260 vssvc.exe Token: SeBackupPrivilege 2536 wbengine.exe Token: SeRestorePrivilege 2536 wbengine.exe Token: SeSecurityPrivilege 2536 wbengine.exe Token: 33 1632 EhTray.exe Token: SeIncBasePriorityPrivilege 1632 EhTray.exe Token: SeDebugPrivilege 2732 aspnet_state.exe Token: 33 1644 wmpnetwk.exe Token: SeIncBasePriorityPrivilege 1644 wmpnetwk.exe Token: SeManageVolumePrivilege 996 SearchIndexer.exe Token: 33 996 SearchIndexer.exe Token: SeIncBasePriorityPrivilege 996 SearchIndexer.exe Token: SeShutdownPrivilege 2508 mscorsvw.exe Token: SeShutdownPrivilege 2512 mscorsvw.exe Token: SeShutdownPrivilege 2512 mscorsvw.exe Token: SeShutdownPrivilege 2512 mscorsvw.exe Token: SeShutdownPrivilege 2512 mscorsvw.exe Token: SeShutdownPrivilege 2512 mscorsvw.exe Token: SeShutdownPrivilege 2512 mscorsvw.exe Token: SeShutdownPrivilege 2512 mscorsvw.exe Token: SeShutdownPrivilege 2512 mscorsvw.exe Token: SeShutdownPrivilege 2512 mscorsvw.exe Token: SeShutdownPrivilege 2512 mscorsvw.exe Token: SeShutdownPrivilege 2512 mscorsvw.exe Token: SeShutdownPrivilege 2508 mscorsvw.exe Token: SeShutdownPrivilege 2508 mscorsvw.exe Token: SeShutdownPrivilege 2508 mscorsvw.exe Token: SeShutdownPrivilege 2512 mscorsvw.exe Token: SeShutdownPrivilege 2508 mscorsvw.exe Token: SeShutdownPrivilege 2512 mscorsvw.exe Token: SeShutdownPrivilege 2508 mscorsvw.exe Token: SeShutdownPrivilege 2512 mscorsvw.exe Token: SeShutdownPrivilege 2508 mscorsvw.exe Token: SeShutdownPrivilege 2512 mscorsvw.exe Token: SeShutdownPrivilege 2508 mscorsvw.exe Token: SeShutdownPrivilege 2512 mscorsvw.exe Token: SeShutdownPrivilege 2508 mscorsvw.exe Token: SeShutdownPrivilege 2512 mscorsvw.exe Token: SeShutdownPrivilege 2508 mscorsvw.exe Token: SeShutdownPrivilege 2512 mscorsvw.exe Token: SeShutdownPrivilege 2508 mscorsvw.exe Token: SeShutdownPrivilege 2512 mscorsvw.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
EhTray.exepid process 1632 EhTray.exe 1632 EhTray.exe -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
EhTray.exepid process 1632 EhTray.exe 1632 EhTray.exe -
Suspicious use of SetWindowsHookEx 17 IoCs
Processes:
SearchProtocolHost.exepid process 2388 SearchProtocolHost.exe 2388 SearchProtocolHost.exe 2388 SearchProtocolHost.exe 2388 SearchProtocolHost.exe 2388 SearchProtocolHost.exe 2388 SearchProtocolHost.exe 2388 SearchProtocolHost.exe 2388 SearchProtocolHost.exe 2388 SearchProtocolHost.exe 2388 SearchProtocolHost.exe 2388 SearchProtocolHost.exe 2388 SearchProtocolHost.exe 2388 SearchProtocolHost.exe 2388 SearchProtocolHost.exe 2388 SearchProtocolHost.exe 2388 SearchProtocolHost.exe 2388 SearchProtocolHost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
mscorsvw.exemscorsvw.exedescription pid process target process PID 2512 wrote to memory of 860 2512 mscorsvw.exe mscorsvw.exe PID 2512 wrote to memory of 860 2512 mscorsvw.exe mscorsvw.exe PID 2512 wrote to memory of 860 2512 mscorsvw.exe mscorsvw.exe PID 2512 wrote to memory of 3032 2512 mscorsvw.exe mscorsvw.exe PID 2512 wrote to memory of 3032 2512 mscorsvw.exe mscorsvw.exe PID 2512 wrote to memory of 3032 2512 mscorsvw.exe mscorsvw.exe PID 2508 wrote to memory of 2740 2508 mscorsvw.exe mscorsvw.exe PID 2508 wrote to memory of 2740 2508 mscorsvw.exe mscorsvw.exe PID 2508 wrote to memory of 2740 2508 mscorsvw.exe mscorsvw.exe PID 2508 wrote to memory of 2740 2508 mscorsvw.exe mscorsvw.exe PID 2508 wrote to memory of 2496 2508 mscorsvw.exe mscorsvw.exe PID 2508 wrote to memory of 2496 2508 mscorsvw.exe mscorsvw.exe PID 2508 wrote to memory of 2496 2508 mscorsvw.exe mscorsvw.exe PID 2508 wrote to memory of 2496 2508 mscorsvw.exe mscorsvw.exe PID 2508 wrote to memory of 1196 2508 mscorsvw.exe mscorsvw.exe PID 2508 wrote to memory of 1196 2508 mscorsvw.exe mscorsvw.exe PID 2508 wrote to memory of 1196 2508 mscorsvw.exe mscorsvw.exe PID 2508 wrote to memory of 1196 2508 mscorsvw.exe mscorsvw.exe PID 2508 wrote to memory of 1808 2508 mscorsvw.exe mscorsvw.exe PID 2508 wrote to memory of 1808 2508 mscorsvw.exe mscorsvw.exe PID 2508 wrote to memory of 1808 2508 mscorsvw.exe mscorsvw.exe PID 2508 wrote to memory of 1808 2508 mscorsvw.exe mscorsvw.exe PID 2508 wrote to memory of 2224 2508 mscorsvw.exe mscorsvw.exe PID 2508 wrote to memory of 2224 2508 mscorsvw.exe mscorsvw.exe PID 2508 wrote to memory of 2224 2508 mscorsvw.exe mscorsvw.exe PID 2508 wrote to memory of 2224 2508 mscorsvw.exe mscorsvw.exe PID 2508 wrote to memory of 2836 2508 mscorsvw.exe mscorsvw.exe PID 2508 wrote to memory of 2836 2508 mscorsvw.exe mscorsvw.exe PID 2508 wrote to memory of 2836 2508 mscorsvw.exe mscorsvw.exe PID 2508 wrote to memory of 2836 2508 mscorsvw.exe mscorsvw.exe PID 2508 wrote to memory of 580 2508 mscorsvw.exe mscorsvw.exe PID 2508 wrote to memory of 580 2508 mscorsvw.exe mscorsvw.exe PID 2508 wrote to memory of 580 2508 mscorsvw.exe mscorsvw.exe PID 2508 wrote to memory of 580 2508 mscorsvw.exe mscorsvw.exe PID 2508 wrote to memory of 752 2508 mscorsvw.exe mscorsvw.exe PID 2508 wrote to memory of 752 2508 mscorsvw.exe mscorsvw.exe PID 2508 wrote to memory of 752 2508 mscorsvw.exe mscorsvw.exe PID 2508 wrote to memory of 752 2508 mscorsvw.exe mscorsvw.exe PID 2508 wrote to memory of 1764 2508 mscorsvw.exe mscorsvw.exe PID 2508 wrote to memory of 1764 2508 mscorsvw.exe mscorsvw.exe PID 2508 wrote to memory of 1764 2508 mscorsvw.exe mscorsvw.exe PID 2508 wrote to memory of 1764 2508 mscorsvw.exe mscorsvw.exe PID 2508 wrote to memory of 300 2508 mscorsvw.exe mscorsvw.exe PID 2508 wrote to memory of 300 2508 mscorsvw.exe mscorsvw.exe PID 2508 wrote to memory of 300 2508 mscorsvw.exe mscorsvw.exe PID 2508 wrote to memory of 300 2508 mscorsvw.exe mscorsvw.exe PID 2508 wrote to memory of 2936 2508 mscorsvw.exe mscorsvw.exe PID 2508 wrote to memory of 2936 2508 mscorsvw.exe mscorsvw.exe PID 2508 wrote to memory of 2936 2508 mscorsvw.exe mscorsvw.exe PID 2508 wrote to memory of 2936 2508 mscorsvw.exe mscorsvw.exe PID 2508 wrote to memory of 2256 2508 mscorsvw.exe mscorsvw.exe PID 2508 wrote to memory of 2256 2508 mscorsvw.exe mscorsvw.exe PID 2508 wrote to memory of 2256 2508 mscorsvw.exe mscorsvw.exe PID 2508 wrote to memory of 2256 2508 mscorsvw.exe mscorsvw.exe PID 2508 wrote to memory of 1704 2508 mscorsvw.exe mscorsvw.exe PID 2508 wrote to memory of 1704 2508 mscorsvw.exe mscorsvw.exe PID 2508 wrote to memory of 1704 2508 mscorsvw.exe mscorsvw.exe PID 2508 wrote to memory of 1704 2508 mscorsvw.exe mscorsvw.exe PID 2508 wrote to memory of 3032 2508 mscorsvw.exe mscorsvw.exe PID 2508 wrote to memory of 3032 2508 mscorsvw.exe mscorsvw.exe PID 2508 wrote to memory of 3032 2508 mscorsvw.exe mscorsvw.exe PID 2508 wrote to memory of 3032 2508 mscorsvw.exe mscorsvw.exe PID 2508 wrote to memory of 2600 2508 mscorsvw.exe mscorsvw.exe PID 2508 wrote to memory of 2600 2508 mscorsvw.exe mscorsvw.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\18b3df4f20fa935ece0cae9bdf027148fe6f49dad2e18deb10f80d1cf30a7b32.exe"C:\Users\Admin\AppData\Local\Temp\18b3df4f20fa935ece0cae9bdf027148fe6f49dad2e18deb10f80d1cf30a7b32.exe"1⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1600
-
C:\Windows\System32\alg.exeC:\Windows\System32\alg.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2100
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2732
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1e4 -InterruptEvent 1d0 -NGENProcess 1d4 -Pipe 1e0 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2740 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1dc -InterruptEvent 248 -NGENProcess 250 -Pipe 254 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2496 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 248 -InterruptEvent 240 -NGENProcess 1ec -Pipe 238 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1196 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 240 -InterruptEvent 244 -NGENProcess 1e4 -Pipe 1d4 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1808 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 244 -InterruptEvent 258 -NGENProcess 250 -Pipe 1d0 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2224 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 258 -InterruptEvent 25c -NGENProcess 1ec -Pipe 24c -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2836 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 25c -InterruptEvent 260 -NGENProcess 1e4 -Pipe 1dc -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:580 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 260 -InterruptEvent 264 -NGENProcess 250 -Pipe 248 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:752 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 264 -InterruptEvent 250 -NGENProcess 258 -Pipe 26c -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1764 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 250 -InterruptEvent 240 -NGENProcess 268 -Pipe 244 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:300 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 240 -InterruptEvent 270 -NGENProcess 260 -Pipe 23c -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2936 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 270 -InterruptEvent 274 -NGENProcess 258 -Pipe 1ec -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2256 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 274 -InterruptEvent 278 -NGENProcess 268 -Pipe 25c -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1704 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 278 -InterruptEvent 27c -NGENProcess 260 -Pipe 264 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:3032 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 27c -InterruptEvent 280 -NGENProcess 258 -Pipe 250 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2600 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 280 -InterruptEvent 284 -NGENProcess 268 -Pipe 240 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1408 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 284 -InterruptEvent 288 -NGENProcess 260 -Pipe 270 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2392 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 288 -InterruptEvent 260 -NGENProcess 27c -Pipe 290 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1832 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 260 -InterruptEvent 274 -NGENProcess 28c -Pipe 278 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2852 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 274 -InterruptEvent 294 -NGENProcess 284 -Pipe 1e4 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:320 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 294 -InterruptEvent 298 -NGENProcess 27c -Pipe 258 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2916 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 298 -InterruptEvent 27c -NGENProcess 260 -Pipe 2a0 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1776 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 27c -InterruptEvent 280 -NGENProcess 29c -Pipe 288 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:656
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 1d4 -InterruptEvent 1c0 -NGENProcess 1c4 -Pipe 1d0 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:860 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 1cc -InterruptEvent 238 -NGENProcess 240 -Pipe 244 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:3032 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 23c -InterruptEvent 1e4 -NGENProcess 208 -Pipe 1bc -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:896 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 1e4 -InterruptEvent 258 -NGENProcess 1dc -Pipe 254 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1848 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 258 -InterruptEvent 25c -NGENProcess 248 -Pipe 250 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2492 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 25c -InterruptEvent 260 -NGENProcess 208 -Pipe 228 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2296 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 260 -InterruptEvent 264 -NGENProcess 1dc -Pipe 1b0 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:1292 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 264 -InterruptEvent 208 -NGENProcess 1dc -Pipe 258 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2680 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 208 -InterruptEvent 270 -NGENProcess 268 -Pipe 26c -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:268 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 274 -InterruptEvent 264 -NGENProcess 25c -Pipe 270 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2868 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 264 -InterruptEvent 27c -NGENProcess 24c -Pipe 278 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:1552 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 27c -InterruptEvent 24c -NGENProcess 274 -Pipe 1dc -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2284 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 24c -InterruptEvent 284 -NGENProcess 25c -Pipe 208 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:2452 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 284 -InterruptEvent 25c -NGENProcess 27c -Pipe 280 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1700 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 25c -InterruptEvent 23c -NGENProcess 288 -Pipe 264 -Comment "NGen Worker Process"2⤵
- Loads dropped DLL
- Drops file in Windows directory
PID:2360 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 23c -InterruptEvent 288 -NGENProcess 284 -Pipe 1e4 -Comment "NGen Worker Process"2⤵PID:2836
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 288 -InterruptEvent 294 -NGENProcess 27c -Pipe 24c -Comment "NGen Worker Process"2⤵
- Loads dropped DLL
- Drops file in Windows directory
PID:2708 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 294 -InterruptEvent 27c -NGENProcess 23c -Pipe 290 -Comment "NGen Worker Process"2⤵PID:2628
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 27c -InterruptEvent 29c -NGENProcess 284 -Pipe 25c -Comment "NGen Worker Process"2⤵
- Loads dropped DLL
- Drops file in Windows directory
PID:1700 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 29c -InterruptEvent 284 -NGENProcess 294 -Pipe 298 -Comment "NGen Worker Process"2⤵PID:2360
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 284 -InterruptEvent 248 -NGENProcess 2a0 -Pipe 288 -Comment "NGen Worker Process"2⤵
- Loads dropped DLL
- Drops file in Windows directory
PID:2216 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 248 -InterruptEvent 2a0 -NGENProcess 29c -Pipe 28c -Comment "NGen Worker Process"2⤵PID:2896
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2ac -InterruptEvent 274 -NGENProcess 27c -Pipe 2a0 -Comment "NGen Worker Process"2⤵
- Loads dropped DLL
- Drops file in Windows directory
PID:2628 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 274 -InterruptEvent 27c -NGENProcess 294 -Pipe 284 -Comment "NGen Worker Process"2⤵PID:1808
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 27c -InterruptEvent 2b8 -NGENProcess 2a8 -Pipe 23c -Comment "NGen Worker Process"2⤵
- Loads dropped DLL
- Drops file in Windows directory
PID:2836 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2b8 -InterruptEvent 2a8 -NGENProcess 274 -Pipe 2b4 -Comment "NGen Worker Process"2⤵PID:2444
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2a8 -InterruptEvent 29c -NGENProcess 2a4 -Pipe 2b0 -Comment "NGen Worker Process"2⤵
- Loads dropped DLL
- Drops file in Windows directory
PID:2868 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 29c -InterruptEvent 2a4 -NGENProcess 2b8 -Pipe 2c0 -Comment "NGen Worker Process"2⤵PID:1884
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2a4 -InterruptEvent 2c8 -NGENProcess 274 -Pipe 27c -Comment "NGen Worker Process"2⤵
- Loads dropped DLL
- Drops file in Windows directory
PID:988 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2c8 -InterruptEvent 274 -NGENProcess 29c -Pipe 2c4 -Comment "NGen Worker Process"2⤵PID:2896
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 274 -InterruptEvent 2d0 -NGENProcess 2b8 -Pipe 2a8 -Comment "NGen Worker Process"2⤵
- Loads dropped DLL
- Drops file in Windows directory
PID:2528 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2d0 -InterruptEvent 2b8 -NGENProcess 2c8 -Pipe 2cc -Comment "NGen Worker Process"2⤵PID:2812
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2b8 -InterruptEvent 2d8 -NGENProcess 29c -Pipe 2a4 -Comment "NGen Worker Process"2⤵
- Loads dropped DLL
- Drops file in Windows directory
PID:1836 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2dc -InterruptEvent 2d0 -NGENProcess 2e0 -Pipe 2b8 -Comment "NGen Worker Process"2⤵PID:1832
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2d0 -InterruptEvent 2bc -NGENProcess 29c -Pipe 274 -Comment "NGen Worker Process"2⤵
- Loads dropped DLL
PID:1604 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2bc -InterruptEvent 29c -NGENProcess 2dc -Pipe 2d8 -Comment "NGen Worker Process"2⤵PID:3044
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 29c -InterruptEvent 2e8 -NGENProcess 2e0 -Pipe 294 -Comment "NGen Worker Process"2⤵
- Loads dropped DLL
- Drops file in Windows directory
PID:2896 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2e8 -InterruptEvent 29c -NGENProcess 2f0 -Pipe 2bc -Comment "NGen Worker Process"2⤵
- Modifies data under HKEY_USERS
PID:1604 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 29c -InterruptEvent 2d4 -NGENProcess 2e0 -Pipe 2d0 -Comment "NGen Worker Process"2⤵PID:2360
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2d4 -InterruptEvent 2f4 -NGENProcess 2ec -Pipe 2c8 -Comment "NGen Worker Process"2⤵PID:2004
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2f4 -InterruptEvent 2f8 -NGENProcess 2f0 -Pipe 2e4 -Comment "NGen Worker Process"2⤵PID:2720
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2f8 -InterruptEvent 2fc -NGENProcess 2e0 -Pipe 2ac -Comment "NGen Worker Process"2⤵PID:1104
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2fc -InterruptEvent 300 -NGENProcess 2ec -Pipe 2e8 -Comment "NGen Worker Process"2⤵
- Loads dropped DLL
- Drops file in Windows directory
PID:1120 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 300 -InterruptEvent 2ec -NGENProcess 2f8 -Pipe 2f0 -Comment "NGen Worker Process"2⤵
- Loads dropped DLL
- Drops file in Windows directory
PID:1604 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2ec -InterruptEvent 2f8 -NGENProcess 29c -Pipe 2e0 -Comment "NGen Worker Process"2⤵PID:2956
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2f8 -InterruptEvent 30c -NGENProcess 304 -Pipe 2f4 -Comment "NGen Worker Process"2⤵
- Loads dropped DLL
- Drops file in Windows directory
PID:1292 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 30c -InterruptEvent 304 -NGENProcess 2ec -Pipe 308 -Comment "NGen Worker Process"2⤵PID:664
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 304 -InterruptEvent 314 -NGENProcess 29c -Pipe 300 -Comment "NGen Worker Process"2⤵PID:1676
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 314 -InterruptEvent 318 -NGENProcess 310 -Pipe 2d4 -Comment "NGen Worker Process"2⤵PID:2636
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 31c -InterruptEvent 304 -NGENProcess 320 -Pipe 314 -Comment "NGen Worker Process"2⤵PID:2796
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 304 -InterruptEvent 2f8 -NGENProcess 310 -Pipe 2fc -Comment "NGen Worker Process"2⤵PID:828
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2f8 -InterruptEvent 324 -NGENProcess 318 -Pipe 2dc -Comment "NGen Worker Process"2⤵PID:2912
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 324 -InterruptEvent 328 -NGENProcess 320 -Pipe 30c -Comment "NGen Worker Process"2⤵PID:468
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 328 -InterruptEvent 32c -NGENProcess 310 -Pipe 2ec -Comment "NGen Worker Process"2⤵PID:1696
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 32c -InterruptEvent 330 -NGENProcess 318 -Pipe 31c -Comment "NGen Worker Process"2⤵PID:1320
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 330 -InterruptEvent 334 -NGENProcess 320 -Pipe 304 -Comment "NGen Worker Process"2⤵PID:2636
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 334 -InterruptEvent 338 -NGENProcess 310 -Pipe 2f8 -Comment "NGen Worker Process"2⤵PID:1928
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 338 -InterruptEvent 33c -NGENProcess 318 -Pipe 324 -Comment "NGen Worker Process"2⤵PID:1292
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 33c -InterruptEvent 340 -NGENProcess 320 -Pipe 328 -Comment "NGen Worker Process"2⤵PID:2436
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 340 -InterruptEvent 344 -NGENProcess 310 -Pipe 32c -Comment "NGen Worker Process"2⤵PID:2200
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 344 -InterruptEvent 348 -NGENProcess 318 -Pipe 330 -Comment "NGen Worker Process"2⤵PID:1792
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 348 -InterruptEvent 34c -NGENProcess 320 -Pipe 334 -Comment "NGen Worker Process"2⤵PID:1808
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 34c -InterruptEvent 350 -NGENProcess 310 -Pipe 338 -Comment "NGen Worker Process"2⤵PID:3032
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 350 -InterruptEvent 354 -NGENProcess 318 -Pipe 33c -Comment "NGen Worker Process"2⤵PID:2704
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 354 -InterruptEvent 358 -NGENProcess 320 -Pipe 340 -Comment "NGen Worker Process"2⤵PID:1092
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 358 -InterruptEvent 35c -NGENProcess 310 -Pipe 344 -Comment "NGen Worker Process"2⤵PID:1592
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 35c -InterruptEvent 360 -NGENProcess 318 -Pipe 348 -Comment "NGen Worker Process"2⤵PID:3044
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 360 -InterruptEvent 364 -NGENProcess 320 -Pipe 34c -Comment "NGen Worker Process"2⤵PID:2724
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 364 -InterruptEvent 368 -NGENProcess 310 -Pipe 350 -Comment "NGen Worker Process"2⤵PID:1928
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 368 -InterruptEvent 36c -NGENProcess 318 -Pipe 354 -Comment "NGen Worker Process"2⤵
- Loads dropped DLL
- Drops file in Windows directory
PID:2284 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 36c -InterruptEvent 318 -NGENProcess 364 -Pipe 320 -Comment "NGen Worker Process"2⤵PID:476
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 318 -InterruptEvent 374 -NGENProcess 310 -Pipe 35c -Comment "NGen Worker Process"2⤵PID:2216
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 374 -InterruptEvent 378 -NGENProcess 370 -Pipe 360 -Comment "NGen Worker Process"2⤵PID:1456
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 378 -InterruptEvent 37c -NGENProcess 364 -Pipe 368 -Comment "NGen Worker Process"2⤵PID:2636
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 37c -InterruptEvent 380 -NGENProcess 310 -Pipe 358 -Comment "NGen Worker Process"2⤵PID:2856
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 380 -InterruptEvent 384 -NGENProcess 370 -Pipe 36c -Comment "NGen Worker Process"2⤵PID:268
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 380 -InterruptEvent 37c -NGENProcess 370 -Pipe 318 -Comment "NGen Worker Process"2⤵PID:2832
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 37c -InterruptEvent 38c -NGENProcess 310 -Pipe 374 -Comment "NGen Worker Process"2⤵PID:1960
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 38c -InterruptEvent 390 -NGENProcess 384 -Pipe 378 -Comment "NGen Worker Process"2⤵PID:828
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 390 -InterruptEvent 394 -NGENProcess 370 -Pipe 388 -Comment "NGen Worker Process"2⤵PID:3032
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 394 -InterruptEvent 398 -NGENProcess 310 -Pipe 364 -Comment "NGen Worker Process"2⤵PID:1764
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 398 -InterruptEvent 39c -NGENProcess 384 -Pipe 380 -Comment "NGen Worker Process"2⤵PID:1848
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 39c -InterruptEvent 3a0 -NGENProcess 370 -Pipe 37c -Comment "NGen Worker Process"2⤵PID:2192
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 3a0 -InterruptEvent 3a4 -NGENProcess 310 -Pipe 38c -Comment "NGen Worker Process"2⤵PID:1816
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 3a4 -InterruptEvent 3a8 -NGENProcess 384 -Pipe 390 -Comment "NGen Worker Process"2⤵PID:1316
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 3a8 -InterruptEvent 3ac -NGENProcess 370 -Pipe 394 -Comment "NGen Worker Process"2⤵PID:1456
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 3ac -InterruptEvent 3b0 -NGENProcess 310 -Pipe 398 -Comment "NGen Worker Process"2⤵PID:3032
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 3b0 -InterruptEvent 3b4 -NGENProcess 384 -Pipe 39c -Comment "NGen Worker Process"2⤵PID:316
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 3b4 -InterruptEvent 3b8 -NGENProcess 370 -Pipe 3a0 -Comment "NGen Worker Process"2⤵PID:2824
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 3b8 -InterruptEvent 3bc -NGENProcess 310 -Pipe 3a4 -Comment "NGen Worker Process"2⤵PID:2320
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 3bc -InterruptEvent 3c0 -NGENProcess 384 -Pipe 3a8 -Comment "NGen Worker Process"2⤵PID:2264
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 3c0 -InterruptEvent 3c4 -NGENProcess 370 -Pipe 3ac -Comment "NGen Worker Process"2⤵PID:2416
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 3c4 -InterruptEvent 3c8 -NGENProcess 310 -Pipe 3b0 -Comment "NGen Worker Process"2⤵PID:1604
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 3c8 -InterruptEvent 3cc -NGENProcess 384 -Pipe 3b4 -Comment "NGen Worker Process"2⤵PID:2284
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 3cc -InterruptEvent 3d0 -NGENProcess 370 -Pipe 3b8 -Comment "NGen Worker Process"2⤵PID:2956
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 3d0 -InterruptEvent 3d4 -NGENProcess 310 -Pipe 3bc -Comment "NGen Worker Process"2⤵PID:1784
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 3d4 -InterruptEvent 3d8 -NGENProcess 384 -Pipe 3c0 -Comment "NGen Worker Process"2⤵PID:2912
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 3d8 -InterruptEvent 3dc -NGENProcess 370 -Pipe 3c4 -Comment "NGen Worker Process"2⤵PID:1552
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 3dc -InterruptEvent 3e0 -NGENProcess 310 -Pipe 3c8 -Comment "NGen Worker Process"2⤵PID:1216
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 3e0 -InterruptEvent 3e4 -NGENProcess 384 -Pipe 3cc -Comment "NGen Worker Process"2⤵
- Modifies data under HKEY_USERS
PID:644 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 3e4 -InterruptEvent 3e8 -NGENProcess 370 -Pipe 3d0 -Comment "NGen Worker Process"2⤵
- Loads dropped DLL
- Drops file in Windows directory
- Modifies data under HKEY_USERS
PID:664 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 3d4 -InterruptEvent 3e0 -NGENProcess 3ec -Pipe 3e4 -Comment "NGen Worker Process"2⤵
- Modifies data under HKEY_USERS
PID:448 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 3e0 -InterruptEvent 3d8 -NGENProcess 370 -Pipe 29c -Comment "NGen Worker Process"2⤵
- Modifies data under HKEY_USERS
PID:3044
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵
- Executes dropped EXE
PID:1136
-
C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE"C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE" /auditservice1⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2804
-
C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"1⤵
- Executes dropped EXE
PID:2408
-
C:\Program Files (x86)\Common Files\Microsoft Shared\Source Engine\OSE.EXE"C:\Program Files (x86)\Common Files\Microsoft Shared\Source Engine\OSE.EXE"1⤵
- Executes dropped EXE
PID:1624
-
C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:832
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2248
-
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe1⤵
- Executes dropped EXE
PID:2996
-
C:\Windows\system32\dllhost.exeC:\Windows\system32\dllhost.exe /Processid:{02D4B3F1-FD88-11D1-960D-00805FC79235}1⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:804
-
C:\Windows\ehome\ehRecvr.exeC:\Windows\ehome\ehRecvr.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:1936
-
C:\Windows\ehome\ehsched.exeC:\Windows\ehome\ehsched.exe1⤵
- Executes dropped EXE
PID:828
-
C:\Windows\eHome\EhTray.exe"C:\Windows\eHome\EhTray.exe" /nav:-21⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1632
-
C:\Windows\system32\IEEtwCollector.exeC:\Windows\system32\IEEtwCollector.exe /V1⤵
- Executes dropped EXE
PID:664
-
C:\Windows\System32\msdtc.exeC:\Windows\System32\msdtc.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2880
-
C:\Windows\ehome\ehRec.exeC:\Windows\ehome\ehRec.exe -Embedding1⤵
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1576
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2440
-
C:\Windows\SysWow64\perfhost.exeC:\Windows\SysWow64\perfhost.exe1⤵
- Executes dropped EXE
PID:2884
-
C:\Windows\system32\locator.exeC:\Windows\system32\locator.exe1⤵
- Executes dropped EXE
PID:1488
-
C:\Windows\System32\snmptrap.exeC:\Windows\System32\snmptrap.exe1⤵
- Executes dropped EXE
PID:1492
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵
- Executes dropped EXE
PID:2876
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2260
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2536
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵
- Executes dropped EXE
PID:1620
-
C:\Program Files\Windows Media Player\wmpnetwk.exe"C:\Program Files\Windows Media Player\wmpnetwk.exe"1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1644
-
C:\Windows\system32\SearchIndexer.exeC:\Windows\system32\SearchIndexer.exe /Embedding1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:996 -
C:\Windows\system32\SearchProtocolHost.exe"C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe1_ Global\UsGthrCtrlFltPipeMssGthrPipe1 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon"2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:2388 -
C:\Windows\system32\SearchFilterHost.exe"C:\Windows\system32\SearchFilterHost.exe" 0 588 592 600 65536 5962⤵
- Modifies data under HKEY_USERS
PID:1648
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\Common Files\microsoft shared\Source Engine\OSE.EXEFilesize
1.3MB
MD5c167819f5c18bd8ab5409386e60c09fb
SHA11dd22922c0f9762ea4d4123ea4452873377c4a74
SHA256e5ad2cd0a22987bb0bb22611d2b1416f3f25f7494b32e2675c7a2f70db96d16d
SHA512a832db44a8912f767b284915a9ccb57cc4265c2e9deea2b3646148c9809813118f7391d33df3501bc0cf3c5c6ef41f6d5364efcc6a55854b3720dc50adb1f83c
-
C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXEFilesize
30.1MB
MD5731e30c2c4d161feb1e4a7427a3433cd
SHA14291d4120e0c7ce1e5a6125a0ad70c7c6ea86109
SHA25609fcd5813123af05ab4cdd4d97a56e42acd046325501ec344c52e828d66f4975
SHA51243564cb7c316a2ba02f9b5e4af1b45485ad4665dd78f144f713c8472b4dfba8b3ae1b2bbbe5f012ec37a39eb8359a8407bbed7fd70f70effaa61a62c49a5a20b
-
C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exeFilesize
1.4MB
MD55e65d335a1e483b173b517f472390cfb
SHA1525501088d1d66e812329b072c5087501736cee4
SHA256530424c713fa678d062fe040da1ccb37bb6523ba15178d9bd26b94d215cc5ffa
SHA512d8722ef0f64d40ac638b5ac641c75f4a3c63f9956f2093c07ff5ee527efacc30ce477b8b9afb4f36eab7fb992599b3320be725d496617c5cfc98859ff905aae8
-
C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXEFilesize
5.2MB
MD50c6f0d924a4cc5e0b54a001ceceb9291
SHA10332bf7b858d818b260ceeff878cfbd53d6fc5f0
SHA2562cd7e056a8c062a8bf494129472005eab0f23bf7d8dd57ca747eff4b73c2dce3
SHA5121c34a521c7f837408bec97f401ebab7e794d8d8e52cba339f41f9714a1e35855327bc2ebd9f85ddb72a9cc60504c0c91159f2e50f96abf0f7e8cbbd30ff3c36b
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exeFilesize
2.1MB
MD582d523f24a3c4e82a0f0c91ad3ef31ef
SHA116e044680547fcc58a1fce0afe5f853802675b9a
SHA25665f9a1e9a19eef0296497bce855f958c4733aec6365cbff4eb56608e6e804572
SHA512b534888c2e92c51c860a24880ce55b99bd7ccde1b61f3e7aef2d46f10e2747aed62beb52b0d9520adaf0137acb769c08c26a348d60c1ab46a01f81c961bcac7c
-
C:\ProgramData\Microsoft\Search\Data\Applications\Windows\MSS.logFilesize
1024KB
MD5e7f8217c603bfef3dac6c52ce5f0e0b6
SHA10098786af56fcd5cb825f50904c8b9e557dd7d17
SHA25662bad3f3509cb7790f8af73fa74a331f93f10a3243e2fa5412bc446fe48229f3
SHA512a0d0df51486f79f6531d221fb947d668f3b51e660ad62318e097fc7e0a842ee011ea84eadea5ddea446504ef9d70117e3664dca2fc7cdfb5d977d73003f1f40c
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b91050d8b077a4e8.customDestinations-msFilesize
24B
MD5b9bd716de6739e51c620f2086f9c31e4
SHA19733d94607a3cba277e567af584510edd9febf62
SHA2567116ff028244a01f3d17f1d3bc2e1506bc9999c2e40e388458f0cccc4e117312
SHA512cef609e54c7a81a646ad38dba7ac0b82401b220773b9c792cefac80c6564753229f0c011b34ffb56381dd3154a19aee2bf5f602c4d1af01f2cf0fbc1574e4478
-
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ngen_service.logFilesize
872KB
MD553db17f012f8999ef2ac00a976cd088b
SHA1c91c1ba7c6ca9d4958e971c94adbdedc91702375
SHA2560d775d9cd804170f3c046e246e8d193440571eb552f3ea15b7ae95ac0433672c
SHA51222ee897e25a4271ebc2ddf0926b2718f79d81693d008829edb97017413323d7b248dd288b0a706bfe5c30267498cb52f5a62ee56f51c6c349f55c8133a744d6d
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeFilesize
1.3MB
MD5c2bed8f49d09b987f3df6fd57ea3dbc9
SHA11f93453ce091881da36526dc9fff0e6719796962
SHA256971d562945755fb56b8ab20411da849f1d49d1861ae8fd392b08d2c0856b2ca8
SHA51255f78e90990fe8ee622a7d585fe77f39a6b61c3422e2b8f3ea34f8b17860c40148339073e41d5128608e1e3d308eb6a2d39616b92945ad96d60d3c217b57ab79
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen_service.logFilesize
8KB
MD593c4f0a11a567487b497f85608f28a9f
SHA148ce292e8b5a3125d29646bfa739429a00d940b5
SHA25661b14d24081215f4e65ed663b17708e94e218f0aca62bc83d531280385c05c98
SHA512d2fff962593a43be45927f91114933778661ec9465d9e983867ad17a987bb186b91abd1243efb31c84dec0a3c9f62e36655868a29c63ddbdb25937201ca77c1f
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exeFilesize
1.2MB
MD54c5559f15c85c366d56d6c7f7027d3f9
SHA14a48ae1822ace905bf298269bf47c72fedea9166
SHA256b555b63f17c060e0425ed494193320f278556ac0245db202c34c8a643467c5c1
SHA5125b7f593de2d89c564682bf758dc9f5a450783d81170416cf3f3893f1a1dd4eda2ea1aca97714ac52e89d0b0d7ff1388fe92efe69d8466c54205c3acc0059d42d
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\ngen_service.logFilesize
1003KB
MD59324b37797a3c1b49754cc456ac035f4
SHA1aa22e414631279e5963fa48b2f93f7939173b86d
SHA256c0cd020417c0c94394083106d28a4e11b2c0e7aa24c5815310320c45611305a0
SHA512fe1846fbb3770547b2fe811670a217e69feebe02c2d1da3900fa7766b9d8c730825198f36997d9c4bb613889d3de644e971571dadeff4d96b683e1c3bd174c54
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeFilesize
1.3MB
MD5648596fe693f8dfe0f4b4e612b05063b
SHA1624b0e85d8f356f5d3a76cecf71735390aeb8bad
SHA2564ff796bffc6b1712da90dff9dc0dc25fb92e5e95d00c71aa8b90dfdcf031095f
SHA5121330119d46c7931a4e879e67c60a5ddf3bd80120697a7eb8920d2f4ead30a05ce88a662cfae38d044425dada5fd8c47246944ba3bac924490ead25542cf18467
-
C:\Windows\SysWOW64\perfhost.exeFilesize
1.2MB
MD52aed1779b04fa99448522b2dab01fbdc
SHA180eedd766a5526238b231042da712e6aa70251c4
SHA2569511b56b65ba180b172fb587076e34306f9bb626f9352c1bb9428c822b8ec9a6
SHA51249e1db6df8a1a72dce198dfc150890dc3dc154c0e953fd1101704d85bab9a945f03998d39ce735e6ca8862a12e84ff65c61eb9803d320c2894e967645fcf9b92
-
C:\Windows\System32\Locator.exeFilesize
1.2MB
MD56d207ff1d9cf94f17bb4a582c5bde02f
SHA1fdf4a1bc3d4fd9454d223ba62e06d40660f66259
SHA25640355b6bae6ac78c7d6746e5f6110d52627373625c458129a5c620148c0096fe
SHA51286a0dbb94da6e6f1a04125683a88a9a625aa0346d5043a0217f83f3c4e4a9659e32ce182703047c698873823d695f208556c019120448aa82f6e8a3bf242d2f1
-
C:\Windows\System32\msdtc.exeFilesize
1.3MB
MD5d0d1e3c74512c236a8a1d43f4d0b3bcd
SHA130e93baa0e9fab410d2bc4745a95669eeb1802f3
SHA2564dd61d77f6fd8aa0c32bdec2112a85f5722740f273d73d823a7335041f292f95
SHA512e7ab666495119c16136773a5fb8c464eb2cccf28a39b31421ccd797ea4dab4d82d73a38db30bf2678b05a2e457880cda9c767bb75a8afdf230aa34e0d1f58d01
-
C:\Windows\System32\vds.exeFilesize
1.7MB
MD5c3e8fe9b4d42b872902cad378b3f53cc
SHA1d5a1e4047912b77af05a8c25616707bb0962e5db
SHA2562fa82acf86602160000c5af43f71ae9093f586ed1472a7f90d43093b8a1a9eb2
SHA5129982624426f243656cd803e85013463fb6bde12b387846efad2c4bd2d65794317f028a269fe6d5a1695e2bca1e77d2e9072fd4b48a7d0f34c0d6a54b24002c2b
-
C:\Windows\Temp\CabEA5F.tmpFilesize
29KB
MD5d59a6b36c5a94916241a3ead50222b6f
SHA1e274e9486d318c383bc4b9812844ba56f0cff3c6
SHA256a38d01d3f024e626d579cf052ac3bd4260bb00c34bc6085977a5f4135ab09b53
SHA51217012307955fef045e7c13bf0613bd40df27c29778ba6572640b76c18d379e02dc478e855c9276737363d0ad09b9a94f2adaa85da9c77ebb3c2d427aa68e2489
-
C:\Windows\Temp\Tar120C.tmpFilesize
81KB
MD5b13f51572f55a2d31ed9f266d581e9ea
SHA17eef3111b878e159e520f34410ad87adecf0ca92
SHA256725980edc240c928bec5a5f743fdabeee1692144da7091cf836dc7d0997cef15
SHA512f437202723b2817f2fef64b53d4eb67f782bdc61884c0c1890b46deca7ca63313ee2ad093428481f94edfcecd9c77da6e72b604998f7d551af959dbd6915809c
-
C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft-Windows-H#\a46df77acafec60e31859608625e6354\Microsoft-Windows-HomeGroupDiagnostic.NetListMgr.Interop.ni.dllFilesize
105KB
MD5d9c0055c0c93a681947027f5282d5dcd
SHA19bd104f4d6bd68d09ae2a55b1ffc30673850780f
SHA256dc7eb30a161a2f747238c8621adb963b50227a596d802b5f9110650357f7f7ed
SHA5125404050caa320cdb48a6ccd34282c12788ee8db4e00397dde936cee00e297e9e438dcaa5fcb4e92525f167637b500db074ac91971d4730d222ac4713a3e7b930
-
C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft.Office.To#\82425dbc07ec64ab599534080b6fbc08\Microsoft.Office.Tools.v9.0.ni.dllFilesize
248KB
MD54bbf44ea6ee52d7af8e58ea9c0caa120
SHA1f7dcafcf850b4081b61ec7d313d7ec35d6ac66d2
SHA256c89c478c2d7134cd28b3d28d4216ad6aa41de3edd9d87a227ec19cf1cbf3fb08
SHA512c82356750a03bd6f92f03c67acdd5e1085fbd70533a8b314ae54676f37762d9ca5fa91574529b147d3e1c983bf042106b75f41206f5ddc37094a5e1c327c0fd3
-
C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft.Office.To#\dd4deeafd891c39e6eb4a2daaafa9124\Microsoft.Office.Tools.Common.v9.0.ni.dllFilesize
1.0MB
MD5598a06ea8f1611a24f86bc0bef0f547e
SHA15a4401a54aa6cd5d8fd883702467879fb5823e37
SHA256e55484d4fe504e02cc49fde33622d1a00cdae29266775dcb7c850203d5ed2512
SHA512774e6facd3c56d1c700d9f97ee2e678d06b17e0493e8dc347be22bcba361bd6225caef702e53f0b08cacc9e6a4c4556280b43d96c928642266286f4dec8b5570
-
C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft.VisualStu#\06216e3a9e4ca262bc1e9a3818ced7fe\Microsoft.VisualStudio.Tools.Office.Excel.AddInAdapter.v9.0.ni.dllFilesize
58KB
MD53d6987fc36386537669f2450761cdd9d
SHA17a35de593dce75d1cb6a50c68c96f200a93eb0c9
SHA25634c0302fcf7d2237f914aaa484b24f5a222745f21f5b5806b9c519538665d9cb
SHA5121d74371f0b6c68ead18b083c08b7e44fcaf930a16e0641ad6cd8d8defb4bde838377741e5b827f7f05d4f0ad4550b509ba6dff787f51fc6830d8f2c88dbf0e11
-
C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft.VisualStu#\077a55be734d6ef6e2de59fa7325dac5\Microsoft.VisualStudio.Tools.Office.Contract.v9.0.ni.dllFilesize
205KB
MD50a41e63195a60814fe770be368b4992f
SHA1d826fd4e4d1c9256abd6c59ce8adb6074958a3e7
SHA2564a8ccb522a4076bcd5f217437c195b43914ea26da18096695ee689355e2740e1
SHA5121c916165eb5a2e30d4c6a67f2023ab5df4e393e22d9d8123aa5b9b8522fdb5dfe539bcb772a6e55219b23d865ee1438d066e78f0cb138a4a61cc2a1cecf54728
-
C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft.VisualStu#\2951791a1aa22719b6fdcb816f7e6c04\Microsoft.VisualStudio.Tools.Office.Contract.v10.0.ni.dllFilesize
43KB
MD568c51bcdc03e97a119431061273f045a
SHA16ecba97b7be73bf465adf3aa1d6798fedcc1e435
SHA2564a3aa6bd2a02778759886aaa884d1e8e4a089a1e0578c973fcb4fc885901ebaf
SHA512d71d6275c6f389f6b7becb54cb489da149f614454ae739e95c33a32ed805820bef14c98724882c4ebb51b4705f41b3cdb5a8ed134411011087774cac6e9d23e8
-
C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft.VisualStu#\369a81b278211f8d96a305e918172713\Microsoft.VisualStudio.Tools.Applications.Runtime.v9.0.ni.dllFilesize
198KB
MD59d9305a1998234e5a8f7047e1d8c0efe
SHA1ba7e589d4943cd4fc9f26c55e83c77559e7337a8
SHA256469ff9727392795925c7fe5625afcf508ba07e145c7940e4a12dbd6f14afc268
SHA51258b8cc718ae1a72a9d596f7779aeb0d5492a19e5d668828fd6cff1aa37181cc62878799b4c97beec9c71c67a0c215162ff544b2417f6017cd892a1ce64f7878c
-
C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft.VisualStu#\3a6cb524dfa14a3e1724fe93dcc6b414\Microsoft.VisualStudio.Tools.Office.Excel.HostAdapter.v10.0.ni.dllFilesize
271KB
MD5bceada469643a002fa4eff2e4b59a32a
SHA1d9ba497f58006d113653c4232e55623e0e17ae80
SHA256a9cb08c99f09b52a92895180a6de94857395d0456c04be02c492eb2658eca77c
SHA51281ab8d0d828202327dc7f1e4f00234e31130eb47e2a344b09218e22b1e81bd692934bc96d5e9ad6aaf90162da2066bac21f464d2ca195a595499cd1cbb0d4f47
-
C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft.VisualStu#\45e2086198833bcd2f22811c8c89fc25\Microsoft.VisualStudio.Tools.Office.HostAdapter.v10.0.ni.dllFilesize
221KB
MD54ef5bd84b4d77a1fa349029a95e34e1d
SHA133365ce031d00caf621dcedeb2e2b7434aacba10
SHA25617ee023b0952d77fd1bfdd52293fdbafecb34da5f20315266d3b15b3e37ff1f5
SHA512773cf1b71a2bbc4179f78f5e9a002fcefb67b8baf6649948646450d705976c530235a1889c22001b42709d206984a82061d70980a8b638328892cf4c14fce18c
-
C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft.VisualStu#\4fbe1a4b5ea2142ab9980dfe2ebb21c7\Microsoft.VisualStudio.Tools.Office.Outlook.HostAdapter.v10.0.ni.dllFilesize
122KB
MD5843d710fa62c6bc71712afd438ad6a7b
SHA1eefa7c0b7288212776ef3ce5ad8f3b2ba61ed37b
SHA2561c50dfbee38421a7561319055be8049b4c7f76c3319f8e31efdf293d416b0e78
SHA512ef8704801f01f392a502179570e1fe373475e359ec4f75bee04b256cd64f5e1cb2c32810de767b6f68647890c4322b292d72556f6703362d100ca97aa4bf2b7b
-
C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft.VisualStu#\5e4b083870feffa209e1ac68050694e5\Microsoft.VisualStudio.Tools.Office.Word.HostAdapter.v10.0.ni.dllFilesize
305KB
MD58a5ef1153aae0aa3d020aa8a1556a6ec
SHA1cab6b136a04bc3a4a914412ab2cc1c1affc9f9cd
SHA2560e367746c6c2055fc8870f3b8f0febb67387e7e19794a04e762bbbccaa59f3d3
SHA512e4f0c3f89d67d171c9e73a9e95c91dfe82a19616b885fb2d7ac490352d86a18bd2348e4a123cdb68a3f5fac7baf37afdbce9ae641ea3ce768b007d6153ddf1e3
-
C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft.VisualStu#\6e100177db1ef25970ca4a9eba03c352\Microsoft.VisualStudio.Tools.Applications.Contract.v9.0.ni.dllFilesize
70KB
MD557b601497b76f8cd4f0486d8c8bf918e
SHA1da797c446d4ca5a328f6322219f14efe90a5be54
SHA2561380d349abb6d461254118591637c8198859d8aadfdb098b8d532fdc4d776e2d
SHA5121347793a9dbff305975f4717afa9ee56443bc48586d35a64e8a375535fa9e0f6333e13c2267d5dbb7fe868aa863b23034a2e655dcd68b59dca75f17a4cbc1850
-
C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft.VisualStu#\77f00d3b4d847c1dd38a1c69e4ef5cb1\Microsoft.VisualStudio.Tools.Applications.Runtime.v10.0.ni.dllFilesize
87KB
MD5ed5c3f3402e320a8b4c6a33245a687d1
SHA14da11c966616583a817e98f7ee6fce6cde381dae
SHA256b58d8890d884e60af0124555472e23dee55905e678ec9506a3fbe00fffab0a88
SHA512d664b1f9f37c50d0e730a25ff7b79618f1ca99a0f1df0b32a4c82c95b2d15b6ef04ce5560db7407c6c3d2dff70514dac77cb0598f6d32b25362ae83fedb2bc2a
-
C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft.VisualStu#\9e076728e51ab285a8bc0f0b0a226e2c\Microsoft.VisualStudio.Tools.Applications.HostAdapter.v10.0.ni.dllFilesize
82KB
MD52eeeff61d87428ae7a2e651822adfdc4
SHA166f3811045a785626e6e1ea7bab7e42262f4c4c1
SHA25637f2ee9f8794df6d51a678c62b4838463a724fdf1bd65277cd41feaf2e6c9047
SHA512cadf3a04aa6dc2b6b781c292d73e195be5032b755616f4b49c6bdde8b3ae297519fc255b0a46280b60aaf45d4dedb9b828d33f1400792b87074f01bbab19e41a
-
C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft.VisualStu#\a58534126a42a5dbdef4573bac06c734\Microsoft.VisualStudio.Tools.Office.Word.AddInAdapter.v9.0.ni.dllFilesize
58KB
MD5a8b651d9ae89d5e790ab8357edebbffe
SHA1500cff2ba14e4c86c25c045a51aec8aa6e62d796
SHA2561c8239c49fb10c715b52e60afd0e6668592806ef447ad0c52599231f995a95d7
SHA512b4d87ee520353113bb5cf242a855057627fde9f79b74031ba11d5feee1a371612154940037954cd1e411da0c102f616be72617a583512420fd1fc743541a10ce
-
C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft.VisualStu#\bd1950e68286b869edc77261e0821c93\Microsoft.VisualStudio.Tools.Applications.AddInAdapter.v9.0.ni.dllFilesize
85KB
MD55180107f98e16bdca63e67e7e3169d22
SHA1dd2e82756dcda2f5a82125c4d743b4349955068d
SHA256d0658cbf473ef3666c758d28a1c4bcdcb25b2e515ad5251127d0906e65938f01
SHA51227d785971c28181cf9115ab14de066931c4d81f8d357ea8b9eabfe0f70bd5848023b69948ac6a586989e892bcde40999f8895a0bd2e7a28bac7f2fa64bb22363
-
C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft.VisualStu#\dbe51d156773fefd09c7a52feeb8ff79\Microsoft.VisualStudio.Tools.Office.AddInAdapter.v9.0.ni.dllFilesize
298KB
MD55fd34a21f44ccbeda1bf502aa162a96a
SHA11f3b1286c01dea47be5e65cb72956a2355e1ae5e
SHA2565d88539a1b7be77e11fe33572606c1093c54a80eea8bd3662f2ef5078a35ce01
SHA51258c3904cd1a06fbd3a432b3b927e189a744282cc105eda6f0d7f406971ccbc942c7403c2dcbb2d042981cf53419ca5e2cf4d9f57175e45cc5c484b0c121bb125
-
C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft.VisualStu#\fe8d06712eb58d0150803744020b072a\Microsoft.VisualStudio.Tools.Applications.Contract.v10.0.ni.dllFilesize
43KB
MD5dd1dfa421035fdfb6fd96d301a8c3d96
SHA1d535030ad8d53d57f45bc14c7c7b69efd929efb3
SHA256f71293fe6cf29af54d61bd2070df0a5ff17a661baf1b0b6c1d3393fd23ccd30c
SHA5128e0f2bee9801a4eba974132811d7274e52e6e17ccd60e8b3f74959994f007bdb0c60eb9facb6321c0fdfbcc44e9a77d8c5c776d998ccce256fa864338a6f63b1
-
C:\Windows\assembly\NativeImages_v2.0.50727_64\ehiActivScp\ee22f412f6314443add3ca412afd6569\ehiActivScp.ni.dllFilesize
124KB
MD5929653b5b019b4555b25d55e6bf9987b
SHA1993844805819ee445ff8136ee38c1aee70de3180
SHA2562766353ca5c6a87169474692562282005905f1ca82eaa08e08223fc084dbb9a2
SHA512effc809cca6170575efa7b4b23af9c49712ee9a7aaffd8f3a954c2d293be5be2cf3c388df4af2043f82b9b2ea041acdbb9d7ddd99a2fc744cce95cf4d820d013
-
C:\Windows\assembly\NativeImages_v2.0.50727_64\ehiVidCtl\11d57f5c033326954c0bc4f0b2680812\ehiVidCtl.ni.dllFilesize
2.1MB
MD510b5a285eafccdd35390bb49861657e7
SHA162c05a4380e68418463529298058f3d2de19660d
SHA2565f3bb3296ab50050e6b4ea7e95caa937720689db735c70309e5603a778be3a9a
SHA51219ff9ac75f80814ed5124adc25fc2a6d1d7b825c770e1edb8f5b6990e44f9d2d0c1c0ed75b984e729709d603350055e5a543993a80033367810c417864df1452
-
C:\Windows\assembly\NativeImages_v2.0.50727_64\stdole\70f1aed4a280583cbd09e0f5d9bbc1f5\stdole.ni.dllFilesize
88KB
MD51f394b5ca6924de6d9dbfb0e90ea50ef
SHA14e2caa5e98531c6fbf5728f4ae4d90a1ad150920
SHA2569db0e4933b95ad289129c91cd9e14a0c530f42b55e8c92dc8c881bc3dd40b998
SHA512e27ea0f7b59d41a85547d607ae3c05f32ce19fa5d008c8eaf11d0c253a73af3cfa6df25e3ee7f3920cd775e1a3a2db934e5891b4aafd4270d65a727b439f7476
-
C:\Windows\ehome\ehrecvr.exeFilesize
1.2MB
MD5067de5a6f536ea629423fc206ae18505
SHA10794cf417a548fd3b5feba504562a08fb0ca1d3a
SHA256ca096b592e9c4fa6b9f4e1369fe9d52d572f859f2228dde50d5a405b42bf27a0
SHA512f3bc322d2fd35450c17d14b911193b914e3d397d6f74b3ea78c60503000f07cc474e67c37a00ee062428202ce84fd4c32425b4d2ea5bc303dd82fafe1e07875c
-
\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exeFilesize
1.3MB
MD55241e5f364451f83859224fd854e5551
SHA19ea5ea01a5cd6f9c25593444933fda2e781201cc
SHA256ce8e01c7ffcde48572e30d4787551d63f4e38316b40ae9c73ce880ec3032a652
SHA5127f32fd57a1789e8da421d03a153100695e5fd38b5ca94b237a49e4ffc50280c8cf1fb0ea7b373f6f2318f814f4669baba5f7d1016bc10ae0551557fca7d2f84f
-
\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exeFilesize
1.2MB
MD525baff75192ed2ab5ed597ff0d44f920
SHA112285e56ac81b52bb53537d2510d22f9a1937eb3
SHA25658ecb15657c45876f54e62f5f13b84e7e4499e416842abf51d1eb6557d65462b
SHA512507b9167709435c1dfabdfb242a2279083bd321b8ed1c246f956c9db35f9a4f4f3e42af9ec443bb4c140b07c79cb1100b365a08641b4d56acfd25dc5e4b2d5a3
-
\Windows\System32\alg.exeFilesize
1.3MB
MD52336769028e0d70c987a8ee89744911c
SHA14a2076cfa0747e4d57ef685efc2e3fca865b225c
SHA2564cce6499acf454b7843f11a375a0faea1807d86c59d6bf58d534ce5b0ade1383
SHA51277f26e4b8a5b7e8c7792faff11613d5c2745aef23ac3c076ecb2380fd43bdd132ee715aeef9589f7234e9135d352212e1713e74f48e7486c4b6fd24ade7f26fe
-
\Windows\System32\dllhost.exeFilesize
1.2MB
MD53be9432c981e3eb3dc3a7ac4c26b0541
SHA186e6fa188ee3ba5b1d64abac707143ee7f778ed4
SHA25690afc48c412ff06e2a555cdda82af6d77533577ff43a2afcd20f8595d96cdf6d
SHA51273f4fce4a2a44f607ad958467cf304d12b3df9780c1a6982d8850718c5fb3dcb2e4a54b8ab150144890c00ae24bc95b858fd936eb43241b1d078b25db2454ed4
-
\Windows\System32\ieetwcollector.exeFilesize
1.3MB
MD5dd97a1bed032f9afb2687801c2d7f9e4
SHA1419c07dc9410ab652da3a13cf71c5a8487b763bf
SHA256bd6e0b9a40b1e7b6a397d69346428def01a4addb6bd3ad1a8417633ac5a526cb
SHA512cbdf6286f2b27822a8870071130112d23f35af0d2181df9d1abfbab01f75d53fd2287463882bff0195fc638c04089db6ba3b823cc2623f624561959a7e74c8d1
-
\Windows\System32\msiexec.exeFilesize
1.3MB
MD581e2a06663b37e43118d3b62283373b5
SHA1a2c88ee25ea3d7545a9b6d04010f4191b220eaaf
SHA25609c50bbb2fee7d0619f8a9ad50ac3a07be84c4ad8dff123847f4dbaf939ced4a
SHA512b8427ec88dcc543de3a17e2c9ff844ad3fda852ca08b0b5a3f89061f256d29d56f65ff5a957d38b37277e9b117566dffd9b25424237a04ee21bc75a8d54ba50d
-
\Windows\System32\snmptrap.exeFilesize
1.2MB
MD50ce913797716376336dce257775c3396
SHA14566ecab6b5e1705a44c8fcb08d926a87a96d90d
SHA256fc406d541e8091e5da348c67af6061545faf383cbb6850e85a171a48fb1c3a6d
SHA512c75714f0683c8245b070ee2243f9e319cb56c8b2cff3374a80fee005b9df805d1938856e0678e3a2b454da5573550c0475cae1db301102f46582578848d68e80
-
\Windows\ehome\ehsched.exeFilesize
1.3MB
MD5212e0c5d9c8db74f690c01110eb00f7e
SHA19792d5b0dd064731320b959aa9e6cfc0e6fbe2a9
SHA2563aaaf337e4d31d6bbfb04890bf617878f525e2522273c5e92b9fd56bd08da2e3
SHA512fe35a8e2828e2aff9eb5d55a3439293bd280fe17d1614138253f875103c959d21840cd234581ecf980dbd01dab66b16c2ac2e1c4a9985072fabdcb00797fd8c6
-
memory/268-1002-0x0000000001A00000-0x0000000001A0C000-memory.dmpFilesize
48KB
-
memory/268-1001-0x0000000001990000-0x00000000019A8000-memory.dmpFilesize
96KB
-
memory/268-1013-0x000000001B6B0000-0x000000001B6C8000-memory.dmpFilesize
96KB
-
memory/268-1012-0x000000001B6B0000-0x000000001B6C8000-memory.dmpFilesize
96KB
-
memory/268-1006-0x000000001AD60000-0x000000001AD7A000-memory.dmpFilesize
104KB
-
memory/268-1005-0x000000001AD10000-0x000000001AD58000-memory.dmpFilesize
288KB
-
memory/268-1004-0x0000000001A20000-0x0000000001A36000-memory.dmpFilesize
88KB
-
memory/268-1003-0x0000000001A10000-0x0000000001A1E000-memory.dmpFilesize
56KB
-
memory/268-1007-0x000000001B250000-0x000000001B26E000-memory.dmpFilesize
120KB
-
memory/300-448-0x0000000000400000-0x00000000005E7000-memory.dmpFilesize
1.9MB
-
memory/300-430-0x0000000000400000-0x00000000005E7000-memory.dmpFilesize
1.9MB
-
memory/320-561-0x0000000000400000-0x00000000005E7000-memory.dmpFilesize
1.9MB
-
memory/320-553-0x0000000000400000-0x00000000005E7000-memory.dmpFilesize
1.9MB
-
memory/580-413-0x0000000000400000-0x00000000005E7000-memory.dmpFilesize
1.9MB
-
memory/580-401-0x0000000000400000-0x00000000005E7000-memory.dmpFilesize
1.9MB
-
memory/656-586-0x0000000000400000-0x00000000005E7000-memory.dmpFilesize
1.9MB
-
memory/656-592-0x0000000000400000-0x00000000005E7000-memory.dmpFilesize
1.9MB
-
memory/752-417-0x0000000000400000-0x00000000005E7000-memory.dmpFilesize
1.9MB
-
memory/752-411-0x0000000000400000-0x00000000005E7000-memory.dmpFilesize
1.9MB
-
memory/832-127-0x0000000100000000-0x0000000100542000-memory.dmpFilesize
5.3MB
-
memory/832-400-0x0000000100000000-0x0000000100542000-memory.dmpFilesize
5.3MB
-
memory/860-308-0x0000000140000000-0x00000001401ED000-memory.dmpFilesize
1.9MB
-
memory/860-287-0x0000000140000000-0x00000001401ED000-memory.dmpFilesize
1.9MB
-
memory/1136-78-0x00000000002E0000-0x0000000000340000-memory.dmpFilesize
384KB
-
memory/1136-72-0x00000000002E0000-0x0000000000340000-memory.dmpFilesize
384KB
-
memory/1136-347-0x0000000140000000-0x0000000140237000-memory.dmpFilesize
2.2MB
-
memory/1136-80-0x0000000140000000-0x0000000140237000-memory.dmpFilesize
2.2MB
-
memory/1196-348-0x0000000000400000-0x00000000005E7000-memory.dmpFilesize
1.9MB
-
memory/1196-361-0x0000000000400000-0x00000000005E7000-memory.dmpFilesize
1.9MB
-
memory/1292-968-0x000000001AED0000-0x000000001AEDE000-memory.dmpFilesize
56KB
-
memory/1292-963-0x000000001AA50000-0x000000001AA5E000-memory.dmpFilesize
56KB
-
memory/1292-966-0x000000001AE10000-0x000000001AE26000-memory.dmpFilesize
88KB
-
memory/1292-965-0x000000001ADC0000-0x000000001AE08000-memory.dmpFilesize
288KB
-
memory/1292-964-0x000000001ADB0000-0x000000001ADBC000-memory.dmpFilesize
48KB
-
memory/1408-517-0x0000000000400000-0x00000000005E7000-memory.dmpFilesize
1.9MB
-
memory/1552-1045-0x000000001ACE0000-0x000000001ACEC000-memory.dmpFilesize
48KB
-
memory/1552-1044-0x0000000001860000-0x000000000186C000-memory.dmpFilesize
48KB
-
memory/1552-1046-0x000000001ACF0000-0x000000001ACFE000-memory.dmpFilesize
56KB
-
memory/1600-6-0x00000000002C0000-0x0000000000327000-memory.dmpFilesize
412KB
-
memory/1600-27-0x0000000000400000-0x0000000000632000-memory.dmpFilesize
2.2MB
-
memory/1600-0-0x0000000000400000-0x0000000000632000-memory.dmpFilesize
2.2MB
-
memory/1600-1-0x00000000002C0000-0x0000000000327000-memory.dmpFilesize
412KB
-
memory/1624-116-0x000000002E000000-0x000000002E1F4000-memory.dmpFilesize
2.0MB
-
memory/1624-387-0x000000002E000000-0x000000002E1F4000-memory.dmpFilesize
2.0MB
-
memory/1704-483-0x0000000000400000-0x00000000005E7000-memory.dmpFilesize
1.9MB
-
memory/1764-429-0x0000000000400000-0x00000000005E7000-memory.dmpFilesize
1.9MB
-
memory/1764-423-0x0000000000400000-0x00000000005E7000-memory.dmpFilesize
1.9MB
-
memory/1776-589-0x0000000000400000-0x00000000005E7000-memory.dmpFilesize
1.9MB
-
memory/1776-575-0x0000000000400000-0x00000000005E7000-memory.dmpFilesize
1.9MB
-
memory/1808-363-0x0000000000400000-0x00000000005E7000-memory.dmpFilesize
1.9MB
-
memory/1808-366-0x0000000000400000-0x00000000005E7000-memory.dmpFilesize
1.9MB
-
memory/1832-530-0x0000000000400000-0x00000000005E7000-memory.dmpFilesize
1.9MB
-
memory/1832-534-0x0000000000400000-0x00000000005E7000-memory.dmpFilesize
1.9MB
-
memory/2100-13-0x00000000008D0000-0x0000000000930000-memory.dmpFilesize
384KB
-
memory/2100-12-0x0000000100000000-0x00000001001E3000-memory.dmpFilesize
1.9MB
-
memory/2100-115-0x0000000100000000-0x00000001001E3000-memory.dmpFilesize
1.9MB
-
memory/2100-19-0x00000000008D0000-0x0000000000930000-memory.dmpFilesize
384KB
-
memory/2100-20-0x00000000008D0000-0x0000000000930000-memory.dmpFilesize
384KB
-
memory/2224-379-0x0000000000400000-0x00000000005E7000-memory.dmpFilesize
1.9MB
-
memory/2224-372-0x0000000000400000-0x00000000005E7000-memory.dmpFilesize
1.9MB
-
memory/2256-456-0x0000000000400000-0x00000000005E7000-memory.dmpFilesize
1.9MB
-
memory/2256-464-0x0000000000400000-0x00000000005E7000-memory.dmpFilesize
1.9MB
-
memory/2296-948-0x000000001ADC0000-0x000000001AE08000-memory.dmpFilesize
288KB
-
memory/2296-949-0x000000001AE10000-0x000000001AE26000-memory.dmpFilesize
88KB
-
memory/2296-947-0x0000000000E70000-0x0000000000E7C000-memory.dmpFilesize
48KB
-
memory/2296-946-0x0000000000CB0000-0x0000000000CBE000-memory.dmpFilesize
56KB
-
memory/2392-518-0x0000000000400000-0x00000000005E7000-memory.dmpFilesize
1.9MB
-
memory/2392-522-0x0000000000400000-0x00000000005E7000-memory.dmpFilesize
1.9MB
-
memory/2408-99-0x00000000009E0000-0x0000000000A40000-memory.dmpFilesize
384KB
-
memory/2408-101-0x0000000140000000-0x0000000140209000-memory.dmpFilesize
2.0MB
-
memory/2408-105-0x0000000140000000-0x0000000140209000-memory.dmpFilesize
2.0MB
-
memory/2408-93-0x00000000009E0000-0x0000000000A40000-memory.dmpFilesize
384KB
-
memory/2496-335-0x0000000000400000-0x00000000005E7000-memory.dmpFilesize
1.9MB
-
memory/2496-346-0x0000000000400000-0x00000000005E7000-memory.dmpFilesize
1.9MB
-
memory/2508-286-0x0000000000400000-0x00000000005E7000-memory.dmpFilesize
1.9MB
-
memory/2508-50-0x0000000000360000-0x00000000003C7000-memory.dmpFilesize
412KB
-
memory/2508-42-0x0000000000400000-0x00000000005E7000-memory.dmpFilesize
1.9MB
-
memory/2508-43-0x0000000000360000-0x00000000003C7000-memory.dmpFilesize
412KB
-
memory/2512-56-0x0000000140000000-0x00000001401ED000-memory.dmpFilesize
1.9MB
-
memory/2512-63-0x00000000002F0000-0x0000000000350000-memory.dmpFilesize
384KB
-
memory/2512-334-0x0000000140000000-0x00000001401ED000-memory.dmpFilesize
1.9MB
-
memory/2512-57-0x00000000002F0000-0x0000000000350000-memory.dmpFilesize
384KB
-
memory/2600-499-0x0000000000400000-0x00000000005E7000-memory.dmpFilesize
1.9MB
-
memory/2600-495-0x0000000003EF0000-0x0000000003FAA000-memory.dmpFilesize
744KB
-
memory/2680-988-0x000000001AD60000-0x000000001AD7A000-memory.dmpFilesize
104KB
-
memory/2680-986-0x0000000000F30000-0x0000000000F48000-memory.dmpFilesize
96KB
-
memory/2680-989-0x000000001AD80000-0x000000001AD9E000-memory.dmpFilesize
120KB
-
memory/2680-987-0x0000000000F60000-0x0000000000F6E000-memory.dmpFilesize
56KB
-
memory/2732-30-0x0000000140000000-0x00000001401DC000-memory.dmpFilesize
1.9MB
-
memory/2732-282-0x0000000140000000-0x00000001401DC000-memory.dmpFilesize
1.9MB
-
memory/2732-31-0x0000000000AE0000-0x0000000000B40000-memory.dmpFilesize
384KB
-
memory/2732-39-0x0000000000AE0000-0x0000000000B40000-memory.dmpFilesize
384KB
-
memory/2740-331-0x0000000000400000-0x00000000005E7000-memory.dmpFilesize
1.9MB
-
memory/2740-320-0x0000000000400000-0x00000000005E7000-memory.dmpFilesize
1.9MB
-
memory/2804-88-0x00000000004F0000-0x0000000000557000-memory.dmpFilesize
412KB
-
memory/2804-84-0x00000000004F0000-0x0000000000557000-memory.dmpFilesize
412KB
-
memory/2804-362-0x000000002E000000-0x000000002FE1E000-memory.dmpFilesize
30.1MB
-
memory/2804-90-0x000000002E000000-0x000000002FE1E000-memory.dmpFilesize
30.1MB
-
memory/2836-388-0x0000000000400000-0x00000000005E7000-memory.dmpFilesize
1.9MB
-
memory/2836-399-0x0000000000400000-0x00000000005E7000-memory.dmpFilesize
1.9MB
-
memory/2852-550-0x0000000000400000-0x00000000005E7000-memory.dmpFilesize
1.9MB
-
memory/2868-1032-0x000000001AE60000-0x000000001AE70000-memory.dmpFilesize
64KB
-
memory/2868-1031-0x000000001AA50000-0x000000001AA5C000-memory.dmpFilesize
48KB
-
memory/2916-569-0x0000000000400000-0x00000000005E7000-memory.dmpFilesize
1.9MB
-
memory/2916-565-0x0000000000400000-0x00000000005E7000-memory.dmpFilesize
1.9MB
-
memory/2936-460-0x0000000000400000-0x00000000005E7000-memory.dmpFilesize
1.9MB
-
memory/3032-492-0x0000000000400000-0x00000000005E7000-memory.dmpFilesize
1.9MB
-
memory/3032-480-0x0000000000400000-0x00000000005E7000-memory.dmpFilesize
1.9MB
-
memory/3032-306-0x0000000140000000-0x00000001401ED000-memory.dmpFilesize
1.9MB
-
memory/3032-311-0x0000000140000000-0x00000001401ED000-memory.dmpFilesize
1.9MB