Analysis
-
max time kernel
93s -
max time network
104s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11/10/2024, 23:46
Static task
static1
Behavioral task
behavioral1
Sample
376b4c8d17b91f570852303d932d434a_JaffaCakes118.exe
Resource
win7-20240729-en
General
-
Target
376b4c8d17b91f570852303d932d434a_JaffaCakes118.exe
-
Size
4.9MB
-
MD5
376b4c8d17b91f570852303d932d434a
-
SHA1
db5f79563c5d46fdb351c31bacb892bc40320452
-
SHA256
5a2aa50697eee171cd552860f574b718c83fb58efb3786936a4f75506663bb7a
-
SHA512
8cb0347cb60d38087fd8ba95168917ba9c2977bc7b508d4d8e00cbe895f09e0205761ac62f5ad2e2a8aa67ef56767c59ed346c10a8423c0571b88af10f623df9
-
SSDEEP
98304:zig8EAPrNQyRUA3AKvd4vFikbCZ2gIbVkTHQ/O6+qti:zGEAhQHA3xyvFiWCZ2gIYQ/O6Rti
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 3 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/files/0x0007000000023cd6-143.dat acprotect behavioral2/files/0x0007000000023cde-207.dat acprotect behavioral2/files/0x0007000000023ce0-215.dat acprotect -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 376b4c8d17b91f570852303d932d434a_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation Driverpatch.exe -
Executes dropped EXE 4 IoCs
pid Process 2324 Driverpatch.exe 1424 DriverDetective.exe 3868 Services.exe 4848 ISBEW64.exe -
Loads dropped DLL 64 IoCs
pid Process 1424 DriverDetective.exe 2900 MsiExec.exe 2900 MsiExec.exe 1424 DriverDetective.exe 1424 DriverDetective.exe 1424 DriverDetective.exe 1424 DriverDetective.exe 1424 DriverDetective.exe 1424 DriverDetective.exe 4452 MsiExec.exe 3720 MsiExec.exe 3720 MsiExec.exe 3720 MsiExec.exe 3720 MsiExec.exe 3720 MsiExec.exe 3720 MsiExec.exe 3720 MsiExec.exe 3720 MsiExec.exe 3720 MsiExec.exe 3720 MsiExec.exe 3720 MsiExec.exe 3720 MsiExec.exe 4280 mscorsvw.exe 4280 mscorsvw.exe 4280 mscorsvw.exe 4280 mscorsvw.exe 4280 mscorsvw.exe 4280 mscorsvw.exe 4280 mscorsvw.exe 4280 mscorsvw.exe 4280 mscorsvw.exe 4280 mscorsvw.exe 4280 mscorsvw.exe 4280 mscorsvw.exe 4280 mscorsvw.exe 4280 mscorsvw.exe 4280 mscorsvw.exe 4280 mscorsvw.exe 4280 mscorsvw.exe 4280 mscorsvw.exe 4280 mscorsvw.exe 4280 mscorsvw.exe 4280 mscorsvw.exe 4280 mscorsvw.exe 4280 mscorsvw.exe 4280 mscorsvw.exe 4280 mscorsvw.exe 4280 mscorsvw.exe 4280 mscorsvw.exe 4280 mscorsvw.exe 4280 mscorsvw.exe 4280 mscorsvw.exe 4280 mscorsvw.exe 4280 mscorsvw.exe 4280 mscorsvw.exe 4280 mscorsvw.exe 4280 mscorsvw.exe 4280 mscorsvw.exe 4280 mscorsvw.exe 100 mscorsvw.exe 100 mscorsvw.exe 100 mscorsvw.exe 100 mscorsvw.exe 100 mscorsvw.exe -
Blocklisted process makes network request 3 IoCs
flow pid Process 39 3788 msiexec.exe 41 3720 MsiExec.exe 43 3720 MsiExec.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\B: DriverDetective.exe File opened (read-only) \??\J: DriverDetective.exe File opened (read-only) \??\X: DriverDetective.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\L: DriverDetective.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\W: DriverDetective.exe File opened (read-only) \??\Z: DriverDetective.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\R: DriverDetective.exe File opened (read-only) \??\V: DriverDetective.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\H: DriverDetective.exe File opened (read-only) \??\I: DriverDetective.exe File opened (read-only) \??\T: DriverDetective.exe File opened (read-only) \??\U: DriverDetective.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\N: DriverDetective.exe File opened (read-only) \??\P: DriverDetective.exe File opened (read-only) \??\S: DriverDetective.exe File opened (read-only) \??\Y: DriverDetective.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\E: DriverDetective.exe File opened (read-only) \??\M: DriverDetective.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\Q: DriverDetective.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\A: DriverDetective.exe File opened (read-only) \??\G: DriverDetective.exe File opened (read-only) \??\K: DriverDetective.exe File opened (read-only) \??\O: DriverDetective.exe -
Drops file in System32 directory 20 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache MsiExec.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\60E31627FDA0A46932B0E5948949F2A5 MsiExec.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\60E31627FDA0A46932B0E5948949F2A5 MsiExec.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C3948BE6E525B8A8CEE9FAC91C9E392_9B1AA3369F4D3E257D46E66245F1CC24 MsiExec.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C3948BE6E525B8A8CEE9FAC91C9E392_9B1AA3369F4D3E257D46E66245F1CC24 mscorsvw.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C3948BE6E525B8A8CEE9FAC91C9E392_9B1AA3369F4D3E257D46E66245F1CC24 mscorsvw.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C3948BE6E525B8A8CEE9FAC91C9E392_9B1AA3369F4D3E257D46E66245F1CC24 mscorsvw.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C3948BE6E525B8A8CEE9FAC91C9E392_9B1AA3369F4D3E257D46E66245F1CC24 mscorsvw.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C3948BE6E525B8A8CEE9FAC91C9E392_9B1AA3369F4D3E257D46E66245F1CC24 mscorsvw.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft MsiExec.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData MsiExec.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C3948BE6E525B8A8CEE9FAC91C9E392_9B1AA3369F4D3E257D46E66245F1CC24 MsiExec.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C3948BE6E525B8A8CEE9FAC91C9E392_9B1AA3369F4D3E257D46E66245F1CC24 mscorsvw.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C3948BE6E525B8A8CEE9FAC91C9E392_9B1AA3369F4D3E257D46E66245F1CC24 mscorsvw.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content MsiExec.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C3948BE6E525B8A8CEE9FAC91C9E392_9B1AA3369F4D3E257D46E66245F1CC24 mscorsvw.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C3948BE6E525B8A8CEE9FAC91C9E392_9B1AA3369F4D3E257D46E66245F1CC24 mscorsvw.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C3948BE6E525B8A8CEE9FAC91C9E392_9B1AA3369F4D3E257D46E66245F1CC24 mscorsvw.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C3948BE6E525B8A8CEE9FAC91C9E392_9B1AA3369F4D3E257D46E66245F1CC24 mscorsvw.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C3948BE6E525B8A8CEE9FAC91C9E392_9B1AA3369F4D3E257D46E66245F1CC24 mscorsvw.exe -
resource yara_rule behavioral2/files/0x0007000000023cd6-143.dat upx behavioral2/memory/1424-146-0x0000000010000000-0x0000000010196000-memory.dmp upx behavioral2/files/0x0007000000023cde-207.dat upx behavioral2/memory/1424-263-0x0000000006CC0000-0x0000000006D26000-memory.dmp upx behavioral2/memory/1424-249-0x0000000006C30000-0x0000000006CBE000-memory.dmp upx behavioral2/memory/1424-225-0x0000000006C30000-0x0000000006CBE000-memory.dmp upx behavioral2/files/0x0007000000023ce0-215.dat upx behavioral2/memory/1424-5224-0x0000000010000000-0x0000000010196000-memory.dmp upx behavioral2/memory/1424-5225-0x0000000006C30000-0x0000000006CBE000-memory.dmp upx behavioral2/memory/1424-5229-0x0000000006C30000-0x0000000006CBE000-memory.dmp upx behavioral2/memory/1424-5228-0x0000000010000000-0x0000000010196000-memory.dmp upx behavioral2/memory/1424-5302-0x0000000010000000-0x0000000010196000-memory.dmp upx -
Drops file in Program Files directory 29 IoCs
description ioc Process File created C:\Program Files (x86)\PC Drivers HeadQuarters\Driver Detective\DriverDetective.chm msiexec.exe File created C:\Program Files (x86)\PC Drivers HeadQuarters\Driver Detective\DriversHQ.DriverDetective.Client.ExceptionLogging.dll msiexec.exe File created C:\Program Files (x86)\PC Drivers HeadQuarters\Driver Detective\DriversHQ.DriverDetective.Client.Updater.exe msiexec.exe File opened for modification C:\Program Files (x86)\InstallShield Installation Information\{621C02EA-AAFF-4026-A903-165D59529A16}\setup.ini DriverDetective.exe File created C:\Program Files (x86)\PC Drivers HeadQuarters\Driver Detective\DriversHQ.DriverDetective.Client.Updater.exe.config msiexec.exe File created C:\Program Files (x86)\PC Drivers HeadQuarters\Driver Detective\DriversHQ.DriverDetective.Common.dll msiexec.exe File created C:\Program Files (x86)\PC Drivers HeadQuarters\Driver Detective\Interop.WindowsInstaller.dll msiexec.exe File created C:\Program Files (x86)\PC Drivers HeadQuarters\Driver Detective\Microsoft.Practices.EnterpriseLibrary.Common.dll msiexec.exe File created C:\Program Files (x86)\InstallShield Installation Information\{621C02EA-AAFF-4026-A903-165D59529A16}\setuca31.rra DriverDetective.exe File opened for modification C:\Program Files (x86)\InstallShield Installation Information\{621C02EA-AAFF-4026-A903-165D59529A16}\0x0409.ini DriverDetective.exe File created C:\Program Files (x86)\PC Drivers HeadQuarters\Driver Detective\DriversHQ.DriverDetective.ExceptionLogging.dll msiexec.exe File created C:\Program Files (x86)\PC Drivers HeadQuarters\Driver Detective\Microsoft.ApplicationBlocks.Updater.Downloaders.dll msiexec.exe File created C:\Program Files (x86)\PC Drivers HeadQuarters\Driver Detective\Microsoft.Practices.EnterpriseLibrary.Security.Cryptography.dll msiexec.exe File created C:\Program Files (x86)\PC Drivers HeadQuarters\Driver Detective\Microsoft.Practices.ObjectBuilder.dll msiexec.exe File created C:\Program Files (x86)\PC Drivers HeadQuarters\Driver Detective\XPBurnComponent.dll msiexec.exe File created C:\Program Files (x86)\InstallShield Installation Information\{621C02EA-AAFF-4026-A903-165D59529A16}\ISSetup.dll DriverDetective.exe File created C:\Program Files (x86)\PC Drivers HeadQuarters\Driver Detective\DriversHQ.DriverDetective.Client.ExceptionLogging.XmlSerializers.dll msiexec.exe File created C:\Program Files (x86)\PC Drivers HeadQuarters\Driver Detective\DriversHQ.DriverDetective.Client.exe msiexec.exe File opened for modification C:\Program Files (x86)\InstallShield Installation Information\{621C02EA-AAFF-4026-A903-165D59529A16}\setup.isn DriverDetective.exe File created C:\Program Files (x86)\PC Drivers HeadQuarters\Driver Detective\DriversHQ.DriverDetective.Client.Communication.XmlSerializers.dll msiexec.exe File created C:\Program Files (x86)\PC Drivers HeadQuarters\Driver Detective\Microsoft.ApplicationBlocks.Updater.ActivationProcessors.dll msiexec.exe File created C:\Program Files (x86)\InstallShield Installation Information\{621C02EA-AAFF-4026-A903-165D59529A16}\setuca40.rra DriverDetective.exe File created C:\Program Files (x86)\PC Drivers HeadQuarters\Driver Detective\DriversHQ.DriverDetective.Client.exe.config msiexec.exe File created C:\Program Files (x86)\PC Drivers HeadQuarters\Driver Detective\DriversHQ.DriverDetective.Client.Communication.dll msiexec.exe File created C:\Program Files (x86)\PC Drivers HeadQuarters\Driver Detective\DriversHQ.DriverDetective.Client.DirectX.dll msiexec.exe File created C:\Program Files (x86)\PC Drivers HeadQuarters\Driver Detective\Microsoft.ApplicationBlocks.Updater.dll msiexec.exe File created C:\Program Files (x86)\PC Drivers HeadQuarters\Driver Detective\DriversHQ.DriverDetective.Client.InstallState MsiExec.exe File opened for modification C:\Program Files (x86)\InstallShield Installation Information\{621C02EA-AAFF-4026-A903-165D59529A16}\setup.exe DriverDetective.exe File created C:\Program Files (x86)\InstallShield Installation Information\{621C02EA-AAFF-4026-A903-165D59529A16}\0x04ca40.rra DriverDetective.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File created C:\Windows\assembly\NativeImages_v2.0.50727_32\Temp\ZAP6F9D.tmp\System.Security.dll mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\indexf.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index15.dat mscorsvw.exe File created C:\Windows\assembly\ngenlock.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index1b.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index1e.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index1e.dat mscorsvw.exe File created C:\Windows\Installer\{621C02EA-AAFF-4026-A903-165D59529A16}\ARPPRODUCTICON.exe msiexec.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\indexb.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\indexb.dat mscorsvw.exe File created C:\Windows\assembly\GACLock.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index1c.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index1c.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\Temp\ZAPA9D7.tmp\Microsoft.ApplicationBlocks.Updater.dll mscorsvw.exe File created C:\Windows\assembly\GACLock.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\Temp\ZAPA294.tmp\System.Drawing.Design.dll mscorsvw.exe File opened for modification C:\Windows\Installer\e5851c5.msi msiexec.exe File created C:\Windows\Microsoft.NET\Framework\v2.0.50727\ngen.lock ngen.exe File created C:\Windows\assembly\ngenlock.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index14.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\index18.dat mscorsvw.exe File created C:\Windows\assembly\ngenlock.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index12.dat mscorsvw.exe File created C:\Windows\assembly\ngenlock.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\Temp\ZAP9AE3.tmp\System.Design.dll mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\Temp\ZAPB35D.tmp\DriversHQ.DriverDetective.Client.DirectX.dll mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\indexd.dat mscorsvw.exe File created C:\Windows\assembly\GACLock.dat mscorsvw.exe File created C:\Windows\assembly\GACLock.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index21.dat mscorsvw.exe File created C:\Windows\assembly\ngenlock.dat mscorsvw.exe File created C:\Windows\assembly\GACLock.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index22.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\Temp\ZAPAFF2.tmp\Microsoft.Vsa.dll mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index2e.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\indexb.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index29.dat mscorsvw.exe File opened for modification C:\Windows\Installer\{621C02EA-AAFF-4026-A903-165D59529A16}\ARPPRODUCTICON.exe msiexec.exe File created C:\Windows\assembly\GACLock.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index11.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index14.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\indexb.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index25.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\index2d.dat mscorsvw.exe File created C:\Windows\assembly\ngenlock.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\indexb.dat mscorsvw.exe File created C:\Windows\assembly\GACLock.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index19.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\indexb.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\Temp\ZAP98D0.tmp\System.Runtime.Remoting.dll mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index1d.dat mscorsvw.exe File created C:\Windows\assembly\GACLock.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\Temp\ZAPA7C4.tmp\DriversHQ.DriverDetective.Common.dll mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index10.dat mscorsvw.exe File created C:\Windows\assembly\ngenlock.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\indexb.dat mscorsvw.exe File created C:\Windows\assembly\GACLock.dat mscorsvw.exe File created C:\Windows\assembly\GACLock.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index30.dat mscorsvw.exe File created C:\Windows\Installer\{621C02EA-AAFF-4026-A903-165D59529A16}\DriversHQ.DriverDe_212B77217E284373BD0AA155B0932A89_1.exe msiexec.exe File created C:\Windows\assembly\GACLock.dat mscorsvw.exe File created C:\Windows\assembly\GACLock.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index2a.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\indexb.dat mscorsvw.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 46 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscorsvw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscorsvw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscorsvw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscorsvw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscorsvw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscorsvw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscorsvw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscorsvw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscorsvw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ngen.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscorsvw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscorsvw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscorsvw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 376b4c8d17b91f570852303d932d434a_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Driverpatch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscorsvw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscorsvw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscorsvw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscorsvw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscorsvw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscorsvw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscorsvw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscorsvw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscorsvw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscorsvw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscorsvw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscorsvw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscorsvw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscorsvw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscorsvw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscorsvw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscorsvw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscorsvw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscorsvw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscorsvw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscorsvw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscorsvw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscorsvw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscorsvw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DriverDetective.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscorsvw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscorsvw.exe -
Checks SCSI registry key(s) 3 TTPs 5 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr\SnapshotDataCache = 534e41505041525401000000700000008ec7416a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 vssvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters vssvc.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr\PartitionTableCache = 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 vssvc.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates MsiExec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs MsiExec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA MsiExec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs MsiExec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople MsiExec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates MsiExec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs MsiExec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs MsiExec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates MsiExec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust MsiExec.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\@%SystemRoot%\system32\dnsapi.dll,-103 = "Domain Name System (DNS) Server Trust" mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA MsiExec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs MsiExec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs mscorsvw.exe -
Modifies registry class 58 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\AE20C126FFAA62049A3061D59525A961\ProductIcon = "C:\\Windows\\Installer\\{621C02EA-AAFF-4026-A903-165D59529A16}\\ARPPRODUCTICON.exe" msiexec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Assemblies\C:|Program Files (x86)|PC Drivers HeadQuarters|Driver Detective|DriversHQ.DriverDetective.Client.ExceptionLogging.dll\DriversHQ.DriverDetective.Client.ExceptionLogging,Version="6.2.5.0",Culture="neutr = 3d0050003800550047003500550055005d003800480056002100770045002a00300051003d002a003e0062004b002500490059004800670021002600410057006d004b00240052006e00620037007a00400000000000 msiexec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Assemblies\C:|Program Files (x86)|PC Drivers HeadQuarters|Driver Detective|DriversHQ.DriverDetective.Client.Updater.exe\DriversHQ.DriverDetective.Client.Updater,Version="6.2.5.0",Culture="neutral",FileVersion="6 = 3d0050003800550047003500550055005d003800480056002100770045002a00300051003d002a003e0071004500470049002b005b004a0078007d0040007d005f0070004800310066005f005a006d00310000000000 msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Assemblies\C:|Program Files (x86)|PC Drivers HeadQuarters|Driver Detective|DriversHQ.DriverDetective.ExceptionLogging.dll msiexec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Assemblies\C:|Program Files (x86)|PC Drivers HeadQuarters|Driver Detective|DriversHQ.DriverDetective.ExceptionLogging.dll\DriversHQ.DriverDetective.ExceptionLogging,Version="0.6.8.7",Culture="neutral",FileVersio = 3d0050003800550047003500550055005d003800480056002100770045002a00300051003d002a003e002a0046005900370078006a0046007500410039006f002b00530066002e0073004d0075006200350000000000 msiexec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Assemblies\C:|Program Files (x86)|PC Drivers HeadQuarters|Driver Detective|Microsoft.ApplicationBlocks.Updater.ActivationProcessors.dll\Microsoft.ApplicationBlocks.Updater.ActivationProcessors,Version="2.1.0.0", = 3d0050003800550047003500550055005d003800480056002100770045002a00300051003d002a003e0056005300510038007900670057004f00380039002c0057006300720040004e004f0044007100570000000000 msiexec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Assemblies\C:|Program Files (x86)|PC Drivers HeadQuarters|Driver Detective|XPBurnComponent.dll\XPBurnComponent,Version="1.1.0.0",Culture="neutral",FileVersion="1.1.0.0",ProcessorArchitecture="MSIL" = 3d0050003800550047003500550055005d003800480056002100770045002a00300051003d002a003e005f00310040006b0034004e0030006c005d0038006c0052007100550024004400650040006300490000000000 msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\AE20C126FFAA62049A3061D59525A961\Language = "1033" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Assemblies\C:|Program Files (x86)|PC Drivers HeadQuarters|Driver Detective|DriversHQ.DriverDetective.Client.Communication.dll msiexec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Assemblies\C:|Program Files (x86)|PC Drivers HeadQuarters|Driver Detective|DriversHQ.DriverDetective.Client.Communication.dll\DriversHQ.DriverDetective.Client.Communication,Version="6.2.5.0",Culture="neutral",Fi = 3d0050003800550047003500550055005d003800480056002100770045002a00300051003d002a003e007d00330051007200730076007a002c0055003f0028004e0029004e0044007d00590078003f00650000000000 msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Assemblies\C:|Program Files (x86)|PC Drivers HeadQuarters|Driver Detective|Interop.WindowsInstaller.dll msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Assemblies\C:|Program Files (x86)|PC Drivers HeadQuarters|Driver Detective|Microsoft.ApplicationBlocks.Updater.ActivationProcessors.dll msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Assemblies\C:|Program Files (x86)|PC Drivers HeadQuarters|Driver Detective|XPBurnComponent.dll msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\F2E3C919C90310F4489C9BBC5DABCFF1 msiexec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Assemblies\C:|Program Files (x86)|PC Drivers HeadQuarters|Driver Detective|Interop.WindowsInstaller.dll\Interop.WindowsInstaller,Version="1.0.0.0",Culture="neutral",FileVersion="1.0.0.0",ProcessorArchitecture="M = 3d0050003800550047003500550055005d003800480056002100770045002a00300051003d002a003e002b002a0038007b0031005300740056005a003900290040007b007b0075005a003f004d002a005b0000000000 msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Assemblies\C:|Program Files (x86)|PC Drivers HeadQuarters|Driver Detective|Microsoft.Practices.EnterpriseLibrary.Security.Cryptography.dll msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Assemblies\C:|Program Files (x86)|PC Drivers HeadQuarters|Driver Detective|Microsoft.Practices.ObjectBuilder.dll msiexec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Assemblies\C:|Program Files (x86)|PC Drivers HeadQuarters|Driver Detective|Microsoft.Practices.ObjectBuilder.dll\Microsoft.Practices.ObjectBuilder,Version="1.0.51205.0",Culture="neutral",FileVersion="1.0.51205.0 = 3d0050003800550047003500550055005d003800480056002100770045002a00300051003d002a003e002d002b006d00640040002900570031002b0041007a007b00330046003f0058004700650062002c0000000000 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\AE20C126FFAA62049A3061D59525A961\SourceList\PackageName = "Driver Detective.msi" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Assemblies\C:|Program Files (x86)|PC Drivers HeadQuarters|Driver Detective|DriversHQ.DriverDetective.Common.dll msiexec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Assemblies\C:|Program Files (x86)|PC Drivers HeadQuarters|Driver Detective|Microsoft.ApplicationBlocks.Updater.Downloaders.dll\Microsoft.ApplicationBlocks.Updater.Downloaders,Version="2.1.0.0",Culture="neutral", = 3d0050003800550047003500550055005d003800480056002100770045002a00300051003d002a003e00600027002500720033003f0063004e004f003d002d00780041007d004c005e0074004d006c00650000000000 msiexec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Assemblies\C:|Program Files (x86)|PC Drivers HeadQuarters|Driver Detective|Microsoft.Practices.EnterpriseLibrary.Security.Cryptography.dll\Microsoft.Practices.EnterpriseLibrary.Security.Cryptography,Version="2.1 = 3d0050003800550047003500550055005d003800480056002100770045002a00300051003d002a003e007a007a007700480031002b007d007e002c003d005700460044005b0031004a002b00740059004a0000000000 msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\AE20C126FFAA62049A3061D59525A961\SourceList\Net msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\AE20C126FFAA62049A3061D59525A961\SourceList\Media msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\AE20C126FFAA62049A3061D59525A961\Version = "100794568" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\AE20C126FFAA62049A3061D59525A961\SourceList\Net\1 = "C:\\Users\\Admin\\AppData\\Local\\Downloaded Installations\\{8A8741C3-6387-40D0-9DCF-757209EF9522}\\" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\F2E3C919C90310F4489C9BBC5DABCFF1\AE20C126FFAA62049A3061D59525A961 msiexec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Assemblies\C:|Program Files (x86)|PC Drivers HeadQuarters|Driver Detective|DriversHQ.DriverDetective.Client.ExceptionLogging.XmlSerializers.dll\DriversHQ.DriverDetective.Client.ExceptionLogging.XmlSerializers,Ve = 3d0050003800550047003500550055005d003800480056002100770045002a00300051003d002a003e006f0024006e0057003200250057005a003d003d004a0042006d00470045004a006b00420069004d0000000000 msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Assemblies\C:|Program Files (x86)|PC Drivers HeadQuarters|Driver Detective|Microsoft.Practices.EnterpriseLibrary.Common.dll msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Assemblies\C:|Program Files (x86)|PC Drivers HeadQuarters|Driver Detective|DriversHQ.DriverDetective.Client.Communication.XmlSerializers.dll msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Assemblies\C:|Program Files (x86)|PC Drivers HeadQuarters|Driver Detective|DriversHQ.DriverDetective.Client.ExceptionLogging.XmlSerializers.dll msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\AE20C126FFAA62049A3061D59525A961\SourceList msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Assemblies\C:|Program Files (x86)|PC Drivers HeadQuarters|Driver Detective|DriversHQ.DriverDetective.Client.ExceptionLogging.dll msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Assemblies\C:|Program Files (x86)|PC Drivers HeadQuarters|Driver Detective|Microsoft.ApplicationBlocks.Updater.Downloaders.dll msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\AE20C126FFAA62049A3061D59525A961\Assignment = "1" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\AE20C126FFAA62049A3061D59525A961\SourceList\LastUsedSource = "n;1;C:\\Users\\Admin\\AppData\\Local\\Downloaded Installations\\{8A8741C3-6387-40D0-9DCF-757209EF9522}\\" msiexec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Assemblies\C:|Program Files (x86)|PC Drivers HeadQuarters|Driver Detective|DriversHQ.DriverDetective.Client.Communication.XmlSerializers.dll\DriversHQ.DriverDetective.Client.Communication.XmlSerializers,Version= = 3d0050003800550047003500550055005d003800480056002100770045002a00300051003d002a003e003d007b0038006300670066002c0047006e003d005d00270034006f0050003900440069005f002a0000000000 msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Assemblies\C:|Program Files (x86)|PC Drivers HeadQuarters|Driver Detective|DriversHQ.DriverDetective.Client.DirectX.dll msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\AE20C126FFAA62049A3061D59525A961\PackageCode = "3C1478A878360D04D9FC572790FE5922" msiexec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Assemblies\C:|Program Files (x86)|PC Drivers HeadQuarters|Driver Detective|DriversHQ.DriverDetective.Common.dll\DriversHQ.DriverDetective.Common,Version="0.6.8.7",Culture="neutral",FileVersion="0.6.8.7",Processo = 3d0050003800550047003500550055005d003800480056002100770045002a00300051003d002a003e00260074002400740032007e005e0079002c003d00780074005f00740045002100210021004b006b0000000000 msiexec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Assemblies\C:|Program Files (x86)|PC Drivers HeadQuarters|Driver Detective|Microsoft.ApplicationBlocks.Updater.dll\Microsoft.ApplicationBlocks.Updater,Version="2.1.0.0",Culture="neutral",FileVersion="2.1.0.0",Pr = 3d0050003800550047003500550055005d003800480056002100770045002a00300051003d002a003e006f0051004600490049002a005f00450045003900280066006b004d0039003f002b006e006100260000000000 msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\AE20C126FFAA62049A3061D59525A961 msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\AE20C126FFAA62049A3061D59525A961\AdvertiseFlags = "388" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\AE20C126FFAA62049A3061D59525A961\DeploymentFlags = "3" msiexec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\AE20C126FFAA62049A3061D59525A961\Clients = 3a0000000000 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\AE20C126FFAA62049A3061D59525A961\Driver_Detective msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\AE20C126FFAA62049A3061D59525A961\AuthorizedLUAApp = "1" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\AE20C126FFAA62049A3061D59525A961\SourceList\Media\1 = "DISK1;1" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Assemblies\C:|Program Files (x86)|PC Drivers HeadQuarters|Driver Detective|DriversHQ.DriverDetective.Client.Updater.exe msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\AE20C126FFAA62049A3061D59525A961\InstanceType = "0" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\AE20C126FFAA62049A3061D59525A961\SourceList\Media\DiskPrompt = "[1]" msiexec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Assemblies\C:|Program Files (x86)|PC Drivers HeadQuarters|Driver Detective|DriversHQ.DriverDetective.Client.exe\DriversHQ.DriverDetective.Client,Version="6.2.5.0",Culture="neutral",FileVersion="6.2.5.0",Processo = 3d0050003800550047003500550055005d003800480056002100770045002a00300051003d002a003e00570032005d0030007800380060006900400040005700630069004300380039005d0051002b00570000000000 msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Assemblies\C:|Program Files (x86)|PC Drivers HeadQuarters|Driver Detective|Microsoft.ApplicationBlocks.Updater.dll msiexec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Assemblies\C:|Program Files (x86)|PC Drivers HeadQuarters|Driver Detective|DriversHQ.DriverDetective.Client.DirectX.dll\DriversHQ.DriverDetective.Client.DirectX,Version="1.0.2760.14777",Culture="neutral",Process = 3d0050003800550047003500550055005d003800480056002100770045002a00300051003d002a003e006f005d007300300032004800360038006e003f006b00210025005f002a007b007700340038007a0000000000 msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Assemblies\C:|Program Files (x86)|PC Drivers HeadQuarters|Driver Detective|DriversHQ.DriverDetective.Client.exe msiexec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Assemblies\C:|Program Files (x86)|PC Drivers HeadQuarters|Driver Detective|Microsoft.Practices.EnterpriseLibrary.Common.dll\Microsoft.Practices.EnterpriseLibrary.Common,Version="2.0.0.0",Culture="neutral",FileVe = 3d0050003800550047003500550055005d003800480056002100770045002a00300051003d002a003e00280025004e004200630025004800330071004000580078003000660037004500640026006d00570000000000 msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\AE20C126FFAA62049A3061D59525A961 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\AE20C126FFAA62049A3061D59525A961\ProductName = "Driver Detective" msiexec.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\742C3192E607E424EB4549542BE1BBC53E6174E2 DriverDetective.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\742C3192E607E424EB4549542BE1BBC53E6174E2\Blob = 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 DriverDetective.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3868 Services.exe 3868 Services.exe 3868 Services.exe 3868 Services.exe 3788 msiexec.exe 3788 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeSecurityPrivilege 3788 msiexec.exe Token: SeCreateTokenPrivilege 1424 DriverDetective.exe Token: SeAssignPrimaryTokenPrivilege 1424 DriverDetective.exe Token: SeLockMemoryPrivilege 1424 DriverDetective.exe Token: SeIncreaseQuotaPrivilege 1424 DriverDetective.exe Token: SeMachineAccountPrivilege 1424 DriverDetective.exe Token: SeTcbPrivilege 1424 DriverDetective.exe Token: SeSecurityPrivilege 1424 DriverDetective.exe Token: SeTakeOwnershipPrivilege 1424 DriverDetective.exe Token: SeLoadDriverPrivilege 1424 DriverDetective.exe Token: SeSystemProfilePrivilege 1424 DriverDetective.exe Token: SeSystemtimePrivilege 1424 DriverDetective.exe Token: SeProfSingleProcessPrivilege 1424 DriverDetective.exe Token: SeIncBasePriorityPrivilege 1424 DriverDetective.exe Token: SeCreatePagefilePrivilege 1424 DriverDetective.exe Token: SeCreatePermanentPrivilege 1424 DriverDetective.exe Token: SeBackupPrivilege 1424 DriverDetective.exe Token: SeRestorePrivilege 1424 DriverDetective.exe Token: SeShutdownPrivilege 1424 DriverDetective.exe Token: SeDebugPrivilege 1424 DriverDetective.exe Token: SeAuditPrivilege 1424 DriverDetective.exe Token: SeSystemEnvironmentPrivilege 1424 DriverDetective.exe Token: SeChangeNotifyPrivilege 1424 DriverDetective.exe Token: SeRemoteShutdownPrivilege 1424 DriverDetective.exe Token: SeUndockPrivilege 1424 DriverDetective.exe Token: SeSyncAgentPrivilege 1424 DriverDetective.exe Token: SeEnableDelegationPrivilege 1424 DriverDetective.exe Token: SeManageVolumePrivilege 1424 DriverDetective.exe Token: SeImpersonatePrivilege 1424 DriverDetective.exe Token: SeCreateGlobalPrivilege 1424 DriverDetective.exe Token: SeCreateTokenPrivilege 1424 DriverDetective.exe Token: SeAssignPrimaryTokenPrivilege 1424 DriverDetective.exe Token: SeLockMemoryPrivilege 1424 DriverDetective.exe Token: SeIncreaseQuotaPrivilege 1424 DriverDetective.exe Token: SeMachineAccountPrivilege 1424 DriverDetective.exe Token: SeTcbPrivilege 1424 DriverDetective.exe Token: SeSecurityPrivilege 1424 DriverDetective.exe Token: SeTakeOwnershipPrivilege 1424 DriverDetective.exe Token: SeLoadDriverPrivilege 1424 DriverDetective.exe Token: SeSystemProfilePrivilege 1424 DriverDetective.exe Token: SeSystemtimePrivilege 1424 DriverDetective.exe Token: SeProfSingleProcessPrivilege 1424 DriverDetective.exe Token: SeIncBasePriorityPrivilege 1424 DriverDetective.exe Token: SeCreatePagefilePrivilege 1424 DriverDetective.exe Token: SeCreatePermanentPrivilege 1424 DriverDetective.exe Token: SeBackupPrivilege 1424 DriverDetective.exe Token: SeRestorePrivilege 1424 DriverDetective.exe Token: SeShutdownPrivilege 1424 DriverDetective.exe Token: SeDebugPrivilege 1424 DriverDetective.exe Token: SeAuditPrivilege 1424 DriverDetective.exe Token: SeSystemEnvironmentPrivilege 1424 DriverDetective.exe Token: SeChangeNotifyPrivilege 1424 DriverDetective.exe Token: SeRemoteShutdownPrivilege 1424 DriverDetective.exe Token: SeUndockPrivilege 1424 DriverDetective.exe Token: SeSyncAgentPrivilege 1424 DriverDetective.exe Token: SeEnableDelegationPrivilege 1424 DriverDetective.exe Token: SeManageVolumePrivilege 1424 DriverDetective.exe Token: SeImpersonatePrivilege 1424 DriverDetective.exe Token: SeCreateGlobalPrivilege 1424 DriverDetective.exe Token: SeCreateTokenPrivilege 1424 DriverDetective.exe Token: SeAssignPrimaryTokenPrivilege 1424 DriverDetective.exe Token: SeLockMemoryPrivilege 1424 DriverDetective.exe Token: SeIncreaseQuotaPrivilege 1424 DriverDetective.exe Token: SeMachineAccountPrivilege 1424 DriverDetective.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1424 DriverDetective.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2324 Driverpatch.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2092 wrote to memory of 2324 2092 376b4c8d17b91f570852303d932d434a_JaffaCakes118.exe 85 PID 2092 wrote to memory of 2324 2092 376b4c8d17b91f570852303d932d434a_JaffaCakes118.exe 85 PID 2092 wrote to memory of 2324 2092 376b4c8d17b91f570852303d932d434a_JaffaCakes118.exe 85 PID 2092 wrote to memory of 1424 2092 376b4c8d17b91f570852303d932d434a_JaffaCakes118.exe 86 PID 2092 wrote to memory of 1424 2092 376b4c8d17b91f570852303d932d434a_JaffaCakes118.exe 86 PID 2092 wrote to memory of 1424 2092 376b4c8d17b91f570852303d932d434a_JaffaCakes118.exe 86 PID 2324 wrote to memory of 3868 2324 Driverpatch.exe 88 PID 2324 wrote to memory of 3868 2324 Driverpatch.exe 88 PID 2324 wrote to memory of 3868 2324 Driverpatch.exe 88 PID 3868 wrote to memory of 3544 3868 Services.exe 56 PID 3868 wrote to memory of 3544 3868 Services.exe 56 PID 3868 wrote to memory of 3544 3868 Services.exe 56 PID 3868 wrote to memory of 3544 3868 Services.exe 56 PID 3868 wrote to memory of 3544 3868 Services.exe 56 PID 3868 wrote to memory of 3544 3868 Services.exe 56 PID 3788 wrote to memory of 2900 3788 msiexec.exe 92 PID 3788 wrote to memory of 2900 3788 msiexec.exe 92 PID 3788 wrote to memory of 2900 3788 msiexec.exe 92 PID 1424 wrote to memory of 4848 1424 DriverDetective.exe 93 PID 1424 wrote to memory of 4848 1424 DriverDetective.exe 93 PID 3788 wrote to memory of 4452 3788 msiexec.exe 107 PID 3788 wrote to memory of 4452 3788 msiexec.exe 107 PID 3788 wrote to memory of 4452 3788 msiexec.exe 107 PID 3788 wrote to memory of 3720 3788 msiexec.exe 108 PID 3788 wrote to memory of 3720 3788 msiexec.exe 108 PID 3788 wrote to memory of 3720 3788 msiexec.exe 108 PID 3720 wrote to memory of 3376 3720 MsiExec.exe 110 PID 3720 wrote to memory of 3376 3720 MsiExec.exe 110 PID 3720 wrote to memory of 3376 3720 MsiExec.exe 110 PID 3376 wrote to memory of 4280 3376 ngen.exe 113 PID 3376 wrote to memory of 4280 3376 ngen.exe 113 PID 3376 wrote to memory of 4280 3376 ngen.exe 113 PID 3376 wrote to memory of 100 3376 ngen.exe 115 PID 3376 wrote to memory of 100 3376 ngen.exe 115 PID 3376 wrote to memory of 100 3376 ngen.exe 115 PID 3376 wrote to memory of 2068 3376 ngen.exe 117 PID 3376 wrote to memory of 2068 3376 ngen.exe 117 PID 3376 wrote to memory of 2068 3376 ngen.exe 117 PID 3376 wrote to memory of 1276 3376 ngen.exe 119 PID 3376 wrote to memory of 1276 3376 ngen.exe 119 PID 3376 wrote to memory of 1276 3376 ngen.exe 119 PID 3376 wrote to memory of 2660 3376 ngen.exe 120 PID 3376 wrote to memory of 2660 3376 ngen.exe 120 PID 3376 wrote to memory of 2660 3376 ngen.exe 120 PID 3376 wrote to memory of 1560 3376 ngen.exe 121 PID 3376 wrote to memory of 1560 3376 ngen.exe 121 PID 3376 wrote to memory of 1560 3376 ngen.exe 121 PID 3376 wrote to memory of 5068 3376 ngen.exe 122 PID 3376 wrote to memory of 5068 3376 ngen.exe 122 PID 3376 wrote to memory of 5068 3376 ngen.exe 122 PID 3376 wrote to memory of 4460 3376 ngen.exe 123 PID 3376 wrote to memory of 4460 3376 ngen.exe 123 PID 3376 wrote to memory of 4460 3376 ngen.exe 123 PID 3376 wrote to memory of 3992 3376 ngen.exe 124 PID 3376 wrote to memory of 3992 3376 ngen.exe 124 PID 3376 wrote to memory of 3992 3376 ngen.exe 124 PID 3376 wrote to memory of 3164 3376 ngen.exe 125 PID 3376 wrote to memory of 3164 3376 ngen.exe 125 PID 3376 wrote to memory of 3164 3376 ngen.exe 125 PID 3376 wrote to memory of 4392 3376 ngen.exe 126 PID 3376 wrote to memory of 4392 3376 ngen.exe 126 PID 3376 wrote to memory of 4392 3376 ngen.exe 126 PID 3376 wrote to memory of 3128 3376 ngen.exe 127 PID 3376 wrote to memory of 3128 3376 ngen.exe 127 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3544
-
C:\Users\Admin\AppData\Local\Temp\376b4c8d17b91f570852303d932d434a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\376b4c8d17b91f570852303d932d434a_JaffaCakes118.exe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Users\Admin\AppData\Local\Temp\Driverpatch.exe"C:\Users\Admin\AppData\Local\Temp\Driverpatch.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Users\Admin\AppData\Local\Temp\Services.exe"C:\Users\Admin\AppData\Local\Temp\Services.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3868
-
-
-
C:\Users\Admin\AppData\Local\Temp\DriverDetective.exe"C:\Users\Admin\AppData\Local\Temp\DriverDetective.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Users\Admin\AppData\Local\Temp\{425386E8-F137-4DF5-8FC2-F96218B509EC}\ISBEW64.exeC:\Users\Admin\AppData\Local\Temp\{425386E8-F137-4DF5-8FC2-F96218B509EC}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{78980C04-6103-4381-ACF6-664FB9402FDC}4⤵
- Executes dropped EXE
PID:4848
-
-
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Blocklisted process makes network request
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3788 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 8FEB0173657980AD6A47C1776A6F35F8 C2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2900
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 597261E31570238987C7C0FE180F9A832⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4452
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding A031B9742C24C853E74091C756AD628C E Global\MSI00002⤵
- Loads dropped DLL
- Blocklisted process makes network request
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:3720 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\ngen.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\ngen.exe" install "C:\Program Files (x86)\PC Drivers HeadQuarters\Driver Detective\DriversHQ.DriverDetective.Client.exe"3⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3376 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 22c -InterruptEvent 0 -NGENProcess 21c -Pipe 228 -Comment "NGen Worker Process"4⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:4280
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2d8 -InterruptEvent 0 -NGENProcess 2ac -Pipe 2d0 -Comment "NGen Worker Process"4⤵
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:100
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2c0 -InterruptEvent 0 -NGENProcess 2b0 -Pipe 2d4 -Comment "NGen Worker Process"4⤵
- System Location Discovery: System Language Discovery
PID:2068
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2d8 -InterruptEvent 0 -NGENProcess 2f4 -Pipe 2ac -Comment "NGen Worker Process"4⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1276
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2bc -InterruptEvent 0 -NGENProcess 2b0 -Pipe 2f0 -Comment "NGen Worker Process"4⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2660
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 224 -InterruptEvent 0 -NGENProcess 2dc -Pipe 2f4 -Comment "NGen Worker Process"4⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1560
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2b0 -InterruptEvent 0 -NGENProcess 2d8 -Pipe 224 -Comment "NGen Worker Process"4⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:5068
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2b0 -InterruptEvent 0 -NGENProcess 2e8 -Pipe 2bc -Comment "NGen Worker Process"4⤵
- System Location Discovery: System Language Discovery
PID:4460
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2b0 -InterruptEvent 0 -NGENProcess 2dc -Pipe 2ec -Comment "NGen Worker Process"4⤵
- System Location Discovery: System Language Discovery
PID:3992
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2e0 -InterruptEvent 0 -NGENProcess 30c -Pipe 238 -Comment "NGen Worker Process"4⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3164
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2e0 -InterruptEvent 0 -NGENProcess 304 -Pipe 2e8 -Comment "NGen Worker Process"4⤵
- System Location Discovery: System Language Discovery
PID:4392
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2e0 -InterruptEvent 0 -NGENProcess 30c -Pipe 308 -Comment "NGen Worker Process"4⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3128
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2fc -InterruptEvent 0 -NGENProcess 2e0 -Pipe 318 -Comment "NGen Worker Process"4⤵
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:4556
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 304 -InterruptEvent 0 -NGENProcess 300 -Pipe 2fc -Comment "NGen Worker Process"4⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:844
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2e0 -InterruptEvent 0 -NGENProcess 314 -Pipe 2e4 -Comment "NGen Worker Process"4⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1972
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2cc -InterruptEvent 0 -NGENProcess 32c -Pipe 30c -Comment "NGen Worker Process"4⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2252
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2cc -InterruptEvent 0 -NGENProcess 304 -Pipe 328 -Comment "NGen Worker Process"4⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3976
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2e0 -InterruptEvent 0 -NGENProcess 314 -Pipe 330 -Comment "NGen Worker Process"4⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4284
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 304 -InterruptEvent 0 -NGENProcess 33c -Pipe 320 -Comment "NGen Worker Process"4⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4324
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 304 -InterruptEvent 0 -NGENProcess 34c -Pipe 300 -Comment "NGen Worker Process"4⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3484
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 358 -InterruptEvent 0 -NGENProcess 36c -Pipe 35c -Comment "NGen Worker Process"4⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4476
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 36c -InterruptEvent 0 -NGENProcess 354 -Pipe 368 -Comment "NGen Worker Process"4⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1784
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 36c -InterruptEvent 0 -NGENProcess 338 -Pipe 334 -Comment "NGen Worker Process"4⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:784
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 36c -InterruptEvent 0 -NGENProcess 314 -Pipe 354 -Comment "NGen Worker Process"4⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4056
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 314 -InterruptEvent 0 -NGENProcess 33c -Pipe 36c -Comment "NGen Worker Process"4⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4464
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2d8 -InterruptEvent 0 -NGENProcess 2e0 -Pipe 2cc -Comment "NGen Worker Process"4⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4032
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2f8 -InterruptEvent 0 -NGENProcess 32c -Pipe 2e0 -Comment "NGen Worker Process"4⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3216
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2c0 -InterruptEvent 0 -NGENProcess 310 -Pipe 34c -Comment "NGen Worker Process"4⤵
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:3576
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 31c -InterruptEvent 0 -NGENProcess 33c -Pipe 338 -Comment "NGen Worker Process"4⤵
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:3284
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 360 -InterruptEvent 0 -NGENProcess 304 -Pipe 314 -Comment "NGen Worker Process"4⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3368
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 360 -InterruptEvent 0 -NGENProcess 364 -Pipe 33c -Comment "NGen Worker Process"4⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3704
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 350 -InterruptEvent 0 -NGENProcess 344 -Pipe 374 -Comment "NGen Worker Process"4⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3280
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 364 -InterruptEvent 0 -NGENProcess 2f8 -Pipe 350 -Comment "NGen Worker Process"4⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4816
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 32c -InterruptEvent 0 -NGENProcess 2d8 -Pipe 344 -Comment "NGen Worker Process"4⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1568
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2c0 -InterruptEvent 0 -NGENProcess 304 -Pipe 310 -Comment "NGen Worker Process"4⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2628
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2c0 -InterruptEvent 0 -NGENProcess 2d8 -Pipe 324 -Comment "NGen Worker Process"4⤵
- System Location Discovery: System Language Discovery
PID:100
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 370 -InterruptEvent 0 -NGENProcess 32c -Pipe 2c0 -Comment "NGen Worker Process"4⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2324
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 370 -InterruptEvent 0 -NGENProcess 2d8 -Pipe 360 -Comment "NGen Worker Process"4⤵
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:1276
-
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Checks SCSI registry key(s)
PID:2064
-
C:\Windows\system32\srtasks.exeC:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:21⤵PID:1012
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
127KB
MD5b1a39e86a0209c6a4ba5176ed1570f44
SHA144a0b9534f6583bb28930a671ee996a2295160e8
SHA256a4fef87977af18b9f35ef8e792602148a6f2d7736c693a66adeb7bcb4e5c830e
SHA512efb9a3f43b055d3dc190609dbc2bf185bf39e22ef16df3d8769daab42731fa33fe8397240972a69c9eacf49c17bcd8ce30ed0ff76f98d24eb672943be8a530e9
-
C:\Program Files (x86)\InstallShield Installation Information\{621C02EA-AAFF-4026-A903-165D59529A16}\setup.exe
Filesize304KB
MD5978515e5b4853e44d7e6e52441d0a955
SHA11956379cd6b23e4dcef90a4da718fd6525fe791d
SHA256b44c8740c29779c0461a32633a6304704aacdbf4d757e46ab93e0ffc0dd71aa3
SHA5122cc7a5efca00759c2b8ce080b56eff0d92301cac698fb05acc798de8b82e40ce32cf84f66e8e03ec8995ce2c69a1a20d4f593b7d686af2526479bf6e73b0e7bc
-
C:\Program Files (x86)\InstallShield Installation Information\{621C02EA-AAFF-4026-A903-165D59529A16}\setup.ini
Filesize2KB
MD545b2328e2888f965dc91bccc65866539
SHA1745b3cc2a4013306e48092439bc29b2c6705b107
SHA2569f9405dff8f6857d547acfa2cc52a765781dd2cfff94031e041d4d5dfc5b51ee
SHA51257c2beb8ae9281127f99d84b9b3a4b413677b3ecdd2fa0c8bae45f5cd965b14005164d046762b6ab0e13ab2d9d145ffa220fac8302cc5bf60e3f4f222fa09532
-
C:\Program Files (x86)\PC Drivers HeadQuarters\Driver Detective\DriversHQ.DriverDetective.Client.Communication.dll
Filesize77KB
MD5330e271bebd2b0cfc3a2d18ef4209d5a
SHA16edc921ec69ca3b9c11f3e649ea156b2d635fee4
SHA2566e2043b91797af4a72af8ae09a73f5d7203bef17d78410b56536bc84befed8fb
SHA512532bbbf9c7d3fa3dbbf0188eff325ad9343de562d46c629b2cb68a9da372be7824ec216a741cbae1b8e69d80f95b04309c1f74225a51a49b13b893312ead42c5
-
C:\Program Files (x86)\PC Drivers HeadQuarters\Driver Detective\DriversHQ.DriverDetective.Client.exe
Filesize1.0MB
MD5bbc97485a40e439bbe888e324f5b1786
SHA10eeef131196f8ccd76402464369e89d57e8d9f38
SHA256aad4ab6933cf411c3dfc3f1763653465474be14d7348e0161bf7460239114be3
SHA512af81abb2abbfb9c1df58ec0ee90144e0138235a595d064bfffaf45e34a183b77cd8438f8cc80e7fe255786dcdadfc7bb2b4ef9db09e7ad0a1419ff4989cd465b
-
C:\Program Files (x86)\PC Drivers HeadQuarters\Driver Detective\DriversHQ.DriverDetective.Client.exe.config
Filesize5KB
MD567348ba2808cee131fb92b1d53391494
SHA13c0b94f0be51b8b203e5a9de1cca34bcedf74e50
SHA2562b6b7c5574099cf49d7bfb30690b1651057a7cf29ea033a9e4ef2bd0fba4dce7
SHA512f53075b44e4962ffe49f9404b28cfceeb2dd00e0268ccba2e8ad1a1387488c67ea84071dbeba17b35cd88633e8114ff6a745d5427c5b063670b5fc02f2c69b78
-
C:\Program Files (x86)\PC Drivers HeadQuarters\Driver Detective\DriversHQ.DriverDetective.Common.dll
Filesize61KB
MD530b5fa2cca6357a7c240971777116c8e
SHA1e9ceb6a2dd6d49c0e0c386495542c305a367aece
SHA256520c69b275015547dcdb477f8ad27ba530d9c4b7eee0e9aa6d8d1079d5042c77
SHA512af33394a39ebc2a5466ca2714fae6d8e50b3f449ae98e003c4c952dabbfd3430fd5d167a04d5c84ae4502333e6981e36e2d7c349b0538e2cacdaa2bef7b3aada
-
C:\Program Files (x86)\PC Drivers HeadQuarters\Driver Detective\DriversHQ.DriverDetective.ExceptionLogging.dll
Filesize37KB
MD59a3200dfbf47b03fd43160ec8356be51
SHA103a5c399da397b7d6fb02f7ad1fb387b7fb2d618
SHA2569f978438d0e4cf0c52904f95f419c92dfcd8eaa9c4f47abae284c3892f2491da
SHA5120125d1262ec287c6dae2915c76ec33e9f9b8302f49ed86c6a421a212341d38b363a400f5eeaeee6a7ba24ad02dfced69e4cfafeaa26b661a7629572a46301eab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C3948BE6E525B8A8CEE9FAC91C9E392_9B1AA3369F4D3E257D46E66245F1CC24
Filesize5B
MD55bfa51f3a417b98e7443eca90fc94703
SHA18c015d80b8a23f780bdd215dc842b0f5551f63bd
SHA256bebe2853a3485d1c2e5c5be4249183e0ddaff9f87de71652371700a89d937128
SHA5124cd03686254bb28754cbaa635ae1264723e2be80ce1dd0f78d1ab7aee72232f5b285f79e488e9c5c49ff343015bd07bb8433d6cee08ae3cea8c317303e3ac399
-
Filesize
1KB
MD51ba25895dc793e6826cbe8d61ddd8293
SHA16387cc55cbe9f71ae41b2425192b900a1eb3a54f
SHA256cc4c5c999ca59e5a62bc3ffe172a61f8cf13cc18c89fe48f628ff2a75bdc508a
SHA5121ff9b34fdbeae98fa8b534ba12501eb6df983cc67ce4f8ffc4c1ff12631aa8ed36ff349c39a2186e0ac8d9809437106578a746eec3854b54fef38a3cc0adb957
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C3948BE6E525B8A8CEE9FAC91C9E392_9B1AA3369F4D3E257D46E66245F1CC24
Filesize412B
MD52b0e32dcc34d5a36726ca5bc56153ed6
SHA1aa60a7fcc8fd03cb3ab4f69eb54d818f071fd38b
SHA256e2b9ea502c0aea49d1637d3d06d76de0b061e085da65618a3e36c5eb0920ed76
SHA5129e94cea4e1d45908fed83892fbeafe26e5dde57bfd15ebf5a8178bbed96fffc669364d43160c212fd963ec532e2bb93797f2454d03c3705eebe918bd760f27ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\60E31627FDA0A46932B0E5948949F2A5
Filesize182B
MD5e06a13ceb7d8d5780fffbc5de00aee6f
SHA1e9d37ecb68e744d69acbca8b6518772ec20d1b5b
SHA256e0c11b2da26ffb4bc3b49a0fde52fa61697e5e101fd15534460a350dd17cc616
SHA512beeaa3cd2248fca3e538a605b94ceeef7f7bce2a0e408a54e3d3c1ecc150d88ea772ff9ea34e61e06cff1d7692367ba2d011e57d7ea8767017f782ce624ffdea
-
Filesize
4.8MB
MD520a1a334e7dba7602ce3ff77ecc63f3d
SHA10a21041fb429089bf3af9cb091c509c2ef1bc4f8
SHA256f18422d5de25ecde52d632de468f22dccd1e581191c02fdca2cd2eb51affa728
SHA5122916dd597e7a8cb2b9211b7e057a79998c7ecd118c10b800ee7c9879d70cda733043c7f4e4773fa924984932a6cf27fe007506775fbb1d1ef1c94b90122a6adb
-
Filesize
55KB
MD5648254ac3a7444a670566cc238bc9720
SHA10ecc9f9960fc3c0b4c6add3af53ecb000aea8962
SHA256efbc2a3f54ead829eaa4754fd83d636781d488f2c98fe076a7bb625e9097f53c
SHA512d0555e9aa6b9146228b86c26716a4033e3ab4df416883564a20e3098025139d0ff494f2e2d9e03931503420cc9c7526e2e5bebe430deee44343b6fd47f111eec
-
Filesize
52KB
MD54a908ee9c6f2f4aad63382cccee731e4
SHA1e572580949f277987fe232757ce88c2ac35e0223
SHA256459f503fb8b4fc4a600261430ac77bf70118d41fa19f7b2620d43ba6e9c8fa5e
SHA51275ba5856df7ed1457b6192e3b12c5dbb9cd0c6860d787357b37d5e2aabdd1dddb1fd6195064cad1b166431a71dee233b76cb6304d8e868050d79c731ef6e567f
-
Filesize
48KB
MD52f137b8388eb54bf36c22363de805a4b
SHA16de92d8599995ea0b6871e4dca3a8cdb15014d1e
SHA2562ae04b709a6ad7709e3b629a4f2051c0b2d45f95fb1fa19563932aca3ddbd6b6
SHA512c722dccf8a1d75e28ba72f85ada8fe51953fc776438fa500f22533f77176ed6bb221160ccc7a72228338bab6e291fdde615035baa530184828f155cfe012a7aa
-
Filesize
276KB
MD5fc86d87930e34f28f262abdebf087528
SHA1dc08596cca2fee1eabe75e546dd1bb8ff8e88a35
SHA256c5e421747b6f411f30d6c089d8760f98794c2cfc8a0055037bc2141eaab43618
SHA51266737c6fae1de9443a43a2abc22106b7e01bf6692115b1761c888d4bf8c2d58f4e0ded8ca073c5a9d2eb8e20f9c8ef664edb1c2c9215fd87b4bd9f03d563d360
-
Filesize
5KB
MD552d179ad79966752ec40a678fd8b0062
SHA1f12df9b03090286d1093b5421aea3acc358cc032
SHA25657e020c41ad0566fb55415a40167a0c3da89584bc4e5f961d8e8c646f80c5590
SHA512b5fb5002f1947a765a83c9a960c378b04adfe7acebbd8be79dca07c73d7ff96f5e988d8b6995c8ba6156a74ecdb0084e543090704080ea3095dbb80835cdf9c5
-
Filesize
2.1MB
MD573b8936eeaa1cf084eeebc239d2f1191
SHA1877f4a79aacce7a8d6bf79a5db00115deb96e7fb
SHA256195dd0bf0d38c5becce794403bb15f718a721d0b5d727f1189b0af6f99d2023a
SHA512d780a75b48652e0fa178504293d0ca6cab51e48467aa2440e4e322c45b237077be2d166d2aba19a8bfb22e1e6ce96c2717eddc75f68cf0930a9b95049802c41e
-
Filesize
1.8MB
MD5272697bb30377100a590e594cf3bc65f
SHA11f3b36deb25f33e77f9cbaea68a4abd032b5f100
SHA256b1e76b910e0b1f6b56caa12d91514694ef5fc18443f331197ac81fede3250ac5
SHA512d8377180b05506f169a5d8281a0e589dc12bb5420ed36376a269bedd7605e8271af09aaf6f1379b05be7220b29940a05c27b466503c806446ea6db67acc3dd25
-
Filesize
2KB
MD590133b8985e844065f1a11cdf3d4b615
SHA139ab09b9ded69598127c41e415cc236b21387ce0
SHA25687aaee01669969d19163cbecf79eb8449d8d6b5302f331aeb5658a7c1567e159
SHA512989a8d22eb0a5779c44b8792b4f2d921bdea8c753ff5ea270c976bdc48cc35bc542d1866d8a54cfda1a069f894d5aa2c4913ff47ae8eebc1e3d9c71fd866dc7e
-
Filesize
605B
MD5ab9c3aa59352bc779de58f6ec38b3252
SHA184c3d9519a7dd46ddef4d35b678351fe980fcabf
SHA2567671cc281eadd6c79ccdcaad4f09a8028b18427db3829c8ff8ad9a2d431ab205
SHA512cbadb40679a2adc4ab95285f6902be0fa47cfd1cdb6a3dbdbdd8b7d19e5c4713a54d6b02f617839e869318359a22a6aefe0ab1197a94e57d6218b80ab835a22d
-
Filesize
11B
MD53fdd2635aa94921522af8186f3c3d736
SHA10fe63553e9f993c0cb2cb36b8cdcfba4f4a2650d
SHA25617ad78845c9c6a8e97a5bd14be56700a51ee85867c979ed6cf538e1fed82cf7c
SHA512ebdbeefbdc777937fce516a1cbd9af7c305fc242091d695ad919a27c98fac5b6b16b44130bdf97dbfd10561cce701180b1fbb303d848944c3b33b8a3c058653a
-
Filesize
20KB
MD5b86222a7a7c892164a3c96491905cde6
SHA11f740815147b4831a62f81c32c33737ffb5d3b5f
SHA256851f37b2cc863e6901d859c402d501275dd911ba29a04568a9486c9bc4aa954f
SHA512171b923a0484de6ba36b7ecb31e48d9e213a8232403f2029a4137166913bbfd08b4c5782933ce077f0ede7815ba37074c9c12e1883aca7809fa20fccb9f8de6f
-
Filesize
117KB
MD51d461686b0e32f2decb587c895a05402
SHA1a91882f1522d556ab463aaa6fafb82c4064a3218
SHA2566647c180d9d9c5daeb7a41cacc96ca6722e08bb4a43a04364d37406261dd9804
SHA5121f2df1ffd636900e012c65fe457ae5f1f1d7478baf1f0eac07ff9ace639e3483021af263f3d96bd084352f0c95b73f431565f9b73590e44b94a8cd800da82e3d
-
Filesize
203KB
MD5eddad4bc2b7e8c423deb9f2711fe653b
SHA17423ba67726bc90f96f42002c25f4a1f5334029b
SHA256793b3384751f12793d24cf769438aaa7bec47a6b0f22397e8588e83cb8fe4b61
SHA5123515a044950944f58e2989b32368749ffed52786dcaf03c10d49e96cbd0c13c6f9ac5bb1d136ebb0045801a7c10278ba91e945cf72a78c1c641149e9dc9e3b0f
-
Filesize
127B
MD562b72c444e576cfde9a8e48631a89d9d
SHA1eb8f92d0ea4177eb8a5523eeebf0c3ddb066f67d
SHA2568b6c11dcf984d6fdfa3f8f525a659e67baa1add9c61edfa04c0037a6fef5eaf2
SHA5123fe19b83d19f1f9a1eab7248e909927e3432778be6efc577a3aa381e9d10cb962f33fc0a7cbcc1384687d46a9bebc04a6a0b211946aaaa51ef62a9bc08ed3632
-
Filesize
100KB
MD5d94ce5eb6681d17a95dd88e3e7569d6e
SHA1bba1e13f0e92c4c24e1daca291d059c9f881f838
SHA25639161dbaea43f6207bbbf04e4f216d431358433886897b47bd53533290248afc
SHA512a7e9e1174ab2251f3f18289dcd58021278cc8fb18791fe0c12b3b110f2ed9c655bae8745000e09507b9ad7ac65346220ae358cf808bc884c2ab919b59eb7b81b
-
Filesize
16KB
MD5dd876be4e9872e217c37a887ad25d64b
SHA15bcc9ca6a415257f5f91ca8c5cd34f44e1c61edc
SHA2563910cb394199ee0798bc0ea6d656b5ffea2fdd173005e3b8fd69b26dd316d624
SHA51239277989e556861fc3bd7bf784ff93a808b0ac5ef06e43657e9390f3c85d23a5eb6a063d0edaf9f92ffaad7fcd90bf1808e76a869f68a00af11263b7f4dc0423
-
Filesize
24KB
MD573ac40b84626f9e00b8b10643b727aa8
SHA1e5aa99c371be66b8718ff79850c8d60fa3a7f745
SHA2565b69552987c4f1a18388cecbfcc7c5b20b9fd18bf78e9b002521854bc70f1825
SHA512df172517d3444054a76d69ce8a4a7d67f23656982cc498180bd37f71c98b001aa764b15dc0a8c0faa7d010663a0dc2c7b7cb744275e5a7b3594cc5493f46115c
-
Filesize
54KB
MD54b6f4f52de80f1a7890c9bd0a7cac5e3
SHA1e45efe29240c68452730fc32327eb3048a162e2d
SHA2562b0f0ef5f0b1421bac638768b590cf1824a8407b47bbcedb5eba48c736b61155
SHA512bd8930de68b070eb8e4d50665fd604e84f587f2dffc5bbbc5d96a70877ffcac8ddfc180449b3aa048acda698d98495c87a30adb88bb94d537135336636afbff4
-
Filesize
44KB
MD567f438f2751b91d09cef1cbbec20d514
SHA11edf4574f6e5f4063543cf834951624b176c1184
SHA256d3a0ab0b8b17406824061aba56c3045eb3d77353ff71a353aaa173b57cdc91e2
SHA5125f98d1420bac12d0fde20a57799be16f8eb6c59bc5c1a1629eb32b875f8e090fd1cddd06b8aeb3a904857f4740b240bbe120f7d85e20ab979a0138d644377891
-
C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C3948BE6E525B8A8CEE9FAC91C9E392_9B1AA3369F4D3E257D46E66245F1CC24
Filesize412B
MD563ef7b7191316c8499b60ae82bf616b7
SHA1683bf4d9deee3d3aa2dcfede7966abe470877840
SHA25637d4570136712382b4d3c8b9f3376bb0f63de8ab89e1041193e1e1d5dff35301
SHA5124466f5e25b264fca3cdf3d2637f59a856b7478a6f5c4c2f83c318a37fad65a7fd1a086f28fc6da38c1f72b4481c6af9233b9a192310c66cf29ebbe2a93838a0b
-
C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C3948BE6E525B8A8CEE9FAC91C9E392_9B1AA3369F4D3E257D46E66245F1CC24
Filesize412B
MD5e1d5c1307cf8c289b41bc9a05bc1b5c9
SHA16ff3dad2613cc80e76aa64f4f92b83489ed0d047
SHA256518c1708869316efa54b4d6394a72fff31f8c2cad1afe0e9c96932b77706a698
SHA5121dc8c7dd5d53b9d133c07f0ff09647638b8b83e31c6ab08da151256337dd660029901a73b853d6178788f93188d0c3e182841d79f00b9ffd7c424f6d2ffb9446
-
C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C3948BE6E525B8A8CEE9FAC91C9E392_9B1AA3369F4D3E257D46E66245F1CC24
Filesize412B
MD5bbf8d7ad0052c63a6b717d5c92f48dc2
SHA1e63a2a8cbfe5a1026132c2bbbe6789450be905a5
SHA2562ebab212e4107bfb922ec0715ab84f04c02f6215d38e3e37a9933033746c9861
SHA512dcec22d6fa65eb72d70873ad523592e6b2fa9f1fcf3e08ecee5b1536e20c1532a2613cbfda6ffd7b7ffab8e00ce94db5bac9bb2f703d8d380139bd621340f19f
-
C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C3948BE6E525B8A8CEE9FAC91C9E392_9B1AA3369F4D3E257D46E66245F1CC24
Filesize412B
MD519796a9330345f4964cfe248e911d0d1
SHA17d93573f2f5cd91a1b3bce8435a21a245bff58ae
SHA256ff666a9b4d8cff1a35b77ab7a0646c8ab9d61ded8a3ad6699649fbba33983782
SHA512f62a875b8ab5647bbc53e65e6fe347075963e4429ab6b74492fca9dd07bf694976a6df316d019ac73c1240340e96878729157751b072a2994e6671d1529adbd5
-
C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\60E31627FDA0A46932B0E5948949F2A5
Filesize182B
MD5637a7a388ca15154409c0291a9fad8ef
SHA1bc0ab93f3eeb92f0d9f307a19c2d25d57dc45b8f
SHA2564ae71b69661c4c59722d62abd56deef6dca7525ca432a65b24c881ca747a0ef8
SHA512856bfc7dd74f00eae494a332ee02dd203f5b4f601427af32a64bae22d35eeff7754c3ffb1153802543fff01a3561139824ef42cba14d66b0b92ee2224fd4c9a2
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Accessibility\2c68539db75e583ae627fdd72a15be71\Accessibility.ni.dll
Filesize25KB
MD5c8c7a383ceb4c4d1df55308ba44f75fd
SHA17a90edf7bd4488ec42efaabb51f5c9c3560db8e2
SHA25655588bf1f5b0979b2efb09a755d5c6827946040e0ff8a118d8003377c26d03d8
SHA512669b5adf2bdaa29449bd771cb5ee2aa5b48ea8bf67ab7a1b76ff8c31942bb4e39a86b7b8d173624538bd5ef8998976b6ace905894cf68f14c3da841520ee4fa9
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\DriversHQ.DriverDet#\3bfcce55de97152738a66877859c1363\DriversHQ.DriverDetective.ExceptionLogging.ni.dll
Filesize56KB
MD58c426cd1111ca715968baa6f3c20d5b4
SHA1542cd6ae984311c52a3aec22d88aa101ef8c3089
SHA256d8c1ba3d8cb4c67eabe795fd5bf9c801be906e55da397725eb3b5be92aa24c80
SHA51274b876d2b61ed02a79cd7eb87c830694875b03f885fd51d4dba9e657cf7dbc578feae1068c9b30542d5ccdb02f4c544a1900868151eba1338c658b7fa025d961
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\DriversHQ.DriverDet#\8924dca2abfa7b74361227e1d11db97b\DriversHQ.DriverDetective.Client.ni.exe
Filesize2.0MB
MD563869c7c406bf7e874fd62660ff3a66c
SHA178481c8b6a0c47d041286e244b498e126f5861fe
SHA2566249fd9d78fc99c5e4c958bcdd8e77886f7f66819bb4b42da3c4febadfaa367b
SHA512e9652d222788a1c7a843c5526fba4f417f37d09858a68f0a099ab9f33d76006c1eb1affadb9f9661088a7dd14313c5de23fd7482a7fed63eb8b15755027a619e
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\DriversHQ.DriverDet#\bbe8f048d023b57c8704ea140f310270\DriversHQ.DriverDetective.Common.ni.dll
Filesize97KB
MD54266ae638765c6427812ddd9c0575743
SHA1938b6a293b197b9608ed83c8535931c2e9ebd1c7
SHA2563e18410dc848be752d8fbc030fa8576a976bd6c789954aaec37409c9fe75f487
SHA5126b684bb017c19e5477dcea5a00002900ca036fbdd0580943ba047f22f87bc6dd655b59ebb4591317b7614f5e0961968c22f5392cad6ad44b980d5410195f4382
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\DriversHQ.DriverDet#\cbebc6699565f81ab6a71034b0f74f9d\DriversHQ.DriverDetective.Client.DirectX.ni.dll
Filesize47KB
MD59fc0bb859d3d486d247d1da5553d76b2
SHA1a236a86f65fd4cbed8eb1f01e773ad20cdb5a8ae
SHA256c22a711a61e7a114e1a8549145ebbc01d0d5306ef04484d9329a9af1999dba8e
SHA51246da7cf29b326f310589d5134de86c759cd77919035a7743a649a31eb65b032600406f9252cb88ed24a107803984530904dcd27d3dfa60545bc13ada21515f15
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\DriversHQ.DriverDet#\e667d3f667f0047a38c3557b045953ae\DriversHQ.DriverDetective.Client.Communication.ni.dll
Filesize175KB
MD53f5a4b97ea99cba7f41cf7a2ae241723
SHA122369f26900856eff4cc570b5a189acaa627c550
SHA256b5a1ae9659a65d37ebb1803b08ce32b654ddf2a7c0ea1a41712dc49a8a70938c
SHA512b6995480f7c1eecc678b7f8cf2d087ca675d1383dc16c5b9c670205f62da4b5659d2b68769d83a3bbc09cae89d494026a74ed6843307ee4894dbe426aef18ec4
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.Applicati#\1ef7a2d2113426ff5a9d19d7ae957b46\Microsoft.ApplicationBlocks.Updater.ni.dll
Filesize223KB
MD58f118267096a8bb4f3cd689d0b5c238f
SHA1e0fee601107b2a1b84f35c416afa6104a9292d1e
SHA2560e8e3785ab6c619bb411d4647bf4b275a2743fa14c9dcfa63763fc7904cdb25f
SHA51274f42730a643539d9228a5cb88b5d9eb802c588bd870390053d4661adb70f9a471dd3060e85bc973ccaff5cf1a55e70912f3c3e889a01f90b03f15fdad33dcf6
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.JScript\1235d1a10b2c1bccdf118819cb279c5f\Microsoft.JScript.ni.dll
Filesize2.2MB
MD5b37c20d91e5baff2d30b0d636a2c209c
SHA184483060e49c319714273dafbde20fb0d576867b
SHA256e2b7cde044da1dfdb4aeb3f225dbca6c53ae0524fb4b6cd49fea31521f2db5e9
SHA5122c3b6df4e0d354b73434b03065d8cc1706b224b027c03bc5e17614ffec0c6a79e3c02735d3099349130d2c0f3df7aaffbd5de0ac388dc8a5e7a49875f15d35d8
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.Practices#\718c348bda5740d0f31ace01d3ed8fcc\Microsoft.Practices.EnterpriseLibrary.Security.Cryptography.ni.dll
Filesize145KB
MD57a98e079fc8c7ff4c2d888f5b390bfe7
SHA1193a04c11a23415afa5cc9ed0deb1ca7752ef6ef
SHA256af55152e6327c4f5d6ae1d38dc3641d107e269fe9ab39a69b927cef8cadddbea
SHA512eff712e47c8eee7dbe8e52e05f4476c0c4df780689ce61966224a60ae9a807b904b243c208486032cabdb6a1fc7ff9cbd195706da008d84cb8114b184188cfb9
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.Practices#\7f1f8e6037d9bef7eec176bc32e5dd8c\Microsoft.Practices.EnterpriseLibrary.Common.ni.dll
Filesize301KB
MD5bb2dd9d6b6d3897c103227445f955e7a
SHA11140a4ebacc0928a6cd70b168d6a2ed5670b514b
SHA25695e99ef8ba60028d5a26fef4cd3bc0022f35a935635b212301680ed8a73a89ef
SHA51282521d395a813591a0e540cf46dd1f75508c68134052468988120107639def0f4e0c0cd5210b42eb453f30103cd1ac919d0f41aef74c80e83f95b67af0506683
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.Practices#\a2a5a0dfe6c6afb6e6bcf1bb16c5b970\Microsoft.Practices.ObjectBuilder.ni.dll
Filesize296KB
MD52e25e4c5aecc74b082376c4b5ecb4938
SHA1b3b0f44ba7ba728b4dc9fd262b871a0538c63b04
SHA25691bbd08c692038524c2f7b22884abc9a4892fb0b6da0e0e2073a25d7c4d5e554
SHA512ee711fa2689cee206aad004e1493631ef8dd6618593d5019fbff38a2af5b8cd39460928dbf15808185468ed7cb72cbf08ccaeb86d2189752556ba18c87535e71
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualC\574e82db6b0f08cfa6c354a8c530eee2\Microsoft.VisualC.ni.dll
Filesize15KB
MD501d23f6812fe23c0ce53c3fd1e1d1f34
SHA1943b6ad66eae548473d9e093a35290e421de7a7d
SHA25632a2b9d92ec3446635a6f9cb21acfb662ba5a1f1b5e725d6ec763438426a9962
SHA5127df32aa18e90d856e982c555d040e7ceabada7e127a927ac7962d6276079d3e1ab9a1e9a824c67b7a0805ed3c4015de41b9f6b133af956def360dd8485cb9e7e
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.Vsa\10e71e68c34b88d218ba4d0f66afcd97\Microsoft.Vsa.ni.dll
Filesize54KB
MD5ef7cf928defeb6d39276044d3d826d79
SHA18c7b0947f5c6ab529806e9f7cc7e3ebcfd433739
SHA25634d9d84e4beadaa8621973d2d3a0a0e86f65f0119c6495edc37ebb764cbdef24
SHA5123b5727d8d8b8d07de3d341f969e37c78287341c1af7df88d13988fc4a7a7ac142ad28e8f63980506b657f9208eb6b783e2179e08f5f5e33dd05c39108c9eb4bb
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Configuratio#\611ffd8fff7c0284ff774f1020615bfa\System.Configuration.Install.ni.dll
Filesize138KB
MD5e038d64d34bc584a554a6281edc8c228
SHA1ad4c9d87357531c1978ec5855023bd80a37a7895
SHA2563fe4993755e07639419a3905f331abb6dc156968c6f2e49bcd14156d6bf729e5
SHA512f09c55227ab5863d0688a53fef584266f690c60d1d16fec5e60f9561dd14862059a59778975a143fbc8725f61b173efdcad90f6b3e6636c20c72fc6a543e1385
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Configuration\50c39c809e312905339e9d74496ecd00\System.Configuration.ni.dll
Filesize955KB
MD54990dd6603ba3479ecc73fa52da8b155
SHA18bdc7e58144a9714537f7415ff14bd47b0b15f21
SHA25688d7bf86a81d78d6cc26e3e740cb2552b0daab107a6fe57ff29b3a8b4c765d01
SHA5127c5ab15c8c5dc5c210ec49a56b422a53fd648d805f4e6211ff0f66a81a78dc32f33d4f026f9d7b8b116eb3c0a6d5aafeed4749054b8238d14fb6258b27172dc7
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Data.OracleC#\0e0f9e36df1c27f4678f09942864c9af\System.Data.OracleClient.ni.dll
Filesize1.1MB
MD50ec47acd4f820931ab96d7ebc524e9ef
SHA17305e6b9de6dbcda8b0d9ec9aceb33f35181c03e
SHA2565d24f91ebb1824af1d1b61ec43d3d50f025678570b5bf3f873f41e0640e36dae
SHA51228f59fb366caf78afbe149c2a612b9aa618b2667b3f93da814f3b848dd17ca9490fd5154a1ca64a12d62033bbcd5be6b777a3b6861b9c7eb52fe1ab5796a8547
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Data.SqlXml\2bf6d78fa46125ef60dd084028ef4d8c\System.Data.SqlXml.ni.dll
Filesize2.4MB
MD5fd8567cee64f4ce0a2e379c07adfe6e3
SHA17f46520023013b7563004bd2dac830816029b9e3
SHA256e2db1ccf6218e8aef23603a2672348161351ece68b78f5e1b74301bf2a9f354f
SHA51235ec5d23548c8e6d367eba031c62b933b56cc269f917e726e74d2ff1c077a88e08bf76ba2a2122d7146fcb950ccf6765c99b4112e5ff11edbac5a6b855ea729b
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Data\eaae44035dbd83a24255786d2aa9eef1\System.Data.ni.dll
Filesize6.3MB
MD50e5ef58a5c1ef441d6203b9646569ae7
SHA165874e3a59eeec9bb8147e4f459a303de91c4100
SHA256548f3755733ca180ea1a4e7782dcbc17006922b80586e9208b413be95d2154da
SHA512a1537470ad190ffe22bbd08d330bf3123a9ab20fce35270588c0bd23dec475c8a64acea1c4872c47d6f3dfdaca42886890e05d8f822373fca0236fc5762089da
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Deployment\6a2516126ffd58d75fd9b63d965be6e3\System.Deployment.ni.dll
Filesize1.6MB
MD5858999ee084d930465c568a31bad0fc1
SHA19715cceab0b7341646d15000394924481a157c2d
SHA2569cd9d565f993759fd579bd153782d66332a6df9d4f38668fc0612d5fd6c3efbf
SHA5128348d3c78ec084f18a906d5a17a1bb169b4bd28fc31de413f0340cd12bc94427a23d410a81ae952bce5a5abe837f0210dae778d95ec8ec23098d204badc563d4
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Design\b345b1f734ea3aea3540caf55869215a\System.Design.ni.dll
Filesize10.2MB
MD529fe4a231b7fadd9b66a1b59e7876033
SHA1aa596d8d462dab324a10a812831d1bb7ede8adfc
SHA2567a1135452728669b1cb452c58a969a9c30f5e5cadc048d4b03a21f99adf6528d
SHA512c1e0195c546afb894d12f34b072c67e79bbe1f4dda500a7d821fb3d2010824f51d836794cd9484d4e2f1673486e5ab122cf88125cb2ac58a23f88207ed086514
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\System.DirectorySer#\16ebe8df2036040bf7b16fbb0b441d63\System.DirectoryServices.ni.dll
Filesize1.1MB
MD583549945235b83efb6078a1bb43a5ddc
SHA1eb3b8496948c891b07376222a058f7ed2f863799
SHA256f8cca9ed968d1f6244dda022faa84032e6ebec36168d4fb396ad8d01597f356a
SHA512e55e4baf49291b160f0dce9ef68ee1328496d3263a0469c4c65b7626d6f1a67fa2798f4b47d1991201743033c95421c83fc3ff836aca7b1e65c18bd073eb0f79
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\System.DirectorySer#\2d96546698256d818114d8a17215f513\System.DirectoryServices.Protocols.ni.dll
Filesize444KB
MD5ec4f188e5ea5045a76ec135a2b1871cf
SHA1e82130863879e52e9833aeb34e8a8d613d0926aa
SHA2567dddd2359338f8c5e8879d64c4a8583c930fa98b079fc6edad0e96e3d027cbcd
SHA51269cada3a6274863b524ee160848c99f2b0979b6e9ba5a205266604382cf5e3ae26277d216c1cb15302782fe15c84f3238ba98b0f0a1d15c054848c78da18df38
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Drawing.Desi#\30bacfb052519296a25d585d62d65f0e\System.Drawing.Design.ni.dll
Filesize203KB
MD5ad8de415732fcf19dcb2df89ddfe3159
SHA17ab07013e4d4a6f0a23e9571b1b175d9e65d7652
SHA2567aba2361cde5cf74436533f0da387b83c7e47ed254c2a92fdc9085445e20739e
SHA51281c8bc4af3bc9d0ce42f903f58456f411f6f5ac31cb569391c31cf5274181a618b2b01f086fc8e39bb24a763accf3c1e3660d4129ad40f53c968f83e5a9ecab5
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Drawing\14ad09938f3197fce462d47b2194bd45\System.Drawing.ni.dll
Filesize1.5MB
MD51777b41cb2741762a6fceefd99bba158
SHA13dd8eee460a20e52689a116103cfa3a43b159d19
SHA256a549546bdf9b32979033c151fe1ca370f2661570f4637d21138ac4ace369a73a
SHA512554322ba20e331bd96268842294f71acdbec70765d8c82c51d06c9261a4c284578b26af7efbeec4b072f1ea5b50514a6bcc290343fc12c87b1afa7597ec543f6
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\System.EnterpriseSe#\bd2663637d8b93a187e67959328f54fe\System.EnterpriseServices.ni.dll
Filesize613KB
MD50314d12a843f739fe5cd750fdff0289c
SHA161d925baf5f080132b62cafd3d1ff8a76ce6a477
SHA25690f1074270765c0908c6527ca8a86d4199b241e87f2dc5c84ada42c5d966776e
SHA512997a22727aae924fb467a057a484975d5b3b460f2070b5acfcbc86f8cb8a0d19ee682332d3aa3b2281c63eb7a91b98399ab5a64fc8476fba79d6c10adc5f458c
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Management\72c9cb72b835b7c30c4f78fe745aaf81\System.Management.ni.dll
Filesize1.0MB
MD54a00b10826c6299d6018d765185f8cda
SHA13e7403d0e7a4ea3eac6c44caf8ca175c61b1b223
SHA256417dec98ef88be4290ff79dc716552ff3546a1eef29b5c8efd21bdae514d98a1
SHA51242c1d6ce3a6a5fd584360a3c73b35dfa413ab64897a4f781f4eea0c961161e1ee1155d417ee67dc5b67aa22bf0645990937fd3087a2837692ca963e04c6afee4
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Runtime.Remo#\b7f272c19ef36ca26a6716b3ce65ba06\System.Runtime.Remoting.ni.dll
Filesize756KB
MD51ca868c0ac37fc6cff2e1ed835a38cd6
SHA134f7a8b37af4e35d7ee07eaaca4aa06422e739ff
SHA256d3e76742f3c6266a039769e51a4b5f419f5d016a1d68b70e8bb136bd2dd590e4
SHA512fcd95cbe91b768620c74c53b1cb5365ff40fde039a525835572322c48e3750e79a8920f797a32e709b4bea4cf6a77a65d5210cbc2e8e1b4363c3c0d22abb4f5d
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Runtime.Seri#\bfa1161e5e8a708ebafb06503d3ea591\System.Runtime.Serialization.Formatters.Soap.ni.dll
Filesize303KB
MD581116a8852efd011051d9891498970ad
SHA1784bdae7ec804a5757405287bd5e1b4a2817a730
SHA2568f8dd22755618fc224856a4a116f9434bac9aa3b1ad023fba70233f74d4a760e
SHA512f5e2b282c7ef29f91ea43e5f0c935315ca78663f0068e656c422ea622f4ff05150f6ff97764f39ce40246fb8e0f01f430ca3e23c7d15f87883180c18bd718e6c
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Security\6358a966b003f859eb24e6c49d3bb7fa\System.Security.ni.dll
Filesize705KB
MD59f33792c2dd85df9f6f356ac2761d5a9
SHA152236ee0a57ac0b135fa68e70adb8f1582b979a1
SHA256497a442b45d20a888bd7f57b2bd3b39867752b1304109a414ccca565f1bdd9eb
SHA5120d8d7ca85b6f68bb890391c0490bedf80efd2360fdc9e861038dedf5cff43519ec77ec6b7c5a9976f427d9690e2e94d96572b29f9fdffb4abe46d62c94a4458f
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\System.ServiceProce#\abc482a81715bf779d3138355f99283f\System.ServiceProcess.ni.dll
Filesize219KB
MD5594ecb1346fa642970e336852647a24b
SHA1296fb9e6aa2b62e58562397d0b815fe3b5593c2e
SHA256043568069f8dd1438c3d5f9e93f02329c25793e614dd39acf0ad1322e8175f9f
SHA512554fa415ea52a6250d1f0a40c6e905ce1c096114f6480d94fdb95716f3a1f9434a69e93383ebfd8dc8fe27cb54e668395c3d763847220fbaf9e663050736a7d0
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Transactions\391b0d05b44d909e89c784995e964aa1\System.Transactions.ni.dll
Filesize612KB
MD5cd0552ae9ef192595a77292a45b87e21
SHA129dc417a2547f08b2aa1b537e63429a12d88d662
SHA256b728af1b74b97e7ca828c7eaf297a100b384ad1d90df35304cd56a6e28580849
SHA512ed222c33ce9fb01be88430f63ca1fd6fd46d10d6df2573128497e8e9e493a6b328944edd66793da1f9151aea0b1a4e0d1c89e85260d3a6763584b2e872d18142
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Web.RegularE#\01d6f732622814b1e863a201924278f0\System.Web.RegularExpressions.ni.dll
Filesize248KB
MD51bafe0bd53dbe522e0a8a99937b00b54
SHA1872a705244b421c966500bf964d0302069d065f2
SHA25690c450b59896e2a0996cb3405e87ba053465ff26fe7a4099fc521398f282e796
SHA512147ed06e64e9d68501231ff6cc1ca8c1ce621f39be1c198e85ac172ab8d933cb2f0a6005eb24b1713b2a7cf24dac5744e68720a3728a810b80c79279fee0e423
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Web.Services\4c1da9372aeef07827689ca3afe5d28e\System.Web.Services.ni.dll
Filesize1.8MB
MD55584d2a9ef894cadfc271215e4fc84ff
SHA124cbddcd375c61708c43deeec5b0446257b535e6
SHA256985d5c5e0781573a6bcc50bef8eaa624303cee239b0ed8b6921f570d4e21b336
SHA51262f70cd7a6b5e1b3d5186349ff1b9033631df6e2647b4a036888c6486db7dd97ab52a54ce1d8d6803c0e95a36c595d0a93b5581ca35232a9832f079b1d5e56f7
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Web\e2dbd9e164bfad626e4b00b772242ecc\System.Web.ni.dll
Filesize11.4MB
MD52eaa2acb0b3adca1d5431bcf352ef222
SHA1513e01dbce727afa548f37aa7e4c1e3d30227cda
SHA2569df42ff477f9b36e0c2f116182239953c6476b9cc019a9ab4912294926108538
SHA512586d20cf97750ce83ce2417810fb036319fdd5e05a0f4318d2b704f8c46f40c63c92a3593198ffdd528b5a9cf70a1114bb81430f92263ba886e5ed1a21a7af65
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Windows.Forms\d0c47ad5e4d501b35e43a088535e589f\System.Windows.Forms.ni.dll
Filesize11.9MB
MD57504e4158cdca056f7b7ec0c2d99337e
SHA19a0feb906318f65d0be06d682ce191525124ad30
SHA2566f83ea368ba764c5f2832ba4975c0cb2ffc000708c1ecf603f3130016e39d142
SHA512ba4e9e2a1f0c9532787519620f1d714c5b27cb5eddb5513a137c284062ce15e7122ab37d07363a75567b9d2a849d0f64ffeaa997fa5ca9e3f9eb414ca8943128
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Xml\4e31e183cb14c0cb0ef25463997f7af9\System.Xml.ni.dll
Filesize5.2MB
MD5aadbe0249d57d7e9a3be8f38b2eefac5
SHA15c58bb8a226b7348dd2e066041a80472751cee00
SHA2561d669ecca4017e8be44b1dafb52155a77d5632acdda10ad94688abe5f06f6480
SHA512835c206b482c1610d70bcf1d60810c8eef696491eb9cc9d11ee411c6f98d53a9ae120edfe52ef0998541adee7bf1c286db0ff103cac7d68804dfff4a400b193f
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\XPBurnComponent\c539c932221bd8b325217120707a9d7c\XPBurnComponent.ni.dll
Filesize116KB
MD5f063138f6acd448e28bdf71b6bc247df
SHA140796c0c759793f86f69aa74cf317b172bf75495
SHA256f9595d87360d8909de0730d34656513c9c1259515dc4273f2ae5d6c1cd968bf7
SHA512459a1afebb677a19898cf143adc3428a5e1539ca6ca6a699841a7e8dbf42ccde88e526f90ec777d05bcc4e5a352b045c0f2fd20b35874e741d79e339c6866e7a