Analysis
-
max time kernel
120s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02/01/2025, 07:25
Static task
static1
Behavioral task
behavioral1
Sample
f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe
Resource
win10v2004-20241007-en
General
-
Target
f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe
-
Size
1.5MB
-
MD5
ba2f58e1802427899637d66434431200
-
SHA1
2a3bebec53223c71b347b2c6ff20d5480d76b04c
-
SHA256
f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02
-
SHA512
add0662b77553cd95e2a9ee3b41fa260c235c4fc78ac521b446bf61d2d9be6bf20f09353051a93e519fb164a4cf51e2baf41d1c7a2aba3fad65aad0807a815b7
-
SSDEEP
24576:JK2+JY8ZAh73dfJ4yL/tNCJPXUQrPHrrEH7E:JK2D8ZAtdfJ4klKXn/Z
Malware Config
Signatures
-
Floxif family
-
Detects Floxif payload 1 IoCs
resource yara_rule behavioral1/files/0x00080000000120ff-1.dat floxif -
Event Triggered Execution: AppInit DLLs 1 TTPs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x00080000000120ff-1.dat acprotect -
Executes dropped EXE 64 IoCs
pid Process 480 Process not Found 2716 alg.exe 2980 aspnet_state.exe 2648 mscorsvw.exe 2356 mscorsvw.exe 532 mscorsvw.exe 1376 mscorsvw.exe 1752 ehRecvr.exe 1620 ehsched.exe 956 elevation_service.exe 1668 IEEtwCollector.exe 2120 GROOVE.EXE 2660 maintenanceservice.exe 2800 msdtc.exe 2796 msiexec.exe 2736 OSE.EXE 1792 perfhost.exe 2984 locator.exe 2836 snmptrap.exe 1848 vds.exe 1140 vssvc.exe 3056 wbengine.exe 668 WmiApSrv.exe 3036 wmpnetwk.exe 1036 SearchIndexer.exe 2880 mscorsvw.exe 2044 mscorsvw.exe 1300 mscorsvw.exe 2280 mscorsvw.exe 1312 mscorsvw.exe 2976 mscorsvw.exe 1788 mscorsvw.exe 2988 mscorsvw.exe 1596 mscorsvw.exe 2804 mscorsvw.exe 2732 mscorsvw.exe 3068 mscorsvw.exe 2996 mscorsvw.exe 2648 mscorsvw.exe 2428 mscorsvw.exe 1988 mscorsvw.exe 1788 mscorsvw.exe 2620 mscorsvw.exe 1740 mscorsvw.exe 2116 mscorsvw.exe 2640 mscorsvw.exe 1012 mscorsvw.exe 552 mscorsvw.exe 264 mscorsvw.exe 1988 mscorsvw.exe 2116 mscorsvw.exe 2280 mscorsvw.exe 568 mscorsvw.exe 1380 mscorsvw.exe 1744 mscorsvw.exe 1772 mscorsvw.exe 2608 mscorsvw.exe 2080 mscorsvw.exe 2884 mscorsvw.exe 1704 mscorsvw.exe 1948 mscorsvw.exe 2880 mscorsvw.exe 2892 mscorsvw.exe 2348 mscorsvw.exe -
Loads dropped DLL 64 IoCs
pid Process 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe 480 Process not Found 2648 mscorsvw.exe 480 Process not Found 532 mscorsvw.exe 480 Process not Found 480 Process not Found 480 Process not Found 2120 GROOVE.EXE 480 Process not Found 480 Process not Found 2796 msiexec.exe 2736 OSE.EXE 1792 perfhost.exe 480 Process not Found 480 Process not Found 480 Process not Found 480 Process not Found 480 Process not Found 736 Process not Found 2880 mscorsvw.exe 2044 mscorsvw.exe 1300 mscorsvw.exe 2280 mscorsvw.exe 1312 mscorsvw.exe 2976 mscorsvw.exe 1788 mscorsvw.exe 2988 mscorsvw.exe 1596 mscorsvw.exe 2804 mscorsvw.exe 2732 mscorsvw.exe 3068 mscorsvw.exe 2996 mscorsvw.exe 2648 mscorsvw.exe 2428 mscorsvw.exe 1988 mscorsvw.exe 1788 mscorsvw.exe 2620 mscorsvw.exe 1740 mscorsvw.exe 2116 mscorsvw.exe 2640 mscorsvw.exe 1012 mscorsvw.exe 552 mscorsvw.exe 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe 2116 mscorsvw.exe 2280 mscorsvw.exe 568 mscorsvw.exe 1380 mscorsvw.exe 1744 mscorsvw.exe 1744 mscorsvw.exe 1744 mscorsvw.exe 1772 mscorsvw.exe 2608 mscorsvw.exe 2608 mscorsvw.exe 2608 mscorsvw.exe 2080 mscorsvw.exe 2884 mscorsvw.exe 2884 mscorsvw.exe 2884 mscorsvw.exe 1704 mscorsvw.exe 1948 mscorsvw.exe 1948 mscorsvw.exe 1948 mscorsvw.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\e: f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe -
Drops file in System32 directory 21 IoCs
description ioc Process File opened for modification C:\Windows\system32\wbem\WmiApSrv.exe f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat SearchProtocolHost.exe File opened for modification C:\Windows\system32\IEEtwCollector.exe f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe File opened for modification C:\Windows\System32\msdtc.exe f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe File opened for modification C:\Windows\system32\MSDtc\MSDTC.LOG msdtc.exe File opened for modification C:\Windows\system32\wbengine.exe f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe File opened for modification C:\Windows\system32\SearchIndexer.exe f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe File opened for modification C:\Windows\system32\IEEtwCollector.exe aspnet_state.exe File opened for modification C:\Windows\System32\alg.exe f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat GROOVE.EXE File opened for modification C:\Windows\System32\snmptrap.exe f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe File opened for modification C:\Windows\SysWow64\perfhost.exe f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe File opened for modification C:\Windows\system32\vssvc.exe f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe File opened for modification C:\Windows\system32\dllhost.exe aspnet_state.exe File opened for modification C:\Windows\system32\dllhost.exe f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe File opened for modification C:\Windows\system32\fxssvc.exe f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe File opened for modification C:\Windows\system32\msiexec.exe f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe File opened for modification C:\Windows\system32\fxssvc.exe aspnet_state.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Roaming\ccfaba3cb863d01f.bin aspnet_state.exe File opened for modification C:\Windows\system32\locator.exe f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe File opened for modification C:\Windows\System32\vds.exe f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe -
resource yara_rule behavioral1/memory/2484-4-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral1/files/0x00080000000120ff-1.dat upx behavioral1/memory/2648-47-0x0000000000260000-0x0000000000290000-memory.dmp upx behavioral1/memory/2484-57-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral1/memory/2648-71-0x0000000000260000-0x0000000000290000-memory.dmp upx behavioral1/memory/532-86-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral1/memory/2120-169-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral1/memory/532-194-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral1/memory/2736-211-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral1/memory/1792-225-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral1/memory/2120-242-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral1/memory/2736-282-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral1/memory/1792-465-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral1/memory/2880-483-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral1/memory/2880-509-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral1/memory/2044-508-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral1/memory/2044-541-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral1/memory/1300-528-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral1/memory/2280-567-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral1/memory/1300-573-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral1/memory/1312-578-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral1/memory/2280-590-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral1/memory/2976-610-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral1/memory/1312-612-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral1/memory/1788-621-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral1/memory/2976-628-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral1/memory/2988-637-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral1/memory/1788-642-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral1/memory/1596-646-0x0000000010000000-0x0000000010030000-memory.dmp upx -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleCrashHandler64.exe aspnet_state.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\A3DUtility.exe f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jdb.exe aspnet_state.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\wsgen.exe aspnet_state.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\java-rmi.exe aspnet_state.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Icons\SC_Reader.exe aspnet_state.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OfficeSoftwareProtectionPlatform\OSPPREARM.EXE aspnet_state.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\java.exe aspnet_state.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jrunscript.exe aspnet_state.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\ktab.exe f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe File opened for modification C:\Program Files\Java\jre7\bin\rmiregistry.exe f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\reader_sl.exe f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateBroker.exe f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateOnDemand.exe f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\chrmstp.exe aspnet_state.exe File opened for modification C:\Program Files\Mozilla Firefox\minidump-analyzer.exe f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe File opened for modification C:\Program Files (x86)\Internet Explorer\ielowutil.exe f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateSetup.exe aspnet_state.exe File opened for modification C:\Program Files\Java\jre7\bin\unpack200.exe aspnet_state.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\ODeploy.exe aspnet_state.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javadoc.exe f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\rmid.exe f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe File opened for modification C:\Program Files\Mozilla Firefox\maintenanceservice_installer.exe f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe File opened for modification C:\Program Files (x86)\Google\Update\Download\{8A69D345-D564-463C-AFF1-A69D9E530F96}\106.0.5249.119\chrome_installer.exe f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\ktab.exe aspnet_state.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Eula.exe aspnet_state.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javah.exe f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jdb.exe f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe File opened for modification C:\Program Files\Java\jre7\bin\ssvagent.exe f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe File opened for modification C:\Program Files (x86)\Common Files\Microsoft Shared\Source Engine\OSE.EXE.dat f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\apt.exe aspnet_state.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\tnameserv.exe aspnet_state.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\launcher.exe f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\EQUATION\EQNEDT32.EXE f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe File opened for modification C:\Program Files\Java\jre7\bin\kinit.exe aspnet_state.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleCrashHandler.exe aspnet_state.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\keytool.exe f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\kinit.exe f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\Adobe AIR Application Installer.exe f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe File opened for modification C:\Program Files\Java\jre7\bin\ktab.exe aspnet_state.exe File opened for modification C:\Program Files\Mozilla Firefox\updater.exe aspnet_state.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32Info.exe aspnet_state.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javap.exe f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe File opened for modification C:\Program Files (x86)\Internet Explorer\ExtExport.exe f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe File opened for modification C:\Program Files\Java\jre7\bin\keytool.exe aspnet_state.exe File opened for modification C:\Program Files\Java\jre7\bin\tnameserv.exe aspnet_state.exe File opened for modification C:\Program Files\Mozilla Firefox\default-browser-agent.exe aspnet_state.exe File opened for modification C:\Program Files\Mozilla Firefox\pingsender.exe aspnet_state.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javac.exe f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe File opened for modification C:\Program Files\Java\jre7\bin\klist.exe f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Updater6\AdobeUpdaterInstallMgr.exe f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OfficeSoftwareProtectionPlatform\OSPPREARM.EXE f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe File opened for modification C:\Program Files\Java\jre7\bin\servertool.exe aspnet_state.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\tnameserv.exe f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\tnameserv.exe f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe File opened for modification C:\Program Files\Java\jre7\bin\jp2launcher.exe f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateComRegisterShell64.exe f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe File opened for modification C:\Program Files\Java\jre7\bin\java.exe aspnet_state.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\unpack200.exe f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe File opened for modification C:\Program Files\Java\jre7\bin\pack200.exe f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javac.exe aspnet_state.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jps.exe aspnet_state.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File created C:\Windows\assembly\ngenlock.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\index14e.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index14f.dat mscorsvw.exe File created C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngenrootstorelock.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\index137.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index139.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index137.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index141.dat mscorsvw.exe File opened for modification C:\Windows\DtcInstall.log msdtc.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\Temp\ZAPCCD1.tmp\Microsoft.VisualStudio.Tools.Office.AddInAdapter.v9.0.dll mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index135.dat mscorsvw.exe File created C:\Windows\assembly\GACLock.dat mscorsvw.exe File created C:\Windows\assembly\ngenlock.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index13f.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index14a.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index151.dat mscorsvw.exe File created C:\Windows\assembly\ngenlock.dat mscorsvw.exe File created C:\Windows\Microsoft.NET\Framework\v2.0.50727\ngen_service.lock mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\index136.dat mscorsvw.exe File created C:\Windows\assembly\GACLock.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index140.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\index145.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\Temp\ZAP1880.tmp\Microsoft.VisualStudio.Tools.Office.Runtime.v10.0.dll mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index153.dat mscorsvw.exe File created C:\Windows\assembly\ngenlock.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index14b.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\Temp\ZAP1381.tmp\Microsoft.VisualStudio.Tools.Office.ContainerControl.v10.0.dll mscorsvw.exe File created C:\Windows\assembly\ngenlock.dat mscorsvw.exe File created C:\Windows\assembly\GACLock.dat mscorsvw.exe File created C:\Windows\assembly\ngenlock.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index143.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\Temp\ZAPF69E.tmp\Microsoft.Office.Tools.Excel.v9.0.dll mscorsvw.exe File created C:\Windows\assembly\GACLock.dat mscorsvw.exe File created C:\Windows\assembly\ngenlock.dat mscorsvw.exe File created C:\Windows\assembly\GACLock.dat mscorsvw.exe File created C:\Windows\assembly\GACLock.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index14b.dat mscorsvw.exe File created C:\Windows\assembly\ngenlock.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\Temp\ZAPD5E5.tmp\Microsoft.VisualStudio.Tools.Applications.HostAdapter.v10.0.dll mscorsvw.exe File created C:\Windows\assembly\GACLock.dat mscorsvw.exe File created C:\Windows\assembly\ngenlock.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index143.dat mscorsvw.exe File created C:\Windows\assembly\ngenlock.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\Temp\ZAP10D2.tmp\Microsoft.VisualStudio.Tools.Applications.ServerDocument.v9.0.dll mscorsvw.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen_service.log mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index134.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\Temp\ZAPCF50.tmp\Microsoft.VisualStudio.Tools.Office.Word.AddInAdapter.v9.0.dll mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\index13c.dat mscorsvw.exe File created C:\Windows\assembly\ngenlock.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\index14f.dat mscorsvw.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe File created C:\Windows\Microsoft.NET\ngennicupdatelock.dat mscorsvw.exe File created C:\Windows\assembly\GACLock.dat mscorsvw.exe File created C:\Windows\assembly\GACLock.dat mscorsvw.exe File created C:\Windows\assembly\ngenlock.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index146.dat mscorsvw.exe File created C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngenofflinequeuelock.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index13d.dat mscorsvw.exe File created C:\Windows\assembly\ngenlock.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\index143.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index146.dat mscorsvw.exe File created C:\Windows\Microsoft.NET\ngenservice_pri3_lock.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\index135.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\index141.dat mscorsvw.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscorsvw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscorsvw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscorsvw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscorsvw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscorsvw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscorsvw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscorsvw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscorsvw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscorsvw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscorsvw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscorsvw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscorsvw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscorsvw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscorsvw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscorsvw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscorsvw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscorsvw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscorsvw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscorsvw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscorsvw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscorsvw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscorsvw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscorsvw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscorsvw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscorsvw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscorsvw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscorsvw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscorsvw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscorsvw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscorsvw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscorsvw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscorsvw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscorsvw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscorsvw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscorsvw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscorsvw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscorsvw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscorsvw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscorsvw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscorsvw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscorsvw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscorsvw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscorsvw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscorsvw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscorsvw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscorsvw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscorsvw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscorsvw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscorsvw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscorsvw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscorsvw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscorsvw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscorsvw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscorsvw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscorsvw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscorsvw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscorsvw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscorsvw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscorsvw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscorsvw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscorsvw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscorsvw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscorsvw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscorsvw.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CRLs mscorsvw.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\System32\ieframe.dll,-10046 = "Internet Shortcut" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\System32\acppage.dll,-6002 = "Windows Batch File" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%windir%\system32\mstsc.exe,-4001 = "Use your computer to connect to a computer that is located elsewhere and run programs or access files." SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CRLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\Certificates mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CRLs mscorsvw.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32,@elscore.dll,-9 = "Microsoft Bengali to Latin Transliteration" SearchIndexer.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Program Files\Common Files\system\wab32res.dll,-10100 = "Contacts" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\Certificates mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates mscorsvw.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\eHome\ehepgres.dll,-304 = "Public Recorded TV" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CRLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CRLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\Certificates mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs mscorsvw.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{45670FA8-ED97-4F44-BC93-305082590BFB} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 01000000000000008081d278e75cdb01 SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\Certificates mscorsvw.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\system32\MdSched.exe,-4001 = "Windows Memory Diagnostic" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs mscorsvw.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%windir%\system32\msra.exe,-635 = "Invite a friend or technical support person to connect to your computer and help you, or offer to help someone else." SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\Certificates mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CRLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople mscorsvw.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\sud.dll,-10 = "Choose which programs you want Windows to use for activities like web browsing, editing photos, sending e-mail, and playing music." SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\Certificates mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\Certificates mscorsvw.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\System32\ieframe.dll,-913 = "MHTML Document" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\gameux.dll,-10300 = "Play the classic strategy game of Checkers against online opponents. Be the first to capture all your opponent’s pieces, or leave them with no more moves, to win the game." SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\Certificates mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\Certificates mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CRLs mscorsvw.exe -
Suspicious behavior: EnumeratesProcesses 34 IoCs
pid Process 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe 1572 ehRec.exe 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe 2980 aspnet_state.exe 2980 aspnet_state.exe 2980 aspnet_state.exe 2980 aspnet_state.exe 2980 aspnet_state.exe 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe Token: SeTakeOwnershipPrivilege 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe Token: SeDebugPrivilege 2648 mscorsvw.exe Token: SeDebugPrivilege 532 mscorsvw.exe Token: SeShutdownPrivilege 532 mscorsvw.exe Token: SeShutdownPrivilege 1376 mscorsvw.exe Token: 33 2016 EhTray.exe Token: SeIncBasePriorityPrivilege 2016 EhTray.exe Token: SeDebugPrivilege 1572 ehRec.exe Token: SeDebugPrivilege 2120 GROOVE.EXE Token: SeRestorePrivilege 2796 msiexec.exe Token: SeTakeOwnershipPrivilege 2796 msiexec.exe Token: SeSecurityPrivilege 2796 msiexec.exe Token: SeDebugPrivilege 2736 OSE.EXE Token: SeDebugPrivilege 1792 perfhost.exe Token: 33 2016 EhTray.exe Token: SeIncBasePriorityPrivilege 2016 EhTray.exe Token: SeBackupPrivilege 1140 vssvc.exe Token: SeRestorePrivilege 1140 vssvc.exe Token: SeAuditPrivilege 1140 vssvc.exe Token: SeBackupPrivilege 3056 wbengine.exe Token: SeRestorePrivilege 3056 wbengine.exe Token: SeSecurityPrivilege 3056 wbengine.exe Token: 33 3036 wmpnetwk.exe Token: SeIncBasePriorityPrivilege 3036 wmpnetwk.exe Token: SeManageVolumePrivilege 1036 SearchIndexer.exe Token: 33 1036 SearchIndexer.exe Token: SeIncBasePriorityPrivilege 1036 SearchIndexer.exe Token: SeShutdownPrivilege 532 mscorsvw.exe Token: SeShutdownPrivilege 1376 mscorsvw.exe Token: SeIncreaseQuotaPrivilege 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe Token: SeProfSingleProcessPrivilege 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe Token: SeShutdownPrivilege 532 mscorsvw.exe Token: SeShutdownPrivilege 532 mscorsvw.exe Token: SeShutdownPrivilege 1376 mscorsvw.exe Token: SeShutdownPrivilege 1376 mscorsvw.exe Token: SeDebugPrivilege 2880 mscorsvw.exe Token: SeDebugPrivilege 2044 mscorsvw.exe Token: SeDebugPrivilege 1300 mscorsvw.exe Token: SeDebugPrivilege 2280 mscorsvw.exe Token: SeDebugPrivilege 1312 mscorsvw.exe Token: SeDebugPrivilege 2976 mscorsvw.exe Token: SeDebugPrivilege 1788 mscorsvw.exe Token: SeDebugPrivilege 2988 mscorsvw.exe Token: SeDebugPrivilege 1596 mscorsvw.exe Token: SeDebugPrivilege 2804 mscorsvw.exe Token: SeDebugPrivilege 2732 mscorsvw.exe Token: SeDebugPrivilege 3068 mscorsvw.exe Token: SeDebugPrivilege 2996 mscorsvw.exe Token: SeDebugPrivilege 2648 mscorsvw.exe Token: SeDebugPrivilege 2428 mscorsvw.exe Token: SeDebugPrivilege 1988 mscorsvw.exe Token: SeDebugPrivilege 1788 mscorsvw.exe Token: SeDebugPrivilege 2620 mscorsvw.exe Token: SeDebugPrivilege 1740 mscorsvw.exe Token: SeDebugPrivilege 2116 mscorsvw.exe Token: SeDebugPrivilege 2640 mscorsvw.exe Token: SeDebugPrivilege 1012 mscorsvw.exe Token: SeDebugPrivilege 552 mscorsvw.exe Token: SeShutdownPrivilege 532 mscorsvw.exe Token: SeShutdownPrivilege 1376 mscorsvw.exe Token: SeDebugPrivilege 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe Token: SeDebugPrivilege 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe Token: SeDebugPrivilege 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe 2016 EhTray.exe 2016 EhTray.exe 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe 2016 EhTray.exe 2016 EhTray.exe 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe 2484 f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 2164 SearchProtocolHost.exe 2164 SearchProtocolHost.exe 2164 SearchProtocolHost.exe 2164 SearchProtocolHost.exe 2164 SearchProtocolHost.exe 2164 SearchProtocolHost.exe 2164 SearchProtocolHost.exe 2164 SearchProtocolHost.exe 2164 SearchProtocolHost.exe 2164 SearchProtocolHost.exe 2164 SearchProtocolHost.exe 2164 SearchProtocolHost.exe 2164 SearchProtocolHost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1036 wrote to memory of 2164 1036 SearchIndexer.exe 57 PID 1036 wrote to memory of 2164 1036 SearchIndexer.exe 57 PID 1036 wrote to memory of 2164 1036 SearchIndexer.exe 57 PID 1036 wrote to memory of 2612 1036 SearchIndexer.exe 58 PID 1036 wrote to memory of 2612 1036 SearchIndexer.exe 58 PID 1036 wrote to memory of 2612 1036 SearchIndexer.exe 58 PID 532 wrote to memory of 2880 532 mscorsvw.exe 59 PID 532 wrote to memory of 2880 532 mscorsvw.exe 59 PID 532 wrote to memory of 2880 532 mscorsvw.exe 59 PID 532 wrote to memory of 2880 532 mscorsvw.exe 59 PID 532 wrote to memory of 2044 532 mscorsvw.exe 60 PID 532 wrote to memory of 2044 532 mscorsvw.exe 60 PID 532 wrote to memory of 2044 532 mscorsvw.exe 60 PID 532 wrote to memory of 2044 532 mscorsvw.exe 60 PID 532 wrote to memory of 1300 532 mscorsvw.exe 61 PID 532 wrote to memory of 1300 532 mscorsvw.exe 61 PID 532 wrote to memory of 1300 532 mscorsvw.exe 61 PID 532 wrote to memory of 1300 532 mscorsvw.exe 61 PID 532 wrote to memory of 2280 532 mscorsvw.exe 62 PID 532 wrote to memory of 2280 532 mscorsvw.exe 62 PID 532 wrote to memory of 2280 532 mscorsvw.exe 62 PID 532 wrote to memory of 2280 532 mscorsvw.exe 62 PID 532 wrote to memory of 1312 532 mscorsvw.exe 63 PID 532 wrote to memory of 1312 532 mscorsvw.exe 63 PID 532 wrote to memory of 1312 532 mscorsvw.exe 63 PID 532 wrote to memory of 1312 532 mscorsvw.exe 63 PID 532 wrote to memory of 2976 532 mscorsvw.exe 64 PID 532 wrote to memory of 2976 532 mscorsvw.exe 64 PID 532 wrote to memory of 2976 532 mscorsvw.exe 64 PID 532 wrote to memory of 2976 532 mscorsvw.exe 64 PID 532 wrote to memory of 1788 532 mscorsvw.exe 75 PID 532 wrote to memory of 1788 532 mscorsvw.exe 75 PID 532 wrote to memory of 1788 532 mscorsvw.exe 75 PID 532 wrote to memory of 1788 532 mscorsvw.exe 75 PID 532 wrote to memory of 2988 532 mscorsvw.exe 66 PID 532 wrote to memory of 2988 532 mscorsvw.exe 66 PID 532 wrote to memory of 2988 532 mscorsvw.exe 66 PID 532 wrote to memory of 2988 532 mscorsvw.exe 66 PID 532 wrote to memory of 1596 532 mscorsvw.exe 67 PID 532 wrote to memory of 1596 532 mscorsvw.exe 67 PID 532 wrote to memory of 1596 532 mscorsvw.exe 67 PID 532 wrote to memory of 1596 532 mscorsvw.exe 67 PID 532 wrote to memory of 2804 532 mscorsvw.exe 68 PID 532 wrote to memory of 2804 532 mscorsvw.exe 68 PID 532 wrote to memory of 2804 532 mscorsvw.exe 68 PID 532 wrote to memory of 2804 532 mscorsvw.exe 68 PID 532 wrote to memory of 2732 532 mscorsvw.exe 69 PID 532 wrote to memory of 2732 532 mscorsvw.exe 69 PID 532 wrote to memory of 2732 532 mscorsvw.exe 69 PID 532 wrote to memory of 2732 532 mscorsvw.exe 69 PID 532 wrote to memory of 3068 532 mscorsvw.exe 70 PID 532 wrote to memory of 3068 532 mscorsvw.exe 70 PID 532 wrote to memory of 3068 532 mscorsvw.exe 70 PID 532 wrote to memory of 3068 532 mscorsvw.exe 70 PID 532 wrote to memory of 2996 532 mscorsvw.exe 71 PID 532 wrote to memory of 2996 532 mscorsvw.exe 71 PID 532 wrote to memory of 2996 532 mscorsvw.exe 71 PID 532 wrote to memory of 2996 532 mscorsvw.exe 71 PID 532 wrote to memory of 2648 532 mscorsvw.exe 72 PID 532 wrote to memory of 2648 532 mscorsvw.exe 72 PID 532 wrote to memory of 2648 532 mscorsvw.exe 72 PID 532 wrote to memory of 2648 532 mscorsvw.exe 72 PID 532 wrote to memory of 2428 532 mscorsvw.exe 73 PID 532 wrote to memory of 2428 532 mscorsvw.exe 73 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe"C:\Users\Admin\AppData\Local\Temp\f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe"1⤵
- Loads dropped DLL
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2484
-
C:\Windows\System32\alg.exeC:\Windows\System32\alg.exe1⤵
- Executes dropped EXE
PID:2716
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
PID:2980
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2648
-
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe1⤵
- Executes dropped EXE
PID:2356
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:532 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 208 -InterruptEvent 1f4 -NGENProcess 1f8 -Pipe 204 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2880
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 200 -InterruptEvent 26c -NGENProcess 274 -Pipe 278 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2044
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 26c -InterruptEvent 264 -NGENProcess 210 -Pipe 25c -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1300
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 264 -InterruptEvent 27c -NGENProcess 208 -Pipe 268 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2280
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 27c -InterruptEvent 280 -NGENProcess 260 -Pipe 1f8 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1312
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 284 -InterruptEvent 264 -NGENProcess 288 -Pipe 27c -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2976
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 274 -InterruptEvent 210 -NGENProcess 28c -Pipe 284 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1788
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 210 -InterruptEvent 26c -NGENProcess 288 -Pipe 290 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2988
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 260 -InterruptEvent 1f4 -NGENProcess 274 -Pipe 26c -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1596
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1f4 -InterruptEvent 298 -NGENProcess 288 -Pipe 208 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2804
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1f4 -InterruptEvent 294 -NGENProcess 260 -Pipe 28c -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2732
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 294 -InterruptEvent 210 -NGENProcess 298 -Pipe 274 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:3068
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 210 -InterruptEvent 280 -NGENProcess 29c -Pipe 288 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2996
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 280 -InterruptEvent 2a4 -NGENProcess 260 -Pipe 200 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2648
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 294 -InterruptEvent 2a8 -NGENProcess 210 -Pipe 2a4 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2428
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2a8 -InterruptEvent 2b0 -NGENProcess 260 -Pipe 2a0 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1988
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2a8 -InterruptEvent 2ac -NGENProcess 294 -Pipe 29c -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1788
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2ac -InterruptEvent 280 -NGENProcess 2b0 -Pipe 210 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2620
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 280 -InterruptEvent 2b0 -NGENProcess 2b8 -Pipe 2bc -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1740
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2b0 -InterruptEvent 260 -NGENProcess 1f4 -Pipe 298 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2116
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 260 -InterruptEvent 2c0 -NGENProcess 2ac -Pipe 264 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2640
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2c0 -InterruptEvent 2c8 -NGENProcess 2b8 -Pipe 2c4 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1012
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2c8 -InterruptEvent 2b4 -NGENProcess 294 -Pipe 1f4 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:552
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 298 -InterruptEvent 218 -NGENProcess 2bc -Pipe 238 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2116
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 218 -InterruptEvent 268 -NGENProcess 29c -Pipe 1f8 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2280
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 25c -InterruptEvent 298 -NGENProcess 278 -Pipe 218 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:568
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 298 -InterruptEvent 27c -NGENProcess 29c -Pipe 26c -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1380
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 27c -InterruptEvent 23c -NGENProcess 268 -Pipe 284 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:1744
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 23c -InterruptEvent 29c -NGENProcess 268 -Pipe 25c -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1772
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 29c -InterruptEvent 2cc -NGENProcess 1e4 -Pipe 1f0 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:2608
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2cc -InterruptEvent 1e4 -NGENProcess 23c -Pipe 264 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2080
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1e4 -InterruptEvent 2c8 -NGENProcess 268 -Pipe 278 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:2884
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2c8 -InterruptEvent 268 -NGENProcess 2cc -Pipe 2b0 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1704
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 268 -InterruptEvent 2b4 -NGENProcess 23c -Pipe 29c -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1948
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2b4 -InterruptEvent 23c -NGENProcess 2c8 -Pipe 2a8 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2880
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2b8 -InterruptEvent 298 -NGENProcess 260 -Pipe 2b4 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2892
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 298 -InterruptEvent 260 -NGENProcess 2cc -Pipe 2c8 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2348
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 260 -InterruptEvent 2ac -NGENProcess 23c -Pipe 290 -Comment "NGen Worker Process"2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2284
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2ac -InterruptEvent 23c -NGENProcess 298 -Pipe 1e4 -Comment "NGen Worker Process"2⤵PID:1268
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 23c -InterruptEvent 2d0 -NGENProcess 2cc -Pipe 2b8 -Comment "NGen Worker Process"2⤵PID:2708
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2d0 -InterruptEvent 2cc -NGENProcess 2ac -Pipe 280 -Comment "NGen Worker Process"2⤵PID:688
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2cc -InterruptEvent 2d8 -NGENProcess 298 -Pipe 260 -Comment "NGen Worker Process"2⤵
- Drops file in Windows directory
PID:2768
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2d8 -InterruptEvent 298 -NGENProcess 2d0 -Pipe 2d4 -Comment "NGen Worker Process"2⤵PID:536
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 298 -InterruptEvent 2e0 -NGENProcess 2ac -Pipe 23c -Comment "NGen Worker Process"2⤵PID:2156
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2e0 -InterruptEvent 2ac -NGENProcess 2d8 -Pipe 2dc -Comment "NGen Worker Process"2⤵PID:656
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2ac -InterruptEvent 2e8 -NGENProcess 2d0 -Pipe 2cc -Comment "NGen Worker Process"2⤵
- Drops file in Windows directory
PID:2336
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2e8 -InterruptEvent 2d0 -NGENProcess 2e0 -Pipe 2e4 -Comment "NGen Worker Process"2⤵PID:2080
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2d0 -InterruptEvent 2f0 -NGENProcess 2d8 -Pipe 298 -Comment "NGen Worker Process"2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2192
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2f0 -InterruptEvent 2d8 -NGENProcess 2e8 -Pipe 2ec -Comment "NGen Worker Process"2⤵PID:2956
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2d8 -InterruptEvent 2f8 -NGENProcess 2e0 -Pipe 2ac -Comment "NGen Worker Process"2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2148
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2fc -InterruptEvent 2f0 -NGENProcess 300 -Pipe 2d8 -Comment "NGen Worker Process"2⤵PID:936
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2f0 -InterruptEvent 268 -NGENProcess 2e0 -Pipe 2d0 -Comment "NGen Worker Process"2⤵PID:2016
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 268 -InterruptEvent 2e0 -NGENProcess 2fc -Pipe 2f8 -Comment "NGen Worker Process"2⤵
- System Location Discovery: System Language Discovery
PID:2000
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2e0 -InterruptEvent 308 -NGENProcess 300 -Pipe 2bc -Comment "NGen Worker Process"2⤵
- Drops file in Windows directory
PID:2328
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 308 -InterruptEvent 300 -NGENProcess 268 -Pipe 304 -Comment "NGen Worker Process"2⤵PID:1312
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 300 -InterruptEvent 310 -NGENProcess 2fc -Pipe 2f0 -Comment "NGen Worker Process"2⤵
- Drops file in Windows directory
PID:2264
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 310 -InterruptEvent 2fc -NGENProcess 308 -Pipe 30c -Comment "NGen Worker Process"2⤵PID:976
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2fc -InterruptEvent 308 -NGENProcess 268 -Pipe 2e0 -Comment "NGen Worker Process"2⤵
- Drops file in Windows directory
PID:2640
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 308 -InterruptEvent 268 -NGENProcess 310 -Pipe 314 -Comment "NGen Worker Process"2⤵
- Modifies data under HKEY_USERS
PID:808
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 268 -InterruptEvent 320 -NGENProcess 318 -Pipe 300 -Comment "NGen Worker Process"2⤵PID:1844
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 320 -InterruptEvent 324 -NGENProcess 31c -Pipe 294 -Comment "NGen Worker Process"2⤵PID:2768
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 324 -InterruptEvent 328 -NGENProcess 310 -Pipe 2fc -Comment "NGen Worker Process"2⤵PID:1524
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 328 -InterruptEvent 32c -NGENProcess 318 -Pipe 2f4 -Comment "NGen Worker Process"2⤵
- Drops file in Windows directory
PID:2508
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 32c -InterruptEvent 318 -NGENProcess 324 -Pipe 31c -Comment "NGen Worker Process"2⤵
- Drops file in Windows directory
PID:2148
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 318 -InterruptEvent 324 -NGENProcess 308 -Pipe 310 -Comment "NGen Worker Process"2⤵PID:1956
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 324 -InterruptEvent 338 -NGENProcess 330 -Pipe 320 -Comment "NGen Worker Process"2⤵PID:2772
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 338 -InterruptEvent 33c -NGENProcess 334 -Pipe 328 -Comment "NGen Worker Process"2⤵PID:2208
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 33c -InterruptEvent 340 -NGENProcess 308 -Pipe 32c -Comment "NGen Worker Process"2⤵PID:896
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 340 -InterruptEvent 344 -NGENProcess 330 -Pipe 268 -Comment "NGen Worker Process"2⤵PID:1520
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 344 -InterruptEvent 34c -NGENProcess 334 -Pipe 318 -Comment "NGen Worker Process"2⤵PID:2348
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 34c -InterruptEvent 348 -NGENProcess 2e8 -Pipe 324 -Comment "NGen Worker Process"2⤵
- System Location Discovery: System Language Discovery
PID:1532
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 348 -InterruptEvent 350 -NGENProcess 330 -Pipe 338 -Comment "NGen Worker Process"2⤵PID:1344
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 350 -InterruptEvent 354 -NGENProcess 334 -Pipe 33c -Comment "NGen Worker Process"2⤵PID:2772
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 354 -InterruptEvent 358 -NGENProcess 2e8 -Pipe 340 -Comment "NGen Worker Process"2⤵
- System Location Discovery: System Language Discovery
PID:3068
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 358 -InterruptEvent 35c -NGENProcess 330 -Pipe 344 -Comment "NGen Worker Process"2⤵PID:2044
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 35c -InterruptEvent 360 -NGENProcess 334 -Pipe 34c -Comment "NGen Worker Process"2⤵PID:1612
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 360 -InterruptEvent 364 -NGENProcess 2e8 -Pipe 348 -Comment "NGen Worker Process"2⤵
- System Location Discovery: System Language Discovery
PID:756
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 364 -InterruptEvent 368 -NGENProcess 330 -Pipe 350 -Comment "NGen Worker Process"2⤵PID:2024
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 368 -InterruptEvent 36c -NGENProcess 334 -Pipe 354 -Comment "NGen Worker Process"2⤵PID:1280
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 36c -InterruptEvent 370 -NGENProcess 2e8 -Pipe 358 -Comment "NGen Worker Process"2⤵
- Modifies data under HKEY_USERS
PID:2000
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 370 -InterruptEvent 374 -NGENProcess 330 -Pipe 35c -Comment "NGen Worker Process"2⤵
- System Location Discovery: System Language Discovery
PID:1572
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 374 -InterruptEvent 378 -NGENProcess 334 -Pipe 360 -Comment "NGen Worker Process"2⤵
- System Location Discovery: System Language Discovery
PID:1312
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 378 -InterruptEvent 37c -NGENProcess 2e8 -Pipe 364 -Comment "NGen Worker Process"2⤵PID:3028
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 37c -InterruptEvent 380 -NGENProcess 330 -Pipe 368 -Comment "NGen Worker Process"2⤵PID:2016
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 380 -InterruptEvent 384 -NGENProcess 334 -Pipe 36c -Comment "NGen Worker Process"2⤵PID:2700
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 384 -InterruptEvent 388 -NGENProcess 2e8 -Pipe 370 -Comment "NGen Worker Process"2⤵PID:2948
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 388 -InterruptEvent 38c -NGENProcess 330 -Pipe 374 -Comment "NGen Worker Process"2⤵PID:3068
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 38c -InterruptEvent 390 -NGENProcess 334 -Pipe 378 -Comment "NGen Worker Process"2⤵PID:936
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 390 -InterruptEvent 394 -NGENProcess 2e8 -Pipe 37c -Comment "NGen Worker Process"2⤵
- Modifies data under HKEY_USERS
PID:656
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 394 -InterruptEvent 398 -NGENProcess 330 -Pipe 380 -Comment "NGen Worker Process"2⤵
- Modifies data under HKEY_USERS
PID:2180
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 398 -InterruptEvent 39c -NGENProcess 334 -Pipe 384 -Comment "NGen Worker Process"2⤵
- Modifies data under HKEY_USERS
PID:2348
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 394 -InterruptEvent 398 -NGENProcess 39c -Pipe 334 -Comment "NGen Worker Process"2⤵
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:348
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 398 -InterruptEvent 388 -NGENProcess 3a0 -Pipe 38c -Comment "NGen Worker Process"2⤵
- Modifies data under HKEY_USERS
PID:1380
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 388 -InterruptEvent 3a0 -NGENProcess 390 -Pipe 3ac -Comment "NGen Worker Process"2⤵
- Modifies data under HKEY_USERS
PID:2640
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3a0 -InterruptEvent 308 -NGENProcess 3a8 -Pipe 2e8 -Comment "NGen Worker Process"2⤵
- Modifies data under HKEY_USERS
PID:920
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3b0 -InterruptEvent 388 -NGENProcess 3b4 -Pipe 3a0 -Comment "NGen Worker Process"2⤵
- Modifies data under HKEY_USERS
PID:1600
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 388 -InterruptEvent 330 -NGENProcess 3a8 -Pipe 3a4 -Comment "NGen Worker Process"2⤵
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:2700
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 330 -InterruptEvent 3b8 -NGENProcess 308 -Pipe 39c -Comment "NGen Worker Process"2⤵
- Modifies data under HKEY_USERS
PID:2348
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3b8 -InterruptEvent 3bc -NGENProcess 3b4 -Pipe 394 -Comment "NGen Worker Process"2⤵
- Modifies data under HKEY_USERS
PID:1092
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3bc -InterruptEvent 3c0 -NGENProcess 3a8 -Pipe 398 -Comment "NGen Worker Process"2⤵
- Drops file in Windows directory
- Modifies data under HKEY_USERS
PID:276
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3a8 -InterruptEvent 330 -NGENProcess 3c8 -Pipe 3c0 -Comment "NGen Worker Process"2⤵
- Modifies data under HKEY_USERS
PID:1760
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 330 -InterruptEvent 3cc -NGENProcess 390 -Pipe 3b0 -Comment "NGen Worker Process"2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:2944
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3cc -InterruptEvent 390 -NGENProcess 3a8 -Pipe 3c4 -Comment "NGen Worker Process"2⤵PID:1704
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 390 -InterruptEvent 3d4 -NGENProcess 3c8 -Pipe 3b8 -Comment "NGen Worker Process"2⤵
- Drops file in Windows directory
- Modifies data under HKEY_USERS
PID:2408
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3d4 -InterruptEvent 3c8 -NGENProcess 3cc -Pipe 3d0 -Comment "NGen Worker Process"2⤵PID:2620
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3c8 -InterruptEvent 3dc -NGENProcess 3a8 -Pipe 330 -Comment "NGen Worker Process"2⤵
- Modifies data under HKEY_USERS
PID:2520
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3dc -InterruptEvent 3e0 -NGENProcess 3d8 -Pipe 3b4 -Comment "NGen Worker Process"2⤵
- Drops file in Windows directory
- Modifies data under HKEY_USERS
PID:1736
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3e4 -InterruptEvent 3c8 -NGENProcess 3e8 -Pipe 3dc -Comment "NGen Worker Process"2⤵PID:2124
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3c8 -InterruptEvent 390 -NGENProcess 3d8 -Pipe 308 -Comment "NGen Worker Process"2⤵PID:1744
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 390 -InterruptEvent 3ec -NGENProcess 3e0 -Pipe 388 -Comment "NGen Worker Process"2⤵
- System Location Discovery: System Language Discovery
PID:1920
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3ec -InterruptEvent 3e0 -NGENProcess 3e4 -Pipe 3f4 -Comment "NGen Worker Process"2⤵PID:2280
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3e0 -InterruptEvent 3d4 -NGENProcess 3f0 -Pipe 3cc -Comment "NGen Worker Process"2⤵PID:2620
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3d4 -InterruptEvent 3f8 -NGENProcess 390 -Pipe 3a8 -Comment "NGen Worker Process"2⤵PID:3064
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3f8 -InterruptEvent 3fc -NGENProcess 3e4 -Pipe 3e8 -Comment "NGen Worker Process"2⤵PID:688
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3fc -InterruptEvent 404 -NGENProcess 3f0 -Pipe 3c8 -Comment "NGen Worker Process"2⤵
- System Location Discovery: System Language Discovery
PID:2328
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 404 -InterruptEvent 408 -NGENProcess 390 -Pipe 3ec -Comment "NGen Worker Process"2⤵
- System Location Discovery: System Language Discovery
PID:3024
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 408 -InterruptEvent 40c -NGENProcess 3e4 -Pipe 3e0 -Comment "NGen Worker Process"2⤵PID:2368
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 40c -InterruptEvent 410 -NGENProcess 3f0 -Pipe 3d4 -Comment "NGen Worker Process"2⤵PID:1920
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 410 -InterruptEvent 414 -NGENProcess 390 -Pipe 3f8 -Comment "NGen Worker Process"2⤵PID:1784
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 408 -InterruptEvent 418 -NGENProcess 40c -Pipe 414 -Comment "NGen Worker Process"2⤵PID:2420
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 418 -InterruptEvent 3fc -NGENProcess 390 -Pipe 404 -Comment "NGen Worker Process"2⤵
- System Location Discovery: System Language Discovery
PID:1152
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3fc -InterruptEvent 420 -NGENProcess 410 -Pipe 3d8 -Comment "NGen Worker Process"2⤵PID:2936
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 420 -InterruptEvent 424 -NGENProcess 40c -Pipe 41c -Comment "NGen Worker Process"2⤵
- System Location Discovery: System Language Discovery
PID:2956
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 424 -InterruptEvent 428 -NGENProcess 390 -Pipe 3e4 -Comment "NGen Worker Process"2⤵PID:1032
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 428 -InterruptEvent 42c -NGENProcess 410 -Pipe 408 -Comment "NGen Worker Process"2⤵PID:1380
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 420 -InterruptEvent 42c -NGENProcess 40c -Pipe 430 -Comment "NGen Worker Process"2⤵PID:1920
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 42c -InterruptEvent 418 -NGENProcess 410 -Pipe 3fc -Comment "NGen Worker Process"2⤵
- System Location Discovery: System Language Discovery
PID:2708
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 418 -InterruptEvent 410 -NGENProcess 420 -Pipe 424 -Comment "NGen Worker Process"2⤵
- System Location Discovery: System Language Discovery
PID:1208
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 410 -InterruptEvent 43c -NGENProcess 40c -Pipe 434 -Comment "NGen Worker Process"2⤵
- Drops file in Windows directory
PID:1948
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 43c -InterruptEvent 40c -NGENProcess 418 -Pipe 438 -Comment "NGen Worker Process"2⤵PID:2092
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 40c -InterruptEvent 444 -NGENProcess 420 -Pipe 42c -Comment "NGen Worker Process"2⤵
- System Location Discovery: System Language Discovery
PID:1612
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 444 -InterruptEvent 448 -NGENProcess 440 -Pipe 3f0 -Comment "NGen Worker Process"2⤵PID:920
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 448 -InterruptEvent 44c -NGENProcess 418 -Pipe 410 -Comment "NGen Worker Process"2⤵PID:1920
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 44c -InterruptEvent 454 -NGENProcess 420 -Pipe 450 -Comment "NGen Worker Process"2⤵PID:688
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 454 -InterruptEvent 428 -NGENProcess 390 -Pipe 440 -Comment "NGen Worker Process"2⤵
- Drops file in Windows directory
PID:1704
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 428 -InterruptEvent 390 -NGENProcess 44c -Pipe 444 -Comment "NGen Worker Process"2⤵
- System Location Discovery: System Language Discovery
PID:1528
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 390 -InterruptEvent 45c -NGENProcess 420 -Pipe 40c -Comment "NGen Worker Process"2⤵
- Drops file in Windows directory
PID:2892
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 45c -InterruptEvent 420 -NGENProcess 428 -Pipe 458 -Comment "NGen Worker Process"2⤵PID:680
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 420 -InterruptEvent 464 -NGENProcess 44c -Pipe 454 -Comment "NGen Worker Process"2⤵PID:2156
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 464 -InterruptEvent 468 -NGENProcess 460 -Pipe 43c -Comment "NGen Worker Process"2⤵PID:2732
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 468 -InterruptEvent 46c -NGENProcess 428 -Pipe 390 -Comment "NGen Worker Process"2⤵
- Drops file in Windows directory
PID:2960
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 46c -InterruptEvent 428 -NGENProcess 464 -Pipe 44c -Comment "NGen Worker Process"2⤵
- System Location Discovery: System Language Discovery
PID:1704
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 428 -InterruptEvent 474 -NGENProcess 460 -Pipe 45c -Comment "NGen Worker Process"2⤵
- Drops file in Windows directory
PID:3028
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 474 -InterruptEvent 460 -NGENProcess 46c -Pipe 470 -Comment "NGen Worker Process"2⤵PID:936
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 460 -InterruptEvent 47c -NGENProcess 464 -Pipe 468 -Comment "NGen Worker Process"2⤵PID:680
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 47c -InterruptEvent 480 -NGENProcess 478 -Pipe 448 -Comment "NGen Worker Process"2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2580
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 480 -InterruptEvent 478 -NGENProcess 460 -Pipe 46c -Comment "NGen Worker Process"2⤵
- System Location Discovery: System Language Discovery
PID:1960
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 480 -InterruptEvent 460 -NGENProcess 478 -Pipe 488 -Comment "NGen Worker Process"2⤵
- Drops file in Windows directory
PID:1948
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 460 -InterruptEvent 478 -NGENProcess 464 -Pipe 484 -Comment "NGen Worker Process"2⤵PID:3028
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 478 -InterruptEvent 490 -NGENProcess 420 -Pipe 47c -Comment "NGen Worker Process"2⤵PID:1920
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 490 -InterruptEvent 494 -NGENProcess 48c -Pipe 428 -Comment "NGen Worker Process"2⤵PID:2536
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 494 -InterruptEvent 498 -NGENProcess 464 -Pipe 480 -Comment "NGen Worker Process"2⤵
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:2408
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 498 -InterruptEvent 49c -NGENProcess 420 -Pipe 474 -Comment "NGen Worker Process"2⤵
- Modifies data under HKEY_USERS
PID:2192
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 4a0 -InterruptEvent 494 -NGENProcess 4a4 -Pipe 498 -Comment "NGen Worker Process"2⤵PID:2996
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 494 -InterruptEvent 460 -NGENProcess 420 -Pipe 478 -Comment "NGen Worker Process"2⤵
- System Location Discovery: System Language Discovery
PID:2340
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 460 -InterruptEvent 4a8 -NGENProcess 49c -Pipe 418 -Comment "NGen Worker Process"2⤵
- System Location Discovery: System Language Discovery
PID:2304
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 4a8 -InterruptEvent 4ac -NGENProcess 4a4 -Pipe 490 -Comment "NGen Worker Process"2⤵
- System Location Discovery: System Language Discovery
PID:2244
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 4ac -InterruptEvent 4b0 -NGENProcess 420 -Pipe 48c -Comment "NGen Worker Process"2⤵
- Drops file in Windows directory
PID:1772
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 4b0 -InterruptEvent 420 -NGENProcess 4a8 -Pipe 49c -Comment "NGen Worker Process"2⤵PID:2300
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 420 -InterruptEvent 4b8 -NGENProcess 4a4 -Pipe 494 -Comment "NGen Worker Process"2⤵
- Modifies data under HKEY_USERS
PID:1844
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 4b8 -InterruptEvent 4bc -NGENProcess 4b4 -Pipe 460 -Comment "NGen Worker Process"2⤵
- Modifies data under HKEY_USERS
PID:2840
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 4bc -InterruptEvent 4b8 -NGENProcess 4b0 -Pipe 4a8 -Comment "NGen Worker Process"2⤵PID:2540
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 4b8 -InterruptEvent 4ac -NGENProcess 4c0 -Pipe 4a0 -Comment "NGen Worker Process"2⤵PID:296
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 4ac -InterruptEvent 4c8 -NGENProcess 4b4 -Pipe 464 -Comment "NGen Worker Process"2⤵
- System Location Discovery: System Language Discovery
PID:2328
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 4c8 -InterruptEvent 4cc -NGENProcess 4b0 -Pipe 420 -Comment "NGen Worker Process"2⤵PID:1700
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 4cc -InterruptEvent 4d0 -NGENProcess 4c0 -Pipe 4c4 -Comment "NGen Worker Process"2⤵PID:1856
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 4d0 -InterruptEvent 4d4 -NGENProcess 4b4 -Pipe 4bc -Comment "NGen Worker Process"2⤵PID:1736
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 4d4 -InterruptEvent 4d8 -NGENProcess 4b0 -Pipe 4b8 -Comment "NGen Worker Process"2⤵PID:608
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 4d8 -InterruptEvent 4dc -NGENProcess 4c0 -Pipe 4ac -Comment "NGen Worker Process"2⤵PID:808
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 4dc -InterruptEvent 4e0 -NGENProcess 4b4 -Pipe 4c8 -Comment "NGen Worker Process"2⤵PID:1664
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 4e0 -InterruptEvent 4e4 -NGENProcess 4b0 -Pipe 4cc -Comment "NGen Worker Process"2⤵
- System Location Discovery: System Language Discovery
PID:3064
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 4e4 -InterruptEvent 4e8 -NGENProcess 4c0 -Pipe 4d0 -Comment "NGen Worker Process"2⤵
- System Location Discovery: System Language Discovery
PID:1704
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 4e8 -InterruptEvent 4ec -NGENProcess 4b4 -Pipe 4d4 -Comment "NGen Worker Process"2⤵PID:1344
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 4ec -InterruptEvent 4b4 -NGENProcess 4e0 -Pipe 4f4 -Comment "NGen Worker Process"2⤵
- System Location Discovery: System Language Discovery
PID:2768
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 4b4 -InterruptEvent 4d8 -NGENProcess 4f0 -Pipe 4dc -Comment "NGen Worker Process"2⤵PID:1724
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 4d8 -InterruptEvent 4f8 -NGENProcess 4e8 -Pipe 4a4 -Comment "NGen Worker Process"2⤵PID:2024
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 4f8 -InterruptEvent 4fc -NGENProcess 4e0 -Pipe 4b0 -Comment "NGen Worker Process"2⤵PID:296
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 500 -InterruptEvent 4d8 -NGENProcess 504 -Pipe 4f8 -Comment "NGen Worker Process"2⤵PID:2536
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 4d8 -InterruptEvent 4e4 -NGENProcess 4e0 -Pipe 4ec -Comment "NGen Worker Process"2⤵PID:2456
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 4e4 -InterruptEvent 508 -NGENProcess 4fc -Pipe 4c0 -Comment "NGen Worker Process"2⤵PID:1704
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 508 -InterruptEvent 50c -NGENProcess 504 -Pipe 4b4 -Comment "NGen Worker Process"2⤵PID:1820
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 50c -InterruptEvent 510 -NGENProcess 4e0 -Pipe 4f0 -Comment "NGen Worker Process"2⤵PID:2304
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 510 -InterruptEvent 514 -NGENProcess 4fc -Pipe 500 -Comment "NGen Worker Process"2⤵
- System Location Discovery: System Language Discovery
PID:1724
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 514 -InterruptEvent 518 -NGENProcess 504 -Pipe 4d8 -Comment "NGen Worker Process"2⤵PID:2024
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 518 -InterruptEvent 51c -NGENProcess 4e0 -Pipe 4e4 -Comment "NGen Worker Process"2⤵PID:296
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 51c -InterruptEvent 4e0 -NGENProcess 510 -Pipe 524 -Comment "NGen Worker Process"2⤵
- Modifies data under HKEY_USERS
PID:1856
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 4e0 -InterruptEvent 508 -NGENProcess 520 -Pipe 50c -Comment "NGen Worker Process"2⤵PID:1988
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 528 -InterruptEvent 51c -NGENProcess 52c -Pipe 4e0 -Comment "NGen Worker Process"2⤵PID:1488
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 51c -InterruptEvent 4e8 -NGENProcess 520 -Pipe 4fc -Comment "NGen Worker Process"2⤵
- System Location Discovery: System Language Discovery
PID:2696
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 4e8 -InterruptEvent 530 -NGENProcess 508 -Pipe 504 -Comment "NGen Worker Process"2⤵PID:920
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 530 -InterruptEvent 534 -NGENProcess 52c -Pipe 514 -Comment "NGen Worker Process"2⤵PID:1664
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 538 -InterruptEvent 4e8 -NGENProcess 53c -Pipe 530 -Comment "NGen Worker Process"2⤵PID:3044
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 4e8 -InterruptEvent 518 -NGENProcess 52c -Pipe 528 -Comment "NGen Worker Process"2⤵PID:296
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 518 -InterruptEvent 540 -NGENProcess 534 -Pipe 510 -Comment "NGen Worker Process"2⤵
- System Location Discovery: System Language Discovery
PID:1856
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 540 -InterruptEvent 544 -NGENProcess 53c -Pipe 51c -Comment "NGen Worker Process"2⤵PID:2264
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 544 -InterruptEvent 548 -NGENProcess 52c -Pipe 520 -Comment "NGen Worker Process"2⤵
- System Location Discovery: System Language Discovery
PID:552
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 548 -InterruptEvent 54c -NGENProcess 534 -Pipe 538 -Comment "NGen Worker Process"2⤵
- System Location Discovery: System Language Discovery
PID:1012
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 54c -InterruptEvent 534 -NGENProcess 540 -Pipe 554 -Comment "NGen Worker Process"2⤵PID:2976
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 534 -InterruptEvent 4e8 -NGENProcess 550 -Pipe 518 -Comment "NGen Worker Process"2⤵
- System Location Discovery: System Language Discovery
PID:2772
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 4e8 -InterruptEvent 558 -NGENProcess 548 -Pipe 508 -Comment "NGen Worker Process"2⤵PID:1520
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 558 -InterruptEvent 55c -NGENProcess 540 -Pipe 53c -Comment "NGen Worker Process"2⤵
- Modifies data under HKEY_USERS
PID:936
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 560 -InterruptEvent 4e8 -NGENProcess 564 -Pipe 558 -Comment "NGen Worker Process"2⤵PID:2840
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 4e8 -InterruptEvent 564 -NGENProcess 534 -Pipe 568 -Comment "NGen Worker Process"2⤵
- System Location Discovery: System Language Discovery
PID:1772
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 564 -InterruptEvent 54c -NGENProcess 544 -Pipe 52c -Comment "NGen Worker Process"2⤵PID:2732
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 54c -InterruptEvent 56c -NGENProcess 560 -Pipe 548 -Comment "NGen Worker Process"2⤵PID:2368
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 56c -InterruptEvent 570 -NGENProcess 534 -Pipe 550 -Comment "NGen Worker Process"2⤵PID:1732
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 570 -InterruptEvent 574 -NGENProcess 544 -Pipe 540 -Comment "NGen Worker Process"2⤵PID:296
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 574 -InterruptEvent 578 -NGENProcess 560 -Pipe 4e8 -Comment "NGen Worker Process"2⤵PID:1520
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 578 -InterruptEvent 57c -NGENProcess 534 -Pipe 564 -Comment "NGen Worker Process"2⤵PID:1660
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 57c -InterruptEvent 534 -NGENProcess 570 -Pipe 584 -Comment "NGen Worker Process"2⤵
- System Location Discovery: System Language Discovery
PID:1448
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 534 -InterruptEvent 54c -NGENProcess 580 -Pipe 56c -Comment "NGen Worker Process"2⤵
- System Location Discovery: System Language Discovery
PID:1700
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 54c -InterruptEvent 588 -NGENProcess 578 -Pipe 55c -Comment "NGen Worker Process"2⤵PID:2996
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 588 -InterruptEvent 58c -NGENProcess 570 -Pipe 544 -Comment "NGen Worker Process"2⤵
- System Location Discovery: System Language Discovery
PID:836
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 58c -InterruptEvent 578 -NGENProcess 580 -Pipe 570 -Comment "NGen Worker Process"2⤵
- System Location Discovery: System Language Discovery
PID:1760
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 578 -InterruptEvent 594 -NGENProcess 574 -Pipe 57c -Comment "NGen Worker Process"2⤵PID:1856
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 594 -InterruptEvent 598 -NGENProcess 590 -Pipe 534 -Comment "NGen Worker Process"2⤵
- System Location Discovery: System Language Discovery
PID:1596
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 598 -InterruptEvent 59c -NGENProcess 580 -Pipe 54c -Comment "NGen Worker Process"2⤵PID:552
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 59c -InterruptEvent 5a0 -NGENProcess 574 -Pipe 588 -Comment "NGen Worker Process"2⤵PID:2088
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 5a0 -InterruptEvent 5a4 -NGENProcess 590 -Pipe 58c -Comment "NGen Worker Process"2⤵
- System Location Discovery: System Language Discovery
PID:2116
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 5a8 -InterruptEvent 59c -NGENProcess 5ac -Pipe 5a0 -Comment "NGen Worker Process"2⤵PID:1732
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 59c -InterruptEvent 578 -NGENProcess 590 -Pipe 594 -Comment "NGen Worker Process"2⤵PID:1312
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 578 -InterruptEvent 590 -NGENProcess 580 -Pipe 5b4 -Comment "NGen Worker Process"2⤵PID:2340
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 590 -InterruptEvent 560 -NGENProcess 5b0 -Pipe 598 -Comment "NGen Worker Process"2⤵PID:2840
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 560 -InterruptEvent 5b8 -NGENProcess 59c -Pipe 574 -Comment "NGen Worker Process"2⤵
- System Location Discovery: System Language Discovery
PID:2960
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 5b8 -InterruptEvent 5bc -NGENProcess 580 -Pipe 5a4 -Comment "NGen Worker Process"2⤵PID:1472
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 5bc -InterruptEvent 5c0 -NGENProcess 5b0 -Pipe 5a8 -Comment "NGen Worker Process"2⤵PID:2432
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 5c0 -InterruptEvent 5c4 -NGENProcess 59c -Pipe 578 -Comment "NGen Worker Process"2⤵PID:1948
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 5c4 -InterruptEvent 5c8 -NGENProcess 580 -Pipe 590 -Comment "NGen Worker Process"2⤵PID:980
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 5c8 -InterruptEvent 5cc -NGENProcess 5b0 -Pipe 560 -Comment "NGen Worker Process"2⤵PID:1048
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 5cc -InterruptEvent 5d0 -NGENProcess 59c -Pipe 5b8 -Comment "NGen Worker Process"2⤵PID:680
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 5d0 -InterruptEvent 5d4 -NGENProcess 580 -Pipe 5bc -Comment "NGen Worker Process"2⤵
- System Location Discovery: System Language Discovery
PID:2284
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 5d4 -InterruptEvent 5d8 -NGENProcess 5b0 -Pipe 5c0 -Comment "NGen Worker Process"2⤵PID:1032
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 5d8 -InterruptEvent 5dc -NGENProcess 59c -Pipe 5c4 -Comment "NGen Worker Process"2⤵
- System Location Discovery: System Language Discovery
PID:2660
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 5dc -InterruptEvent 5e0 -NGENProcess 5d4 -Pipe 5d0 -Comment "NGen Worker Process"2⤵PID:1152
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 5e0 -InterruptEvent 5c8 -NGENProcess 59c -Pipe 5cc -Comment "NGen Worker Process"2⤵PID:2896
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 5c8 -InterruptEvent 5e8 -NGENProcess 5d8 -Pipe 5ac -Comment "NGen Worker Process"2⤵
- System Location Discovery: System Language Discovery
PID:1856
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 5e8 -InterruptEvent 5ec -NGENProcess 5d4 -Pipe 5e4 -Comment "NGen Worker Process"2⤵PID:2580
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 5ec -InterruptEvent 5f0 -NGENProcess 59c -Pipe 580 -Comment "NGen Worker Process"2⤵PID:1600
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 5f0 -InterruptEvent 5f4 -NGENProcess 5d8 -Pipe 5dc -Comment "NGen Worker Process"2⤵PID:2092
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 5f8 -InterruptEvent 5f4 -NGENProcess 5f0 -Pipe 5d4 -Comment "NGen Worker Process"2⤵
- System Location Discovery: System Language Discovery
PID:2640
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 5f4 -InterruptEvent 5e0 -NGENProcess 5d8 -Pipe 5c8 -Comment "NGen Worker Process"2⤵PID:2324
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 5e0 -InterruptEvent 600 -NGENProcess 5ec -Pipe 5b0 -Comment "NGen Worker Process"2⤵PID:2304
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 600 -InterruptEvent 604 -NGENProcess 5f0 -Pipe 5fc -Comment "NGen Worker Process"2⤵PID:1092
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 604 -InterruptEvent 608 -NGENProcess 5d8 -Pipe 5e8 -Comment "NGen Worker Process"2⤵PID:2840
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 608 -InterruptEvent 60c -NGENProcess 5ec -Pipe 5f8 -Comment "NGen Worker Process"2⤵PID:2884
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 60c -InterruptEvent 610 -NGENProcess 5f0 -Pipe 5f4 -Comment "NGen Worker Process"2⤵PID:2264
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 610 -InterruptEvent 614 -NGENProcess 5d8 -Pipe 5e0 -Comment "NGen Worker Process"2⤵PID:2332
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 614 -InterruptEvent 618 -NGENProcess 5ec -Pipe 600 -Comment "NGen Worker Process"2⤵PID:1784
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 618 -InterruptEvent 61c -NGENProcess 5f0 -Pipe 604 -Comment "NGen Worker Process"2⤵
- System Location Discovery: System Language Discovery
PID:1660
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 61c -InterruptEvent 620 -NGENProcess 5d8 -Pipe 608 -Comment "NGen Worker Process"2⤵PID:2948
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 620 -InterruptEvent 624 -NGENProcess 5ec -Pipe 60c -Comment "NGen Worker Process"2⤵PID:936
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 624 -InterruptEvent 628 -NGENProcess 5f0 -Pipe 610 -Comment "NGen Worker Process"2⤵PID:2256
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 628 -InterruptEvent 62c -NGENProcess 5d8 -Pipe 614 -Comment "NGen Worker Process"2⤵PID:2768
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 62c -InterruptEvent 630 -NGENProcess 5ec -Pipe 618 -Comment "NGen Worker Process"2⤵PID:1572
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 630 -InterruptEvent 634 -NGENProcess 5f0 -Pipe 61c -Comment "NGen Worker Process"2⤵PID:896
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 634 -InterruptEvent 638 -NGENProcess 5d8 -Pipe 620 -Comment "NGen Worker Process"2⤵
- System Location Discovery: System Language Discovery
PID:1464
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1376 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 1d0 -InterruptEvent 1bc -NGENProcess 1c0 -Pipe 1cc -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:264
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 1c8 -InterruptEvent 234 -NGENProcess 23c -Pipe 240 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1988
-
-
C:\Windows\ehome\ehRecvr.exeC:\Windows\ehome\ehRecvr.exe1⤵
- Executes dropped EXE
PID:1752
-
C:\Windows\ehome\ehsched.exeC:\Windows\ehome\ehsched.exe1⤵
- Executes dropped EXE
PID:1620
-
C:\Windows\eHome\EhTray.exe"C:\Windows\eHome\EhTray.exe" /nav:-21⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2016
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵
- Executes dropped EXE
PID:956
-
C:\Windows\ehome\ehRec.exeC:\Windows\ehome\ehRec.exe -Embedding1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1572
-
C:\Windows\system32\IEEtwCollector.exeC:\Windows\system32\IEEtwCollector.exe /V1⤵
- Executes dropped EXE
PID:1668
-
C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE"C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE" /auditservice1⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:2120
-
C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"1⤵
- Executes dropped EXE
PID:2660
-
C:\Windows\System32\msdtc.exeC:\Windows\System32\msdtc.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
PID:2800
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2796
-
C:\Program Files (x86)\Common Files\Microsoft Shared\Source Engine\OSE.EXE"C:\Program Files (x86)\Common Files\Microsoft Shared\Source Engine\OSE.EXE"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2736
-
C:\Windows\SysWow64\perfhost.exeC:\Windows\SysWow64\perfhost.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1792
-
C:\Windows\system32\locator.exeC:\Windows\system32\locator.exe1⤵
- Executes dropped EXE
PID:2984
-
C:\Windows\System32\snmptrap.exeC:\Windows\System32\snmptrap.exe1⤵
- Executes dropped EXE
PID:2836
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵
- Executes dropped EXE
PID:1848
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1140
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3056
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵
- Executes dropped EXE
PID:668
-
C:\Program Files\Windows Media Player\wmpnetwk.exe"C:\Program Files\Windows Media Player\wmpnetwk.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3036
-
C:\Windows\system32\SearchIndexer.exeC:\Windows\system32\SearchIndexer.exe /Embedding1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1036 -
C:\Windows\system32\SearchProtocolHost.exe"C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe1_ Global\UsGthrCtrlFltPipeMssGthrPipe1 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon"2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:2164
-
-
C:\Windows\system32\SearchFilterHost.exe"C:\Windows\system32\SearchFilterHost.exe" 0 588 592 600 65536 5962⤵PID:2612
-
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD57045349ef75604a89df6b64300d26afb
SHA15107146b6bf25ee6cd67e7b303d0b7d60e35e657
SHA25610669134bf1b7174b4fff6b1e085fee01dc4c7bc83684641637dd37e1b6a0d82
SHA5123098646af34f7d3381ca565ab6bbfac13e7d6869ba43d36c698b23a3373cd3127ed474d29b1ddca9131033d41fe1190e4aeb5755adc2f4b6320d82e2f72ec609
-
Filesize
1.4MB
MD5ff56e23ba6781df4d67e84d735dfb9ea
SHA1bf44ea71e6cc9530b2721700cef8ced30667633d
SHA256a8e5e3d8fc8eb5ab588b1874aadcbaff39c50cb0b9fd35249fa035befcce9056
SHA51244a10a21730f82aa8c8875ed30a357a9c68e0b5129a8fb7872be54d5a66da4f5531fa95c96ff24370bc7570b009df02ffc5b3a520cc866cdacfbe632bcda62c4
-
Filesize
30.1MB
MD5aece0c0ddf315cc641baa15f546b3fdf
SHA1da2208e0f62fb2a8c865e27a90f91accebe7c3b2
SHA256d91c1f97e68020fdb6e8fa2817b1c9c71cc69ea0bad1cff98cef566d214888f8
SHA5127fd98c39f50f79364c9886eb8290134c68f38150c70b22dc7396f29a711ec18c056cd60bb3e36a4fbca8ef61a902e053ff70c174d163ad7c8693d616ad8d42f6
-
Filesize
30.2MB
MD53fe5a95cf819c771143591e555790b97
SHA144d2125d5d37ba19bf8fc09218a256be4fe42730
SHA2564dda0d3e3810cd64df35a9cfba6ab89c60272dba5324c8c5c5d8c6f92e7d2d51
SHA512f2fca8965060e612afe2179206e9c54b90b22085e18ee161b79448da4a1bfca1977d20e4e9ee37975ef23976e6d10f0345fa024d59f94c08eefcde2d92578c8f
-
Filesize
1.4MB
MD5e6425a43385276bd0651a165c34aa275
SHA1fb7aba6b6c08592f72dc90aeab633aba10e281a2
SHA256f761617fd9482258d8ec329959cbe8f04ccdaf8603928afe3e8342e359a35e27
SHA5123b61389ff7b7d29217916bf4d6e05ee360ff60d4c722aa4498fea38c2dd7b9f62390cb606af852d445c3bb4acaed1a2e436e470612e454318cc8409ec024db68
-
Filesize
175B
MD51130c911bf5db4b8f7cf9b6f4b457623
SHA148e734c4bc1a8b5399bff4954e54b268bde9d54c
SHA256eba08cc8182f379392a97f542b350ea0dbbe5e4009472f35af20e3d857eafdf1
SHA51294e2511ef2c53494c2aff0960266491ffc0e54e75185427d1ccedae27c286992c754ca94cbb0c9ea36e3f04cd4eb7f032c551cf2d4b309f292906303f1a75fa0
-
Filesize
2.1MB
MD5b704cd77f06bf46102803d8ef608ef76
SHA142145778a4fcf04b301031835a93cb4d89936f5c
SHA2564ce71d04b3e32084499a908e7cadcd85b8d25845d253b61748562999ad631566
SHA51296584b826458d42c9566938c9bc7da942ac570b86601e661f9e0cc0843c6db4d8e2518036c8bffa9dee751950d6e560dabc632dbf439be6de414621772b1485c
-
Filesize
2.0MB
MD59565051911a5c83782f4b767b18599de
SHA1d45f2697eb24e539cf7ec50a1fb5ce91bb74d9c2
SHA25650aab0aa77291597c68a7ca8044aa48fee61a9aff136dbccb196f5372ba1e4c4
SHA5120050a6bc10f119f55ea38dc7ade22b6ebdcab978c0190286321f3ce64bd24b3e9e7c6a63063fa48d1e6a9892afbd9bfbffb469574401a297c5955b2a5d65fc0c
-
Filesize
1024KB
MD563ed9b1a53b30ed7eb7c0a785b53e54e
SHA1fa9c84aab9d90b519041cb48f4f43d536080ef53
SHA256acc7a05833674ee9d18dcc085ffdf887231c487f4627eb85fca7506abd184325
SHA5120176fcf16168c740a2e6b384911a421a68391eaf2cc860dc942be929ac24f17d20a991632a1e906bf75144a5ea6fdce66d4586afe83da8342899adaed946cf7e
-
Filesize
1024KB
MD5ebc6248a513cf3dabd39caca1c181549
SHA19ff017d8f3e26f71297ae17462f97cc18e7a320a
SHA2567bf0917b61d9053a4dd8ed11ba1397083e114d5cec8affaa9e3725814313991d
SHA512b050fb97597b14f2363579c0c40a0f36f4d5ee90a5179db649e12bc9bf7caa6f1c2519b6c9f0f52edbcae07ac82c27e32cea3a5bd1315b9a8b1c817b7d447b0f
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b91050d8b077a4e8.customDestinations-ms
Filesize24B
MD5b9bd716de6739e51c620f2086f9c31e4
SHA19733d94607a3cba277e567af584510edd9febf62
SHA2567116ff028244a01f3d17f1d3bc2e1506bc9999c2e40e388458f0cccc4e117312
SHA512cef609e54c7a81a646ad38dba7ac0b82401b220773b9c792cefac80c6564753229f0c011b34ffb56381dd3154a19aee2bf5f602c4d1af01f2cf0fbc1574e4478
-
Filesize
1.3MB
MD56ff7cd8adbe4f8dc2b6d6747e608803d
SHA12e2a4551d0de31bc98dac670e56808fa62981941
SHA256d849e110fb1c70f3dc5b1641d42e19c1363f58208caa374b95f5714a24cfb38a
SHA51245e299ac109e11522253d13130de01a22a34961478b08a8715a4a9f96e743587960a8cb6c31bcf9f0b5ea24b085cf6aad96f7bd415fd2fc7247858b9fa2d0d99
-
Filesize
872KB
MD5ef86369a36cfacc72611f7f7092ee581
SHA1ebd3110c5e019ae432a0ca4e899120c22b4f4495
SHA256ed2e5a68d291936b308ed5c0b697759c9de6506d957f7d6b0d67a2057e2c578a
SHA5128ce37fac4ab751bfd5165b352407320aed7d9fdf0e8725266e46bf8e4b5c8a8f398dbc2f9601479440df03f31ebf1efde5f2963a91952a3b1e2d003ba848a555
-
Filesize
1.3MB
MD5dbb080aa20844b6f8367058d2e6cf9fa
SHA1e97c6587f84d317cab70de682be261dfcdd6d94b
SHA2562a7244df596f56003be55dc787e8309dbea90239ded6a079400931c9bac7bcd8
SHA512ee07345e4619475c8aae7b3f1e431ca53bedc945576dc352a524a97da8fd2f153e73442f4c9d81f11a9d61be5238dba66cda58644e1f2999afd6f72c096578c1
-
Filesize
1.2MB
MD51fd02ec395ac33ce82834dc9abad2499
SHA1cab57da6b532b595897b3bb3e3d011196acf4414
SHA256d62ce386fa0caac6d1372a16c81da7884b290958ecfab10dff73fbd19395ac89
SHA512e5e37e18ceb744090f0a9ab7682f3c79715a49328324e4409f40c61cb62b2a72b104323c5f8b10cb3c87700ee4495739a7ad5c6e7db2fbbed571fe9ed761cb35
-
Filesize
1003KB
MD58ac0ba813218ecd564ad46436828dc83
SHA1dee6dca0de97aa89922d503180bb3b58878ff2dc
SHA2564ff95d789cf4341e4079d239f8c14183ccb036e3143cf0929dc0239c071f5fd8
SHA5124cd37cca79dfc115924e1739a838c690f2b62622a7e33759f2c0f445277ebb4e29e5d10ccea3bc586f93f98d9a165c15518df00f25e1a7e65c14011744402876
-
Filesize
1.3MB
MD53d87e536cfe91c44cd11a3da7a2c71d9
SHA1ed8b1c86b2cff3731932012b5efb52b65b157fcf
SHA25645f02f6bdf70a25ef2867241b8ac966cee3330e3e789085b076b9067b159a049
SHA512726d8065187f880d7e1ca1a9b5ca616431bc7ca6086b3f354a09948f4b6a9a44e4840e8fdc88d1da26d24e17063b5e5c989b75fad8601c2a187b60ee7a9a1c02
-
Filesize
8KB
MD52376fa879ef8805a86b233813d662022
SHA150ee8ada5b7bd57eb01ddefc8276d7794c642314
SHA2567c2931ffec3de31305d841d406c6185f55e0dcd41925bc530976cfac09d3951f
SHA51260c1147a986a448f28d75dc31f29f008a2daf279d3f9c6106489b29857844f111d974dbc442a843aa008347c369a28dca6d82ce5ea2c771100b7abbdb47ed2aa
-
Filesize
1.2MB
MD5b4eaeab34c21fb47b6cd2cb952565a5c
SHA13c0b355633097462cfeb61b7f1cfcf83be407366
SHA2561d93cfb412413857ed8e64c2c45c8ff49d2644cd70dc028e73e6084236cef28b
SHA5125e1247ebaa0021399c05fc023273b21f38d896a29be188178308fec1f65357c53600f03e4a994d36b4cc2f06b9f8cde38258f3b5e41357983cd88cd996084940
-
Filesize
1.2MB
MD5d6f577ce35b204fe0a787584a53defe4
SHA11901af03279acbba95959754018362148ea6eb64
SHA25686e6a64745e300408cf035776d13ea4edd2a81ce44434fe054cce59c8f3bf68e
SHA5128c37bff657b343fb4a03b16bda79698e2f9caed0079fabaff0a6c97c1c95aca345c2ac92cdbc9e26ce2d9fb9e6506cb7ef04c8de41beec5a0babd7bd67c1e775
-
Filesize
1.1MB
MD5d9fb79d6febecb51482df64b2fe0c953
SHA1fdb3332212935e8aeeafc7cb4fd6eeca989a7932
SHA2568a09feea74a7a07b03a3e9c9d7802aeb6ed4ce66c8d7a5db91d954d23c603b69
SHA5127458722e11198dd5303b4350bab9a5fe9d21f87a57a1c96873e47182fae6cc1cd505c0ebdb2054bdcc55d97550e5c522dd815658313eca1150cecbf54997b6d7
-
Filesize
2.1MB
MD595fe2c4b3b5326985b556824be21a387
SHA134d9e62d0481fabd8d895939f9d7d53abf3ecfba
SHA2564eda1dc7518d6ccc6b716a597e99c0b1e16414f8d1c98b437085d5344163e791
SHA512ef7cc6e96d9d9f46167210fbf5ed88b93f4d3f80189fdacc2d380ff0e02166ae2fb5fe9b900cfbc72e59795208c651047d74c561e89f6573ca16dff6480c26fd
-
Filesize
1.3MB
MD5350d13cdb6d045cc08f0fed2b993a4c9
SHA17f4476dcb16b4f1fc61d9e6a5a7ed221f476ac5c
SHA25691bdc03648e5fefd47d4acad06f04ae41f8ebcaa06464ce1f1b03c3608a71196
SHA512333c65006f56648fe06373eee51e0ae3bcd6e7beb0f60b6dbd19d093dc2091189a61183a0ba4ad463dd775d776b6079e2ea1d83da2415f28ff0dadaf0a6b95b5
-
Filesize
1.3MB
MD5cfddd76a3cf7e3290e28b6d674da8dc7
SHA15d129634f1fcaf95e52c2c46d81d2aafaf3b7a8e
SHA25614b12420f93761b31e523fc6af735d2fcf940dbd7ef5a1c14447f9cb9ac91971
SHA51247bc509d4deb1f15889a6c2f0f94505d9104c86ae489372706f3d5fa98a4b8cd2cd2a15e92da374ffc8df95e387411dff4dc40fad923042ccd3da4453cb9e83d
-
Filesize
1.2MB
MD5fd09f0471e8fbbc59a4f56be92f24da5
SHA1d49054879ee8d56f467390a1c275691ad9100b66
SHA25685e04451268bc524010e0fb1e03b88a5a92681063783f4378169f7e5c12de913
SHA5122e25271b0da1aff59940f78d31213539f424e130cf4039d2671ec3e0ae97b6e5776e734a898d4179b7223bdd94ac93f12041f9395744c91897393409f6388a66
-
Filesize
1.7MB
MD529fe9b54f0123ecab888d295f69404be
SHA1f9ee8700b6e68e20f2ac50cd827535cc169be30d
SHA25618ad0633b3c91a2844058ee15740f62766f3e8d83633d07ba8704e9dc12d3a12
SHA5122151efb2b405f48996b8ec8ef8fab6e620eadf4e2b91b67f7bf76185ff7ecaeabed604edf1b1ae5f02987018f5d1a193cdf98b77a33da6faa5b0a2f2c1c04f5a
-
Filesize
1.4MB
MD59cadfef56ec562b374b43f4510e6beed
SHA1a241768629c65ff00198547ad71bc4252e4e13bd
SHA2568d29adf9cc5277452fbff2d7ef777c4e3a23f7f4e6a2b5808c384ebfbcf0c291
SHA5127160a6a0e6978af09650d88e2f22660ed760cc206e9729c2342ca023dc5ac459b250d38676014092371ca0866744b7d13c3e9e8102415debc8b2b6ea0472a676
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.Office.To#\135228e87b2c27d26b516ac0fc0ce667\Microsoft.Office.Tools.Word.v9.0.ni.dll
Filesize834KB
MD5c76656b09bb7df6bd2ac1a6177a0027c
SHA10c296994a249e8649b19be84dce27c9ddafef3e0
SHA256a0ae0aec5b203865fac761023741a59d274e2c41889aeb69140eb746d38f6ce0
SHA5128390879b8812fc98c17702a52259d510a7fe8bc3cf4972e89f705e93bc8fa98300c34d49f3aec869da8d9f786d33004742e4538019c0f852c61db89c302d5fdf
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.Office.To#\5766ec3721d18a48bec1ca1f60331e2d\Microsoft.Office.Tools.Common.v9.0.ni.dll
Filesize797KB
MD5aeb0b6e6c5d32d1ada231285ff2ae881
SHA11f04a1c059503896336406aed1dc93340e90b742
SHA2564c53ca542ac5ef9d822ef8cb3b0ecef3fb8b937d94c0a7b735bedb275c74a263
SHA512e55fd4c4d2966b3f0b6e88292fbd6c20ffa34766e076e763442c15212d19b6dea5d9dc9e7c359d999674a5b2c8a3849c2bbaaf83e7aa8c12715028b06b5a48e1
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.Office.To#\60214b09b490be856c4ee2b3398d71bd\Microsoft.Office.Tools.Outlook.v9.0.ni.dll
Filesize163KB
MD5e88828b5a35063aa16c68ffb8322215d
SHA18225660ba3a9f528cf6ac32038ae3e0ec98d2331
SHA25699facae4828c566c310a1ccf4059100067ab8bfb3d6e94e44dd9e189fd491142
SHA512e4d2f5a5aeaa29d4d3392588f15db0d514ca4c86c629f0986ee8dba61e34af5ca9e06b94479efd8dd154026ae0da276888a0214e167129db18316a17d9718a57
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.Office.To#\d7be05162f8d0fba8f4447db13f6695b\Microsoft.Office.Tools.Excel.v9.0.ni.dll
Filesize1.3MB
MD5006498313e139299a5383f0892c954b9
SHA17b3aa10930da9f29272154e2674b86876957ce3a
SHA256489fec79addba2de9141daa61062a05a95e96a196049ce414807bada572cc35c
SHA5126a15a10ae66ce0e5b18e060bb53c3108d09f6b07ee2c4a834856f0a35bec2453b32f891620e787731985719831302160678eb52acada102fdb0b87a14288d925
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.Office.To#\e1f8e4d08d4b7f811b7dbbacd324027b\Microsoft.Office.Tools.v9.0.ni.dll
Filesize148KB
MD5ac901cf97363425059a50d1398e3454b
SHA12f8bd4ac2237a7b7606cb77a3d3c58051793c5c7
SHA256f6c7aecb211d9aac911bf80c91e84a47a72ac52cbb523e34e9da6482c0b24c58
SHA5126a340b6d5fa8e214f2a58d8b691c749336df087fa75bcc8d8c46f708e4b4ff3d68a61a17d13ee62322b75cbc61d39f5a572588772f3c5d6e5ff32036e5bc5a00
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\03cad6bd8b37d21b28dcb4f955be2158\Microsoft.VisualStudio.Tools.Applications.Contract.v9.0.ni.dll
Filesize34KB
MD5c26b034a8d6ab845b41ed6e8a8d6001d
SHA13a55774cf22d3244d30f9eb5e26c0a6792a3e493
SHA256620b41f5e02df56c33919218bedc238ca7e76552c43da4f0f39a106835a4edc3
SHA512483424665c3bc79aeb1de6dfdd633c8526331c7b271b1ea6fe93ab298089e2aceefe7f9c7d0c6e33e604ca7b2ed62e7bb586147fecdf9a0eea60e8c03816f537
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\0cb958acb9cd4cacb46ebc0396e30aa3\Microsoft.VisualStudio.Tools.Office.Contract.v9.0.ni.dll
Filesize109KB
MD50fd0f978e977a4122b64ae8f8541de54
SHA1153d3390416fdeba1b150816cbbf968e355dc64f
SHA256211d2b83bb82042385757f811d90c5ae0a281f3abb3bf1c7901e8559db479e60
SHA512ceddfc031bfe4fcf5093d0bbc5697b5fb0cd69b03bc32612325a82ea273dae5daff7e670b0d45816a33307b8b042d27669f5d5391cb2bdcf3e5a0c847c6dcaa8
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\10f190e6069a6e761be0a69dfcb5b160\Microsoft.VisualStudio.Tools.Office.Word.HostAdapter.v10.0.ni.dll
Filesize187KB
MD53ac72f12165416cc0d3d93c5e120e46e
SHA176944a68c76e0487b4672d66c1078c079daa8aa6
SHA2565fb54b21740647ccdbf506233805bdf0fd1a888d6449179c06dc3a6e244b9a1c
SHA51292f463e08829fd07362f790b028f489b4b18d6aff304812e38ef2295de2093d553e8c25a9ae10f915113c3620769d1680655700eaeb2df54ccb71f4bd879d0fb
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\181356b1bbb85fe2401c4dfad1a45133\Microsoft.VisualStudio.Tools.Office.Excel.AddInProxy.v9.0.ni.dll
Filesize158KB
MD5a763a9348ab4ee3bd593bb17d854e51b
SHA14d0c97ba6877e2f9ab32fe1316936a4f2e0ff2c9
SHA256b2f9dce9baca3e56fb3587ffe30ca38eb0f89ed30985b328a853778480c0f87b
SHA512e8d3896d4bd788d3ed923e0c9d3ba19fe9fc507060e2e5e8e410964f4c9d7331928324a79336079ccc84c050d8f0acfb03126a2e3622daac3846b0bfd028f602
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\1f5d757f0db1005daa2dee10d6117655\Microsoft.VisualStudio.Tools.Office.HostAdapter.v10.0.ni.dll
Filesize143KB
MD50357fac505a1028f1b803e4170de3a62
SHA10ce8e6445a23e02b8b23e964e3cced0f304f556d
SHA256c0d079e51a8b642b9e7fea65b241204f4d890ec4f81030b6e1cfc86ac8a2c435
SHA512ebde8c35ffeb88ffdcf14b0e7ef669acd641822e9b3a919aeb8a29b01237a8b3b44e3a446d4a6b2fb53781e944dee94ae471b94ee12e27a279169d51a87acb12
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\367516b7878af19f5c84c67f2cd277ae\Microsoft.VisualStudio.Tools.Office.Word.AddInAdapter.v9.0.ni.dll
Filesize41KB
MD53c269caf88ccaf71660d8dc6c56f4873
SHA1f9481bf17e10fe1914644e1b590b82a0ecc2c5c4
SHA256de21619e70f9ef8ccbb274bcd0d9d2ace1bae0442dfefab45976671587cf0a48
SHA512bd5be3721bf5bd4001127e0381a0589033cb17aa35852f8f073ba9684af7d8c5a0f3ee29987b345fc15fdf28c5b56686087001ef41221a2cfb16498cf4c016c6
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\43ac81bed18b52d77a8011ada80939b5\Microsoft.VisualStudio.Tools.Office.AppInfoDocument.v9.0.ni.dll
Filesize296KB
MD57687295a6e19cc656b077e6a61629d4e
SHA1fa1025de5cffb56a3d1f8cae9d09b7171b33326e
SHA256ad8d210d001d3298ad4e1cbf08449b2cbd2b358d28cfad99db78639627a7cb86
SHA51219de95fd90bc6f091e785074ee71dc15d450d65fbdea933e26650fb9c747d81ae2fca7f5f83192f17451a49a314d264cabea2202c805b6ffab729d381675734c
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\48a294a6ff9cea6b26c38fc8b4f5e3e8\Microsoft.VisualStudio.Tools.Applications.Hosting.v10.0.ni.dll
Filesize356KB
MD587111e9d98dc79165dfc98a1fb93100b
SHA14f5182e5ce810f6ba3bdb3418ad33c916b6013c8
SHA256971188681028501d5ac8143b9127feb95d6982417590af42cf1a43483e38bd42
SHA512abbb246d620e8a2ab1973dde19ff56ea1c02afa39e889925fe2a1ba43af1ad4ff6eb017e68578ae520109b3e290b3d9054d7537eb2df0ede6e0fbca8519cc104
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\5c8b40c69a2293c8f499b38b25c41117\Microsoft.VisualStudio.Tools.Office.Word.AddInProxy.v9.0.ni.dll
Filesize157KB
MD57bdf8e0c9aa04b71a52dd964005f4363
SHA1a87e809146d3c70093a189c37f0a96b8bd0ce525
SHA2560406be7235661a62f68bff4c7640b4e241a0c392d548bf242ed08ba0eeaee66b
SHA5124983ebf42241723cf258407c7d2a0773f395c861741f4e98bd7ac86e1ef0a597f89263bb5a986b69ffd43836a5e49d8f03342736b4c3183ea0c58b8099af2051
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\5e3a54b9a29f84edc49b374414e70e20\Microsoft.VisualStudio.Tools.Office.Excel.HostAdapter.v10.0.ni.dll
Filesize180KB
MD53a743e21ac40e08f3c7dcdfdc90ecf49
SHA1ed1de281aeaa32b4a77e11bf775ba479f049878c
SHA256bd804bde3fef4acc97725a10ed0f9435e31518812cf872878eb656496dd63211
SHA5123196e60df1af789b0cf2534cbb1ea7fa69a400096d29e3009d0c3d50ad2f7044fd21dddbbf73e258f8c71a6d897b908166a2d1d85f38a995b8565c16399a1501
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\5f2320d38621eb541713e6cd421c2b8a\Microsoft.VisualStudio.Tools.Applications.ServerDocument.v10.0.ni.dll
Filesize648KB
MD57ebbba07bc6d54efd912bcd78b560b7b
SHA1a6aee1a80ddcdf201301ac29293c62d58bcc941d
SHA256637dc357ff9011902186f2fd128ca74ac84fdb6d984f15036803b6a8fe28868a
SHA5122139a0d520ed70b72dc76fdd0555185386c9c22de1e1fb7eaac0607b313500c44f856c76ac6e2cd72148ea0b86b10bdd2b0ab7daacfc945cb66a637b8d99cfe8
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\787526c375f27d452cde50fea4f7986b\Microsoft.VisualStudio.Tools.Applications.Adapter.v9.0.ni.dll
Filesize1.2MB
MD50637ad2bf6fc5ac1d29e547155bc818c
SHA1a502879466b6dd37eae5881bbb18353f97623852
SHA256868c297cb00b2d298f594ad7e3fd4e38aeaac78042613626d6f919b2bca25c4f
SHA5121d18a16ec3b91c3143c4371de305a7ea464d41661752ece65bf1ce19a8342a265c024a740afa6be8baf4d1edfdac6c6fcdad7395c1294342cd1f4388428e52c1
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\8c6bac317f75b51647ea3a8da141b143\Microsoft.VisualStudio.Tools.Office.AddInAdapter.v9.0.ni.dll
Filesize210KB
MD54f40997b51420653706cb0958086cd2d
SHA10069b956d17ce7d782a0e054995317f2f621b502
SHA2568cd6a0b061b43e0b660b81859c910290a3672b00d7647ba0e86eda6ddcc8c553
SHA512e18953d7a348859855e5f6e279bc9924fc3707b57a733ce9b8f7d21bd631d419f1ebfb29202608192eb346569ca9a55264f5b4c2aedd474c22060734a68a4ee6
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\9248a710d7fe2485a557ce5d3cbcf2df\Microsoft.VisualStudio.Tools.Office.Runtime.v10.0.ni.dll
Filesize607KB
MD5e9ca062e4958cc25400c804029a5bf62
SHA11ed4374d0d0f568936fdebe17d9110481d6b3344
SHA256a09436c1df8fcd8ecd1732d6e4e68f32b092e71e0c5d3308b0f3f20abd03d4e0
SHA51243a9ea20d1e636201c0ce7098c198b893465b45f747ed2a002e8dd0bfc7739c28e166d259faf3a0087ae1fe59c74cc8e598f2b283cc7ebc345b6f3b5c388e520
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\9306fc630870a75ddd23441ad77bdc57\Microsoft.VisualStudio.Tools.Applications.Runtime.v10.0.ni.dll
Filesize53KB
MD5e3a7a2b65afd8ab8b154fdc7897595c3
SHA1b21eefd6e23231470b5cf0bd0d7363879a2ed228
SHA256e5faf5e8adf46a8246e6b5038409dadca46985a9951343a1936237d2c8d7a845
SHA5126537c7ed398deb23be1256445297cb7c8d7801bf6e163d918d8e258213708b28f7255ecff9fbd3431d8f5e5a746aa95a29d3a777b28fcd688777aed6d8205a33
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\a05ee2388c8a28fb3ac98ec65148e455\Microsoft.VisualStudio.Tools.Applications.AddInAdapter.v10.0.ni.dll
Filesize65KB
MD5da9f9a01a99bd98104b19a95eeef256c
SHA1272071d5bbc0c234bc2f63dfcd5a90f83079bbab
SHA256b06632dff444204f6e76b16198c31ab706ea52270d5e3ae81626dc1fc1fb1a4d
SHA512dcb3273e33b7df02461e81a4f65ae99c0a9ae98188a612ce6d605a058bd2dcb6ddb5b7c78abe1f0a955b7f0c07c323dbfd77a2b6a629a9c87e4ecc1c57e4d81d
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\a406d2a4be8c2062333d57927e488357\Microsoft.VisualStudio.Tools.Office.Outlook.HostAdapter.v10.0.ni.dll
Filesize83KB
MD5a0fc188118be2f17d991c36dd8afe69a
SHA19bf4497890129e0ea74100e4690236304961488f
SHA25677fc026e842be3863c051fc71f5da86903a1f1b7a5b00277585615226b988d3b
SHA5123675284033f69eaf30b4d88621f5b8aa0d81f552cdc461bdb874e483be5a62a51147a1e69c2f4a54ecc53fe273ea1d7ab9d9111a3ed046670154d5e8e83770e2
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\afa5bb1a39443d7dc81dfff54073929b\Microsoft.VisualStudio.Tools.Office.Contract.v10.0.ni.dll
Filesize28KB
MD5aefc3f3c8e7499bad4d05284e8abd16c
SHA17ab718bde7fdb2d878d8725dc843cfeba44a71f7
SHA2564436550409cfb3d06b15dd0c3131e87e7002b0749c7c6e9dc3378c99dbec815d
SHA5121d7dbc9764855a9a1f945c1bc8e86406c0625f1381d71b3ea6924322fbe419d1c70c3f3efd57ee2cb2097bb9385e0bf54965ab789328a80eb4946849648fe20b
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\b8e029b1434d965380b363483e376df0\Microsoft.VisualStudio.Tools.Applications.ServerDocument.v9.0.ni.dll
Filesize329KB
MD5eb09a7062a66a50fe2cb16c4a80561a7
SHA133b4c71ced7644be9802374a4f04c866394daaca
SHA256e94a4ad1ef9de2886a231e857c8691328c2e6e344cc9e82440e5c45b8a788256
SHA512c57a4c626c87032ca422df04ce7c3322662a9b0c6c06a46e93f08ca8f431295c9ae802cd79f53cae5de2b39a30bbeb756c966880e874ed44115cf511cc1ff920
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\bb63c81d306795319eaf7af25f67342a\Microsoft.VisualStudio.Tools.Office.ContainerControl.v10.0.ni.dll
Filesize141KB
MD558cacef7cbc000bb5ddeedc08a598f36
SHA1f8963d4ac1f7b72c2ee4a0a6d45b921f4f88bab7
SHA256124a0869df89ec2c9f0b307dd6b6d17e1e1e7ad638e0b4abf4483c15f842d270
SHA5129cf04e365abcdcfcb9c1f927da83a2dfe0791cccb80cd84ed63b03264d1e253060c455ed8664f35aee0a59e8c172f859ba49c67c9eec811a53e656c076c6bf66
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\bf3e8ba642eaf9a5371982f211550c52\Microsoft.VisualStudio.Tools.Applications.Hosting.v9.0.ni.dll
Filesize278KB
MD5d74d434aa70ce827715b5e0ac7eda5be
SHA1b53f3374be4c96af51c78fd873de1360f17c200f
SHA25654701cbe719b08b2393b9f4a604c372f9a280b5d3dd520b563d2aea7d69a1496
SHA512631d09a0ff39ece829f5c23278c2c030e5ff758b285128edb7805682de75b5be1aedd914d2325f79ec98d0103660a39ae1f1a5782f5dad038b143f3774c098df
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\de06a98a598aa0ff716a25b24d56ad7f\Microsoft.VisualStudio.Tools.Applications.Contract.v10.0.ni.dll
Filesize27KB
MD59c60454398ce4bce7a52cbda4a45d364
SHA1da1e5de264a6f6051b332f8f32fa876d297bf620
SHA256edc90887d38c87282f49adbb12a94040f9ac86058bfae15063aaaff2672b54e1
SHA512533b7e9c55102b248f4a7560955734b4156eb4c02539c6f978aeacecff1ff182ba0f04a07d32ed90707a62d73191b0e2d2649f38ae1c3e7a5a4c0fbea9a94300
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\e0220058091b941725ef02be0b84abe7\Microsoft.VisualStudio.Tools.Applications.HostAdapter.v10.0.ni.dll
Filesize57KB
MD56eaaa1f987d6e1d81badf8665c55a341
SHA1e52db4ad92903ca03a5a54fdb66e2e6fad59efd5
SHA2564b78ffa5f0b6751aea11917db5961d566e2f59beaa054b41473d331fd392329e
SHA512dbedfa6c569670c22d34d923e22b7dae7332b932b809082dad87a1f0bb125c912db37964b5881667867ccf23dc5e5be596aad85485746f8151ce1c51ffd097b2
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\ee73646032cbb022d16771203727e3b2\Microsoft.VisualStudio.Tools.Applications.Runtime.v9.0.ni.dll
Filesize130KB
MD52735d2ab103beb0f7c1fbd6971838274
SHA16063646bc072546798bf8bf347425834f2bfad71
SHA256f00156860ec7e88f4ccb459ca29b7e0e5c169cdc8a081cb043603187d25d92b3
SHA512fe2ce60c7f61760a29344e254771d48995e983e158da0725818f37441f9690bda46545bf10c84b163f6afb163ffb504913d6ffddf84f72b062c7f233aed896de
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\f1a7ac664667f2d6bcd6c388b230c22b\Microsoft.VisualStudio.Tools.Applications.AddInAdapter.v9.0.ni.dll
Filesize59KB
MD58c69bbdfbc8cc3fa3fa5edcd79901e94
SHA1b8028f0f557692221d5c0160ec6ce414b2bdf19b
SHA256a21471690e7c32c80049e17c13624820e77bca6c9c38b83d9ea8a7248086660d
SHA512825f5b87b76303b62fc16a96b108fb1774c2aca52ac5e44cd0ac2fe2ee47d5d67947dfe7498e36bc849773f608ec5824711f8c36e375a378582eefb57c9c2557
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\fc36797f7054935a6033077612905a0f\Microsoft.VisualStudio.Tools.Office.Excel.AddInAdapter.v9.0.ni.dll
Filesize42KB
MD571d4273e5b77cf01239a5d4f29e064fc
SHA1e8876dea4e4c4c099e27234742016be3c80d8b62
SHA256f019899f829731f899a99885fd52fde1fe4a4f6fe3ecf7f7a7cfa78517c00575
SHA51241fe67cda988c53bd087df6296d1a242cddac688718ea5a5884a72b43e9638538e64d7a59e045c0b4d490496d884cf0ec694ddf7fcb41ae3b8cbc65b7686b180
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\ehiVidCtl\88e20c69254157d91b96eadc9444815d\ehiVidCtl.ni.dll
Filesize855KB
MD57812b0a90d92b4812d4063b89a970c58
SHA13c4a789b8d28a5bfa6a6191624e33b8f40e4c4ea
SHA256897626e6af00e85e627eeaa7f9563b245335242bc6196b36d0072e5b6d45e543
SHA512634a2395bada9227b1957f2b76ed7e19f12bfc4d71a145d182602a1b6e24d83e220ebfabd602b1995c360e1725a38a89ff58417b0295bb0da9ea35c41c21a6ed
-
C:\Windows\assembly\NativeImages_v2.0.50727_32\stdole\2c6d60b55bbab22515c512080d4b3bae\stdole.ni.dll
Filesize43KB
MD53e72bdd0663c5b2bcd530f74139c83e3
SHA166069bcac0207512b9e07320f4fa5934650677d2
SHA2566a6ac3094130d1affd34aae5ba2bd8c889e2071eb4217a75d72b5560f884e357
SHA512b0a98db477fccae71b4ebfb8525ed52c10f1e7542f955b307f260e27e0758aa22896683302e34b0237e7e3bba9f5193ddcc7ff255c71fbaa1386988b0ec7d626
-
Filesize
1.2MB
MD5e8ae4bdf6bec7240007a59f2ea837f43
SHA1fb2264346ecd873a3dfedfe6629266f747880c2d
SHA25645895017c7b6fc3c0989175a39d4eaed1bbdd58a86bd31093e578e4683579bce
SHA512315cf8eaaa27ec253d7cc47eeb0fd38834a1b607454ac365515894a9c88200bd2a12331ab868387da07f0c804a8064055d437882de86ff39662376e05a92f1e5
-
Filesize
67KB
MD57574cf2c64f35161ab1292e2f532aabf
SHA114ba3fa927a06224dfe587014299e834def4644f
SHA256de055a89de246e629a8694bde18af2b1605e4b9b493c7e4aef669dd67acf5085
SHA5124db19f2d8d5bc1c7bbb812d3fa9c43b80fa22140b346d2760f090b73aed8a5177edb4bddc647a6ebd5a2db8565be5a1a36a602b0d759e38540d9a584ba5896ab
-
Filesize
1.2MB
MD5bc8588d5e4f2011fd6c4f5d8f62c65e5
SHA105de45aae180a094e6e7874a0a4a16848d4881ab
SHA25673c329461a35ab446c99caaa7347df1548949222eb7e65bba5f7eeb9ee66eaf0
SHA512e67fcaf2e483b656925bfed049b048c5723f98eadb14e63e87ae803f9a1d563eae709aa7d74aa8df731004ddb1b28178bfe2c1fdebc1a04b9917c61fc49cd491
-
Filesize
1.3MB
MD55fc6959295a4f8d7f86be124b9cacb67
SHA1d7730f1df4dd13bcad707980d840dd7653cd503f
SHA256ea762c57790e5b370bc76d24334dc3152ab16c9db25205af5a99f980e3e14283
SHA51229db495ea9afef2941e579f220fdcfec5841a98cb567bb050438b584c7ceecfee3030dda3ba95f8ce19fddf42449b387a01f4949c9c6b7579cbccbdac243df4e
-
Filesize
1.3MB
MD52788fd984c1c6691db748efd8a128223
SHA15ae6cc976a76bf97fc60653e9793b7c47558d3ca
SHA256123ce62f9e1d8aedab758a750ae8b4571e22de3206c16607f969e1e9d2814be1
SHA512e9f74dd0cf4501e64a2f64b8f2b32f15c52bdad6e46cfb05853b9478f2ba3207037a3c4e3bd413bfff4d0b51151a847149c7508fbb01f5f7980ca1c166d99fd7
-
Filesize
2.0MB
MD57ecdd3a0a40b5f4554f8383d9e00f801
SHA105b40faba617d65eb136d7a232ae088bcf2f0e1c
SHA2564fa5731d63f929ce2414047074fed932c400097b7ce70e1f4f1193f52019a1a8
SHA512d16bf8b84ab6223cc13aaa4c9eedd695e271b30f6eb9e7e76ece31b55f17f98167f332340c810372a790c84250cf2a9c24fda95978a215b38c67eeaa50a49c97
-
Filesize
1.3MB
MD5765028bbeca73be355725315997a3ca4
SHA1ddc6499af3f867dd88d4808061346e2edb68faf0
SHA256517d5d8a589fee3fea4bd0761d54af7d4c7639448fdab0118f7abadb106662dd
SHA512c3334bf77851db85560a79e7fbed9c8dcd5450652db7aef8264c33a7f38ce8bf46d012f518b18e08e46f02781d54665522e19ee8ecfdab0b67c9f2b1ae50461f