Analysis
-
max time kernel
149s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
30-06-2024 18:56
Static task
static1
Behavioral task
behavioral1
Sample
KeePass-2.57-Setup.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
KeePass-2.57-Setup.exe
Resource
win10v2004-20240611-en
General
-
Target
KeePass-2.57-Setup.exe
-
Size
4.2MB
-
MD5
4c1cafc2b3a380208548620a3d53dbba
-
SHA1
a4c6ae220ecc6b907e56200809edab3bcdc38b30
-
SHA256
ea53f7f944fada950cd7bb154deb078123a357b7bc5e2484851762b3552eb48b
-
SHA512
b2a63cff7b7f01c753dac2723e4ca02b2e86e1ed77741f4254b229f3c79e63aa7392fdbb0ad550055b7438c2a05a8536b71ee05b9afb88a72997f8907490d83b
-
SSDEEP
98304:hkLaasz0D6H/jUdBfhUEKMEoEGfA58ulnYBh+oKLeOKIaE:yaaszr/WrKv7PPoK/
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\Control Panel\International\Geo\Nation ShInstUtil.exe -
Executes dropped EXE 5 IoCs
pid Process 5016 KeePass-2.57-Setup.tmp 1472 ShInstUtil.exe 748 ShInstUtil.exe 5116 ShInstUtil.exe 3276 KeePass.exe -
Loads dropped DLL 10 IoCs
pid Process 3512 mscorsvw.exe 5908 mscorsvw.exe 5908 mscorsvw.exe 5460 mscorsvw.exe 1508 mscorsvw.exe 1508 mscorsvw.exe 1704 mscorsvw.exe 3028 mscorsvw.exe 3276 KeePass.exe 3276 KeePass.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\KeePass 2 PreLoad = "\"C:\\Program Files\\KeePass Password Safe 2\\KeePass.exe\" --preload" ShInstUtil.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 23 IoCs
description ioc Process File created C:\Program Files\KeePass Password Safe 2\unins000.dat KeePass-2.57-Setup.tmp File created C:\Program Files\KeePass Password Safe 2\is-LJGDA.tmp KeePass-2.57-Setup.tmp File created C:\Program Files\KeePass Password Safe 2\is-VUJ8S.tmp KeePass-2.57-Setup.tmp File created C:\Program Files\KeePass Password Safe 2\XSL\is-HEGUJ.tmp KeePass-2.57-Setup.tmp File opened for modification C:\Program Files\KeePass Password Safe 2\KeePass.exe KeePass-2.57-Setup.tmp File opened for modification C:\Program Files\KeePass Password Safe 2\KeePass.chm KeePass-2.57-Setup.tmp File opened for modification C:\Program Files\KeePass Password Safe 2\KeePassLibC64.dll KeePass-2.57-Setup.tmp File opened for modification C:\Program Files\KeePass Password Safe 2\ShInstUtil.exe KeePass-2.57-Setup.tmp File created C:\Program Files\KeePass Password Safe 2\is-BQQRC.tmp KeePass-2.57-Setup.tmp File created C:\Program Files\KeePass Password Safe 2\is-H6CBA.tmp KeePass-2.57-Setup.tmp File created C:\Program Files\KeePass Password Safe 2\is-UGBIG.tmp KeePass-2.57-Setup.tmp File created C:\Program Files\KeePass Password Safe 2\is-8PFS3.tmp KeePass-2.57-Setup.tmp File created C:\Program Files\KeePass Password Safe 2\is-L9P3E.tmp KeePass-2.57-Setup.tmp File created C:\Program Files\KeePass Password Safe 2\is-T2GED.tmp KeePass-2.57-Setup.tmp File opened for modification C:\Program Files\KeePass Password Safe 2\KeePass.XmlSerializers.dll KeePass-2.57-Setup.tmp File created C:\Program Files\KeePass Password Safe 2\is-VBTKM.tmp KeePass-2.57-Setup.tmp File created C:\Program Files\KeePass Password Safe 2\is-ARICD.tmp KeePass-2.57-Setup.tmp File created C:\Program Files\KeePass Password Safe 2\XSL\is-O83R7.tmp KeePass-2.57-Setup.tmp File created C:\Program Files\KeePass Password Safe 2\XSL\is-4D3M7.tmp KeePass-2.57-Setup.tmp File created C:\Program Files\KeePass Password Safe 2\XSL\is-791EN.tmp KeePass-2.57-Setup.tmp File opened for modification C:\Program Files\KeePass Password Safe 2\KeePassLibC32.dll KeePass-2.57-Setup.tmp File created C:\Program Files\KeePass Password Safe 2\XSL\is-18D2L.tmp KeePass-2.57-Setup.tmp File opened for modification C:\Program Files\KeePass Password Safe 2\unins000.dat KeePass-2.57-Setup.tmp -
Drops file in Windows directory 12 IoCs
description ioc Process File created C:\Windows\assembly\NativeImages_v4.0.30319_64\Temp\1714-0\System.Security.dll mscorsvw.exe File created C:\Windows\assembly\NativeImages_v4.0.30319_64\Temp\1554-0\System.Numerics.dll mscorsvw.exe File created C:\Windows\assembly\NativeImages_v4.0.30319_64\Temp\5e4-0\System.Deployment.dll mscorsvw.exe File created C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Deployment\18271de25c06b49b2aaa391461de2df6\System.Deployment.ni.dll.aux.tmp mscorsvw.exe File created C:\Windows\assembly\NativeImages_v4.0.30319_64\Temp\6a8-0\System.Runtime.Serialization.Formatters.Soap.dll mscorsvw.exe File created C:\Windows\assembly\NativeImages_v4.0.30319_64\Temp\bd4-0\KeePass.exe mscorsvw.exe File created C:\Windows\assembly\NativeImages_v4.0.30319_64\Temp\db8-0\System.Data.SqlXml.dll mscorsvw.exe File created C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Data.SqlXml\22b31f1b9eca85580b198424dd16a98a\System.Data.SqlXml.ni.dll.aux.tmp mscorsvw.exe File created C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Security\7355af105ad86679d6c9070a9b4dc0c3\System.Security.ni.dll.aux.tmp mscorsvw.exe File created C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Numerics\ba90284a07d8bc0ce7e6273afa79210f\System.Numerics.ni.dll.aux.tmp mscorsvw.exe File created C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Runt9064068c#\f85535a7092741215f67fdedf2846499\System.Runtime.Serialization.Formatters.Soap.ni.dll.aux.tmp mscorsvw.exe File created C:\Windows\assembly\NativeImages_v4.0.30319_64\KeePass\5c12a39692e4bebc2ae235596535d39a\KeePass.ni.exe.aux.tmp mscorsvw.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 12 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.kdbx\ = "kdbxfile" KeePass-2.57-Setup.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\kdbxfile KeePass-2.57-Setup.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\kdbxfile\ = "KeePass Database" KeePass-2.57-Setup.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\kdbxfile\DefaultIcon KeePass-2.57-Setup.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\kdbxfile\shell KeePass-2.57-Setup.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\kdbxfile\shell\open\ = "&Open with KeePass Password Safe" KeePass-2.57-Setup.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.kdbx KeePass-2.57-Setup.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\kdbxfile\DefaultIcon\ = "\"C:\\Program Files\\KeePass Password Safe 2\\KeePass.exe\",0" KeePass-2.57-Setup.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\kdbxfile\shell\open KeePass-2.57-Setup.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\kdbxfile\shell\open\command KeePass-2.57-Setup.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\kdbxfile\shell\open\command\ = "\"C:\\Program Files\\KeePass Password Safe 2\\KeePass.exe\" \"%1\"" KeePass-2.57-Setup.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\kdbxfile\AlwaysShowExt KeePass-2.57-Setup.tmp -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5016 KeePass-2.57-Setup.tmp 5016 KeePass-2.57-Setup.tmp -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 5016 KeePass-2.57-Setup.tmp -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 3032 wrote to memory of 5016 3032 KeePass-2.57-Setup.exe 82 PID 3032 wrote to memory of 5016 3032 KeePass-2.57-Setup.exe 82 PID 3032 wrote to memory of 5016 3032 KeePass-2.57-Setup.exe 82 PID 5016 wrote to memory of 1472 5016 KeePass-2.57-Setup.tmp 108 PID 5016 wrote to memory of 1472 5016 KeePass-2.57-Setup.tmp 108 PID 5016 wrote to memory of 1472 5016 KeePass-2.57-Setup.tmp 108 PID 5016 wrote to memory of 748 5016 KeePass-2.57-Setup.tmp 109 PID 5016 wrote to memory of 748 5016 KeePass-2.57-Setup.tmp 109 PID 5016 wrote to memory of 748 5016 KeePass-2.57-Setup.tmp 109 PID 5016 wrote to memory of 5116 5016 KeePass-2.57-Setup.tmp 110 PID 5016 wrote to memory of 5116 5016 KeePass-2.57-Setup.tmp 110 PID 5016 wrote to memory of 5116 5016 KeePass-2.57-Setup.tmp 110 PID 5116 wrote to memory of 5988 5116 ShInstUtil.exe 111 PID 5116 wrote to memory of 5988 5116 ShInstUtil.exe 111 PID 5116 wrote to memory of 5512 5116 ShInstUtil.exe 113 PID 5116 wrote to memory of 5512 5116 ShInstUtil.exe 113 PID 5016 wrote to memory of 3276 5016 KeePass-2.57-Setup.tmp 123 PID 5016 wrote to memory of 3276 5016 KeePass-2.57-Setup.tmp 123
Processes
-
C:\Users\Admin\AppData\Local\Temp\KeePass-2.57-Setup.exe"C:\Users\Admin\AppData\Local\Temp\KeePass-2.57-Setup.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Users\Admin\AppData\Local\Temp\is-OJBF1.tmp\KeePass-2.57-Setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-OJBF1.tmp\KeePass-2.57-Setup.tmp" /SL5="$E006E,3483957,781312,C:\Users\Admin\AppData\Local\Temp\KeePass-2.57-Setup.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:5016 -
C:\Program Files\KeePass Password Safe 2\ShInstUtil.exe"C:\Program Files\KeePass Password Safe 2\ShInstUtil.exe" net_check3⤵
- Executes dropped EXE
PID:1472
-
-
C:\Program Files\KeePass Password Safe 2\ShInstUtil.exe"C:\Program Files\KeePass Password Safe 2\ShInstUtil.exe" preload_register3⤵
- Executes dropped EXE
- Adds Run key to start application
PID:748
-
-
C:\Program Files\KeePass Password Safe 2\ShInstUtil.exe"C:\Program Files\KeePass Password Safe 2\ShInstUtil.exe" ngen_install3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5116 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe" uninstall "C:\Program Files\KeePass Password Safe 2\KeePass.exe"4⤵PID:5988
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe" install "C:\Program Files\KeePass Password Safe 2\KeePass.exe"4⤵PID:5512
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 1cc -InterruptEvent 0 -NGENProcess 1bc -Pipe 1c8 -Comment "NGen Worker Process"5⤵PID:516
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 25c -InterruptEvent 0 -NGENProcess 26c -Pipe 1c4 -Comment "NGen Worker Process"5⤵
- Loads dropped DLL
- Drops file in Windows directory
PID:3028
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 270 -InterruptEvent 0 -NGENProcess 254 -Pipe 260 -Comment "NGen Worker Process"5⤵
- Loads dropped DLL
- Drops file in Windows directory
PID:3512
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2d4 -InterruptEvent 0 -NGENProcess 2d0 -Pipe 270 -Comment "NGen Worker Process"5⤵
- Loads dropped DLL
- Drops file in Windows directory
PID:5908
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 290 -InterruptEvent 0 -NGENProcess 2c8 -Pipe 1dc -Comment "NGen Worker Process"5⤵
- Loads dropped DLL
- Drops file in Windows directory
PID:5460
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2ac -InterruptEvent 0 -NGENProcess 2c8 -Pipe 2bc -Comment "NGen Worker Process"5⤵
- Loads dropped DLL
- Drops file in Windows directory
PID:1508
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 290 -InterruptEvent 0 -NGENProcess 2c8 -Pipe 2d8 -Comment "NGen Worker Process"5⤵
- Loads dropped DLL
- Drops file in Windows directory
PID:1704
-
-
-
-
C:\Program Files\KeePass Password Safe 2\KeePass.exe"C:\Program Files\KeePass Password Safe 2\KeePass.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3276
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
252B
MD5ac0f1e104f82d295c27646bfff39fecc
SHA134309b00045503fce52adf638ec8be5f32cb6b1d
SHA256c4a3626bbcdfe4b17759e75582ad5f89beaa28efc857431f373e104fbe7b8440
SHA512be3675bbbe47d929a1ca6c5dfefd31b674c7304cc4bfac914d5be9656937554919478feb363fd3a51561bcf879941fcb54b701648057422c452bf677d500a839
-
Filesize
3.2MB
MD5339d3b117dd428d5068cd7088ae6733f
SHA1101d1d770719b5cadac23d0ed755ed796ddd2071
SHA25651e1d528bd507ef86d4980fcb553250b655641bfccfadac812835617e2b1d7b3
SHA512ce677aa243c0128f5981d9c3c5a516d3b041eb7f1ce03e4f8095236c55208ce38e7ec945bbce9777350daa027c0c93e73eeecbbb69e95ae0e6ae817ea78a0af9
-
Filesize
763B
MD582704da595e970ca358d973fcd8d7858
SHA15b98c0a8cc8f628db02024aee78619c3abb5de75
SHA2563d918e9ff91d0324f284a4edc536066a924ce07b145b6ae5069963b4df25f4d3
SHA5127db5a1ae3b65198c549369cf020d723553ed1fbb50e7095b6aeb3f7d3b0b485fa3cf38170ad1540634c3124e730604d2e0c6a20b233e270332268333ce915237
-
Filesize
94KB
MD50c1a351da6559ef4d451e72a8ca4d27a
SHA1298871fb0ae9148b4000ed86e4096fd998615ecc
SHA2569c61a071bbb3355c40fb9dc439bad7eb1ff8dc423507fc47e2e36620d7582715
SHA512e6a12af145f9cdc86b17125feaa3d33d8cec1e3f365a10918e030d3fc7a7063f8eee1c5eed8cdf56413da6214ec0f2982b6fc588fe71415a031fc6e6a71d5fba
-
Filesize
3.0MB
MD5515a9f60ae3e548bba65c2d6aba98f75
SHA16c68ec325522a413e87daac52da8135d5b2a71ca
SHA25688fa32ce3c8c9fa0781e812dee4f6eca307c5c4a50d6a1aafcbcbce94f0c91c1
SHA5127f34993c9043d9b808a9652324d1bff90643f1516c50f4e09b85151cf5b3047a3bdb30923ffc0227bfd1b19ff27fba767b88dedd18db97be8c9efa28b0faa7a9
-
C:\Windows\assembly\NativeImages_v4.0.30319_64\KeePass\5c12a39692e4bebc2ae235596535d39a\KeePass.ni.exe
Filesize11.4MB
MD5a7b6a8732a9777935c646ea518d8b6a8
SHA197748d647e2ee59bbfd996bc23d8f4e9aa7c3397
SHA256cee5f0973fd7c782dca7db542a0b33475f2cd819a565684930321f41e4450cbc
SHA51244dc7815dae1db1c1297e73e1683e433f129da05702300abd81d4cb115d540f38882ed734f4077801a2a93dd9348f91c6bb8db56c5d7337ad903b740e464e9dc
-
C:\Windows\assembly\NativeImages_v4.0.30319_64\KeePass\5c12a39692e4bebc2ae235596535d39a\KeePass.ni.exe
Filesize9.1MB
MD55417535d58f5d6780624a9b990449aba
SHA10aa425a0a38209fa404988bfc0f0c5ce36b08345
SHA25661a5a11d201f8936a76309b8e9f48608bd1f0d497994f002bc23455ec9285083
SHA512f9e17b6176142532a9e0b1400b8b1e1488282552361b269208d1979aeb358eef740d8de4797bab8541514b4325be8a8690e17e487405a1ceb37ed25206f09706
-
C:\Windows\assembly\NativeImages_v4.0.30319_64\KeePass\5c12a39692e4bebc2ae235596535d39a\KeePass.ni.exe
Filesize9.2MB
MD5bb5a223f5273a280ead96f40191604b2
SHA1842b5d9f7f7c041246fe1c1ea109a9da079b3d4c
SHA25680c1cccbbff98ea74957a20c535fa0b311d94bd28964a73740b62bb087dc3629
SHA51291170411a5dddfcf41a23974f4d19ce8cd0c276f68d5e448ea1af35cf91ede19b970c26d4bf24c5f36b3224450c8c85b971648ea23742afad0b03440371dc8fa
-
C:\Windows\assembly\NativeImages_v4.0.30319_64\KeePass\5c12a39692e4bebc2ae235596535d39a\KeePass.ni.exe
Filesize9.0MB
MD544fcd6c694165d226caafae0a2999bd8
SHA1bc2136ab85f9402da6ca05b86760bff684ef89b7
SHA256dd9400dcac5af88af6fd7e8032b090180edbe31ac1ce7549992193125ee9e54e
SHA5128f86c2b6f05fd7e378784f910be7efb4c65e6cc78d9d446b383535536c498cdc053cf733fad57b16ac757f5797dc90142bc3c5220ed7bcc707b0716e3bb8aa60
-
C:\Windows\assembly\NativeImages_v4.0.30319_64\KeePass\5c12a39692e4bebc2ae235596535d39a\KeePass.ni.exe.aux
Filesize1KB
MD5f2345db44a8fd5a9d95128224f8ce9e3
SHA146151420adc830fa00a48bd992c9ccc33e305873
SHA2565aec49810f78ae92f40f44c188347dee8dfd013e3d5cd8cef391920bc580c149
SHA512a0834dc4159655b7b411bce8cafee347e0ab70c7966c04bae496d43090b5d355f94b014d9b0f5d6315e2ca2e21d1b0a05ac5d4875459578c736c6b2413015fea
-
C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Data.SqlXml\22b31f1b9eca85580b198424dd16a98a\System.Data.SqlXml.ni.dll
Filesize3.0MB
MD5b0bd1b2c367441f420d9cc270cf7fab6
SHA1bdd65767f9c8047125a86b66b5678d8d72a76911
SHA256447bfc33e8f3bc3d661200891933fed1bb28c402d1063e6838f55096ec9833aa
SHA512551becf8035964921fca26458e46cd32fadf1703e66724df5cc868447bb0b0c181f87eba1c3df1bece2a9a127aea78bcc2f00ad38ecd05d438119cd1a9ce8324
-
C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Data.SqlXml\22b31f1b9eca85580b198424dd16a98a\System.Data.SqlXml.ni.dll.aux
Filesize708B
MD5688ac15ac387cbac93d705be85b08492
SHA1a4fabce08bbe0fee991a8a1a8e8e62230f360ff2
SHA256ce64b26c005cfc1bcf6ac0153f1dbcae07f25934eab3363ff05a72a754992470
SHA512a756ea603d86a66b67163e3aa5d2325174a2748caf6b0eaa9f0600d42c297daa35aa5bfaf4962a1dedbae9437308d19571818cbd3e1542d7a7a26a4d20796074
-
C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Deployment\18271de25c06b49b2aaa391461de2df6\System.Deployment.ni.dll
Filesize3.0MB
MD53385fdacfda1fc77da651550a705936d
SHA1207023bf3b3ff2c93e9368ba018d32bb11e47a8a
SHA25644a217d721c0fb7de3f52123ace1eeaf62f48f40f55bd816bb32c422d0939eec
SHA512bb8f38dc08b1983a5b5b1b6dac069364cec4f3a9a88fcf277cfdefac376a8c6207078938f064aacef1032f9a15cf9d21174aef4b94a89513fd65a2cfaaab5174
-
C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Numerics\ba90284a07d8bc0ce7e6273afa79210f\System.Numerics.ni.dll
Filesize314KB
MD550b28be2b84f9dd1258a346525f8c2e5
SHA1203abebaa5c22c9f6ac099d020711669e6655ed8
SHA2566c51e5a928f227bb64a7eb9e48089bca5e9bbef0d0329b971ebbf918335ee1ac
SHA512d5336827cdb202ab51583c32a45960ae43c56499dbe149ec0edb907f8f33e12800c7aa187a52a3c93e3f2ebcb677bed4e7e829e1df3fee05fe3fdc21948f571d
-
C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Runt9064068c#\f85535a7092741215f67fdedf2846499\System.Runtime.Serialization.Formatters.Soap.ni.dll
Filesize345KB
MD535738b026183e92c1f7a6344cfa189fd
SHA1ccc1510ef4a88a010087321b8af89f0c0c29b6d8
SHA2564075d88d2ba1cff2a8ab9be66176045628d24cae370428e0128f8af3a77639fb
SHA512ab7100c26f60ae30a84ba3de31ca96c530e86e052ffc997fd7fd3144e2049fc0d188a3d075a123b6f728dc882beee3d6a35a086d19d7dad4d385e101382fc436
-
C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Security\7355af105ad86679d6c9070a9b4dc0c3\System.Security.ni.dll
Filesize986KB
MD5e4b53e736786edcfbfc70f87c5ef4aad
SHA162cdd43c2d1f8ae9b28c484344e3fb7135a4e4d5
SHA2569ac6d5445caaacae6813243c787e8d67c974988acd1a4a5f564503fd36e91e46
SHA51242a3b1cc0b805674f48a8d7891ab5ecae33d5a2205059317ca5441e7de52f26eabb32e79a3040d7aa0e0333b19f80d93d25e1faa1dfe5cfb0ea39efba5767fde
-
C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Security\7355af105ad86679d6c9070a9b4dc0c3\System.Security.ni.dll.aux
Filesize912B
MD5255a843ca54e88fd16d2befcc1bafb7a
SHA1aee7882de50a5cea1e4c2c2ddfaa4476f20a9be9
SHA2568cd849585fe99e63f28b49f1dae2d1b47a406268dcc5a161e58331a6a3cba3ed
SHA512666866c0d25d61dc04341cf95eb61969698cfafce232097e60cb0537ea2a35635e1e4986036e413fb51927187183aa2e64ecac7fbc26bac46998c0bd84f69e45