Analysis
-
max time kernel
132s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28-04-2024 20:14
Static task
static1
Behavioral task
behavioral1
Sample
ab25e9038563287542296604eecdec2a2e87c8c13c23dd8ea809661550b08d7f.exe
Resource
win7-20240221-en
General
-
Target
ab25e9038563287542296604eecdec2a2e87c8c13c23dd8ea809661550b08d7f.exe
-
Size
1.8MB
-
MD5
3dff9dc6afcd41fd3a4d3a31e7ffe05b
-
SHA1
e462ded58cfa211456424c646843392ae4310777
-
SHA256
ab25e9038563287542296604eecdec2a2e87c8c13c23dd8ea809661550b08d7f
-
SHA512
74437526278a10bbdd02ff1465ab4f69002ddd04dc601dad28f4bfa63f779d50d89ae823ab22359b075848841ede50aff809f371e88be9e62ad8c803f7415767
-
SSDEEP
49152:nKJ0WR7AFPyyiSruXKpk3WFDL9zxnSNblI7a8K2mFhbrr:nKlBAFPydSS6W6X9ln4lI7K2mF9
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
Processes:
alg.exeaspnet_state.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exedllhost.exeehRecvr.exeelevation_service.exeGROOVE.EXEmaintenanceservice.exeOSE.EXEOSPPSVC.EXEmscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exeehsched.exeIEEtwCollector.exemsdtc.exemsiexec.exeperfhost.exelocator.exesnmptrap.exevds.exevssvc.exewbengine.exeWmiApSrv.exewmpnetwk.exeSearchIndexer.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exepid process 472 2156 alg.exe 580 aspnet_state.exe 1728 mscorsvw.exe 2212 mscorsvw.exe 2256 mscorsvw.exe 1756 mscorsvw.exe 2780 dllhost.exe 276 ehRecvr.exe 2364 elevation_service.exe 2940 GROOVE.EXE 3044 maintenanceservice.exe 2560 OSE.EXE 2456 OSPPSVC.EXE 776 mscorsvw.exe 768 mscorsvw.exe 1808 mscorsvw.exe 908 mscorsvw.exe 2360 mscorsvw.exe 2528 mscorsvw.exe 888 mscorsvw.exe 2384 mscorsvw.exe 676 mscorsvw.exe 1172 mscorsvw.exe 240 mscorsvw.exe 2820 mscorsvw.exe 2992 mscorsvw.exe 2660 mscorsvw.exe 2672 mscorsvw.exe 2084 mscorsvw.exe 1740 mscorsvw.exe 1444 mscorsvw.exe 2320 mscorsvw.exe 2020 mscorsvw.exe 2000 mscorsvw.exe 1940 mscorsvw.exe 2100 mscorsvw.exe 2324 mscorsvw.exe 1888 mscorsvw.exe 1176 ehsched.exe 852 IEEtwCollector.exe 2020 msdtc.exe 1968 msiexec.exe 2968 perfhost.exe 2100 locator.exe 3044 snmptrap.exe 3036 vds.exe 2856 vssvc.exe 1648 wbengine.exe 1768 WmiApSrv.exe 2192 wmpnetwk.exe 1048 SearchIndexer.exe 924 mscorsvw.exe 2828 mscorsvw.exe 1300 mscorsvw.exe 2104 mscorsvw.exe 1292 mscorsvw.exe 1584 mscorsvw.exe 240 mscorsvw.exe 2528 mscorsvw.exe 3068 mscorsvw.exe 2532 mscorsvw.exe 2116 mscorsvw.exe 1688 mscorsvw.exe -
Loads dropped DLL 51 IoCs
Processes:
msiexec.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exepid process 472 472 472 472 472 472 472 472 1968 msiexec.exe 472 472 472 472 472 744 1292 mscorsvw.exe 1292 mscorsvw.exe 240 mscorsvw.exe 240 mscorsvw.exe 3068 mscorsvw.exe 3068 mscorsvw.exe 2116 mscorsvw.exe 2116 mscorsvw.exe 1840 mscorsvw.exe 1840 mscorsvw.exe 2888 mscorsvw.exe 2888 mscorsvw.exe 932 mscorsvw.exe 932 mscorsvw.exe 2196 mscorsvw.exe 2196 mscorsvw.exe 2888 mscorsvw.exe 2888 mscorsvw.exe 1844 mscorsvw.exe 1844 mscorsvw.exe 692 mscorsvw.exe 692 mscorsvw.exe 2556 mscorsvw.exe 2556 mscorsvw.exe 2828 mscorsvw.exe 2828 mscorsvw.exe 1972 mscorsvw.exe 1972 mscorsvw.exe 1676 mscorsvw.exe 1676 mscorsvw.exe 1984 mscorsvw.exe 1984 mscorsvw.exe 960 mscorsvw.exe 960 mscorsvw.exe 2564 mscorsvw.exe 2564 mscorsvw.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in System32 directory 18 IoCs
Processes:
ab25e9038563287542296604eecdec2a2e87c8c13c23dd8ea809661550b08d7f.exeGROOVE.EXEaspnet_state.exemsdtc.exealg.exeSearchProtocolHost.exedescription ioc process File opened for modification C:\Windows\system32\dllhost.exe ab25e9038563287542296604eecdec2a2e87c8c13c23dd8ea809661550b08d7f.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat GROOVE.EXE File opened for modification C:\Windows\system32\IEEtwCollector.exe aspnet_state.exe File opened for modification C:\Windows\system32\MSDtc\MSDTC.LOG msdtc.exe File opened for modification C:\Windows\system32\vssvc.exe aspnet_state.exe File opened for modification C:\Windows\system32\SearchIndexer.exe aspnet_state.exe File opened for modification C:\Windows\System32\alg.exe ab25e9038563287542296604eecdec2a2e87c8c13c23dd8ea809661550b08d7f.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Roaming\f4b489f9ae4ef42b.bin alg.exe File opened for modification C:\Windows\System32\msdtc.exe aspnet_state.exe File opened for modification C:\Windows\system32\wbengine.exe aspnet_state.exe File opened for modification C:\Windows\system32\fxssvc.exe aspnet_state.exe File opened for modification C:\Windows\SysWow64\perfhost.exe aspnet_state.exe File opened for modification C:\Windows\system32\locator.exe aspnet_state.exe File opened for modification C:\Windows\System32\vds.exe aspnet_state.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat SearchProtocolHost.exe File opened for modification C:\Windows\system32\msiexec.exe aspnet_state.exe File opened for modification C:\Windows\System32\snmptrap.exe aspnet_state.exe File opened for modification C:\Windows\system32\wbem\WmiApSrv.exe aspnet_state.exe -
Drops file in Program Files directory 64 IoCs
Processes:
ab25e9038563287542296604eecdec2a2e87c8c13c23dd8ea809661550b08d7f.exealg.exeaspnet_state.exedescription ioc process File created C:\Program Files (x86)\Google\Temp\GUM9176.tmp\goopdateres_am.dll ab25e9038563287542296604eecdec2a2e87c8c13c23dd8ea809661550b08d7f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jarsigner.exe alg.exe File created C:\Program Files (x86)\Google\Temp\GUM9176.tmp\goopdateres_en-GB.dll ab25e9038563287542296604eecdec2a2e87c8c13c23dd8ea809661550b08d7f.exe File created C:\Program Files (x86)\Google\Temp\GUM9176.tmp\goopdateres_ml.dll ab25e9038563287542296604eecdec2a2e87c8c13c23dd8ea809661550b08d7f.exe File created C:\Program Files (x86)\Google\Temp\GUM9176.tmp\goopdateres_sr.dll ab25e9038563287542296604eecdec2a2e87c8c13c23dd8ea809661550b08d7f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\ktab.exe alg.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\policytool.exe alg.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jps.exe aspnet_state.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\launcher.exe aspnet_state.exe File opened for modification C:\Program Files\Mozilla Firefox\updater.exe aspnet_state.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jps.exe alg.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jstat.exe alg.exe File opened for modification C:\Program Files\Java\jre7\bin\rmiregistry.exe alg.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jarsigner.exe aspnet_state.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\unpack200.exe aspnet_state.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\ssvagent.exe aspnet_state.exe File opened for modification C:\Program Files\Mozilla Firefox\crashreporter.exe aspnet_state.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc.exe aspnet_state.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\MSInfo\msinfo32.exe aspnet_state.exe File created C:\Program Files (x86)\Google\Temp\GUM9176.tmp\psuser.dll ab25e9038563287542296604eecdec2a2e87c8c13c23dd8ea809661550b08d7f.exe File created C:\Program Files (x86)\Google\Temp\GUM9176.tmp\goopdateres_it.dll ab25e9038563287542296604eecdec2a2e87c8c13c23dd8ea809661550b08d7f.exe File created C:\Program Files (x86)\Google\Temp\GUM9176.tmp\goopdateres_sw.dll ab25e9038563287542296604eecdec2a2e87c8c13c23dd8ea809661550b08d7f.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\chrmstp.exe alg.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jconsole.exe aspnet_state.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jstat.exe aspnet_state.exe File opened for modification C:\Program Files\Java\jre7\bin\java-rmi.exe aspnet_state.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jinfo.exe alg.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc-cache-gen.exe aspnet_state.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Source Engine\OSE.EXE aspnet_state.exe File created C:\Program Files (x86)\Google\Temp\GUM9176.tmp\goopdateres_fi.dll ab25e9038563287542296604eecdec2a2e87c8c13c23dd8ea809661550b08d7f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\java.exe alg.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\java-rmi.exe aspnet_state.exe File opened for modification C:\Program Files\Java\jre7\bin\jabswitch.exe aspnet_state.exe File opened for modification C:\Program Files\Java\jre7\bin\pack200.exe aspnet_state.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroBroker.exe aspnet_state.exe File opened for modification C:\Program Files (x86)\Google\Temp\GUT9187.tmp ab25e9038563287542296604eecdec2a2e87c8c13c23dd8ea809661550b08d7f.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Updater6\AdobeUpdaterInstallMgr.exe alg.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateBroker.exe alg.exe File opened for modification C:\Program Files (x86)\Mozilla Maintenance Service\Uninstall.exe alg.exe File created C:\Program Files (x86)\Google\Temp\GUM9176.tmp\psmachine_64.dll ab25e9038563287542296604eecdec2a2e87c8c13c23dd8ea809661550b08d7f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\jabswitch.exe alg.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VSTO\10.0\VSTOInstaller.exe aspnet_state.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateComRegisterShell64.exe aspnet_state.exe File opened for modification C:\Program Files (x86)\Google\Update\DisabledGoogleUpdate.exe aspnet_state.exe File opened for modification C:\Program Files (x86)\Google\Update\Download\{8A69D345-D564-463C-AFF1-A69D9E530F96}\106.0.5249.119\chrome_installer.exe aspnet_state.exe File created C:\Program Files (x86)\Google\Temp\GUM9176.tmp\goopdateres_hu.dll ab25e9038563287542296604eecdec2a2e87c8c13c23dd8ea809661550b08d7f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\schemagen.exe alg.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc-cache-gen.exe alg.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\rmic.exe aspnet_state.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\rmiregistry.exe alg.exe File opened for modification C:\Program Files\Mozilla Firefox\crashreporter.exe alg.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateSetup.exe alg.exe File created C:\Program Files (x86)\Google\Temp\GUM9176.tmp\goopdateres_en.dll ab25e9038563287542296604eecdec2a2e87c8c13c23dd8ea809661550b08d7f.exe File created C:\Program Files (x86)\Google\Temp\GUM9176.tmp\goopdateres_no.dll ab25e9038563287542296604eecdec2a2e87c8c13c23dd8ea809661550b08d7f.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\pipanel.exe aspnet_state.exe File created C:\Program Files (x86)\Google\Temp\GUM9176.tmp\goopdate.dll ab25e9038563287542296604eecdec2a2e87c8c13c23dd8ea809661550b08d7f.exe File opened for modification C:\Program Files\Java\jre7\bin\javaws.exe alg.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\TabTip32.exe alg.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\servertool.exe aspnet_state.exe File opened for modification C:\Program Files (x86)\Google\Temp\GUM9176.tmp\GoogleUpdateSetup.exe ab25e9038563287542296604eecdec2a2e87c8c13c23dd8ea809661550b08d7f.exe File opened for modification C:\Program Files\7-Zip\7zG.exe alg.exe File opened for modification C:\Program Files\Java\jre7\bin\klist.exe alg.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jdb.exe aspnet_state.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\wsimport.exe alg.exe -
Drops file in Windows directory 64 IoCs
Processes:
aspnet_state.exemsdtc.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exeab25e9038563287542296604eecdec2a2e87c8c13c23dd8ea809661550b08d7f.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exealg.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exedllhost.exedescription ioc process File opened for modification C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe aspnet_state.exe File opened for modification C:\Windows\DtcInstall.log msdtc.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index138.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\index138.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index138.dat mscorsvw.exe File created C:\Windows\assembly\GACLock.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\index142.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\Temp\ZAP73D9.tmp\Microsoft.VisualStudio.Tools.Office.Outlook.HostAdapter.v10.0.dll mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index143.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index135.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\Temp\ZAP757E.tmp\Microsoft.VisualStudio.Tools.Office.Word.HostAdapter.v10.0.dll mscorsvw.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe ab25e9038563287542296604eecdec2a2e87c8c13c23dd8ea809661550b08d7f.exe File opened for modification C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe aspnet_state.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\index143.dat mscorsvw.exe File created C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngenservicelock.dat mscorsvw.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen_service.log mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\Temp\ZAP5FCC.tmp\Microsoft.Office.Tools.v9.0.dll mscorsvw.exe File created C:\Windows\assembly\ngenlock.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\index13f.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index141.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index143.dat mscorsvw.exe File created C:\Windows\Microsoft.NET\ngennicupdatelock.dat mscorsvw.exe File created C:\Windows\assembly\ngenlock.dat mscorsvw.exe File created C:\Windows\assembly\GACLock.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index13e.dat mscorsvw.exe File created C:\Windows\assembly\GACLock.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index140.dat mscorsvw.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe ab25e9038563287542296604eecdec2a2e87c8c13c23dd8ea809661550b08d7f.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\index136.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index135.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\index144.dat mscorsvw.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ngen_service.lock mscorsvw.exe File created C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngenservicelock.dat mscorsvw.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe alg.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index139.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index13a.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index13c.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\index145.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index146.dat mscorsvw.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ngen_service.log mscorsvw.exe File created C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngenrootstorelock.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index13d.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\Temp\ZAP690F.tmp\Microsoft.VisualStudio.Tools.Office.Contract.v10.0.dll mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index13d.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\index141.dat mscorsvw.exe File created C:\Windows\Microsoft.NET\Framework\v2.0.50727\ngen_service.lock mscorsvw.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe alg.exe File created C:\Windows\Microsoft.NET\ngennicupdatelock.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\Temp\ZAP5255.tmp\Microsoft.VisualStudio.Tools.Applications.AddInAdapter.v9.0.dll mscorsvw.exe File created C:\Windows\assembly\GACLock.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index13b.dat mscorsvw.exe File opened for modification C:\Windows\Registration\{02D4B3F1-FD88-11D1-960D-00805FC79235}.{7BC55D47-9B73-4F81-AF32-5D5099803147}.crmlog dllhost.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index135.dat mscorsvw.exe File created C:\Windows\assembly\ngenlock.dat mscorsvw.exe File created C:\Windows\assembly\ngenlock.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index136.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index139.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index13b.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\Temp\ZAP81AE.tmp\ehiVidCtl.dll mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\index13a.dat mscorsvw.exe File created C:\Windows\assembly\ngenlock.dat mscorsvw.exe File created C:\Windows\assembly\GACLock.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index139.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index144.dat mscorsvw.exe -
Modifies data under HKEY_USERS 64 IoCs
Processes:
ehRec.exemscorsvw.exemscorsvw.exeSearchIndexer.exeSearchProtocolHost.exemscorsvw.exeehRecvr.exeSearchFilterHost.exewmpnetwk.exedescription ioc process Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE\SAL\CriticalLowDiskSpace = "1073741824" ehRec.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\Certificates mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\Certificates mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CRLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections SearchIndexer.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE\SAL\CommitMaxCheckPointPageCount = "7" ehRec.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE\SAL\NvpClientsCount = "32" ehRec.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\eHome\ehepgres.dll,-304 = "Public Recorded TV" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\Certificates mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\Certificates mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CRLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CRLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople mscorsvw.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\system32\SampleRes.dll,-107 = "Lighthouse" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\system32\SampleRes.dll,-103 = "Hydrangeas" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\system32\SampleRes.dll,-117 = "Maid with the Flaxen Hair" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\System32\ieframe.dll,-913 = "MHTML Document" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CRLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum 64-bit ehRecvr.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\system32\SampleRes.dll,-118 = "Sleep Away" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\Certificates mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My SearchFilterHost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CRLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CRLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CTLs mscorsvw.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\system32\SampleRes.dll,-104 = "Jellyfish" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CTLs mscorsvw.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE\SAL\CacheHashTableSize = "67" ehRec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CRLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft wmpnetwk.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap SearchIndexer.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Program Files\windows journal\journal.exe,-62005 = "Tablet PC" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\Certificates mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft SearchFilterHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Multimedia\ActiveMovie SearchFilterHost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CRLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\MPEG2Demultiplexer SearchFilterHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\system32\SampleRes.dll,-102 = "Desert" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\system32\notepad.exe,-469 = "Text Document" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\system32\sud.dll,-1 = "Default Programs" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE\SAL ehRec.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE\SAL\FileGrowthBudgetMs = "45000" ehRec.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\system32\SampleRes.dll,-101 = "Chrysanthemum" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CRLs mscorsvw.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32,@elscore.dll,-4 = "Microsoft Simplified Chinese to Traditional Chinese Transliteration" SearchIndexer.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32,@elscore.dll,-7 = "Microsoft Devanagari to Latin Transliteration" SearchIndexer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\MediaPlayer wmpnetwk.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
ehRec.exeaspnet_state.exepid process 2320 ehRec.exe 580 aspnet_state.exe 580 aspnet_state.exe 580 aspnet_state.exe 580 aspnet_state.exe 580 aspnet_state.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
ab25e9038563287542296604eecdec2a2e87c8c13c23dd8ea809661550b08d7f.exemscorsvw.exemscorsvw.exealg.exeaspnet_state.exeEhTray.exemsiexec.exeehRec.exevssvc.exewbengine.exewmpnetwk.exeSearchIndexer.exedescription pid process Token: SeTakeOwnershipPrivilege 1440 ab25e9038563287542296604eecdec2a2e87c8c13c23dd8ea809661550b08d7f.exe Token: SeShutdownPrivilege 2256 mscorsvw.exe Token: SeShutdownPrivilege 1756 mscorsvw.exe Token: SeShutdownPrivilege 2256 mscorsvw.exe Token: SeShutdownPrivilege 1756 mscorsvw.exe Token: SeShutdownPrivilege 2256 mscorsvw.exe Token: SeShutdownPrivilege 2256 mscorsvw.exe Token: SeShutdownPrivilege 1756 mscorsvw.exe Token: SeShutdownPrivilege 1756 mscorsvw.exe Token: SeDebugPrivilege 2156 alg.exe Token: SeShutdownPrivilege 2256 mscorsvw.exe Token: SeShutdownPrivilege 1756 mscorsvw.exe Token: SeTakeOwnershipPrivilege 580 aspnet_state.exe Token: 33 1276 EhTray.exe Token: SeIncBasePriorityPrivilege 1276 EhTray.exe Token: SeShutdownPrivilege 2256 mscorsvw.exe Token: SeShutdownPrivilege 1756 mscorsvw.exe Token: SeRestorePrivilege 1968 msiexec.exe Token: SeTakeOwnershipPrivilege 1968 msiexec.exe Token: SeSecurityPrivilege 1968 msiexec.exe Token: SeDebugPrivilege 2320 ehRec.exe Token: SeBackupPrivilege 2856 vssvc.exe Token: SeRestorePrivilege 2856 vssvc.exe Token: SeAuditPrivilege 2856 vssvc.exe Token: SeBackupPrivilege 1648 wbengine.exe Token: SeRestorePrivilege 1648 wbengine.exe Token: SeSecurityPrivilege 1648 wbengine.exe Token: 33 1276 EhTray.exe Token: SeIncBasePriorityPrivilege 1276 EhTray.exe Token: SeDebugPrivilege 580 aspnet_state.exe Token: 33 2192 wmpnetwk.exe Token: SeIncBasePriorityPrivilege 2192 wmpnetwk.exe Token: SeManageVolumePrivilege 1048 SearchIndexer.exe Token: 33 1048 SearchIndexer.exe Token: SeIncBasePriorityPrivilege 1048 SearchIndexer.exe Token: SeShutdownPrivilege 2256 mscorsvw.exe Token: SeShutdownPrivilege 2256 mscorsvw.exe Token: SeShutdownPrivilege 2256 mscorsvw.exe Token: SeShutdownPrivilege 1756 mscorsvw.exe Token: SeShutdownPrivilege 1756 mscorsvw.exe Token: SeShutdownPrivilege 1756 mscorsvw.exe Token: SeShutdownPrivilege 2256 mscorsvw.exe Token: SeShutdownPrivilege 1756 mscorsvw.exe Token: SeShutdownPrivilege 2256 mscorsvw.exe Token: SeShutdownPrivilege 1756 mscorsvw.exe Token: SeShutdownPrivilege 2256 mscorsvw.exe Token: SeShutdownPrivilege 1756 mscorsvw.exe Token: SeShutdownPrivilege 2256 mscorsvw.exe Token: SeShutdownPrivilege 1756 mscorsvw.exe Token: SeShutdownPrivilege 2256 mscorsvw.exe Token: SeShutdownPrivilege 1756 mscorsvw.exe Token: SeShutdownPrivilege 2256 mscorsvw.exe Token: SeShutdownPrivilege 1756 mscorsvw.exe Token: SeShutdownPrivilege 2256 mscorsvw.exe Token: SeShutdownPrivilege 1756 mscorsvw.exe Token: SeShutdownPrivilege 2256 mscorsvw.exe Token: SeShutdownPrivilege 1756 mscorsvw.exe Token: SeShutdownPrivilege 2256 mscorsvw.exe Token: SeShutdownPrivilege 1756 mscorsvw.exe Token: SeShutdownPrivilege 2256 mscorsvw.exe Token: SeShutdownPrivilege 1756 mscorsvw.exe Token: SeShutdownPrivilege 2256 mscorsvw.exe Token: SeShutdownPrivilege 1756 mscorsvw.exe Token: SeShutdownPrivilege 2256 mscorsvw.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
EhTray.exepid process 1276 EhTray.exe 1276 EhTray.exe -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
EhTray.exepid process 1276 EhTray.exe 1276 EhTray.exe -
Suspicious use of SetWindowsHookEx 22 IoCs
Processes:
SearchProtocolHost.exeSearchProtocolHost.exepid process 2404 SearchProtocolHost.exe 2404 SearchProtocolHost.exe 2404 SearchProtocolHost.exe 2404 SearchProtocolHost.exe 2404 SearchProtocolHost.exe 2032 SearchProtocolHost.exe 2032 SearchProtocolHost.exe 2032 SearchProtocolHost.exe 2032 SearchProtocolHost.exe 2032 SearchProtocolHost.exe 2032 SearchProtocolHost.exe 2032 SearchProtocolHost.exe 2032 SearchProtocolHost.exe 2032 SearchProtocolHost.exe 2032 SearchProtocolHost.exe 2032 SearchProtocolHost.exe 2032 SearchProtocolHost.exe 2032 SearchProtocolHost.exe 2032 SearchProtocolHost.exe 2032 SearchProtocolHost.exe 2032 SearchProtocolHost.exe 2032 SearchProtocolHost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
mscorsvw.exedescription pid process target process PID 2256 wrote to memory of 776 2256 mscorsvw.exe mscorsvw.exe PID 2256 wrote to memory of 776 2256 mscorsvw.exe mscorsvw.exe PID 2256 wrote to memory of 776 2256 mscorsvw.exe mscorsvw.exe PID 2256 wrote to memory of 776 2256 mscorsvw.exe mscorsvw.exe PID 2256 wrote to memory of 768 2256 mscorsvw.exe mscorsvw.exe PID 2256 wrote to memory of 768 2256 mscorsvw.exe mscorsvw.exe PID 2256 wrote to memory of 768 2256 mscorsvw.exe mscorsvw.exe PID 2256 wrote to memory of 768 2256 mscorsvw.exe mscorsvw.exe PID 2256 wrote to memory of 1808 2256 mscorsvw.exe mscorsvw.exe PID 2256 wrote to memory of 1808 2256 mscorsvw.exe mscorsvw.exe PID 2256 wrote to memory of 1808 2256 mscorsvw.exe mscorsvw.exe PID 2256 wrote to memory of 1808 2256 mscorsvw.exe mscorsvw.exe PID 2256 wrote to memory of 908 2256 mscorsvw.exe mscorsvw.exe PID 2256 wrote to memory of 908 2256 mscorsvw.exe mscorsvw.exe PID 2256 wrote to memory of 908 2256 mscorsvw.exe mscorsvw.exe PID 2256 wrote to memory of 908 2256 mscorsvw.exe mscorsvw.exe PID 2256 wrote to memory of 2360 2256 mscorsvw.exe mscorsvw.exe PID 2256 wrote to memory of 2360 2256 mscorsvw.exe mscorsvw.exe PID 2256 wrote to memory of 2360 2256 mscorsvw.exe mscorsvw.exe PID 2256 wrote to memory of 2360 2256 mscorsvw.exe mscorsvw.exe PID 2256 wrote to memory of 2528 2256 mscorsvw.exe mscorsvw.exe PID 2256 wrote to memory of 2528 2256 mscorsvw.exe mscorsvw.exe PID 2256 wrote to memory of 2528 2256 mscorsvw.exe mscorsvw.exe PID 2256 wrote to memory of 2528 2256 mscorsvw.exe mscorsvw.exe PID 2256 wrote to memory of 888 2256 mscorsvw.exe mscorsvw.exe PID 2256 wrote to memory of 888 2256 mscorsvw.exe mscorsvw.exe PID 2256 wrote to memory of 888 2256 mscorsvw.exe mscorsvw.exe PID 2256 wrote to memory of 888 2256 mscorsvw.exe mscorsvw.exe PID 2256 wrote to memory of 2384 2256 mscorsvw.exe mscorsvw.exe PID 2256 wrote to memory of 2384 2256 mscorsvw.exe mscorsvw.exe PID 2256 wrote to memory of 2384 2256 mscorsvw.exe mscorsvw.exe PID 2256 wrote to memory of 2384 2256 mscorsvw.exe mscorsvw.exe PID 2256 wrote to memory of 676 2256 mscorsvw.exe mscorsvw.exe PID 2256 wrote to memory of 676 2256 mscorsvw.exe mscorsvw.exe PID 2256 wrote to memory of 676 2256 mscorsvw.exe mscorsvw.exe PID 2256 wrote to memory of 676 2256 mscorsvw.exe mscorsvw.exe PID 2256 wrote to memory of 1172 2256 mscorsvw.exe mscorsvw.exe PID 2256 wrote to memory of 1172 2256 mscorsvw.exe mscorsvw.exe PID 2256 wrote to memory of 1172 2256 mscorsvw.exe mscorsvw.exe PID 2256 wrote to memory of 1172 2256 mscorsvw.exe mscorsvw.exe PID 2256 wrote to memory of 240 2256 mscorsvw.exe mscorsvw.exe PID 2256 wrote to memory of 240 2256 mscorsvw.exe mscorsvw.exe PID 2256 wrote to memory of 240 2256 mscorsvw.exe mscorsvw.exe PID 2256 wrote to memory of 240 2256 mscorsvw.exe mscorsvw.exe PID 2256 wrote to memory of 2820 2256 mscorsvw.exe mscorsvw.exe PID 2256 wrote to memory of 2820 2256 mscorsvw.exe mscorsvw.exe PID 2256 wrote to memory of 2820 2256 mscorsvw.exe mscorsvw.exe PID 2256 wrote to memory of 2820 2256 mscorsvw.exe mscorsvw.exe PID 2256 wrote to memory of 2992 2256 mscorsvw.exe mscorsvw.exe PID 2256 wrote to memory of 2992 2256 mscorsvw.exe mscorsvw.exe PID 2256 wrote to memory of 2992 2256 mscorsvw.exe mscorsvw.exe PID 2256 wrote to memory of 2992 2256 mscorsvw.exe mscorsvw.exe PID 2256 wrote to memory of 2660 2256 mscorsvw.exe mscorsvw.exe PID 2256 wrote to memory of 2660 2256 mscorsvw.exe mscorsvw.exe PID 2256 wrote to memory of 2660 2256 mscorsvw.exe mscorsvw.exe PID 2256 wrote to memory of 2660 2256 mscorsvw.exe mscorsvw.exe PID 2256 wrote to memory of 2672 2256 mscorsvw.exe mscorsvw.exe PID 2256 wrote to memory of 2672 2256 mscorsvw.exe mscorsvw.exe PID 2256 wrote to memory of 2672 2256 mscorsvw.exe mscorsvw.exe PID 2256 wrote to memory of 2672 2256 mscorsvw.exe mscorsvw.exe PID 2256 wrote to memory of 2084 2256 mscorsvw.exe mscorsvw.exe PID 2256 wrote to memory of 2084 2256 mscorsvw.exe mscorsvw.exe PID 2256 wrote to memory of 2084 2256 mscorsvw.exe mscorsvw.exe PID 2256 wrote to memory of 2084 2256 mscorsvw.exe mscorsvw.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\ab25e9038563287542296604eecdec2a2e87c8c13c23dd8ea809661550b08d7f.exe"C:\Users\Admin\AppData\Local\Temp\ab25e9038563287542296604eecdec2a2e87c8c13c23dd8ea809661550b08d7f.exe"1⤵
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\alg.exeC:\Windows\System32\alg.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
-
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1ec -InterruptEvent 1d8 -NGENProcess 1dc -Pipe 1e8 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 25c -InterruptEvent 1d8 -NGENProcess 1dc -Pipe 1ec -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 24c -InterruptEvent 258 -NGENProcess 260 -Pipe 25c -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 258 -InterruptEvent 248 -NGENProcess 1dc -Pipe 244 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 264 -InterruptEvent 248 -NGENProcess 258 -Pipe 1d8 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 240 -InterruptEvent 250 -NGENProcess 26c -Pipe 264 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 250 -InterruptEvent 268 -NGENProcess 258 -Pipe 270 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 268 -InterruptEvent 274 -NGENProcess 254 -Pipe 1f4 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 274 -InterruptEvent 278 -NGENProcess 248 -Pipe 260 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 26c -InterruptEvent 278 -NGENProcess 274 -Pipe 258 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 240 -InterruptEvent 1dc -NGENProcess 280 -Pipe 26c -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 24c -InterruptEvent 1dc -NGENProcess 240 -Pipe 274 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1dc -InterruptEvent 254 -NGENProcess 280 -Pipe 250 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 254 -InterruptEvent 28c -NGENProcess 248 -Pipe 288 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 294 -InterruptEvent 28c -NGENProcess 1dc -Pipe 24c -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 240 -InterruptEvent 27c -NGENProcess 268 -Pipe 294 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 27c -InterruptEvent 248 -NGENProcess 1dc -Pipe 298 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 248 -InterruptEvent 29c -NGENProcess 280 -Pipe 290 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 29c -InterruptEvent 284 -NGENProcess 28c -Pipe 268 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2a0 -InterruptEvent 248 -NGENProcess 2a4 -Pipe 29c -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 248 -InterruptEvent 278 -NGENProcess 28c -Pipe 240 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 278 -InterruptEvent 2a8 -NGENProcess 284 -Pipe 1dc -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2a8 -InterruptEvent 284 -NGENProcess 2a0 -Pipe 2b0 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1dc -InterruptEvent 1f0 -NGENProcess 230 -Pipe 1fc -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1f0 -InterruptEvent 1d8 -NGENProcess 268 -Pipe 264 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1d8 -InterruptEvent 25c -NGENProcess 260 -Pipe 244 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 25c -InterruptEvent 260 -NGENProcess 1dc -Pipe 240 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 260 -InterruptEvent 230 -NGENProcess 228 -Pipe 268 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 230 -InterruptEvent 1dc -NGENProcess 228 -Pipe 1f4 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1dc -InterruptEvent 1d4 -NGENProcess 270 -Pipe 1c8 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1d4 -InterruptEvent 270 -NGENProcess 230 -Pipe 1ec -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 270 -InterruptEvent 2ac -NGENProcess 1f0 -Pipe 1d8 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2ac -InterruptEvent 1f0 -NGENProcess 1d4 -Pipe 27c -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 254 -InterruptEvent 228 -NGENProcess 284 -Pipe 2ac -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 228 -InterruptEvent 284 -NGENProcess 230 -Pipe 1d4 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 284 -InterruptEvent 2a0 -NGENProcess 1f0 -Pipe 258 -Comment "NGen Worker Process"2⤵
- Loads dropped DLL
- Drops file in Windows directory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2a0 -InterruptEvent 1f0 -NGENProcess 228 -Pipe 1dc -Comment "NGen Worker Process"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2a4 -InterruptEvent 270 -NGENProcess 28c -Pipe 2a0 -Comment "NGen Worker Process"2⤵
- Loads dropped DLL
- Drops file in Windows directory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 270 -InterruptEvent 28c -NGENProcess 230 -Pipe 228 -Comment "NGen Worker Process"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 28c -InterruptEvent 280 -NGENProcess 1f0 -Pipe 2a8 -Comment "NGen Worker Process"2⤵
- Loads dropped DLL
- Drops file in Windows directory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 280 -InterruptEvent 1f0 -NGENProcess 270 -Pipe 254 -Comment "NGen Worker Process"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1f0 -InterruptEvent 2bc -NGENProcess 230 -Pipe 2b8 -Comment "NGen Worker Process"2⤵
- Loads dropped DLL
- Drops file in Windows directory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 278 -InterruptEvent 2c4 -NGENProcess 2bc -Pipe 28c -Comment "NGen Worker Process"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2c4 -InterruptEvent 2b4 -NGENProcess 280 -Pipe 270 -Comment "NGen Worker Process"2⤵
- Loads dropped DLL
- Drops file in Windows directory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2b4 -InterruptEvent 280 -NGENProcess 278 -Pipe 2c0 -Comment "NGen Worker Process"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 280 -InterruptEvent 230 -NGENProcess 25c -Pipe 2bc -Comment "NGen Worker Process"2⤵
- Loads dropped DLL
- Drops file in Windows directory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2cc -InterruptEvent 2b4 -NGENProcess 2d0 -Pipe 280 -Comment "NGen Worker Process"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2b4 -InterruptEvent 284 -NGENProcess 25c -Pipe 2c4 -Comment "NGen Worker Process"2⤵
- Loads dropped DLL
- Drops file in Windows directory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 284 -InterruptEvent 25c -NGENProcess 2cc -Pipe 230 -Comment "NGen Worker Process"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 25c -InterruptEvent 2d8 -NGENProcess 2d0 -Pipe 2a4 -Comment "NGen Worker Process"2⤵
- Loads dropped DLL
- Drops file in Windows directory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2d8 -InterruptEvent 25c -NGENProcess 2d4 -Pipe 2c8 -Comment "NGen Worker Process"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 25c -InterruptEvent 1f0 -NGENProcess 2dc -Pipe 2b4 -Comment "NGen Worker Process"2⤵
- Loads dropped DLL
- Drops file in Windows directory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1f0 -InterruptEvent 2dc -NGENProcess 2d8 -Pipe 2d0 -Comment "NGen Worker Process"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2dc -InterruptEvent 2e8 -NGENProcess 2d4 -Pipe 284 -Comment "NGen Worker Process"2⤵
- Loads dropped DLL
- Drops file in Windows directory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2e8 -InterruptEvent 2d4 -NGENProcess 1f0 -Pipe 2e4 -Comment "NGen Worker Process"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2d4 -InterruptEvent 2f0 -NGENProcess 2d8 -Pipe 25c -Comment "NGen Worker Process"2⤵
- Loads dropped DLL
- Drops file in Windows directory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2f0 -InterruptEvent 2d8 -NGENProcess 2e8 -Pipe 2ec -Comment "NGen Worker Process"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2d8 -InterruptEvent 2f8 -NGENProcess 1f0 -Pipe 2dc -Comment "NGen Worker Process"2⤵
- Loads dropped DLL
- Drops file in Windows directory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2f8 -InterruptEvent 1f0 -NGENProcess 2f0 -Pipe 2f4 -Comment "NGen Worker Process"2⤵
- Modifies data under HKEY_USERS
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1f0 -InterruptEvent 300 -NGENProcess 2e8 -Pipe 2d4 -Comment "NGen Worker Process"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 300 -InterruptEvent 304 -NGENProcess 1f0 -Pipe 278 -Comment "NGen Worker Process"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 304 -InterruptEvent 308 -NGENProcess 2f0 -Pipe 2d8 -Comment "NGen Worker Process"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 30c -InterruptEvent 300 -NGENProcess 310 -Pipe 304 -Comment "NGen Worker Process"2⤵
- Loads dropped DLL
- Drops file in Windows directory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2e0 -InterruptEvent 2e8 -NGENProcess 314 -Pipe 30c -Comment "NGen Worker Process"2⤵
- Loads dropped DLL
- Drops file in Windows directory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2e8 -InterruptEvent 314 -NGENProcess 2f0 -Pipe 310 -Comment "NGen Worker Process"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 314 -InterruptEvent 2f0 -NGENProcess 2e0 -Pipe 31c -Comment "NGen Worker Process"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2f0 -InterruptEvent 1f0 -NGENProcess 318 -Pipe 2f8 -Comment "NGen Worker Process"2⤵
- Modifies data under HKEY_USERS
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1f0 -InterruptEvent 320 -NGENProcess 2e8 -Pipe 308 -Comment "NGen Worker Process"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 320 -InterruptEvent 324 -NGENProcess 2e0 -Pipe 300 -Comment "NGen Worker Process"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 324 -InterruptEvent 328 -NGENProcess 318 -Pipe 2cc -Comment "NGen Worker Process"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 32c -InterruptEvent 328 -NGENProcess 324 -Pipe 2e8 -Comment "NGen Worker Process"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 328 -InterruptEvent 314 -NGENProcess 318 -Pipe 2f0 -Comment "NGen Worker Process"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 314 -InterruptEvent 1f0 -NGENProcess 320 -Pipe 338 -Comment "NGen Worker Process"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1f0 -InterruptEvent 2fc -NGENProcess 334 -Pipe 330 -Comment "NGen Worker Process"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2fc -InterruptEvent 340 -NGENProcess 318 -Pipe 33c -Comment "NGen Worker Process"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2e0 -InterruptEvent 1f0 -NGENProcess 344 -Pipe 2fc -Comment "NGen Worker Process"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1f0 -InterruptEvent 320 -NGENProcess 318 -Pipe 32c -Comment "NGen Worker Process"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 320 -InterruptEvent 348 -NGENProcess 340 -Pipe 334 -Comment "NGen Worker Process"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 348 -InterruptEvent 34c -NGENProcess 344 -Pipe 314 -Comment "NGen Worker Process"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 34c -InterruptEvent 354 -NGENProcess 318 -Pipe 350 -Comment "NGen Worker Process"2⤵
- Modifies data under HKEY_USERS
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 354 -InterruptEvent 324 -NGENProcess 328 -Pipe 340 -Comment "NGen Worker Process"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 354 -InterruptEvent 124 -NGENProcess 34c -Pipe 1f0 -Comment "NGen Worker Process"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 124 -InterruptEvent 120 -NGENProcess 324 -Pipe 320 -Comment "NGen Worker Process"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 120 -InterruptEvent 348 -NGENProcess 344 -Pipe 328 -Comment "NGen Worker Process"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 348 -InterruptEvent 35c -NGENProcess 34c -Pipe 318 -Comment "NGen Worker Process"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 35c -InterruptEvent 360 -NGENProcess 324 -Pipe 358 -Comment "NGen Worker Process"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 360 -InterruptEvent 364 -NGENProcess 344 -Pipe 354 -Comment "NGen Worker Process"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 368 -InterruptEvent 35c -NGENProcess 36c -Pipe 360 -Comment "NGen Worker Process"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 35c -InterruptEvent 124 -NGENProcess 344 -Pipe 120 -Comment "NGen Worker Process"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 124 -InterruptEvent 370 -NGENProcess 364 -Pipe 2e0 -Comment "NGen Worker Process"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 370 -InterruptEvent 374 -NGENProcess 36c -Pipe 348 -Comment "NGen Worker Process"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 370 -InterruptEvent 36c -NGENProcess 374 -Pipe 378 -Comment "NGen Worker Process"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 36c -InterruptEvent 37c -NGENProcess 364 -Pipe 368 -Comment "NGen Worker Process"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 37c -InterruptEvent 380 -NGENProcess 34c -Pipe 35c -Comment "NGen Worker Process"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 380 -InterruptEvent 384 -NGENProcess 374 -Pipe 124 -Comment "NGen Worker Process"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 384 -InterruptEvent 388 -NGENProcess 364 -Pipe 344 -Comment "NGen Worker Process"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 388 -InterruptEvent 38c -NGENProcess 34c -Pipe 370 -Comment "NGen Worker Process"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 38c -InterruptEvent 34c -NGENProcess 380 -Pipe 394 -Comment "NGen Worker Process"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 34c -InterruptEvent 36c -NGENProcess 390 -Pipe 37c -Comment "NGen Worker Process"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 36c -InterruptEvent 398 -NGENProcess 388 -Pipe 324 -Comment "NGen Worker Process"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 398 -InterruptEvent 388 -NGENProcess 34c -Pipe 380 -Comment "NGen Worker Process"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 388 -InterruptEvent 3a0 -NGENProcess 390 -Pipe 384 -Comment "NGen Worker Process"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3a0 -InterruptEvent 390 -NGENProcess 398 -Pipe 39c -Comment "NGen Worker Process"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3a8 -InterruptEvent 38c -NGENProcess 3ac -Pipe 3a0 -Comment "NGen Worker Process"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 36c -InterruptEvent 34c -NGENProcess 3b0 -Pipe 3a8 -Comment "NGen Worker Process"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 34c -InterruptEvent 374 -NGENProcess 3ac -Pipe 364 -Comment "NGen Worker Process"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 374 -InterruptEvent 3b4 -NGENProcess 38c -Pipe 3a4 -Comment "NGen Worker Process"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 36c -InterruptEvent 374 -NGENProcess 3bc -Pipe 34c -Comment "NGen Worker Process"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 388 -InterruptEvent 374 -NGENProcess 36c -Pipe 38c -Comment "NGen Worker Process"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 398 -InterruptEvent 3b0 -NGENProcess 3c4 -Pipe 388 -Comment "NGen Worker Process"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3b0 -InterruptEvent 390 -NGENProcess 36c -Pipe 3ac -Comment "NGen Worker Process"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 390 -InterruptEvent 3c8 -NGENProcess 374 -Pipe 3b8 -Comment "NGen Worker Process"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3c8 -InterruptEvent 3cc -NGENProcess 3c4 -Pipe 3c0 -Comment "NGen Worker Process"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3cc -InterruptEvent 3d0 -NGENProcess 36c -Pipe 3bc -Comment "NGen Worker Process"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3d0 -InterruptEvent 3d4 -NGENProcess 374 -Pipe 398 -Comment "NGen Worker Process"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3d4 -InterruptEvent 3d8 -NGENProcess 3c4 -Pipe 3b0 -Comment "NGen Worker Process"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3dc -InterruptEvent 3d0 -NGENProcess 3e0 -Pipe 3d4 -Comment "NGen Worker Process"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 390 -InterruptEvent 36c -NGENProcess 3e4 -Pipe 3dc -Comment "NGen Worker Process"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 36c -InterruptEvent 3c8 -NGENProcess 3e0 -Pipe 3b4 -Comment "NGen Worker Process"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3e8 -InterruptEvent 390 -NGENProcess 3ec -Pipe 36c -Comment "NGen Worker Process"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 374 -InterruptEvent 3d0 -NGENProcess 3f0 -Pipe 3e8 -Comment "NGen Worker Process"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3cc -InterruptEvent 3e0 -NGENProcess 3f4 -Pipe 374 -Comment "NGen Worker Process"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3d8 -InterruptEvent 3e0 -NGENProcess 3cc -Pipe 3f0 -Comment "NGen Worker Process"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3e4 -InterruptEvent 3c4 -NGENProcess 3fc -Pipe 3d8 -Comment "NGen Worker Process"2⤵
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 1d4 -InterruptEvent 1c0 -NGENProcess 1c4 -Pipe 1d0 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 1cc -InterruptEvent 238 -NGENProcess 240 -Pipe 244 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
-
C:\Windows\system32\dllhost.exeC:\Windows\system32\dllhost.exe /Processid:{02D4B3F1-FD88-11D1-960D-00805FC79235}1⤵
- Executes dropped EXE
- Drops file in Windows directory
-
C:\Windows\ehome\ehRecvr.exeC:\Windows\ehome\ehRecvr.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵
- Executes dropped EXE
-
C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE"C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE" /auditservice1⤵
- Executes dropped EXE
- Drops file in System32 directory
-
C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"1⤵
- Executes dropped EXE
-
C:\Program Files (x86)\Common Files\Microsoft Shared\Source Engine\OSE.EXE"C:\Program Files (x86)\Common Files\Microsoft Shared\Source Engine\OSE.EXE"1⤵
- Executes dropped EXE
-
C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"1⤵
- Executes dropped EXE
-
C:\Windows\ehome\ehsched.exeC:\Windows\ehome\ehsched.exe1⤵
- Executes dropped EXE
-
C:\Windows\eHome\EhTray.exe"C:\Windows\eHome\EhTray.exe" /nav:-21⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Windows\system32\IEEtwCollector.exeC:\Windows\system32\IEEtwCollector.exe /V1⤵
- Executes dropped EXE
-
C:\Windows\ehome\ehRec.exeC:\Windows\ehome\ehRec.exe -Embedding1⤵
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\msdtc.exeC:\Windows\System32\msdtc.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWow64\perfhost.exeC:\Windows\SysWow64\perfhost.exe1⤵
- Executes dropped EXE
-
C:\Windows\system32\locator.exeC:\Windows\system32\locator.exe1⤵
- Executes dropped EXE
-
C:\Windows\System32\snmptrap.exeC:\Windows\System32\snmptrap.exe1⤵
- Executes dropped EXE
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵
- Executes dropped EXE
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵
- Executes dropped EXE
-
C:\Program Files\Windows Media Player\wmpnetwk.exe"C:\Program Files\Windows Media Player\wmpnetwk.exe"1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\SearchIndexer.exeC:\Windows\system32\SearchIndexer.exe /Embedding1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\SearchProtocolHost.exe"C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe_S-1-5-21-330940541-141609230-1670313778-10001_ Global\UsGthrCtrlFltPipeMssGthrPipe_S-1-5-21-330940541-141609230-1670313778-10001 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon" "1"2⤵
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\SearchFilterHost.exe"C:\Windows\system32\SearchFilterHost.exe" 0 592 596 604 65536 6002⤵
- Modifies data under HKEY_USERS
-
C:\Windows\system32\SearchProtocolHost.exe"C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe2_ Global\UsGthrCtrlFltPipeMssGthrPipe2 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon"2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\Common Files\microsoft shared\Source Engine\OSE.EXEFilesize
1.6MB
MD568586dd74a5eb4700ecec077bf9926d8
SHA1e458f3e80a722543a7589a8a4bec8fbbc9e939cc
SHA256329d73309f3975a6027b4370a3afbcd24b90e849d187f538cc6c515fcffbf6dd
SHA5122d5b643904af09641af137296d29a959f05f0a0316825a2a10e024d62602d8fc39422a11d734ce0ea55554f91bba8c0a0ef41936594b351b2ee15e9a810df095
-
C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXEFilesize
30.1MB
MD594673042fcc1761bc75711dac9acfad0
SHA1005787022ddf3208e3185f005e129df1b1c69a53
SHA25672f15f4586e1033be5eae57b43cbdda28c60a5d5c4ff04be4103134262beb21e
SHA5128ae134c935ad64b6f97909c107eb1e34fbbb5d5b572daceaab14675f8b471e4a8c001746b796382408d2a5afa1cb24faf72e613295e151b8b95bad3e546be27f
-
C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exeFilesize
1.6MB
MD5946c6c171b6a1397dca4b804b76b60d8
SHA1faf46f447d060c38f81fd2837f2b9dcf3ecbd74f
SHA256cc52ce5fe39aa7aa4ab9963da3db1697d74ce2162b99b5db527ea4ae7c393528
SHA512c77063c419b8c045b0325daf1d9070dd5e6286e0a32c0d109427db1f2c54fb2fd24bf4594ba27fd4ad97b819766a6eb344ac88b3e1cf2a326c45ae82b2d574e0
-
C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXEFilesize
5.2MB
MD58375ef99eb184f5d17c8e6d03570241a
SHA1fac1dc9e9bd7ea6cdf73cf3690a998602920be45
SHA256c8860c46b69d10d84871b2d6637374f73a6df507aa4056c9c2ef73ebfa7ac129
SHA512203c91b0f27827fb293a778c0a909956bca04031072387308eac9421af23c8db004b6c6a15dd16a76d754c81d1f7f064b43c9483571dc6b0a2cb709a9acc8b3d
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exeFilesize
2.1MB
MD5412f0545373174f7751ac324818a0c0c
SHA130bef7e9825829a74f92558b459a61759feebb00
SHA2562415ae4d52182c8a44fed1dc64895f4cf4ec2fa2202cea049e46d255c833bb25
SHA512f9cf70351c1402c448f0fc2065c68aa9e360c23147064d0d302c8ade00ff8c4bf53bce45b5543357db118765e5cb42f25822dac05333ff86931d01907b91fc35
-
C:\ProgramData\Microsoft\Search\Data\Applications\Windows\MSS.logFilesize
1024KB
MD5e4e8bd22f7cb41cb482ed6d096f5454a
SHA1fd9e9fbb155380f3cebd918891f934e7e2b9939f
SHA2564e7e364eb559c776fce47c248d882a8f06d7dacc08355e2254d1893c742042e7
SHA512a7e93e1d162fe82c3ee30d315777bee259ea8bf362fe6309b18a5c7b28bd311fbcefb14442b1618e8d75e37faf03ac9542b1969c15b503aa589e128ee9b4d93a
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b91050d8b077a4e8.customDestinations-msFilesize
24B
MD5b9bd716de6739e51c620f2086f9c31e4
SHA19733d94607a3cba277e567af584510edd9febf62
SHA2567116ff028244a01f3d17f1d3bc2e1506bc9999c2e40e388458f0cccc4e117312
SHA512cef609e54c7a81a646ad38dba7ac0b82401b220773b9c792cefac80c6564753229f0c011b34ffb56381dd3154a19aee2bf5f602c4d1af01f2cf0fbc1574e4478
-
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exeFilesize
1.5MB
MD56538e78664081281a5353a90d17c562e
SHA1b99ed4ae5ef9d10851749ba034bcf94b2a6d13c2
SHA2569f83a5ddda7e67f1c0209b8899db7fde79fa4832826c8d1bca42bbdb13e2f3c6
SHA512c21e8a0810fec13772c75d84610d46e3ea4b5c991d35a5e9d72e311a1068e04cd5569058e50b749b48bc2d8ea43fcaeec80790b9471198f7b0937db4dce40b55
-
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ngen_service.logFilesize
872KB
MD5db92fbf63047a0f437e1f8b9b11b91cb
SHA13fdc7a4545cbac8ecf12bb63bf80c213ccfe2ad4
SHA25697042348c547f14ed1a22716e54307f6829ebe0be9e1cc2ae459f45f522d2cc7
SHA512814d33793ae7439664fc738e58a961ea72cf006281a0aa13f0593bffd0c97216d564162f3ec535a1ba8e8f7c7ed57b4660505f44eb5c59d6ca44580bf00d3bca
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeFilesize
1.5MB
MD50511d1560b7ea2650c04b042114e2cdb
SHA18ac1a091fb16a68b0faac8db253077b8dc0fcf0d
SHA2569fe2adb5fbeb4c025824cd8d8339f803f3996318c491ee19b55b2ceb47345b00
SHA5124e5fa344ea537b55809ea934b8855d60953256f0f596e394240e8d67b8e47fd8cc995e4afb78e639dcd0ffc1d2e681c4b46ba776926b46205e5199c4176365b3
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exeFilesize
1.5MB
MD5b676927edc32f000bf0ff979149ab5ff
SHA1420b999a55ef8591ed86d58c8958250ec4b0a731
SHA256414a926318fd72a63c63eccb6f4a4164f4a712b83ec95f2195949bf84ec1591b
SHA51257d22c24ccb3cea8bc746083b8bec2e44182b2ecec4d7b18c8f5f4f0ac7792887dc7e609bd3d7f2077a90e565eee5642821fcbd76cd1fead1dcca749bf80853b
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\ngen_service.logFilesize
1003KB
MD5cd478a2a9bcba0edc4c35a6e423032c8
SHA1fb34d1ffa3f8ffeea2f515e8df32f7d8d7e361a8
SHA2561dfdfd4b808715b7af102f6e2148ca2fc439c1f63380ea2fe876bc824fda87f1
SHA51203196ab964105d01703b96cb0919423ce2ba08d31e9104607ffc6f373f123b44eb0ce4bfd1ef6c9eaacc5ffb7afe5039c0bc9b81d873fa4cd510fd08f6c6116c
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeFilesize
1.5MB
MD5ed5087b031ad4a7066e49ad71b9e1a74
SHA121b2f5629ce40b485d1957d1ad204e93388ffe38
SHA2561afef6dbb03992a2ad24a34426058adda74f25545428088edfa340cb7c4f350c
SHA512a6ddf03151712aaacb56f213aa224a6c0c94452fb840bb91d0b3bc9c8a0abd401b835785714bf5e94d487df7ab7d23e4415f47bbd95dd92a46fb250f92797cf0
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen_service.logFilesize
8KB
MD5487b937c79a67d7bbecffb3f03807e5c
SHA1919f8fbcbc5cb6ac2b859601dbbd33ae649fdfb3
SHA2562b180b0ff2a58c49ceea058ca3ca1d83d9ce216a9b04062273b59036adde9014
SHA5123416160fa37eb76be6ff6cc79301456f993393c51f4af322eaf0631cef5cd1bf2c415c529213a08ebad35c2f7d4df2ee92d6e4457b822358ae50b07a7ebaadbe
-
C:\Windows\SysWOW64\perfhost.exeFilesize
1.4MB
MD559ac5d72c3845e123266cafc75968740
SHA1360980db368b438e59b5e93551aeb0e293df4d1e
SHA256955a3ece78b2cf1e7127cfe033c4a17d926f845ae53193df1e8a53784ea4694e
SHA512481c0f3b1baeb26e61fd53eb1c80f6cd3a7779c7e82bfb71022639831a8d99b2c36e2658047050beebea9f05c322e5952ebd2094504e08637a892aa49902fd84
-
C:\Windows\System32\Locator.exeFilesize
1.4MB
MD57f0659f4383df221a521ce0f76479b55
SHA14017c6cc554074d17f5f8c988db8c82bb1d95950
SHA256d3b195f32b24acf1ca91ba4d636e75c6ad5d00867b14303a42125d3e15fac5f6
SHA5127b4c76c1263b8d8dc9c3151ba3705ee7226e953a8b03e47c720d8811525661e7e032ec9f2a95cce4adf8d0a110b8b7aae0251403d9067900b9cb82fdb789285a
-
C:\Windows\System32\msdtc.exeFilesize
1.6MB
MD5d77a5e748d2e2a1a853097c87124165b
SHA1981fb600c9ebf7e7b69fdeb381e676fe13f7ec0a
SHA256d4231ebad31ab199b1647ae360b2fb0d8ebe8406eab47891392b2da9a78fbb75
SHA51259cc8bd962021ddeecbfe08d575856b258bd278c174312348e8bc73e94ff9ad0bda26eabb812dec19dabbc60ba24b8a895e1e245593779c1aacd1e4a60c621da
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.Office.To#\135228e87b2c27d26b516ac0fc0ce667\Microsoft.Office.Tools.Word.v9.0.ni.dllFilesize
834KB
MD5c76656b09bb7df6bd2ac1a6177a0027c
SHA10c296994a249e8649b19be84dce27c9ddafef3e0
SHA256a0ae0aec5b203865fac761023741a59d274e2c41889aeb69140eb746d38f6ce0
SHA5128390879b8812fc98c17702a52259d510a7fe8bc3cf4972e89f705e93bc8fa98300c34d49f3aec869da8d9f786d33004742e4538019c0f852c61db89c302d5fdf
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.Office.To#\5766ec3721d18a48bec1ca1f60331e2d\Microsoft.Office.Tools.Common.v9.0.ni.dllFilesize
797KB
MD5aeb0b6e6c5d32d1ada231285ff2ae881
SHA11f04a1c059503896336406aed1dc93340e90b742
SHA2564c53ca542ac5ef9d822ef8cb3b0ecef3fb8b937d94c0a7b735bedb275c74a263
SHA512e55fd4c4d2966b3f0b6e88292fbd6c20ffa34766e076e763442c15212d19b6dea5d9dc9e7c359d999674a5b2c8a3849c2bbaaf83e7aa8c12715028b06b5a48e1
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.Office.To#\60214b09b490be856c4ee2b3398d71bd\Microsoft.Office.Tools.Outlook.v9.0.ni.dllFilesize
163KB
MD5e88828b5a35063aa16c68ffb8322215d
SHA18225660ba3a9f528cf6ac32038ae3e0ec98d2331
SHA25699facae4828c566c310a1ccf4059100067ab8bfb3d6e94e44dd9e189fd491142
SHA512e4d2f5a5aeaa29d4d3392588f15db0d514ca4c86c629f0986ee8dba61e34af5ca9e06b94479efd8dd154026ae0da276888a0214e167129db18316a17d9718a57
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.Office.To#\d7be05162f8d0fba8f4447db13f6695b\Microsoft.Office.Tools.Excel.v9.0.ni.dllFilesize
1.3MB
MD5006498313e139299a5383f0892c954b9
SHA17b3aa10930da9f29272154e2674b86876957ce3a
SHA256489fec79addba2de9141daa61062a05a95e96a196049ce414807bada572cc35c
SHA5126a15a10ae66ce0e5b18e060bb53c3108d09f6b07ee2c4a834856f0a35bec2453b32f891620e787731985719831302160678eb52acada102fdb0b87a14288d925
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.Office.To#\e1f8e4d08d4b7f811b7dbbacd324027b\Microsoft.Office.Tools.v9.0.ni.dllFilesize
148KB
MD5ac901cf97363425059a50d1398e3454b
SHA12f8bd4ac2237a7b7606cb77a3d3c58051793c5c7
SHA256f6c7aecb211d9aac911bf80c91e84a47a72ac52cbb523e34e9da6482c0b24c58
SHA5126a340b6d5fa8e214f2a58d8b691c749336df087fa75bcc8d8c46f708e4b4ff3d68a61a17d13ee62322b75cbc61d39f5a572588772f3c5d6e5ff32036e5bc5a00
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\03cad6bd8b37d21b28dcb4f955be2158\Microsoft.VisualStudio.Tools.Applications.Contract.v9.0.ni.dllFilesize
34KB
MD5c26b034a8d6ab845b41ed6e8a8d6001d
SHA13a55774cf22d3244d30f9eb5e26c0a6792a3e493
SHA256620b41f5e02df56c33919218bedc238ca7e76552c43da4f0f39a106835a4edc3
SHA512483424665c3bc79aeb1de6dfdd633c8526331c7b271b1ea6fe93ab298089e2aceefe7f9c7d0c6e33e604ca7b2ed62e7bb586147fecdf9a0eea60e8c03816f537
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\0cb958acb9cd4cacb46ebc0396e30aa3\Microsoft.VisualStudio.Tools.Office.Contract.v9.0.ni.dllFilesize
109KB
MD50fd0f978e977a4122b64ae8f8541de54
SHA1153d3390416fdeba1b150816cbbf968e355dc64f
SHA256211d2b83bb82042385757f811d90c5ae0a281f3abb3bf1c7901e8559db479e60
SHA512ceddfc031bfe4fcf5093d0bbc5697b5fb0cd69b03bc32612325a82ea273dae5daff7e670b0d45816a33307b8b042d27669f5d5391cb2bdcf3e5a0c847c6dcaa8
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\1f5d757f0db1005daa2dee10d6117655\Microsoft.VisualStudio.Tools.Office.HostAdapter.v10.0.ni.dllFilesize
143KB
MD50357fac505a1028f1b803e4170de3a62
SHA10ce8e6445a23e02b8b23e964e3cced0f304f556d
SHA256c0d079e51a8b642b9e7fea65b241204f4d890ec4f81030b6e1cfc86ac8a2c435
SHA512ebde8c35ffeb88ffdcf14b0e7ef669acd641822e9b3a919aeb8a29b01237a8b3b44e3a446d4a6b2fb53781e944dee94ae471b94ee12e27a279169d51a87acb12
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\367516b7878af19f5c84c67f2cd277ae\Microsoft.VisualStudio.Tools.Office.Word.AddInAdapter.v9.0.ni.dllFilesize
41KB
MD53c269caf88ccaf71660d8dc6c56f4873
SHA1f9481bf17e10fe1914644e1b590b82a0ecc2c5c4
SHA256de21619e70f9ef8ccbb274bcd0d9d2ace1bae0442dfefab45976671587cf0a48
SHA512bd5be3721bf5bd4001127e0381a0589033cb17aa35852f8f073ba9684af7d8c5a0f3ee29987b345fc15fdf28c5b56686087001ef41221a2cfb16498cf4c016c6
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\7783cc8b52cff32d4df66be2841082ba\Microsoft.VisualStudio.Tools.Office.Excel.HostAdapter.v10.0.ni.dllFilesize
180KB
MD508d9efd84c6ca8d5ce73fe2fb1866c44
SHA16a315b2b9438b0b5a3e1b0fbeac48a0ab5521393
SHA256875da9899a8c6b2ad0752bbe374998488e5606c1f083abcb7a8b4b974f223b2a
SHA5120e5bc59ca6b90ebb471577a73bf32eb3d43f000873a3111dc4f8a81272f3811486a2b7b91570766ba5febffd6f93dfe5b5c0da0929d4225c59299cc8e946bf42
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\8c6bac317f75b51647ea3a8da141b143\Microsoft.VisualStudio.Tools.Office.AddInAdapter.v9.0.ni.dllFilesize
210KB
MD54f40997b51420653706cb0958086cd2d
SHA10069b956d17ce7d782a0e054995317f2f621b502
SHA2568cd6a0b061b43e0b660b81859c910290a3672b00d7647ba0e86eda6ddcc8c553
SHA512e18953d7a348859855e5f6e279bc9924fc3707b57a733ce9b8f7d21bd631d419f1ebfb29202608192eb346569ca9a55264f5b4c2aedd474c22060734a68a4ee6
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\9306fc630870a75ddd23441ad77bdc57\Microsoft.VisualStudio.Tools.Applications.Runtime.v10.0.ni.dllFilesize
53KB
MD5e3a7a2b65afd8ab8b154fdc7897595c3
SHA1b21eefd6e23231470b5cf0bd0d7363879a2ed228
SHA256e5faf5e8adf46a8246e6b5038409dadca46985a9951343a1936237d2c8d7a845
SHA5126537c7ed398deb23be1256445297cb7c8d7801bf6e163d918d8e258213708b28f7255ecff9fbd3431d8f5e5a746aa95a29d3a777b28fcd688777aed6d8205a33
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\afa5bb1a39443d7dc81dfff54073929b\Microsoft.VisualStudio.Tools.Office.Contract.v10.0.ni.dllFilesize
28KB
MD5aefc3f3c8e7499bad4d05284e8abd16c
SHA17ab718bde7fdb2d878d8725dc843cfeba44a71f7
SHA2564436550409cfb3d06b15dd0c3131e87e7002b0749c7c6e9dc3378c99dbec815d
SHA5121d7dbc9764855a9a1f945c1bc8e86406c0625f1381d71b3ea6924322fbe419d1c70c3f3efd57ee2cb2097bb9385e0bf54965ab789328a80eb4946849648fe20b
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\b6a83d87363965a970953a7e5317c1eb\Microsoft.VisualStudio.Tools.Office.Word.HostAdapter.v10.0.ni.dllFilesize
187KB
MD502973d6bce48420acbb190f3265614f5
SHA14b9804b05098af27958a6ace740913486a914d17
SHA256e366d146467367dddb12ad0b55ab186d5d7f4dc742abc80d52c3e0bb88cd08dc
SHA512644e47a7ca9ebe7b20123622b7396424f0ca6e09d56dfe4c955b1e62c1dd84c9b89da3647e32aa43befd88ff6b34122edacee7be3e552e727ff0cc91c35bf37c
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\d593f8df70790e0c70ff836e6146bc7d\Microsoft.VisualStudio.Tools.Office.Outlook.HostAdapter.v10.0.ni.dllFilesize
83KB
MD5deb131fd26ddc578959e2abfd5231d31
SHA1b32c126ef041d4f49d9631a9c6df4280ac368d25
SHA256358ed86dae16c7e04fdc926fd0563173a0cd8e155be283fd746e0d9fb8565030
SHA5120cc371baef76958d3a468aae6f4c66eb52386a162f78cbbc2b934078bd1eb9dfeed477a4eb292148a231c1273c40515b236a6d24e768f2c555b7f1eb31c54ca1
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\de06a98a598aa0ff716a25b24d56ad7f\Microsoft.VisualStudio.Tools.Applications.Contract.v10.0.ni.dllFilesize
27KB
MD59c60454398ce4bce7a52cbda4a45d364
SHA1da1e5de264a6f6051b332f8f32fa876d297bf620
SHA256edc90887d38c87282f49adbb12a94040f9ac86058bfae15063aaaff2672b54e1
SHA512533b7e9c55102b248f4a7560955734b4156eb4c02539c6f978aeacecff1ff182ba0f04a07d32ed90707a62d73191b0e2d2649f38ae1c3e7a5a4c0fbea9a94300
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\e0220058091b941725ef02be0b84abe7\Microsoft.VisualStudio.Tools.Applications.HostAdapter.v10.0.ni.dllFilesize
57KB
MD56eaaa1f987d6e1d81badf8665c55a341
SHA1e52db4ad92903ca03a5a54fdb66e2e6fad59efd5
SHA2564b78ffa5f0b6751aea11917db5961d566e2f59beaa054b41473d331fd392329e
SHA512dbedfa6c569670c22d34d923e22b7dae7332b932b809082dad87a1f0bb125c912db37964b5881667867ccf23dc5e5be596aad85485746f8151ce1c51ffd097b2
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\ee73646032cbb022d16771203727e3b2\Microsoft.VisualStudio.Tools.Applications.Runtime.v9.0.ni.dllFilesize
130KB
MD52735d2ab103beb0f7c1fbd6971838274
SHA16063646bc072546798bf8bf347425834f2bfad71
SHA256f00156860ec7e88f4ccb459ca29b7e0e5c169cdc8a081cb043603187d25d92b3
SHA512fe2ce60c7f61760a29344e254771d48995e983e158da0725818f37441f9690bda46545bf10c84b163f6afb163ffb504913d6ffddf84f72b062c7f233aed896de
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\f1a7ac664667f2d6bcd6c388b230c22b\Microsoft.VisualStudio.Tools.Applications.AddInAdapter.v9.0.ni.dllFilesize
59KB
MD58c69bbdfbc8cc3fa3fa5edcd79901e94
SHA1b8028f0f557692221d5c0160ec6ce414b2bdf19b
SHA256a21471690e7c32c80049e17c13624820e77bca6c9c38b83d9ea8a7248086660d
SHA512825f5b87b76303b62fc16a96b108fb1774c2aca52ac5e44cd0ac2fe2ee47d5d67947dfe7498e36bc849773f608ec5824711f8c36e375a378582eefb57c9c2557
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\fc36797f7054935a6033077612905a0f\Microsoft.VisualStudio.Tools.Office.Excel.AddInAdapter.v9.0.ni.dllFilesize
42KB
MD571d4273e5b77cf01239a5d4f29e064fc
SHA1e8876dea4e4c4c099e27234742016be3c80d8b62
SHA256f019899f829731f899a99885fd52fde1fe4a4f6fe3ecf7f7a7cfa78517c00575
SHA51241fe67cda988c53bd087df6296d1a242cddac688718ea5a5884a72b43e9638538e64d7a59e045c0b4d490496d884cf0ec694ddf7fcb41ae3b8cbc65b7686b180
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\ehiVidCtl\88e20c69254157d91b96eadc9444815d\ehiVidCtl.ni.dllFilesize
855KB
MD57812b0a90d92b4812d4063b89a970c58
SHA13c4a789b8d28a5bfa6a6191624e33b8f40e4c4ea
SHA256897626e6af00e85e627eeaa7f9563b245335242bc6196b36d0072e5b6d45e543
SHA512634a2395bada9227b1957f2b76ed7e19f12bfc4d71a145d182602a1b6e24d83e220ebfabd602b1995c360e1725a38a89ff58417b0295bb0da9ea35c41c21a6ed
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\stdole\2c6d60b55bbab22515c512080d4b3bae\stdole.ni.dllFilesize
43KB
MD53e72bdd0663c5b2bcd530f74139c83e3
SHA166069bcac0207512b9e07320f4fa5934650677d2
SHA2566a6ac3094130d1affd34aae5ba2bd8c889e2071eb4217a75d72b5560f884e357
SHA512b0a98db477fccae71b4ebfb8525ed52c10f1e7542f955b307f260e27e0758aa22896683302e34b0237e7e3bba9f5193ddcc7ff255c71fbaa1386988b0ec7d626
-
\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exeFilesize
1.5MB
MD59cabe27b8ec57831b752e481f91a9413
SHA1d13290bf13c3471864bc92dc17f2a5095c42b397
SHA2567d8f6862fd46f1e08be18a9aba0143b361eab9fbeb5a281e96818517bf0f62ad
SHA51229d4868e4bfa242659d77aee4bb4c1890d41ec7961c44c8490c21e95379c80582c76ace2df38923a1edc7e0d78158b8e4394556e494c414543e325c2013a63ad
-
\Windows\System32\alg.exeFilesize
1.5MB
MD5dbe81d473f6b7cf753131150e182c17d
SHA1fc80166ddb2d742decb8d9eed4d8467392aa285e
SHA256e79a642463240599d3840f9268fa669cd308abb4ad0b3e14f8fe9f106f766697
SHA512df48ba0ae169e614ebb7acaf20ca78481a35cded5e52bb7e61e816e7ffcee0e0287559e3c61b0b78e8b980eda8c52c2c92d44037e642f269e0e48cdeb4f6724a
-
\Windows\System32\dllhost.exeFilesize
1.4MB
MD58b7c1bd17c29b0b74efa6af5d3361c60
SHA192fc2de5813d761707cb60c79c283f850349d9d4
SHA256a35237e4210842f6f9abf8e20e31439b36caab90f61b28c99feff294eb40290f
SHA51222bc22270ea06872469b8814e069ed0cc7a6b0f5ef9a62010df545fa36ef0b801b8fb2a17b5c85587bb61f37897da1154477851bc4eb84ef8e5ace22ba477726
-
\Windows\System32\ieetwcollector.exeFilesize
1.5MB
MD58abe0a4edf081fba19f53c69d68e815a
SHA175837441565d3f7474654778389c029a33b53bbd
SHA25644df467e3229e5db535f2680d9ac4685908ee92cf3256d619662bb603420d46d
SHA5120321d8a4621efb8ea3c7e565e9c07fc837d903af514b9cf8d9324ce7cf8a29f7e39a8c14cf6cfce0ab1a1740fc5eeac4c1cbb525d32a274c9f007b0964e25a84
-
\Windows\System32\msiexec.exeFilesize
1.5MB
MD5b4a434cb7b180c5cf6d6b02f6b7b82f2
SHA1abfef3607efa4c7fc1199786aa0392c47cc93f48
SHA2565e68e8fecd58dd7af54dca5a791fc9d6a4fddbc5d28a6c14cbca209152ef69a5
SHA51202cdfc3be79ea5b3b122ad231d047579689b96a56dcbb39c27f57fb5ee9f38e9af4040c9def696478cdf3cf91e645acba9d17babb67e8d4bb62f82a3424ea7e7
-
\Windows\System32\snmptrap.exeFilesize
1.4MB
MD5666def38f47d52e1ba7dcb67e15fcec7
SHA1eb2b9abf0a9e5cf3c6c406ddbd724839b952fe4c
SHA256dcfbfeb9efd57871ac171d76886f9561284861a92aa2c4fc360b69a6907a7290
SHA512ca97311d93f2b411aca45afdd62646ba342a5036cb5f825e745855add157be907b262aa6ca3aaca13f9452e172d048cc6a732ffa103a4912d881dbd78a302339
-
\Windows\ehome\ehrecvr.exeFilesize
1.2MB
MD510ffd2f4e4859a70b4dc1b199513b336
SHA164f2630b9d680eaefcccd1101b9443e66a864143
SHA2566b10658544913d4a88a4be29d37238c4fc51a6914f8825a74791bd6c8d21d88b
SHA512161aac743023c17a8cee261409251afa3482db195392a705f3a35df048d3db9b4343d670c25df34cc36197df3da524b4df4527c93bda9b7d518984ebdcceff02
-
\Windows\ehome\ehsched.exeFilesize
1.5MB
MD5b4c8d574aa9bc9dc508130293b729993
SHA15f403f6999c1dfe19eac74f772bcd420d4652696
SHA256c7494f517474713e09d39c587d47bb6983dfb812d06c7e848cb2820a1670bd47
SHA512416348530875e4154d86ea13536dece678994f7e40188cefc012fede5389e8a763536c2c22a051a32207ddc87c00535fd7122710380242748601e7829fcbbfd3
-
memory/240-631-0x0000000000400000-0x0000000000587000-memory.dmpFilesize
1.5MB
-
memory/240-618-0x0000000000400000-0x0000000000587000-memory.dmpFilesize
1.5MB
-
memory/276-271-0x0000000140000000-0x000000014013C000-memory.dmpFilesize
1.2MB
-
memory/276-799-0x0000000140000000-0x000000014013C000-memory.dmpFilesize
1.2MB
-
memory/276-475-0x0000000140000000-0x000000014013C000-memory.dmpFilesize
1.2MB
-
memory/580-94-0x0000000140000000-0x000000014017C000-memory.dmpFilesize
1.5MB
-
memory/580-103-0x0000000000420000-0x0000000000480000-memory.dmpFilesize
384KB
-
memory/580-95-0x0000000000420000-0x0000000000480000-memory.dmpFilesize
384KB
-
memory/580-287-0x0000000140000000-0x000000014017C000-memory.dmpFilesize
1.5MB
-
memory/676-608-0x0000000000400000-0x0000000000587000-memory.dmpFilesize
1.5MB
-
memory/676-594-0x0000000000400000-0x0000000000587000-memory.dmpFilesize
1.5MB
-
memory/768-450-0x0000000000400000-0x0000000000587000-memory.dmpFilesize
1.5MB
-
memory/768-410-0x0000000000400000-0x0000000000587000-memory.dmpFilesize
1.5MB
-
memory/776-344-0x0000000000400000-0x0000000000587000-memory.dmpFilesize
1.5MB
-
memory/776-417-0x0000000000400000-0x0000000000587000-memory.dmpFilesize
1.5MB
-
memory/852-827-0x0000000140000000-0x000000014018D000-memory.dmpFilesize
1.6MB
-
memory/852-1121-0x0000000140000000-0x000000014018D000-memory.dmpFilesize
1.6MB
-
memory/888-573-0x0000000000400000-0x0000000000587000-memory.dmpFilesize
1.5MB
-
memory/888-559-0x0000000000400000-0x0000000000587000-memory.dmpFilesize
1.5MB
-
memory/908-481-0x0000000000400000-0x0000000000587000-memory.dmpFilesize
1.5MB
-
memory/908-500-0x0000000000400000-0x0000000000587000-memory.dmpFilesize
1.5MB
-
memory/1172-620-0x0000000000400000-0x0000000000587000-memory.dmpFilesize
1.5MB
-
memory/1172-606-0x0000000000400000-0x0000000000587000-memory.dmpFilesize
1.5MB
-
memory/1176-1063-0x0000000140000000-0x0000000140191000-memory.dmpFilesize
1.6MB
-
memory/1176-1124-0x0000000140000000-0x0000000140191000-memory.dmpFilesize
1.6MB
-
memory/1176-806-0x0000000140000000-0x0000000140191000-memory.dmpFilesize
1.6MB
-
memory/1440-146-0x0000000000400000-0x00000000005DB000-memory.dmpFilesize
1.9MB
-
memory/1440-0-0x0000000001E20000-0x0000000001E87000-memory.dmpFilesize
412KB
-
memory/1440-5-0x0000000001E20000-0x0000000001E87000-memory.dmpFilesize
412KB
-
memory/1440-270-0x0000000000400000-0x00000000005DB000-memory.dmpFilesize
1.9MB
-
memory/1440-7-0x0000000000400000-0x00000000005DB000-memory.dmpFilesize
1.9MB
-
memory/1444-704-0x0000000000400000-0x0000000000587000-memory.dmpFilesize
1.5MB
-
memory/1444-717-0x0000000000400000-0x0000000000587000-memory.dmpFilesize
1.5MB
-
memory/1728-144-0x0000000010000000-0x000000001017E000-memory.dmpFilesize
1.5MB
-
memory/1728-106-0x0000000010000000-0x000000001017E000-memory.dmpFilesize
1.5MB
-
memory/1728-107-0x0000000000A70000-0x0000000000AD7000-memory.dmpFilesize
412KB
-
memory/1728-112-0x0000000000A70000-0x0000000000AD7000-memory.dmpFilesize
412KB
-
memory/1740-705-0x0000000000400000-0x0000000000587000-memory.dmpFilesize
1.5MB
-
memory/1756-167-0x0000000000500000-0x0000000000560000-memory.dmpFilesize
384KB
-
memory/1756-161-0x0000000000500000-0x0000000000560000-memory.dmpFilesize
384KB
-
memory/1756-169-0x0000000140000000-0x000000014018D000-memory.dmpFilesize
1.6MB
-
memory/1808-451-0x0000000000400000-0x0000000000587000-memory.dmpFilesize
1.5MB
-
memory/1808-484-0x0000000000400000-0x0000000000587000-memory.dmpFilesize
1.5MB
-
memory/1888-795-0x0000000140000000-0x000000014018D000-memory.dmpFilesize
1.6MB
-
memory/1888-789-0x0000000140000000-0x000000014018D000-memory.dmpFilesize
1.6MB
-
memory/1940-764-0x0000000000400000-0x0000000000587000-memory.dmpFilesize
1.5MB
-
memory/1968-854-0x0000000100000000-0x0000000100191000-memory.dmpFilesize
1.6MB
-
memory/2000-752-0x0000000000400000-0x0000000000587000-memory.dmpFilesize
1.5MB
-
memory/2020-832-0x0000000140000000-0x0000000140195000-memory.dmpFilesize
1.6MB
-
memory/2020-739-0x0000000000400000-0x0000000000587000-memory.dmpFilesize
1.5MB
-
memory/2084-695-0x0000000000400000-0x0000000000587000-memory.dmpFilesize
1.5MB
-
memory/2100-769-0x0000000000400000-0x0000000000587000-memory.dmpFilesize
1.5MB
-
memory/2100-759-0x0000000000400000-0x0000000000587000-memory.dmpFilesize
1.5MB
-
memory/2156-81-0x0000000000850000-0x00000000008B0000-memory.dmpFilesize
384KB
-
memory/2156-66-0x0000000100000000-0x0000000100183000-memory.dmpFilesize
1.5MB
-
memory/2156-197-0x0000000100000000-0x0000000100183000-memory.dmpFilesize
1.5MB
-
memory/2156-89-0x0000000000850000-0x00000000008B0000-memory.dmpFilesize
384KB
-
memory/2212-122-0x0000000010000000-0x0000000010186000-memory.dmpFilesize
1.5MB
-
memory/2212-123-0x00000000005B0000-0x0000000000610000-memory.dmpFilesize
384KB
-
memory/2212-141-0x0000000010000000-0x0000000010186000-memory.dmpFilesize
1.5MB
-
memory/2212-129-0x00000000005B0000-0x0000000000610000-memory.dmpFilesize
384KB
-
memory/2256-148-0x0000000000680000-0x00000000006E7000-memory.dmpFilesize
412KB
-
memory/2256-1053-0x0000000001D10000-0x0000000001D34000-memory.dmpFilesize
144KB
-
memory/2256-153-0x0000000000680000-0x00000000006E7000-memory.dmpFilesize
412KB
-
memory/2256-366-0x0000000000400000-0x0000000000587000-memory.dmpFilesize
1.5MB
-
memory/2256-1056-0x0000000001D10000-0x0000000001D76000-memory.dmpFilesize
408KB
-
memory/2256-1055-0x0000000001D10000-0x0000000001D3A000-memory.dmpFilesize
168KB
-
memory/2256-1054-0x0000000000D60000-0x0000000000D68000-memory.dmpFilesize
32KB
-
memory/2256-1052-0x0000000001D10000-0x0000000001D98000-memory.dmpFilesize
544KB
-
memory/2256-1051-0x0000000000D60000-0x0000000000D70000-memory.dmpFilesize
64KB
-
memory/2256-147-0x0000000000400000-0x0000000000587000-memory.dmpFilesize
1.5MB
-
memory/2256-1044-0x0000000000D60000-0x0000000000D6A000-memory.dmpFilesize
40KB
-
memory/2256-1045-0x0000000001D10000-0x0000000001D2E000-memory.dmpFilesize
120KB
-
memory/2256-1046-0x0000000001D10000-0x0000000001D2A000-memory.dmpFilesize
104KB
-
memory/2256-1047-0x0000000001D10000-0x0000000001D9C000-memory.dmpFilesize
560KB
-
memory/2256-1048-0x0000000001D10000-0x0000000001DB4000-memory.dmpFilesize
656KB
-
memory/2256-1049-0x0000000001F90000-0x000000000212E000-memory.dmpFilesize
1.6MB
-
memory/2256-1050-0x0000000001D10000-0x0000000001DFC000-memory.dmpFilesize
944KB
-
memory/2320-728-0x0000000000400000-0x0000000000587000-memory.dmpFilesize
1.5MB
-
memory/2320-714-0x0000000000400000-0x0000000000587000-memory.dmpFilesize
1.5MB
-
memory/2324-792-0x0000000140000000-0x000000014018D000-memory.dmpFilesize
1.6MB
-
memory/2324-777-0x0000000140000000-0x000000014018D000-memory.dmpFilesize
1.6MB
-
memory/2360-496-0x0000000000400000-0x0000000000587000-memory.dmpFilesize
1.5MB
-
memory/2360-529-0x0000000000400000-0x0000000000587000-memory.dmpFilesize
1.5MB
-
memory/2364-488-0x0000000140000000-0x0000000140237000-memory.dmpFilesize
2.2MB
-
memory/2364-276-0x0000000140000000-0x0000000140237000-memory.dmpFilesize
2.2MB
-
memory/2384-575-0x0000000000400000-0x0000000000587000-memory.dmpFilesize
1.5MB
-
memory/2384-593-0x0000000000400000-0x0000000000587000-memory.dmpFilesize
1.5MB
-
memory/2456-333-0x0000000100000000-0x0000000100542000-memory.dmpFilesize
5.3MB
-
memory/2456-574-0x0000000100000000-0x0000000100542000-memory.dmpFilesize
5.3MB
-
memory/2528-562-0x0000000000400000-0x0000000000587000-memory.dmpFilesize
1.5MB
-
memory/2528-528-0x0000000000400000-0x0000000000587000-memory.dmpFilesize
1.5MB
-
memory/2560-320-0x000000002E000000-0x000000002E194000-memory.dmpFilesize
1.6MB
-
memory/2560-558-0x000000002E000000-0x000000002E194000-memory.dmpFilesize
1.6MB
-
memory/2660-668-0x0000000000400000-0x0000000000587000-memory.dmpFilesize
1.5MB
-
memory/2672-669-0x0000000001A90000-0x0000000001B4A000-memory.dmpFilesize
744KB
-
memory/2672-680-0x0000000000400000-0x0000000000587000-memory.dmpFilesize
1.5MB
-
memory/2672-664-0x0000000000400000-0x0000000000587000-memory.dmpFilesize
1.5MB
-
memory/2780-441-0x0000000100000000-0x0000000100174000-memory.dmpFilesize
1.5MB
-
memory/2780-184-0x00000000008B0000-0x0000000000910000-memory.dmpFilesize
384KB
-
memory/2780-183-0x0000000100000000-0x0000000100174000-memory.dmpFilesize
1.5MB
-
memory/2780-177-0x00000000008B0000-0x0000000000910000-memory.dmpFilesize
384KB
-
memory/2820-645-0x0000000000400000-0x0000000000587000-memory.dmpFilesize
1.5MB
-
memory/2820-632-0x0000000000400000-0x0000000000587000-memory.dmpFilesize
1.5MB
-
memory/2940-296-0x000000002E000000-0x000000002FE1E000-memory.dmpFilesize
30.1MB
-
memory/2940-527-0x000000002E000000-0x000000002FE1E000-memory.dmpFilesize
30.1MB
-
memory/2992-656-0x0000000000400000-0x0000000000587000-memory.dmpFilesize
1.5MB
-
memory/2992-640-0x0000000000400000-0x0000000000587000-memory.dmpFilesize
1.5MB
-
memory/3044-311-0x0000000140000000-0x00000001401A9000-memory.dmpFilesize
1.7MB
-
memory/3044-306-0x0000000140000000-0x00000001401A9000-memory.dmpFilesize
1.7MB