Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02/01/2025, 13:44
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_658468285074d4dba41a9d5598139610.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_658468285074d4dba41a9d5598139610.exe
-
Size
630KB
-
MD5
658468285074d4dba41a9d5598139610
-
SHA1
94164266a39d39126885b6ad2e7c8cb6619c6ecc
-
SHA256
020b23f229e7f0d7dcaf21d106cb4848c15d88ad4c0eaef42dcab0ad9ddb620a
-
SHA512
9c2e4120806b2efecf6a8fa30406b606ea1d3fe72a36a31f55780cbfb6b362a651f34985be7a9ea94d8c94567f1ce36a050f31e6455adc708161771c59651c4b
-
SSDEEP
12288:Fo25X5l/zQerKrGE9VzGm/Ab0bWIspaUm5A2SKluFFS8h:K25X5ltGrGE94m7smBiF
Malware Config
Signatures
-
Expiro family
-
Expiro payload 3 IoCs
resource yara_rule behavioral1/memory/2084-2-0x0000000001000000-0x00000000011C9000-memory.dmp family_expiro1 behavioral1/memory/2980-61-0x0000000010000000-0x00000000101B7000-memory.dmp family_expiro1 behavioral1/memory/2744-81-0x0000000140000000-0x0000000140371000-memory.dmp family_expiro1 -
Executes dropped EXE 64 IoCs
pid Process 2980 mscorsvw.exe 476 Process not Found 2796 mscorsvw.exe 2348 mscorsvw.exe 1832 mscorsvw.exe 2744 elevation_service.exe 740 IEEtwCollector.exe 1380 mscorsvw.exe 2172 mscorsvw.exe 2192 mscorsvw.exe 3000 mscorsvw.exe 1504 mscorsvw.exe 1668 mscorsvw.exe 1044 mscorsvw.exe 2432 mscorsvw.exe 1036 mscorsvw.exe 2624 mscorsvw.exe 2748 mscorsvw.exe 928 mscorsvw.exe 836 mscorsvw.exe 2128 mscorsvw.exe 1672 mscorsvw.exe 2652 mscorsvw.exe 1400 mscorsvw.exe 3024 mscorsvw.exe 996 mscorsvw.exe 1300 mscorsvw.exe 628 mscorsvw.exe 2508 mscorsvw.exe 1640 mscorsvw.exe 2284 mscorsvw.exe 1036 mscorsvw.exe 1588 mscorsvw.exe 1480 mscorsvw.exe 2168 mscorsvw.exe 2396 mscorsvw.exe 1836 mscorsvw.exe 1092 mscorsvw.exe 1992 mscorsvw.exe 916 mscorsvw.exe 700 mscorsvw.exe 1520 mscorsvw.exe 2688 mscorsvw.exe 560 mscorsvw.exe 740 mscorsvw.exe 2708 mscorsvw.exe 2956 mscorsvw.exe 2260 mscorsvw.exe 2164 mscorsvw.exe 1900 mscorsvw.exe 2596 mscorsvw.exe 2080 mscorsvw.exe 1092 mscorsvw.exe 1824 mscorsvw.exe 932 mscorsvw.exe 1400 mscorsvw.exe 2488 mscorsvw.exe 700 mscorsvw.exe 1848 mscorsvw.exe 2608 mscorsvw.exe 2160 mscorsvw.exe 2016 mscorsvw.exe 2588 mscorsvw.exe 1576 mscorsvw.exe -
Loads dropped DLL 54 IoCs
pid Process 476 Process not Found 476 Process not Found 476 Process not Found 476 Process not Found 1044 mscorsvw.exe 1044 mscorsvw.exe 1036 mscorsvw.exe 1036 mscorsvw.exe 2748 mscorsvw.exe 2748 mscorsvw.exe 836 mscorsvw.exe 836 mscorsvw.exe 1672 mscorsvw.exe 1672 mscorsvw.exe 1400 mscorsvw.exe 1400 mscorsvw.exe 996 mscorsvw.exe 996 mscorsvw.exe 628 mscorsvw.exe 628 mscorsvw.exe 1640 mscorsvw.exe 1640 mscorsvw.exe 1036 mscorsvw.exe 1036 mscorsvw.exe 1480 mscorsvw.exe 1480 mscorsvw.exe 2396 mscorsvw.exe 2396 mscorsvw.exe 1092 mscorsvw.exe 1092 mscorsvw.exe 916 mscorsvw.exe 916 mscorsvw.exe 1520 mscorsvw.exe 1520 mscorsvw.exe 560 mscorsvw.exe 560 mscorsvw.exe 1900 mscorsvw.exe 1900 mscorsvw.exe 2596 mscorsvw.exe 2596 mscorsvw.exe 1092 mscorsvw.exe 1092 mscorsvw.exe 812 mscorsvw.exe 812 mscorsvw.exe 2060 mscorsvw.exe 2060 mscorsvw.exe 1516 mscorsvw.exe 1516 mscorsvw.exe 1816 mscorsvw.exe 1816 mscorsvw.exe 860 mscorsvw.exe 860 mscorsvw.exe 956 mscorsvw.exe 956 mscorsvw.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Security Center\Svc\S-1-5-21-1846800975-3917212583-2893086201-1000 mscorsvw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Security Center\Svc\S-1-5-21-1846800975-3917212583-2893086201-1000\EnableNotifications = "0" mscorsvw.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\dlddmedljhmbgdhapibnagaanenmajcm\1.0_0\manifest.json JaffaCakes118_658468285074d4dba41a9d5598139610.exe -
Enumerates connected drives 3 TTPs 42 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\G: JaffaCakes118_658468285074d4dba41a9d5598139610.exe File opened (read-only) \??\R: JaffaCakes118_658468285074d4dba41a9d5598139610.exe File opened (read-only) \??\R: mscorsvw.exe File opened (read-only) \??\W: mscorsvw.exe File opened (read-only) \??\Z: mscorsvw.exe File opened (read-only) \??\O: mscorsvw.exe File opened (read-only) \??\M: JaffaCakes118_658468285074d4dba41a9d5598139610.exe File opened (read-only) \??\P: JaffaCakes118_658468285074d4dba41a9d5598139610.exe File opened (read-only) \??\Q: JaffaCakes118_658468285074d4dba41a9d5598139610.exe File opened (read-only) \??\T: JaffaCakes118_658468285074d4dba41a9d5598139610.exe File opened (read-only) \??\Y: JaffaCakes118_658468285074d4dba41a9d5598139610.exe File opened (read-only) \??\G: mscorsvw.exe File opened (read-only) \??\J: mscorsvw.exe File opened (read-only) \??\T: mscorsvw.exe File opened (read-only) \??\Y: mscorsvw.exe File opened (read-only) \??\J: JaffaCakes118_658468285074d4dba41a9d5598139610.exe File opened (read-only) \??\L: JaffaCakes118_658468285074d4dba41a9d5598139610.exe File opened (read-only) \??\S: JaffaCakes118_658468285074d4dba41a9d5598139610.exe File opened (read-only) \??\V: JaffaCakes118_658468285074d4dba41a9d5598139610.exe File opened (read-only) \??\K: mscorsvw.exe File opened (read-only) \??\M: mscorsvw.exe File opened (read-only) \??\Q: mscorsvw.exe File opened (read-only) \??\I: JaffaCakes118_658468285074d4dba41a9d5598139610.exe File opened (read-only) \??\X: JaffaCakes118_658468285074d4dba41a9d5598139610.exe File opened (read-only) \??\E: mscorsvw.exe File opened (read-only) \??\N: mscorsvw.exe File opened (read-only) \??\P: mscorsvw.exe File opened (read-only) \??\E: JaffaCakes118_658468285074d4dba41a9d5598139610.exe File opened (read-only) \??\H: JaffaCakes118_658468285074d4dba41a9d5598139610.exe File opened (read-only) \??\K: JaffaCakes118_658468285074d4dba41a9d5598139610.exe File opened (read-only) \??\O: JaffaCakes118_658468285074d4dba41a9d5598139610.exe File opened (read-only) \??\Z: JaffaCakes118_658468285074d4dba41a9d5598139610.exe File opened (read-only) \??\H: mscorsvw.exe File opened (read-only) \??\I: mscorsvw.exe File opened (read-only) \??\S: mscorsvw.exe File opened (read-only) \??\U: mscorsvw.exe File opened (read-only) \??\V: mscorsvw.exe File opened (read-only) \??\N: JaffaCakes118_658468285074d4dba41a9d5598139610.exe File opened (read-only) \??\U: JaffaCakes118_658468285074d4dba41a9d5598139610.exe File opened (read-only) \??\W: JaffaCakes118_658468285074d4dba41a9d5598139610.exe File opened (read-only) \??\L: mscorsvw.exe File opened (read-only) \??\X: mscorsvw.exe -
Drops file in System32 directory 62 IoCs
description ioc Process File opened for modification \??\c:\windows\system32\wbengine.exe JaffaCakes118_658468285074d4dba41a9d5598139610.exe File opened for modification \??\c:\windows\system32\locator.exe mscorsvw.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7B2238AACCEDC3F1FFE8E7EB5F575EC9 mscorsvw.exe File opened for modification \??\c:\windows\system32\alg.exe JaffaCakes118_658468285074d4dba41a9d5598139610.exe File opened for modification \??\c:\windows\system32\lsass.exe JaffaCakes118_658468285074d4dba41a9d5598139610.exe File opened for modification \??\c:\windows\SysWOW64\fxssvc.exe JaffaCakes118_658468285074d4dba41a9d5598139610.exe File created \??\c:\windows\system32\msdtc.vir JaffaCakes118_658468285074d4dba41a9d5598139610.exe File opened for modification \??\c:\windows\system32\snmptrap.exe JaffaCakes118_658468285074d4dba41a9d5598139610.exe File opened for modification \??\c:\windows\system32\msiexec.exe mscorsvw.exe File opened for modification \??\c:\windows\system32\ui0detect.exe mscorsvw.exe File opened for modification \??\c:\windows\SysWOW64\ieetwcollector.exe JaffaCakes118_658468285074d4dba41a9d5598139610.exe File opened for modification \??\c:\windows\system32\vssvc.exe JaffaCakes118_658468285074d4dba41a9d5598139610.exe File opened for modification \??\c:\windows\syswow64\perfhost.exe mscorsvw.exe File opened for modification \??\c:\windows\system32\msiexec.exe JaffaCakes118_658468285074d4dba41a9d5598139610.exe File created \??\c:\windows\system32\wbengine.vir JaffaCakes118_658468285074d4dba41a9d5598139610.exe File opened for modification \??\c:\windows\SysWOW64\wbem\wmiApsrv.exe JaffaCakes118_658468285074d4dba41a9d5598139610.exe File created \??\c:\windows\SysWOW64\dllhost.vir JaffaCakes118_658468285074d4dba41a9d5598139610.exe File opened for modification \??\c:\windows\SysWOW64\lsass.exe JaffaCakes118_658468285074d4dba41a9d5598139610.exe File created \??\c:\windows\system32\vssvc.vir JaffaCakes118_658468285074d4dba41a9d5598139610.exe File opened for modification \??\c:\windows\system32\wbem\wmiApsrv.exe mscorsvw.exe File opened for modification \??\c:\windows\system32\dllhost.exe JaffaCakes118_658468285074d4dba41a9d5598139610.exe File opened for modification \??\c:\windows\system32\fxssvc.exe JaffaCakes118_658468285074d4dba41a9d5598139610.exe File opened for modification \??\c:\windows\SysWOW64\msiexec.exe JaffaCakes118_658468285074d4dba41a9d5598139610.exe File opened for modification \??\c:\windows\system32\locator.exe JaffaCakes118_658468285074d4dba41a9d5598139610.exe File created \??\c:\windows\system32\ui0detect.vir JaffaCakes118_658468285074d4dba41a9d5598139610.exe File opened for modification \??\c:\windows\system32\dllhost.exe mscorsvw.exe File opened for modification \??\c:\windows\system32\snmptrap.exe mscorsvw.exe File opened for modification \??\c:\windows\system32\vssvc.exe mscorsvw.exe File opened for modification \??\c:\windows\SysWOW64\svchost.exe JaffaCakes118_658468285074d4dba41a9d5598139610.exe File opened for modification \??\c:\windows\SysWOW64\dllhost.exe JaffaCakes118_658468285074d4dba41a9d5598139610.exe File opened for modification \??\c:\windows\SysWOW64\snmptrap.exe JaffaCakes118_658468285074d4dba41a9d5598139610.exe File opened for modification \??\c:\windows\SysWOW64\vssvc.exe JaffaCakes118_658468285074d4dba41a9d5598139610.exe File created \??\c:\windows\system32\wbem\wmiApsrv.vir JaffaCakes118_658468285074d4dba41a9d5598139610.exe File opened for modification \??\c:\windows\SysWOW64\searchindexer.exe JaffaCakes118_658468285074d4dba41a9d5598139610.exe File opened for modification \??\c:\windows\system32\lsass.exe mscorsvw.exe File created \??\c:\windows\system32\alg.vir JaffaCakes118_658468285074d4dba41a9d5598139610.exe File opened for modification \??\c:\windows\system32\searchindexer.exe mscorsvw.exe File created \??\c:\windows\SysWOW64\svchost.vir JaffaCakes118_658468285074d4dba41a9d5598139610.exe File opened for modification \??\c:\windows\SysWOW64\alg.exe JaffaCakes118_658468285074d4dba41a9d5598139610.exe File opened for modification \??\c:\windows\SysWOW64\locator.exe JaffaCakes118_658468285074d4dba41a9d5598139610.exe File opened for modification \??\c:\windows\SysWOW64\ui0detect.exe JaffaCakes118_658468285074d4dba41a9d5598139610.exe File opened for modification \??\c:\windows\system32\fxssvc.exe mscorsvw.exe File created \??\c:\windows\system32\ieetwcollector.vir JaffaCakes118_658468285074d4dba41a9d5598139610.exe File opened for modification \??\c:\windows\SysWOW64\msdtc.exe JaffaCakes118_658468285074d4dba41a9d5598139610.exe File created \??\c:\windows\system32\msiexec.vir JaffaCakes118_658468285074d4dba41a9d5598139610.exe File opened for modification \??\c:\windows\system32\ui0detect.exe JaffaCakes118_658468285074d4dba41a9d5598139610.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7B2238AACCEDC3F1FFE8E7EB5F575EC9 mscorsvw.exe File created \??\c:\windows\system32\fxssvc.vir JaffaCakes118_658468285074d4dba41a9d5598139610.exe File opened for modification \??\c:\windows\system32\ieetwcollector.exe JaffaCakes118_658468285074d4dba41a9d5598139610.exe File opened for modification \??\c:\windows\system32\svchost.exe mscorsvw.exe File opened for modification \??\c:\windows\system32\wbengine.exe mscorsvw.exe File created \??\c:\windows\SysWOW64\msiexec.vir JaffaCakes118_658468285074d4dba41a9d5598139610.exe File opened for modification \??\c:\windows\syswow64\perfhost.exe JaffaCakes118_658468285074d4dba41a9d5598139610.exe File opened for modification \??\c:\windows\system32\msdtc.exe mscorsvw.exe File opened for modification \??\c:\windows\system32\svchost.exe JaffaCakes118_658468285074d4dba41a9d5598139610.exe File opened for modification \??\c:\windows\system32\msdtc.exe JaffaCakes118_658468285074d4dba41a9d5598139610.exe File created \??\c:\windows\system32\snmptrap.vir JaffaCakes118_658468285074d4dba41a9d5598139610.exe File opened for modification \??\c:\windows\system32\wbem\wmiApsrv.exe JaffaCakes118_658468285074d4dba41a9d5598139610.exe File created \??\c:\windows\SysWOW64\searchindexer.vir JaffaCakes118_658468285074d4dba41a9d5598139610.exe File opened for modification \??\c:\windows\system32\searchindexer.exe JaffaCakes118_658468285074d4dba41a9d5598139610.exe File opened for modification \??\c:\windows\system32\alg.exe mscorsvw.exe File opened for modification \??\c:\windows\SysWOW64\wbengine.exe JaffaCakes118_658468285074d4dba41a9d5598139610.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\ink\ShapeCollector.vir JaffaCakes118_658468285074d4dba41a9d5598139610.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javadoc.exe JaffaCakes118_658468285074d4dba41a9d5598139610.exe File opened for modification \??\c:\program files (x86)\microsoft office\office14\groove.exe JaffaCakes118_658468285074d4dba41a9d5598139610.exe File created C:\Program Files\7-Zip\7zG.vir JaffaCakes118_658468285074d4dba41a9d5598139610.exe File created C:\Program Files\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.vir JaffaCakes118_658468285074d4dba41a9d5598139610.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome_proxy.exe JaffaCakes118_658468285074d4dba41a9d5598139610.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\policytool.exe JaffaCakes118_658468285074d4dba41a9d5598139610.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\servertool.exe JaffaCakes118_658468285074d4dba41a9d5598139610.exe File opened for modification \??\c:\program files (x86)\common files\microsoft shared\source engine\ose.exe JaffaCakes118_658468285074d4dba41a9d5598139610.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jconsole.exe JaffaCakes118_658468285074d4dba41a9d5598139610.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\keytool.exe JaffaCakes118_658468285074d4dba41a9d5598139610.exe File created C:\Program Files\Java\jdk1.7.0_80\bin\javaw.vir JaffaCakes118_658468285074d4dba41a9d5598139610.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jar.exe JaffaCakes118_658468285074d4dba41a9d5598139610.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jinfo.exe JaffaCakes118_658468285074d4dba41a9d5598139610.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jps.exe JaffaCakes118_658468285074d4dba41a9d5598139610.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jstatd.exe JaffaCakes118_658468285074d4dba41a9d5598139610.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jvisualvm.exe JaffaCakes118_658468285074d4dba41a9d5598139610.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\rmid.exe JaffaCakes118_658468285074d4dba41a9d5598139610.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\bin\unpack200.vir JaffaCakes118_658468285074d4dba41a9d5598139610.exe File created C:\Program Files\Internet Explorer\iexplore.vir JaffaCakes118_658468285074d4dba41a9d5598139610.exe File created C:\Program Files\Google\Chrome\Application\chrome_proxy.vir JaffaCakes118_658468285074d4dba41a9d5598139610.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\pack200.exe JaffaCakes118_658468285074d4dba41a9d5598139610.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\servertool.exe JaffaCakes118_658468285074d4dba41a9d5598139610.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\bin\jp2launcher.vir JaffaCakes118_658468285074d4dba41a9d5598139610.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\policytool.exe JaffaCakes118_658468285074d4dba41a9d5598139610.exe File opened for modification \??\c:\program files (x86)\google\update\googleupdate.exe JaffaCakes118_658468285074d4dba41a9d5598139610.exe File opened for modification \??\c:\program files (x86)\mozilla maintenance service\maintenanceservice.exe JaffaCakes118_658468285074d4dba41a9d5598139610.exe File opened for modification \??\c:\program files (x86)\google\update\googleupdate.exe mscorsvw.exe File opened for modification C:\Program Files\Internet Explorer\ieinstal.exe JaffaCakes118_658468285074d4dba41a9d5598139610.exe File created C:\Program Files\Java\jdk1.7.0_80\bin\jabswitch.vir JaffaCakes118_658468285074d4dba41a9d5598139610.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\rmic.exe JaffaCakes118_658468285074d4dba41a9d5598139610.exe File created \??\c:\program files (x86)\microsoft office\office14\groove.vir JaffaCakes118_658468285074d4dba41a9d5598139610.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe JaffaCakes118_658468285074d4dba41a9d5598139610.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jabswitch.exe JaffaCakes118_658468285074d4dba41a9d5598139610.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\wsgen.exe JaffaCakes118_658468285074d4dba41a9d5598139610.exe File opened for modification \??\c:\program files (x86)\microsoft office\office14\groove.exe mscorsvw.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\java.exe JaffaCakes118_658468285074d4dba41a9d5598139610.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jhat.exe JaffaCakes118_658468285074d4dba41a9d5598139610.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\schemagen.exe JaffaCakes118_658468285074d4dba41a9d5598139610.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\serialver.exe JaffaCakes118_658468285074d4dba41a9d5598139610.exe File opened for modification \??\c:\program files (x86)\common files\microsoft shared\source engine\ose.exe mscorsvw.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\chrome_pwa_launcher.exe JaffaCakes118_658468285074d4dba41a9d5598139610.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\chrome_pwa_launcher.vir JaffaCakes118_658468285074d4dba41a9d5598139610.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\chrmstp.exe JaffaCakes118_658468285074d4dba41a9d5598139610.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\javaws.exe JaffaCakes118_658468285074d4dba41a9d5598139610.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\jp2launcher.exe JaffaCakes118_658468285074d4dba41a9d5598139610.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\ConvertInkStore.vir JaffaCakes118_658468285074d4dba41a9d5598139610.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.vir JaffaCakes118_658468285074d4dba41a9d5598139610.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jarsigner.exe JaffaCakes118_658468285074d4dba41a9d5598139610.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javah.exe JaffaCakes118_658468285074d4dba41a9d5598139610.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javap.exe JaffaCakes118_658468285074d4dba41a9d5598139610.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javaws.exe JaffaCakes118_658468285074d4dba41a9d5598139610.exe File created \??\c:\program files\google\chrome\Application\106.0.5249.119\elevation_service.vir JaffaCakes118_658468285074d4dba41a9d5598139610.exe File opened for modification C:\Program Files\7-Zip\7z.exe JaffaCakes118_658468285074d4dba41a9d5598139610.exe File opened for modification C:\Program Files\7-Zip\7zG.exe JaffaCakes118_658468285074d4dba41a9d5598139610.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\InputPersonalization.exe JaffaCakes118_658468285074d4dba41a9d5598139610.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\TabTip.exe JaffaCakes118_658468285074d4dba41a9d5598139610.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jstack.exe JaffaCakes118_658468285074d4dba41a9d5598139610.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\rmiregistry.exe JaffaCakes118_658468285074d4dba41a9d5598139610.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\javaw.exe JaffaCakes118_658468285074d4dba41a9d5598139610.exe File opened for modification C:\Program Files\Internet Explorer\iexplore.exe JaffaCakes118_658468285074d4dba41a9d5598139610.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\TabTip.vir JaffaCakes118_658468285074d4dba41a9d5598139610.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\idlj.exe JaffaCakes118_658468285074d4dba41a9d5598139610.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\orbd.exe JaffaCakes118_658468285074d4dba41a9d5598139610.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index14e.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index147.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index14e.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\Temp\ZAPC2F1.tmp\ehiVidCtl.dll mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\Temp\ZAPC784.tmp\stdole.dll mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index159.dat mscorsvw.exe File created C:\Windows\assembly\ngenlock.dat mscorsvw.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen_service.log mscorsvw.exe File created C:\Windows\assembly\ngenlock.dat mscorsvw.exe File created C:\Windows\assembly\GACLock.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index14c.dat mscorsvw.exe File created C:\Windows\assembly\GACLock.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\Temp\ZAPB2EB.tmp\Microsoft.VisualStudio.Tools.Office.HostAdapter.v10.0.dll mscorsvw.exe File created C:\Windows\assembly\GACLock.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\Temp\ZAP9943.tmp\Microsoft.VisualStudio.Tools.Office.Word.AddInAdapter.v9.0.dll mscorsvw.exe File opened for modification \??\c:\windows\servicing\trustedinstaller.exe mscorsvw.exe File created C:\Windows\assembly\GACLock.dat mscorsvw.exe File opened for modification \??\c:\windows\microsoft.net\framework64\v3.0\windows communication foundation\infocard.exe JaffaCakes118_658468285074d4dba41a9d5598139610.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\Temp\ZAPA15E.tmp\Microsoft.VisualStudio.Tools.Applications.Runtime.v9.0.dll mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index150.dat mscorsvw.exe File created C:\Windows\assembly\GACLock.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index157.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index143.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\index146.dat mscorsvw.exe File created C:\Windows\assembly\ngenlock.dat mscorsvw.exe File created C:\Windows\assembly\GACLock.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\index158.dat mscorsvw.exe File created C:\Windows\assembly\GACLock.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\index15b.dat mscorsvw.exe File created C:\Windows\Microsoft.NET\Framework\v2.0.50727\ngenservicelock.dat mscorsvw.exe File opened for modification \??\c:\windows\ehome\ehrecvr.exe mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index158.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\index15a.dat mscorsvw.exe File opened for modification \??\c:\windows\ehome\ehrecvr.exe JaffaCakes118_658468285074d4dba41a9d5598139610.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\index154.dat mscorsvw.exe File created C:\Windows\assembly\ngenlock.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index158.dat mscorsvw.exe File opened for modification \??\c:\windows\microsoft.net\framework64\v4.0.30319\mscorsvw.exe JaffaCakes118_658468285074d4dba41a9d5598139610.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index145.dat mscorsvw.exe File created C:\Windows\assembly\GACLock.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\index14a.dat mscorsvw.exe File opened for modification \??\c:\windows\ehome\ehsched.exe mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\Temp\ZAP1D8F.tmp\Microsoft.Office.Tools.v9.0.dll mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\index147.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\Temp\ZAPE83D.tmp\Microsoft-Windows-HomeGroupDiagnostic.NetListMgr.Interop.dll mscorsvw.exe File created C:\Windows\assembly\GACLock.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index14a.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index148.dat mscorsvw.exe File created C:\Windows\assembly\GACLock.dat mscorsvw.exe File opened for modification \??\c:\windows\microsoft.net\framework64\v3.0\windows communication foundation\infocard.exe mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index149.dat mscorsvw.exe File created C:\Windows\assembly\GACLock.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index14c.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index150.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\Temp\ZAPA68C.tmp\Microsoft.VisualStudio.Tools.Applications.Contract.v9.0.dll mscorsvw.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ngenservicelock.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index14d.dat mscorsvw.exe File created C:\Windows\assembly\ngenlock.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\Temp\ZAPA8CD.tmp\Microsoft.VisualStudio.Tools.Office.Contract.v10.0.dll mscorsvw.exe File created C:\Windows\assembly\GACLock.dat mscorsvw.exe File created C:\Windows\assembly\GACLock.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\Temp\ZAP13EE.tmp\Microsoft.Office.Tools.Excel.v9.0.dll mscorsvw.exe File created \??\c:\windows\ehome\ehsched.vir JaffaCakes118_658468285074d4dba41a9d5598139610.exe File created \??\c:\windows\servicing\trustedinstaller.vir JaffaCakes118_658468285074d4dba41a9d5598139610.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_658468285074d4dba41a9d5598139610.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscorsvw.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CRLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing mscorsvw.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CRLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\Certificates mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CRLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\Certificates mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CRLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\Certificates mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CRLs mscorsvw.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\Certificates mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CRLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\Certificates mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\Certificates mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\Certificates mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CRLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\Certificates mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\Certificates mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\Certificates mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\Certificates mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\Certificates mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\Certificates mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\Certificates mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CRLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\Certificates mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\Certificates mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\Certificates mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CRLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CRLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CRLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CRLs mscorsvw.exe -
Suspicious behavior: EnumeratesProcesses 26 IoCs
pid Process 1832 mscorsvw.exe 1832 mscorsvw.exe 1832 mscorsvw.exe 1832 mscorsvw.exe 1832 mscorsvw.exe 1832 mscorsvw.exe 1832 mscorsvw.exe 1832 mscorsvw.exe 1832 mscorsvw.exe 1832 mscorsvw.exe 1832 mscorsvw.exe 1832 mscorsvw.exe 1832 mscorsvw.exe 1832 mscorsvw.exe 1832 mscorsvw.exe 1832 mscorsvw.exe 1832 mscorsvw.exe 1832 mscorsvw.exe 1832 mscorsvw.exe 1832 mscorsvw.exe 1832 mscorsvw.exe 1832 mscorsvw.exe 1832 mscorsvw.exe 1832 mscorsvw.exe 1832 mscorsvw.exe 1832 mscorsvw.exe -
Suspicious use of AdjustPrivilegeToken 59 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 2084 JaffaCakes118_658468285074d4dba41a9d5598139610.exe Token: SeShutdownPrivilege 1832 mscorsvw.exe Token: SeShutdownPrivilege 1832 mscorsvw.exe Token: SeShutdownPrivilege 1832 mscorsvw.exe Token: SeShutdownPrivilege 1832 mscorsvw.exe Token: SeTakeOwnershipPrivilege 1832 mscorsvw.exe Token: SeShutdownPrivilege 1832 mscorsvw.exe Token: SeShutdownPrivilege 1832 mscorsvw.exe Token: SeShutdownPrivilege 1832 mscorsvw.exe Token: SeShutdownPrivilege 1832 mscorsvw.exe Token: SeShutdownPrivilege 1832 mscorsvw.exe Token: SeShutdownPrivilege 1832 mscorsvw.exe Token: SeShutdownPrivilege 1832 mscorsvw.exe Token: SeShutdownPrivilege 1832 mscorsvw.exe Token: SeShutdownPrivilege 1832 mscorsvw.exe Token: SeShutdownPrivilege 1832 mscorsvw.exe Token: SeShutdownPrivilege 1832 mscorsvw.exe Token: SeShutdownPrivilege 1832 mscorsvw.exe Token: SeShutdownPrivilege 1832 mscorsvw.exe Token: SeShutdownPrivilege 1832 mscorsvw.exe Token: SeShutdownPrivilege 1832 mscorsvw.exe Token: SeShutdownPrivilege 1832 mscorsvw.exe Token: SeShutdownPrivilege 1832 mscorsvw.exe Token: SeShutdownPrivilege 1832 mscorsvw.exe Token: SeShutdownPrivilege 1832 mscorsvw.exe Token: SeShutdownPrivilege 1832 mscorsvw.exe Token: SeShutdownPrivilege 1832 mscorsvw.exe Token: SeShutdownPrivilege 1832 mscorsvw.exe Token: SeShutdownPrivilege 1832 mscorsvw.exe Token: SeShutdownPrivilege 1832 mscorsvw.exe Token: SeShutdownPrivilege 1832 mscorsvw.exe Token: SeShutdownPrivilege 1832 mscorsvw.exe Token: SeShutdownPrivilege 1832 mscorsvw.exe Token: SeShutdownPrivilege 1832 mscorsvw.exe Token: SeShutdownPrivilege 1832 mscorsvw.exe Token: SeShutdownPrivilege 1832 mscorsvw.exe Token: SeShutdownPrivilege 1832 mscorsvw.exe Token: SeShutdownPrivilege 1832 mscorsvw.exe Token: SeShutdownPrivilege 1832 mscorsvw.exe Token: SeShutdownPrivilege 1832 mscorsvw.exe Token: SeShutdownPrivilege 1832 mscorsvw.exe Token: SeShutdownPrivilege 1832 mscorsvw.exe Token: SeShutdownPrivilege 1832 mscorsvw.exe Token: SeShutdownPrivilege 1832 mscorsvw.exe Token: SeShutdownPrivilege 1832 mscorsvw.exe Token: SeShutdownPrivilege 1832 mscorsvw.exe Token: SeShutdownPrivilege 1832 mscorsvw.exe Token: SeShutdownPrivilege 1832 mscorsvw.exe Token: SeShutdownPrivilege 1832 mscorsvw.exe Token: SeShutdownPrivilege 1832 mscorsvw.exe Token: SeShutdownPrivilege 1832 mscorsvw.exe Token: SeShutdownPrivilege 1832 mscorsvw.exe Token: SeShutdownPrivilege 1832 mscorsvw.exe Token: SeShutdownPrivilege 1832 mscorsvw.exe Token: SeShutdownPrivilege 1832 mscorsvw.exe Token: SeShutdownPrivilege 1832 mscorsvw.exe Token: SeShutdownPrivilege 1832 mscorsvw.exe Token: SeShutdownPrivilege 1832 mscorsvw.exe Token: SeShutdownPrivilege 1832 mscorsvw.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1832 wrote to memory of 1380 1832 mscorsvw.exe 41 PID 1832 wrote to memory of 1380 1832 mscorsvw.exe 41 PID 1832 wrote to memory of 1380 1832 mscorsvw.exe 41 PID 1832 wrote to memory of 2172 1832 mscorsvw.exe 42 PID 1832 wrote to memory of 2172 1832 mscorsvw.exe 42 PID 1832 wrote to memory of 2172 1832 mscorsvw.exe 42 PID 1832 wrote to memory of 2192 1832 mscorsvw.exe 43 PID 1832 wrote to memory of 2192 1832 mscorsvw.exe 43 PID 1832 wrote to memory of 2192 1832 mscorsvw.exe 43 PID 1832 wrote to memory of 3000 1832 mscorsvw.exe 44 PID 1832 wrote to memory of 3000 1832 mscorsvw.exe 44 PID 1832 wrote to memory of 3000 1832 mscorsvw.exe 44 PID 1832 wrote to memory of 1504 1832 mscorsvw.exe 45 PID 1832 wrote to memory of 1504 1832 mscorsvw.exe 45 PID 1832 wrote to memory of 1504 1832 mscorsvw.exe 45 PID 1832 wrote to memory of 1668 1832 mscorsvw.exe 46 PID 1832 wrote to memory of 1668 1832 mscorsvw.exe 46 PID 1832 wrote to memory of 1668 1832 mscorsvw.exe 46 PID 1832 wrote to memory of 1044 1832 mscorsvw.exe 47 PID 1832 wrote to memory of 1044 1832 mscorsvw.exe 47 PID 1832 wrote to memory of 1044 1832 mscorsvw.exe 47 PID 1832 wrote to memory of 2432 1832 mscorsvw.exe 48 PID 1832 wrote to memory of 2432 1832 mscorsvw.exe 48 PID 1832 wrote to memory of 2432 1832 mscorsvw.exe 48 PID 1832 wrote to memory of 1036 1832 mscorsvw.exe 49 PID 1832 wrote to memory of 1036 1832 mscorsvw.exe 49 PID 1832 wrote to memory of 1036 1832 mscorsvw.exe 49 PID 1832 wrote to memory of 2624 1832 mscorsvw.exe 50 PID 1832 wrote to memory of 2624 1832 mscorsvw.exe 50 PID 1832 wrote to memory of 2624 1832 mscorsvw.exe 50 PID 1832 wrote to memory of 2748 1832 mscorsvw.exe 51 PID 1832 wrote to memory of 2748 1832 mscorsvw.exe 51 PID 1832 wrote to memory of 2748 1832 mscorsvw.exe 51 PID 1832 wrote to memory of 928 1832 mscorsvw.exe 52 PID 1832 wrote to memory of 928 1832 mscorsvw.exe 52 PID 1832 wrote to memory of 928 1832 mscorsvw.exe 52 PID 1832 wrote to memory of 836 1832 mscorsvw.exe 53 PID 1832 wrote to memory of 836 1832 mscorsvw.exe 53 PID 1832 wrote to memory of 836 1832 mscorsvw.exe 53 PID 1832 wrote to memory of 2128 1832 mscorsvw.exe 54 PID 1832 wrote to memory of 2128 1832 mscorsvw.exe 54 PID 1832 wrote to memory of 2128 1832 mscorsvw.exe 54 PID 1832 wrote to memory of 1672 1832 mscorsvw.exe 55 PID 1832 wrote to memory of 1672 1832 mscorsvw.exe 55 PID 1832 wrote to memory of 1672 1832 mscorsvw.exe 55 PID 1832 wrote to memory of 2652 1832 mscorsvw.exe 56 PID 1832 wrote to memory of 2652 1832 mscorsvw.exe 56 PID 1832 wrote to memory of 2652 1832 mscorsvw.exe 56 PID 1832 wrote to memory of 1400 1832 mscorsvw.exe 57 PID 1832 wrote to memory of 1400 1832 mscorsvw.exe 57 PID 1832 wrote to memory of 1400 1832 mscorsvw.exe 57 PID 1832 wrote to memory of 3024 1832 mscorsvw.exe 58 PID 1832 wrote to memory of 3024 1832 mscorsvw.exe 58 PID 1832 wrote to memory of 3024 1832 mscorsvw.exe 58 PID 1832 wrote to memory of 996 1832 mscorsvw.exe 59 PID 1832 wrote to memory of 996 1832 mscorsvw.exe 59 PID 1832 wrote to memory of 996 1832 mscorsvw.exe 59 PID 1832 wrote to memory of 1300 1832 mscorsvw.exe 60 PID 1832 wrote to memory of 1300 1832 mscorsvw.exe 60 PID 1832 wrote to memory of 1300 1832 mscorsvw.exe 60 PID 1832 wrote to memory of 628 1832 mscorsvw.exe 61 PID 1832 wrote to memory of 628 1832 mscorsvw.exe 61 PID 1832 wrote to memory of 628 1832 mscorsvw.exe 61 PID 1832 wrote to memory of 2508 1832 mscorsvw.exe 62
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_658468285074d4dba41a9d5598139610.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_658468285074d4dba41a9d5598139610.exe"1⤵
- Drops Chrome extension
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2084
-
C:\Windows\System32\vdsldr.exeC:\Windows\System32\vdsldr.exe -Embedding1⤵PID:2696
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵PID:3040
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2980
-
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2796
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe1⤵
- Executes dropped EXE
PID:2348
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe1⤵
- Executes dropped EXE
- Windows security modification
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 1a8 -InterruptEvent 194 -NGENProcess 198 -Pipe 1a4 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1380
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 250 -InterruptEvent 194 -NGENProcess 198 -Pipe 1a8 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2172
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 15c -InterruptEvent 20c -NGENProcess 220 -Pipe 150 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2192
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 20c -InterruptEvent 25c -NGENProcess 244 -Pipe 258 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:3000
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 25c -InterruptEvent 260 -NGENProcess 22c -Pipe 254 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1504
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 260 -InterruptEvent 264 -NGENProcess 220 -Pipe 248 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1668
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 264 -InterruptEvent 268 -NGENProcess 244 -Pipe 1ec -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:1044
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 26c -InterruptEvent 230 -NGENProcess 25c -Pipe 15c -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2432
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 230 -InterruptEvent 27c -NGENProcess 20c -Pipe 278 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:1036
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 27c -InterruptEvent 26c -NGENProcess 20c -Pipe 260 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2624
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 26c -InterruptEvent 284 -NGENProcess 25c -Pipe 22c -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:2748
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 284 -InterruptEvent 25c -NGENProcess 27c -Pipe 280 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:928
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 25c -InterruptEvent 28c -NGENProcess 20c -Pipe 230 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:836
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 28c -InterruptEvent 20c -NGENProcess 284 -Pipe 288 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2128
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 20c -InterruptEvent 294 -NGENProcess 27c -Pipe 26c -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1672
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 294 -InterruptEvent 27c -NGENProcess 28c -Pipe 290 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2652
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 27c -InterruptEvent 29c -NGENProcess 284 -Pipe 25c -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:1400
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 29c -InterruptEvent 284 -NGENProcess 294 -Pipe 298 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:3024
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 284 -InterruptEvent 2a4 -NGENProcess 28c -Pipe 20c -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:996
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2a4 -InterruptEvent 28c -NGENProcess 29c -Pipe 2a0 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1300
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 28c -InterruptEvent 2ac -NGENProcess 294 -Pipe 27c -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:628
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2ac -InterruptEvent 294 -NGENProcess 2a4 -Pipe 2a8 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2508
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 294 -InterruptEvent 2b4 -NGENProcess 29c -Pipe 284 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:1640
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2b4 -InterruptEvent 29c -NGENProcess 2ac -Pipe 2b0 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2284
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 29c -InterruptEvent 2bc -NGENProcess 2a4 -Pipe 28c -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:1036
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2bc -InterruptEvent 2a4 -NGENProcess 2b4 -Pipe 2b8 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1588
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2a4 -InterruptEvent 2c4 -NGENProcess 2ac -Pipe 294 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:1480
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2c4 -InterruptEvent 2ac -NGENProcess 2bc -Pipe 2c0 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2168
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2ac -InterruptEvent 2d4 -NGENProcess 2b4 -Pipe 2d0 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:2396
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2d4 -InterruptEvent 2b4 -NGENProcess 2c4 -Pipe 270 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1836
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2b4 -InterruptEvent 2dc -NGENProcess 2bc -Pipe 274 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:1092
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2dc -InterruptEvent 2bc -NGENProcess 2d4 -Pipe 2d8 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1992
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2bc -InterruptEvent 2e4 -NGENProcess 2c4 -Pipe 2ac -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:916
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2e4 -InterruptEvent 2c4 -NGENProcess 2dc -Pipe 2e0 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:700
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2c4 -InterruptEvent 2ec -NGENProcess 2d4 -Pipe 2b4 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1520
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2ec -InterruptEvent 2d4 -NGENProcess 2e4 -Pipe 2e8 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2688
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2d4 -InterruptEvent 2f4 -NGENProcess 2dc -Pipe 2bc -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:560
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2f4 -InterruptEvent 2dc -NGENProcess 2ec -Pipe 2f0 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:740
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2dc -InterruptEvent 2fc -NGENProcess 2e4 -Pipe 2c4 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2708
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2fc -InterruptEvent 300 -NGENProcess 2f8 -Pipe 268 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2956
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 300 -InterruptEvent 304 -NGENProcess 2ec -Pipe 2d4 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2260
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 304 -InterruptEvent 308 -NGENProcess 2e4 -Pipe 2cc -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2164
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 308 -InterruptEvent 30c -NGENProcess 2f8 -Pipe 2f4 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:1900
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 30c -InterruptEvent 2f8 -NGENProcess 304 -Pipe 2ec -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:2596
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2f8 -InterruptEvent 304 -NGENProcess 2dc -Pipe 2e4 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2080
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 304 -InterruptEvent 318 -NGENProcess 310 -Pipe 300 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:1092
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 318 -InterruptEvent 310 -NGENProcess 2f8 -Pipe 314 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1824
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 310 -InterruptEvent 320 -NGENProcess 2dc -Pipe 30c -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:932
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 320 -InterruptEvent 324 -NGENProcess 31c -Pipe 2fc -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1400
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 324 -InterruptEvent 328 -NGENProcess 2f8 -Pipe 304 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2488
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 328 -InterruptEvent 32c -NGENProcess 2dc -Pipe 308 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:700
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 32c -InterruptEvent 330 -NGENProcess 31c -Pipe 318 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1848
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 330 -InterruptEvent 334 -NGENProcess 2f8 -Pipe 310 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2608
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 334 -InterruptEvent 338 -NGENProcess 2dc -Pipe 320 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2160
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 338 -InterruptEvent 33c -NGENProcess 31c -Pipe 324 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2016
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 33c -InterruptEvent 340 -NGENProcess 2f8 -Pipe 328 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2588
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 340 -InterruptEvent 32c -NGENProcess 2dc -Pipe 330 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1576
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 32c -InterruptEvent 344 -NGENProcess 334 -Pipe 29c -Comment "NGen Worker Process"2⤵PID:2028
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 344 -InterruptEvent 348 -NGENProcess 2f8 -Pipe 2c8 -Comment "NGen Worker Process"2⤵PID:2696
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 348 -InterruptEvent 34c -NGENProcess 2dc -Pipe 338 -Comment "NGen Worker Process"2⤵PID:2884
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 34c -InterruptEvent 350 -NGENProcess 334 -Pipe 33c -Comment "NGen Worker Process"2⤵PID:2448
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 350 -InterruptEvent 354 -NGENProcess 2f8 -Pipe 340 -Comment "NGen Worker Process"2⤵PID:2228
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 354 -InterruptEvent 358 -NGENProcess 2dc -Pipe 32c -Comment "NGen Worker Process"2⤵PID:2604
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 358 -InterruptEvent 35c -NGENProcess 334 -Pipe 344 -Comment "NGen Worker Process"2⤵PID:2328
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 35c -InterruptEvent 360 -NGENProcess 2f8 -Pipe 348 -Comment "NGen Worker Process"2⤵PID:2544
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 360 -InterruptEvent 364 -NGENProcess 2dc -Pipe 34c -Comment "NGen Worker Process"2⤵PID:928
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 364 -InterruptEvent 368 -NGENProcess 334 -Pipe 350 -Comment "NGen Worker Process"2⤵PID:1812
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 368 -InterruptEvent 36c -NGENProcess 2f8 -Pipe 354 -Comment "NGen Worker Process"2⤵PID:1860
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 36c -InterruptEvent 370 -NGENProcess 2dc -Pipe 34c -Comment "NGen Worker Process"2⤵PID:1088
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 370 -InterruptEvent 374 -NGENProcess 334 -Pipe 35c -Comment "NGen Worker Process"2⤵
- Loads dropped DLL
- Drops file in Windows directory
PID:812
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 374 -InterruptEvent 334 -NGENProcess 36c -Pipe 2f8 -Comment "NGen Worker Process"2⤵PID:1296
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 334 -InterruptEvent 37c -NGENProcess 2dc -Pipe 364 -Comment "NGen Worker Process"2⤵PID:1452
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 37c -InterruptEvent 380 -NGENProcess 378 -Pipe 368 -Comment "NGen Worker Process"2⤵PID:1028
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 380 -InterruptEvent 384 -NGENProcess 36c -Pipe 370 -Comment "NGen Worker Process"2⤵PID:536
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 384 -InterruptEvent 388 -NGENProcess 2dc -Pipe 360 -Comment "NGen Worker Process"2⤵PID:868
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 388 -InterruptEvent 38c -NGENProcess 378 -Pipe 374 -Comment "NGen Worker Process"2⤵PID:1136
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 38c -InterruptEvent 390 -NGENProcess 36c -Pipe 334 -Comment "NGen Worker Process"2⤵PID:896
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 390 -InterruptEvent 394 -NGENProcess 2dc -Pipe 37c -Comment "NGen Worker Process"2⤵PID:1536
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 394 -InterruptEvent 398 -NGENProcess 378 -Pipe 380 -Comment "NGen Worker Process"2⤵PID:1648
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 398 -InterruptEvent 39c -NGENProcess 36c -Pipe 384 -Comment "NGen Worker Process"2⤵PID:2464
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 39c -InterruptEvent 3a0 -NGENProcess 2dc -Pipe 388 -Comment "NGen Worker Process"2⤵PID:2468
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 3a0 -InterruptEvent 3a4 -NGENProcess 378 -Pipe 38c -Comment "NGen Worker Process"2⤵PID:2688
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 3a4 -InterruptEvent 3a8 -NGENProcess 36c -Pipe 390 -Comment "NGen Worker Process"2⤵PID:884
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 3a8 -InterruptEvent 3ac -NGENProcess 2dc -Pipe 394 -Comment "NGen Worker Process"2⤵PID:1324
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 3ac -InterruptEvent 3b0 -NGENProcess 378 -Pipe 398 -Comment "NGen Worker Process"2⤵PID:2176
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 3b0 -InterruptEvent 3b4 -NGENProcess 36c -Pipe 39c -Comment "NGen Worker Process"2⤵PID:2180
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 3b4 -InterruptEvent 3b8 -NGENProcess 2dc -Pipe 3a0 -Comment "NGen Worker Process"2⤵PID:2620
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 3b8 -InterruptEvent 3bc -NGENProcess 378 -Pipe 3a4 -Comment "NGen Worker Process"2⤵PID:3032
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 3a8 -InterruptEvent 3b4 -NGENProcess 3c0 -Pipe 3b8 -Comment "NGen Worker Process"2⤵PID:2884
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 3b4 -InterruptEvent 3ac -NGENProcess 378 -Pipe 31c -Comment "NGen Worker Process"2⤵PID:2492
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2dc -InterruptEvent 3ac -NGENProcess 3b4 -Pipe 3bc -Comment "NGen Worker Process"2⤵PID:2780
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 3ac -InterruptEvent 2a4 -NGENProcess 378 -Pipe 3a4 -Comment "NGen Worker Process"2⤵PID:892
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2a4 -InterruptEvent 3c8 -NGENProcess 3a8 -Pipe 3c0 -Comment "NGen Worker Process"2⤵PID:2328
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 3c8 -InterruptEvent 3cc -NGENProcess 3b4 -Pipe 3c4 -Comment "NGen Worker Process"2⤵PID:2404
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 3cc -InterruptEvent 3d0 -NGENProcess 378 -Pipe 1d8 -Comment "NGen Worker Process"2⤵PID:2040
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 3d0 -InterruptEvent 3d4 -NGENProcess 3a8 -Pipe 2dc -Comment "NGen Worker Process"2⤵PID:1812
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 3d4 -InterruptEvent 3d8 -NGENProcess 3b4 -Pipe 3ac -Comment "NGen Worker Process"2⤵PID:2980
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 3d8 -InterruptEvent 3dc -NGENProcess 378 -Pipe 2a4 -Comment "NGen Worker Process"2⤵PID:2648
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 3a8 -InterruptEvent 3e0 -NGENProcess 3c8 -Pipe 3dc -Comment "NGen Worker Process"2⤵PID:2360
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 3e0 -InterruptEvent 3e4 -NGENProcess 3b4 -Pipe 3cc -Comment "NGen Worker Process"2⤵
- Modifies data under HKEY_USERS
PID:2408
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 3e4 -InterruptEvent 3d4 -NGENProcess 378 -Pipe 36c -Comment "NGen Worker Process"2⤵
- Loads dropped DLL
- Drops file in Windows directory
- Modifies data under HKEY_USERS
PID:2060
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 3d4 -InterruptEvent 378 -NGENProcess 3e0 -Pipe a4 -Comment "NGen Worker Process"2⤵
- Modifies data under HKEY_USERS
PID:988
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 378 -InterruptEvent 3e8 -NGENProcess 3b4 -Pipe a0 -Comment "NGen Worker Process"2⤵
- Loads dropped DLL
- Drops file in Windows directory
- Modifies data under HKEY_USERS
PID:1516
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 3e8 -InterruptEvent 3b4 -NGENProcess 3d4 -Pipe 3d0 -Comment "NGen Worker Process"2⤵
- Modifies data under HKEY_USERS
PID:2468
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 3b4 -InterruptEvent 3f0 -NGENProcess 3e0 -Pipe 3e4 -Comment "NGen Worker Process"2⤵
- Loads dropped DLL
- Drops file in Windows directory
- Modifies data under HKEY_USERS
PID:1816
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 3f0 -InterruptEvent 3e0 -NGENProcess 3e8 -Pipe 3ec -Comment "NGen Worker Process"2⤵PID:2712
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 3e0 -InterruptEvent 3f8 -NGENProcess 3d4 -Pipe 378 -Comment "NGen Worker Process"2⤵
- Loads dropped DLL
- Drops file in Windows directory
PID:860
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 3fc -InterruptEvent 3f0 -NGENProcess 404 -Pipe 3e0 -Comment "NGen Worker Process"2⤵
- Modifies data under HKEY_USERS
PID:2884
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 3f0 -InterruptEvent 3a8 -NGENProcess 3d4 -Pipe 3b4 -Comment "NGen Worker Process"2⤵
- Loads dropped DLL
- Modifies data under HKEY_USERS
PID:956
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 3a8 -InterruptEvent 3d4 -NGENProcess 3fc -Pipe 3f8 -Comment "NGen Worker Process"2⤵PID:2504
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 3d4 -InterruptEvent 408 -NGENProcess 134 -Pipe 3e8 -Comment "NGen Worker Process"2⤵PID:1372
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 3fc -InterruptEvent 3d4 -NGENProcess 3f4 -Pipe 134 -Comment "NGen Worker Process"2⤵PID:292
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 3d4 -InterruptEvent 418 -NGENProcess 404 -Pipe 414 -Comment "NGen Worker Process"2⤵PID:2652
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 418 -InterruptEvent 41c -NGENProcess 3c8 -Pipe 3f0 -Comment "NGen Worker Process"2⤵PID:2108
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 41c -InterruptEvent 420 -NGENProcess 3f4 -Pipe 3d8 -Comment "NGen Worker Process"2⤵PID:716
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 420 -InterruptEvent 424 -NGENProcess 404 -Pipe 408 -Comment "NGen Worker Process"2⤵PID:2332
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 424 -InterruptEvent 428 -NGENProcess 3c8 -Pipe 3fc -Comment "NGen Worker Process"2⤵PID:2408
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 428 -InterruptEvent 42c -NGENProcess 3f4 -Pipe 3d4 -Comment "NGen Worker Process"2⤵PID:3044
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 42c -InterruptEvent 430 -NGENProcess 404 -Pipe 418 -Comment "NGen Worker Process"2⤵PID:2316
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 434 -InterruptEvent 428 -NGENProcess 438 -Pipe 42c -Comment "NGen Worker Process"2⤵PID:1504
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 428 -InterruptEvent 41c -NGENProcess 404 -Pipe 420 -Comment "NGen Worker Process"2⤵PID:880
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵
- Executes dropped EXE
PID:2744
-
C:\Windows\system32\IEEtwCollector.exeC:\Windows\system32\IEEtwCollector.exe /V1⤵
- Executes dropped EXE
PID:740
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
640KB
MD5b63fa5ce2875534accc78ca57c579570
SHA1b64d2803287004a6798fff0c56cb9e9effba6b4a
SHA25640050dbc1ab3cbfce1579b8404e91c43049425c9c14e5ec521ecbc191b0ef54a
SHA5128f52750f4520d624895f7492ad57eba8d7cb9e7e078397db0301c227ea54cefd31640c0289f3dcaa3e1e11b5f5d742e66b50d8eeb83b3881c992b6e15ef4d8ae
-
Filesize
1.5MB
MD5ab562c0ddeb0f7bff0ea05e567fc9d38
SHA1510cd7917d43e5a6d48ac5979c39d8e25e63d0ba
SHA2560a02b362b810ebf5a63b0cea2376224b71e50132d349215d3ed3574f883cab4a
SHA512680e1a66a1407d7ffe1cb2baf6771f1f38c1a2e6fdf231db6087866eb6052f9c276e51f166931a291d55dc5b2c60d02da867b44ac94305d757a39297c0715056
-
Filesize
4.8MB
MD5f1bf087c4e4cce9a93461ac0dd921a4a
SHA13f233a62aaa11d2354f44b2d0225e10e08305878
SHA25618d8385232aea5c4e6461ede65d712b2b6e25af142ead0148f84cd1d10a2c726
SHA512cae805b72a1a63b596d4adbb0067c23e271aaf9ffe9efffa744f21d30486e836a626acd2d9e3f89a88c5ba7b2c765feaf73ac13962736dcb7312852d909eb2cb
-
Filesize
1.2MB
MD5aadd768fa6407c9bd1033f400cc40676
SHA132b0076e3f90fd67040bf1fa2b17dfc377d4ac2d
SHA256364347e34145e414bb2c2652d810db75515deec7f05bc4bb217aa320f6778a80
SHA51222068284e425b9adca780692429a904a42b92a134193d54417b3d9376abad46ae13ef44cf556d46afa95f8fccdc504dff2b57d9b0fc3a9d3af2a026764e75549
-
Filesize
872KB
MD595ec539f34fad9cbcd28b6952d1ae84b
SHA11358cc180b7254dd01b383421813ce7e0946452a
SHA256ab11a42d6dd4895e098389f30f709bb1a941d268d06f37dfab338a160bcae232
SHA5121347ef4d8af8fc9735e6f01cb63f79cf5be1947b0b48d4bff056cf5933335d2f77b6604ff97472e36dd2779ec88b21b908567cf568ebe0890b8f2d6b4a49d389
-
Filesize
610KB
MD508afc3f5041f56193960a5d156759ec4
SHA1e919e2caf9721cf4d6a1e8ccf9be55b9e377d9c2
SHA25697d6c93ac0f9e10a0eea6eed41c560e997440d1363c087af3d2f87f39f6d4c23
SHA512b4db1b4ac37adafb4f9f1541a57a1773f3463a55e7e8a997f57d9133bcd4e6ea67d4927069e6be7b67795d2715f3381261a37c5bac54658aedd7e3434f38e1f3
-
Filesize
4KB
MD5067fb5ba94438d8130b52a808b69d6bd
SHA160e97da6cd204971b6ebd23bd1e5dd25093a401d
SHA256a92ee18f817466a335ce5a23c03a4fe738ea3f24c244cda9d1a289eadb63939f
SHA5125605ab7c0ad9bac6d553053659109b61629db610d1dafe1052209abc625c9f67b7db47b8f4336fd48c2f58b8bc8013396819d8733a5b038849f22f66553cc226
-
Filesize
559KB
MD5ed273c6a775cded8428688b749515a81
SHA1c1ebd115c760caa05b5704a2f7d69cd4e27dd5d1
SHA2567d95ac7605fbc7eba33e02ca786ab28a5ecd2a0904f0e2424b39161000103f99
SHA5127738e680b7c770f4fa32fa89c5d4eb7382a8fabd90c7b1ea13b6a2292b4c8f3dc225231025efe650edfb80654eb358ba56b8bdcbb838b4c612c2e935a429bc7e
-
Filesize
1003KB
MD5bd814170ebf86959643e322f52659197
SHA1e90c9ba63bd62652d145f630b91f0dee08ae5bbf
SHA25603e98877d4cc2a064428c35e2d1aaddd5347546144810798a29d6e33d8387c18
SHA5122d2ccf10af6e33a17ab6b456629744ba237b8812c9a1fa6d7b3a87bcd812846335b3ee8be8d1b33745100b6091ed48253c8c32d0feee46600ee54a346c56a628
-
Filesize
590KB
MD5cd6de698fc05e3800a70f38e9ef68095
SHA11a9a1f9f6bdb296c0f01bee361a977a23ab2428b
SHA256d87cf0b8a9e6106179eea893c3e14c642d48f2d93b9df7e8281b2e896efed0a7
SHA512baed64cec4bd7a6e7f43f293f0dbb6424997a04e17fd5a6bd913ea2336aa6d3a155b1d858cbd2a2d809648ddc92a6a61adb9590e452658b04a63e87c090babb9
-
Filesize
29KB
MD5d59a6b36c5a94916241a3ead50222b6f
SHA1e274e9486d318c383bc4b9812844ba56f0cff3c6
SHA256a38d01d3f024e626d579cf052ac3bd4260bb00c34bc6085977a5f4135ab09b53
SHA51217012307955fef045e7c13bf0613bd40df27c29778ba6572640b76c18d379e02dc478e855c9276737363d0ad09b9a94f2adaa85da9c77ebb3c2d427aa68e2489
-
Filesize
81KB
MD5b13f51572f55a2d31ed9f266d581e9ea
SHA17eef3111b878e159e520f34410ad87adecf0ca92
SHA256725980edc240c928bec5a5f743fdabeee1692144da7091cf836dc7d0997cef15
SHA512f437202723b2817f2fef64b53d4eb67f782bdc61884c0c1890b46deca7ca63313ee2ad093428481f94edfcecd9c77da6e72b604998f7d551af959dbd6915809c
-
C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft-Windows-H#\a46df77acafec60e31859608625e6354\Microsoft-Windows-HomeGroupDiagnostic.NetListMgr.Interop.ni.dll
Filesize105KB
MD5d9c0055c0c93a681947027f5282d5dcd
SHA19bd104f4d6bd68d09ae2a55b1ffc30673850780f
SHA256dc7eb30a161a2f747238c8621adb963b50227a596d802b5f9110650357f7f7ed
SHA5125404050caa320cdb48a6ccd34282c12788ee8db4e00397dde936cee00e297e9e438dcaa5fcb4e92525f167637b500db074ac91971d4730d222ac4713a3e7b930
-
C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft.Office.To#\11940d5133d63001fa4499c315655e15\Microsoft.Office.Tools.Word.v9.0.ni.dll
Filesize1.1MB
MD57835e60e560a49049ae728698da3d301
SHA187b357b1b3c9a2ad2f3b89b10a42af021ab76afe
SHA256df34cbc18c66aa387324c45196d71ebe7c91a83fbbdc91766f9f47330a0cb2fa
SHA512b95c33a2746a331e4416f7449c8ab613ba16c716a449e446d825f34dfaf754ea7562bf77cf5a73a78599e0b67a3a697437baa9aa516e40e06981693c8ea5b993
-
C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft.Office.To#\6337d25ea4dd40045a047cb662ee4394\Microsoft.Office.Tools.Outlook.v9.0.ni.dll
Filesize238KB
MD50a4ed78b7995d94fa42379f84cd5f8e9
SHA190ba188fe0ebd38ad225e7ce3a24dd9b6b68056b
SHA2560a75d0d332692cc36d539abdd36f3ff5ef2ab786a9404548ca6c98fd566c4d86
SHA51286ac346de836aa6dd7e017ff4329803c9165758dcfe3aa1881e46ca73e15e6cdb269fcc5b082d717774666f9bc40051a47b5261bfe73901804eb4b0bfacd1184
-
C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft.Office.To#\dc8ba97b4a8deefeb1efac60e1bdb693\Microsoft.Office.Tools.Excel.v9.0.ni.dll
Filesize1.8MB
MD59958f23efa2a86f8195f11054f94189a
SHA178ec93b44569ea7ebce452765568da5c73511931
SHA2563235e629454949220524dd976bec494f7cc4c9abeaf3ee63fc430cbe4fbcf7b6
SHA5123061f8de0abf4b2b37fbc5b930663414499fb6127e2892fe0a0f3dfba6da3927e6caa7bcba31d05faee717d271ecf277607070452701a140dc7d3d4b8d0bfeb1
-
C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft.Office.To#\dd4deeafd891c39e6eb4a2daaafa9124\Microsoft.Office.Tools.Common.v9.0.ni.dll
Filesize1.0MB
MD5598a06ea8f1611a24f86bc0bef0f547e
SHA15a4401a54aa6cd5d8fd883702467879fb5823e37
SHA256e55484d4fe504e02cc49fde33622d1a00cdae29266775dcb7c850203d5ed2512
SHA512774e6facd3c56d1c700d9f97ee2e678d06b17e0493e8dc347be22bcba361bd6225caef702e53f0b08cacc9e6a4c4556280b43d96c928642266286f4dec8b5570
-
C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft.VisualStu#\077a55be734d6ef6e2de59fa7325dac5\Microsoft.VisualStudio.Tools.Office.Contract.v9.0.ni.dll
Filesize205KB
MD50a41e63195a60814fe770be368b4992f
SHA1d826fd4e4d1c9256abd6c59ce8adb6074958a3e7
SHA2564a8ccb522a4076bcd5f217437c195b43914ea26da18096695ee689355e2740e1
SHA5121c916165eb5a2e30d4c6a67f2023ab5df4e393e22d9d8123aa5b9b8522fdb5dfe539bcb772a6e55219b23d865ee1438d066e78f0cb138a4a61cc2a1cecf54728
-
C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft.VisualStu#\2951791a1aa22719b6fdcb816f7e6c04\Microsoft.VisualStudio.Tools.Office.Contract.v10.0.ni.dll
Filesize43KB
MD568c51bcdc03e97a119431061273f045a
SHA16ecba97b7be73bf465adf3aa1d6798fedcc1e435
SHA2564a3aa6bd2a02778759886aaa884d1e8e4a089a1e0578c973fcb4fc885901ebaf
SHA512d71d6275c6f389f6b7becb54cb489da149f614454ae739e95c33a32ed805820bef14c98724882c4ebb51b4705f41b3cdb5a8ed134411011087774cac6e9d23e8
-
C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft.VisualStu#\2a1a04d05f8e4dc21aaceafff1f1ab3d\Microsoft.VisualStudio.Tools.Office.HostAdapter.v10.0.ni.dll
Filesize221KB
MD5d6e2243ddd1d290387cafcccd619bf36
SHA1eac2af4d778cb186020f0a2eeeb21494e8c81442
SHA256df3533ce4d768ffc86b708f25157657375f0881c799a089f46185b9adb0ecbd9
SHA512feebd034a94440538131ea3e7627f5a45ec52328d209a6356df57942d2497e4b80db632d20f829f372ed338b3c88760d2cb118378de67dbe55823d294e68e80d
-
C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft.VisualStu#\4c8e1fe1aaaf51395795b7620e456643\Microsoft.VisualStudio.Tools.Office.Word.HostAdapter.v10.0.ni.dll
Filesize305KB
MD5732b08a3cebf28167ae911e7aaed0589
SHA11c8abc7e397b688e3bf357c0b017995e86b270c1
SHA25621c21373beda250a3a1fda5b2151a779e0681f6ec676f7e8a7c3fa507736a538
SHA5123236c0fa6f8ac0ef12fadb1124ba62dc7facf2a0fdee12228a4b2a7f5e347b064f019527d090aabb907dd8ddfceb3ca11f1fb2143484db185d442337611d03e5
-
C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft.VisualStu#\6e100177db1ef25970ca4a9eba03c352\Microsoft.VisualStudio.Tools.Applications.Contract.v9.0.ni.dll
Filesize70KB
MD557b601497b76f8cd4f0486d8c8bf918e
SHA1da797c446d4ca5a328f6322219f14efe90a5be54
SHA2561380d349abb6d461254118591637c8198859d8aadfdb098b8d532fdc4d776e2d
SHA5121347793a9dbff305975f4717afa9ee56443bc48586d35a64e8a375535fa9e0f6333e13c2267d5dbb7fe868aa863b23034a2e655dcd68b59dca75f17a4cbc1850
-
C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft.VisualStu#\8ef1ee838856f1aab1d115ae70261373\Microsoft.VisualStudio.Tools.Office.Excel.HostAdapter.v10.0.ni.dll
Filesize271KB
MD5fca229a2e87d89c00dfd7f8cb96890f7
SHA1008dd874e18a375aa08cb4f7ad964ebc11f3cae9
SHA256fb9cd57f20164bf1c906ad86a9bad66a204edd8b0da3c8e5682fc4769bba0ad6
SHA5124faca63e88086ea3c8c2f4c00c0dd2f1a39dada2618bf0b9c0d0dde42afe6730b6beb9ba99be732bf53fb2dd40ad6148c8410e834c60009e3c293e6f7bc8d238
-
C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft.VisualStu#\9e076728e51ab285a8bc0f0b0a226e2c\Microsoft.VisualStudio.Tools.Applications.HostAdapter.v10.0.ni.dll
Filesize82KB
MD52eeeff61d87428ae7a2e651822adfdc4
SHA166f3811045a785626e6e1ea7bab7e42262f4c4c1
SHA25637f2ee9f8794df6d51a678c62b4838463a724fdf1bd65277cd41feaf2e6c9047
SHA512cadf3a04aa6dc2b6b781c292d73e195be5032b755616f4b49c6bdde8b3ae297519fc255b0a46280b60aaf45d4dedb9b828d33f1400792b87074f01bbab19e41a
-
C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft.VisualStu#\c661dbfae88f04b2264fa32a26677cdb\Microsoft.VisualStudio.Tools.Office.Outlook.HostAdapter.v10.0.ni.dll
Filesize122KB
MD54bd84173138b39d10c907419f5f38714
SHA1a5511ae826873340e0674501067f740f6a548e0f
SHA256d09c028c0debf2763d5a6b5a7a42520e15c1e51fe811927e45655722c95e10dc
SHA5129460aa673c943c0dd3cfeb2739a95450ee583f398f857d89388c035787132bb842d65d1b703b2044001db4ea5c2e26fc56684ecdbfaf36448fb7b7e594b07022
-
C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft.VisualStu#\fe8d06712eb58d0150803744020b072a\Microsoft.VisualStudio.Tools.Applications.Contract.v10.0.ni.dll
Filesize43KB
MD5dd1dfa421035fdfb6fd96d301a8c3d96
SHA1d535030ad8d53d57f45bc14c7c7b69efd929efb3
SHA256f71293fe6cf29af54d61bd2070df0a5ff17a661baf1b0b6c1d3393fd23ccd30c
SHA5128e0f2bee9801a4eba974132811d7274e52e6e17ccd60e8b3f74959994f007bdb0c60eb9facb6321c0fdfbcc44e9a77d8c5c776d998ccce256fa864338a6f63b1
-
C:\Windows\assembly\NativeImages_v2.0.50727_64\ehiActivScp\ee22f412f6314443add3ca412afd6569\ehiActivScp.ni.dll
Filesize124KB
MD5929653b5b019b4555b25d55e6bf9987b
SHA1993844805819ee445ff8136ee38c1aee70de3180
SHA2562766353ca5c6a87169474692562282005905f1ca82eaa08e08223fc084dbb9a2
SHA512effc809cca6170575efa7b4b23af9c49712ee9a7aaffd8f3a954c2d293be5be2cf3c388df4af2043f82b9b2ea041acdbb9d7ddd99a2fc744cce95cf4d820d013
-
C:\Windows\assembly\NativeImages_v2.0.50727_64\ehiVidCtl\11d57f5c033326954c0bc4f0b2680812\ehiVidCtl.ni.dll
Filesize2.1MB
MD510b5a285eafccdd35390bb49861657e7
SHA162c05a4380e68418463529298058f3d2de19660d
SHA2565f3bb3296ab50050e6b4ea7e95caa937720689db735c70309e5603a778be3a9a
SHA51219ff9ac75f80814ed5124adc25fc2a6d1d7b825c770e1edb8f5b6990e44f9d2d0c1c0ed75b984e729709d603350055e5a543993a80033367810c417864df1452
-
C:\Windows\assembly\NativeImages_v2.0.50727_64\stdole\70f1aed4a280583cbd09e0f5d9bbc1f5\stdole.ni.dll
Filesize88KB
MD51f394b5ca6924de6d9dbfb0e90ea50ef
SHA14e2caa5e98531c6fbf5728f4ae4d90a1ad150920
SHA2569db0e4933b95ad289129c91cd9e14a0c530f42b55e8c92dc8c881bc3dd40b998
SHA512e27ea0f7b59d41a85547d607ae3c05f32ce19fa5d008c8eaf11d0c253a73af3cfa6df25e3ee7f3920cd775e1a3a2db934e5891b4aafd4270d65a727b439f7476
-
Filesize
640KB
MD54702157ecf4c19f58772266344de201f
SHA197cea367df591c7d02f980280ea66dcb17c80950
SHA25617e8526eb281cfdd57da7874cac53e205c3eaf67c546f6e631ec3722d022d773
SHA5126c979684933cdd043430e5f9a854eb77eea8622c6c9a8a6e4c4ef0e986c33440340d14ea0732bbdb9d9f0282295806f53b4d8737a55920b57bfed7c7ba41fe99
-
Filesize
30.0MB
MD5a621d6d191a828e06eadac694184afed
SHA1524ca43656ee2e01b0705cfb2b5534cdf89ff591
SHA256b1fcb938edc51d029489529b87e3a7d376b4402e438a6e3587f8cef34811b003
SHA512d853c73c1e040cba6d6ec4ee5a392dbb954af80210d3d792f0a9862bff5f147044564fa11e2e91fdd53fc5b7e533fa7117bb7e03715f27dd19ef5ea1d53cd93e
-
Filesize
715KB
MD5f1b8df73df2495a94be1ffe5a191cf3e
SHA1b4791f0a69dc0666616782e537f7305f2845137c
SHA2567221bb118b6dab83b6df198f5bfe1c62073602fee2b3c2d7872e37d481679cd0
SHA512278bfff7dcd3d30dd8bb31646acd1e51eec5d32137ac10de85e1952ce5afcbce9db68af2108ffbaff4eef9df528621b9443e93f46ec0533a2f299f49376c98ac
-
Filesize
624KB
MD51782dd020390df0c360ccebcad93e3b7
SHA17762e3a95de9f93b3ff1a1b802ec841feddc5272
SHA25694a5dc99eada86bf1d08768da081430e1cf6cc535766a59c80a116a6ef953cb8
SHA512e1144ea85b29a7eb7e0752c0aa96bca6ac1e1ccbcb7a07edde5d53de7b0404b54ee815b4558088d5fc10c92ea925e565d83d6018b2a7a92eafa77f2d8807e8d8
-
Filesize
536KB
MD5c8ad11af2888edd0e54f133644fbd798
SHA104995537144d511d1422d9a582a2e3587b243f2e
SHA2569239b47e9dc4d206e82a906120f2c05a9673ee727289bf5690dbd016b4e9ae2f
SHA5120693e9f7442cabc5f41c3ffa986f64c603e5435c196a5d3fd16b7a3a4a68da0dc30fe7031aabafff8d7ddc7e7d5b0c09c198b7e4ae3e3a6dc62842f935fe5b83
-
Filesize
577KB
MD5e35177fa04e00918dc18096897f19d36
SHA1ef585d2ae713a0d1e310e6d83d6417a6aeb05a6c
SHA256d1a4ab6b8019593b9333a00fa4c2d1e997036a9cd08b8aefbf44c31b5604b40b
SHA512f9a4d0e5a351f49c38fba2484b9482803539f88945c07661b3d548a3c36fa91ddd4fbab833aa892c16e5c2784aa8cefb65f7371bf4cf4cd36a0a42341d91de59
-
Filesize
1.1MB
MD5da3066b5047544ae348e890e1b0963a0
SHA14858cc8e5130a4945b6591161007fbe61b03703a
SHA25650006d0fc6246332287b2a200947c73ee54273793f83e57d96ecf55d77ca4bd8
SHA512ee8636bf3326c575f77ff7962b876d12ac6d07e4e12e306f55500ea0001e77d0045f3b5ea18a29ea8ed2420b5df8a681fb7254f0ece0cc742debe069e6081347
-
Filesize
638KB
MD5efa36add735cb380ec9aa5db7c9929ae
SHA1855676d14f78fd381acdf1d6460702ecdbc2d43b
SHA2563cdb2a75096e98f01607347e624aa19e442ed9dd3075d98a493652354e43dbc1
SHA512f1470f7933ede4582d082b9f23801d88bdc669f1e23509972b5d92021e25ebbbfd7fe9815a9408c8a1a09e06bb6b559c0ad670f07e6ba43c01263f7acb49dc33
-
Filesize
625KB
MD5e0ffbeee115abdaad2dda22a98be04d3
SHA1f231e7d81f5926f217f8f019e0e7512c81444c22
SHA256dca17da13287605cd8d7389b02348cf228f449d3bd9a1e8e2ca16734d844fe8a
SHA512c5cfb258d3262dbdd1f2564c87a4e2bbeef1450676135ccf40dc154db41451f35885cee7d04a1bf767fb77e1892a5532ac9ab37101be0dba3eeb503c88d98a95
-
Filesize
514KB
MD5bb2999d2ea17c756b9930db55601a8ba
SHA1e48620435c117d404f63aafce5090bf85054d306
SHA25651df59d750b8b65b91971fcebcfce7cdb008596b92746a78380ed8e9b80b1b09
SHA51297f281eb8c6f9ef34a4dc887c168809dc4fe5a8e087d266f50ad539f2d78d4c5a75725793394a820965ac1c894b1216fb997a3952817cd0c95da75edf470e45e
-
Filesize
540KB
MD5422fbcf839879a0f1a1d5cf78f71356a
SHA17018aa1b3bef8a1c2b436bcd7465ae313afd6a05
SHA2566dc939f0a91d5cc142e66ec7936d5c4e87c9a25ac4ff0c4886b4a04f343a1093
SHA512fa65bdbf3ffa50884d882d766dd980a3759d7a99a28aaeafdf5d3fd63cc1176db6255952cbbfd4646bb3eb4820fb0802f65068842e22a2714391c015370c9a29
-
Filesize
2.0MB
MD5df92b871e0b9501ffb2b24837b40ac33
SHA163ec7f423ee1443ca5c8a6eeaeb7ed28b06a0309
SHA256b33378be9e3ea8d83aefdccf3139e4fd7ec2a2f8c357a7a91f73ea273895a6fe
SHA512be5a1776101a490761a764bd11eae936705835cddf6ad0ec805600d815f45f3b9e592b9323c4235a7d3a8239a838c4a5eefe89fb12be7247d786a66c7a724de6
-
Filesize
698KB
MD55812a9ee05d8847463f2c0fcd20b13db
SHA1584aaf4c404645e393a02df2f44f4ed9363ba19e
SHA256de173fe398e794250991d463708f93590d9f868fd826643bf9936536c93fba32
SHA51209a9083357707ce74aff10c79302942456abd175cf3c3b63d49c6d6799c46e3cc7dfb37c3cc5d4e25241423a3582f94db431a8ff75a30e7bafad7edb33a1fb41
-
Filesize
1.9MB
MD5302c820ff521eeab7a16648a1885f5e8
SHA140ee508b1617e00eae73fd51f0f107cc355065a0
SHA256cb8f145a9fc2b5e1ea33b2818dcd5724aab01c59f55e8c98f3503f5f10ffafde
SHA51204dfae7c81fa6f0fb3291c3a58dae38b8fe8425ed39eed2c76d7843bfa63abbaae178ba9545f492b4a18d4ac59399970abbb0d98ffbfda9555c41c0a9e71a379
-
Filesize
2.1MB
MD5308550e8b3addae00d1959c5618b597f
SHA100a669e2b902c64d8b1ab76a65044a8d96a8aaa5
SHA2562a4ba840bd1a4f53f7eb7246ab7c1fd78e417eede25687b530404cbbe8df4a96
SHA512c0073df6e7b9a2ddc70d121169f940723b6538e7d1f4c4becd4bc1b775679a703a92ef5824b99c14f501f70155d72cbaf19322d99e3be8d5a075514f017d1e66
-
Filesize
582KB
MD555eb1ddcbde489fda9738484dd0e6ebb
SHA1e623afacab24baf7c1b774e72ef6e0a0c2f11a90
SHA256d44645fe64b1a840cb59dd711bbc0125ff197b47fb5bd71e44a5110baa4ffb16
SHA512f4224d3f2b62a3fa86f3d191a61f02c45a354ddf0edde603fc32826b52f70f2c230a63f490784374cf55298f211ead6bb8f194e77535c1f8f948da9dcf16dbb0
-
Filesize
609KB
MD5e42d68d797108fae122aa452aa0c1727
SHA118813d2ff3cd2a22c98fece75fab8d5445d0e93d
SHA2565aec02d1e4cfb2dc1e6007edf473227db591a00802fc02569897b14a2f145756
SHA512d88808263058eb88ac8063a37bd0f55e37290776617898a107e5e777c0565012753b0f215ada7c86493fa572056b63e0e98cf5029468a766485e6a6e60094758
-
\Windows\assembly\NativeImages_v2.0.50727_64\Temp\ZAP8FF0.tmp\Microsoft.VisualStudio.Tools.Applications.AddInAdapter.v9.0.dll
Filesize85KB
MD55180107f98e16bdca63e67e7e3169d22
SHA1dd2e82756dcda2f5a82125c4d743b4349955068d
SHA256d0658cbf473ef3666c758d28a1c4bcdcb25b2e515ad5251127d0906e65938f01
SHA51227d785971c28181cf9115ab14de066931c4d81f8d357ea8b9eabfe0f70bd5848023b69948ac6a586989e892bcde40999f8895a0bd2e7a28bac7f2fa64bb22363
-
\Windows\assembly\NativeImages_v2.0.50727_64\Temp\ZAP92ED.tmp\Microsoft.VisualStudio.Tools.Office.AddInAdapter.v9.0.dll
Filesize298KB
MD55fd34a21f44ccbeda1bf502aa162a96a
SHA11f3b1286c01dea47be5e65cb72956a2355e1ae5e
SHA2565d88539a1b7be77e11fe33572606c1093c54a80eea8bd3662f2ef5078a35ce01
SHA51258c3904cd1a06fbd3a432b3b927e189a744282cc105eda6f0d7f406971ccbc942c7403c2dcbb2d042981cf53419ca5e2cf4d9f57175e45cc5c484b0c121bb125
-
\Windows\assembly\NativeImages_v2.0.50727_64\Temp\ZAP9675.tmp\Microsoft.VisualStudio.Tools.Office.Excel.AddInAdapter.v9.0.dll
Filesize58KB
MD53d6987fc36386537669f2450761cdd9d
SHA17a35de593dce75d1cb6a50c68c96f200a93eb0c9
SHA25634c0302fcf7d2237f914aaa484b24f5a222745f21f5b5806b9c519538665d9cb
SHA5121d74371f0b6c68ead18b083c08b7e44fcaf930a16e0641ad6cd8d8defb4bde838377741e5b827f7f05d4f0ad4550b509ba6dff787f51fc6830d8f2c88dbf0e11
-
\Windows\assembly\NativeImages_v2.0.50727_64\Temp\ZAP9943.tmp\Microsoft.VisualStudio.Tools.Office.Word.AddInAdapter.v9.0.dll
Filesize58KB
MD5a8b651d9ae89d5e790ab8357edebbffe
SHA1500cff2ba14e4c86c25c045a51aec8aa6e62d796
SHA2561c8239c49fb10c715b52e60afd0e6668592806ef447ad0c52599231f995a95d7
SHA512b4d87ee520353113bb5cf242a855057627fde9f79b74031ba11d5feee1a371612154940037954cd1e411da0c102f616be72617a583512420fd1fc743541a10ce
-
Filesize
248KB
MD54bbf44ea6ee52d7af8e58ea9c0caa120
SHA1f7dcafcf850b4081b61ec7d313d7ec35d6ac66d2
SHA256c89c478c2d7134cd28b3d28d4216ad6aa41de3edd9d87a227ec19cf1cbf3fb08
SHA512c82356750a03bd6f92f03c67acdd5e1085fbd70533a8b314ae54676f37762d9ca5fa91574529b147d3e1c983bf042106b75f41206f5ddc37094a5e1c327c0fd3
-
\Windows\assembly\NativeImages_v2.0.50727_64\Temp\ZAP9EA0.tmp\Microsoft.VisualStudio.Tools.Applications.Runtime.v10.0.dll
Filesize87KB
MD5ed5c3f3402e320a8b4c6a33245a687d1
SHA14da11c966616583a817e98f7ee6fce6cde381dae
SHA256b58d8890d884e60af0124555472e23dee55905e678ec9506a3fbe00fffab0a88
SHA512d664b1f9f37c50d0e730a25ff7b79618f1ca99a0f1df0b32a4c82c95b2d15b6ef04ce5560db7407c6c3d2dff70514dac77cb0598f6d32b25362ae83fedb2bc2a
-
\Windows\assembly\NativeImages_v2.0.50727_64\Temp\ZAPA15E.tmp\Microsoft.VisualStudio.Tools.Applications.Runtime.v9.0.dll
Filesize198KB
MD59d9305a1998234e5a8f7047e1d8c0efe
SHA1ba7e589d4943cd4fc9f26c55e83c77559e7337a8
SHA256469ff9727392795925c7fe5625afcf508ba07e145c7940e4a12dbd6f14afc268
SHA51258b8cc718ae1a72a9d596f7779aeb0d5492a19e5d668828fd6cff1aa37181cc62878799b4c97beec9c71c67a0c215162ff544b2417f6017cd892a1ce64f7878c