Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 08:29
Static task
static1
Behavioral task
behavioral1
Sample
62f9f615c051f0962ecb4878a80ad4bf74cc037394734dbe95106251bb6c8269N.exe
Resource
win7-20240903-en
General
-
Target
62f9f615c051f0962ecb4878a80ad4bf74cc037394734dbe95106251bb6c8269N.exe
-
Size
5.6MB
-
MD5
f2609071206e425f34040fbf6b285220
-
SHA1
67edd2081e77e937317f3abb664d1202530bd44c
-
SHA256
62f9f615c051f0962ecb4878a80ad4bf74cc037394734dbe95106251bb6c8269
-
SHA512
3d6a8678ce4c2406655d5f7f22065daffa00f883c832a84fedccb57961e998ec55c063908a44919b1183b6aba7859fb56cda35cc9f83cf3aabec7363f200a6ce
-
SSDEEP
98304:e5WW6KEdJxfpDVOMdq2668yIv1//nvkYCRThGXBJdicotUgwoAo5beyjwc305orj:K3vEbxfjf4Y8yofvktkLdurH5iycKg4
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
Processes:
alg.exeaspnet_state.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exeehRecvr.exeehsched.exeelevation_service.exemscorsvw.exeIEEtwCollector.exemscorsvw.exeGROOVE.EXEmaintenanceservice.exemscorsvw.exemsdtc.exemsiexec.exemscorsvw.exemscorsvw.exeOSE.EXEperfhost.exelocator.exemscorsvw.exesnmptrap.exemscorsvw.exevds.exemscorsvw.exevssvc.exewbengine.exemscorsvw.exeWmiApSrv.exemscorsvw.exewmpnetwk.exemscorsvw.exeSearchIndexer.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exepid Process 472 2848 alg.exe 2876 aspnet_state.exe 2304 mscorsvw.exe 2128 mscorsvw.exe 1196 mscorsvw.exe 1040 mscorsvw.exe 792 ehRecvr.exe 1588 ehsched.exe 2676 elevation_service.exe 444 mscorsvw.exe 2760 IEEtwCollector.exe 1680 mscorsvw.exe 2360 GROOVE.EXE 2244 maintenanceservice.exe 1000 mscorsvw.exe 2720 msdtc.exe 876 msiexec.exe 2796 mscorsvw.exe 2904 mscorsvw.exe 1276 OSE.EXE 776 perfhost.exe 1692 locator.exe 1996 mscorsvw.exe 2284 snmptrap.exe 1408 mscorsvw.exe 2660 vds.exe 2168 mscorsvw.exe 2988 vssvc.exe 1720 wbengine.exe 3068 mscorsvw.exe 944 WmiApSrv.exe 3064 mscorsvw.exe 1612 wmpnetwk.exe 580 mscorsvw.exe 316 SearchIndexer.exe 1900 mscorsvw.exe 1080 mscorsvw.exe 2092 mscorsvw.exe 2716 mscorsvw.exe 3132 mscorsvw.exe 3236 mscorsvw.exe 3384 mscorsvw.exe 3480 mscorsvw.exe 3596 mscorsvw.exe 3700 mscorsvw.exe 3796 mscorsvw.exe 3884 mscorsvw.exe 3976 mscorsvw.exe 4080 mscorsvw.exe 2544 mscorsvw.exe 3496 mscorsvw.exe 3448 mscorsvw.exe 3660 mscorsvw.exe 3760 mscorsvw.exe 3828 mscorsvw.exe 3964 mscorsvw.exe 1604 mscorsvw.exe 3164 mscorsvw.exe 2716 mscorsvw.exe 1596 mscorsvw.exe 1856 mscorsvw.exe 680 mscorsvw.exe 3036 mscorsvw.exe -
Loads dropped DLL 64 IoCs
Processes:
msiexec.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exepid Process 472 472 472 472 472 472 472 876 msiexec.exe 472 472 472 472 472 744 3760 mscorsvw.exe 3760 mscorsvw.exe 3964 mscorsvw.exe 3964 mscorsvw.exe 3164 mscorsvw.exe 3164 mscorsvw.exe 1596 mscorsvw.exe 1596 mscorsvw.exe 680 mscorsvw.exe 680 mscorsvw.exe 3524 mscorsvw.exe 3524 mscorsvw.exe 2068 mscorsvw.exe 2068 mscorsvw.exe 1488 mscorsvw.exe 1488 mscorsvw.exe 4072 mscorsvw.exe 4072 mscorsvw.exe 3040 mscorsvw.exe 3040 mscorsvw.exe 2080 mscorsvw.exe 2080 mscorsvw.exe 3544 mscorsvw.exe 3544 mscorsvw.exe 2436 mscorsvw.exe 2436 mscorsvw.exe 3948 mscorsvw.exe 3948 mscorsvw.exe 3196 mscorsvw.exe 3196 mscorsvw.exe 1176 mscorsvw.exe 1176 mscorsvw.exe 2436 mscorsvw.exe 2436 mscorsvw.exe 3864 mscorsvw.exe 3864 mscorsvw.exe 4048 mscorsvw.exe 4048 mscorsvw.exe 3064 mscorsvw.exe 3064 mscorsvw.exe 2516 mscorsvw.exe 2516 mscorsvw.exe 3900 mscorsvw.exe 3900 mscorsvw.exe 3828 mscorsvw.exe 3828 mscorsvw.exe 3040 mscorsvw.exe 3040 mscorsvw.exe 3580 mscorsvw.exe 3580 mscorsvw.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in System32 directory 23 IoCs
Processes:
62f9f615c051f0962ecb4878a80ad4bf74cc037394734dbe95106251bb6c8269N.exemscorsvw.exeSearchProtocolHost.exemsdtc.exeGROOVE.EXEalg.exedescription ioc Process File opened for modification C:\Windows\system32\locator.exe 62f9f615c051f0962ecb4878a80ad4bf74cc037394734dbe95106251bb6c8269N.exe File opened for modification C:\Windows\System32\snmptrap.exe 62f9f615c051f0962ecb4878a80ad4bf74cc037394734dbe95106251bb6c8269N.exe File opened for modification C:\Windows\system32\wbengine.exe 62f9f615c051f0962ecb4878a80ad4bf74cc037394734dbe95106251bb6c8269N.exe File opened for modification C:\Windows\system32\wbem\WmiApSrv.exe 62f9f615c051f0962ecb4878a80ad4bf74cc037394734dbe95106251bb6c8269N.exe File opened for modification C:\Windows\system32\SearchIndexer.exe 62f9f615c051f0962ecb4878a80ad4bf74cc037394734dbe95106251bb6c8269N.exe File opened for modification C:\Windows\system32\fxssvc.exe 62f9f615c051f0962ecb4878a80ad4bf74cc037394734dbe95106251bb6c8269N.exe File opened for modification C:\Windows\System32\msdtc.exe 62f9f615c051f0962ecb4878a80ad4bf74cc037394734dbe95106251bb6c8269N.exe File opened for modification C:\Windows\SysWow64\perfhost.exe 62f9f615c051f0962ecb4878a80ad4bf74cc037394734dbe95106251bb6c8269N.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7B2238AACCEDC3F1FFE8E7EB5F575EC9 mscorsvw.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat SearchProtocolHost.exe File opened for modification C:\Windows\system32\IEEtwCollector.exe 62f9f615c051f0962ecb4878a80ad4bf74cc037394734dbe95106251bb6c8269N.exe File opened for modification C:\Windows\system32\MSDtc\MSDTC.LOG msdtc.exe File opened for modification C:\Windows\System32\vds.exe 62f9f615c051f0962ecb4878a80ad4bf74cc037394734dbe95106251bb6c8269N.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat GROOVE.EXE File opened for modification C:\Windows\system32\msiexec.exe 62f9f615c051f0962ecb4878a80ad4bf74cc037394734dbe95106251bb6c8269N.exe File opened for modification C:\Windows\system32\vssvc.exe 62f9f615c051f0962ecb4878a80ad4bf74cc037394734dbe95106251bb6c8269N.exe File opened for modification C:\Windows\system32\fxssvc.exe alg.exe File opened for modification C:\Windows\system32\IEEtwCollector.exe alg.exe File opened for modification C:\Windows\System32\alg.exe 62f9f615c051f0962ecb4878a80ad4bf74cc037394734dbe95106251bb6c8269N.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Roaming\318ffc72cb22606b.bin alg.exe File opened for modification C:\Windows\system32\dllhost.exe 62f9f615c051f0962ecb4878a80ad4bf74cc037394734dbe95106251bb6c8269N.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7B2238AACCEDC3F1FFE8E7EB5F575EC9 mscorsvw.exe File opened for modification C:\Windows\system32\dllhost.exe alg.exe -
Drops file in Program Files directory 64 IoCs
Processes:
62f9f615c051f0962ecb4878a80ad4bf74cc037394734dbe95106251bb6c8269N.exealg.exemaintenanceservice.exedescription ioc Process File opened for modification C:\Program Files\DVD Maker\DVDMaker.exe 62f9f615c051f0962ecb4878a80ad4bf74cc037394734dbe95106251bb6c8269N.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\klist.exe 62f9f615c051f0962ecb4878a80ad4bf74cc037394734dbe95106251bb6c8269N.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe alg.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jhat.exe alg.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\tnameserv.exe alg.exe File opened for modification C:\Program Files\Java\jre7\bin\keytool.exe alg.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\TextConv\WksConv\Wkconv.exe alg.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\DW\DWTRIG20.EXE 62f9f615c051f0962ecb4878a80ad4bf74cc037394734dbe95106251bb6c8269N.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\policytool.exe alg.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\Adobe AIR Application Installer.exe alg.exe File created C:\Program Files (x86)\Mozilla Maintenance Service\logs\maintenanceservice.log maintenanceservice.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\javacpl.exe 62f9f615c051f0962ecb4878a80ad4bf74cc037394734dbe95106251bb6c8269N.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Smart Tag\SmartTagInstall.exe 62f9f615c051f0962ecb4878a80ad4bf74cc037394734dbe95106251bb6c8269N.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javaw.exe alg.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Updater6\Adobe_Updater.exe alg.exe File opened for modification C:\Program Files\Internet Explorer\iediagcmd.exe 62f9f615c051f0962ecb4878a80ad4bf74cc037394734dbe95106251bb6c8269N.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\tnameserv.exe 62f9f615c051f0962ecb4878a80ad4bf74cc037394734dbe95106251bb6c8269N.exe File opened for modification C:\Program Files\Java\jre7\bin\kinit.exe 62f9f615c051f0962ecb4878a80ad4bf74cc037394734dbe95106251bb6c8269N.exe File opened for modification C:\Program Files (x86)\Google\Update\DisabledGoogleUpdate.exe 62f9f615c051f0962ecb4878a80ad4bf74cc037394734dbe95106251bb6c8269N.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\pack200.exe alg.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Setup.exe alg.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jmap.exe 62f9f615c051f0962ecb4878a80ad4bf74cc037394734dbe95106251bb6c8269N.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\ssvagent.exe alg.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\ODeploy.exe alg.exe File opened for modification C:\Program Files\Mozilla Firefox\plugin-container.exe 62f9f615c051f0962ecb4878a80ad4bf74cc037394734dbe95106251bb6c8269N.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\keytool.exe alg.exe File opened for modification C:\Program Files\Java\jre7\bin\javaws.exe alg.exe File opened for modification C:\Program Files\Java\jre7\bin\orbd.exe alg.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\FLTLDR.EXE alg.exe File opened for modification C:\Program Files (x86)\Internet Explorer\ielowutil.exe alg.exe File opened for modification C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe 62f9f615c051f0962ecb4878a80ad4bf74cc037394734dbe95106251bb6c8269N.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jvisualvm.exe 62f9f615c051f0962ecb4878a80ad4bf74cc037394734dbe95106251bb6c8269N.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\DW\DW20.EXE 62f9f615c051f0962ecb4878a80ad4bf74cc037394734dbe95106251bb6c8269N.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jstat.exe alg.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\java.exe alg.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\launcher.exe 62f9f615c051f0962ecb4878a80ad4bf74cc037394734dbe95106251bb6c8269N.exe File opened for modification C:\Program Files\Java\jre7\bin\javacpl.exe 62f9f615c051f0962ecb4878a80ad4bf74cc037394734dbe95106251bb6c8269N.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe alg.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\javaw.exe alg.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jar.exe 62f9f615c051f0962ecb4878a80ad4bf74cc037394734dbe95106251bb6c8269N.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VSTA\8.0\x86\vsta_ep32.exe 62f9f615c051f0962ecb4878a80ad4bf74cc037394734dbe95106251bb6c8269N.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\EQUATION\EQNEDT32.EXE alg.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jcmd.exe 62f9f615c051f0962ecb4878a80ad4bf74cc037394734dbe95106251bb6c8269N.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jrunscript.exe 62f9f615c051f0962ecb4878a80ad4bf74cc037394734dbe95106251bb6c8269N.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\airappinstaller.exe 62f9f615c051f0962ecb4878a80ad4bf74cc037394734dbe95106251bb6c8269N.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\mip.exe alg.exe File opened for modification C:\Program Files (x86)\Google\Update\Download\{8A69D345-D564-463C-AFF1-A69D9E530F96}\106.0.5249.119\chrome_installer.exe alg.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\ktab.exe 62f9f615c051f0962ecb4878a80ad4bf74cc037394734dbe95106251bb6c8269N.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\TabTip32.exe 62f9f615c051f0962ecb4878a80ad4bf74cc037394734dbe95106251bb6c8269N.exe File opened for modification C:\Program Files\Mozilla Firefox\minidump-analyzer.exe alg.exe File opened for modification C:\Program Files (x86)\Google\Update\DisabledGoogleUpdate.exe alg.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\chrmstp.exe 62f9f615c051f0962ecb4878a80ad4bf74cc037394734dbe95106251bb6c8269N.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jmc.exe 62f9f615c051f0962ecb4878a80ad4bf74cc037394734dbe95106251bb6c8269N.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\orbd.exe 62f9f615c051f0962ecb4878a80ad4bf74cc037394734dbe95106251bb6c8269N.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\rmic.exe 62f9f615c051f0962ecb4878a80ad4bf74cc037394734dbe95106251bb6c8269N.exe File opened for modification C:\Program Files\Java\jre7\bin\ktab.exe 62f9f615c051f0962ecb4878a80ad4bf74cc037394734dbe95106251bb6c8269N.exe File opened for modification C:\Program Files (x86)\Internet Explorer\iexplore.exe 62f9f615c051f0962ecb4878a80ad4bf74cc037394734dbe95106251bb6c8269N.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jconsole.exe alg.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\servertool.exe alg.exe File opened for modification C:\Program Files\Java\jre7\bin\rmiregistry.exe alg.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroTextExtractor.exe alg.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\jabswitch.exe 62f9f615c051f0962ecb4878a80ad4bf74cc037394734dbe95106251bb6c8269N.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jmc.exe alg.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\lib\nbexec64.exe alg.exe -
Drops file in Windows directory 64 IoCs
Processes:
mscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exealg.exemscorsvw.exemsdtc.exe62f9f615c051f0962ecb4878a80ad4bf74cc037394734dbe95106251bb6c8269N.exemscorsvw.exemscorsvw.exedescription ioc Process File created C:\Windows\assembly\NativeImages_v2.0.50727_64\index146.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index153.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index154.dat mscorsvw.exe File created C:\Windows\assembly\GACLock.dat mscorsvw.exe File created C:\Windows\assembly\GACLock.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\index15c.dat mscorsvw.exe File created C:\Windows\assembly\GACLock.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index155.dat mscorsvw.exe File created C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngenrootstorelock.dat mscorsvw.exe File created C:\Windows\Microsoft.NET\ngennicupdatelock.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index144.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index14c.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index151.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index158.dat mscorsvw.exe File created C:\Windows\assembly\ngenlock.dat mscorsvw.exe File created C:\Windows\assembly\ngenlock.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\index159.dat mscorsvw.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ngen_service.lock mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index145.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\Temp\ZAPCFEC.tmp\Microsoft.VisualStudio.Tools.Office.Excel.AddInAdapter.v9.0.dll mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\Temp\ZAPD7F8.tmp\Microsoft.VisualStudio.Tools.Office.Contract.v9.0.dll mscorsvw.exe File created C:\Windows\assembly\ngenlock.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index15a.dat mscorsvw.exe File created C:\Windows\assembly\ngenlock.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\index149.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\Temp\ZAPD643.tmp\Microsoft.VisualStudio.Tools.Applications.Contract.v9.0.dll mscorsvw.exe File created C:\Windows\assembly\GACLock.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\index152.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\index157.dat mscorsvw.exe File created C:\Windows\Microsoft.NET\ngennicupdatelock.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\Temp\ZAP1FE0.tmp\Microsoft.VisualStudio.Tools.Applications.AddInAdapter.v10.0.dll mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index15f.dat mscorsvw.exe File created C:\Windows\assembly\ngenlock.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index159.dat mscorsvw.exe File opened for modification C:\Windows\ehome\ehRecvr.exe alg.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\index14e.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index153.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index157.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index15d.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index156.dat mscorsvw.exe File created C:\Windows\assembly\GACLock.dat mscorsvw.exe File created C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngenservicelock.dat mscorsvw.exe File opened for modification C:\Windows\DtcInstall.log msdtc.exe File opened for modification C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe alg.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index159.dat mscorsvw.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe 62f9f615c051f0962ecb4878a80ad4bf74cc037394734dbe95106251bb6c8269N.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index156.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index156.dat mscorsvw.exe File created C:\Windows\Microsoft.NET\ngenservice_pri1_lock.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index144.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\Temp\ZAPD337.tmp\Microsoft.VisualStudio.Tools.Applications.Runtime.v10.0.dll mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\Temp\ZAP1B9C.tmp\Microsoft.VisualStudio.Tools.Applications.Adapter.v9.0.dll mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\index148.dat mscorsvw.exe File created C:\Windows\assembly\ngenlock.dat mscorsvw.exe File created C:\Windows\assembly\ngenlock.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\Temp\ZAPDC2C.tmp\Microsoft.VisualStudio.Tools.Office.HostAdapter.v10.0.dll mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index14f.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index150.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\Temp\ZAP4B2.tmp\Microsoft.Office.Tools.Common.v9.0.dll mscorsvw.exe File created C:\Windows\Microsoft.NET\ngenservice_pri3_lock.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\Temp\ZAPCCE0.tmp\Microsoft.VisualStudio.Tools.Applications.AddInAdapter.v9.0.dll mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index146.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\index154.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index147.dat mscorsvw.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 30 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
mscorsvw.exe62f9f615c051f0962ecb4878a80ad4bf74cc037394734dbe95106251bb6c8269N.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exe62f9f615c051f0962ecb4878a80ad4bf74cc037394734dbe95106251bb6c8269N.exe62f9f615c051f0962ecb4878a80ad4bf74cc037394734dbe95106251bb6c8269N.exeGROOVE.EXEmscorsvw.exemscorsvw.exeOSE.EXEmscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exemscorsvw.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscorsvw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 62f9f615c051f0962ecb4878a80ad4bf74cc037394734dbe95106251bb6c8269N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscorsvw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscorsvw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscorsvw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscorsvw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscorsvw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscorsvw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscorsvw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscorsvw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscorsvw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscorsvw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscorsvw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscorsvw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscorsvw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscorsvw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscorsvw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscorsvw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscorsvw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 62f9f615c051f0962ecb4878a80ad4bf74cc037394734dbe95106251bb6c8269N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 62f9f615c051f0962ecb4878a80ad4bf74cc037394734dbe95106251bb6c8269N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GROOVE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscorsvw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscorsvw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language OSE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscorsvw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscorsvw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscorsvw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscorsvw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscorsvw.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
62f9f615c051f0962ecb4878a80ad4bf74cc037394734dbe95106251bb6c8269N.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 62f9f615c051f0962ecb4878a80ad4bf74cc037394734dbe95106251bb6c8269N.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 62f9f615c051f0962ecb4878a80ad4bf74cc037394734dbe95106251bb6c8269N.exe -
Modifies data under HKEY_USERS 64 IoCs
Processes:
mscorsvw.exeSearchProtocolHost.exemscorsvw.exemscorsvw.exemscorsvw.exeSearchIndexer.exemscorsvw.exemscorsvw.exewmpnetwk.exemscorsvw.exeehRecvr.exemscorsvw.exemscorsvw.exeehRec.exeSearchFilterHost.exedescription ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\Certificates mscorsvw.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%windir%\system32\mblctr.exe,-1004 = "Opens the Windows Mobility Center so you can adjust display brightness, volume, power options, and other mobile PC settings." SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\Certificates mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\Certificates mscorsvw.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\system32\NetProjW.dll,-501 = "Connect to a Network Projector" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@gameux.dll,-10102 = "Internet Backgammon" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CTLs mscorsvw.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32,@elscore.dll,-3 = "Microsoft Traditional Chinese to Simplified Chinese Transliteration" SearchIndexer.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\system32\gameux.dll,-10102 = "Internet Backgammon" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\Certificates mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\Certificates mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\MediaPlayer\Preferences\ wmpnetwk.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{80009818-F38F-4AF1-87B5-EADAB9433E58} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 010000000000000090c49d96ef3bdb01 SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\system32\migwiz\wet.dll,-588 = "Windows Easy Transfer" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\Certificates mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CTLs mscorsvw.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\system32\cabview.dll,-20 = "Cabinet File" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\Certificates mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\ActiveMovie ehRecvr.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\system32\odbcint.dll,-1310 = "Data Sources (ODBC)" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\Certificates mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CRLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CRLs mscorsvw.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\System32\SyncCenter.dll,-3000 = "Sync Center" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\system32\iscsicpl.dll,-5001 = "iSCSI Initiator" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\Certificates mscorsvw.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\system32\pmcsnap.dll,-700 = "Print Management" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\Certificates mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CRLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CRLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CRLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root mscorsvw.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE\SAL\CacheLongPageCount = "32" ehRec.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CRLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\Certificates mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CRLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\Certificates mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\Certificates mscorsvw.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\System32\wshext.dll,-4804 = "JScript Script File" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@gameux.dll,-10059 = "Mahjong Titans" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates mscorsvw.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\gameux.dll,-10305 = "Hearts is a trick-based card game in which the goal is to get rid of cards while avoiding points. The player with the lowest number of points wins." SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\system32\gameux.dll,-10054 = "Chess Titans" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CRLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CRLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CTLs mscorsvw.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE\SAL\FileGrowthQuantumSeconds = "180" ehRec.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%systemroot%\system32\Filemgmt.dll,-602 = "Starts, stops, and configures Windows services." SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\system32\gameux.dll,-10101 = "Internet Checkers" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CRLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CTLs mscorsvw.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE\SAL\CacheShortPageCount = "64" ehRec.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft SearchFilterHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed mscorsvw.exe -
Suspicious behavior: EnumeratesProcesses 27 IoCs
Processes:
62f9f615c051f0962ecb4878a80ad4bf74cc037394734dbe95106251bb6c8269N.exeehRec.exe62f9f615c051f0962ecb4878a80ad4bf74cc037394734dbe95106251bb6c8269N.exepid Process 2712 62f9f615c051f0962ecb4878a80ad4bf74cc037394734dbe95106251bb6c8269N.exe 2544 ehRec.exe 2196 62f9f615c051f0962ecb4878a80ad4bf74cc037394734dbe95106251bb6c8269N.exe 2196 62f9f615c051f0962ecb4878a80ad4bf74cc037394734dbe95106251bb6c8269N.exe 2196 62f9f615c051f0962ecb4878a80ad4bf74cc037394734dbe95106251bb6c8269N.exe 2196 62f9f615c051f0962ecb4878a80ad4bf74cc037394734dbe95106251bb6c8269N.exe 2196 62f9f615c051f0962ecb4878a80ad4bf74cc037394734dbe95106251bb6c8269N.exe 2196 62f9f615c051f0962ecb4878a80ad4bf74cc037394734dbe95106251bb6c8269N.exe 2196 62f9f615c051f0962ecb4878a80ad4bf74cc037394734dbe95106251bb6c8269N.exe 2196 62f9f615c051f0962ecb4878a80ad4bf74cc037394734dbe95106251bb6c8269N.exe 2196 62f9f615c051f0962ecb4878a80ad4bf74cc037394734dbe95106251bb6c8269N.exe 2196 62f9f615c051f0962ecb4878a80ad4bf74cc037394734dbe95106251bb6c8269N.exe 2196 62f9f615c051f0962ecb4878a80ad4bf74cc037394734dbe95106251bb6c8269N.exe 2196 62f9f615c051f0962ecb4878a80ad4bf74cc037394734dbe95106251bb6c8269N.exe 2196 62f9f615c051f0962ecb4878a80ad4bf74cc037394734dbe95106251bb6c8269N.exe 2196 62f9f615c051f0962ecb4878a80ad4bf74cc037394734dbe95106251bb6c8269N.exe 2196 62f9f615c051f0962ecb4878a80ad4bf74cc037394734dbe95106251bb6c8269N.exe 2196 62f9f615c051f0962ecb4878a80ad4bf74cc037394734dbe95106251bb6c8269N.exe 2196 62f9f615c051f0962ecb4878a80ad4bf74cc037394734dbe95106251bb6c8269N.exe 2196 62f9f615c051f0962ecb4878a80ad4bf74cc037394734dbe95106251bb6c8269N.exe 2196 62f9f615c051f0962ecb4878a80ad4bf74cc037394734dbe95106251bb6c8269N.exe 2196 62f9f615c051f0962ecb4878a80ad4bf74cc037394734dbe95106251bb6c8269N.exe 2196 62f9f615c051f0962ecb4878a80ad4bf74cc037394734dbe95106251bb6c8269N.exe 2196 62f9f615c051f0962ecb4878a80ad4bf74cc037394734dbe95106251bb6c8269N.exe 2196 62f9f615c051f0962ecb4878a80ad4bf74cc037394734dbe95106251bb6c8269N.exe 2196 62f9f615c051f0962ecb4878a80ad4bf74cc037394734dbe95106251bb6c8269N.exe 2196 62f9f615c051f0962ecb4878a80ad4bf74cc037394734dbe95106251bb6c8269N.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
62f9f615c051f0962ecb4878a80ad4bf74cc037394734dbe95106251bb6c8269N.exemscorsvw.exemscorsvw.exeEhTray.exeehRec.exemsiexec.exevssvc.exewbengine.exewmpnetwk.exeSearchIndexer.exealg.exedescription pid Process Token: SeTakeOwnershipPrivilege 2196 62f9f615c051f0962ecb4878a80ad4bf74cc037394734dbe95106251bb6c8269N.exe Token: SeShutdownPrivilege 1040 mscorsvw.exe Token: SeShutdownPrivilege 1196 mscorsvw.exe Token: 33 1784 EhTray.exe Token: SeIncBasePriorityPrivilege 1784 EhTray.exe Token: SeShutdownPrivilege 1040 mscorsvw.exe Token: SeShutdownPrivilege 1196 mscorsvw.exe Token: SeShutdownPrivilege 1040 mscorsvw.exe Token: SeShutdownPrivilege 1196 mscorsvw.exe Token: SeShutdownPrivilege 1040 mscorsvw.exe Token: SeShutdownPrivilege 1196 mscorsvw.exe Token: SeDebugPrivilege 2544 ehRec.exe Token: SeShutdownPrivilege 1040 mscorsvw.exe Token: 33 1784 EhTray.exe Token: SeIncBasePriorityPrivilege 1784 EhTray.exe Token: SeRestorePrivilege 876 msiexec.exe Token: SeTakeOwnershipPrivilege 876 msiexec.exe Token: SeSecurityPrivilege 876 msiexec.exe Token: SeBackupPrivilege 2988 vssvc.exe Token: SeRestorePrivilege 2988 vssvc.exe Token: SeAuditPrivilege 2988 vssvc.exe Token: SeBackupPrivilege 1720 wbengine.exe Token: SeRestorePrivilege 1720 wbengine.exe Token: SeSecurityPrivilege 1720 wbengine.exe Token: 33 1612 wmpnetwk.exe Token: SeIncBasePriorityPrivilege 1612 wmpnetwk.exe Token: SeManageVolumePrivilege 316 SearchIndexer.exe Token: 33 316 SearchIndexer.exe Token: SeIncBasePriorityPrivilege 316 SearchIndexer.exe Token: SeShutdownPrivilege 1196 mscorsvw.exe Token: SeDebugPrivilege 2196 62f9f615c051f0962ecb4878a80ad4bf74cc037394734dbe95106251bb6c8269N.exe Token: SeDebugPrivilege 2196 62f9f615c051f0962ecb4878a80ad4bf74cc037394734dbe95106251bb6c8269N.exe Token: SeDebugPrivilege 2196 62f9f615c051f0962ecb4878a80ad4bf74cc037394734dbe95106251bb6c8269N.exe Token: SeDebugPrivilege 2196 62f9f615c051f0962ecb4878a80ad4bf74cc037394734dbe95106251bb6c8269N.exe Token: SeDebugPrivilege 2196 62f9f615c051f0962ecb4878a80ad4bf74cc037394734dbe95106251bb6c8269N.exe Token: SeShutdownPrivilege 1040 mscorsvw.exe Token: SeShutdownPrivilege 1196 mscorsvw.exe Token: SeDebugPrivilege 2848 alg.exe Token: SeShutdownPrivilege 1040 mscorsvw.exe Token: SeShutdownPrivilege 1040 mscorsvw.exe Token: SeShutdownPrivilege 1040 mscorsvw.exe Token: SeShutdownPrivilege 1040 mscorsvw.exe Token: SeShutdownPrivilege 1040 mscorsvw.exe Token: SeShutdownPrivilege 1040 mscorsvw.exe Token: SeShutdownPrivilege 1040 mscorsvw.exe Token: SeShutdownPrivilege 1196 mscorsvw.exe Token: SeShutdownPrivilege 1196 mscorsvw.exe Token: SeShutdownPrivilege 1196 mscorsvw.exe Token: SeShutdownPrivilege 1040 mscorsvw.exe Token: SeShutdownPrivilege 1196 mscorsvw.exe Token: SeShutdownPrivilege 1040 mscorsvw.exe Token: SeShutdownPrivilege 1196 mscorsvw.exe Token: SeShutdownPrivilege 1040 mscorsvw.exe Token: SeShutdownPrivilege 1196 mscorsvw.exe Token: SeShutdownPrivilege 1040 mscorsvw.exe Token: SeShutdownPrivilege 1196 mscorsvw.exe Token: SeShutdownPrivilege 1040 mscorsvw.exe Token: SeShutdownPrivilege 1196 mscorsvw.exe Token: SeShutdownPrivilege 1040 mscorsvw.exe Token: SeShutdownPrivilege 1196 mscorsvw.exe Token: SeShutdownPrivilege 1040 mscorsvw.exe Token: SeShutdownPrivilege 1196 mscorsvw.exe Token: SeShutdownPrivilege 1040 mscorsvw.exe Token: SeShutdownPrivilege 1196 mscorsvw.exe -
Suspicious use of FindShellTrayWindow 5 IoCs
Processes:
62f9f615c051f0962ecb4878a80ad4bf74cc037394734dbe95106251bb6c8269N.exeEhTray.exepid Process 1624 62f9f615c051f0962ecb4878a80ad4bf74cc037394734dbe95106251bb6c8269N.exe 1624 62f9f615c051f0962ecb4878a80ad4bf74cc037394734dbe95106251bb6c8269N.exe 1624 62f9f615c051f0962ecb4878a80ad4bf74cc037394734dbe95106251bb6c8269N.exe 1784 EhTray.exe 1784 EhTray.exe -
Suspicious use of SendNotifyMessage 5 IoCs
Processes:
62f9f615c051f0962ecb4878a80ad4bf74cc037394734dbe95106251bb6c8269N.exeEhTray.exepid Process 1624 62f9f615c051f0962ecb4878a80ad4bf74cc037394734dbe95106251bb6c8269N.exe 1624 62f9f615c051f0962ecb4878a80ad4bf74cc037394734dbe95106251bb6c8269N.exe 1624 62f9f615c051f0962ecb4878a80ad4bf74cc037394734dbe95106251bb6c8269N.exe 1784 EhTray.exe 1784 EhTray.exe -
Suspicious use of SetWindowsHookEx 17 IoCs
Processes:
SearchProtocolHost.exepid Process 2928 SearchProtocolHost.exe 2928 SearchProtocolHost.exe 2928 SearchProtocolHost.exe 2928 SearchProtocolHost.exe 2928 SearchProtocolHost.exe 2928 SearchProtocolHost.exe 2928 SearchProtocolHost.exe 2928 SearchProtocolHost.exe 2928 SearchProtocolHost.exe 2928 SearchProtocolHost.exe 2928 SearchProtocolHost.exe 2928 SearchProtocolHost.exe 2928 SearchProtocolHost.exe 2928 SearchProtocolHost.exe 2928 SearchProtocolHost.exe 2928 SearchProtocolHost.exe 2928 SearchProtocolHost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
62f9f615c051f0962ecb4878a80ad4bf74cc037394734dbe95106251bb6c8269N.exemscorsvw.exemscorsvw.exeSearchIndexer.exedescription pid Process procid_target PID 2196 wrote to memory of 2712 2196 62f9f615c051f0962ecb4878a80ad4bf74cc037394734dbe95106251bb6c8269N.exe 32 PID 2196 wrote to memory of 2712 2196 62f9f615c051f0962ecb4878a80ad4bf74cc037394734dbe95106251bb6c8269N.exe 32 PID 2196 wrote to memory of 2712 2196 62f9f615c051f0962ecb4878a80ad4bf74cc037394734dbe95106251bb6c8269N.exe 32 PID 2196 wrote to memory of 2712 2196 62f9f615c051f0962ecb4878a80ad4bf74cc037394734dbe95106251bb6c8269N.exe 32 PID 2196 wrote to memory of 1624 2196 62f9f615c051f0962ecb4878a80ad4bf74cc037394734dbe95106251bb6c8269N.exe 33 PID 2196 wrote to memory of 1624 2196 62f9f615c051f0962ecb4878a80ad4bf74cc037394734dbe95106251bb6c8269N.exe 33 PID 2196 wrote to memory of 1624 2196 62f9f615c051f0962ecb4878a80ad4bf74cc037394734dbe95106251bb6c8269N.exe 33 PID 2196 wrote to memory of 1624 2196 62f9f615c051f0962ecb4878a80ad4bf74cc037394734dbe95106251bb6c8269N.exe 33 PID 1040 wrote to memory of 444 1040 mscorsvw.exe 45 PID 1040 wrote to memory of 444 1040 mscorsvw.exe 45 PID 1040 wrote to memory of 444 1040 mscorsvw.exe 45 PID 1040 wrote to memory of 1680 1040 mscorsvw.exe 46 PID 1040 wrote to memory of 1680 1040 mscorsvw.exe 46 PID 1040 wrote to memory of 1680 1040 mscorsvw.exe 46 PID 1196 wrote to memory of 1000 1196 mscorsvw.exe 49 PID 1196 wrote to memory of 1000 1196 mscorsvw.exe 49 PID 1196 wrote to memory of 1000 1196 mscorsvw.exe 49 PID 1196 wrote to memory of 1000 1196 mscorsvw.exe 49 PID 1196 wrote to memory of 2796 1196 mscorsvw.exe 52 PID 1196 wrote to memory of 2796 1196 mscorsvw.exe 52 PID 1196 wrote to memory of 2796 1196 mscorsvw.exe 52 PID 1196 wrote to memory of 2796 1196 mscorsvw.exe 52 PID 1196 wrote to memory of 2904 1196 mscorsvw.exe 53 PID 1196 wrote to memory of 2904 1196 mscorsvw.exe 53 PID 1196 wrote to memory of 2904 1196 mscorsvw.exe 53 PID 1196 wrote to memory of 2904 1196 mscorsvw.exe 53 PID 1196 wrote to memory of 1996 1196 mscorsvw.exe 57 PID 1196 wrote to memory of 1996 1196 mscorsvw.exe 57 PID 1196 wrote to memory of 1996 1196 mscorsvw.exe 57 PID 1196 wrote to memory of 1996 1196 mscorsvw.exe 57 PID 1196 wrote to memory of 1408 1196 mscorsvw.exe 59 PID 1196 wrote to memory of 1408 1196 mscorsvw.exe 59 PID 1196 wrote to memory of 1408 1196 mscorsvw.exe 59 PID 1196 wrote to memory of 1408 1196 mscorsvw.exe 59 PID 1196 wrote to memory of 2168 1196 mscorsvw.exe 61 PID 1196 wrote to memory of 2168 1196 mscorsvw.exe 61 PID 1196 wrote to memory of 2168 1196 mscorsvw.exe 61 PID 1196 wrote to memory of 2168 1196 mscorsvw.exe 61 PID 1196 wrote to memory of 3068 1196 mscorsvw.exe 64 PID 1196 wrote to memory of 3068 1196 mscorsvw.exe 64 PID 1196 wrote to memory of 3068 1196 mscorsvw.exe 64 PID 1196 wrote to memory of 3068 1196 mscorsvw.exe 64 PID 1196 wrote to memory of 3064 1196 mscorsvw.exe 66 PID 1196 wrote to memory of 3064 1196 mscorsvw.exe 66 PID 1196 wrote to memory of 3064 1196 mscorsvw.exe 66 PID 1196 wrote to memory of 3064 1196 mscorsvw.exe 66 PID 1196 wrote to memory of 580 1196 mscorsvw.exe 69 PID 1196 wrote to memory of 580 1196 mscorsvw.exe 69 PID 1196 wrote to memory of 580 1196 mscorsvw.exe 69 PID 1196 wrote to memory of 580 1196 mscorsvw.exe 69 PID 1196 wrote to memory of 1900 1196 mscorsvw.exe 70 PID 1196 wrote to memory of 1900 1196 mscorsvw.exe 70 PID 1196 wrote to memory of 1900 1196 mscorsvw.exe 70 PID 1196 wrote to memory of 1900 1196 mscorsvw.exe 70 PID 1196 wrote to memory of 1080 1196 mscorsvw.exe 71 PID 1196 wrote to memory of 1080 1196 mscorsvw.exe 71 PID 1196 wrote to memory of 1080 1196 mscorsvw.exe 71 PID 1196 wrote to memory of 1080 1196 mscorsvw.exe 71 PID 1196 wrote to memory of 2092 1196 mscorsvw.exe 72 PID 1196 wrote to memory of 2092 1196 mscorsvw.exe 72 PID 1196 wrote to memory of 2092 1196 mscorsvw.exe 72 PID 1196 wrote to memory of 2092 1196 mscorsvw.exe 72 PID 316 wrote to memory of 2928 316 SearchIndexer.exe 73 PID 316 wrote to memory of 2928 316 SearchIndexer.exe 73 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\62f9f615c051f0962ecb4878a80ad4bf74cc037394734dbe95106251bb6c8269N.exe"C:\Users\Admin\AppData\Local\Temp\62f9f615c051f0962ecb4878a80ad4bf74cc037394734dbe95106251bb6c8269N.exe"1⤵
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Users\Admin\AppData\Local\Temp\62f9f615c051f0962ecb4878a80ad4bf74cc037394734dbe95106251bb6c8269N.exe"C:\Users\Admin\AppData\Local\Temp\62f9f615c051f0962ecb4878a80ad4bf74cc037394734dbe95106251bb6c8269N.exe" --local-service2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2712
-
-
C:\Users\Admin\AppData\Local\Temp\62f9f615c051f0962ecb4878a80ad4bf74cc037394734dbe95106251bb6c8269N.exe"C:\Users\Admin\AppData\Local\Temp\62f9f615c051f0962ecb4878a80ad4bf74cc037394734dbe95106251bb6c8269N.exe" --local-control2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1624
-
-
C:\Windows\System32\alg.exeC:\Windows\System32\alg.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2848
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe1⤵
- Executes dropped EXE
PID:2876
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2304
-
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2128
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1e4 -InterruptEvent 1d0 -NGENProcess 1d4 -Pipe 1e0 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1000
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 254 -InterruptEvent 1d0 -NGENProcess 1d4 -Pipe 1e4 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2796
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1d0 -InterruptEvent 258 -NGENProcess 248 -Pipe 244 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2904
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 238 -InterruptEvent 260 -NGENProcess 258 -Pipe 24c -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1996
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1ec -InterruptEvent 1d0 -NGENProcess 240 -Pipe 238 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1408
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1d4 -InterruptEvent 254 -NGENProcess 264 -Pipe 1ec -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2168
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 248 -InterruptEvent 258 -NGENProcess 268 -Pipe 1d4 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3068
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 258 -InterruptEvent 23c -NGENProcess 264 -Pipe 25c -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3064
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 23c -InterruptEvent 26c -NGENProcess 254 -Pipe 260 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:580
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 26c -InterruptEvent 270 -NGENProcess 268 -Pipe 250 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1900
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 270 -InterruptEvent 274 -NGENProcess 264 -Pipe 240 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1080
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 274 -InterruptEvent 27c -NGENProcess 254 -Pipe 278 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2092
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 27c -InterruptEvent 284 -NGENProcess 1d0 -Pipe 280 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2716
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 284 -InterruptEvent 28c -NGENProcess 258 -Pipe 288 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3132
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 28c -InterruptEvent 274 -NGENProcess 268 -Pipe 294 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3236
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 274 -InterruptEvent 248 -NGENProcess 290 -Pipe 254 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3384
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 258 -InterruptEvent 29c -NGENProcess 248 -Pipe 284 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3480
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 28c -InterruptEvent 27c -NGENProcess 29c -Pipe 270 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3596
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 27c -InterruptEvent 290 -NGENProcess 274 -Pipe 1d0 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3700
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 258 -InterruptEvent 2a0 -NGENProcess 264 -Pipe 298 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3796
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2a0 -InterruptEvent 268 -NGENProcess 27c -Pipe 29c -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3884
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 268 -InterruptEvent 2a4 -NGENProcess 290 -Pipe 26c -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3976
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2a4 -InterruptEvent 274 -NGENProcess 248 -Pipe 264 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4080
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1040 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 1d0 -InterruptEvent 1bc -NGENProcess 1c0 -Pipe 1cc -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:444
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 240 -InterruptEvent 1bc -NGENProcess 1c0 -Pipe 1d0 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1680
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 1b8 -InterruptEvent 200 -NGENProcess 204 -Pipe 1ac -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2544
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 200 -InterruptEvent 258 -NGENProcess 234 -Pipe 254 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:3496
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 258 -InterruptEvent 25c -NGENProcess 248 -Pipe 250 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:3448
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 25c -InterruptEvent 260 -NGENProcess 204 -Pipe 22c -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:3660
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 260 -InterruptEvent 264 -NGENProcess 234 -Pipe 1e0 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:3760
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 264 -InterruptEvent 268 -NGENProcess 234 -Pipe 24c -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:3828
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 268 -InterruptEvent 270 -NGENProcess 258 -Pipe 1b8 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:3964
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 270 -InterruptEvent 258 -NGENProcess 264 -Pipe 26c -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1604
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 258 -InterruptEvent 25c -NGENProcess 274 -Pipe 248 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:3164
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 25c -InterruptEvent 274 -NGENProcess 270 -Pipe 204 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2716
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 274 -InterruptEvent 200 -NGENProcess 27c -Pipe 268 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:1596
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 200 -InterruptEvent 27c -NGENProcess 25c -Pipe 278 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1856
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 27c -InterruptEvent 288 -NGENProcess 270 -Pipe 258 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:680
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 288 -InterruptEvent 270 -NGENProcess 200 -Pipe 284 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:3036
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 270 -InterruptEvent 290 -NGENProcess 25c -Pipe 274 -Comment "NGen Worker Process"2⤵
- Loads dropped DLL
- Drops file in Windows directory
PID:3524
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 290 -InterruptEvent 270 -NGENProcess 28c -Pipe 280 -Comment "NGen Worker Process"2⤵PID:2672
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 270 -InterruptEvent 234 -NGENProcess 290 -Pipe 27c -Comment "NGen Worker Process"2⤵
- Loads dropped DLL
PID:2068
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 234 -InterruptEvent 290 -NGENProcess 294 -Pipe 25c -Comment "NGen Worker Process"2⤵PID:3836
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 290 -InterruptEvent 2a0 -NGENProcess 28c -Pipe 288 -Comment "NGen Worker Process"2⤵
- Loads dropped DLL
PID:1488
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2a0 -InterruptEvent 28c -NGENProcess 234 -Pipe 29c -Comment "NGen Worker Process"2⤵PID:1916
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 28c -InterruptEvent 2a8 -NGENProcess 294 -Pipe 270 -Comment "NGen Worker Process"2⤵
- Loads dropped DLL
- Drops file in Windows directory
PID:4072
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2a8 -InterruptEvent 294 -NGENProcess 2a0 -Pipe 2a4 -Comment "NGen Worker Process"2⤵PID:3280
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2b0 -InterruptEvent 294 -NGENProcess 2a8 -Pipe 234 -Comment "NGen Worker Process"2⤵
- Loads dropped DLL
- Drops file in Windows directory
PID:3040
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 294 -InterruptEvent 2a8 -NGENProcess 28c -Pipe 2a0 -Comment "NGen Worker Process"2⤵PID:2504
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2a8 -InterruptEvent 2b8 -NGENProcess 264 -Pipe 200 -Comment "NGen Worker Process"2⤵
- Loads dropped DLL
- Drops file in Windows directory
PID:2080
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2b8 -InterruptEvent 264 -NGENProcess 294 -Pipe 290 -Comment "NGen Worker Process"2⤵PID:1432
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 264 -InterruptEvent 2c0 -NGENProcess 28c -Pipe 2b0 -Comment "NGen Worker Process"2⤵
- Loads dropped DLL
PID:3544
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2c0 -InterruptEvent 28c -NGENProcess 2b8 -Pipe 2bc -Comment "NGen Worker Process"2⤵PID:3492
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 28c -InterruptEvent 2c8 -NGENProcess 294 -Pipe 2a8 -Comment "NGen Worker Process"2⤵
- Loads dropped DLL
- Drops file in Windows directory
PID:2436
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2c8 -InterruptEvent 294 -NGENProcess 2c0 -Pipe 2c4 -Comment "NGen Worker Process"2⤵PID:3584
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 294 -InterruptEvent 2d0 -NGENProcess 2b8 -Pipe 264 -Comment "NGen Worker Process"2⤵
- Loads dropped DLL
- Drops file in Windows directory
PID:3948
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2d4 -InterruptEvent 2c8 -NGENProcess 2d8 -Pipe 294 -Comment "NGen Worker Process"2⤵PID:3868
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2c8 -InterruptEvent 298 -NGENProcess 2b8 -Pipe 28c -Comment "NGen Worker Process"2⤵
- Loads dropped DLL
- Drops file in Windows directory
PID:3196
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 298 -InterruptEvent 2b8 -NGENProcess 2d4 -Pipe 2d0 -Comment "NGen Worker Process"2⤵PID:1212
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2b8 -InterruptEvent 2e4 -NGENProcess 2d8 -Pipe 2e0 -Comment "NGen Worker Process"2⤵
- Loads dropped DLL
- Drops file in Windows directory
PID:1176
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2e4 -InterruptEvent 2b8 -NGENProcess 2c0 -Pipe 2ac -Comment "NGen Worker Process"2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:3236
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2b8 -InterruptEvent 2dc -NGENProcess 2b4 -Pipe 2cc -Comment "NGen Worker Process"2⤵PID:1568
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2dc -InterruptEvent 2ec -NGENProcess 2d8 -Pipe 2d4 -Comment "NGen Worker Process"2⤵PID:3672
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2ec -InterruptEvent 2f4 -NGENProcess 2c0 -Pipe 2f0 -Comment "NGen Worker Process"2⤵PID:3728
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 298 -InterruptEvent 2dc -NGENProcess 2f8 -Pipe 2ec -Comment "NGen Worker Process"2⤵PID:3908
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2dc -InterruptEvent 2b4 -NGENProcess 2c0 -Pipe 2e8 -Comment "NGen Worker Process"2⤵
- Loads dropped DLL
- Drops file in Windows directory
PID:2436
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2b4 -InterruptEvent 2c0 -NGENProcess 298 -Pipe 2f4 -Comment "NGen Worker Process"2⤵
- Loads dropped DLL
- Drops file in Windows directory
PID:3864
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2c0 -InterruptEvent 298 -NGENProcess 2d8 -Pipe 2f8 -Comment "NGen Worker Process"2⤵PID:3916
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 298 -InterruptEvent 2b4 -NGENProcess 2fc -Pipe 308 -Comment "NGen Worker Process"2⤵
- Loads dropped DLL
- Drops file in Windows directory
PID:4048
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2b4 -InterruptEvent 2fc -NGENProcess 2c0 -Pipe 304 -Comment "NGen Worker Process"2⤵PID:792
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2fc -InterruptEvent 30c -NGENProcess 2d8 -Pipe 2e4 -Comment "NGen Worker Process"2⤵PID:1600
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 310 -InterruptEvent 2b4 -NGENProcess 314 -Pipe 2fc -Comment "NGen Worker Process"2⤵PID:3208
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2b4 -InterruptEvent 2b8 -NGENProcess 2d8 -Pipe 298 -Comment "NGen Worker Process"2⤵PID:2792
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 318 -InterruptEvent 2b8 -NGENProcess 2b4 -Pipe 30c -Comment "NGen Worker Process"2⤵PID:3284
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2b8 -InterruptEvent 300 -NGENProcess 2d8 -Pipe 2dc -Comment "NGen Worker Process"2⤵PID:3132
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 300 -InterruptEvent 320 -NGENProcess 310 -Pipe 2c0 -Comment "NGen Worker Process"2⤵PID:3468
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 320 -InterruptEvent 310 -NGENProcess 318 -Pipe 328 -Comment "NGen Worker Process"2⤵PID:3456
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 310 -InterruptEvent 31c -NGENProcess 324 -Pipe 2c8 -Comment "NGen Worker Process"2⤵PID:3608
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 31c -InterruptEvent 32c -NGENProcess 300 -Pipe 314 -Comment "NGen Worker Process"2⤵PID:3632
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 330 -InterruptEvent 310 -NGENProcess 334 -Pipe 31c -Comment "NGen Worker Process"2⤵PID:3696
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 310 -InterruptEvent 2b4 -NGENProcess 300 -Pipe 2b8 -Comment "NGen Worker Process"2⤵PID:3748
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2b4 -InterruptEvent 338 -NGENProcess 32c -Pipe 318 -Comment "NGen Worker Process"2⤵PID:2608
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 338 -InterruptEvent 33c -NGENProcess 334 -Pipe 320 -Comment "NGen Worker Process"2⤵PID:3700
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 340 -InterruptEvent 2b4 -NGENProcess 344 -Pipe 338 -Comment "NGen Worker Process"2⤵PID:2540
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2b4 -InterruptEvent 2d8 -NGENProcess 334 -Pipe 330 -Comment "NGen Worker Process"2⤵PID:1604
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2d8 -InterruptEvent 348 -NGENProcess 33c -Pipe 324 -Comment "NGen Worker Process"2⤵PID:1904
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 348 -InterruptEvent 34c -NGENProcess 344 -Pipe 310 -Comment "NGen Worker Process"2⤵PID:3172
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 34c -InterruptEvent 350 -NGENProcess 334 -Pipe 300 -Comment "NGen Worker Process"2⤵PID:2440
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 350 -InterruptEvent 354 -NGENProcess 33c -Pipe 340 -Comment "NGen Worker Process"2⤵PID:3364
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 354 -InterruptEvent 358 -NGENProcess 344 -Pipe 2b4 -Comment "NGen Worker Process"2⤵PID:2008
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 358 -InterruptEvent 35c -NGENProcess 334 -Pipe 2d8 -Comment "NGen Worker Process"2⤵PID:880
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 35c -InterruptEvent 360 -NGENProcess 33c -Pipe 348 -Comment "NGen Worker Process"2⤵PID:3552
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 360 -InterruptEvent 364 -NGENProcess 344 -Pipe 34c -Comment "NGen Worker Process"2⤵
- Loads dropped DLL
- Drops file in Windows directory
PID:3064
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 364 -InterruptEvent 344 -NGENProcess 35c -Pipe 334 -Comment "NGen Worker Process"2⤵PID:2828
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 344 -InterruptEvent 36c -NGENProcess 33c -Pipe 354 -Comment "NGen Worker Process"2⤵PID:3772
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 36c -InterruptEvent 370 -NGENProcess 368 -Pipe 358 -Comment "NGen Worker Process"2⤵PID:3940
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 370 -InterruptEvent 374 -NGENProcess 35c -Pipe 360 -Comment "NGen Worker Process"2⤵PID:1588
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 374 -InterruptEvent 378 -NGENProcess 33c -Pipe 350 -Comment "NGen Worker Process"2⤵PID:3748
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 378 -InterruptEvent 364 -NGENProcess 368 -Pipe 37c -Comment "NGen Worker Process"2⤵PID:904
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 364 -InterruptEvent 368 -NGENProcess 370 -Pipe 384 -Comment "NGen Worker Process"2⤵PID:3968
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 368 -InterruptEvent 36c -NGENProcess 380 -Pipe 32c -Comment "NGen Worker Process"2⤵PID:1632
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 36c -InterruptEvent 388 -NGENProcess 378 -Pipe 344 -Comment "NGen Worker Process"2⤵PID:1604
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 364 -InterruptEvent 38c -NGENProcess 368 -Pipe 388 -Comment "NGen Worker Process"2⤵PID:3200
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 35c -InterruptEvent 38c -NGENProcess 364 -Pipe 378 -Comment "NGen Worker Process"2⤵PID:832
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 38c -InterruptEvent 374 -NGENProcess 368 -Pipe 394 -Comment "NGen Worker Process"2⤵PID:3016
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 398 -InterruptEvent 35c -NGENProcess 39c -Pipe 38c -Comment "NGen Worker Process"2⤵PID:2732
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 35c -InterruptEvent 33c -NGENProcess 368 -Pipe 370 -Comment "NGen Worker Process"2⤵PID:996
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 33c -InterruptEvent 3a0 -NGENProcess 374 -Pipe 380 -Comment "NGen Worker Process"2⤵PID:552
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 3a0 -InterruptEvent 3a4 -NGENProcess 39c -Pipe 390 -Comment "NGen Worker Process"2⤵PID:2544
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 3a8 -InterruptEvent 33c -NGENProcess 3ac -Pipe 3a0 -Comment "NGen Worker Process"2⤵PID:3312
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 33c -InterruptEvent 36c -NGENProcess 39c -Pipe 398 -Comment "NGen Worker Process"2⤵PID:3668
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 36c -InterruptEvent 3b0 -NGENProcess 3a4 -Pipe 364 -Comment "NGen Worker Process"2⤵PID:3728
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 3b0 -InterruptEvent 3b4 -NGENProcess 3ac -Pipe 35c -Comment "NGen Worker Process"2⤵PID:3052
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 3b4 -InterruptEvent 3b8 -NGENProcess 39c -Pipe 368 -Comment "NGen Worker Process"2⤵PID:2908
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 3b8 -InterruptEvent 3bc -NGENProcess 3a4 -Pipe 3a8 -Comment "NGen Worker Process"2⤵PID:2760
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 3bc -InterruptEvent 3c4 -NGENProcess 3ac -Pipe 3c0 -Comment "NGen Worker Process"2⤵PID:3748
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 3c4 -InterruptEvent 33c -NGENProcess 3a4 -Pipe 36c -Comment "NGen Worker Process"2⤵PID:3100
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 33c -InterruptEvent 3c8 -NGENProcess 3b0 -Pipe 374 -Comment "NGen Worker Process"2⤵PID:3244
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 3c8 -InterruptEvent 3cc -NGENProcess 3ac -Pipe 3b4 -Comment "NGen Worker Process"2⤵PID:3224
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 3cc -InterruptEvent 3d0 -NGENProcess 3a4 -Pipe 3b8 -Comment "NGen Worker Process"2⤵PID:2388
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 3d0 -InterruptEvent 3d4 -NGENProcess 3b0 -Pipe 3bc -Comment "NGen Worker Process"2⤵PID:1608
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 3d4 -InterruptEvent 3d8 -NGENProcess 3ac -Pipe 3c4 -Comment "NGen Worker Process"2⤵PID:2984
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 3d8 -InterruptEvent 3dc -NGENProcess 3a4 -Pipe 33c -Comment "NGen Worker Process"2⤵
- Modifies data under HKEY_USERS
PID:3136
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 3dc -InterruptEvent 3e0 -NGENProcess 3b0 -Pipe 3c8 -Comment "NGen Worker Process"2⤵
- Loads dropped DLL
- Drops file in Windows directory
- Modifies data under HKEY_USERS
PID:2516
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 3e0 -InterruptEvent 3b0 -NGENProcess 3d8 -Pipe 3ac -Comment "NGen Worker Process"2⤵
- Modifies data under HKEY_USERS
PID:3516
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 3b0 -InterruptEvent 3e8 -NGENProcess 3a4 -Pipe 3d0 -Comment "NGen Worker Process"2⤵
- Loads dropped DLL
- Drops file in Windows directory
- Modifies data under HKEY_USERS
PID:3900
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 3e8 -InterruptEvent 3a4 -NGENProcess 3e0 -Pipe 3e4 -Comment "NGen Worker Process"2⤵
- Modifies data under HKEY_USERS
PID:2904
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 3a4 -InterruptEvent 3f0 -NGENProcess 3d8 -Pipe 3dc -Comment "NGen Worker Process"2⤵
- Loads dropped DLL
- Drops file in Windows directory
- Modifies data under HKEY_USERS
PID:3828
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 3f0 -InterruptEvent 3d8 -NGENProcess 3e8 -Pipe 3ec -Comment "NGen Worker Process"2⤵PID:756
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 3f8 -InterruptEvent 3cc -NGENProcess 3fc -Pipe 3f0 -Comment "NGen Worker Process"2⤵
- Modifies data under HKEY_USERS
PID:4072
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 3cc -InterruptEvent 3b0 -NGENProcess 3e8 -Pipe 3d4 -Comment "NGen Worker Process"2⤵
- Loads dropped DLL
- Drops file in Windows directory
- Modifies data under HKEY_USERS
PID:3040
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 3b0 -InterruptEvent 3e8 -NGENProcess 3f8 -Pipe 3d8 -Comment "NGen Worker Process"2⤵PID:2132
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 3e8 -InterruptEvent 408 -NGENProcess 3fc -Pipe 3a4 -Comment "NGen Worker Process"2⤵PID:1420
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 40c -InterruptEvent 3b0 -NGENProcess 410 -Pipe 3e8 -Comment "NGen Worker Process"2⤵PID:2108
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 3b0 -InterruptEvent 3e0 -NGENProcess 3fc -Pipe 3cc -Comment "NGen Worker Process"2⤵PID:1384
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 3e0 -InterruptEvent 3fc -NGENProcess 404 -Pipe 418 -Comment "NGen Worker Process"2⤵PID:3132
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 3fc -InterruptEvent 3f4 -NGENProcess 414 -Pipe 39c -Comment "NGen Worker Process"2⤵PID:3708
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 3f4 -InterruptEvent 41c -NGENProcess 3b0 -Pipe 3f8 -Comment "NGen Worker Process"2⤵PID:3816
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 41c -InterruptEvent 420 -NGENProcess 404 -Pipe 408 -Comment "NGen Worker Process"2⤵PID:3920
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 420 -InterruptEvent 424 -NGENProcess 414 -Pipe 40c -Comment "NGen Worker Process"2⤵PID:1872
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 424 -InterruptEvent 428 -NGENProcess 3b0 -Pipe 3e0 -Comment "NGen Worker Process"2⤵PID:3900
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 428 -InterruptEvent 42c -NGENProcess 404 -Pipe 3fc -Comment "NGen Worker Process"2⤵PID:4052
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 42c -InterruptEvent 430 -NGENProcess 414 -Pipe 3f4 -Comment "NGen Worker Process"2⤵PID:1408
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 430 -InterruptEvent 434 -NGENProcess 3b0 -Pipe 41c -Comment "NGen Worker Process"2⤵PID:3180
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 434 -InterruptEvent 438 -NGENProcess 404 -Pipe 420 -Comment "NGen Worker Process"2⤵PID:1916
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 438 -InterruptEvent 43c -NGENProcess 414 -Pipe 424 -Comment "NGen Worker Process"2⤵PID:1604
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 43c -InterruptEvent 440 -NGENProcess 3b0 -Pipe 428 -Comment "NGen Worker Process"2⤵PID:1524
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 440 -InterruptEvent 444 -NGENProcess 404 -Pipe 42c -Comment "NGen Worker Process"2⤵PID:3208
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 444 -InterruptEvent 448 -NGENProcess 414 -Pipe 430 -Comment "NGen Worker Process"2⤵PID:2528
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 44c -InterruptEvent 448 -NGENProcess 444 -Pipe 3b0 -Comment "NGen Worker Process"2⤵PID:3284
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 448 -InterruptEvent 434 -NGENProcess 414 -Pipe 438 -Comment "NGen Worker Process"2⤵
- Loads dropped DLL
- Drops file in Windows directory
PID:3580
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 434 -InterruptEvent 414 -NGENProcess 44c -Pipe 440 -Comment "NGen Worker Process"2⤵PID:3524
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 414 -InterruptEvent 458 -NGENProcess 444 -Pipe 450 -Comment "NGen Worker Process"2⤵
- Drops file in Windows directory
PID:3388
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 458 -InterruptEvent 444 -NGENProcess 434 -Pipe 454 -Comment "NGen Worker Process"2⤵PID:3036
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 444 -InterruptEvent 460 -NGENProcess 44c -Pipe 448 -Comment "NGen Worker Process"2⤵PID:604
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 460 -InterruptEvent 464 -NGENProcess 458 -Pipe 43c -Comment "NGen Worker Process"2⤵PID:1556
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 464 -InterruptEvent 410 -NGENProcess 44c -Pipe 414 -Comment "NGen Worker Process"2⤵PID:3696
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 410 -InterruptEvent 46c -NGENProcess 444 -Pipe 404 -Comment "NGen Worker Process"2⤵PID:1784
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 46c -InterruptEvent 470 -NGENProcess 458 -Pipe 468 -Comment "NGen Worker Process"2⤵
- Drops file in Windows directory
PID:2956
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 470 -InterruptEvent 458 -NGENProcess 410 -Pipe 44c -Comment "NGen Worker Process"2⤵PID:3948
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 458 -InterruptEvent 460 -NGENProcess 444 -Pipe 474 -Comment "NGen Worker Process"2⤵
- Drops file in Windows directory
PID:3180
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 460 -InterruptEvent 444 -NGENProcess 470 -Pipe 44c -Comment "NGen Worker Process"2⤵PID:2832
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 444 -InterruptEvent 484 -NGENProcess 47c -Pipe 458 -Comment "NGen Worker Process"2⤵PID:1596
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 484 -InterruptEvent 48c -NGENProcess 470 -Pipe 434 -Comment "NGen Worker Process"2⤵PID:3952
-
-
C:\Windows\ehome\ehRecvr.exeC:\Windows\ehome\ehRecvr.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:792
-
C:\Windows\ehome\ehsched.exeC:\Windows\ehome\ehsched.exe1⤵
- Executes dropped EXE
PID:1588
-
C:\Windows\eHome\EhTray.exe"C:\Windows\eHome\EhTray.exe" /nav:-21⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1784
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵
- Executes dropped EXE
PID:2676
-
C:\Windows\ehome\ehRec.exeC:\Windows\ehome\ehRec.exe -Embedding1⤵
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2544
-
C:\Windows\system32\IEEtwCollector.exeC:\Windows\system32\IEEtwCollector.exe /V1⤵
- Executes dropped EXE
PID:2760
-
C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE"C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE" /auditservice1⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2360
-
C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"1⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:2244
-
C:\Windows\System32\msdtc.exeC:\Windows\System32\msdtc.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
PID:2720
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:876
-
C:\Program Files (x86)\Common Files\Microsoft Shared\Source Engine\OSE.EXE"C:\Program Files (x86)\Common Files\Microsoft Shared\Source Engine\OSE.EXE"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1276
-
C:\Windows\SysWow64\perfhost.exeC:\Windows\SysWow64\perfhost.exe1⤵
- Executes dropped EXE
PID:776
-
C:\Windows\system32\locator.exeC:\Windows\system32\locator.exe1⤵
- Executes dropped EXE
PID:1692
-
C:\Windows\System32\snmptrap.exeC:\Windows\System32\snmptrap.exe1⤵
- Executes dropped EXE
PID:2284
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵
- Executes dropped EXE
PID:2660
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2988
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1720
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵
- Executes dropped EXE
PID:944
-
C:\Program Files\Windows Media Player\wmpnetwk.exe"C:\Program Files\Windows Media Player\wmpnetwk.exe"1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1612
-
C:\Windows\system32\SearchIndexer.exeC:\Windows\system32\SearchIndexer.exe /Embedding1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:316 -
C:\Windows\system32\SearchProtocolHost.exe"C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe1_ Global\UsGthrCtrlFltPipeMssGthrPipe1 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon"2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:2928
-
-
C:\Windows\system32\SearchFilterHost.exe"C:\Windows\system32\SearchFilterHost.exe" 0 584 588 596 65536 5922⤵
- Modifies data under HKEY_USERS
PID:1976
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
30.1MB
MD5f6ecf2993e94fec1f49f6d47142d8111
SHA1bc1ba47609ed7478b0d9e57c6c8100455e064ba9
SHA25684e97f90e5cce86005e3c4a5f045b150ddc372de7bee20dfbc1252be052566e9
SHA512e56895eee045f7e2da4253bbcbb9fc64da08935f3ea7c326e6820d6d14c60f3225adc50d9de1b911b64607b0d92fd3298298e99deef239cb1ac3823db7bea767
-
Filesize
1.4MB
MD5b82c24a25b638765a7d7b2ba732a1e88
SHA1f4d3575d2d7db9ed048faa5a26df693b7d52c197
SHA2567347ffb57f8af629e1ca514f81778a749af72359b8a83a5fdbc53707ee3129f2
SHA51250290203061882205c729d89e13f24df72c84deeb905f6afe51bd485e4aff5ea7cfff19ac849f44d8ed155d47d7ad448121797e44a71563fa17d22b8ba605ebb
-
Filesize
2.1MB
MD574995547e2ce6e7b1b23c7d20cdda830
SHA1b65ce954bab9ac4acabaab38c0b57a323279734e
SHA256f220ba4c4dea39517d35eaf11c9d882f337dd5753faf8288f0a2f3a8211c8832
SHA5127b0a305952b6d66cb78f2fb86618e5e91a7f7d7532aa8db9129a2238016df8569ff5984463505a1a955891093981073516059628edd9d6f0e25b86ae9c978531
-
Filesize
1024KB
MD5097241ee5e1c6a98fb6323d43494d9ea
SHA1a3aae41b9579a5f052b2e6804f1cef83ee6d93db
SHA2560dcd9a24d28cd9f9c4c836af41323d3bc3376f56e1e855aed40454645f175f80
SHA512399b7e1765613cc3b2c4751059d15a2b3387ff6624723d1099b7b9cabb2a312c27560c1cab406d8e1cdf3609630059bde5d99b0370370de40c3cdf8073358e28
-
Filesize
385KB
MD51ce7d5a1566c8c449d0f6772a8c27900
SHA160854185f6338e1bfc7497fd41aa44c5c00d8f85
SHA25673170761d6776c0debacfbbc61b6988cb8270a20174bf5c049768a264bb8ffaf
SHA5127e3411be8614170ae91db1626c452997dc6db663d79130872a124af982ee1d457cefba00abd7f5269adce3052403be31238aecc3934c7379d224cb792d519753
-
Filesize
8KB
MD559d7c3a6a213020f7463865499553e39
SHA1110716be65372fec2dd6890ec6543f09325baa6f
SHA256b527bc4f349cf2cdaf5d8982888762fbfa92057bb04b330a7de616c9229d48eb
SHA5122e00f41835b989259abc018f606ed25d654d15e7f572ad8cba7fbdfa4739e2524d1524736a38255bc87e5fc2bb013400c3b8a1b0a3bcd0bbbf98dff4d1277dd7
-
Filesize
10KB
MD548692f328a3898e7bf2f30e392bc9f97
SHA1c40f67351cc390a6c982bec81746cca162031e10
SHA2560652eb3b9c283c604ad460769243949e70fb7a15f65662df63258981abeed6dc
SHA5125156efd5da8f8f76034068c5807a2c136a92742f88d59c4cb25c3d278aba84a7f5d2a698d55b20eda849638bf4d3c4f9ce9560c5188ed39d057a15f4b014f516
-
Filesize
2KB
MD5afd96041768e3b7a37fad45588165753
SHA1258763c2eba0c46e85b299990204cb71d31ed132
SHA2563a5805645865eb2efada0bff137998dbd6d12f16a65e85040a1154eef39fcb9d
SHA512d759f13306848a4f3d3991aa11d8c447bba712e8ec417e65ccac645a9e6d41bfc9ff910ac1b6e7e8279047a99eca5256738b16160c80492e0bf02baf01036a03
-
Filesize
2KB
MD5fd9e4f1b812162086a10ee5a5acebc2e
SHA1de270b1714afd35e74f1798fe488c4595c770d4a
SHA2560eb3059edcdda91ecf3474cc9e04649da0c03424f90091f014e20518e73bbe4a
SHA51216333d42f78aaa61e0ec7d2e55a4db94bca2e5fd1322585efaae69abec06c5cc01b393084c6438e2bfd68f1d76b2debf7dd85a1212b62a6ad91fc88fef497a07
-
Filesize
424B
MD5adcd93e94af349e4271a476a65ac8e75
SHA16bd19be91694312a0b8498b29cffc015cfed1cad
SHA25603fe655fbd4a7a4e0f0bd3654662f865447c20495c2b8970af688aa405f3546b
SHA5129dabc82e8cd8e22ed4d91cf58dc17225d9179d40fa16170d3c96f0e9e20e451779d9d9e103f98e5d7e478c56d9f2bff259b008f853ef75d568b6d1fa8a1c0bb0
-
Filesize
424B
MD5b519dc724457de0e891968fed424bff0
SHA13a380ef34a897574a62fe5c48051a8b9b73c7e2c
SHA256dc259621351ead511148c3f9306c053d76b897f2d63e1add1fdcec850a24c62b
SHA512a8eec3a355eb4daa0702af6295d9b978e5e84bd3331c36c043c7e9be210f4c289b6ebc6329d50974b3c4c55b369dcae5b0566986725b5107c58be7d44534ad8b
-
Filesize
701B
MD57c39d6fdbc500cf640f91879694f7d95
SHA1cd04322efb3c51afab7a3e0491736df1d9de42ed
SHA25602c5eb46eb81b2fd375d6acf4c265f5762a8ba59657513671d44d29c54de83ea
SHA5124558cceab5d10c63941258cdf58e6d04cca9e1d4e7927e8673d983f7ab28a57dd8c539738bd4d5059ddbb3d091fef9c4a0810927cc24703088f4f00d5da298b0
-
Filesize
1KB
MD520926edd76770218fcf9799dbd1820a9
SHA14eeb0fe3698c8aaf4373afe821b3fe3c330dff6e
SHA25615600c3f0c798c73edfd635455a4252c89025850d094dbdcc9ea7fb1c2c5c584
SHA512542b3b69d715d10a148d39d81af436533a0d60a560a6c952a565168adda9c6fd9fdf09d71cb01321c5322eee7cf384221454435bda02966af9e33c8da3028742
-
Filesize
2KB
MD514aaf25d4ebc7d97def7775118705f96
SHA18e939a020c94cdd1427eeb597e2f30b5f5e20a57
SHA256269ade284c7622629daf644a1ab615b5d78319750394ee1b2c17edf0a4fb7e73
SHA512e75308cb9fed9281db7b219dea58d4168484a35395f7ec5b241f2edcc4ad312ea95dcc2f4ad452f8ca37b33884050ba6e9e1798c264c2e387bf311df1a642edf
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
Filesize
6KB
MD5d9a62524931d06066e2098eb66cee51a
SHA1a67d3ef49eaf45c62823bca4647e2f65bd307fe6
SHA256848d8dd20797a1185207334937097e142ca3cce58443558824b104c5e8e5608a
SHA512485c52bfc7fa629dd31d792b33a5e0c38eefa00db098c6d713888542e682a2814c70757e4af64268bf3149fee1522d14876652b8eecd848520407566fa04d839
-
Filesize
7KB
MD544121901e544dd3407c4c5cab864de47
SHA146cb81c7854310cf24a03ff3cdff684916d1f726
SHA256c6a58ef820388fe150446f7a198e9e5d68b9271982730fd7071889f1ee2ba29b
SHA5126c77912ff6482ac18018a4179632723a993bf457f19d509e40c3b7d98ae41e32103167c0b34672b65a7d72684a75c22680991193656807ce312b18603d39b95f
-
Filesize
1KB
MD532c9640628f8dcd5f72ccc6ca8651435
SHA18a1630300290e454ece229abe728634a4f4b3b80
SHA256b713e72ec378329f416e04a996161f3f4941a5068fe6559f41ab1c5a23e417f1
SHA512ce85eed59e870e0f86edd8da01223dbc283dd24a1d4a3a49ca44f20de289fdf4e7a86f448679f4e1695e8890d5f2b57cac30b4e099711eb30e0d4f66f7aa2858
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b91050d8b077a4e8.customDestinations-ms
Filesize24B
MD5b9bd716de6739e51c620f2086f9c31e4
SHA19733d94607a3cba277e567af584510edd9febf62
SHA2567116ff028244a01f3d17f1d3bc2e1506bc9999c2e40e388458f0cccc4e117312
SHA512cef609e54c7a81a646ad38dba7ac0b82401b220773b9c792cefac80c6564753229f0c011b34ffb56381dd3154a19aee2bf5f602c4d1af01f2cf0fbc1574e4478
-
Filesize
1.3MB
MD5e64cacad771037955db8330d6e522688
SHA174ee90e4b83f9fee48200e2dcca841ca2e1a2901
SHA25620e80dd0f17295bdef592e9e2bd22d6e3972ba91e68a264fca0e47a3be7f1fe5
SHA51215342217075667a63be21dc141019ebef0987cec5a65e1f186c2004c190fb27ca0d7ee495c3277fe692476f4c069c87bbb82eb572177eabd2112741ff0360ba4
-
Filesize
872KB
MD5f816ff146ed3de9dc0fe27f17a49874a
SHA1dde28018192458b77890cef5cfc173a167a3b92d
SHA25600cfe8c8de08275a04922d9fbbd73ef32e65c76e83fa394462507c697326e5df
SHA51224d4b1675b4760b112e02c7bdb03cc06793e85d2cb3c469661be1612559881a08aaae981505cdf8b3b751a240eaaf32d91a56bb51792a404218ce3d8a5b0088d
-
Filesize
1.2MB
MD5c77a2f1908553e2b4ca0a6cd68961963
SHA106df9b97bba80f60da7e9953cc74ce2292c7e8b9
SHA2565e755c2b1a33ebab72a9f42bb263b61a3746edef3eab3364b34ea681b1fa9faa
SHA5121d5ab559f740209129cab2005092230ac56ef2e9cc1862c3c56ee076d51cf0de2e7a224c7112f0098a47bc3115150d068fe6589098c909676007ba43ad86af78
-
Filesize
1.3MB
MD5f6e57e975daa8806dd6b2842f696d99f
SHA1aca1128e61d9d599e6f9c3cd785066bdaec28169
SHA2563ca0212149c2896a8525c1faf1afe0eff0ce283df917c606ef9c8b28b8609926
SHA5121a7bc785e986fc6b75e5cd0c096481bf8003274665419598f0bb95d8570b03d606098f2a7c47b7b80a6295fe3b66eb9c74d5d79451ccfa738adc1b8bad50e6c4
-
Filesize
8KB
MD5ff94957f4424fab1a674a90fa1471f1a
SHA1fc3cbe42f1305e0187c6b05a6d6d2137ec7d58bc
SHA256b9543e102df89ffc2a0a2b48193848d05bf73ec3881e51c39de3467601fe8525
SHA51212fea377a1e6994f90684fbf41ddd634c3ef3d22ff08e12f442a5bed96466fe6ca8e41b235040bc9e75d81052c225c873dbea2f680f021462c720ce7ed0ef675
-
Filesize
1.2MB
MD570923cd63cc5b2f2a51f3b489fe03e32
SHA15c579c1f9ffac861f9018201796ea438b88de6a2
SHA256bce6250651d4f9b555f1b4a566526599d2fca65bce2c28d6fcb682d8be3beedc
SHA5128bddbe590473f7dc0d75f454d8071db6a838a67a6b0758e97dbc9b28e5a22f9b62d21ebbb124d2ce325f1ff7ec232a9414f1ec55af4f3cfadac43bf405c0969b
-
Filesize
1003KB
MD539017c4ecce12ab37132c67485df2ff4
SHA1a757ae0b8929bc02981951fdad1075739c60cc36
SHA256963a5389844375432862ab9516a5bdfd91e9bd5b6250b5280a721937ed798983
SHA512a533c81cf8e3be1114f60008b75f9015fba53a948d03855ff6d32271c55a3c35646ba2bc2e738bafe64d90ad30d61f50c7d21f6606fc7c0dba7d7f257717b25b
-
Filesize
1.3MB
MD5e075b514fb26b5a4c96d3f5579da43c7
SHA113f225af12f50b870fd8b93747a0bfa21a7436d7
SHA256730274005b4f8ec37f2391f223a7d309d517097746e853ff211f87e9475acf9b
SHA5121531e62e81719ca4825eabab7cf054c65c455d571017c2500b6b66a2bb992dd1f056346dea73b85bd6c0a84c8d29a2f978ba5709a9ab069f049f6a1704830386
-
Filesize
29KB
MD5d59a6b36c5a94916241a3ead50222b6f
SHA1e274e9486d318c383bc4b9812844ba56f0cff3c6
SHA256a38d01d3f024e626d579cf052ac3bd4260bb00c34bc6085977a5f4135ab09b53
SHA51217012307955fef045e7c13bf0613bd40df27c29778ba6572640b76c18d379e02dc478e855c9276737363d0ad09b9a94f2adaa85da9c77ebb3c2d427aa68e2489
-
Filesize
81KB
MD5b13f51572f55a2d31ed9f266d581e9ea
SHA17eef3111b878e159e520f34410ad87adecf0ca92
SHA256725980edc240c928bec5a5f743fdabeee1692144da7091cf836dc7d0997cef15
SHA512f437202723b2817f2fef64b53d4eb67f782bdc61884c0c1890b46deca7ca63313ee2ad093428481f94edfcecd9c77da6e72b604998f7d551af959dbd6915809c
-
C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft-Windows-H#\a46df77acafec60e31859608625e6354\Microsoft-Windows-HomeGroupDiagnostic.NetListMgr.Interop.ni.dll
Filesize105KB
MD5d9c0055c0c93a681947027f5282d5dcd
SHA19bd104f4d6bd68d09ae2a55b1ffc30673850780f
SHA256dc7eb30a161a2f747238c8621adb963b50227a596d802b5f9110650357f7f7ed
SHA5125404050caa320cdb48a6ccd34282c12788ee8db4e00397dde936cee00e297e9e438dcaa5fcb4e92525f167637b500db074ac91971d4730d222ac4713a3e7b930
-
C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft.Office.To#\11940d5133d63001fa4499c315655e15\Microsoft.Office.Tools.Word.v9.0.ni.dll
Filesize1.1MB
MD57835e60e560a49049ae728698da3d301
SHA187b357b1b3c9a2ad2f3b89b10a42af021ab76afe
SHA256df34cbc18c66aa387324c45196d71ebe7c91a83fbbdc91766f9f47330a0cb2fa
SHA512b95c33a2746a331e4416f7449c8ab613ba16c716a449e446d825f34dfaf754ea7562bf77cf5a73a78599e0b67a3a697437baa9aa516e40e06981693c8ea5b993
-
C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft.Office.To#\6337d25ea4dd40045a047cb662ee4394\Microsoft.Office.Tools.Outlook.v9.0.ni.dll
Filesize238KB
MD50a4ed78b7995d94fa42379f84cd5f8e9
SHA190ba188fe0ebd38ad225e7ce3a24dd9b6b68056b
SHA2560a75d0d332692cc36d539abdd36f3ff5ef2ab786a9404548ca6c98fd566c4d86
SHA51286ac346de836aa6dd7e017ff4329803c9165758dcfe3aa1881e46ca73e15e6cdb269fcc5b082d717774666f9bc40051a47b5261bfe73901804eb4b0bfacd1184
-
C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft.Office.To#\82425dbc07ec64ab599534080b6fbc08\Microsoft.Office.Tools.v9.0.ni.dll
Filesize248KB
MD54bbf44ea6ee52d7af8e58ea9c0caa120
SHA1f7dcafcf850b4081b61ec7d313d7ec35d6ac66d2
SHA256c89c478c2d7134cd28b3d28d4216ad6aa41de3edd9d87a227ec19cf1cbf3fb08
SHA512c82356750a03bd6f92f03c67acdd5e1085fbd70533a8b314ae54676f37762d9ca5fa91574529b147d3e1c983bf042106b75f41206f5ddc37094a5e1c327c0fd3
-
C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft.Office.To#\dc8ba97b4a8deefeb1efac60e1bdb693\Microsoft.Office.Tools.Excel.v9.0.ni.dll
Filesize1.8MB
MD59958f23efa2a86f8195f11054f94189a
SHA178ec93b44569ea7ebce452765568da5c73511931
SHA2563235e629454949220524dd976bec494f7cc4c9abeaf3ee63fc430cbe4fbcf7b6
SHA5123061f8de0abf4b2b37fbc5b930663414499fb6127e2892fe0a0f3dfba6da3927e6caa7bcba31d05faee717d271ecf277607070452701a140dc7d3d4b8d0bfeb1
-
C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft.Office.To#\dd4deeafd891c39e6eb4a2daaafa9124\Microsoft.Office.Tools.Common.v9.0.ni.dll
Filesize1.0MB
MD5598a06ea8f1611a24f86bc0bef0f547e
SHA15a4401a54aa6cd5d8fd883702467879fb5823e37
SHA256e55484d4fe504e02cc49fde33622d1a00cdae29266775dcb7c850203d5ed2512
SHA512774e6facd3c56d1c700d9f97ee2e678d06b17e0493e8dc347be22bcba361bd6225caef702e53f0b08cacc9e6a4c4556280b43d96c928642266286f4dec8b5570
-
C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft.VisualStu#\06216e3a9e4ca262bc1e9a3818ced7fe\Microsoft.VisualStudio.Tools.Office.Excel.AddInAdapter.v9.0.ni.dll
Filesize58KB
MD53d6987fc36386537669f2450761cdd9d
SHA17a35de593dce75d1cb6a50c68c96f200a93eb0c9
SHA25634c0302fcf7d2237f914aaa484b24f5a222745f21f5b5806b9c519538665d9cb
SHA5121d74371f0b6c68ead18b083c08b7e44fcaf930a16e0641ad6cd8d8defb4bde838377741e5b827f7f05d4f0ad4550b509ba6dff787f51fc6830d8f2c88dbf0e11
-
C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft.VisualStu#\077a55be734d6ef6e2de59fa7325dac5\Microsoft.VisualStudio.Tools.Office.Contract.v9.0.ni.dll
Filesize205KB
MD50a41e63195a60814fe770be368b4992f
SHA1d826fd4e4d1c9256abd6c59ce8adb6074958a3e7
SHA2564a8ccb522a4076bcd5f217437c195b43914ea26da18096695ee689355e2740e1
SHA5121c916165eb5a2e30d4c6a67f2023ab5df4e393e22d9d8123aa5b9b8522fdb5dfe539bcb772a6e55219b23d865ee1438d066e78f0cb138a4a61cc2a1cecf54728
-
C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft.VisualStu#\2951791a1aa22719b6fdcb816f7e6c04\Microsoft.VisualStudio.Tools.Office.Contract.v10.0.ni.dll
Filesize43KB
MD568c51bcdc03e97a119431061273f045a
SHA16ecba97b7be73bf465adf3aa1d6798fedcc1e435
SHA2564a3aa6bd2a02778759886aaa884d1e8e4a089a1e0578c973fcb4fc885901ebaf
SHA512d71d6275c6f389f6b7becb54cb489da149f614454ae739e95c33a32ed805820bef14c98724882c4ebb51b4705f41b3cdb5a8ed134411011087774cac6e9d23e8
-
C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft.VisualStu#\30f966ba2053dbcb382b21d30b3b9573\Microsoft.VisualStudio.Tools.Office.HostAdapter.v10.0.ni.dll
Filesize221KB
MD5ca7f94d510247805becbc6643267eeca
SHA173b2a3e9d3cb73e7990ddf8a9e98bbb8ea6dc365
SHA256d4f2751b80af5178625f8c9745324a9118f941a571964065f31edc8abf9be3eb
SHA5126624f575fea1507b3baaea213f0dbe36583804eed1e02ced4d082b38844befeadb266b1b614a9d4378b7c93db9bd08d4dc5dbdda2e87c605b665789e3a243765
-
C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft.VisualStu#\369a81b278211f8d96a305e918172713\Microsoft.VisualStudio.Tools.Applications.Runtime.v9.0.ni.dll
Filesize198KB
MD59d9305a1998234e5a8f7047e1d8c0efe
SHA1ba7e589d4943cd4fc9f26c55e83c77559e7337a8
SHA256469ff9727392795925c7fe5625afcf508ba07e145c7940e4a12dbd6f14afc268
SHA51258b8cc718ae1a72a9d596f7779aeb0d5492a19e5d668828fd6cff1aa37181cc62878799b4c97beec9c71c67a0c215162ff544b2417f6017cd892a1ce64f7878c
-
C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft.VisualStu#\4b363c5e4c1eae1701bf45d167f8658f\Microsoft.VisualStudio.Tools.Applications.AddInAdapter.v10.0.ni.dll
Filesize91KB
MD5adc5887e89bc56694a193d92898d3518
SHA1267f14c45a86d50ad627c6cb00626049e9c1ee20
SHA256edc77665afe4901d4370c6a4fe7427b235a8b4bbcd58ac41ee72440cf414bb5b
SHA512bdea1e13b655e62b74f908f1012a746992245ffcebe21bad624e6e051429e8cccf531fc03fa1fc7319bc5c9c6367c261174394f9623a1968c6381d674b341a37
-
C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft.VisualStu#\585e8f83eff436c8156f071e8f2bdaa0\Microsoft.VisualStudio.Tools.Applications.Adapter.v9.0.ni.dll
Filesize1.8MB
MD504a6857c04546270358d14398fde209e
SHA1596a3e11ac6c303c679edfd6c30aa71e8eaf8a23
SHA2568eb8d5e0c2097d6fdae4b58cfde3e1be1dd6e59968891ac6d11efe8adf227285
SHA5124e8bfd6bf9463a004c17a897026bcc1b4edb0764c7e959f09a744d395e9885b24f8e869b78896218ce930562796a3a8e3a7f0a59ba11c8dfa32b0908c5706b22
-
C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft.VisualStu#\6348aa5d2bd39c221a41286e95c18b97\Microsoft.VisualStudio.Tools.Applications.Hosting.v9.0.ni.dll
Filesize381KB
MD50811b25e0449e04f782127bc6f8ac5e3
SHA1dc1766e20ee338b12fa80e3ce0052ef97ddf9e20
SHA25620d8234901a58ec8ec24f2ce7048ac9e1e7381e3eae10cfeb1e002001d2c8b6c
SHA512a3a07aa4263175688019597b0829b090ad3b8ff43c554b8c89e16b48de86fddab4be6217bce24ccce9cad0c98df1240a7068c8b55778d836c34d5326cbd9c8a6
-
C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft.VisualStu#\6e100177db1ef25970ca4a9eba03c352\Microsoft.VisualStudio.Tools.Applications.Contract.v9.0.ni.dll
Filesize70KB
MD557b601497b76f8cd4f0486d8c8bf918e
SHA1da797c446d4ca5a328f6322219f14efe90a5be54
SHA2561380d349abb6d461254118591637c8198859d8aadfdb098b8d532fdc4d776e2d
SHA5121347793a9dbff305975f4717afa9ee56443bc48586d35a64e8a375535fa9e0f6333e13c2267d5dbb7fe868aa863b23034a2e655dcd68b59dca75f17a4cbc1850
-
C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft.VisualStu#\77f00d3b4d847c1dd38a1c69e4ef5cb1\Microsoft.VisualStudio.Tools.Applications.Runtime.v10.0.ni.dll
Filesize87KB
MD5ed5c3f3402e320a8b4c6a33245a687d1
SHA14da11c966616583a817e98f7ee6fce6cde381dae
SHA256b58d8890d884e60af0124555472e23dee55905e678ec9506a3fbe00fffab0a88
SHA512d664b1f9f37c50d0e730a25ff7b79618f1ca99a0f1df0b32a4c82c95b2d15b6ef04ce5560db7407c6c3d2dff70514dac77cb0598f6d32b25362ae83fedb2bc2a
-
C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft.VisualStu#\8e16d380c1ddca1da6fd48cef10b6553\Microsoft.VisualStudio.Tools.Office.Word.HostAdapter.v10.0.ni.dll
Filesize305KB
MD58e54ee7fbe29bd4057acb83e3ce240ac
SHA18e8f3ee2f375114dd8093a3c6cfe2842be2e0430
SHA2569b89958cfd54c3c9a76bc49771831bd70259f6b0ee283b1c53b7b579a9c6014c
SHA512a1492bd267cb40c4675da4cc17c38cc94f532b06bc0d6aa17bfec0c62cd354fdd5b345a47ceb3329ad6b66a42cf8fe9cb2be3d8a3dff5742d2302d30348a526b
-
C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft.VisualStu#\9e076728e51ab285a8bc0f0b0a226e2c\Microsoft.VisualStudio.Tools.Applications.HostAdapter.v10.0.ni.dll
Filesize82KB
MD52eeeff61d87428ae7a2e651822adfdc4
SHA166f3811045a785626e6e1ea7bab7e42262f4c4c1
SHA25637f2ee9f8794df6d51a678c62b4838463a724fdf1bd65277cd41feaf2e6c9047
SHA512cadf3a04aa6dc2b6b781c292d73e195be5032b755616f4b49c6bdde8b3ae297519fc255b0a46280b60aaf45d4dedb9b828d33f1400792b87074f01bbab19e41a
-
C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft.VisualStu#\a58534126a42a5dbdef4573bac06c734\Microsoft.VisualStudio.Tools.Office.Word.AddInAdapter.v9.0.ni.dll
Filesize58KB
MD5a8b651d9ae89d5e790ab8357edebbffe
SHA1500cff2ba14e4c86c25c045a51aec8aa6e62d796
SHA2561c8239c49fb10c715b52e60afd0e6668592806ef447ad0c52599231f995a95d7
SHA512b4d87ee520353113bb5cf242a855057627fde9f79b74031ba11d5feee1a371612154940037954cd1e411da0c102f616be72617a583512420fd1fc743541a10ce
-
C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft.VisualStu#\a8141e9e81e2c3bbf457e4980d4c2847\Microsoft.VisualStudio.Tools.Applications.Hosting.v10.0.ni.dll
Filesize483KB
MD5aae5a97685a809d0a0f661f9319f8a12
SHA1b5fdd4ec4cc057fccc868de4f4910be89e23e48a
SHA256c26eea914017a12af65dc7ebcbbf86d5a620de60f57e3660057163613f2b0233
SHA512d95c0635c587fe40e2c33cabf14e2893be49df06aebf2d40f4c0623f649e9abbd73a95cc5e3740db3b15df07406e36b1534781e63ee485e54671cfb21d3317fb
-
C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft.VisualStu#\bd1950e68286b869edc77261e0821c93\Microsoft.VisualStudio.Tools.Applications.AddInAdapter.v9.0.ni.dll
Filesize85KB
MD55180107f98e16bdca63e67e7e3169d22
SHA1dd2e82756dcda2f5a82125c4d743b4349955068d
SHA256d0658cbf473ef3666c758d28a1c4bcdcb25b2e515ad5251127d0906e65938f01
SHA51227d785971c28181cf9115ab14de066931c4d81f8d357ea8b9eabfe0f70bd5848023b69948ac6a586989e892bcde40999f8895a0bd2e7a28bac7f2fa64bb22363
-
C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft.VisualStu#\c7fb2c08a580e85f1f11cec158235f79\Microsoft.VisualStudio.Tools.Office.Excel.HostAdapter.v10.0.ni.dll
Filesize271KB
MD58a37ed3ff9a19a8f61ecbcb9890fa2f2
SHA12ac3463ec8264c9548cae71eec0604cf3c80b09a
SHA2567dff4c2b787bb1da0ad5acc3a557f6b24ea7a9718e24744074b6782e58def44d
SHA5123bdc31833564711ef9980ce5f6526f2f2873d8ee0035bc8cb44fbada63b16c5599acd3fb4fd1e19d091060dd28532847e025cf3f6eea9cae65c057e00a71a0b7
-
C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft.VisualStu#\c9fffc3c616aee0556ca8f44053c4537\Microsoft.VisualStudio.Tools.Office.Outlook.HostAdapter.v10.0.ni.dll
Filesize122KB
MD54379e06fb80028c1bf151fa7c3ee943e
SHA10435d141caaa88b002b9afda8ce80bb05eab2ddd
SHA25694f610338f3b4cb7a9dcc049c9118b4e6addb5b0f73e61cd8e38fc9660d893e0
SHA512ecb5cb58e030423632b31d34af358a28dd88b3515feb51602051e2798835b188f861d57047cdc9c04dd77d3237ae663251e10e2562050f653af36716944273d8
-
C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft.VisualStu#\dbe51d156773fefd09c7a52feeb8ff79\Microsoft.VisualStudio.Tools.Office.AddInAdapter.v9.0.ni.dll
Filesize298KB
MD55fd34a21f44ccbeda1bf502aa162a96a
SHA11f3b1286c01dea47be5e65cb72956a2355e1ae5e
SHA2565d88539a1b7be77e11fe33572606c1093c54a80eea8bd3662f2ef5078a35ce01
SHA51258c3904cd1a06fbd3a432b3b927e189a744282cc105eda6f0d7f406971ccbc942c7403c2dcbb2d042981cf53419ca5e2cf4d9f57175e45cc5c484b0c121bb125
-
C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft.VisualStu#\fe8d06712eb58d0150803744020b072a\Microsoft.VisualStudio.Tools.Applications.Contract.v10.0.ni.dll
Filesize43KB
MD5dd1dfa421035fdfb6fd96d301a8c3d96
SHA1d535030ad8d53d57f45bc14c7c7b69efd929efb3
SHA256f71293fe6cf29af54d61bd2070df0a5ff17a661baf1b0b6c1d3393fd23ccd30c
SHA5128e0f2bee9801a4eba974132811d7274e52e6e17ccd60e8b3f74959994f007bdb0c60eb9facb6321c0fdfbcc44e9a77d8c5c776d998ccce256fa864338a6f63b1
-
C:\Windows\assembly\NativeImages_v2.0.50727_64\ehiActivScp\ee22f412f6314443add3ca412afd6569\ehiActivScp.ni.dll
Filesize124KB
MD5929653b5b019b4555b25d55e6bf9987b
SHA1993844805819ee445ff8136ee38c1aee70de3180
SHA2562766353ca5c6a87169474692562282005905f1ca82eaa08e08223fc084dbb9a2
SHA512effc809cca6170575efa7b4b23af9c49712ee9a7aaffd8f3a954c2d293be5be2cf3c388df4af2043f82b9b2ea041acdbb9d7ddd99a2fc744cce95cf4d820d013
-
C:\Windows\assembly\NativeImages_v2.0.50727_64\ehiVidCtl\11d57f5c033326954c0bc4f0b2680812\ehiVidCtl.ni.dll
Filesize2.1MB
MD510b5a285eafccdd35390bb49861657e7
SHA162c05a4380e68418463529298058f3d2de19660d
SHA2565f3bb3296ab50050e6b4ea7e95caa937720689db735c70309e5603a778be3a9a
SHA51219ff9ac75f80814ed5124adc25fc2a6d1d7b825c770e1edb8f5b6990e44f9d2d0c1c0ed75b984e729709d603350055e5a543993a80033367810c417864df1452
-
C:\Windows\assembly\NativeImages_v2.0.50727_64\stdole\70f1aed4a280583cbd09e0f5d9bbc1f5\stdole.ni.dll
Filesize88KB
MD51f394b5ca6924de6d9dbfb0e90ea50ef
SHA14e2caa5e98531c6fbf5728f4ae4d90a1ad150920
SHA2569db0e4933b95ad289129c91cd9e14a0c530f42b55e8c92dc8c881bc3dd40b998
SHA512e27ea0f7b59d41a85547d607ae3c05f32ce19fa5d008c8eaf11d0c253a73af3cfa6df25e3ee7f3920cd775e1a3a2db934e5891b4aafd4270d65a727b439f7476
-
Filesize
1.2MB
MD542f4a4108d48d82c8dc3814c42592a58
SHA15fc7d8d90b5f559b96ad3636b1c598a495bf7c29
SHA2568414d3cdcc0e029d02f3d379ef58f180c70cd3fe12ed203e20b6d1852de7ae81
SHA512cea2fc3750dc5025e2c3a806f31bb3a08e9b664da3224ce4df03a62c7f1b0d3a802482a181792107fa437f0c6c58968fefe299ec4701fb9a99ebdbc5b7725885
-
Filesize
1.3MB
MD5e2fd119880354144b14a4e0d4ed4a06e
SHA12901497b42ae6b26039aa40ba2d432fda7b00b83
SHA256c16e73122316c37ca7acafc1eb0f2e3395c6230bd0b70bad4c1e955308142db5
SHA512f6a3f27be7645b04f661160500ca389f62de4cf8c242943deb4919fc44141a25cbebc1a28b40061df7df826bc6edb90d80251f338e281772e67c4fcbe6fdc374
-
Filesize
1.3MB
MD58ba775605a93811fd7754bbec2d929f4
SHA1fb667aa48ed88a4e6f1de4290b1bc771059d6598
SHA25632f316c4f12fe2ecf65e3a6a33677c330eda428453618b66d9985ff4b480bb1f
SHA512d1f0c7ab10b2bb8f4cb27f0557498bc2c88938fb77a8bd4dce2198936b5496f1848c84095fe526d0ff52159fbaef9eda31389da1f880c5c9c9e6bf478e57e965
-
Filesize
1.3MB
MD5dc466724eeece5ad343885f1ca5d4b1a
SHA1784546161fea98cb0691b600d20ba05a2800e00c
SHA2567238d866ddf7de78a7964606d5b53556ff69748cd10bbece4f6d97bf02f2f7b6
SHA512df240400ed3c0c88f5a62586043e0c3f2be35a1a5769d93988862f488b2aa658fa2f53da14b8cb8d8d175ed3703a9a97d0937b9eb55ac02c727e2b7ce92b996f
-
Filesize
1.3MB
MD5ba2483adb5b2d14c33376cf139fb3254
SHA1c845161470e7f1454a3001d8e972ace681217086
SHA256b148637ef2f66f2527d5282127222c8343cee684799d1d17e31adb42f67244c0
SHA51269c92c06a5ea82b8e6bd75855d49775932a386fe09a2466a0cbb7c6ccc2b6de256b59b9cac6e4332c28b486c4a116a041bbaf874f2d00a2ef31640a0b8f95fd3
-
Filesize
1.3MB
MD5fe63c8b724d9ad438856e4480fae802c
SHA1a399b97bba0fa53bd8717c28d8b4382ad87146d6
SHA256d3842c9768dc23312a92cc697d9c2c95403dfa151978713433b5015b139b323a
SHA512cd23340b168113753c42aa5a71a20d55d736571ecb1321fc2c17ddb2f715b642f8b4cad69480c25dabec79ae38076c540198c7448561557951d611211a9656ea