Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03/01/2025, 12:09
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_6c846c3f737167948ae219bcc5bf53c0.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_6c846c3f737167948ae219bcc5bf53c0.exe
-
Size
684KB
-
MD5
6c846c3f737167948ae219bcc5bf53c0
-
SHA1
efcea049f211ec2cd9e18048baf2c8f7f730d931
-
SHA256
d67bc9c954a176b1efd11a61abbb6c4f2ac9d6f1cd16e16246b15f5cef2b4851
-
SHA512
fc1122f97138bd36708703b0306a646c65950d383f33ca4197eb05a1c56c9f7f23349e2086466ddb278a4aa504198b01b1214bad6b3fb4170e6613b26599559c
-
SSDEEP
12288:NcBj7B40qvxUrevFtrh7Xj5qS3ZIIOuPZfSVPP9jCW71D5b6pHJ1:NcBj7B4UevFhh7z5qS3QWfgP171tbKHb
Malware Config
Signatures
-
Expiro family
-
Expiro payload 2 IoCs
resource yara_rule behavioral1/memory/2792-2-0x0000000000400000-0x0000000000668000-memory.dmp family_expiro1 behavioral1/memory/2820-54-0x0000000010000000-0x0000000010258000-memory.dmp family_expiro1 -
Disables taskbar notifications via registry modification
-
Executes dropped EXE 64 IoCs
pid Process 2820 mscorsvw.exe 476 Process not Found 2584 mscorsvw.exe 2276 mscorsvw.exe 2236 mscorsvw.exe 2952 elevation_service.exe 2824 IEEtwCollector.exe 968 mscorsvw.exe 1928 mscorsvw.exe 2112 mscorsvw.exe 2040 mscorsvw.exe 108 mscorsvw.exe 1552 mscorsvw.exe 2096 mscorsvw.exe 2296 mscorsvw.exe 1640 mscorsvw.exe 1792 mscorsvw.exe 2592 mscorsvw.exe 2104 mscorsvw.exe 1040 mscorsvw.exe 3008 mscorsvw.exe 2632 mscorsvw.exe 332 mscorsvw.exe 2336 mscorsvw.exe 1076 mscorsvw.exe 1408 mscorsvw.exe 2508 mscorsvw.exe 1652 mscorsvw.exe 1876 mscorsvw.exe 1872 mscorsvw.exe 2468 mscorsvw.exe 1744 mscorsvw.exe 2968 mscorsvw.exe 2964 mscorsvw.exe 2580 mscorsvw.exe 1676 mscorsvw.exe 2168 mscorsvw.exe 2880 mscorsvw.exe 2632 mscorsvw.exe 2776 mscorsvw.exe 1940 mscorsvw.exe 844 mscorsvw.exe 1312 mscorsvw.exe 820 mscorsvw.exe 2296 mscorsvw.exe 2676 mscorsvw.exe 1716 mscorsvw.exe 2016 mscorsvw.exe 2848 mscorsvw.exe 2592 mscorsvw.exe 2164 mscorsvw.exe 2896 mscorsvw.exe 1936 mscorsvw.exe 2672 mscorsvw.exe 2376 mscorsvw.exe 1984 mscorsvw.exe 3020 mscorsvw.exe 2120 mscorsvw.exe 2064 mscorsvw.exe 2128 mscorsvw.exe 284 mscorsvw.exe 1564 mscorsvw.exe 2224 mscorsvw.exe 1968 mscorsvw.exe -
Loads dropped DLL 52 IoCs
pid Process 476 Process not Found 476 Process not Found 476 Process not Found 476 Process not Found 2096 mscorsvw.exe 2096 mscorsvw.exe 1640 mscorsvw.exe 1640 mscorsvw.exe 2592 mscorsvw.exe 2592 mscorsvw.exe 1040 mscorsvw.exe 1040 mscorsvw.exe 2632 mscorsvw.exe 2632 mscorsvw.exe 2336 mscorsvw.exe 2336 mscorsvw.exe 1408 mscorsvw.exe 1408 mscorsvw.exe 1652 mscorsvw.exe 1652 mscorsvw.exe 1872 mscorsvw.exe 1872 mscorsvw.exe 1744 mscorsvw.exe 1744 mscorsvw.exe 2964 mscorsvw.exe 2964 mscorsvw.exe 1676 mscorsvw.exe 1676 mscorsvw.exe 2880 mscorsvw.exe 2880 mscorsvw.exe 2776 mscorsvw.exe 2776 mscorsvw.exe 844 mscorsvw.exe 844 mscorsvw.exe 820 mscorsvw.exe 820 mscorsvw.exe 2592 mscorsvw.exe 2592 mscorsvw.exe 2164 mscorsvw.exe 2164 mscorsvw.exe 1936 mscorsvw.exe 1936 mscorsvw.exe 1548 mscorsvw.exe 1548 mscorsvw.exe 2208 mscorsvw.exe 2208 mscorsvw.exe 1684 mscorsvw.exe 1684 mscorsvw.exe 2120 mscorsvw.exe 2120 mscorsvw.exe 696 mscorsvw.exe 696 mscorsvw.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Security Center\Svc\S-1-5-21-1488793075-819845221-1497111674-1000 mscorsvw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Security Center\Svc\S-1-5-21-1488793075-819845221-1497111674-1000\EnableNotifications = "0" mscorsvw.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\mdgkfajodaliacghnafobjnclblcfmlm\1.0_0\manifest.json JaffaCakes118_6c846c3f737167948ae219bcc5bf53c0.exe -
Enumerates connected drives 3 TTPs 42 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: JaffaCakes118_6c846c3f737167948ae219bcc5bf53c0.exe File opened (read-only) \??\I: JaffaCakes118_6c846c3f737167948ae219bcc5bf53c0.exe File opened (read-only) \??\R: mscorsvw.exe File opened (read-only) \??\R: JaffaCakes118_6c846c3f737167948ae219bcc5bf53c0.exe File opened (read-only) \??\T: JaffaCakes118_6c846c3f737167948ae219bcc5bf53c0.exe File opened (read-only) \??\W: JaffaCakes118_6c846c3f737167948ae219bcc5bf53c0.exe File opened (read-only) \??\M: mscorsvw.exe File opened (read-only) \??\T: mscorsvw.exe File opened (read-only) \??\U: mscorsvw.exe File opened (read-only) \??\V: mscorsvw.exe File opened (read-only) \??\X: mscorsvw.exe File opened (read-only) \??\G: JaffaCakes118_6c846c3f737167948ae219bcc5bf53c0.exe File opened (read-only) \??\J: JaffaCakes118_6c846c3f737167948ae219bcc5bf53c0.exe File opened (read-only) \??\K: JaffaCakes118_6c846c3f737167948ae219bcc5bf53c0.exe File opened (read-only) \??\L: JaffaCakes118_6c846c3f737167948ae219bcc5bf53c0.exe File opened (read-only) \??\M: JaffaCakes118_6c846c3f737167948ae219bcc5bf53c0.exe File opened (read-only) \??\Q: JaffaCakes118_6c846c3f737167948ae219bcc5bf53c0.exe File opened (read-only) \??\Y: JaffaCakes118_6c846c3f737167948ae219bcc5bf53c0.exe File opened (read-only) \??\E: mscorsvw.exe File opened (read-only) \??\S: mscorsvw.exe File opened (read-only) \??\Y: mscorsvw.exe File opened (read-only) \??\V: JaffaCakes118_6c846c3f737167948ae219bcc5bf53c0.exe File opened (read-only) \??\X: JaffaCakes118_6c846c3f737167948ae219bcc5bf53c0.exe File opened (read-only) \??\L: mscorsvw.exe File opened (read-only) \??\N: mscorsvw.exe File opened (read-only) \??\N: JaffaCakes118_6c846c3f737167948ae219bcc5bf53c0.exe File opened (read-only) \??\Z: JaffaCakes118_6c846c3f737167948ae219bcc5bf53c0.exe File opened (read-only) \??\H: mscorsvw.exe File opened (read-only) \??\K: mscorsvw.exe File opened (read-only) \??\Q: mscorsvw.exe File opened (read-only) \??\H: JaffaCakes118_6c846c3f737167948ae219bcc5bf53c0.exe File opened (read-only) \??\U: JaffaCakes118_6c846c3f737167948ae219bcc5bf53c0.exe File opened (read-only) \??\G: mscorsvw.exe File opened (read-only) \??\S: JaffaCakes118_6c846c3f737167948ae219bcc5bf53c0.exe File opened (read-only) \??\I: mscorsvw.exe File opened (read-only) \??\P: mscorsvw.exe File opened (read-only) \??\W: mscorsvw.exe File opened (read-only) \??\O: JaffaCakes118_6c846c3f737167948ae219bcc5bf53c0.exe File opened (read-only) \??\P: JaffaCakes118_6c846c3f737167948ae219bcc5bf53c0.exe File opened (read-only) \??\J: mscorsvw.exe File opened (read-only) \??\O: mscorsvw.exe File opened (read-only) \??\Z: mscorsvw.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification \??\c:\windows\system32\svchost.exe mscorsvw.exe File opened for modification \??\c:\windows\system32\snmptrap.exe mscorsvw.exe File opened for modification \??\c:\windows\SysWOW64\dllhost.exe JaffaCakes118_6c846c3f737167948ae219bcc5bf53c0.exe File opened for modification \??\c:\windows\system32\dllhost.exe JaffaCakes118_6c846c3f737167948ae219bcc5bf53c0.exe File opened for modification \??\c:\windows\system32\lsass.exe JaffaCakes118_6c846c3f737167948ae219bcc5bf53c0.exe File created \??\c:\windows\SysWOW64\mkkeplop.tmp JaffaCakes118_6c846c3f737167948ae219bcc5bf53c0.exe File opened for modification \??\c:\windows\system32\locator.exe mscorsvw.exe File opened for modification \??\c:\windows\system32\wbengine.exe mscorsvw.exe File created \??\c:\windows\SysWOW64\fjjgqond.tmp JaffaCakes118_6c846c3f737167948ae219bcc5bf53c0.exe File opened for modification \??\c:\windows\SysWOW64\fxssvc.exe JaffaCakes118_6c846c3f737167948ae219bcc5bf53c0.exe File opened for modification \??\c:\windows\system32\fxssvc.exe JaffaCakes118_6c846c3f737167948ae219bcc5bf53c0.exe File opened for modification \??\c:\windows\system32\fxssvc.exe mscorsvw.exe File opened for modification \??\c:\windows\system32\ui0detect.exe JaffaCakes118_6c846c3f737167948ae219bcc5bf53c0.exe File created \??\c:\windows\system32\cdcepckm.tmp JaffaCakes118_6c846c3f737167948ae219bcc5bf53c0.exe File opened for modification \??\c:\windows\SysWOW64\wbem\wmiApsrv.exe JaffaCakes118_6c846c3f737167948ae219bcc5bf53c0.exe File opened for modification \??\c:\windows\system32\searchindexer.exe mscorsvw.exe File created \??\c:\windows\system32\jnijbiba.tmp JaffaCakes118_6c846c3f737167948ae219bcc5bf53c0.exe File created \??\c:\windows\SysWOW64\mnlqcmaj.tmp JaffaCakes118_6c846c3f737167948ae219bcc5bf53c0.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7B2238AACCEDC3F1FFE8E7EB5F575EC9 mscorsvw.exe File opened for modification \??\c:\windows\SysWOW64\snmptrap.exe JaffaCakes118_6c846c3f737167948ae219bcc5bf53c0.exe File created \??\c:\windows\system32\fkancbio.tmp JaffaCakes118_6c846c3f737167948ae219bcc5bf53c0.exe File created \??\c:\windows\SysWOW64\pdjnedfb.tmp JaffaCakes118_6c846c3f737167948ae219bcc5bf53c0.exe File opened for modification \??\c:\windows\system32\msiexec.exe mscorsvw.exe File created \??\c:\windows\system32\wbem\fpjoijef.tmp JaffaCakes118_6c846c3f737167948ae219bcc5bf53c0.exe File opened for modification \??\c:\windows\SysWOW64\ieetwcollector.exe JaffaCakes118_6c846c3f737167948ae219bcc5bf53c0.exe File opened for modification \??\c:\windows\system32\vds.exe JaffaCakes118_6c846c3f737167948ae219bcc5bf53c0.exe File opened for modification \??\c:\windows\SysWOW64\vssvc.exe JaffaCakes118_6c846c3f737167948ae219bcc5bf53c0.exe File opened for modification \??\c:\windows\SysWOW64\wbengine.exe JaffaCakes118_6c846c3f737167948ae219bcc5bf53c0.exe File opened for modification \??\c:\windows\system32\alg.exe mscorsvw.exe File opened for modification \??\c:\windows\system32\vssvc.exe mscorsvw.exe File opened for modification \??\c:\windows\SysWOW64\svchost.exe JaffaCakes118_6c846c3f737167948ae219bcc5bf53c0.exe File opened for modification \??\c:\windows\system32\locator.exe JaffaCakes118_6c846c3f737167948ae219bcc5bf53c0.exe File opened for modification \??\c:\windows\system32\vssvc.exe JaffaCakes118_6c846c3f737167948ae219bcc5bf53c0.exe File opened for modification \??\c:\windows\system32\msdtc.exe JaffaCakes118_6c846c3f737167948ae219bcc5bf53c0.exe File opened for modification \??\c:\windows\system32\snmptrap.exe JaffaCakes118_6c846c3f737167948ae219bcc5bf53c0.exe File opened for modification \??\c:\windows\SysWOW64\vds.exe JaffaCakes118_6c846c3f737167948ae219bcc5bf53c0.exe File opened for modification \??\c:\windows\system32\wbem\wmiApsrv.exe mscorsvw.exe File opened for modification \??\c:\windows\system32\svchost.exe JaffaCakes118_6c846c3f737167948ae219bcc5bf53c0.exe File opened for modification \??\c:\windows\system32\ieetwcollector.exe JaffaCakes118_6c846c3f737167948ae219bcc5bf53c0.exe File opened for modification \??\c:\windows\SysWOW64\locator.exe JaffaCakes118_6c846c3f737167948ae219bcc5bf53c0.exe File opened for modification \??\c:\windows\system32\lsass.exe mscorsvw.exe File opened for modification \??\c:\windows\SysWOW64\searchindexer.exe JaffaCakes118_6c846c3f737167948ae219bcc5bf53c0.exe File created \??\c:\windows\system32\aodbnbbd.tmp JaffaCakes118_6c846c3f737167948ae219bcc5bf53c0.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7B2238AACCEDC3F1FFE8E7EB5F575EC9 mscorsvw.exe File created \??\c:\windows\system32\ogofopbb.tmp JaffaCakes118_6c846c3f737167948ae219bcc5bf53c0.exe File created \??\c:\windows\system32\finknfon.tmp JaffaCakes118_6c846c3f737167948ae219bcc5bf53c0.exe File opened for modification \??\c:\windows\system32\searchindexer.exe JaffaCakes118_6c846c3f737167948ae219bcc5bf53c0.exe File opened for modification \??\c:\windows\system32\vds.exe mscorsvw.exe File opened for modification \??\c:\windows\system32\alg.exe JaffaCakes118_6c846c3f737167948ae219bcc5bf53c0.exe File opened for modification \??\c:\windows\SysWOW64\msdtc.exe JaffaCakes118_6c846c3f737167948ae219bcc5bf53c0.exe File opened for modification \??\c:\windows\syswow64\perfhost.exe JaffaCakes118_6c846c3f737167948ae219bcc5bf53c0.exe File opened for modification \??\c:\windows\SysWOW64\ui0detect.exe JaffaCakes118_6c846c3f737167948ae219bcc5bf53c0.exe File opened for modification \??\c:\windows\syswow64\perfhost.exe mscorsvw.exe File opened for modification \??\c:\windows\SysWOW64\alg.exe JaffaCakes118_6c846c3f737167948ae219bcc5bf53c0.exe File created \??\c:\windows\system32\akadgpkq.tmp JaffaCakes118_6c846c3f737167948ae219bcc5bf53c0.exe File created \??\c:\windows\system32\cflhiioj.tmp JaffaCakes118_6c846c3f737167948ae219bcc5bf53c0.exe File opened for modification \??\c:\windows\system32\wbem\wmiApsrv.exe JaffaCakes118_6c846c3f737167948ae219bcc5bf53c0.exe File opened for modification \??\c:\windows\system32\ui0detect.exe mscorsvw.exe File created \??\c:\windows\system32\aaokogep.tmp JaffaCakes118_6c846c3f737167948ae219bcc5bf53c0.exe File created \??\c:\windows\system32\hcoppcej.tmp JaffaCakes118_6c846c3f737167948ae219bcc5bf53c0.exe File opened for modification \??\c:\windows\system32\dllhost.exe mscorsvw.exe File opened for modification \??\c:\windows\system32\msdtc.exe mscorsvw.exe File opened for modification \??\c:\windows\system32\wbengine.exe JaffaCakes118_6c846c3f737167948ae219bcc5bf53c0.exe File opened for modification \??\c:\windows\SysWOW64\lsass.exe JaffaCakes118_6c846c3f737167948ae219bcc5bf53c0.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jabswitch.exe JaffaCakes118_6c846c3f737167948ae219bcc5bf53c0.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\kinit.exe JaffaCakes118_6c846c3f737167948ae219bcc5bf53c0.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\ktab.exe JaffaCakes118_6c846c3f737167948ae219bcc5bf53c0.exe File opened for modification \??\c:\program files\windows media player\wmpnetwk.exe JaffaCakes118_6c846c3f737167948ae219bcc5bf53c0.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\appletviewer.exe JaffaCakes118_6c846c3f737167948ae219bcc5bf53c0.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\extcheck.exe JaffaCakes118_6c846c3f737167948ae219bcc5bf53c0.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javaw.exe JaffaCakes118_6c846c3f737167948ae219bcc5bf53c0.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\bin\dgilkpmn.tmp JaffaCakes118_6c846c3f737167948ae219bcc5bf53c0.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\iibndipn.tmp JaffaCakes118_6c846c3f737167948ae219bcc5bf53c0.exe File created C:\Program Files\Internet Explorer\onnmbqjl.tmp JaffaCakes118_6c846c3f737167948ae219bcc5bf53c0.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jmc.exe JaffaCakes118_6c846c3f737167948ae219bcc5bf53c0.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\gdaoemja.tmp JaffaCakes118_6c846c3f737167948ae219bcc5bf53c0.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\idlj.exe JaffaCakes118_6c846c3f737167948ae219bcc5bf53c0.exe File created C:\Program Files\Java\jdk1.7.0_80\bin\ckillgah.tmp JaffaCakes118_6c846c3f737167948ae219bcc5bf53c0.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\wsgen.exe JaffaCakes118_6c846c3f737167948ae219bcc5bf53c0.exe File opened for modification \??\c:\program files\google\chrome\Application\106.0.5249.119\elevation_service.exe JaffaCakes118_6c846c3f737167948ae219bcc5bf53c0.exe File opened for modification C:\Program Files\7-Zip\7zG.exe JaffaCakes118_6c846c3f737167948ae219bcc5bf53c0.exe File created C:\Program Files\Google\Chrome\Application\bhlnifll.tmp JaffaCakes118_6c846c3f737167948ae219bcc5bf53c0.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jstatd.exe JaffaCakes118_6c846c3f737167948ae219bcc5bf53c0.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\tnameserv.exe JaffaCakes118_6c846c3f737167948ae219bcc5bf53c0.exe File created C:\Program Files\7-Zip\nnknaeep.tmp JaffaCakes118_6c846c3f737167948ae219bcc5bf53c0.exe File created C:\Program Files\Common Files\Microsoft Shared\MSInfo\eqiodbdg.tmp JaffaCakes118_6c846c3f737167948ae219bcc5bf53c0.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jdb.exe JaffaCakes118_6c846c3f737167948ae219bcc5bf53c0.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\orbd.exe JaffaCakes118_6c846c3f737167948ae219bcc5bf53c0.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\ssvagent.exe JaffaCakes118_6c846c3f737167948ae219bcc5bf53c0.exe File created \??\c:\program files (x86)\common files\microsoft shared\source engine\jnmgdhpg.tmp JaffaCakes118_6c846c3f737167948ae219bcc5bf53c0.exe File opened for modification C:\Program Files\DVD Maker\DVDMaker.exe JaffaCakes118_6c846c3f737167948ae219bcc5bf53c0.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jhat.exe JaffaCakes118_6c846c3f737167948ae219bcc5bf53c0.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\policytool.exe JaffaCakes118_6c846c3f737167948ae219bcc5bf53c0.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\jabswitch.exe JaffaCakes118_6c846c3f737167948ae219bcc5bf53c0.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\InputPersonalization.exe JaffaCakes118_6c846c3f737167948ae219bcc5bf53c0.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE JaffaCakes118_6c846c3f737167948ae219bcc5bf53c0.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javah.exe JaffaCakes118_6c846c3f737167948ae219bcc5bf53c0.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\java.exe JaffaCakes118_6c846c3f737167948ae219bcc5bf53c0.exe File created C:\Program Files\Internet Explorer\dbepndgm.tmp JaffaCakes118_6c846c3f737167948ae219bcc5bf53c0.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javafxpackager.exe JaffaCakes118_6c846c3f737167948ae219bcc5bf53c0.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jsadebugd.exe JaffaCakes118_6c846c3f737167948ae219bcc5bf53c0.exe File created C:\Program Files\Java\jdk1.7.0_80\bin\llopmkim.tmp JaffaCakes118_6c846c3f737167948ae219bcc5bf53c0.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jinfo.exe JaffaCakes118_6c846c3f737167948ae219bcc5bf53c0.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jar.exe JaffaCakes118_6c846c3f737167948ae219bcc5bf53c0.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jarsigner.exe JaffaCakes118_6c846c3f737167948ae219bcc5bf53c0.exe File created C:\Program Files\Java\jdk1.7.0_80\bin\kefbfhkg.tmp JaffaCakes118_6c846c3f737167948ae219bcc5bf53c0.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jstack.exe JaffaCakes118_6c846c3f737167948ae219bcc5bf53c0.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\java-rmi.exe JaffaCakes118_6c846c3f737167948ae219bcc5bf53c0.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\jp2launcher.exe JaffaCakes118_6c846c3f737167948ae219bcc5bf53c0.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\ighnagcm.tmp JaffaCakes118_6c846c3f737167948ae219bcc5bf53c0.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\msinfo32.exe JaffaCakes118_6c846c3f737167948ae219bcc5bf53c0.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe JaffaCakes118_6c846c3f737167948ae219bcc5bf53c0.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\cpkcoelj.tmp JaffaCakes118_6c846c3f737167948ae219bcc5bf53c0.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javap.exe JaffaCakes118_6c846c3f737167948ae219bcc5bf53c0.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jconsole.exe JaffaCakes118_6c846c3f737167948ae219bcc5bf53c0.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jmap.exe JaffaCakes118_6c846c3f737167948ae219bcc5bf53c0.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\native2ascii.exe JaffaCakes118_6c846c3f737167948ae219bcc5bf53c0.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\schemagen.exe JaffaCakes118_6c846c3f737167948ae219bcc5bf53c0.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\rmiregistry.exe JaffaCakes118_6c846c3f737167948ae219bcc5bf53c0.exe File opened for modification \??\c:\program files (x86)\microsoft office\office14\groove.exe mscorsvw.exe File created C:\Program Files\Internet Explorer\aglddoil.tmp JaffaCakes118_6c846c3f737167948ae219bcc5bf53c0.exe File created C:\Program Files\7-Zip\nklemblo.tmp JaffaCakes118_6c846c3f737167948ae219bcc5bf53c0.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\bin\hpbanfjo.tmp JaffaCakes118_6c846c3f737167948ae219bcc5bf53c0.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe JaffaCakes118_6c846c3f737167948ae219bcc5bf53c0.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javac.exe JaffaCakes118_6c846c3f737167948ae219bcc5bf53c0.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\gmoggjie.tmp JaffaCakes118_6c846c3f737167948ae219bcc5bf53c0.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome_proxy.exe JaffaCakes118_6c846c3f737167948ae219bcc5bf53c0.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javadoc.exe JaffaCakes118_6c846c3f737167948ae219bcc5bf53c0.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index147.dat mscorsvw.exe File created C:\Windows\assembly\GACLock.dat mscorsvw.exe File created C:\Windows\Microsoft.NET\ngenservice_pri3_lock.dat mscorsvw.exe File created C:\Windows\assembly\GACLock.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index14e.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index156.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index155.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index144.dat mscorsvw.exe File created C:\Windows\assembly\ngenlock.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index154.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index14c.dat mscorsvw.exe File created C:\Windows\assembly\GACLock.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\index148.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index14b.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\Temp\ZAP2BA2.tmp\Microsoft.Office.Tools.Word.v9.0.dll mscorsvw.exe File created C:\Windows\assembly\GACLock.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\index14f.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index159.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index157.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index15a.dat mscorsvw.exe File opened for modification \??\c:\windows\ehome\ehrecvr.exe JaffaCakes118_6c846c3f737167948ae219bcc5bf53c0.exe File opened for modification \??\c:\windows\microsoft.net\framework64\v3.0\windows communication foundation\infocard.exe JaffaCakes118_6c846c3f737167948ae219bcc5bf53c0.exe File created C:\Windows\assembly\GACLock.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index157.dat mscorsvw.exe File opened for modification \??\c:\windows\microsoft.net\framework\v2.0.50727\mscorsvw.exe JaffaCakes118_6c846c3f737167948ae219bcc5bf53c0.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index14b.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index14f.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\Temp\ZAPD28B.tmp\stdole.dll mscorsvw.exe File created C:\Windows\assembly\ngenlock.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\Temp\ZAPA67C.tmp\Microsoft.VisualStudio.Tools.Office.Word.AddInAdapter.v9.0.dll mscorsvw.exe File opened for modification \??\c:\windows\microsoft.net\framework64\v4.0.30319\aspnet_state.exe JaffaCakes118_6c846c3f737167948ae219bcc5bf53c0.exe File created C:\Windows\assembly\GACLock.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index144.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index14f.dat mscorsvw.exe File created C:\Windows\assembly\ngenlock.dat mscorsvw.exe File created C:\Windows\assembly\ngenlock.dat mscorsvw.exe File created C:\Windows\assembly\GACLock.dat mscorsvw.exe File created C:\Windows\assembly\ngenlock.dat mscorsvw.exe File opened for modification \??\c:\windows\ehome\ehrecvr.exe mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\index151.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\index153.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\Temp\ZAPF0A6.tmp\Microsoft-Windows-HomeGroupDiagnostic.NetListMgr.Interop.dll mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index151.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index158.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\index15a.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index158.dat mscorsvw.exe File created C:\Windows\Microsoft.NET\ngenservice_pri1_lock.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index149.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index14e.dat mscorsvw.exe File created C:\Windows\assembly\GACLock.dat mscorsvw.exe File created C:\Windows\assembly\GACLock.dat mscorsvw.exe File created \??\c:\windows\ehome\lolifldb.tmp JaffaCakes118_6c846c3f737167948ae219bcc5bf53c0.exe File created C:\Windows\assembly\GACLock.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\index159.dat mscorsvw.exe File opened for modification \??\c:\windows\microsoft.net\framework64\v3.0\wpf\presentationfontcache.exe mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\index150.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\index152.dat mscorsvw.exe File created C:\Windows\assembly\ngenlock.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\Temp\ZAPBC5D.tmp\Microsoft.VisualStudio.Tools.Office.Excel.HostAdapter.v10.0.dll mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\index14d.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\Temp\ZAP9F99.tmp\Microsoft.VisualStudio.Tools.Office.AddInAdapter.v9.0.dll mscorsvw.exe File created C:\Windows\assembly\ngenlock.dat mscorsvw.exe File created C:\Windows\assembly\GACLock.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\Temp\ZAP1E2B.tmp\Microsoft.Office.Tools.Excel.v9.0.dll mscorsvw.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_6c846c3f737167948ae219bcc5bf53c0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscorsvw.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\Certificates mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\Certificates mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\Certificates mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CRLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\Certificates mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CRLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CTLs mscorsvw.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\Certificates mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\Certificates mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Direct3D\MostRecentApplication mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CRLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CRLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CRLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CRLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CRLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\Certificates mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CRLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CRLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\Certificates mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\Certificates mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\Certificates mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CRLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CRLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople mscorsvw.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\Certificates mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\Certificates mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CRLs mscorsvw.exe -
Suspicious behavior: EnumeratesProcesses 51 IoCs
pid Process 2236 mscorsvw.exe 2236 mscorsvw.exe 2236 mscorsvw.exe 2236 mscorsvw.exe 2236 mscorsvw.exe 2236 mscorsvw.exe 2236 mscorsvw.exe 2236 mscorsvw.exe 2236 mscorsvw.exe 2236 mscorsvw.exe 2236 mscorsvw.exe 2236 mscorsvw.exe 2236 mscorsvw.exe 2236 mscorsvw.exe 2236 mscorsvw.exe 2236 mscorsvw.exe 2236 mscorsvw.exe 2236 mscorsvw.exe 2236 mscorsvw.exe 2236 mscorsvw.exe 2236 mscorsvw.exe 2236 mscorsvw.exe 2236 mscorsvw.exe 2236 mscorsvw.exe 2236 mscorsvw.exe 2236 mscorsvw.exe 2236 mscorsvw.exe 2236 mscorsvw.exe 2236 mscorsvw.exe 2236 mscorsvw.exe 2236 mscorsvw.exe 2236 mscorsvw.exe 2236 mscorsvw.exe 2236 mscorsvw.exe 2236 mscorsvw.exe 2236 mscorsvw.exe 2236 mscorsvw.exe 2236 mscorsvw.exe 2236 mscorsvw.exe 2236 mscorsvw.exe 2236 mscorsvw.exe 2236 mscorsvw.exe 2236 mscorsvw.exe 2236 mscorsvw.exe 2236 mscorsvw.exe 2236 mscorsvw.exe 2236 mscorsvw.exe 2236 mscorsvw.exe 2236 mscorsvw.exe 2236 mscorsvw.exe 2236 mscorsvw.exe -
Suspicious use of AdjustPrivilegeToken 59 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 2792 JaffaCakes118_6c846c3f737167948ae219bcc5bf53c0.exe Token: SeShutdownPrivilege 2236 mscorsvw.exe Token: SeShutdownPrivilege 2236 mscorsvw.exe Token: SeShutdownPrivilege 2236 mscorsvw.exe Token: SeShutdownPrivilege 2236 mscorsvw.exe Token: SeTakeOwnershipPrivilege 2236 mscorsvw.exe Token: SeShutdownPrivilege 2236 mscorsvw.exe Token: SeShutdownPrivilege 2236 mscorsvw.exe Token: SeShutdownPrivilege 2236 mscorsvw.exe Token: SeShutdownPrivilege 2236 mscorsvw.exe Token: SeShutdownPrivilege 2236 mscorsvw.exe Token: SeShutdownPrivilege 2236 mscorsvw.exe Token: SeShutdownPrivilege 2236 mscorsvw.exe Token: SeShutdownPrivilege 2236 mscorsvw.exe Token: SeShutdownPrivilege 2236 mscorsvw.exe Token: SeShutdownPrivilege 2236 mscorsvw.exe Token: SeShutdownPrivilege 2236 mscorsvw.exe Token: SeShutdownPrivilege 2236 mscorsvw.exe Token: SeShutdownPrivilege 2236 mscorsvw.exe Token: SeShutdownPrivilege 2236 mscorsvw.exe Token: SeShutdownPrivilege 2236 mscorsvw.exe Token: SeShutdownPrivilege 2236 mscorsvw.exe Token: SeShutdownPrivilege 2236 mscorsvw.exe Token: SeShutdownPrivilege 2236 mscorsvw.exe Token: SeShutdownPrivilege 2236 mscorsvw.exe Token: SeShutdownPrivilege 2236 mscorsvw.exe Token: SeShutdownPrivilege 2236 mscorsvw.exe Token: SeShutdownPrivilege 2236 mscorsvw.exe Token: SeShutdownPrivilege 2236 mscorsvw.exe Token: SeShutdownPrivilege 2236 mscorsvw.exe Token: SeShutdownPrivilege 2236 mscorsvw.exe Token: SeShutdownPrivilege 2236 mscorsvw.exe Token: SeShutdownPrivilege 2236 mscorsvw.exe Token: SeShutdownPrivilege 2236 mscorsvw.exe Token: SeShutdownPrivilege 2236 mscorsvw.exe Token: SeShutdownPrivilege 2236 mscorsvw.exe Token: SeShutdownPrivilege 2236 mscorsvw.exe Token: SeShutdownPrivilege 2236 mscorsvw.exe Token: SeShutdownPrivilege 2236 mscorsvw.exe Token: SeShutdownPrivilege 2236 mscorsvw.exe Token: SeShutdownPrivilege 2236 mscorsvw.exe Token: SeShutdownPrivilege 2236 mscorsvw.exe Token: SeShutdownPrivilege 2236 mscorsvw.exe Token: SeShutdownPrivilege 2236 mscorsvw.exe Token: SeShutdownPrivilege 2236 mscorsvw.exe Token: SeShutdownPrivilege 2236 mscorsvw.exe Token: SeShutdownPrivilege 2236 mscorsvw.exe Token: SeShutdownPrivilege 2236 mscorsvw.exe Token: SeShutdownPrivilege 2236 mscorsvw.exe Token: SeShutdownPrivilege 2236 mscorsvw.exe Token: SeShutdownPrivilege 2236 mscorsvw.exe Token: SeShutdownPrivilege 2236 mscorsvw.exe Token: SeShutdownPrivilege 2236 mscorsvw.exe Token: SeShutdownPrivilege 2236 mscorsvw.exe Token: SeShutdownPrivilege 2236 mscorsvw.exe Token: SeShutdownPrivilege 2236 mscorsvw.exe Token: SeShutdownPrivilege 2236 mscorsvw.exe Token: SeShutdownPrivilege 2236 mscorsvw.exe Token: SeShutdownPrivilege 2236 mscorsvw.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2236 wrote to memory of 968 2236 mscorsvw.exe 38 PID 2236 wrote to memory of 968 2236 mscorsvw.exe 38 PID 2236 wrote to memory of 968 2236 mscorsvw.exe 38 PID 2236 wrote to memory of 1928 2236 mscorsvw.exe 39 PID 2236 wrote to memory of 1928 2236 mscorsvw.exe 39 PID 2236 wrote to memory of 1928 2236 mscorsvw.exe 39 PID 2236 wrote to memory of 2112 2236 mscorsvw.exe 41 PID 2236 wrote to memory of 2112 2236 mscorsvw.exe 41 PID 2236 wrote to memory of 2112 2236 mscorsvw.exe 41 PID 2236 wrote to memory of 2040 2236 mscorsvw.exe 42 PID 2236 wrote to memory of 2040 2236 mscorsvw.exe 42 PID 2236 wrote to memory of 2040 2236 mscorsvw.exe 42 PID 2236 wrote to memory of 108 2236 mscorsvw.exe 43 PID 2236 wrote to memory of 108 2236 mscorsvw.exe 43 PID 2236 wrote to memory of 108 2236 mscorsvw.exe 43 PID 2236 wrote to memory of 1552 2236 mscorsvw.exe 44 PID 2236 wrote to memory of 1552 2236 mscorsvw.exe 44 PID 2236 wrote to memory of 1552 2236 mscorsvw.exe 44 PID 2236 wrote to memory of 2096 2236 mscorsvw.exe 45 PID 2236 wrote to memory of 2096 2236 mscorsvw.exe 45 PID 2236 wrote to memory of 2096 2236 mscorsvw.exe 45 PID 2236 wrote to memory of 2296 2236 mscorsvw.exe 46 PID 2236 wrote to memory of 2296 2236 mscorsvw.exe 46 PID 2236 wrote to memory of 2296 2236 mscorsvw.exe 46 PID 2236 wrote to memory of 1640 2236 mscorsvw.exe 47 PID 2236 wrote to memory of 1640 2236 mscorsvw.exe 47 PID 2236 wrote to memory of 1640 2236 mscorsvw.exe 47 PID 2236 wrote to memory of 1792 2236 mscorsvw.exe 48 PID 2236 wrote to memory of 1792 2236 mscorsvw.exe 48 PID 2236 wrote to memory of 1792 2236 mscorsvw.exe 48 PID 2236 wrote to memory of 2592 2236 mscorsvw.exe 49 PID 2236 wrote to memory of 2592 2236 mscorsvw.exe 49 PID 2236 wrote to memory of 2592 2236 mscorsvw.exe 49 PID 2236 wrote to memory of 2104 2236 mscorsvw.exe 50 PID 2236 wrote to memory of 2104 2236 mscorsvw.exe 50 PID 2236 wrote to memory of 2104 2236 mscorsvw.exe 50 PID 2236 wrote to memory of 1040 2236 mscorsvw.exe 51 PID 2236 wrote to memory of 1040 2236 mscorsvw.exe 51 PID 2236 wrote to memory of 1040 2236 mscorsvw.exe 51 PID 2236 wrote to memory of 3008 2236 mscorsvw.exe 52 PID 2236 wrote to memory of 3008 2236 mscorsvw.exe 52 PID 2236 wrote to memory of 3008 2236 mscorsvw.exe 52 PID 2236 wrote to memory of 2632 2236 mscorsvw.exe 53 PID 2236 wrote to memory of 2632 2236 mscorsvw.exe 53 PID 2236 wrote to memory of 2632 2236 mscorsvw.exe 53 PID 2236 wrote to memory of 332 2236 mscorsvw.exe 54 PID 2236 wrote to memory of 332 2236 mscorsvw.exe 54 PID 2236 wrote to memory of 332 2236 mscorsvw.exe 54 PID 2236 wrote to memory of 2336 2236 mscorsvw.exe 55 PID 2236 wrote to memory of 2336 2236 mscorsvw.exe 55 PID 2236 wrote to memory of 2336 2236 mscorsvw.exe 55 PID 2236 wrote to memory of 1076 2236 mscorsvw.exe 56 PID 2236 wrote to memory of 1076 2236 mscorsvw.exe 56 PID 2236 wrote to memory of 1076 2236 mscorsvw.exe 56 PID 2236 wrote to memory of 1408 2236 mscorsvw.exe 57 PID 2236 wrote to memory of 1408 2236 mscorsvw.exe 57 PID 2236 wrote to memory of 1408 2236 mscorsvw.exe 57 PID 2236 wrote to memory of 2508 2236 mscorsvw.exe 58 PID 2236 wrote to memory of 2508 2236 mscorsvw.exe 58 PID 2236 wrote to memory of 2508 2236 mscorsvw.exe 58 PID 2236 wrote to memory of 1652 2236 mscorsvw.exe 59 PID 2236 wrote to memory of 1652 2236 mscorsvw.exe 59 PID 2236 wrote to memory of 1652 2236 mscorsvw.exe 59 PID 2236 wrote to memory of 1876 2236 mscorsvw.exe 60 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer mscorsvw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\HideSCAHealth = "1" mscorsvw.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6c846c3f737167948ae219bcc5bf53c0.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6c846c3f737167948ae219bcc5bf53c0.exe"1⤵
- Drops Chrome extension
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2792
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2820
-
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe1⤵
- Executes dropped EXE
PID:2584
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe1⤵
- Executes dropped EXE
PID:2276
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe1⤵
- Executes dropped EXE
- Windows security modification
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2236 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 174 -InterruptEvent 160 -NGENProcess 164 -Pipe 170 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:968
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 224 -InterruptEvent 218 -NGENProcess 174 -Pipe 16c -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1928
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 150 -InterruptEvent 178 -NGENProcess 1d8 -Pipe 1e0 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2112
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 178 -InterruptEvent 25c -NGENProcess 254 -Pipe 258 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2040
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 25c -InterruptEvent 24c -NGENProcess 240 -Pipe 244 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:108
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 248 -InterruptEvent 178 -NGENProcess 25c -Pipe 260 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1552
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 178 -InterruptEvent 268 -NGENProcess 150 -Pipe 264 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:2096
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 268 -InterruptEvent 184 -NGENProcess 150 -Pipe 240 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2296
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 184 -InterruptEvent 274 -NGENProcess 1d8 -Pipe 270 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:1640
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 278 -InterruptEvent 268 -NGENProcess 27c -Pipe 184 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1792
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 268 -InterruptEvent 26c -NGENProcess 1d8 -Pipe 260 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:2592
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 26c -InterruptEvent 1d8 -NGENProcess 268 -Pipe 278 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2104
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 25c -InterruptEvent 280 -NGENProcess 284 -Pipe 26c -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:1040
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 280 -InterruptEvent 284 -NGENProcess 27c -Pipe 268 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:3008
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 284 -InterruptEvent 28c -NGENProcess 1d8 -Pipe 288 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:2632
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 28c -InterruptEvent 1d8 -NGENProcess 280 -Pipe 274 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:332
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 1d8 -InterruptEvent 294 -NGENProcess 27c -Pipe 25c -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:2336
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 298 -InterruptEvent 28c -NGENProcess 29c -Pipe 1d8 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1076
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 28c -InterruptEvent 150 -NGENProcess 27c -Pipe 284 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1408
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 150 -InterruptEvent 27c -NGENProcess 298 -Pipe 294 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2508
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 248 -InterruptEvent 27c -NGENProcess 150 -Pipe 29c -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:1652
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 27c -InterruptEvent 150 -NGENProcess 214 -Pipe 298 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1876
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2a8 -InterruptEvent 2ac -NGENProcess 254 -Pipe 150 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:1872
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2ac -InterruptEvent 254 -NGENProcess 27c -Pipe 28c -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2468
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 254 -InterruptEvent 2b4 -NGENProcess 214 -Pipe 284 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:1744
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2b4 -InterruptEvent 214 -NGENProcess 2ac -Pipe 2b0 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2968
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 214 -InterruptEvent 2bc -NGENProcess 27c -Pipe 2a8 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2964
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2bc -InterruptEvent 27c -NGENProcess 2b4 -Pipe 2b8 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2580
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 27c -InterruptEvent 2c4 -NGENProcess 2ac -Pipe 254 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:1676
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2c4 -InterruptEvent 2ac -NGENProcess 2bc -Pipe 2c0 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2168
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2c8 -InterruptEvent 214 -NGENProcess 2a4 -Pipe 2ac -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:2880
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 214 -InterruptEvent 2a4 -NGENProcess 248 -Pipe 27c -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2632
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2a4 -InterruptEvent 2d4 -NGENProcess 280 -Pipe 2b4 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:2776
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 214 -InterruptEvent 2cc -NGENProcess 248 -Pipe 2d4 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1940
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2cc -InterruptEvent 2e4 -NGENProcess 2a0 -Pipe 2e0 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:844
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2e4 -InterruptEvent 2a0 -NGENProcess 214 -Pipe 280 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1312
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2bc -InterruptEvent 2c8 -NGENProcess 2ec -Pipe 2e4 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:820
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2c8 -InterruptEvent 2ec -NGENProcess 248 -Pipe 214 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:2296
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2ec -InterruptEvent 2f4 -NGENProcess 2a0 -Pipe 2f0 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2676
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2f4 -InterruptEvent 2f8 -NGENProcess 2d8 -Pipe 2c4 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1716
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2f8 -InterruptEvent 2fc -NGENProcess 248 -Pipe 2bc -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2016
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2fc -InterruptEvent 300 -NGENProcess 2a0 -Pipe 2dc -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2848
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 304 -InterruptEvent 2f8 -NGENProcess 308 -Pipe 2fc -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:2592
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2c8 -InterruptEvent 300 -NGENProcess 308 -Pipe 2ec -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:2164
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 300 -InterruptEvent 308 -NGENProcess 2f8 -Pipe 2e8 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2896
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 308 -InterruptEvent 314 -NGENProcess 2d8 -Pipe 248 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:1936
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2a0 -InterruptEvent 300 -NGENProcess 318 -Pipe 308 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2672
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 300 -InterruptEvent 2c8 -NGENProcess 2d8 -Pipe 2cc -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2376
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2c8 -InterruptEvent 30c -NGENProcess 314 -Pipe 2f4 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1984
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 314 -InterruptEvent 310 -NGENProcess 2c8 -Pipe 30c -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:3020
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 310 -InterruptEvent 324 -NGENProcess 2a0 -Pipe 320 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2120
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 324 -InterruptEvent 328 -NGENProcess 2d8 -Pipe 318 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2064
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 328 -InterruptEvent 32c -NGENProcess 2c8 -Pipe 31c -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2128
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 32c -InterruptEvent 330 -NGENProcess 2a0 -Pipe 2f8 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:284
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 330 -InterruptEvent 334 -NGENProcess 2d8 -Pipe 314 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1564
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 334 -InterruptEvent 338 -NGENProcess 2c8 -Pipe 310 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2224
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 338 -InterruptEvent 33c -NGENProcess 2a0 -Pipe 324 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1968
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 328 -InterruptEvent 33c -NGENProcess 338 -Pipe 2d8 -Comment "NGen Worker Process"2⤵PID:1032
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 338 -InterruptEvent 2a0 -NGENProcess 328 -Pipe 33c -Comment "NGen Worker Process"2⤵PID:1692
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2a0 -InterruptEvent 348 -NGENProcess 340 -Pipe 344 -Comment "NGen Worker Process"2⤵PID:2160
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 34c -InterruptEvent 348 -NGENProcess 2a0 -Pipe 334 -Comment "NGen Worker Process"2⤵PID:2332
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 348 -InterruptEvent 330 -NGENProcess 340 -Pipe 32c -Comment "NGen Worker Process"2⤵PID:1600
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 330 -InterruptEvent 354 -NGENProcess 338 -Pipe 2c8 -Comment "NGen Worker Process"2⤵PID:1708
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 354 -InterruptEvent 350 -NGENProcess 2a0 -Pipe 304 -Comment "NGen Worker Process"2⤵
- Modifies data under HKEY_USERS
PID:1796
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 350 -InterruptEvent 358 -NGENProcess 34c -Pipe 328 -Comment "NGen Worker Process"2⤵PID:2680
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 358 -InterruptEvent 2d0 -NGENProcess 338 -Pipe 348 -Comment "NGen Worker Process"2⤵PID:3040
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2d0 -InterruptEvent 35c -NGENProcess 330 -Pipe 340 -Comment "NGen Worker Process"2⤵PID:1640
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 35c -InterruptEvent 364 -NGENProcess 34c -Pipe 360 -Comment "NGen Worker Process"2⤵PID:2516
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 364 -InterruptEvent 368 -NGENProcess 2a0 -Pipe 300 -Comment "NGen Worker Process"2⤵PID:2980
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 368 -InterruptEvent 36c -NGENProcess 330 -Pipe 350 -Comment "NGen Worker Process"2⤵
- Loads dropped DLL
- Drops file in Windows directory
PID:1548
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 36c -InterruptEvent 330 -NGENProcess 364 -Pipe 34c -Comment "NGen Worker Process"2⤵PID:2072
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 330 -InterruptEvent 374 -NGENProcess 2a0 -Pipe 2d0 -Comment "NGen Worker Process"2⤵PID:2564
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 374 -InterruptEvent 378 -NGENProcess 370 -Pipe 35c -Comment "NGen Worker Process"2⤵PID:2660
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 378 -InterruptEvent 368 -NGENProcess 364 -Pipe 358 -Comment "NGen Worker Process"2⤵PID:2820
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 368 -InterruptEvent 37c -NGENProcess 338 -Pipe 354 -Comment "NGen Worker Process"2⤵PID:1812
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 37c -InterruptEvent 384 -NGENProcess 370 -Pipe 380 -Comment "NGen Worker Process"2⤵PID:484
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 384 -InterruptEvent 388 -NGENProcess 2a0 -Pipe 36c -Comment "NGen Worker Process"2⤵PID:640
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 388 -InterruptEvent 38c -NGENProcess 338 -Pipe 364 -Comment "NGen Worker Process"2⤵PID:2548
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 38c -InterruptEvent 390 -NGENProcess 370 -Pipe 378 -Comment "NGen Worker Process"2⤵PID:2632
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 390 -InterruptEvent 394 -NGENProcess 2a0 -Pipe 368 -Comment "NGen Worker Process"2⤵PID:2428
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 394 -InterruptEvent 398 -NGENProcess 338 -Pipe 37c -Comment "NGen Worker Process"2⤵PID:2472
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 398 -InterruptEvent 39c -NGENProcess 370 -Pipe 384 -Comment "NGen Worker Process"2⤵PID:2212
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 388 -InterruptEvent 39c -NGENProcess 398 -Pipe 2a0 -Comment "NGen Worker Process"2⤵PID:2352
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 39c -InterruptEvent 38c -NGENProcess 370 -Pipe 330 -Comment "NGen Worker Process"2⤵PID:2380
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 38c -InterruptEvent 3a8 -NGENProcess 394 -Pipe 3a4 -Comment "NGen Worker Process"2⤵PID:2360
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 3a8 -InterruptEvent 3ac -NGENProcess 390 -Pipe 338 -Comment "NGen Worker Process"2⤵PID:1736
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 3ac -InterruptEvent 3b0 -NGENProcess 370 -Pipe 398 -Comment "NGen Worker Process"2⤵PID:696
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 3b0 -InterruptEvent 3b4 -NGENProcess 394 -Pipe 388 -Comment "NGen Worker Process"2⤵PID:1968
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 3b4 -InterruptEvent 3b8 -NGENProcess 390 -Pipe 39c -Comment "NGen Worker Process"2⤵PID:1032
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 3b8 -InterruptEvent 3bc -NGENProcess 370 -Pipe 38c -Comment "NGen Worker Process"2⤵PID:2324
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 3bc -InterruptEvent 3a8 -NGENProcess 394 -Pipe 3ac -Comment "NGen Worker Process"2⤵PID:1800
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 3c0 -InterruptEvent 3b8 -NGENProcess 3a0 -Pipe 3a8 -Comment "NGen Worker Process"2⤵PID:1288
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 3b8 -InterruptEvent 3c8 -NGENProcess 3ac -Pipe 3c4 -Comment "NGen Worker Process"2⤵PID:1756
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 3c8 -InterruptEvent 3cc -NGENProcess 370 -Pipe 390 -Comment "NGen Worker Process"2⤵PID:1588
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 3cc -InterruptEvent 3d0 -NGENProcess 3a0 -Pipe 394 -Comment "NGen Worker Process"2⤵PID:2232
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 3d0 -InterruptEvent 3d4 -NGENProcess 3ac -Pipe 3b0 -Comment "NGen Worker Process"2⤵PID:2316
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 3d4 -InterruptEvent 3c0 -NGENProcess 370 -Pipe 3b8 -Comment "NGen Worker Process"2⤵PID:1416
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2a4 -InterruptEvent 3d0 -NGENProcess 374 -Pipe 3d4 -Comment "NGen Worker Process"2⤵PID:2968
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 3d0 -InterruptEvent 3d8 -NGENProcess 370 -Pipe 3a0 -Comment "NGen Worker Process"2⤵PID:2744
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 3d8 -InterruptEvent 3dc -NGENProcess 3bc -Pipe 3ac -Comment "NGen Worker Process"2⤵
- Modifies data under HKEY_USERS
PID:2008
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 3dc -InterruptEvent 3e0 -NGENProcess 374 -Pipe 24c -Comment "NGen Worker Process"2⤵
- Loads dropped DLL
- Drops file in Windows directory
- Modifies data under HKEY_USERS
PID:2208
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 3c8 -InterruptEvent 3d8 -NGENProcess 3e4 -Pipe 3dc -Comment "NGen Worker Process"2⤵
- Modifies data under HKEY_USERS
PID:1612
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 3e4 -InterruptEvent 374 -NGENProcess 3c8 -Pipe 3d8 -Comment "NGen Worker Process"2⤵
- Loads dropped DLL
- Drops file in Windows directory
- Modifies data under HKEY_USERS
PID:1684
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 374 -InterruptEvent 3c8 -NGENProcess 3cc -Pipe 3c0 -Comment "NGen Worker Process"2⤵
- Modifies data under HKEY_USERS
PID:1984
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 3d0 -InterruptEvent 3e8 -NGENProcess 3f0 -Pipe 374 -Comment "NGen Worker Process"2⤵
- Loads dropped DLL
- Drops file in Windows directory
- Modifies data under HKEY_USERS
PID:2120
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2a4 -InterruptEvent 3c8 -NGENProcess 3f0 -Pipe 3bc -Comment "NGen Worker Process"2⤵PID:1408
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 3c8 -InterruptEvent 3f8 -NGENProcess 370 -Pipe 3f4 -Comment "NGen Worker Process"2⤵
- Modifies data under HKEY_USERS
PID:1564
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 3f8 -InterruptEvent 3fc -NGENProcess 3e0 -Pipe 3e4 -Comment "NGen Worker Process"2⤵
- Loads dropped DLL
- Drops file in Windows directory
- Modifies data under HKEY_USERS
PID:696
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 3fc -InterruptEvent 3e0 -NGENProcess 3c8 -Pipe 3f0 -Comment "NGen Worker Process"2⤵PID:1752
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 3e0 -InterruptEvent 3ec -NGENProcess 2a4 -Pipe 1a4 -Comment "NGen Worker Process"2⤵PID:1600
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 3ec -InterruptEvent 404 -NGENProcess 3f8 -Pipe 370 -Comment "NGen Worker Process"2⤵PID:1372
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 404 -InterruptEvent 40c -NGENProcess 3c8 -Pipe 408 -Comment "NGen Worker Process"2⤵PID:2540
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 40c -InterruptEvent 410 -NGENProcess 3cc -Pipe 3d0 -Comment "NGen Worker Process"2⤵PID:648
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 410 -InterruptEvent 414 -NGENProcess 3f8 -Pipe 2a4 -Comment "NGen Worker Process"2⤵PID:3040
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 414 -InterruptEvent 418 -NGENProcess 3c8 -Pipe 3e0 -Comment "NGen Worker Process"2⤵PID:2616
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 418 -InterruptEvent 41c -NGENProcess 3cc -Pipe 3ec -Comment "NGen Worker Process"2⤵PID:3028
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 41c -InterruptEvent 424 -NGENProcess 3f8 -Pipe 420 -Comment "NGen Worker Process"2⤵PID:2288
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 424 -InterruptEvent 404 -NGENProcess 3e8 -Pipe 3cc -Comment "NGen Worker Process"2⤵PID:2744
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 404 -InterruptEvent 430 -NGENProcess 414 -Pipe 42c -Comment "NGen Worker Process"2⤵PID:396
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 430 -InterruptEvent 434 -NGENProcess 3f8 -Pipe 40c -Comment "NGen Worker Process"2⤵PID:2104
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 434 -InterruptEvent 438 -NGENProcess 3e8 -Pipe 418 -Comment "NGen Worker Process"2⤵PID:2564
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵
- Executes dropped EXE
PID:2952
-
C:\Windows\system32\IEEtwCollector.exeC:\Windows\system32\IEEtwCollector.exe /V1⤵
- Executes dropped EXE
PID:2824
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
694KB
MD57efa6697fadb18d4d1aabeea2dc6e04d
SHA1a5fa195aa82275cd082283e025c1edd2d6e22b85
SHA2569d096223e41438b649f7703c19b1ab7b59e84001f712fb597492a572e5f8b471
SHA5121f2784a122f662f8794beb5e3fe52acb3b6829f2130c3db2e8f48b5fc017638044bbe5246d3597deff4162208767fc24b19da6ba5308442f43f86636d62349d2
-
Filesize
1.6MB
MD5e61ac64b87e07a2af611fbb42705047a
SHA13fc8b413e0fdcda14fa92947cf825ade37d67d5f
SHA2568a1295a1eb1180aa785592ed711ee02e1a98550a7eb32b490011b5de1f27a48a
SHA512c3df17929d55796537b8e7f31b0e2c85907bed05af998c064f85177ec31114b96db1f9bd44a857e11f7d0dbc0c32cd745180fba54fc50f04e8f95e3e62f3a7bb
-
Filesize
4.8MB
MD529f28fd1e77cbf257c4e9aa265676b11
SHA1a567b70277a17cb4344f58d29c6685e8c0b339ac
SHA256dc184471f723a62dbadf818b0621c0d905135c18627d20b0e3134ca3e8b49075
SHA512a270b3d94733b462ce7fa27f5a9377c8974c0ec1d2e254dc5ecd35217e1fdedbb2a99f51cdf58fd98715f3578d44c1b66c23e5d45a28c4d3da351c1819010ee8
-
Filesize
2.1MB
MD5bf89a560abb141f65995e747676d72e7
SHA19180f042a56ea11ae70d08068752eaf345b7a7e8
SHA25699aa22f971caec0a50c806f020ee469d7087909c759722d1d72f01be4b773058
SHA5123f218e31aeb18770628c0fac5828d42d5ea84e4d4126033f0ae23cedfa424bf0ff9da4040eeefe0948a307c2e4f3c629ebae10d1eaff82b3e8d23f82bf206f35
-
Filesize
1.3MB
MD5dc31397f9548a96620c1cc70efe79ac8
SHA11d4132e186e808aed60d2fb7799cdba2fa0a32d9
SHA2564ea27d5d1259403b838f1061bed937ad55e65e8413594e9a8ceb882e96a3ce0a
SHA512e5be6119bcda2b259f5c078d26ede6f19fca2906cddc17e0aa65ef3a518aaa88d3a0e4e411acb355053da79197e7c5f4cd1a0be098123ca205ca8892fc762bf5
-
Filesize
872KB
MD5c469ec0ded00c4e91bde3dcaa1c44e65
SHA1f86a793535dd95933f85634d8f8ceecbee2fe4cc
SHA2563d859e40f7627ded415d7b494f50cb56bc45b294f4c711e942c56e33c3613d65
SHA51236a747ffb0887b97cdf4a90e707f8e37d784a766eefc7eb2974d7bb8f5b49432ee856e2175046115b0cbab593b26c7ba9a6c7044b1af583eed092fe21b5cbaff
-
Filesize
666KB
MD508f0deb44a8be59e45670daf50a17f4c
SHA1d75fef9095fc25fd7d211c091bbc34b6306979c2
SHA2565e517ecd5403f193463ceb240b5159e4703c09b3a1851d47dd35aa96686b53a8
SHA512b71916fd6dc41cb3855eeb561cb56961b27f354e58bd04004b9f42c62e46b5a099822e74855f338d4dde7aa4e17c3aba2feba312598325054c7b87a788989709
-
Filesize
8KB
MD5d9cc8faedc682b7db96bd1b7dcc7e09e
SHA152b7aaf20e7ff907c1d3315861aa51fa12029aa1
SHA25664a9bd25c65b76a920f39180cfd7dd1bfc86a6b030d77cab788220b0d128b393
SHA51292a4e18067d11df489838d6a8c44d9aa510c006ceb8b5d673e6c67616586267477d14fae237c33a3c35e0961b5f7ec6b57923bed1a7a62f789b48c665043ae08
-
Filesize
613KB
MD5343bb752173f6dd78e86790496ba77f7
SHA16cd6909e8e30871e910aee69a1b22253295a027a
SHA2566767b1732b835f61b1f7724696b25f26d62b96ad56c6f7aa7ee050dabb1e5ee1
SHA512462301e34d382f75209ea7a73ab4b56acbb9591a901d5152793885c961d5ea504588168be67744067e6c871ddddf5d5d75f54fe7f55026ac5d761cc9d580ac61
-
Filesize
1003KB
MD54f8e329afa2a50aa1fd594b3d3f18063
SHA18622a440d48b7b845ff47c4cd4e7d50d23e4aef6
SHA25644e11b3980cad307e2a0120c2b8fc378fb9d0a2b054dc2fc2f868b89cec865b3
SHA5126718cfdd35ddb5b1fd63dd6643980d8ec4590afd245fd73010226ca5bd364865ed6973e946c3847288ad18d2e2fc0d1fbc2ec355db54b5dec52c401bc17f7c4c
-
Filesize
644KB
MD51ae496d7844a6fb073918252a0c7c601
SHA1b98c7fd76b80ad97757ad8d4764c07d286148ff2
SHA256df23e51191546ffedc63ec3aef58c6d46744b5903dff056cd61b0008db21d172
SHA5126c2ecd8a937cc7ba56118d30f3fff1010ac9f99ed640bad4895b9d4c50c89cbe29fb2e281511785e1a01835fe2832e63c2a764bd6fa473638e9b1482c858a176
-
Filesize
666KB
MD57fd6a4e444f66db818b579b4853422e8
SHA13023974882d83df5bf29fa64f14fd314230d2d99
SHA256f746de47de8b216e6dd2eb81e9a9fef04c97d31214fd4208e6c0d0dc905324b9
SHA5124a0d42262c2f69f1ebb19513cd632589eb8fd7409f4e46795f60e47696222d701a1767f28aaebb17ca2d4467ecb5e8bef071817980780bc7e4be603794568afb
-
Filesize
29KB
MD5d59a6b36c5a94916241a3ead50222b6f
SHA1e274e9486d318c383bc4b9812844ba56f0cff3c6
SHA256a38d01d3f024e626d579cf052ac3bd4260bb00c34bc6085977a5f4135ab09b53
SHA51217012307955fef045e7c13bf0613bd40df27c29778ba6572640b76c18d379e02dc478e855c9276737363d0ad09b9a94f2adaa85da9c77ebb3c2d427aa68e2489
-
Filesize
81KB
MD5b13f51572f55a2d31ed9f266d581e9ea
SHA17eef3111b878e159e520f34410ad87adecf0ca92
SHA256725980edc240c928bec5a5f743fdabeee1692144da7091cf836dc7d0997cef15
SHA512f437202723b2817f2fef64b53d4eb67f782bdc61884c0c1890b46deca7ca63313ee2ad093428481f94edfcecd9c77da6e72b604998f7d551af959dbd6915809c
-
C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft-Windows-H#\a46df77acafec60e31859608625e6354\Microsoft-Windows-HomeGroupDiagnostic.NetListMgr.Interop.ni.dll
Filesize105KB
MD5d9c0055c0c93a681947027f5282d5dcd
SHA19bd104f4d6bd68d09ae2a55b1ffc30673850780f
SHA256dc7eb30a161a2f747238c8621adb963b50227a596d802b5f9110650357f7f7ed
SHA5125404050caa320cdb48a6ccd34282c12788ee8db4e00397dde936cee00e297e9e438dcaa5fcb4e92525f167637b500db074ac91971d4730d222ac4713a3e7b930
-
C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft.Office.To#\11940d5133d63001fa4499c315655e15\Microsoft.Office.Tools.Word.v9.0.ni.dll
Filesize1.1MB
MD57835e60e560a49049ae728698da3d301
SHA187b357b1b3c9a2ad2f3b89b10a42af021ab76afe
SHA256df34cbc18c66aa387324c45196d71ebe7c91a83fbbdc91766f9f47330a0cb2fa
SHA512b95c33a2746a331e4416f7449c8ab613ba16c716a449e446d825f34dfaf754ea7562bf77cf5a73a78599e0b67a3a697437baa9aa516e40e06981693c8ea5b993
-
C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft.Office.To#\6337d25ea4dd40045a047cb662ee4394\Microsoft.Office.Tools.Outlook.v9.0.ni.dll
Filesize238KB
MD50a4ed78b7995d94fa42379f84cd5f8e9
SHA190ba188fe0ebd38ad225e7ce3a24dd9b6b68056b
SHA2560a75d0d332692cc36d539abdd36f3ff5ef2ab786a9404548ca6c98fd566c4d86
SHA51286ac346de836aa6dd7e017ff4329803c9165758dcfe3aa1881e46ca73e15e6cdb269fcc5b082d717774666f9bc40051a47b5261bfe73901804eb4b0bfacd1184
-
C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft.Office.To#\dc8ba97b4a8deefeb1efac60e1bdb693\Microsoft.Office.Tools.Excel.v9.0.ni.dll
Filesize1.8MB
MD59958f23efa2a86f8195f11054f94189a
SHA178ec93b44569ea7ebce452765568da5c73511931
SHA2563235e629454949220524dd976bec494f7cc4c9abeaf3ee63fc430cbe4fbcf7b6
SHA5123061f8de0abf4b2b37fbc5b930663414499fb6127e2892fe0a0f3dfba6da3927e6caa7bcba31d05faee717d271ecf277607070452701a140dc7d3d4b8d0bfeb1
-
C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft.Office.To#\dd4deeafd891c39e6eb4a2daaafa9124\Microsoft.Office.Tools.Common.v9.0.ni.dll
Filesize1.0MB
MD5598a06ea8f1611a24f86bc0bef0f547e
SHA15a4401a54aa6cd5d8fd883702467879fb5823e37
SHA256e55484d4fe504e02cc49fde33622d1a00cdae29266775dcb7c850203d5ed2512
SHA512774e6facd3c56d1c700d9f97ee2e678d06b17e0493e8dc347be22bcba361bd6225caef702e53f0b08cacc9e6a4c4556280b43d96c928642266286f4dec8b5570
-
C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft.VisualStu#\077a55be734d6ef6e2de59fa7325dac5\Microsoft.VisualStudio.Tools.Office.Contract.v9.0.ni.dll
Filesize205KB
MD50a41e63195a60814fe770be368b4992f
SHA1d826fd4e4d1c9256abd6c59ce8adb6074958a3e7
SHA2564a8ccb522a4076bcd5f217437c195b43914ea26da18096695ee689355e2740e1
SHA5121c916165eb5a2e30d4c6a67f2023ab5df4e393e22d9d8123aa5b9b8522fdb5dfe539bcb772a6e55219b23d865ee1438d066e78f0cb138a4a61cc2a1cecf54728
-
C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft.VisualStu#\2951791a1aa22719b6fdcb816f7e6c04\Microsoft.VisualStudio.Tools.Office.Contract.v10.0.ni.dll
Filesize43KB
MD568c51bcdc03e97a119431061273f045a
SHA16ecba97b7be73bf465adf3aa1d6798fedcc1e435
SHA2564a3aa6bd2a02778759886aaa884d1e8e4a089a1e0578c973fcb4fc885901ebaf
SHA512d71d6275c6f389f6b7becb54cb489da149f614454ae739e95c33a32ed805820bef14c98724882c4ebb51b4705f41b3cdb5a8ed134411011087774cac6e9d23e8
-
C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft.VisualStu#\369a81b278211f8d96a305e918172713\Microsoft.VisualStudio.Tools.Applications.Runtime.v9.0.ni.dll
Filesize198KB
MD59d9305a1998234e5a8f7047e1d8c0efe
SHA1ba7e589d4943cd4fc9f26c55e83c77559e7337a8
SHA256469ff9727392795925c7fe5625afcf508ba07e145c7940e4a12dbd6f14afc268
SHA51258b8cc718ae1a72a9d596f7779aeb0d5492a19e5d668828fd6cff1aa37181cc62878799b4c97beec9c71c67a0c215162ff544b2417f6017cd892a1ce64f7878c
-
C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft.VisualStu#\69f8a058c24a65c205b36f14cad86c7c\Microsoft.VisualStudio.Tools.Office.Outlook.HostAdapter.v10.0.ni.dll
Filesize122KB
MD5e4c8a0905438ec0c5c9775344eac9ca0
SHA1c1d982672b99ad5f952f49d6090296c55f212b86
SHA25667f9e0d8f0303d833f6f72b540edb8c2467346949f2469cf956aa634ac733e6b
SHA512bc1a21def742815bc5ccf95a9376cc5234c52340bbfe15b8d017736057c6f0835ad92d2f9038f33238819ceda8cca6761dc96aea0f14ede5ad1dbc3bbc5402e8
-
C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft.VisualStu#\6e100177db1ef25970ca4a9eba03c352\Microsoft.VisualStudio.Tools.Applications.Contract.v9.0.ni.dll
Filesize70KB
MD557b601497b76f8cd4f0486d8c8bf918e
SHA1da797c446d4ca5a328f6322219f14efe90a5be54
SHA2561380d349abb6d461254118591637c8198859d8aadfdb098b8d532fdc4d776e2d
SHA5121347793a9dbff305975f4717afa9ee56443bc48586d35a64e8a375535fa9e0f6333e13c2267d5dbb7fe868aa863b23034a2e655dcd68b59dca75f17a4cbc1850
-
C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft.VisualStu#\77f00d3b4d847c1dd38a1c69e4ef5cb1\Microsoft.VisualStudio.Tools.Applications.Runtime.v10.0.ni.dll
Filesize87KB
MD5ed5c3f3402e320a8b4c6a33245a687d1
SHA14da11c966616583a817e98f7ee6fce6cde381dae
SHA256b58d8890d884e60af0124555472e23dee55905e678ec9506a3fbe00fffab0a88
SHA512d664b1f9f37c50d0e730a25ff7b79618f1ca99a0f1df0b32a4c82c95b2d15b6ef04ce5560db7407c6c3d2dff70514dac77cb0598f6d32b25362ae83fedb2bc2a
-
C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft.VisualStu#\8ae94640279c29a8040a5926cd26d7f8\Microsoft.VisualStudio.Tools.Office.Excel.HostAdapter.v10.0.ni.dll
Filesize271KB
MD52f9d52fe714b56d641f0949c166be7a8
SHA116fb4670c84ac83ceafb9765f67fcffce4fc7ddd
SHA256cdbee5c335811b981954a3c88af83efbbc0aa2cd8ba86ee22fc02a0b7f20f507
SHA51218034c51281c5b03524697cd138a82a94639801d596e219016b58b56ceaf49fb239a3e00e41585ea35ddb16bff31c9a026b4e73e798a18c44990c30683b18093
-
C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft.VisualStu#\9e076728e51ab285a8bc0f0b0a226e2c\Microsoft.VisualStudio.Tools.Applications.HostAdapter.v10.0.ni.dll
Filesize82KB
MD52eeeff61d87428ae7a2e651822adfdc4
SHA166f3811045a785626e6e1ea7bab7e42262f4c4c1
SHA25637f2ee9f8794df6d51a678c62b4838463a724fdf1bd65277cd41feaf2e6c9047
SHA512cadf3a04aa6dc2b6b781c292d73e195be5032b755616f4b49c6bdde8b3ae297519fc255b0a46280b60aaf45d4dedb9b828d33f1400792b87074f01bbab19e41a
-
C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft.VisualStu#\c30bef87c99026550a7f5ff2806340f3\Microsoft.VisualStudio.Tools.Office.Word.HostAdapter.v10.0.ni.dll
Filesize305KB
MD55873a3e19ccec9871d4aa1d251739e17
SHA19dc888e9618ec3fc839dc6693b7059dd5a68972d
SHA2561fc12906f96dfedc31c9cc2b83f3e3e4c51238ba5d3b9defcd81c0a5031972b2
SHA5129d7be3641a1c72e4019de044ae984edfca1d5123bc09ae4e0db7f44e1b872645cd84043026fe7b30e143142febee83e666c9ba8fbe119aaf6cd26c4a37ce5a7c
-
C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft.VisualStu#\cc1ea6d8c5681c9226b29c013abd9272\Microsoft.VisualStudio.Tools.Office.HostAdapter.v10.0.ni.dll
Filesize221KB
MD5afc9888bb8519b868fe2e9c40928640d
SHA13a6cb0aa172fffc39aafd8f5630fb76f1b023bd5
SHA25662569d3211c001ea7df90eb30cf9280dda0f19797c4fb724f257ef253bae748c
SHA512de10303661d95205a4384e1d80a28f50ce676b0192e2b50e315456fee7f582b4bb33eb92ed302420cb0bdfbedbde796cba7441b3332b445f0f49bbb6b15e8d2f
-
C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft.VisualStu#\fe8d06712eb58d0150803744020b072a\Microsoft.VisualStudio.Tools.Applications.Contract.v10.0.ni.dll
Filesize43KB
MD5dd1dfa421035fdfb6fd96d301a8c3d96
SHA1d535030ad8d53d57f45bc14c7c7b69efd929efb3
SHA256f71293fe6cf29af54d61bd2070df0a5ff17a661baf1b0b6c1d3393fd23ccd30c
SHA5128e0f2bee9801a4eba974132811d7274e52e6e17ccd60e8b3f74959994f007bdb0c60eb9facb6321c0fdfbcc44e9a77d8c5c776d998ccce256fa864338a6f63b1
-
C:\Windows\assembly\NativeImages_v2.0.50727_64\ehiActivScp\ee22f412f6314443add3ca412afd6569\ehiActivScp.ni.dll
Filesize124KB
MD5929653b5b019b4555b25d55e6bf9987b
SHA1993844805819ee445ff8136ee38c1aee70de3180
SHA2562766353ca5c6a87169474692562282005905f1ca82eaa08e08223fc084dbb9a2
SHA512effc809cca6170575efa7b4b23af9c49712ee9a7aaffd8f3a954c2d293be5be2cf3c388df4af2043f82b9b2ea041acdbb9d7ddd99a2fc744cce95cf4d820d013
-
C:\Windows\assembly\NativeImages_v2.0.50727_64\ehiVidCtl\11d57f5c033326954c0bc4f0b2680812\ehiVidCtl.ni.dll
Filesize2.1MB
MD510b5a285eafccdd35390bb49861657e7
SHA162c05a4380e68418463529298058f3d2de19660d
SHA2565f3bb3296ab50050e6b4ea7e95caa937720689db735c70309e5603a778be3a9a
SHA51219ff9ac75f80814ed5124adc25fc2a6d1d7b825c770e1edb8f5b6990e44f9d2d0c1c0ed75b984e729709d603350055e5a543993a80033367810c417864df1452
-
C:\Windows\assembly\NativeImages_v2.0.50727_64\stdole\70f1aed4a280583cbd09e0f5d9bbc1f5\stdole.ni.dll
Filesize88KB
MD51f394b5ca6924de6d9dbfb0e90ea50ef
SHA14e2caa5e98531c6fbf5728f4ae4d90a1ad150920
SHA2569db0e4933b95ad289129c91cd9e14a0c530f42b55e8c92dc8c881bc3dd40b998
SHA512e27ea0f7b59d41a85547d607ae3c05f32ce19fa5d008c8eaf11d0c253a73af3cfa6df25e3ee7f3920cd775e1a3a2db934e5891b4aafd4270d65a727b439f7476
-
Filesize
694KB
MD5592ab9aca6ac0edcf5d82e18ca70a437
SHA156e033a458a090dc785acfbc8afb27a7c10b0d94
SHA2569c4dfdac7890fd4c87b621707ceccf438075ba56d9e63b6c7efa322a3a86f4f2
SHA51262bfa493ad686fad6d0c99103e8aeb0a4d575aceb3e6a1a9ed92214b468123fe93138d4e6887580af13a303f62898cba62e00eb8bf5edc71099890f0675fb2b1
-
Filesize
30.1MB
MD5553378bed3ef4dbec0c184c313cb7b49
SHA1642401af20712165ea1ca4c9ad0d5e8f7383ca99
SHA2565147e46c4a0da995a5353553a0c02eb265d5dee21f36cd9cc1ec468687239c1e
SHA512d2a440350a12706953c7807ef96a15f302e597db31bfc66ddc57cb7be10b240ebbd32c46a2fa30c839d4e97431c53e489159e0fd0681a2c2f51603dead9aa1c3
-
Filesize
773KB
MD52b294bc1f03c7e0be05b9871deed1060
SHA1e86c8cb00a8bd8d18f7b4dc387d15c1ff2f64dc6
SHA256db2724a353b7946e884f578bbc6fda06e3ebb0931cc847913858a0398b2c45dc
SHA51288c1dcea7793a3f01cc6211cb721435c40021eb55ff6ceca1537674012ce644f126cbc42e86270b2e4dddadf10791b5e614f0b86faa162d99504bc835ede6e3d
-
Filesize
2.0MB
MD52cd78887f3e5ea279564636bc2f438a2
SHA1c9cf8e22beee462989597e6f662b13bce48d6333
SHA2569c29492bffd3934f7621728ea6908b28750c8b7a1074cae617f0ee4b864f38d5
SHA5124fbeed273c490b1686d585f466a87773b54f5153eb4a2e1e045f7adcea50eb5dbf91398cd9295e8125129b17ca9fe47887c34cb55609a66e49354fb1f32a2b09
-
Filesize
1.2MB
MD51ffee2c8cc89144c6993161c4667a018
SHA18702e9ca7a2a226e51f9abfdfb67e0857087a96c
SHA256748636db584fcba3a044fbecbf46475125b05366c809657842fe312d3c2e8c5c
SHA51204776f86e3650022884b0f79e0f6466371e6ed70c946037327ac6ed08a8a2ac8edb7be69ca06ccb2a838b14be7389f2ac4cb79fe5249f310a701ce1a10b9b77f
-
Filesize
679KB
MD52f6484fedb3084ceb5ee7268a79fe765
SHA132eb5981fe1db3b2faa74dc183750534023a99e6
SHA2562ceadbc43fcb174114a4b290b3d18b8b3fcc1886928cda603cd8f01eea3e8bc1
SHA5126cab2a81e12f56b3ce1bf1ba40b0398d459734637cf6c2ee8ccb30c114b390f6ea9b012e62ff7fb43f4985d83e5fc5fe4803a76ed00a406fd6b90c1f8138bfda
-
Filesize
591KB
MD5db59d247308b1eabe84ef836fcc8d5f8
SHA11cfe0902816b65482b272997c03ceb262415025d
SHA256be0d04e87581f8dbfbef6ba3b2485eff3389b857f966a45df22dfa719a40212a
SHA5121478fd349ca63d966ff1f1e31571b492441f8397aace76ba596e126cf9d37d8dd838808049d15dbbc6086c1f552dc2d938fd2ad515684f2c880099a94d1afd74
-
Filesize
632KB
MD5bd5049f7b9cc136ccf127d16a0300af2
SHA19581ab7fa13a19414938b8bae03a21d87e44671a
SHA256beb89cac8deb43850afad56457a0947f4329d8c6af4a98a0dd6fae30a4189ab4
SHA512f249cb96522581fa8f49c8cc61df2ebb3f001c21140c22d92b94491c1cffd999a69b7baca71503a9e9b9c23f71b20c5486e80cf8c630e3b69d4696820c6b3b5a
-
Filesize
1.2MB
MD5d1d57f1fbb6013045ac2214295cfeb65
SHA177356987dfa8e5a50b25ee4151745c152649e982
SHA2567d65d470409221034cf88e0ec3ef05c15879687d54727689b6d19b6d490de631
SHA512e465a8505672ad4c2a14916f31b85681e0bea491762d41b5cd08d9dd0b30dff662981d4faaca3a0e0d0987575de047c4ab72cb88794dd1b0fdb9a8914fa1b8aa
-
Filesize
693KB
MD58c93c9ad6750fc84c05b120dd08c13ec
SHA1b65ec1d36d1c8be382f7aa68238f33e56c54f22a
SHA2560cf83745bfbc3daaf18fb90602d80fada37610d980ac5fed4f388ba4bd905459
SHA5128d9f326cfae9097e3caa266162999ed914f161cfa61aa34ce13017441e5cdd758ba122962d8e402003dde5d0ef4805321fadff4fa2184a181f4353ad104cf023
-
Filesize
683KB
MD5ccfa3f56d811a4ce50d8179e967593bd
SHA1d478c85296e8fe45f13179034011c9ed54dfcf51
SHA256e310303c9a3d1d30e2b434dde4f3ee10f40b6e50fb4d2ee7bd8d83a23bda9ad3
SHA512c142c64e52ef267f3206c2e68589a73e4d8c707f8a1213afb324822275c69b290a72e625b69b22892224555c5101fa69c716c2cad092170089f9cf22d08d122b
-
Filesize
1.1MB
MD5662239edb47a19751c65f93837e23232
SHA171c41d5bc550a04089b7bc34f6f7c82ff3250bd4
SHA256a38d0b97a970a37c0aff5176414c602707855797c989284abdd2a98423231034
SHA51250b44475538c85603abe746aad84947e0bee3b24f2ebac27d76cd43784097bb32e171b9daf018cc43dfebfdbd629276f36c6780137ab819f0acf2ce013897ac2
-
Filesize
569KB
MD545fddfb40680035a465c388f5df37190
SHA1b84fdab830165eba21a0e07f27e7238529747c16
SHA256abde935f708ae18537fb9fc52cfcae48ed83bfe134553ba9398418ae2cecb9ca
SHA5124cdbe8cdf1a52ddd00872c89abfa19cec9ac46ef0267236c6a1e05c720f0efeab79236290a04cf3dd5bdae25cc7d196e78c41b0934301478229258f042df9a65
-
Filesize
595KB
MD5e26c09909c93ce7709ceeb37e09837a6
SHA1c1947d7ff0c1201913374f51aebef3f80e888b2e
SHA256076adb0d3e8ec0d611814af502226fd50eedc388c7bf799c4bc8afbcf8610614
SHA5128124bc954483eedcff46b0e8466dd8ff714d5e0e71e653faf17ba5c265bd7612d33ab8272e65d5b1f1b30b8ea512e6fdf6825eea324fc3a7fbbe7427225268f0
-
Filesize
1.1MB
MD567d531d0889e0ecb1efdeb0b3a745fe0
SHA1eca9e5e7df722faafe2025b464ff63d97dccade4
SHA25612d6a724ed021ad7f7cffccdd3eabd98340828c3cf6009eb9ee57be6cb09fd8c
SHA5121c12e39e0e7c49d6b9bb0d00c145517d8a3fba52c5db690e70bc77ac53c33727a02062b470148cf92346d3b7bd5ad87bdf5ab37e89d9770d344e6229740ecc66
-
Filesize
2.1MB
MD5b6e5623989baba7b1ddefae6ec23ea57
SHA18d801dfdd2f9d5d9f2fd429cd0e840536cd036ec
SHA2564412f4432cf7f8be28fe2f840efa21534c309c5a5ea48033586bd53f7c5ea13a
SHA512495fd124f46047b17cd0e0bf42427cef87b646618599b313792b6d6189efcfdbf240fa88c2d58d4a6d1e7f5a1c89a3f40e47c1c0a1cea108cd46765b818342fc
-
Filesize
753KB
MD50371de7fe198df822daab23bfe99d7cf
SHA1548a3344b20e4a5d7572f819fa618a8f153cfa6e
SHA256c28d7e2d870680fb633f1b2ad5822c781c370539373cbb2e4ab67b0afeae6a23
SHA5129bd4cbe45f2969aa95421d880c9a31d7f0382ad5b749e19965f0aade5e0a5a227aa344228482ef6ac1b9077d5e0553c7e019dc39abd6d9548359ebfccd1068b5
-
Filesize
2.0MB
MD5887a79d4282d3d0562f8c9494dec9ff6
SHA18160a5d1176e46079741e3869205fdfd686b009a
SHA256996e7bbcb11b07d768446400ccd7f182f4f88508e8a703a6c47d7cf0b68b2445
SHA51290ed57db8c375cc6f5d46269bf938153720f68927eb4f91519dbde8dc82a63a4294ddf3cdb341c2b5c90afb67effea7467cdfec68608b8b1c07a67512aa52959
-
Filesize
640KB
MD56657e12c79b822c0269a3b4d62902469
SHA1c1cc83d9deb363a387998a81a11699f191a15620
SHA256392ea39572705dea35fa7beab1d11530f00115089e0f4b87aedfa8f729249e62
SHA512063089e81da8c3ad1a5135277c70fe303774fe9bcb49f50486bfdb2858e87bdbfb04d1f97aff9e5ec245ae5f4ebb0274ce6e84d3ac29e20223c8361dc1dbe3ad
-
\Windows\assembly\NativeImages_v2.0.50727_64\Temp\ZAP9C7E.tmp\Microsoft.VisualStudio.Tools.Applications.AddInAdapter.v9.0.dll
Filesize85KB
MD55180107f98e16bdca63e67e7e3169d22
SHA1dd2e82756dcda2f5a82125c4d743b4349955068d
SHA256d0658cbf473ef3666c758d28a1c4bcdcb25b2e515ad5251127d0906e65938f01
SHA51227d785971c28181cf9115ab14de066931c4d81f8d357ea8b9eabfe0f70bd5848023b69948ac6a586989e892bcde40999f8895a0bd2e7a28bac7f2fa64bb22363
-
\Windows\assembly\NativeImages_v2.0.50727_64\Temp\ZAP9F99.tmp\Microsoft.VisualStudio.Tools.Office.AddInAdapter.v9.0.dll
Filesize298KB
MD55fd34a21f44ccbeda1bf502aa162a96a
SHA11f3b1286c01dea47be5e65cb72956a2355e1ae5e
SHA2565d88539a1b7be77e11fe33572606c1093c54a80eea8bd3662f2ef5078a35ce01
SHA51258c3904cd1a06fbd3a432b3b927e189a744282cc105eda6f0d7f406971ccbc942c7403c2dcbb2d042981cf53419ca5e2cf4d9f57175e45cc5c484b0c121bb125
-
\Windows\assembly\NativeImages_v2.0.50727_64\Temp\ZAPA370.tmp\Microsoft.VisualStudio.Tools.Office.Excel.AddInAdapter.v9.0.dll
Filesize58KB
MD53d6987fc36386537669f2450761cdd9d
SHA17a35de593dce75d1cb6a50c68c96f200a93eb0c9
SHA25634c0302fcf7d2237f914aaa484b24f5a222745f21f5b5806b9c519538665d9cb
SHA5121d74371f0b6c68ead18b083c08b7e44fcaf930a16e0641ad6cd8d8defb4bde838377741e5b827f7f05d4f0ad4550b509ba6dff787f51fc6830d8f2c88dbf0e11
-
\Windows\assembly\NativeImages_v2.0.50727_64\Temp\ZAPA67C.tmp\Microsoft.VisualStudio.Tools.Office.Word.AddInAdapter.v9.0.dll
Filesize58KB
MD5a8b651d9ae89d5e790ab8357edebbffe
SHA1500cff2ba14e4c86c25c045a51aec8aa6e62d796
SHA2561c8239c49fb10c715b52e60afd0e6668592806ef447ad0c52599231f995a95d7
SHA512b4d87ee520353113bb5cf242a855057627fde9f79b74031ba11d5feee1a371612154940037954cd1e411da0c102f616be72617a583512420fd1fc743541a10ce
-
Filesize
248KB
MD54bbf44ea6ee52d7af8e58ea9c0caa120
SHA1f7dcafcf850b4081b61ec7d313d7ec35d6ac66d2
SHA256c89c478c2d7134cd28b3d28d4216ad6aa41de3edd9d87a227ec19cf1cbf3fb08
SHA512c82356750a03bd6f92f03c67acdd5e1085fbd70533a8b314ae54676f37762d9ca5fa91574529b147d3e1c983bf042106b75f41206f5ddc37094a5e1c327c0fd3