Analysis
-
max time kernel
140s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 01:23
Static task
static1
Behavioral task
behavioral1
Sample
250b1a453fc129e0436f4a2851c337eb8c989add9f79905e865c10efcc148de3.exe
Resource
win7-20240221-en
General
-
Target
250b1a453fc129e0436f4a2851c337eb8c989add9f79905e865c10efcc148de3.exe
-
Size
1.8MB
-
MD5
160cacb57fe136947872e2cfb91c994e
-
SHA1
20a68890241b8dca37601ca2613f21d6fb1b9993
-
SHA256
250b1a453fc129e0436f4a2851c337eb8c989add9f79905e865c10efcc148de3
-
SHA512
1194022941c1e9c475f83c76c2cdc7d8c95cc704e8bd2e0d8e979e12153a5150ddefec148d33d81e60b99a95466eb46325325be8bc9eeb9283ce24d4fa05b49b
-
SSDEEP
49152:EKJ0WR7AFPyyiSruXKpk3WFDL9zxnS8mgiTd8DsMcDKGfWbYCGE:EKlBAFPydSS6W6X9lnvBiTLMiKGu8CP
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
Processes:
alg.exeaspnet_state.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exeehRecvr.exeehsched.exeelevation_service.exeIEEtwCollector.exeGROOVE.EXEdllhost.exemaintenanceservice.exemsdtc.exemsiexec.exemscorsvw.exeOSE.EXEOSPPSVC.EXEperfhost.exemscorsvw.exelocator.exesnmptrap.exemscorsvw.exevds.exevssvc.exewbengine.exeWmiApSrv.exewmpnetwk.exeSearchIndexer.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exepid process 468 1132 alg.exe 3012 aspnet_state.exe 1660 mscorsvw.exe 2632 mscorsvw.exe 1504 mscorsvw.exe 2204 mscorsvw.exe 2976 ehRecvr.exe 792 ehsched.exe 1812 elevation_service.exe 2068 IEEtwCollector.exe 2080 GROOVE.EXE 2128 dllhost.exe 2876 maintenanceservice.exe 2688 msdtc.exe 848 msiexec.exe 616 mscorsvw.exe 2816 OSE.EXE 2060 OSPPSVC.EXE 2972 perfhost.exe 2276 mscorsvw.exe 2324 locator.exe 2152 snmptrap.exe 1612 mscorsvw.exe 1368 vds.exe 2592 vssvc.exe 840 wbengine.exe 1592 WmiApSrv.exe 2024 wmpnetwk.exe 628 SearchIndexer.exe 2200 mscorsvw.exe 2748 mscorsvw.exe 2804 mscorsvw.exe 2888 mscorsvw.exe 2156 mscorsvw.exe 1512 mscorsvw.exe 972 mscorsvw.exe 2552 mscorsvw.exe 2460 mscorsvw.exe 1976 mscorsvw.exe 944 mscorsvw.exe 2540 mscorsvw.exe 2884 mscorsvw.exe 1636 mscorsvw.exe 2944 mscorsvw.exe 2772 mscorsvw.exe 1548 mscorsvw.exe 636 mscorsvw.exe 1000 mscorsvw.exe 940 mscorsvw.exe 2672 mscorsvw.exe 2684 mscorsvw.exe 2160 mscorsvw.exe 1440 mscorsvw.exe 2580 mscorsvw.exe 1760 mscorsvw.exe 2328 mscorsvw.exe 924 mscorsvw.exe 1400 mscorsvw.exe 2052 mscorsvw.exe 2160 mscorsvw.exe 1932 mscorsvw.exe 548 mscorsvw.exe 3060 mscorsvw.exe -
Loads dropped DLL 55 IoCs
Processes:
msiexec.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exepid process 468 468 468 468 468 468 468 468 848 msiexec.exe 468 468 468 468 468 764 2328 mscorsvw.exe 2328 mscorsvw.exe 1400 mscorsvw.exe 1400 mscorsvw.exe 548 mscorsvw.exe 548 mscorsvw.exe 1500 mscorsvw.exe 1500 mscorsvw.exe 1476 mscorsvw.exe 1476 mscorsvw.exe 2488 mscorsvw.exe 2488 mscorsvw.exe 2380 mscorsvw.exe 2380 mscorsvw.exe 1892 mscorsvw.exe 1892 mscorsvw.exe 2900 mscorsvw.exe 2900 mscorsvw.exe 2828 mscorsvw.exe 2828 mscorsvw.exe 2968 mscorsvw.exe 2968 mscorsvw.exe 1676 mscorsvw.exe 1676 mscorsvw.exe 2856 mscorsvw.exe 2856 mscorsvw.exe 2340 mscorsvw.exe 2340 mscorsvw.exe 1724 mscorsvw.exe 1724 mscorsvw.exe 1912 mscorsvw.exe 1912 mscorsvw.exe 1728 mscorsvw.exe 1728 mscorsvw.exe 756 mscorsvw.exe 756 mscorsvw.exe 2100 mscorsvw.exe 2100 mscorsvw.exe 896 mscorsvw.exe 896 mscorsvw.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in System32 directory 22 IoCs
Processes:
aspnet_state.exemscorsvw.exe250b1a453fc129e0436f4a2851c337eb8c989add9f79905e865c10efcc148de3.exeGROOVE.EXEmsdtc.exeSearchProtocolHost.exedescription ioc process File opened for modification C:\Windows\system32\config\systemprofile\AppData\Roaming\30a5f30dae4ef42b.bin aspnet_state.exe File opened for modification C:\Windows\system32\dllhost.exe aspnet_state.exe File opened for modification C:\Windows\system32\locator.exe aspnet_state.exe File opened for modification C:\Windows\system32\vssvc.exe aspnet_state.exe File opened for modification C:\Windows\system32\wbengine.exe aspnet_state.exe File opened for modification C:\Windows\system32\fxssvc.exe mscorsvw.exe File opened for modification C:\Windows\System32\alg.exe 250b1a453fc129e0436f4a2851c337eb8c989add9f79905e865c10efcc148de3.exe File opened for modification C:\Windows\system32\dllhost.exe 250b1a453fc129e0436f4a2851c337eb8c989add9f79905e865c10efcc148de3.exe File opened for modification C:\Windows\system32\fxssvc.exe aspnet_state.exe File opened for modification C:\Windows\system32\msiexec.exe aspnet_state.exe File opened for modification C:\Windows\SysWow64\perfhost.exe aspnet_state.exe File opened for modification C:\Windows\System32\vds.exe aspnet_state.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat GROOVE.EXE File opened for modification C:\Windows\system32\MSDtc\MSDTC.LOG msdtc.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat SearchProtocolHost.exe File opened for modification C:\Windows\system32\fxssvc.exe 250b1a453fc129e0436f4a2851c337eb8c989add9f79905e865c10efcc148de3.exe File opened for modification C:\Windows\system32\IEEtwCollector.exe 250b1a453fc129e0436f4a2851c337eb8c989add9f79905e865c10efcc148de3.exe File opened for modification C:\Windows\System32\msdtc.exe aspnet_state.exe File opened for modification C:\Windows\System32\snmptrap.exe aspnet_state.exe File opened for modification C:\Windows\system32\wbem\WmiApSrv.exe aspnet_state.exe File opened for modification C:\Windows\system32\SearchIndexer.exe aspnet_state.exe File opened for modification C:\Windows\system32\IEEtwCollector.exe mscorsvw.exe -
Drops file in Program Files directory 64 IoCs
Processes:
250b1a453fc129e0436f4a2851c337eb8c989add9f79905e865c10efcc148de3.exemscorsvw.exeaspnet_state.exedescription ioc process File created C:\Program Files (x86)\Google\Temp\GUM88DF.tmp\goopdateres_ro.dll 250b1a453fc129e0436f4a2851c337eb8c989add9f79905e865c10efcc148de3.exe File created C:\Program Files (x86)\Google\Temp\GUM88DF.tmp\GoogleUpdateSetup.exe 250b1a453fc129e0436f4a2851c337eb8c989add9f79905e865c10efcc148de3.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome_proxy.exe mscorsvw.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jcmd.exe mscorsvw.exe File opened for modification C:\Program Files (x86)\Google\Update\DisabledGoogleUpdate.exe aspnet_state.exe File created C:\Program Files (x86)\Google\Temp\GUM88DF.tmp\goopdateres_pt-BR.dll 250b1a453fc129e0436f4a2851c337eb8c989add9f79905e865c10efcc148de3.exe File created C:\Program Files (x86)\Google\Temp\GUM88DF.tmp\goopdateres_ru.dll 250b1a453fc129e0436f4a2851c337eb8c989add9f79905e865c10efcc148de3.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jmc.exe aspnet_state.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\orbd.exe aspnet_state.exe File opened for modification C:\Program Files\Java\jre7\bin\javaw.exe aspnet_state.exe File opened for modification C:\Program Files\Java\jre7\bin\tnameserv.exe aspnet_state.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\appletviewer.exe mscorsvw.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\klist.exe mscorsvw.exe File created C:\Program Files (x86)\Google\Temp\GUM88DF.tmp\goopdateres_it.dll 250b1a453fc129e0436f4a2851c337eb8c989add9f79905e865c10efcc148de3.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javafxpackager.exe aspnet_state.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\javaw.exe aspnet_state.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\jp2launcher.exe mscorsvw.exe File created C:\Program Files (x86)\Google\Temp\GUM88DF.tmp\goopdateres_gu.dll 250b1a453fc129e0436f4a2851c337eb8c989add9f79905e865c10efcc148de3.exe File opened for modification C:\Program Files\Java\jre7\bin\pack200.exe aspnet_state.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\FLTLDR.EXE aspnet_state.exe File opened for modification C:\Program Files\Mozilla Firefox\default-browser-agent.exe mscorsvw.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\LICLUA.EXE mscorsvw.exe File created C:\Program Files (x86)\Google\Temp\GUM88DF.tmp\goopdateres_hi.dll 250b1a453fc129e0436f4a2851c337eb8c989add9f79905e865c10efcc148de3.exe File created C:\Program Files (x86)\Google\Temp\GUM88DF.tmp\goopdateres_ur.dll 250b1a453fc129e0436f4a2851c337eb8c989add9f79905e865c10efcc148de3.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc-cache-gen.exe aspnet_state.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\TextConv\WksConv\Wkconv.exe mscorsvw.exe File opened for modification C:\Program Files\Windows Media Player\wmpnetwk.exe aspnet_state.exe File opened for modification C:\Program Files\Java\jre7\bin\javacpl.exe aspnet_state.exe File opened for modification C:\Program Files\Internet Explorer\ielowutil.exe mscorsvw.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\xjc.exe mscorsvw.exe File created C:\Program Files (x86)\Google\Temp\GUM88DF.tmp\goopdateres_ml.dll 250b1a453fc129e0436f4a2851c337eb8c989add9f79905e865c10efcc148de3.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\pack200.exe aspnet_state.exe File opened for modification C:\Program Files\Internet Explorer\iediagcmd.exe mscorsvw.exe File opened for modification C:\Program Files\Mozilla Firefox\private_browsing.exe aspnet_state.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe mscorsvw.exe File created C:\Program Files (x86)\Google\Temp\GUM88DF.tmp\goopdateres_te.dll 250b1a453fc129e0436f4a2851c337eb8c989add9f79905e865c10efcc148de3.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\java-rmi.exe aspnet_state.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\ktab.exe aspnet_state.exe File opened for modification C:\Program Files\Java\jre7\bin\javaws.exe aspnet_state.exe File opened for modification C:\Program Files (x86)\Internet Explorer\ieinstal.exe mscorsvw.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\EQUATION\EQNEDT32.EXE aspnet_state.exe File created C:\Program Files (x86)\Google\Temp\GUM88DF.tmp\goopdateres_sr.dll 250b1a453fc129e0436f4a2851c337eb8c989add9f79905e865c10efcc148de3.exe File opened for modification C:\Program Files (x86)\Common Files\Microsoft Shared\Source Engine\OSE.EXE aspnet_state.exe File opened for modification C:\Program Files\7-Zip\7z.exe aspnet_state.exe File opened for modification C:\Program Files\Java\jre7\bin\javacpl.exe mscorsvw.exe File created C:\Program Files (x86)\Google\Temp\GUM88DF.tmp\goopdateres_fil.dll 250b1a453fc129e0436f4a2851c337eb8c989add9f79905e865c10efcc148de3.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Icons\SC_Reader.exe aspnet_state.exe File opened for modification C:\Program Files\Java\jre7\bin\java.exe mscorsvw.exe File opened for modification C:\Program Files\DVD Maker\DVDMaker.exe mscorsvw.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\servertool.exe aspnet_state.exe File opened for modification C:\Program Files (x86)\Internet Explorer\ielowutil.exe aspnet_state.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe mscorsvw.exe File opened for modification C:\Program Files (x86)\Google\Temp\GUT88E0.tmp 250b1a453fc129e0436f4a2851c337eb8c989add9f79905e865c10efcc148de3.exe File created C:\Program Files (x86)\Google\Temp\GUM88DF.tmp\goopdateres_lt.dll 250b1a453fc129e0436f4a2851c337eb8c989add9f79905e865c10efcc148de3.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jarsigner.exe aspnet_state.exe File created C:\Program Files (x86)\Google\Temp\GUM88DF.tmp\goopdateres_sk.dll 250b1a453fc129e0436f4a2851c337eb8c989add9f79905e865c10efcc148de3.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\launcher.exe aspnet_state.exe File opened for modification C:\Program Files (x86)\Google\Update\Install\{D9005A2B-BC2A-4153-8911-AE3B3F543790}\chrome_installer.exe mscorsvw.exe File opened for modification C:\Program Files\Mozilla Firefox\crashreporter.exe aspnet_state.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\idlj.exe mscorsvw.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\unpack200.exe mscorsvw.exe File created C:\Program Files (x86)\Google\Temp\GUM88DF.tmp\goopdateres_am.dll 250b1a453fc129e0436f4a2851c337eb8c989add9f79905e865c10efcc148de3.exe File created C:\Program Files (x86)\Google\Temp\GUM88DF.tmp\goopdateres_ja.dll 250b1a453fc129e0436f4a2851c337eb8c989add9f79905e865c10efcc148de3.exe File created C:\Program Files (x86)\Google\Temp\GUM88DF.tmp\goopdateres_ko.dll 250b1a453fc129e0436f4a2851c337eb8c989add9f79905e865c10efcc148de3.exe -
Drops file in Windows directory 64 IoCs
Processes:
mscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exe250b1a453fc129e0436f4a2851c337eb8c989add9f79905e865c10efcc148de3.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exedllhost.exemscorsvw.exemscorsvw.exemscorsvw.exedescription ioc process File created C:\Windows\assembly\ngenlock.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\index140.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index142.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index145.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\index138.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index138.dat mscorsvw.exe File created C:\Windows\assembly\GACLock.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\Temp\ZAP6845.tmp\ehiVidCtl.dll mscorsvw.exe File created C:\Windows\assembly\GACLock.dat mscorsvw.exe File created C:\Windows\assembly\GACLock.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index136.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index139.dat mscorsvw.exe File created C:\Windows\assembly\ngenlock.dat mscorsvw.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen_service.log mscorsvw.exe File opened for modification C:\Windows\ehome\ehsched.exe 250b1a453fc129e0436f4a2851c337eb8c989add9f79905e865c10efcc148de3.exe File opened for modification C:\Windows\ehome\ehRecvr.exe mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\Temp\ZAP476C.tmp\Microsoft.VisualStudio.Tools.Applications.Contract.v10.0.dll mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index13a.dat mscorsvw.exe File created C:\Windows\assembly\ngenlock.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\index147.dat mscorsvw.exe File created C:\Windows\assembly\ngenlock.dat mscorsvw.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ngenservicelock.dat mscorsvw.exe File created C:\Windows\assembly\GACLock.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\index136.dat mscorsvw.exe File created C:\Windows\assembly\GACLock.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index13a.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index13a.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index141.dat mscorsvw.exe File created C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngenservicelock.dat mscorsvw.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen_service.log mscorsvw.exe File opened for modification C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index134.dat mscorsvw.exe File created C:\Windows\assembly\GACLock.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\index142.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index136.dat mscorsvw.exe File created C:\Windows\assembly\ngenlock.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index13e.dat mscorsvw.exe File created C:\Windows\assembly\GACLock.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index146.dat mscorsvw.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe 250b1a453fc129e0436f4a2851c337eb8c989add9f79905e865c10efcc148de3.exe File created C:\Windows\assembly\ngenlock.dat mscorsvw.exe File created C:\Windows\assembly\ngenlock.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index13b.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index142.dat mscorsvw.exe File created C:\Windows\assembly\ngenlock.dat mscorsvw.exe File opened for modification C:\Windows\Registration\{02D4B3F1-FD88-11D1-960D-00805FC79235}.{6F7EE1AE-7568-497F-A9DA-F29C11A40344}.crmlog dllhost.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index13b.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\Temp\ZAP4F87.tmp\Microsoft.VisualStudio.Tools.Applications.HostAdapter.v10.0.dll mscorsvw.exe File created C:\Windows\assembly\ngenlock.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\Temp\ZAP59E3.tmp\Microsoft.VisualStudio.Tools.Office.Word.HostAdapter.v10.0.dll mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index144.dat mscorsvw.exe File created C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngenofflinequeuelock.dat mscorsvw.exe File created C:\Windows\Microsoft.NET\ngenservice_pri1_lock.dat mscorsvw.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\index146.dat mscorsvw.exe File created C:\Windows\assembly\GACLock.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index148.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index147.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\index13f.dat mscorsvw.exe File created C:\Windows\assembly\ngenlock.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\Temp\ZAPA248.tmp\Microsoft.Office.Tools.Excel.v9.0.dll mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index146.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\index145.dat mscorsvw.exe -
Modifies data under HKEY_USERS 64 IoCs
Processes:
mscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exeSearchProtocolHost.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exeSearchFilterHost.exeehRec.exemscorsvw.exemscorsvw.exeSearchIndexer.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CTLs mscorsvw.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%systemroot%\system32\mycomput.dll,-112 = "Manages disks and provides access to other tools to manage local and remote computers." SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CTLs mscorsvw.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\Certificates mscorsvw.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Program Files\Windows Journal\Journal.exe,-3074 = "Windows Journal" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\system32\msra.exe,-100 = "Windows Remote Assistance" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\Certificates mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CRLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs mscorsvw.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@"%systemroot%\system32\windowspowershell\v1.0\powershell.exe",-111 = "Performs object-based (command-line) functions" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CRLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\Certificates mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE SearchFilterHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\system32\gameux.dll,-10060 = "Solitaire" SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust mscorsvw.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE\SAL\NvpRecCount = "32" ehRec.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CRLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\Certificates mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CRLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\Certificates mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CRLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\Certificates mscorsvw.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32,@elscore.dll,-2 = "Microsoft Script Detection" SearchIndexer.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\system32\zipfldr.dll,-10195 = "Compressed (zipped) Folder" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\Certificates mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CTLs mscorsvw.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\system32\SampleRes.dll,-102 = "Desert" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@gameux.dll,-10058 = "Purble Place" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\Certificates mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CRLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root mscorsvw.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\eHome\ehepgres.dll,-304 = "Public Recorded TV" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Multimedia SearchFilterHost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\Certificates mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\Certificates mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CRLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates mscorsvw.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
ehRec.exeaspnet_state.exepid process 1344 ehRec.exe 3012 aspnet_state.exe 3012 aspnet_state.exe 3012 aspnet_state.exe 3012 aspnet_state.exe 3012 aspnet_state.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
250b1a453fc129e0436f4a2851c337eb8c989add9f79905e865c10efcc148de3.exemscorsvw.exemscorsvw.exeEhTray.exeehRec.exeaspnet_state.exemsiexec.exevssvc.exewbengine.exewmpnetwk.exeSearchIndexer.exedescription pid process Token: SeTakeOwnershipPrivilege 1368 250b1a453fc129e0436f4a2851c337eb8c989add9f79905e865c10efcc148de3.exe Token: SeShutdownPrivilege 1504 mscorsvw.exe Token: SeShutdownPrivilege 2204 mscorsvw.exe Token: 33 2984 EhTray.exe Token: SeIncBasePriorityPrivilege 2984 EhTray.exe Token: SeShutdownPrivilege 1504 mscorsvw.exe Token: SeDebugPrivilege 1344 ehRec.exe Token: SeShutdownPrivilege 2204 mscorsvw.exe Token: SeTakeOwnershipPrivilege 3012 aspnet_state.exe Token: SeShutdownPrivilege 1504 mscorsvw.exe Token: SeShutdownPrivilege 1504 mscorsvw.exe Token: SeShutdownPrivilege 2204 mscorsvw.exe Token: SeShutdownPrivilege 2204 mscorsvw.exe Token: SeRestorePrivilege 848 msiexec.exe Token: SeTakeOwnershipPrivilege 848 msiexec.exe Token: SeSecurityPrivilege 848 msiexec.exe Token: 33 2984 EhTray.exe Token: SeIncBasePriorityPrivilege 2984 EhTray.exe Token: SeBackupPrivilege 2592 vssvc.exe Token: SeRestorePrivilege 2592 vssvc.exe Token: SeAuditPrivilege 2592 vssvc.exe Token: SeBackupPrivilege 840 wbengine.exe Token: SeRestorePrivilege 840 wbengine.exe Token: SeSecurityPrivilege 840 wbengine.exe Token: 33 2024 wmpnetwk.exe Token: SeIncBasePriorityPrivilege 2024 wmpnetwk.exe Token: SeManageVolumePrivilege 628 SearchIndexer.exe Token: 33 628 SearchIndexer.exe Token: SeIncBasePriorityPrivilege 628 SearchIndexer.exe Token: SeShutdownPrivilege 1504 mscorsvw.exe Token: SeShutdownPrivilege 2204 mscorsvw.exe Token: SeDebugPrivilege 3012 aspnet_state.exe Token: SeShutdownPrivilege 1504 mscorsvw.exe Token: SeShutdownPrivilege 2204 mscorsvw.exe Token: SeDebugPrivilege 1504 mscorsvw.exe Token: SeShutdownPrivilege 1504 mscorsvw.exe Token: SeShutdownPrivilege 1504 mscorsvw.exe Token: SeShutdownPrivilege 1504 mscorsvw.exe Token: SeShutdownPrivilege 1504 mscorsvw.exe Token: SeShutdownPrivilege 2204 mscorsvw.exe Token: SeShutdownPrivilege 2204 mscorsvw.exe Token: SeShutdownPrivilege 2204 mscorsvw.exe Token: SeShutdownPrivilege 1504 mscorsvw.exe Token: SeShutdownPrivilege 2204 mscorsvw.exe Token: SeShutdownPrivilege 1504 mscorsvw.exe Token: SeShutdownPrivilege 2204 mscorsvw.exe Token: SeShutdownPrivilege 1504 mscorsvw.exe Token: SeShutdownPrivilege 2204 mscorsvw.exe Token: SeShutdownPrivilege 1504 mscorsvw.exe Token: SeShutdownPrivilege 2204 mscorsvw.exe Token: SeShutdownPrivilege 1504 mscorsvw.exe Token: SeShutdownPrivilege 2204 mscorsvw.exe Token: SeShutdownPrivilege 1504 mscorsvw.exe Token: SeShutdownPrivilege 2204 mscorsvw.exe Token: SeShutdownPrivilege 1504 mscorsvw.exe Token: SeShutdownPrivilege 2204 mscorsvw.exe Token: SeShutdownPrivilege 1504 mscorsvw.exe Token: SeShutdownPrivilege 2204 mscorsvw.exe Token: SeShutdownPrivilege 1504 mscorsvw.exe Token: SeShutdownPrivilege 2204 mscorsvw.exe Token: SeShutdownPrivilege 1504 mscorsvw.exe Token: SeShutdownPrivilege 2204 mscorsvw.exe Token: SeShutdownPrivilege 1504 mscorsvw.exe Token: SeShutdownPrivilege 2204 mscorsvw.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
EhTray.exepid process 2984 EhTray.exe 2984 EhTray.exe -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
EhTray.exepid process 2984 EhTray.exe 2984 EhTray.exe -
Suspicious use of SetWindowsHookEx 15 IoCs
Processes:
SearchProtocolHost.exeSearchProtocolHost.exepid process 3044 SearchProtocolHost.exe 3044 SearchProtocolHost.exe 3044 SearchProtocolHost.exe 3044 SearchProtocolHost.exe 3044 SearchProtocolHost.exe 2572 SearchProtocolHost.exe 2572 SearchProtocolHost.exe 2572 SearchProtocolHost.exe 2572 SearchProtocolHost.exe 2572 SearchProtocolHost.exe 2572 SearchProtocolHost.exe 2572 SearchProtocolHost.exe 2572 SearchProtocolHost.exe 2572 SearchProtocolHost.exe 3044 SearchProtocolHost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
mscorsvw.exeSearchIndexer.exedescription pid process target process PID 1504 wrote to memory of 616 1504 mscorsvw.exe mscorsvw.exe PID 1504 wrote to memory of 616 1504 mscorsvw.exe mscorsvw.exe PID 1504 wrote to memory of 616 1504 mscorsvw.exe mscorsvw.exe PID 1504 wrote to memory of 616 1504 mscorsvw.exe mscorsvw.exe PID 1504 wrote to memory of 2276 1504 mscorsvw.exe mscorsvw.exe PID 1504 wrote to memory of 2276 1504 mscorsvw.exe mscorsvw.exe PID 1504 wrote to memory of 2276 1504 mscorsvw.exe mscorsvw.exe PID 1504 wrote to memory of 2276 1504 mscorsvw.exe mscorsvw.exe PID 1504 wrote to memory of 1612 1504 mscorsvw.exe mscorsvw.exe PID 1504 wrote to memory of 1612 1504 mscorsvw.exe mscorsvw.exe PID 1504 wrote to memory of 1612 1504 mscorsvw.exe mscorsvw.exe PID 1504 wrote to memory of 1612 1504 mscorsvw.exe mscorsvw.exe PID 628 wrote to memory of 3044 628 SearchIndexer.exe SearchProtocolHost.exe PID 628 wrote to memory of 3044 628 SearchIndexer.exe SearchProtocolHost.exe PID 628 wrote to memory of 3044 628 SearchIndexer.exe SearchProtocolHost.exe PID 628 wrote to memory of 808 628 SearchIndexer.exe SearchFilterHost.exe PID 628 wrote to memory of 808 628 SearchIndexer.exe SearchFilterHost.exe PID 628 wrote to memory of 808 628 SearchIndexer.exe SearchFilterHost.exe PID 1504 wrote to memory of 2200 1504 mscorsvw.exe mscorsvw.exe PID 1504 wrote to memory of 2200 1504 mscorsvw.exe mscorsvw.exe PID 1504 wrote to memory of 2200 1504 mscorsvw.exe mscorsvw.exe PID 1504 wrote to memory of 2200 1504 mscorsvw.exe mscorsvw.exe PID 1504 wrote to memory of 2748 1504 mscorsvw.exe mscorsvw.exe PID 1504 wrote to memory of 2748 1504 mscorsvw.exe mscorsvw.exe PID 1504 wrote to memory of 2748 1504 mscorsvw.exe mscorsvw.exe PID 1504 wrote to memory of 2748 1504 mscorsvw.exe mscorsvw.exe PID 1504 wrote to memory of 2804 1504 mscorsvw.exe mscorsvw.exe PID 1504 wrote to memory of 2804 1504 mscorsvw.exe mscorsvw.exe PID 1504 wrote to memory of 2804 1504 mscorsvw.exe mscorsvw.exe PID 1504 wrote to memory of 2804 1504 mscorsvw.exe mscorsvw.exe PID 1504 wrote to memory of 2888 1504 mscorsvw.exe mscorsvw.exe PID 1504 wrote to memory of 2888 1504 mscorsvw.exe mscorsvw.exe PID 1504 wrote to memory of 2888 1504 mscorsvw.exe mscorsvw.exe PID 1504 wrote to memory of 2888 1504 mscorsvw.exe mscorsvw.exe PID 1504 wrote to memory of 2156 1504 mscorsvw.exe mscorsvw.exe PID 1504 wrote to memory of 2156 1504 mscorsvw.exe mscorsvw.exe PID 1504 wrote to memory of 2156 1504 mscorsvw.exe mscorsvw.exe PID 1504 wrote to memory of 2156 1504 mscorsvw.exe mscorsvw.exe PID 1504 wrote to memory of 1512 1504 mscorsvw.exe mscorsvw.exe PID 1504 wrote to memory of 1512 1504 mscorsvw.exe mscorsvw.exe PID 1504 wrote to memory of 1512 1504 mscorsvw.exe mscorsvw.exe PID 1504 wrote to memory of 1512 1504 mscorsvw.exe mscorsvw.exe PID 1504 wrote to memory of 972 1504 mscorsvw.exe mscorsvw.exe PID 1504 wrote to memory of 972 1504 mscorsvw.exe mscorsvw.exe PID 1504 wrote to memory of 972 1504 mscorsvw.exe mscorsvw.exe PID 1504 wrote to memory of 972 1504 mscorsvw.exe mscorsvw.exe PID 1504 wrote to memory of 2552 1504 mscorsvw.exe mscorsvw.exe PID 1504 wrote to memory of 2552 1504 mscorsvw.exe mscorsvw.exe PID 1504 wrote to memory of 2552 1504 mscorsvw.exe mscorsvw.exe PID 1504 wrote to memory of 2552 1504 mscorsvw.exe mscorsvw.exe PID 1504 wrote to memory of 2460 1504 mscorsvw.exe mscorsvw.exe PID 1504 wrote to memory of 2460 1504 mscorsvw.exe mscorsvw.exe PID 1504 wrote to memory of 2460 1504 mscorsvw.exe mscorsvw.exe PID 1504 wrote to memory of 2460 1504 mscorsvw.exe mscorsvw.exe PID 1504 wrote to memory of 1976 1504 mscorsvw.exe mscorsvw.exe PID 1504 wrote to memory of 1976 1504 mscorsvw.exe mscorsvw.exe PID 1504 wrote to memory of 1976 1504 mscorsvw.exe mscorsvw.exe PID 1504 wrote to memory of 1976 1504 mscorsvw.exe mscorsvw.exe PID 1504 wrote to memory of 944 1504 mscorsvw.exe mscorsvw.exe PID 1504 wrote to memory of 944 1504 mscorsvw.exe mscorsvw.exe PID 1504 wrote to memory of 944 1504 mscorsvw.exe mscorsvw.exe PID 1504 wrote to memory of 944 1504 mscorsvw.exe mscorsvw.exe PID 628 wrote to memory of 2572 628 SearchIndexer.exe SearchProtocolHost.exe PID 628 wrote to memory of 2572 628 SearchIndexer.exe SearchProtocolHost.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\250b1a453fc129e0436f4a2851c337eb8c989add9f79905e865c10efcc148de3.exe"C:\Users\Admin\AppData\Local\Temp\250b1a453fc129e0436f4a2851c337eb8c989add9f79905e865c10efcc148de3.exe"1⤵
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1368
-
C:\Windows\System32\alg.exeC:\Windows\System32\alg.exe1⤵
- Executes dropped EXE
PID:1132
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3012
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe1⤵
- Executes dropped EXE
PID:1660
-
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2632
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1e8 -InterruptEvent 1d4 -NGENProcess 1d8 -Pipe 1e4 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:616 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 258 -InterruptEvent 1d4 -NGENProcess 1d8 -Pipe 1e8 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2276 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1d4 -InterruptEvent 248 -NGENProcess 254 -Pipe 250 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1612 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 248 -InterruptEvent 244 -NGENProcess 1d8 -Pipe 240 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2200 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 244 -InterruptEvent 264 -NGENProcess 258 -Pipe 260 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2748 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 23c -InterruptEvent 248 -NGENProcess 268 -Pipe 244 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2804 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 254 -InterruptEvent 1f0 -NGENProcess 26c -Pipe 23c -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2888 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1f0 -InterruptEvent 25c -NGENProcess 268 -Pipe 1d8 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2156 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 25c -InterruptEvent 258 -NGENProcess 248 -Pipe 274 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1512 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 258 -InterruptEvent 24c -NGENProcess 270 -Pipe 1d4 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:972 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 24c -InterruptEvent 270 -NGENProcess 1f0 -Pipe 27c -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2552 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 270 -InterruptEvent 264 -NGENProcess 278 -Pipe 254 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2460 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 264 -InterruptEvent 280 -NGENProcess 258 -Pipe 26c -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1976 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 284 -InterruptEvent 280 -NGENProcess 264 -Pipe 1f0 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:944 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 268 -InterruptEvent 280 -NGENProcess 284 -Pipe 258 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2540 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 280 -InterruptEvent 25c -NGENProcess 264 -Pipe 248 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2884 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 25c -InterruptEvent 290 -NGENProcess 24c -Pipe 278 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1636 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 290 -InterruptEvent 294 -NGENProcess 284 -Pipe 28c -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2944 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 294 -InterruptEvent 29c -NGENProcess 264 -Pipe 298 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2772 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 270 -InterruptEvent 2a0 -NGENProcess 280 -Pipe 294 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1548 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 24c -InterruptEvent 25c -NGENProcess 288 -Pipe 270 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:636 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 25c -InterruptEvent 284 -NGENProcess 280 -Pipe 264 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1000 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2a8 -InterruptEvent 24c -NGENProcess 2ac -Pipe 25c -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:940 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2a8 -InterruptEvent 1d0 -NGENProcess 29c -Pipe 1c4 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2160 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1d0 -InterruptEvent 2cc -NGENProcess 2ac -Pipe 2c8 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1440 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2cc -InterruptEvent 2d0 -NGENProcess 2bc -Pipe 2c4 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2580 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2d4 -InterruptEvent 1d0 -NGENProcess 2d8 -Pipe 2cc -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1760 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1d0 -InterruptEvent 2b8 -NGENProcess 2bc -Pipe 280 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:2328 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2dc -InterruptEvent 2bc -NGENProcess 2d4 -Pipe 2ac -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:924 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2bc -InterruptEvent 2e4 -NGENProcess 2b8 -Pipe 2c0 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:1400 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2e4 -InterruptEvent 2b8 -NGENProcess 2dc -Pipe 2d0 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2052 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2b8 -InterruptEvent 2ec -NGENProcess 2d4 -Pipe 29c -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2160 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2ec -InterruptEvent 2d4 -NGENProcess 2e4 -Pipe 2e8 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1932 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2d4 -InterruptEvent 2f4 -NGENProcess 2dc -Pipe 2bc -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:548 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2f4 -InterruptEvent 2dc -NGENProcess 2ec -Pipe 2f0 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:3060 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2dc -InterruptEvent 2fc -NGENProcess 2e4 -Pipe 2b8 -Comment "NGen Worker Process"2⤵
- Loads dropped DLL
- Drops file in Windows directory
PID:1500 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2fc -InterruptEvent 2e4 -NGENProcess 2f4 -Pipe 2f8 -Comment "NGen Worker Process"2⤵PID:1912
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2e4 -InterruptEvent 304 -NGENProcess 2ec -Pipe 2d4 -Comment "NGen Worker Process"2⤵
- Loads dropped DLL
- Drops file in Windows directory
PID:1476 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 308 -InterruptEvent 2fc -NGENProcess 30c -Pipe 2e4 -Comment "NGen Worker Process"2⤵PID:672
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2fc -InterruptEvent 2e0 -NGENProcess 2ec -Pipe 2dc -Comment "NGen Worker Process"2⤵
- Loads dropped DLL
- Drops file in Windows directory
PID:2488 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 310 -InterruptEvent 308 -NGENProcess 314 -Pipe 2fc -Comment "NGen Worker Process"2⤵PID:2044
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 308 -InterruptEvent 2a8 -NGENProcess 2ec -Pipe 2d8 -Comment "NGen Worker Process"2⤵
- Loads dropped DLL
- Drops file in Windows directory
PID:2380 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2a8 -InterruptEvent 2ec -NGENProcess 310 -Pipe 2f4 -Comment "NGen Worker Process"2⤵PID:2804
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2ec -InterruptEvent 31c -NGENProcess 314 -Pipe 300 -Comment "NGen Worker Process"2⤵
- Loads dropped DLL
- Drops file in Windows directory
PID:1892 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 31c -InterruptEvent 314 -NGENProcess 2a8 -Pipe 318 -Comment "NGen Worker Process"2⤵PID:1784
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 314 -InterruptEvent 324 -NGENProcess 310 -Pipe 308 -Comment "NGen Worker Process"2⤵
- Loads dropped DLL
- Drops file in Windows directory
PID:2900 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 324 -InterruptEvent 310 -NGENProcess 31c -Pipe 320 -Comment "NGen Worker Process"2⤵PID:2844
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 310 -InterruptEvent 32c -NGENProcess 2a8 -Pipe 2ec -Comment "NGen Worker Process"2⤵
- Loads dropped DLL
- Drops file in Windows directory
PID:2828 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 330 -InterruptEvent 324 -NGENProcess 334 -Pipe 310 -Comment "NGen Worker Process"2⤵PID:1280
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 324 -InterruptEvent 304 -NGENProcess 2a8 -Pipe 314 -Comment "NGen Worker Process"2⤵
- Loads dropped DLL
- Drops file in Windows directory
PID:2968 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 304 -InterruptEvent 2a8 -NGENProcess 330 -Pipe 32c -Comment "NGen Worker Process"2⤵PID:1912
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2a8 -InterruptEvent 33c -NGENProcess 334 -Pipe 2e0 -Comment "NGen Worker Process"2⤵
- Loads dropped DLL
- Drops file in Windows directory
PID:1676 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 30c -InterruptEvent 2a8 -NGENProcess 344 -Pipe 304 -Comment "NGen Worker Process"2⤵PID:1304
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2a8 -InterruptEvent 328 -NGENProcess 334 -Pipe 324 -Comment "NGen Worker Process"2⤵
- Loads dropped DLL
- Drops file in Windows directory
PID:2856 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 328 -InterruptEvent 334 -NGENProcess 30c -Pipe 340 -Comment "NGen Worker Process"2⤵PID:1204
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 334 -InterruptEvent 34c -NGENProcess 344 -Pipe 338 -Comment "NGen Worker Process"2⤵
- Loads dropped DLL
PID:2340 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 34c -InterruptEvent 348 -NGENProcess 328 -Pipe 31c -Comment "NGen Worker Process"2⤵PID:1748
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 348 -InterruptEvent 33c -NGENProcess 350 -Pipe 2a8 -Comment "NGen Worker Process"2⤵
- Loads dropped DLL
- Drops file in Windows directory
PID:1724 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 328 -InterruptEvent 330 -NGENProcess 354 -Pipe 358 -Comment "NGen Worker Process"2⤵
- Modifies data under HKEY_USERS
PID:1580 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 330 -InterruptEvent 364 -NGENProcess 30c -Pipe 360 -Comment "NGen Worker Process"2⤵PID:2768
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 364 -InterruptEvent 368 -NGENProcess 344 -Pipe 334 -Comment "NGen Worker Process"2⤵PID:1184
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 368 -InterruptEvent 36c -NGENProcess 354 -Pipe 348 -Comment "NGen Worker Process"2⤵PID:2420
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 36c -InterruptEvent 370 -NGENProcess 30c -Pipe 33c -Comment "NGen Worker Process"2⤵
- Loads dropped DLL
- Drops file in Windows directory
PID:1912 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 370 -InterruptEvent 30c -NGENProcess 368 -Pipe 344 -Comment "NGen Worker Process"2⤵
- Loads dropped DLL
- Drops file in Windows directory
PID:1728 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 378 -InterruptEvent 328 -NGENProcess 37c -Pipe 370 -Comment "NGen Worker Process"2⤵PID:2900
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 328 -InterruptEvent 330 -NGENProcess 368 -Pipe 364 -Comment "NGen Worker Process"2⤵PID:1388
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 330 -InterruptEvent 368 -NGENProcess 354 -Pipe 384 -Comment "NGen Worker Process"2⤵
- Modifies data under HKEY_USERS
PID:2016 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 368 -InterruptEvent 35c -NGENProcess 380 -Pipe 36c -Comment "NGen Worker Process"2⤵PID:2856
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 35c -InterruptEvent 388 -NGENProcess 328 -Pipe 374 -Comment "NGen Worker Process"2⤵PID:1156
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 388 -InterruptEvent 38c -NGENProcess 354 -Pipe 30c -Comment "NGen Worker Process"2⤵PID:2460
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 38c -InterruptEvent 390 -NGENProcess 380 -Pipe 378 -Comment "NGen Worker Process"2⤵PID:1564
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 390 -InterruptEvent 394 -NGENProcess 328 -Pipe 330 -Comment "NGen Worker Process"2⤵PID:2076
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 394 -InterruptEvent 398 -NGENProcess 354 -Pipe 368 -Comment "NGen Worker Process"2⤵PID:2764
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 398 -InterruptEvent 39c -NGENProcess 380 -Pipe 35c -Comment "NGen Worker Process"2⤵PID:2476
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 39c -InterruptEvent 3a0 -NGENProcess 328 -Pipe 388 -Comment "NGen Worker Process"2⤵PID:1380
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3a0 -InterruptEvent 3a4 -NGENProcess 354 -Pipe 38c -Comment "NGen Worker Process"2⤵PID:2248
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3a4 -InterruptEvent 3a8 -NGENProcess 380 -Pipe 390 -Comment "NGen Worker Process"2⤵PID:2768
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3a8 -InterruptEvent 3ac -NGENProcess 328 -Pipe 394 -Comment "NGen Worker Process"2⤵PID:3056
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3ac -InterruptEvent 3b4 -NGENProcess 354 -Pipe 3b0 -Comment "NGen Worker Process"2⤵PID:1440
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3b4 -InterruptEvent 398 -NGENProcess 37c -Pipe 380 -Comment "NGen Worker Process"2⤵
- Modifies data under HKEY_USERS
PID:1700 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 398 -InterruptEvent 3b8 -NGENProcess 3a4 -Pipe 39c -Comment "NGen Worker Process"2⤵PID:2404
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3b8 -InterruptEvent 3bc -NGENProcess 354 -Pipe 3a0 -Comment "NGen Worker Process"2⤵PID:2284
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3c0 -InterruptEvent 398 -NGENProcess 3c4 -Pipe 3b8 -Comment "NGen Worker Process"2⤵PID:1556
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 398 -InterruptEvent 3a8 -NGENProcess 354 -Pipe 3ac -Comment "NGen Worker Process"2⤵PID:2860
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3a8 -InterruptEvent 3c8 -NGENProcess 3bc -Pipe 328 -Comment "NGen Worker Process"2⤵PID:2264
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3c8 -InterruptEvent 3cc -NGENProcess 3c4 -Pipe 3b4 -Comment "NGen Worker Process"2⤵PID:1500
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3cc -InterruptEvent 3d0 -NGENProcess 354 -Pipe 37c -Comment "NGen Worker Process"2⤵PID:1732
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3d0 -InterruptEvent 3d4 -NGENProcess 3bc -Pipe 3c0 -Comment "NGen Worker Process"2⤵
- Modifies data under HKEY_USERS
PID:2656 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3d8 -InterruptEvent 3d4 -NGENProcess 3d0 -Pipe 3c4 -Comment "NGen Worker Process"2⤵
- Modifies data under HKEY_USERS
PID:2196 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3d4 -InterruptEvent 398 -NGENProcess 3bc -Pipe 3a8 -Comment "NGen Worker Process"2⤵
- Modifies data under HKEY_USERS
PID:2844 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 398 -InterruptEvent 3e0 -NGENProcess 3cc -Pipe 3a4 -Comment "NGen Worker Process"2⤵
- Modifies data under HKEY_USERS
PID:3048 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 398 -InterruptEvent 3cc -NGENProcess 3e0 -Pipe 3e4 -Comment "NGen Worker Process"2⤵
- Modifies data under HKEY_USERS
PID:1556 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3cc -InterruptEvent 3e8 -NGENProcess 3bc -Pipe 3c8 -Comment "NGen Worker Process"2⤵
- Modifies data under HKEY_USERS
PID:3000 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3e8 -InterruptEvent 3ec -NGENProcess 3dc -Pipe 3d8 -Comment "NGen Worker Process"2⤵
- Modifies data under HKEY_USERS
PID:324 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3ec -InterruptEvent 3f0 -NGENProcess 3e0 -Pipe 3d4 -Comment "NGen Worker Process"2⤵PID:2804
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3f0 -InterruptEvent 3f4 -NGENProcess 3bc -Pipe 3d0 -Comment "NGen Worker Process"2⤵
- Modifies data under HKEY_USERS
PID:2748 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3f4 -InterruptEvent 3f8 -NGENProcess 3dc -Pipe 398 -Comment "NGen Worker Process"2⤵
- Modifies data under HKEY_USERS
PID:1444 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3f8 -InterruptEvent 3fc -NGENProcess 3e0 -Pipe 3cc -Comment "NGen Worker Process"2⤵
- Modifies data under HKEY_USERS
PID:1376 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3fc -InterruptEvent 404 -NGENProcess 3bc -Pipe 3e8 -Comment "NGen Worker Process"2⤵
- Modifies data under HKEY_USERS
PID:920 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 404 -InterruptEvent 408 -NGENProcess 3dc -Pipe 3ec -Comment "NGen Worker Process"2⤵
- Loads dropped DLL
- Drops file in Windows directory
- Modifies data under HKEY_USERS
PID:756 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 408 -InterruptEvent 3dc -NGENProcess 3fc -Pipe 3e0 -Comment "NGen Worker Process"2⤵
- Modifies data under HKEY_USERS
PID:1560 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3dc -InterruptEvent 410 -NGENProcess 3bc -Pipe 3f4 -Comment "NGen Worker Process"2⤵
- Loads dropped DLL
- Drops file in Windows directory
- Modifies data under HKEY_USERS
PID:2100 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 414 -InterruptEvent 408 -NGENProcess 418 -Pipe 3dc -Comment "NGen Worker Process"2⤵
- Modifies data under HKEY_USERS
PID:2940 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 408 -InterruptEvent 3f8 -NGENProcess 3bc -Pipe 404 -Comment "NGen Worker Process"2⤵
- Loads dropped DLL
- Drops file in Windows directory
- Modifies data under HKEY_USERS
PID:896 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 41c -InterruptEvent 414 -NGENProcess 420 -Pipe 408 -Comment "NGen Worker Process"2⤵PID:912
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 414 -InterruptEvent 354 -NGENProcess 3bc -Pipe 3f0 -Comment "NGen Worker Process"2⤵PID:2284
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 354 -InterruptEvent 424 -NGENProcess 3f8 -Pipe 3fc -Comment "NGen Worker Process"2⤵PID:1580
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 424 -InterruptEvent 3f8 -NGENProcess 414 -Pipe 420 -Comment "NGen Worker Process"2⤵PID:980
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3f8 -InterruptEvent 42c -NGENProcess 3bc -Pipe 410 -Comment "NGen Worker Process"2⤵PID:2020
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 42c -InterruptEvent 430 -NGENProcess 428 -Pipe 41c -Comment "NGen Worker Process"2⤵PID:828
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 430 -InterruptEvent 434 -NGENProcess 414 -Pipe 354 -Comment "NGen Worker Process"2⤵PID:2952
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 434 -InterruptEvent 438 -NGENProcess 3bc -Pipe 40c -Comment "NGen Worker Process"2⤵PID:2564
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 438 -InterruptEvent 43c -NGENProcess 428 -Pipe 424 -Comment "NGen Worker Process"2⤵PID:1728
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 43c -InterruptEvent 440 -NGENProcess 414 -Pipe 3f8 -Comment "NGen Worker Process"2⤵PID:2696
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 440 -InterruptEvent 444 -NGENProcess 3bc -Pipe 42c -Comment "NGen Worker Process"2⤵PID:2476
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 444 -InterruptEvent 448 -NGENProcess 428 -Pipe 430 -Comment "NGen Worker Process"2⤵PID:2248
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 44c -InterruptEvent 448 -NGENProcess 444 -Pipe 414 -Comment "NGen Worker Process"2⤵PID:2328
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 448 -InterruptEvent 434 -NGENProcess 428 -Pipe 438 -Comment "NGen Worker Process"2⤵PID:1672
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 434 -InterruptEvent 454 -NGENProcess 440 -Pipe 418 -Comment "NGen Worker Process"2⤵PID:1320
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 454 -InterruptEvent 458 -NGENProcess 444 -Pipe 450 -Comment "NGen Worker Process"2⤵PID:828
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 458 -InterruptEvent 45c -NGENProcess 428 -Pipe 43c -Comment "NGen Worker Process"2⤵PID:2952
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 45c -InterruptEvent 460 -NGENProcess 440 -Pipe 44c -Comment "NGen Worker Process"2⤵PID:944
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 460 -InterruptEvent 464 -NGENProcess 444 -Pipe 448 -Comment "NGen Worker Process"2⤵PID:1728
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 464 -InterruptEvent 468 -NGENProcess 428 -Pipe 434 -Comment "NGen Worker Process"2⤵PID:3048
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 468 -InterruptEvent 46c -NGENProcess 440 -Pipe 454 -Comment "NGen Worker Process"2⤵PID:2304
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 46c -InterruptEvent 470 -NGENProcess 444 -Pipe 458 -Comment "NGen Worker Process"2⤵PID:2636
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 470 -InterruptEvent 474 -NGENProcess 428 -Pipe 45c -Comment "NGen Worker Process"2⤵PID:672
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2204 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 1d8 -InterruptEvent 1c4 -NGENProcess 1c8 -Pipe 1d4 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2672 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 248 -InterruptEvent 1c4 -NGENProcess 1c8 -Pipe 1d8 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2684
-
C:\Windows\ehome\ehRecvr.exeC:\Windows\ehome\ehRecvr.exe1⤵
- Executes dropped EXE
PID:2976
-
C:\Windows\ehome\ehsched.exeC:\Windows\ehome\ehsched.exe1⤵
- Executes dropped EXE
PID:792
-
C:\Windows\eHome\EhTray.exe"C:\Windows\eHome\EhTray.exe" /nav:-21⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2984
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵
- Executes dropped EXE
PID:1812
-
C:\Windows\system32\IEEtwCollector.exeC:\Windows\system32\IEEtwCollector.exe /V1⤵
- Executes dropped EXE
PID:2068
-
C:\Windows\ehome\ehRec.exeC:\Windows\ehome\ehRec.exe -Embedding1⤵
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1344
-
C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE"C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE" /auditservice1⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2080
-
C:\Windows\system32\dllhost.exeC:\Windows\system32\dllhost.exe /Processid:{02D4B3F1-FD88-11D1-960D-00805FC79235}1⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2128
-
C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"1⤵
- Executes dropped EXE
PID:2876
-
C:\Windows\System32\msdtc.exeC:\Windows\System32\msdtc.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2688
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:848
-
C:\Program Files (x86)\Common Files\Microsoft Shared\Source Engine\OSE.EXE"C:\Program Files (x86)\Common Files\Microsoft Shared\Source Engine\OSE.EXE"1⤵
- Executes dropped EXE
PID:2816
-
C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"1⤵
- Executes dropped EXE
PID:2060
-
C:\Windows\SysWow64\perfhost.exeC:\Windows\SysWow64\perfhost.exe1⤵
- Executes dropped EXE
PID:2972
-
C:\Windows\system32\locator.exeC:\Windows\system32\locator.exe1⤵
- Executes dropped EXE
PID:2324
-
C:\Windows\System32\snmptrap.exeC:\Windows\System32\snmptrap.exe1⤵
- Executes dropped EXE
PID:2152
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵
- Executes dropped EXE
PID:1368
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2592
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:840
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵
- Executes dropped EXE
PID:1592
-
C:\Program Files\Windows Media Player\wmpnetwk.exe"C:\Program Files\Windows Media Player\wmpnetwk.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2024
-
C:\Windows\system32\SearchIndexer.exeC:\Windows\system32\SearchIndexer.exe /Embedding1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:628 -
C:\Windows\system32\SearchProtocolHost.exe"C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe_S-1-5-21-330940541-141609230-1670313778-10001_ Global\UsGthrCtrlFltPipeMssGthrPipe_S-1-5-21-330940541-141609230-1670313778-10001 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon" "1"2⤵
- Suspicious use of SetWindowsHookEx
PID:3044 -
C:\Windows\system32\SearchFilterHost.exe"C:\Windows\system32\SearchFilterHost.exe" 0 600 604 612 65536 6082⤵
- Modifies data under HKEY_USERS
PID:808 -
C:\Windows\system32\SearchProtocolHost.exe"C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe2_ Global\UsGthrCtrlFltPipeMssGthrPipe2 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon"2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:2572
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
706KB
MD56b6774d1ba9ed4affa2df8622b79c2d3
SHA1161d4f74f7402c367c146201f53491b094f535c8
SHA256d2e463df084806da15a47d12398a20a153406cdaf880bf794e0b78ccbc065981
SHA512cb13c3b1c865bba4ca5ad65ea0fdad15d0beb1f56382d4f3901af0602709a1964936d117d25e185e7445e9379f099d10d67233976796eaaeb27765654d46a670
-
Filesize
30.1MB
MD5ee9d71fdc189225a6eaab4e3e1ebd953
SHA1847f729e61d6c73d6f6c31159dc20d05d2346550
SHA2566881400cfad24bea71ff6e357284095c7c6fa3868bc6896f395e46ea241675ca
SHA512e421c791eb1ffc84cbdfc694be4ee6cfad24b253cc5cba3b3ab87536599b4599072c1493b77ec827e27f71fa42a1d3576cbc743ca0da18edafe8c8b991a6f082
-
Filesize
781KB
MD59a402355c12f8a81f5b5ff22c367a9e2
SHA10690583e099323e47873741f6e7ea04107439128
SHA25645c5fd494f4fec3bc85c2aee6cdce49416cfeb6667705b22813efc352645307b
SHA512fb24b9bf066cb15742a941b493c5fb42057549a558fc315cad64afbeefd134fdd8bb5411d3e5061b37eaa6d249c1132c549c775b7036cf78c0ca0f22aea870fa
-
Filesize
5.2MB
MD544013b3ff016719179f90366dce1b929
SHA17d422e914adcdffc91c9a096d83df565816edbfb
SHA256c6979c64c49297ce3b7a4f6e6f0da924925c8ab7b7fa558368cf54c5dca42802
SHA51286a00e902535283e8517d0a1f419f018954be9ee5d4927fbe2fe2d6cbde201c5298bd741711f5b91b9b6ba556254c99fd35b6fcd725042634885d71e9b4e926b
-
Filesize
2.1MB
MD5a0abbacd4ec7b1887d86745ab6baa118
SHA1768301aec1f3f029c53eb5996f298ee21e7d330f
SHA256e9de6a5a50dc57bce0249d3a7e5571a50883d1cb9932151e7fdeea17faf79a6b
SHA5120ef6b9650da413fc5b30c5c9d0c6ecdd41b155f97372aa4563d08df14920c8218809597cc6eaa26e3d61d0d9a155892e20085d47b1a3fc6e382a928dd5c3fc0a
-
Filesize
1024KB
MD5e4e8bd22f7cb41cb482ed6d096f5454a
SHA1fd9e9fbb155380f3cebd918891f934e7e2b9939f
SHA2564e7e364eb559c776fce47c248d882a8f06d7dacc08355e2254d1893c742042e7
SHA512a7e93e1d162fe82c3ee30d315777bee259ea8bf362fe6309b18a5c7b28bd311fbcefb14442b1618e8d75e37faf03ac9542b1969c15b503aa589e128ee9b4d93a
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b91050d8b077a4e8.customDestinations-ms
Filesize24B
MD5b9bd716de6739e51c620f2086f9c31e4
SHA19733d94607a3cba277e567af584510edd9febf62
SHA2567116ff028244a01f3d17f1d3bc2e1506bc9999c2e40e388458f0cccc4e117312
SHA512cef609e54c7a81a646ad38dba7ac0b82401b220773b9c792cefac80c6564753229f0c011b34ffb56381dd3154a19aee2bf5f602c4d1af01f2cf0fbc1574e4478
-
Filesize
872KB
MD59cef675d326ca1ff6d9691564d5148e3
SHA16ab938987a6ccbb47246b89c6e6b7976fce6b255
SHA25644a18bce2b8f385061f63883d714bc7daaf19ccbc9eaf62a62fc11fd1208688c
SHA51230161d62f71754d24cc255ba4ccc6500825254f900e8c6c7cbad89c9995d388a8e4ee60bbccccb9648cfa2b877fada4dc53fd5320b8f343c3709efedbf9d50df
-
Filesize
678KB
MD511dd07a4595c1e3dd7be1591959530ee
SHA157288258ef84021cd4d6982e2311e393c7442db7
SHA25687f195289cb6bd4aaffd8821394b90e1413a7c880ee4bc829910aac5bb977cbd
SHA51211d1f1f654b60418d3472c1520e792926ab5568032ae42dd6fe7cfdffb6dc5df4683dc000f0270fd5a89c4bd5f61f2afb0c197dce6fd0b80d2d65ce20b2f4363
-
Filesize
625KB
MD5a7d3f08b6f159f07d5f492ecc149457c
SHA162c8972f219114b01f41044970a770f16337a2a4
SHA2562e8d39fbe8644a2a31047b3ea3968db9a3cd905dbda4b4079a94b2c17a275cb7
SHA5121fed4ae7be5b1a48d6455513cffdd8effecf2c216d4fed8a505c9b17fea2f586237be9d70a8061a0c413d3da915e6b94d43b6e9ae9f5d3866d76e67c8050af1e
-
Filesize
1003KB
MD5aa4c31ac88918796651c58b803b1ae1d
SHA150442c3db905545b8bd56309c523f7aebffc8b62
SHA25631cf68764289a3bbf26918bdc88722183ce001f6fa17e761e03284047b3b63e3
SHA512a22530c86ce2aa0a3f0d96bb7fb067b82a3635c75de7f91df0bc6890cfe32e487686b7022341f3397659ff070e2d38adaa5de8cc6122d559a0fc4a01fb466272
-
Filesize
656KB
MD5f1afc802885718bb4e473f8bc94f7405
SHA1b11b9a71ce8fd88759e34d101563a2b52725f2ba
SHA2566247cc4d1000e5c38aaf9b608d72c05fda6bc8dc2bc15ca5a0ab34529215982a
SHA512f8c16df14e97e7f0c3d848029e421bad551135466e5850110b7131e62504264de58990dbc18c6321668520a16871de8b937159432d5dded0aed26417446f5480
-
Filesize
8KB
MD5f4be8b74729ff9f74175c50cf856ee5e
SHA11f7a44072cfa83007d6f276b314a4c86af3cca0c
SHA256feb9cf755ef2507d7830b69f8cfde674622b0dcc66d5a57cea677f0c32d686f7
SHA5125a7f04052661bff0daaa40f6de4c7edd408ea4c4ab84f49c71440f6e797d8a3327c6197d58aa7873143fda3958774add6d3a2c6ddb63df244e092cdd0044289d
-
Filesize
587KB
MD54ecec968840fc6245b9149b0066db035
SHA172745ae9bfe7e0f8ecb30089d794637b5b5c9ba7
SHA25656595de2690045575e2e3a2444ee80a2fd0d39cdf30b6f00206767b16bf5ba5e
SHA51222d5a49c266cc2dc100fd0156a38f460baa45c0575a17780e0a9145a7557b595891b0cca75a754cf42457b3c093b8422b042172e9d8845b018e783cc98d4229d
-
Filesize
577KB
MD51e4adba5e608326ba79dc6efcc08302b
SHA19eb4000fd0a32793c3ce119b1620bcdd587374e1
SHA256cbed5ae5b766dc7e60e60e18f21993a6146f3ee4e2927e4696d77a25203ffae1
SHA5123c7e18a5961fe50a0a0d58f6e82c0f87baf1b6db0d27d110266a54fb1cb07e7b7e08758496837d13f29e89cf17a5b1334556a37de4bc0816471c0125f2b36235
-
Filesize
1.1MB
MD57a4407e38f4a64464db1d678520965de
SHA19195bda62cc624466e1c47f7a55eb207badd8920
SHA25678bb901dd82e0d9fc9d5e4308f069082f895ac1306f7698177689c891263fdb8
SHA512cbfd5827890b5056ff1b71db4da625553270084137982aa48b62c0e9cae5a915cd8b6204c247bad176ebcdbd71355f78571facb5a305d6292f14a1053e3aca73
-
Filesize
2.1MB
MD5692239ce61932c8705864f74baee0792
SHA1d9c66b48ee18f87afadd50b9dd8588e210229822
SHA2565531e9a7d091a4adf4dec69db7e1bcd33358ddc29bf815b0455639f6a5ae736c
SHA512212df5568b84e764b591758b260ff1ae37861b9b3357a8bc8516a712dc01e973d95d123b3cafd2dad053a2ff8c4bf1ae9479dbbeff2b7560877c6e84db36f805
-
Filesize
705KB
MD5e9da9a0ec3b486afb5cbb5d50440138b
SHA14bd875a8874c7823429aa5b5b4383e7b21f76170
SHA256d4d49d817505a46fdd9000bbe7204f70d3d4135690271c167525a5ef6610d923
SHA5126a2cc48d7f397c8f7e5b9771f7e832b45861757f51d77662e614683038e0496d2a4503966fc36c0ad4ecae378bbd240b85354cbed67746d196205b5ea7ec5ff4
-
Filesize
1.1MB
MD5734d563316c6eb911be31fc350414aeb
SHA17044c4a141e60bfaa9a36006edc49ccaba1216f5
SHA256c5deab8dddeecebcdfccf6061990cd86f837a9558b244d230351238a582c6d1b
SHA512c82ee300d12973cea0ceca8507a85c60bc5e3b4ce1139bc6e9cc79f0dcf498e86641fdc42c251d9374aa33fa20dffe4865298c0145defbcdc2f0fc6dd919b6ac
-
Filesize
2.0MB
MD574351a0986eaf7db883bfa3e1fddad39
SHA1c68930868c7e99de94bcbf73af9034628891fdaf
SHA256e12e828b162ebb0fbb0af69da6b29707acecef63ed01c3cec39d1fcb8ce7d468
SHA5126dd02c6e2656fceb770a50fe74771bec2d95cdbc59335487bcd1d28d05fd4286640d4e5c7d98ffe2483fbf670c4f0361244c683096551b42f38c1f287d00d99a
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.Office.To#\135228e87b2c27d26b516ac0fc0ce667\Microsoft.Office.Tools.Word.v9.0.ni.dll
Filesize834KB
MD5c76656b09bb7df6bd2ac1a6177a0027c
SHA10c296994a249e8649b19be84dce27c9ddafef3e0
SHA256a0ae0aec5b203865fac761023741a59d274e2c41889aeb69140eb746d38f6ce0
SHA5128390879b8812fc98c17702a52259d510a7fe8bc3cf4972e89f705e93bc8fa98300c34d49f3aec869da8d9f786d33004742e4538019c0f852c61db89c302d5fdf
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.Office.To#\5766ec3721d18a48bec1ca1f60331e2d\Microsoft.Office.Tools.Common.v9.0.ni.dll
Filesize797KB
MD5aeb0b6e6c5d32d1ada231285ff2ae881
SHA11f04a1c059503896336406aed1dc93340e90b742
SHA2564c53ca542ac5ef9d822ef8cb3b0ecef3fb8b937d94c0a7b735bedb275c74a263
SHA512e55fd4c4d2966b3f0b6e88292fbd6c20ffa34766e076e763442c15212d19b6dea5d9dc9e7c359d999674a5b2c8a3849c2bbaaf83e7aa8c12715028b06b5a48e1
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.Office.To#\60214b09b490be856c4ee2b3398d71bd\Microsoft.Office.Tools.Outlook.v9.0.ni.dll
Filesize163KB
MD5e88828b5a35063aa16c68ffb8322215d
SHA18225660ba3a9f528cf6ac32038ae3e0ec98d2331
SHA25699facae4828c566c310a1ccf4059100067ab8bfb3d6e94e44dd9e189fd491142
SHA512e4d2f5a5aeaa29d4d3392588f15db0d514ca4c86c629f0986ee8dba61e34af5ca9e06b94479efd8dd154026ae0da276888a0214e167129db18316a17d9718a57
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.Office.To#\d7be05162f8d0fba8f4447db13f6695b\Microsoft.Office.Tools.Excel.v9.0.ni.dll
Filesize1.3MB
MD5006498313e139299a5383f0892c954b9
SHA17b3aa10930da9f29272154e2674b86876957ce3a
SHA256489fec79addba2de9141daa61062a05a95e96a196049ce414807bada572cc35c
SHA5126a15a10ae66ce0e5b18e060bb53c3108d09f6b07ee2c4a834856f0a35bec2453b32f891620e787731985719831302160678eb52acada102fdb0b87a14288d925
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.Office.To#\e1f8e4d08d4b7f811b7dbbacd324027b\Microsoft.Office.Tools.v9.0.ni.dll
Filesize148KB
MD5ac901cf97363425059a50d1398e3454b
SHA12f8bd4ac2237a7b7606cb77a3d3c58051793c5c7
SHA256f6c7aecb211d9aac911bf80c91e84a47a72ac52cbb523e34e9da6482c0b24c58
SHA5126a340b6d5fa8e214f2a58d8b691c749336df087fa75bcc8d8c46f708e4b4ff3d68a61a17d13ee62322b75cbc61d39f5a572588772f3c5d6e5ff32036e5bc5a00
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\03cad6bd8b37d21b28dcb4f955be2158\Microsoft.VisualStudio.Tools.Applications.Contract.v9.0.ni.dll
Filesize34KB
MD5c26b034a8d6ab845b41ed6e8a8d6001d
SHA13a55774cf22d3244d30f9eb5e26c0a6792a3e493
SHA256620b41f5e02df56c33919218bedc238ca7e76552c43da4f0f39a106835a4edc3
SHA512483424665c3bc79aeb1de6dfdd633c8526331c7b271b1ea6fe93ab298089e2aceefe7f9c7d0c6e33e604ca7b2ed62e7bb586147fecdf9a0eea60e8c03816f537
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\0cb958acb9cd4cacb46ebc0396e30aa3\Microsoft.VisualStudio.Tools.Office.Contract.v9.0.ni.dll
Filesize109KB
MD50fd0f978e977a4122b64ae8f8541de54
SHA1153d3390416fdeba1b150816cbbf968e355dc64f
SHA256211d2b83bb82042385757f811d90c5ae0a281f3abb3bf1c7901e8559db479e60
SHA512ceddfc031bfe4fcf5093d0bbc5697b5fb0cd69b03bc32612325a82ea273dae5daff7e670b0d45816a33307b8b042d27669f5d5391cb2bdcf3e5a0c847c6dcaa8
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\2ae0b4d876fa052935a792b33bc4a320\Microsoft.VisualStudio.Tools.Office.Excel.HostAdapter.v10.0.ni.dll
Filesize180KB
MD5b6d6982e8f141776340cb2166ad17ceb
SHA1e36d1bd173887cb61be733201f96a8e26cd5cdf0
SHA2560c1c92f8223313dbd70cae1523a8e2d931fde574f577bf1f46c48846248fabf4
SHA512c5c1927a6c8f8a1b021add4dcf516b5715e07ca8c1f5049cec0d691a1ef0a5931c28349499f66bcf3061e2cd08acf7518ad1f49ad9f6e3b6cd8de2b0c0ab90b3
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\367516b7878af19f5c84c67f2cd277ae\Microsoft.VisualStudio.Tools.Office.Word.AddInAdapter.v9.0.ni.dll
Filesize41KB
MD53c269caf88ccaf71660d8dc6c56f4873
SHA1f9481bf17e10fe1914644e1b590b82a0ecc2c5c4
SHA256de21619e70f9ef8ccbb274bcd0d9d2ace1bae0442dfefab45976671587cf0a48
SHA512bd5be3721bf5bd4001127e0381a0589033cb17aa35852f8f073ba9684af7d8c5a0f3ee29987b345fc15fdf28c5b56686087001ef41221a2cfb16498cf4c016c6
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\62843f8408a9889a1b5d926e59e532ad\Microsoft.VisualStudio.Tools.Office.Outlook.HostAdapter.v10.0.ni.dll
Filesize83KB
MD57738ebc02553a5f6d2b646c4f274ed7c
SHA1fc3ffc004e47d5fd9f3b1e199267ee046d580159
SHA256e9000780540c08335c1779d9fadd3eb6658753c40c8bbb118b9a1e4da043330f
SHA51229dedc04c7c6e566fe4f3771806ae04ed42d6e1a7879bd9e6ab4e59e52052a29cef5b381b5dbdc099b42b9bdd2df97075694adc2321fe8514d87b2256ad06011
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\8c6bac317f75b51647ea3a8da141b143\Microsoft.VisualStudio.Tools.Office.AddInAdapter.v9.0.ni.dll
Filesize210KB
MD54f40997b51420653706cb0958086cd2d
SHA10069b956d17ce7d782a0e054995317f2f621b502
SHA2568cd6a0b061b43e0b660b81859c910290a3672b00d7647ba0e86eda6ddcc8c553
SHA512e18953d7a348859855e5f6e279bc9924fc3707b57a733ce9b8f7d21bd631d419f1ebfb29202608192eb346569ca9a55264f5b4c2aedd474c22060734a68a4ee6
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\9306fc630870a75ddd23441ad77bdc57\Microsoft.VisualStudio.Tools.Applications.Runtime.v10.0.ni.dll
Filesize53KB
MD5e3a7a2b65afd8ab8b154fdc7897595c3
SHA1b21eefd6e23231470b5cf0bd0d7363879a2ed228
SHA256e5faf5e8adf46a8246e6b5038409dadca46985a9951343a1936237d2c8d7a845
SHA5126537c7ed398deb23be1256445297cb7c8d7801bf6e163d918d8e258213708b28f7255ecff9fbd3431d8f5e5a746aa95a29d3a777b28fcd688777aed6d8205a33
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\afa5bb1a39443d7dc81dfff54073929b\Microsoft.VisualStudio.Tools.Office.Contract.v10.0.ni.dll
Filesize28KB
MD5aefc3f3c8e7499bad4d05284e8abd16c
SHA17ab718bde7fdb2d878d8725dc843cfeba44a71f7
SHA2564436550409cfb3d06b15dd0c3131e87e7002b0749c7c6e9dc3378c99dbec815d
SHA5121d7dbc9764855a9a1f945c1bc8e86406c0625f1381d71b3ea6924322fbe419d1c70c3f3efd57ee2cb2097bb9385e0bf54965ab789328a80eb4946849648fe20b
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\c1969c27a2f0ed40d2e42940f91d7c60\Microsoft.VisualStudio.Tools.Office.Word.HostAdapter.v10.0.ni.dll
Filesize187KB
MD5b6cfead7c2bec773980a96a705da6020
SHA19ec8d7b9fe422de22dd9fb4a77806c64c72b3de0
SHA256ac02e173f4a40ece239350197edc47165f562230e48e932575b03012cf4dba09
SHA51254dbc00f548bac0eff40f056b656b6bf2a0b27a9c39fdf24fba757691cad5c01610c2c0ea29172543b23f8faa651171dfa71f666cdfba1ccff0a6c63d15019cd
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\de06a98a598aa0ff716a25b24d56ad7f\Microsoft.VisualStudio.Tools.Applications.Contract.v10.0.ni.dll
Filesize27KB
MD59c60454398ce4bce7a52cbda4a45d364
SHA1da1e5de264a6f6051b332f8f32fa876d297bf620
SHA256edc90887d38c87282f49adbb12a94040f9ac86058bfae15063aaaff2672b54e1
SHA512533b7e9c55102b248f4a7560955734b4156eb4c02539c6f978aeacecff1ff182ba0f04a07d32ed90707a62d73191b0e2d2649f38ae1c3e7a5a4c0fbea9a94300
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\e0220058091b941725ef02be0b84abe7\Microsoft.VisualStudio.Tools.Applications.HostAdapter.v10.0.ni.dll
Filesize57KB
MD56eaaa1f987d6e1d81badf8665c55a341
SHA1e52db4ad92903ca03a5a54fdb66e2e6fad59efd5
SHA2564b78ffa5f0b6751aea11917db5961d566e2f59beaa054b41473d331fd392329e
SHA512dbedfa6c569670c22d34d923e22b7dae7332b932b809082dad87a1f0bb125c912db37964b5881667867ccf23dc5e5be596aad85485746f8151ce1c51ffd097b2
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\ee73646032cbb022d16771203727e3b2\Microsoft.VisualStudio.Tools.Applications.Runtime.v9.0.ni.dll
Filesize130KB
MD52735d2ab103beb0f7c1fbd6971838274
SHA16063646bc072546798bf8bf347425834f2bfad71
SHA256f00156860ec7e88f4ccb459ca29b7e0e5c169cdc8a081cb043603187d25d92b3
SHA512fe2ce60c7f61760a29344e254771d48995e983e158da0725818f37441f9690bda46545bf10c84b163f6afb163ffb504913d6ffddf84f72b062c7f233aed896de
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\f030ae7a0ac8395493f8afcd319ee692\Microsoft.VisualStudio.Tools.Office.HostAdapter.v10.0.ni.dll
Filesize143KB
MD5f786ebe6116b55d4dc62a63dfede2ca6
SHA1ab82f3b24229cf9ad31484b3811cdb84d5e916e9
SHA2569805ae745d078fc9d64e256d4472c0edd369958a6872d71bd28d245a0239fe12
SHA51280832872329611c5c68784196f890859f6f7c5795f6a62542ad20be813e587341b36ade410363646c43f9ced48d2cf89a4537fe60d90e868324270f7040c2738
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\f1a7ac664667f2d6bcd6c388b230c22b\Microsoft.VisualStudio.Tools.Applications.AddInAdapter.v9.0.ni.dll
Filesize59KB
MD58c69bbdfbc8cc3fa3fa5edcd79901e94
SHA1b8028f0f557692221d5c0160ec6ce414b2bdf19b
SHA256a21471690e7c32c80049e17c13624820e77bca6c9c38b83d9ea8a7248086660d
SHA512825f5b87b76303b62fc16a96b108fb1774c2aca52ac5e44cd0ac2fe2ee47d5d67947dfe7498e36bc849773f608ec5824711f8c36e375a378582eefb57c9c2557
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\ehiVidCtl\88e20c69254157d91b96eadc9444815d\ehiVidCtl.ni.dll
Filesize855KB
MD57812b0a90d92b4812d4063b89a970c58
SHA13c4a789b8d28a5bfa6a6191624e33b8f40e4c4ea
SHA256897626e6af00e85e627eeaa7f9563b245335242bc6196b36d0072e5b6d45e543
SHA512634a2395bada9227b1957f2b76ed7e19f12bfc4d71a145d182602a1b6e24d83e220ebfabd602b1995c360e1725a38a89ff58417b0295bb0da9ea35c41c21a6ed
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\stdole\2c6d60b55bbab22515c512080d4b3bae\stdole.ni.dll
Filesize43KB
MD53e72bdd0663c5b2bcd530f74139c83e3
SHA166069bcac0207512b9e07320f4fa5934650677d2
SHA2566a6ac3094130d1affd34aae5ba2bd8c889e2071eb4217a75d72b5560f884e357
SHA512b0a98db477fccae71b4ebfb8525ed52c10f1e7542f955b307f260e27e0758aa22896683302e34b0237e7e3bba9f5193ddcc7ff255c71fbaa1386988b0ec7d626
-
Filesize
1.2MB
MD59cc81595f28cc89627df1ded38d68c49
SHA1938c15128949242578e9ca739e6af8b7a4c8ea89
SHA256b6e8132c388cb5548c9c1934f9c4ccd3b92fc34c890dfa1803aedcdf1fd4c06a
SHA5126aeafd9b45c2dd77e111f1db3d03686c673ab663258474ccae0b775d402deb6ab00453d148d6ad2b72fb5816f7b8b257f19ec6923985568ea469de2da44589a8
-
Filesize
1.2MB
MD553d287d0fd47d2f407c11bd7b57805de
SHA1a4e4d27d6a5a14e437d3a8f535859097372d5b1f
SHA2562ad449374d45c4fa213d82ed6c6955df7b3044101902cc49a5ab178a303df343
SHA5127d9875c73974ca95a55eda06048a5fe7d3c0d66d6a8c049a9cc7f9d019b5e3f7117f2a7a897e73bfe5799f94d19d12475c12532ea6f1ed9f4a50339926f29320
-
Filesize
2.0MB
MD56f7555d42a34b2fd45efc1c97e63ee13
SHA12ecd4f9782178b7b226d68cb267749dfa257bd7c
SHA256dd900ca9e8b084977abdfb3f0aaf196c86292f1bcbf8274bca038f251ce73db2
SHA512de4415619122ce05170c37c2799f12c8a8065c6e22016ae8ca0427f278c8d8fb258f44cc4062e724b5ddf1e50e185dcfddeca2fe7da3b6ec1b4eaf950ec2360a
-
Filesize
648KB
MD58cf1d40273bb2f72dc21ba37d812c538
SHA1929f834095d5154b971af68744e0cf7f008f3f27
SHA2560f4b30e3ec94e89d7edc625f6a3ce87773ad3ce1759d17f566918c17f6007377
SHA5121a2fe18fc2e0e47d3f7c50d409646c3d711f9e699511891b02f876063d2b867549b7ff56b8045845027c037c8c4ee7b169a92eded42d72ba376ecc3138c5da82
-
Filesize
603KB
MD5e4e8e0bcef2c49bec6b3959e8e44bc65
SHA110431ff59f4858b47d4cf64f6ae1cb91bcbcfaf5
SHA2563bc0364a9a53e88c23ced1d3d5d5dfd997fadec342612a4d904fdc7933b1cd02
SHA512d80f1d042c09ab2831b7f0969d1a188c8f3fce4000dc51c0e01a04061b8afc4663b0d1fe8e593befde08c9bbabc5cff16ff3b92942c60497498222cc2f9621fb
-
Filesize
644KB
MD5bde651433fd773d4c4189a6016f50734
SHA1ddc6ca30744da24d2790bcaa101976a7311ec858
SHA25628ab1bf447b215604b7aa2f02d24d1b40fbb1f0d9297205232454353d1c5e96c
SHA51239cd9c4f1a553ed1c55ebd3e78700d0d3ae523c97301176aeba527eb09582ee6b86ce2077850ebeddc1e35b44cd49121b2e41ffe0ac66b7519f0ee5b94f1e8ef
-
Filesize
577KB
MD588db44e6eb99c4dcbf9cb774a8019523
SHA10cb2ddae705a49909bffc644b4904f663a376ae6
SHA256a0411c05d5fc0b13e243e4729024d11cc4aeab554efa8b513043f72237ff604f
SHA512464acf98444d2848ff26e6149faf441b9fce4b585c09db5d7bf6c04d069927f0b546cd700b233e60ae2c88b5b15ed0b37af066276b6be09ca5a96ff1984a8eec
-
Filesize
674KB
MD5b471b81f5e4a0f9310404776c1a5cf74
SHA1cbc8f7e84058557d718f53f1e0afcee43ee7d1af
SHA25663d9e0d3ca00b39f51445587ee5f6e22d7bb8235c76ec10629a4dd48ba6b145e
SHA512505491853e82143191d53d39ccb820ee60cd2fa0f02828fd5130d86278b8ce939f32f342b1c56b0e2131d8a0da6b0fe0a413eb62c288dd05b77c1e19bb410226
-
Filesize
691KB
MD51103d145845ebd516ea8063248ea7a39
SHA13470ec20fd4df53262855853b09f2aa78c7154d5
SHA2567c93fa08d15863fee90c65823ea5afb37ab259dfd3a589947b381353284afa3a
SHA51231d651c663414af422dd0fab6acf6d37b61195807b03072d72532829fa7ffd23d612daa6c28469bb0ad183ac74f1e736862c3824b13661b6edba0c89a9a49153
-
Filesize
581KB
MD501b8d20436d05f6c29c37cdc661b0dd3
SHA126b1e43cd38e405eb488e29d464ec43f5dd8068d
SHA2568786219c8a37f056f762666d98fcc05438f91f688c2352d903617f30d282e0ef
SHA512fd3cd38c66a0a8b1ff8cbfb027a6c09963678f0877255812901a542726877db2c74cb0d8693e011236fe3869e8da6d5dfc62e0ab7afd1a2b04539c71f8a37458
-
Filesize
765KB
MD550016e20239da8ddac365813820e7c54
SHA1f888c5b2fb9ffaf317432cf2f77f61fb87000c74
SHA2566284c7a4d42434d5b916031253f841e20c1f21ab42f456d093528ce67685d831
SHA5121712a5452a350a9be2fc2543c7753263306f500c9dbd04d9158d48bd4a968fdf299fb20fc9a62afbe8336a11566c58f597706c52a5a40250c0671c027486ab29
-
Filesize
691KB
MD5eae49af5ccbca681bf81243ccd0d4efe
SHA187668a1185af1d028231a15d643a13a108c61dc3
SHA256bb0790cfb367cf3f2a2dd2b9fcdb3aa34a36e0984de26723d9333af197fa131e
SHA512c030dc5b0d07e171747a56f4871332ac5e4729495aab3b54388ac4b67366bf3f16c899bf92582eddc0aebd3fb24cb83057764f62253cf22ca98ae24947c24d4e