Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04-01-2025 16:58
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_7aca9fb59d176aa3ee9499bb5d86eae0.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_7aca9fb59d176aa3ee9499bb5d86eae0.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_7aca9fb59d176aa3ee9499bb5d86eae0.exe
-
Size
706KB
-
MD5
7aca9fb59d176aa3ee9499bb5d86eae0
-
SHA1
b312626f30ca35ccdf121b8289daa13d6198f95d
-
SHA256
159ada880f50d0577439f7f800219a43c7b2a3e8b08aae1154144998a1648ccc
-
SHA512
06afeabf5ff69b343bba84acf28c2aae73138ff07aa992c93561d3054e432e9cf1631ba1c2c841935879c6c38dd0d146a4ddb95f403ad6bbccb9832e94e05974
-
SSDEEP
12288:TvqlqSrzEAupLiPuSrN03Mad1U/VKDXdrElzJlLeASe0LuT7MvQtbks+/z:rsqSroAupL8uSrO3MPYyjnsk7IH
Malware Config
Signatures
-
Expiro family
-
Expiro payload 2 IoCs
resource yara_rule behavioral1/memory/1836-2-0x0000000001000000-0x00000000011D4000-memory.dmp family_expiro1 behavioral1/memory/2524-85-0x0000000010000000-0x00000000101AF000-memory.dmp family_expiro1 -
Executes dropped EXE 64 IoCs
pid Process 2524 mscorsvw.exe 472 Process not Found 3044 mscorsvw.exe 2680 mscorsvw.exe 2244 mscorsvw.exe 2640 elevation_service.exe 1676 IEEtwCollector.exe 2672 mscorsvw.exe 1796 mscorsvw.exe 1656 mscorsvw.exe 1272 mscorsvw.exe 1372 mscorsvw.exe 1812 mscorsvw.exe 1084 mscorsvw.exe 832 mscorsvw.exe 2904 mscorsvw.exe 2476 mscorsvw.exe 2932 mscorsvw.exe 2860 mscorsvw.exe 1920 mscorsvw.exe 2668 mscorsvw.exe 2848 mscorsvw.exe 2748 mscorsvw.exe 536 mscorsvw.exe 2096 mscorsvw.exe 2368 mscorsvw.exe 1116 mscorsvw.exe 2636 mscorsvw.exe 1648 mscorsvw.exe 2456 mscorsvw.exe 1560 mscorsvw.exe 1576 mscorsvw.exe 924 mscorsvw.exe 2444 mscorsvw.exe 880 mscorsvw.exe 2480 mscorsvw.exe 2080 mscorsvw.exe 2172 mscorsvw.exe 2596 mscorsvw.exe 2652 mscorsvw.exe 1088 mscorsvw.exe 2332 mscorsvw.exe 1700 mscorsvw.exe 1992 mscorsvw.exe 1312 mscorsvw.exe 872 mscorsvw.exe 1092 mscorsvw.exe 1984 mscorsvw.exe 2924 mscorsvw.exe 2232 mscorsvw.exe 2228 mscorsvw.exe 2704 mscorsvw.exe 2688 mscorsvw.exe 2624 mscorsvw.exe 2896 mscorsvw.exe 2632 mscorsvw.exe 304 mscorsvw.exe 2652 mscorsvw.exe 316 mscorsvw.exe 1664 mscorsvw.exe 2116 mscorsvw.exe 1148 mscorsvw.exe 3008 mscorsvw.exe 2448 mscorsvw.exe -
Loads dropped DLL 56 IoCs
pid Process 472 Process not Found 472 Process not Found 472 Process not Found 472 Process not Found 1084 mscorsvw.exe 1084 mscorsvw.exe 2904 mscorsvw.exe 2904 mscorsvw.exe 2932 mscorsvw.exe 2932 mscorsvw.exe 1920 mscorsvw.exe 1920 mscorsvw.exe 2848 mscorsvw.exe 2848 mscorsvw.exe 536 mscorsvw.exe 536 mscorsvw.exe 2368 mscorsvw.exe 2368 mscorsvw.exe 2636 mscorsvw.exe 2636 mscorsvw.exe 2456 mscorsvw.exe 2456 mscorsvw.exe 1576 mscorsvw.exe 1576 mscorsvw.exe 2444 mscorsvw.exe 2444 mscorsvw.exe 2480 mscorsvw.exe 2480 mscorsvw.exe 2172 mscorsvw.exe 2172 mscorsvw.exe 2652 mscorsvw.exe 2652 mscorsvw.exe 2332 mscorsvw.exe 2332 mscorsvw.exe 1992 mscorsvw.exe 1992 mscorsvw.exe 2232 mscorsvw.exe 2232 mscorsvw.exe 2228 mscorsvw.exe 2228 mscorsvw.exe 2688 mscorsvw.exe 2688 mscorsvw.exe 2976 mscorsvw.exe 2976 mscorsvw.exe 2988 mscorsvw.exe 2988 mscorsvw.exe 2884 mscorsvw.exe 2884 mscorsvw.exe 1960 mscorsvw.exe 1960 mscorsvw.exe 2176 mscorsvw.exe 2176 mscorsvw.exe 2772 mscorsvw.exe 2772 mscorsvw.exe 2652 mscorsvw.exe 2652 mscorsvw.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Security Center\Svc\S-1-5-21-3063565911-2056067323-3330884624-1000\EnableNotifications = "0" mscorsvw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Security Center\Svc\S-1-5-21-3063565911-2056067323-3330884624-1000 mscorsvw.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\dlddmedljhmbgdhapibnagaanenmajcm\1.0_0\manifest.json JaffaCakes118_7aca9fb59d176aa3ee9499bb5d86eae0.exe -
Enumerates connected drives 3 TTPs 42 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: JaffaCakes118_7aca9fb59d176aa3ee9499bb5d86eae0.exe File opened (read-only) \??\X: JaffaCakes118_7aca9fb59d176aa3ee9499bb5d86eae0.exe File opened (read-only) \??\E: mscorsvw.exe File opened (read-only) \??\O: mscorsvw.exe File opened (read-only) \??\G: JaffaCakes118_7aca9fb59d176aa3ee9499bb5d86eae0.exe File opened (read-only) \??\P: JaffaCakes118_7aca9fb59d176aa3ee9499bb5d86eae0.exe File opened (read-only) \??\R: JaffaCakes118_7aca9fb59d176aa3ee9499bb5d86eae0.exe File opened (read-only) \??\U: JaffaCakes118_7aca9fb59d176aa3ee9499bb5d86eae0.exe File opened (read-only) \??\W: mscorsvw.exe File opened (read-only) \??\I: JaffaCakes118_7aca9fb59d176aa3ee9499bb5d86eae0.exe File opened (read-only) \??\N: mscorsvw.exe File opened (read-only) \??\R: mscorsvw.exe File opened (read-only) \??\Z: mscorsvw.exe File opened (read-only) \??\K: JaffaCakes118_7aca9fb59d176aa3ee9499bb5d86eae0.exe File opened (read-only) \??\N: JaffaCakes118_7aca9fb59d176aa3ee9499bb5d86eae0.exe File opened (read-only) \??\W: JaffaCakes118_7aca9fb59d176aa3ee9499bb5d86eae0.exe File opened (read-only) \??\H: mscorsvw.exe File opened (read-only) \??\L: mscorsvw.exe File opened (read-only) \??\H: JaffaCakes118_7aca9fb59d176aa3ee9499bb5d86eae0.exe File opened (read-only) \??\J: JaffaCakes118_7aca9fb59d176aa3ee9499bb5d86eae0.exe File opened (read-only) \??\S: JaffaCakes118_7aca9fb59d176aa3ee9499bb5d86eae0.exe File opened (read-only) \??\S: mscorsvw.exe File opened (read-only) \??\Y: mscorsvw.exe File opened (read-only) \??\X: mscorsvw.exe File opened (read-only) \??\M: JaffaCakes118_7aca9fb59d176aa3ee9499bb5d86eae0.exe File opened (read-only) \??\O: JaffaCakes118_7aca9fb59d176aa3ee9499bb5d86eae0.exe File opened (read-only) \??\Q: JaffaCakes118_7aca9fb59d176aa3ee9499bb5d86eae0.exe File opened (read-only) \??\V: JaffaCakes118_7aca9fb59d176aa3ee9499bb5d86eae0.exe File opened (read-only) \??\Q: mscorsvw.exe File opened (read-only) \??\T: mscorsvw.exe File opened (read-only) \??\J: mscorsvw.exe File opened (read-only) \??\K: mscorsvw.exe File opened (read-only) \??\P: mscorsvw.exe File opened (read-only) \??\V: mscorsvw.exe File opened (read-only) \??\L: JaffaCakes118_7aca9fb59d176aa3ee9499bb5d86eae0.exe File opened (read-only) \??\T: JaffaCakes118_7aca9fb59d176aa3ee9499bb5d86eae0.exe File opened (read-only) \??\G: mscorsvw.exe File opened (read-only) \??\I: mscorsvw.exe File opened (read-only) \??\Z: JaffaCakes118_7aca9fb59d176aa3ee9499bb5d86eae0.exe File opened (read-only) \??\Y: JaffaCakes118_7aca9fb59d176aa3ee9499bb5d86eae0.exe File opened (read-only) \??\M: mscorsvw.exe File opened (read-only) \??\U: mscorsvw.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification \??\c:\windows\system32\msdtc.exe JaffaCakes118_7aca9fb59d176aa3ee9499bb5d86eae0.exe File opened for modification \??\c:\windows\SysWOW64\vssvc.exe JaffaCakes118_7aca9fb59d176aa3ee9499bb5d86eae0.exe File created \??\c:\windows\system32\wbengine.vir JaffaCakes118_7aca9fb59d176aa3ee9499bb5d86eae0.exe File opened for modification \??\c:\windows\system32\dllhost.exe mscorsvw.exe File opened for modification \??\c:\windows\SysWOW64\svchost.exe JaffaCakes118_7aca9fb59d176aa3ee9499bb5d86eae0.exe File created \??\c:\windows\system32\ieetwcollector.vir JaffaCakes118_7aca9fb59d176aa3ee9499bb5d86eae0.exe File created \??\c:\windows\system32\msdtc.vir JaffaCakes118_7aca9fb59d176aa3ee9499bb5d86eae0.exe File opened for modification \??\c:\windows\SysWOW64\locator.exe JaffaCakes118_7aca9fb59d176aa3ee9499bb5d86eae0.exe File created \??\c:\windows\system32\vssvc.vir JaffaCakes118_7aca9fb59d176aa3ee9499bb5d86eae0.exe File created \??\c:\windows\SysWOW64\dllhost.vir JaffaCakes118_7aca9fb59d176aa3ee9499bb5d86eae0.exe File opened for modification \??\c:\windows\system32\lsass.exe JaffaCakes118_7aca9fb59d176aa3ee9499bb5d86eae0.exe File opened for modification \??\c:\windows\system32\locator.exe JaffaCakes118_7aca9fb59d176aa3ee9499bb5d86eae0.exe File opened for modification \??\c:\windows\syswow64\perfhost.exe mscorsvw.exe File opened for modification \??\c:\windows\system32\snmptrap.exe mscorsvw.exe File opened for modification \??\c:\windows\system32\alg.exe JaffaCakes118_7aca9fb59d176aa3ee9499bb5d86eae0.exe File opened for modification \??\c:\windows\SysWOW64\dllhost.exe JaffaCakes118_7aca9fb59d176aa3ee9499bb5d86eae0.exe File created \??\c:\windows\system32\ui0detect.vir JaffaCakes118_7aca9fb59d176aa3ee9499bb5d86eae0.exe File opened for modification \??\c:\windows\system32\lsass.exe mscorsvw.exe File opened for modification \??\c:\windows\system32\wbengine.exe mscorsvw.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7B2238AACCEDC3F1FFE8E7EB5F575EC9 mscorsvw.exe File opened for modification \??\c:\windows\SysWOW64\alg.exe JaffaCakes118_7aca9fb59d176aa3ee9499bb5d86eae0.exe File opened for modification \??\c:\windows\system32\ieetwcollector.exe JaffaCakes118_7aca9fb59d176aa3ee9499bb5d86eae0.exe File opened for modification \??\c:\windows\SysWOW64\snmptrap.exe JaffaCakes118_7aca9fb59d176aa3ee9499bb5d86eae0.exe File opened for modification \??\c:\windows\system32\snmptrap.exe JaffaCakes118_7aca9fb59d176aa3ee9499bb5d86eae0.exe File opened for modification \??\c:\windows\system32\vssvc.exe mscorsvw.exe File opened for modification \??\c:\windows\SysWOW64\lsass.exe JaffaCakes118_7aca9fb59d176aa3ee9499bb5d86eae0.exe File created \??\c:\windows\system32\msiexec.vir JaffaCakes118_7aca9fb59d176aa3ee9499bb5d86eae0.exe File created \??\c:\windows\system32\vds.vir JaffaCakes118_7aca9fb59d176aa3ee9499bb5d86eae0.exe File opened for modification \??\c:\windows\system32\locator.exe mscorsvw.exe File opened for modification \??\c:\windows\SysWOW64\ui0detect.exe JaffaCakes118_7aca9fb59d176aa3ee9499bb5d86eae0.exe File opened for modification \??\c:\windows\SysWOW64\vds.exe JaffaCakes118_7aca9fb59d176aa3ee9499bb5d86eae0.exe File opened for modification \??\c:\windows\SysWOW64\wbem\wmiApsrv.exe JaffaCakes118_7aca9fb59d176aa3ee9499bb5d86eae0.exe File created \??\c:\windows\system32\snmptrap.vir JaffaCakes118_7aca9fb59d176aa3ee9499bb5d86eae0.exe File opened for modification \??\c:\windows\system32\ui0detect.exe JaffaCakes118_7aca9fb59d176aa3ee9499bb5d86eae0.exe File opened for modification \??\c:\windows\system32\wbem\wmiApsrv.exe mscorsvw.exe File opened for modification \??\c:\windows\SysWOW64\ieetwcollector.exe JaffaCakes118_7aca9fb59d176aa3ee9499bb5d86eae0.exe File opened for modification \??\c:\windows\syswow64\perfhost.exe JaffaCakes118_7aca9fb59d176aa3ee9499bb5d86eae0.exe File opened for modification \??\c:\windows\system32\msiexec.exe mscorsvw.exe File opened for modification \??\c:\windows\system32\searchindexer.exe mscorsvw.exe File opened for modification \??\c:\windows\system32\wbem\wmiApsrv.exe JaffaCakes118_7aca9fb59d176aa3ee9499bb5d86eae0.exe File opened for modification \??\c:\windows\system32\svchost.exe JaffaCakes118_7aca9fb59d176aa3ee9499bb5d86eae0.exe File created \??\c:\windows\system32\alg.vir JaffaCakes118_7aca9fb59d176aa3ee9499bb5d86eae0.exe File opened for modification \??\c:\windows\system32\fxssvc.exe JaffaCakes118_7aca9fb59d176aa3ee9499bb5d86eae0.exe File created \??\c:\windows\system32\fxssvc.vir JaffaCakes118_7aca9fb59d176aa3ee9499bb5d86eae0.exe File created \??\c:\windows\SysWOW64\msiexec.vir JaffaCakes118_7aca9fb59d176aa3ee9499bb5d86eae0.exe File opened for modification \??\c:\windows\SysWOW64\msiexec.exe JaffaCakes118_7aca9fb59d176aa3ee9499bb5d86eae0.exe File opened for modification \??\c:\windows\SysWOW64\wbengine.exe JaffaCakes118_7aca9fb59d176aa3ee9499bb5d86eae0.exe File opened for modification \??\c:\windows\system32\wbengine.exe JaffaCakes118_7aca9fb59d176aa3ee9499bb5d86eae0.exe File opened for modification \??\c:\windows\system32\ui0detect.exe mscorsvw.exe File opened for modification \??\c:\windows\system32\msiexec.exe JaffaCakes118_7aca9fb59d176aa3ee9499bb5d86eae0.exe File opened for modification \??\c:\windows\system32\vds.exe JaffaCakes118_7aca9fb59d176aa3ee9499bb5d86eae0.exe File created \??\c:\windows\SysWOW64\searchindexer.vir JaffaCakes118_7aca9fb59d176aa3ee9499bb5d86eae0.exe File opened for modification \??\c:\windows\system32\svchost.exe mscorsvw.exe File opened for modification \??\c:\windows\system32\dllhost.exe JaffaCakes118_7aca9fb59d176aa3ee9499bb5d86eae0.exe File opened for modification \??\c:\windows\system32\vssvc.exe JaffaCakes118_7aca9fb59d176aa3ee9499bb5d86eae0.exe File opened for modification \??\c:\windows\system32\searchindexer.exe JaffaCakes118_7aca9fb59d176aa3ee9499bb5d86eae0.exe File opened for modification \??\c:\windows\system32\msdtc.exe mscorsvw.exe File opened for modification \??\c:\windows\system32\vds.exe mscorsvw.exe File created \??\c:\windows\system32\wbem\wmiApsrv.vir JaffaCakes118_7aca9fb59d176aa3ee9499bb5d86eae0.exe File opened for modification \??\c:\windows\SysWOW64\searchindexer.exe JaffaCakes118_7aca9fb59d176aa3ee9499bb5d86eae0.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7B2238AACCEDC3F1FFE8E7EB5F575EC9 mscorsvw.exe File created \??\c:\windows\SysWOW64\svchost.vir JaffaCakes118_7aca9fb59d176aa3ee9499bb5d86eae0.exe File opened for modification \??\c:\windows\SysWOW64\fxssvc.exe JaffaCakes118_7aca9fb59d176aa3ee9499bb5d86eae0.exe File opened for modification \??\c:\windows\SysWOW64\msdtc.exe JaffaCakes118_7aca9fb59d176aa3ee9499bb5d86eae0.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ShapeCollector.exe JaffaCakes118_7aca9fb59d176aa3ee9499bb5d86eae0.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\VSTO\10.0\VSTOInstaller.exe JaffaCakes118_7aca9fb59d176aa3ee9499bb5d86eae0.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jar.exe JaffaCakes118_7aca9fb59d176aa3ee9499bb5d86eae0.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javah.exe JaffaCakes118_7aca9fb59d176aa3ee9499bb5d86eae0.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\pack200.exe JaffaCakes118_7aca9fb59d176aa3ee9499bb5d86eae0.exe File opened for modification \??\c:\program files\google\chrome\Application\106.0.5249.119\elevation_service.exe JaffaCakes118_7aca9fb59d176aa3ee9499bb5d86eae0.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\FlickLearningWizard.exe JaffaCakes118_7aca9fb59d176aa3ee9499bb5d86eae0.exe File created C:\Program Files\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.vir JaffaCakes118_7aca9fb59d176aa3ee9499bb5d86eae0.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe JaffaCakes118_7aca9fb59d176aa3ee9499bb5d86eae0.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\java.exe JaffaCakes118_7aca9fb59d176aa3ee9499bb5d86eae0.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javac.exe JaffaCakes118_7aca9fb59d176aa3ee9499bb5d86eae0.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe JaffaCakes118_7aca9fb59d176aa3ee9499bb5d86eae0.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\idlj.exe JaffaCakes118_7aca9fb59d176aa3ee9499bb5d86eae0.exe File opened for modification \??\c:\program files (x86)\microsoft office\office14\groove.exe JaffaCakes118_7aca9fb59d176aa3ee9499bb5d86eae0.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\msinfo32.exe JaffaCakes118_7aca9fb59d176aa3ee9499bb5d86eae0.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE JaffaCakes118_7aca9fb59d176aa3ee9499bb5d86eae0.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\tnameserv.exe JaffaCakes118_7aca9fb59d176aa3ee9499bb5d86eae0.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe JaffaCakes118_7aca9fb59d176aa3ee9499bb5d86eae0.exe File opened for modification C:\Program Files\7-Zip\7zG.exe JaffaCakes118_7aca9fb59d176aa3ee9499bb5d86eae0.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\apt.exe JaffaCakes118_7aca9fb59d176aa3ee9499bb5d86eae0.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javap.exe JaffaCakes118_7aca9fb59d176aa3ee9499bb5d86eae0.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\pack200.exe JaffaCakes118_7aca9fb59d176aa3ee9499bb5d86eae0.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\javaw.exe JaffaCakes118_7aca9fb59d176aa3ee9499bb5d86eae0.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\ktab.exe JaffaCakes118_7aca9fb59d176aa3ee9499bb5d86eae0.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\bin\unpack200.vir JaffaCakes118_7aca9fb59d176aa3ee9499bb5d86eae0.exe File opened for modification \??\c:\program files (x86)\google\update\googleupdate.exe JaffaCakes118_7aca9fb59d176aa3ee9499bb5d86eae0.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\rmid.exe JaffaCakes118_7aca9fb59d176aa3ee9499bb5d86eae0.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\bin\jp2launcher.vir JaffaCakes118_7aca9fb59d176aa3ee9499bb5d86eae0.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\notification_helper.exe JaffaCakes118_7aca9fb59d176aa3ee9499bb5d86eae0.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\InputPersonalization.exe JaffaCakes118_7aca9fb59d176aa3ee9499bb5d86eae0.exe File created C:\Program Files\DVD Maker\DVDMaker.vir JaffaCakes118_7aca9fb59d176aa3ee9499bb5d86eae0.exe File created C:\Program Files\Internet Explorer\ielowutil.vir JaffaCakes118_7aca9fb59d176aa3ee9499bb5d86eae0.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\bin\javacpl.vir JaffaCakes118_7aca9fb59d176aa3ee9499bb5d86eae0.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\ConvertInkStore.vir JaffaCakes118_7aca9fb59d176aa3ee9499bb5d86eae0.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\rmic.exe JaffaCakes118_7aca9fb59d176aa3ee9499bb5d86eae0.exe File created C:\Program Files\Java\jdk1.7.0_80\bin\java.vir JaffaCakes118_7aca9fb59d176aa3ee9499bb5d86eae0.exe File created C:\Program Files\Java\jdk1.7.0_80\bin\javaw.vir JaffaCakes118_7aca9fb59d176aa3ee9499bb5d86eae0.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jmc.exe JaffaCakes118_7aca9fb59d176aa3ee9499bb5d86eae0.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\schemagen.exe JaffaCakes118_7aca9fb59d176aa3ee9499bb5d86eae0.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\wsgen.exe JaffaCakes118_7aca9fb59d176aa3ee9499bb5d86eae0.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\jp2launcher.exe JaffaCakes118_7aca9fb59d176aa3ee9499bb5d86eae0.exe File opened for modification C:\Program Files\7-Zip\7z.exe JaffaCakes118_7aca9fb59d176aa3ee9499bb5d86eae0.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\orbd.exe JaffaCakes118_7aca9fb59d176aa3ee9499bb5d86eae0.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\java-rmi.exe JaffaCakes118_7aca9fb59d176aa3ee9499bb5d86eae0.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\javaws.exe JaffaCakes118_7aca9fb59d176aa3ee9499bb5d86eae0.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe JaffaCakes118_7aca9fb59d176aa3ee9499bb5d86eae0.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\servertool.exe JaffaCakes118_7aca9fb59d176aa3ee9499bb5d86eae0.exe File opened for modification C:\Program Files\Internet Explorer\iediagcmd.exe JaffaCakes118_7aca9fb59d176aa3ee9499bb5d86eae0.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\TabTip.exe JaffaCakes118_7aca9fb59d176aa3ee9499bb5d86eae0.exe File opened for modification C:\Program Files\DVD Maker\DVDMaker.exe JaffaCakes118_7aca9fb59d176aa3ee9499bb5d86eae0.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javafxpackager.exe JaffaCakes118_7aca9fb59d176aa3ee9499bb5d86eae0.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jcmd.exe JaffaCakes118_7aca9fb59d176aa3ee9499bb5d86eae0.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\bin\ssvagent.vir JaffaCakes118_7aca9fb59d176aa3ee9499bb5d86eae0.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\InputPersonalization.vir JaffaCakes118_7aca9fb59d176aa3ee9499bb5d86eae0.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\TabTip.vir JaffaCakes118_7aca9fb59d176aa3ee9499bb5d86eae0.exe File opened for modification C:\Program Files\Internet Explorer\ieinstal.exe JaffaCakes118_7aca9fb59d176aa3ee9499bb5d86eae0.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\rmiregistry.exe JaffaCakes118_7aca9fb59d176aa3ee9499bb5d86eae0.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\jabswitch.exe JaffaCakes118_7aca9fb59d176aa3ee9499bb5d86eae0.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\javacpl.exe JaffaCakes118_7aca9fb59d176aa3ee9499bb5d86eae0.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\klist.exe JaffaCakes118_7aca9fb59d176aa3ee9499bb5d86eae0.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\servertool.exe JaffaCakes118_7aca9fb59d176aa3ee9499bb5d86eae0.exe File created \??\c:\program files (x86)\microsoft office\office14\groove.vir JaffaCakes118_7aca9fb59d176aa3ee9499bb5d86eae0.exe File created C:\Program Files\7-Zip\7zG.vir JaffaCakes118_7aca9fb59d176aa3ee9499bb5d86eae0.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jhat.exe JaffaCakes118_7aca9fb59d176aa3ee9499bb5d86eae0.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File created C:\Windows\assembly\GACLock.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\index156.dat mscorsvw.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\ngen_service.log mscorsvw.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ngen_service.log mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index14d.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\Temp\ZAP8585.tmp\Microsoft.VisualStudio.Tools.Office.HostAdapter.v10.0.dll mscorsvw.exe File opened for modification \??\c:\windows\microsoft.net\framework\v4.0.30319\mscorsvw.exe JaffaCakes118_7aca9fb59d176aa3ee9499bb5d86eae0.exe File created C:\Windows\assembly\GACLock.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\Temp\ZAP7E15.tmp\Microsoft.VisualStudio.Tools.Office.Contract.v9.0.dll mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\Temp\ZAP85A.tmp\Microsoft.VisualStudio.Tools.Applications.Adapter.v9.0.dll mscorsvw.exe File created \??\c:\windows\microsoft.net\framework\v4.0.30319\mscorsvw.vir JaffaCakes118_7aca9fb59d176aa3ee9499bb5d86eae0.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index155.dat mscorsvw.exe File created C:\Windows\assembly\GACLock.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\index15d.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index144.dat mscorsvw.exe File created C:\Windows\assembly\GACLock.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index158.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index15b.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\index147.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index14e.dat mscorsvw.exe File created C:\Windows\assembly\GACLock.dat mscorsvw.exe File opened for modification \??\c:\windows\microsoft.net\framework64\v4.0.30319\aspnet_state.exe JaffaCakes118_7aca9fb59d176aa3ee9499bb5d86eae0.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\Temp\ZAP6900.tmp\Microsoft.VisualStudio.Tools.Office.AddInAdapter.v9.0.dll mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index154.dat mscorsvw.exe File created \??\c:\windows\servicing\trustedinstaller.vir JaffaCakes118_7aca9fb59d176aa3ee9499bb5d86eae0.exe File opened for modification \??\c:\windows\servicing\trustedinstaller.exe mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index147.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index147.dat mscorsvw.exe File created C:\Windows\assembly\GACLock.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index146.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index151.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index153.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index155.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index14e.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\Temp\ZAPE2E0.tmp\Microsoft.Office.Tools.Excel.v9.0.dll mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\index15c.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index14d.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index146.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index14c.dat mscorsvw.exe File created C:\Windows\assembly\GACLock.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index153.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index157.dat mscorsvw.exe File created C:\Windows\assembly\GACLock.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index156.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\Temp\ZAPEBD5.tmp\Microsoft.Office.Tools.v9.0.dll mscorsvw.exe File created C:\Windows\assembly\GACLock.dat mscorsvw.exe File opened for modification \??\c:\windows\microsoft.net\framework\v4.0.30319\mscorsvw.exe mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\Temp\ZAP8AA3.tmp\Microsoft.VisualStudio.Tools.Office.Word.HostAdapter.v10.0.dll mscorsvw.exe File created C:\Windows\assembly\GACLock.dat mscorsvw.exe File created C:\Windows\assembly\GACLock.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\index159.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index145.dat mscorsvw.exe File created C:\Windows\assembly\GACLock.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index14b.dat mscorsvw.exe File created C:\Windows\assembly\GACLock.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index15a.dat mscorsvw.exe File created \??\c:\windows\microsoft.net\framework64\v2.0.50727\mscorsvw.vir JaffaCakes118_7aca9fb59d176aa3ee9499bb5d86eae0.exe File created C:\Windows\assembly\ngenlock.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\index145.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index149.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index154.dat mscorsvw.exe File created C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngenservicelock.dat mscorsvw.exe File created C:\Windows\assembly\ngenlock.dat mscorsvw.exe File created C:\Windows\assembly\GACLock.dat mscorsvw.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_7aca9fb59d176aa3ee9499bb5d86eae0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscorsvw.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CRLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\Certificates mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\Certificates mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\Certificates mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CRLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\Certificates mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CRLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CRLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\Certificates mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CRLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\Certificates mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CRLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\Certificates mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\Certificates mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CRLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\Certificates mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CRLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\Certificates mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\Certificates mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\Certificates mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\Certificates mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CRLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing mscorsvw.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CRLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs mscorsvw.exe -
Suspicious behavior: EnumeratesProcesses 26 IoCs
pid Process 2244 mscorsvw.exe 2244 mscorsvw.exe 2244 mscorsvw.exe 2244 mscorsvw.exe 2244 mscorsvw.exe 2244 mscorsvw.exe 2244 mscorsvw.exe 2244 mscorsvw.exe 2244 mscorsvw.exe 2244 mscorsvw.exe 2244 mscorsvw.exe 2244 mscorsvw.exe 2244 mscorsvw.exe 2244 mscorsvw.exe 2244 mscorsvw.exe 2244 mscorsvw.exe 2244 mscorsvw.exe 2244 mscorsvw.exe 2244 mscorsvw.exe 2244 mscorsvw.exe 2244 mscorsvw.exe 2244 mscorsvw.exe 2244 mscorsvw.exe 2244 mscorsvw.exe 2244 mscorsvw.exe 2244 mscorsvw.exe -
Suspicious use of AdjustPrivilegeToken 60 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 1836 JaffaCakes118_7aca9fb59d176aa3ee9499bb5d86eae0.exe Token: SeShutdownPrivilege 2244 mscorsvw.exe Token: SeShutdownPrivilege 2244 mscorsvw.exe Token: SeShutdownPrivilege 2244 mscorsvw.exe Token: SeShutdownPrivilege 2244 mscorsvw.exe Token: SeTakeOwnershipPrivilege 2244 mscorsvw.exe Token: SeShutdownPrivilege 2244 mscorsvw.exe Token: SeShutdownPrivilege 2244 mscorsvw.exe Token: SeShutdownPrivilege 2244 mscorsvw.exe Token: SeShutdownPrivilege 2244 mscorsvw.exe Token: SeShutdownPrivilege 2244 mscorsvw.exe Token: SeShutdownPrivilege 2244 mscorsvw.exe Token: SeShutdownPrivilege 2244 mscorsvw.exe Token: SeShutdownPrivilege 2244 mscorsvw.exe Token: SeShutdownPrivilege 2244 mscorsvw.exe Token: SeShutdownPrivilege 2244 mscorsvw.exe Token: SeShutdownPrivilege 2244 mscorsvw.exe Token: SeShutdownPrivilege 2244 mscorsvw.exe Token: SeShutdownPrivilege 2244 mscorsvw.exe Token: SeShutdownPrivilege 2244 mscorsvw.exe Token: SeShutdownPrivilege 2244 mscorsvw.exe Token: SeShutdownPrivilege 2244 mscorsvw.exe Token: SeShutdownPrivilege 2244 mscorsvw.exe Token: SeShutdownPrivilege 2244 mscorsvw.exe Token: SeShutdownPrivilege 2244 mscorsvw.exe Token: SeShutdownPrivilege 2244 mscorsvw.exe Token: SeShutdownPrivilege 2244 mscorsvw.exe Token: SeShutdownPrivilege 2244 mscorsvw.exe Token: SeShutdownPrivilege 2244 mscorsvw.exe Token: SeShutdownPrivilege 2244 mscorsvw.exe Token: SeShutdownPrivilege 2244 mscorsvw.exe Token: SeShutdownPrivilege 2244 mscorsvw.exe Token: SeShutdownPrivilege 2244 mscorsvw.exe Token: SeShutdownPrivilege 2244 mscorsvw.exe Token: SeShutdownPrivilege 2244 mscorsvw.exe Token: SeShutdownPrivilege 2244 mscorsvw.exe Token: SeShutdownPrivilege 2244 mscorsvw.exe Token: SeShutdownPrivilege 2244 mscorsvw.exe Token: SeShutdownPrivilege 2244 mscorsvw.exe Token: SeShutdownPrivilege 2244 mscorsvw.exe Token: SeShutdownPrivilege 2244 mscorsvw.exe Token: SeShutdownPrivilege 2244 mscorsvw.exe Token: SeShutdownPrivilege 2244 mscorsvw.exe Token: SeShutdownPrivilege 2244 mscorsvw.exe Token: SeShutdownPrivilege 2244 mscorsvw.exe Token: SeShutdownPrivilege 2244 mscorsvw.exe Token: SeShutdownPrivilege 2244 mscorsvw.exe Token: SeShutdownPrivilege 2244 mscorsvw.exe Token: SeShutdownPrivilege 2244 mscorsvw.exe Token: SeShutdownPrivilege 2244 mscorsvw.exe Token: SeShutdownPrivilege 2244 mscorsvw.exe Token: SeShutdownPrivilege 2244 mscorsvw.exe Token: SeShutdownPrivilege 2244 mscorsvw.exe Token: SeShutdownPrivilege 2244 mscorsvw.exe Token: SeShutdownPrivilege 2244 mscorsvw.exe Token: SeShutdownPrivilege 2244 mscorsvw.exe Token: SeShutdownPrivilege 2244 mscorsvw.exe Token: SeShutdownPrivilege 2244 mscorsvw.exe Token: SeShutdownPrivilege 2244 mscorsvw.exe Token: SeShutdownPrivilege 2244 mscorsvw.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1836 JaffaCakes118_7aca9fb59d176aa3ee9499bb5d86eae0.exe 1836 JaffaCakes118_7aca9fb59d176aa3ee9499bb5d86eae0.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2244 wrote to memory of 2672 2244 mscorsvw.exe 38 PID 2244 wrote to memory of 2672 2244 mscorsvw.exe 38 PID 2244 wrote to memory of 2672 2244 mscorsvw.exe 38 PID 2244 wrote to memory of 1796 2244 mscorsvw.exe 39 PID 2244 wrote to memory of 1796 2244 mscorsvw.exe 39 PID 2244 wrote to memory of 1796 2244 mscorsvw.exe 39 PID 2244 wrote to memory of 1656 2244 mscorsvw.exe 40 PID 2244 wrote to memory of 1656 2244 mscorsvw.exe 40 PID 2244 wrote to memory of 1656 2244 mscorsvw.exe 40 PID 2244 wrote to memory of 1272 2244 mscorsvw.exe 41 PID 2244 wrote to memory of 1272 2244 mscorsvw.exe 41 PID 2244 wrote to memory of 1272 2244 mscorsvw.exe 41 PID 2244 wrote to memory of 1372 2244 mscorsvw.exe 42 PID 2244 wrote to memory of 1372 2244 mscorsvw.exe 42 PID 2244 wrote to memory of 1372 2244 mscorsvw.exe 42 PID 2244 wrote to memory of 1812 2244 mscorsvw.exe 43 PID 2244 wrote to memory of 1812 2244 mscorsvw.exe 43 PID 2244 wrote to memory of 1812 2244 mscorsvw.exe 43 PID 2244 wrote to memory of 1084 2244 mscorsvw.exe 44 PID 2244 wrote to memory of 1084 2244 mscorsvw.exe 44 PID 2244 wrote to memory of 1084 2244 mscorsvw.exe 44 PID 2244 wrote to memory of 832 2244 mscorsvw.exe 45 PID 2244 wrote to memory of 832 2244 mscorsvw.exe 45 PID 2244 wrote to memory of 832 2244 mscorsvw.exe 45 PID 2244 wrote to memory of 2904 2244 mscorsvw.exe 46 PID 2244 wrote to memory of 2904 2244 mscorsvw.exe 46 PID 2244 wrote to memory of 2904 2244 mscorsvw.exe 46 PID 2244 wrote to memory of 2476 2244 mscorsvw.exe 47 PID 2244 wrote to memory of 2476 2244 mscorsvw.exe 47 PID 2244 wrote to memory of 2476 2244 mscorsvw.exe 47 PID 2244 wrote to memory of 2932 2244 mscorsvw.exe 48 PID 2244 wrote to memory of 2932 2244 mscorsvw.exe 48 PID 2244 wrote to memory of 2932 2244 mscorsvw.exe 48 PID 2244 wrote to memory of 2860 2244 mscorsvw.exe 49 PID 2244 wrote to memory of 2860 2244 mscorsvw.exe 49 PID 2244 wrote to memory of 2860 2244 mscorsvw.exe 49 PID 2244 wrote to memory of 1920 2244 mscorsvw.exe 50 PID 2244 wrote to memory of 1920 2244 mscorsvw.exe 50 PID 2244 wrote to memory of 1920 2244 mscorsvw.exe 50 PID 2244 wrote to memory of 2668 2244 mscorsvw.exe 51 PID 2244 wrote to memory of 2668 2244 mscorsvw.exe 51 PID 2244 wrote to memory of 2668 2244 mscorsvw.exe 51 PID 2244 wrote to memory of 2848 2244 mscorsvw.exe 52 PID 2244 wrote to memory of 2848 2244 mscorsvw.exe 52 PID 2244 wrote to memory of 2848 2244 mscorsvw.exe 52 PID 2244 wrote to memory of 2748 2244 mscorsvw.exe 53 PID 2244 wrote to memory of 2748 2244 mscorsvw.exe 53 PID 2244 wrote to memory of 2748 2244 mscorsvw.exe 53 PID 2244 wrote to memory of 536 2244 mscorsvw.exe 54 PID 2244 wrote to memory of 536 2244 mscorsvw.exe 54 PID 2244 wrote to memory of 536 2244 mscorsvw.exe 54 PID 2244 wrote to memory of 2096 2244 mscorsvw.exe 55 PID 2244 wrote to memory of 2096 2244 mscorsvw.exe 55 PID 2244 wrote to memory of 2096 2244 mscorsvw.exe 55 PID 2244 wrote to memory of 2368 2244 mscorsvw.exe 56 PID 2244 wrote to memory of 2368 2244 mscorsvw.exe 56 PID 2244 wrote to memory of 2368 2244 mscorsvw.exe 56 PID 2244 wrote to memory of 1116 2244 mscorsvw.exe 57 PID 2244 wrote to memory of 1116 2244 mscorsvw.exe 57 PID 2244 wrote to memory of 1116 2244 mscorsvw.exe 57 PID 2244 wrote to memory of 2636 2244 mscorsvw.exe 58 PID 2244 wrote to memory of 2636 2244 mscorsvw.exe 58 PID 2244 wrote to memory of 2636 2244 mscorsvw.exe 58 PID 2244 wrote to memory of 1648 2244 mscorsvw.exe 59
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7aca9fb59d176aa3ee9499bb5d86eae0.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7aca9fb59d176aa3ee9499bb5d86eae0.exe"1⤵
- Drops Chrome extension
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1836
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2524
-
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3044
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe1⤵
- Executes dropped EXE
PID:2680
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe1⤵
- Executes dropped EXE
- Windows security modification
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 1a8 -InterruptEvent 19c -NGENProcess 198 -Pipe 1a4 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2672
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 254 -InterruptEvent 19c -NGENProcess 198 -Pipe 1a8 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1796
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 154 -InterruptEvent 1cc -NGENProcess 1d4 -Pipe 160 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1656
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 1cc -InterruptEvent 260 -NGENProcess 248 -Pipe 25c -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1272
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 260 -InterruptEvent 264 -NGENProcess 230 -Pipe 258 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1372
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 264 -InterruptEvent 268 -NGENProcess 1d4 -Pipe 24c -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1812
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 268 -InterruptEvent 26c -NGENProcess 248 -Pipe 210 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:1084
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 270 -InterruptEvent 248 -NGENProcess 264 -Pipe 234 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:832
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 248 -InterruptEvent 278 -NGENProcess 26c -Pipe 154 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:2904
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 278 -InterruptEvent 270 -NGENProcess 26c -Pipe 230 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2476
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 270 -InterruptEvent 280 -NGENProcess 264 -Pipe 260 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:2932
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 284 -InterruptEvent 278 -NGENProcess 288 -Pipe 270 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2860
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 278 -InterruptEvent 1d4 -NGENProcess 264 -Pipe 248 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:1920
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 28c -InterruptEvent 284 -NGENProcess 290 -Pipe 278 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2668
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 284 -InterruptEvent 1cc -NGENProcess 264 -Pipe 274 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:2848
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 294 -InterruptEvent 28c -NGENProcess 298 -Pipe 284 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2748
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 28c -InterruptEvent 26c -NGENProcess 264 -Pipe 1d4 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:536
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 26c -InterruptEvent 264 -NGENProcess 294 -Pipe 1cc -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2096
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 264 -InterruptEvent 288 -NGENProcess 298 -Pipe 280 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:2368
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 288 -InterruptEvent 298 -NGENProcess 26c -Pipe 29c -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1116
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 298 -InterruptEvent 2a8 -NGENProcess 294 -Pipe 28c -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2636
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2a8 -InterruptEvent 294 -NGENProcess 288 -Pipe 2a4 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1648
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 294 -InterruptEvent 2b0 -NGENProcess 26c -Pipe 264 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:2456
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2b0 -InterruptEvent 26c -NGENProcess 2a8 -Pipe 2ac -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1560
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 26c -InterruptEvent 2b8 -NGENProcess 288 -Pipe 298 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:1576
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2b8 -InterruptEvent 288 -NGENProcess 2b0 -Pipe 2b4 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:924
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 288 -InterruptEvent 2c0 -NGENProcess 2a8 -Pipe 294 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:2444
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2c0 -InterruptEvent 2a8 -NGENProcess 2b8 -Pipe 2bc -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:880
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2a8 -InterruptEvent 2c8 -NGENProcess 2b0 -Pipe 26c -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:2480
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2c8 -InterruptEvent 2b0 -NGENProcess 2c0 -Pipe 2c4 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2080
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2b0 -InterruptEvent 2d0 -NGENProcess 2b8 -Pipe 288 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:2172
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2d0 -InterruptEvent 2b8 -NGENProcess 2c8 -Pipe 2cc -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2596
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2b8 -InterruptEvent 2e0 -NGENProcess 2c0 -Pipe 2dc -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:2652
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2e0 -InterruptEvent 2c0 -NGENProcess 2d0 -Pipe 2a0 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1088
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2c0 -InterruptEvent 2e8 -NGENProcess 2c8 -Pipe 290 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:2332
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2e8 -InterruptEvent 2c8 -NGENProcess 2e0 -Pipe 2e4 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1700
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2c8 -InterruptEvent 2f0 -NGENProcess 2d0 -Pipe 2b8 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:1992
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2f0 -InterruptEvent 2d0 -NGENProcess 2e8 -Pipe 2ec -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:1312
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2d0 -InterruptEvent 2f8 -NGENProcess 2e0 -Pipe 2c0 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:872
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2fc -InterruptEvent 2f0 -NGENProcess 300 -Pipe 2d0 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1092
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2f0 -InterruptEvent 27c -NGENProcess 2e0 -Pipe 2c8 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1984
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 27c -InterruptEvent 304 -NGENProcess 2f8 -Pipe 2a8 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2924
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 304 -InterruptEvent 308 -NGENProcess 300 -Pipe 2d8 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:2232
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 308 -InterruptEvent 300 -NGENProcess 27c -Pipe 2e0 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:2228
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 300 -InterruptEvent 27c -NGENProcess 2f4 -Pipe 2f8 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2704
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 27c -InterruptEvent 314 -NGENProcess 30c -Pipe 2f0 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:2688
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 314 -InterruptEvent 30c -NGENProcess 300 -Pipe 310 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2624
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 30c -InterruptEvent 31c -NGENProcess 2f4 -Pipe 308 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2896
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 31c -InterruptEvent 320 -NGENProcess 318 -Pipe 2fc -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2632
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 320 -InterruptEvent 324 -NGENProcess 300 -Pipe 27c -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:304
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 324 -InterruptEvent 328 -NGENProcess 2f4 -Pipe 304 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2652
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 328 -InterruptEvent 32c -NGENProcess 318 -Pipe 314 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:316
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 32c -InterruptEvent 330 -NGENProcess 300 -Pipe 30c -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1664
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 330 -InterruptEvent 334 -NGENProcess 2f4 -Pipe 31c -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2116
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 334 -InterruptEvent 33c -NGENProcess 318 -Pipe 320 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1148
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 33c -InterruptEvent 338 -NGENProcess 300 -Pipe 324 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:3008
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 338 -InterruptEvent 340 -NGENProcess 2f4 -Pipe 328 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2448
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 340 -InterruptEvent 344 -NGENProcess 318 -Pipe 32c -Comment "NGen Worker Process"2⤵PID:1596
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 344 -InterruptEvent 348 -NGENProcess 300 -Pipe 330 -Comment "NGen Worker Process"2⤵PID:2000
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 348 -InterruptEvent 34c -NGENProcess 2f4 -Pipe 334 -Comment "NGen Worker Process"2⤵PID:1640
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 33c -InterruptEvent 344 -NGENProcess 350 -Pipe 348 -Comment "NGen Worker Process"2⤵PID:1796
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 344 -InterruptEvent 338 -NGENProcess 2f4 -Pipe 2e8 -Comment "NGen Worker Process"2⤵PID:1628
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 338 -InterruptEvent 354 -NGENProcess 34c -Pipe 300 -Comment "NGen Worker Process"2⤵PID:2488
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 354 -InterruptEvent 358 -NGENProcess 350 -Pipe 2d4 -Comment "NGen Worker Process"2⤵PID:1264
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 358 -InterruptEvent 35c -NGENProcess 2f4 -Pipe 318 -Comment "NGen Worker Process"2⤵PID:2512
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 35c -InterruptEvent 360 -NGENProcess 34c -Pipe 33c -Comment "NGen Worker Process"2⤵PID:348
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 360 -InterruptEvent 364 -NGENProcess 350 -Pipe 344 -Comment "NGen Worker Process"2⤵PID:1680
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 364 -InterruptEvent 368 -NGENProcess 2f4 -Pipe 338 -Comment "NGen Worker Process"2⤵PID:1984
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 368 -InterruptEvent 36c -NGENProcess 34c -Pipe 354 -Comment "NGen Worker Process"2⤵PID:2156
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 36c -InterruptEvent 370 -NGENProcess 350 -Pipe 358 -Comment "NGen Worker Process"2⤵
- Loads dropped DLL
- Drops file in Windows directory
PID:2976
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 370 -InterruptEvent 350 -NGENProcess 368 -Pipe 2f4 -Comment "NGen Worker Process"2⤵PID:1592
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 350 -InterruptEvent 378 -NGENProcess 34c -Pipe 360 -Comment "NGen Worker Process"2⤵PID:1940
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 378 -InterruptEvent 37c -NGENProcess 374 -Pipe 364 -Comment "NGen Worker Process"2⤵PID:1472
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 380 -InterruptEvent 37c -NGENProcess 378 -Pipe 368 -Comment "NGen Worker Process"2⤵PID:1512
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 37c -InterruptEvent 36c -NGENProcess 374 -Pipe 35c -Comment "NGen Worker Process"2⤵PID:2620
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 36c -InterruptEvent 388 -NGENProcess 350 -Pipe 340 -Comment "NGen Worker Process"2⤵PID:2836
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 388 -InterruptEvent 38c -NGENProcess 378 -Pipe 384 -Comment "NGen Worker Process"2⤵PID:2452
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 38c -InterruptEvent 390 -NGENProcess 374 -Pipe 370 -Comment "NGen Worker Process"2⤵PID:2628
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 390 -InterruptEvent 394 -NGENProcess 350 -Pipe 380 -Comment "NGen Worker Process"2⤵PID:2240
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 394 -InterruptEvent 398 -NGENProcess 378 -Pipe 37c -Comment "NGen Worker Process"2⤵PID:1952
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 398 -InterruptEvent 39c -NGENProcess 374 -Pipe 36c -Comment "NGen Worker Process"2⤵PID:2160
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 39c -InterruptEvent 3a0 -NGENProcess 350 -Pipe 388 -Comment "NGen Worker Process"2⤵PID:620
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 3a0 -InterruptEvent 3a4 -NGENProcess 378 -Pipe 38c -Comment "NGen Worker Process"2⤵PID:2876
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 3a4 -InterruptEvent 3a8 -NGENProcess 374 -Pipe 390 -Comment "NGen Worker Process"2⤵PID:1996
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 3a8 -InterruptEvent 3ac -NGENProcess 350 -Pipe 394 -Comment "NGen Worker Process"2⤵PID:3012
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 3ac -InterruptEvent 3b0 -NGENProcess 378 -Pipe 398 -Comment "NGen Worker Process"2⤵PID:1304
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 3b0 -InterruptEvent 3b4 -NGENProcess 374 -Pipe 39c -Comment "NGen Worker Process"2⤵PID:2920
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 3b4 -InterruptEvent 3b8 -NGENProcess 350 -Pipe 3a0 -Comment "NGen Worker Process"2⤵PID:2432
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 3b8 -InterruptEvent 3bc -NGENProcess 378 -Pipe 3a4 -Comment "NGen Worker Process"2⤵PID:2252
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 3bc -InterruptEvent 3c0 -NGENProcess 374 -Pipe 3a8 -Comment "NGen Worker Process"2⤵PID:804
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 3c0 -InterruptEvent 3c4 -NGENProcess 350 -Pipe 3ac -Comment "NGen Worker Process"2⤵PID:2904
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 3c4 -InterruptEvent 378 -NGENProcess 3c8 -Pipe 3b0 -Comment "NGen Worker Process"2⤵PID:1520
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 378 -InterruptEvent 3cc -NGENProcess 374 -Pipe 3b4 -Comment "NGen Worker Process"2⤵PID:1684
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 3b8 -InterruptEvent 3c4 -NGENProcess 3d0 -Pipe 378 -Comment "NGen Worker Process"2⤵PID:2200
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 3c4 -InterruptEvent 3bc -NGENProcess 374 -Pipe 34c -Comment "NGen Worker Process"2⤵PID:2660
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 3c8 -InterruptEvent 3b8 -NGENProcess 3d4 -Pipe 3c4 -Comment "NGen Worker Process"2⤵PID:1184
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 3b8 -InterruptEvent 2b0 -NGENProcess 374 -Pipe 3c0 -Comment "NGen Worker Process"2⤵PID:1916
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2b0 -InterruptEvent 3d8 -NGENProcess 3bc -Pipe 3d0 -Comment "NGen Worker Process"2⤵PID:1984
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 3d8 -InterruptEvent 3dc -NGENProcess 3d4 -Pipe 204 -Comment "NGen Worker Process"2⤵PID:1476
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 3dc -InterruptEvent 3e0 -NGENProcess 374 -Pipe 3cc -Comment "NGen Worker Process"2⤵
- Modifies data under HKEY_USERS
PID:2088
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 3e0 -InterruptEvent 3e4 -NGENProcess 3bc -Pipe 3c8 -Comment "NGen Worker Process"2⤵
- Loads dropped DLL
- Drops file in Windows directory
- Modifies data under HKEY_USERS
PID:2988
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 3e4 -InterruptEvent 3bc -NGENProcess 3dc -Pipe 3d4 -Comment "NGen Worker Process"2⤵
- Modifies data under HKEY_USERS
PID:2848
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 3bc -InterruptEvent 3ec -NGENProcess 374 -Pipe 2b0 -Comment "NGen Worker Process"2⤵
- Loads dropped DLL
- Drops file in Windows directory
- Modifies data under HKEY_USERS
PID:2884
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 3ec -InterruptEvent 374 -NGENProcess 3e4 -Pipe 3e8 -Comment "NGen Worker Process"2⤵
- Modifies data under HKEY_USERS
PID:2336
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 374 -InterruptEvent 3f4 -NGENProcess 3dc -Pipe 3e0 -Comment "NGen Worker Process"2⤵
- Loads dropped DLL
- Drops file in Windows directory
- Modifies data under HKEY_USERS
PID:1960
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 3f4 -InterruptEvent 3dc -NGENProcess 3ec -Pipe 3f0 -Comment "NGen Worker Process"2⤵PID:1552
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 3dc -InterruptEvent 3fc -NGENProcess 3e4 -Pipe 3bc -Comment "NGen Worker Process"2⤵
- Loads dropped DLL
- Drops file in Windows directory
PID:2176
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 3fc -InterruptEvent 3e4 -NGENProcess 3f4 -Pipe 3f8 -Comment "NGen Worker Process"2⤵
- Modifies data under HKEY_USERS
PID:1804
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 3e4 -InterruptEvent 408 -NGENProcess 3ec -Pipe 374 -Comment "NGen Worker Process"2⤵
- Loads dropped DLL
- Drops file in Windows directory
- Modifies data under HKEY_USERS
PID:2772
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 408 -InterruptEvent 3ec -NGENProcess 3fc -Pipe 404 -Comment "NGen Worker Process"2⤵PID:1312
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 3ec -InterruptEvent 410 -NGENProcess 3f4 -Pipe 3dc -Comment "NGen Worker Process"2⤵PID:760
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 410 -InterruptEvent 414 -NGENProcess 40c -Pipe 3d8 -Comment "NGen Worker Process"2⤵PID:2768
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 414 -InterruptEvent 418 -NGENProcess 3fc -Pipe 3e4 -Comment "NGen Worker Process"2⤵PID:480
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 418 -InterruptEvent 41c -NGENProcess 3f4 -Pipe 3b8 -Comment "NGen Worker Process"2⤵PID:2044
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 408 -InterruptEvent 414 -NGENProcess 420 -Pipe 418 -Comment "NGen Worker Process"2⤵PID:2064
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 414 -InterruptEvent 3ec -NGENProcess 3f4 -Pipe 350 -Comment "NGen Worker Process"2⤵PID:688
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 3ec -InterruptEvent 424 -NGENProcess 41c -Pipe 3fc -Comment "NGen Worker Process"2⤵PID:2732
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 424 -InterruptEvent 428 -NGENProcess 420 -Pipe 250 -Comment "NGen Worker Process"2⤵PID:2796
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 428 -InterruptEvent 42c -NGENProcess 3f4 -Pipe 40c -Comment "NGen Worker Process"2⤵PID:2936
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 42c -InterruptEvent 438 -NGENProcess 41c -Pipe 434 -Comment "NGen Worker Process"2⤵PID:1384
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 438 -InterruptEvent 43c -NGENProcess 414 -Pipe 430 -Comment "NGen Worker Process"2⤵PID:2852
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 43c -InterruptEvent 440 -NGENProcess 3f4 -Pipe 410 -Comment "NGen Worker Process"2⤵PID:1472
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 440 -InterruptEvent 444 -NGENProcess 41c -Pipe 424 -Comment "NGen Worker Process"2⤵PID:2264
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 444 -InterruptEvent 448 -NGENProcess 414 -Pipe 428 -Comment "NGen Worker Process"2⤵PID:2848
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 448 -InterruptEvent 44c -NGENProcess 3f4 -Pipe 42c -Comment "NGen Worker Process"2⤵PID:2020
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 44c -InterruptEvent 450 -NGENProcess 41c -Pipe 438 -Comment "NGen Worker Process"2⤵PID:1956
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 450 -InterruptEvent 454 -NGENProcess 414 -Pipe 43c -Comment "NGen Worker Process"2⤵PID:2884
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 454 -InterruptEvent 458 -NGENProcess 3f4 -Pipe 440 -Comment "NGen Worker Process"2⤵PID:1644
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 458 -InterruptEvent 45c -NGENProcess 41c -Pipe 444 -Comment "NGen Worker Process"2⤵
- Loads dropped DLL
- Drops file in Windows directory
PID:2652
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 45c -InterruptEvent 41c -NGENProcess 454 -Pipe 414 -Comment "NGen Worker Process"2⤵PID:1508
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 41c -InterruptEvent 464 -NGENProcess 3f4 -Pipe 44c -Comment "NGen Worker Process"2⤵PID:1968
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵
- Executes dropped EXE
PID:2640
-
C:\Windows\system32\IEEtwCollector.exeC:\Windows\system32\IEEtwCollector.exe /V1⤵
- Executes dropped EXE
PID:1676
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
636KB
MD52551f83b923307afc51ca0142adbdbda
SHA1c0372a2c664ad464fc7ea5ddda8b072d04eb4713
SHA256e84bbd69e1ed34d0d1e506f3c88c05ae4f4c7f7c153722121e36d03d79a85f26
SHA51204e09d38512a3639b8e2344b499fef160d6307a830ea8253a16a7b9a5e0f1af0e077327f12f0ee4da10350b8eaaa07fe08068f319ca4dbb4c015a9e57a289cce
-
Filesize
1.5MB
MD55fc580fcf64f9510d6410b98902ace18
SHA13461740df2591863d3083929109d6241b5331d25
SHA2566cb0a6736706befea737186f27f7a215f051cf71ba4e9895cea3df750e21c068
SHA512c128a8cc8243121c2ca46fabb4c9a8b899d45e94bce1c6406f507dfa200046a6b8cd8e2ce7347d48936484092b975226ddfe9e0015743faf1ceb7c45eb61276b
-
Filesize
4.8MB
MD5275c68ad84cbcac6cf14911ebbde580f
SHA17a90dcd127b274b6f926498a79b5efb9e11528d0
SHA2561be5b117924dad202c7e5e2ad213f8bde90aeb9770ba4f9a10ae5c14e8d7f77f
SHA512a9b61c90c39ef8acc50ce39298d15cbceaea6ce935a7e90d72895311693cc2db10a3327e33ca4191de175d028f8ffbffd89d402b722f4141eb35f3e45439341e
-
Filesize
1.2MB
MD5d4afccc31bf2d255148cbf744dfc1583
SHA1ac4088c7d48b682f9f57cc2192c85f5bfd6afa06
SHA25624fc3d54e1ed2ffc95777bee65648c9a30bf4f7e454adad63115b7c9d404066c
SHA512900b6441c814e905942df4de202c72752206887c160d7e3ef6422ad9460e731edbf624e3b6ff61add2e9c58d63ae53c027445b8e6436cea1e3bac30ca048224a
-
Filesize
872KB
MD5f5e119aeef87401c7de0dc0b0d254fd0
SHA1cc2cc86ed466990b322af143acf47fd70cf5e46e
SHA256582a6010ce90cb19b078831c240de3d45897339bf99b712e3cd38661920e5888
SHA51256523370844087ccc29ccc6ab2bb2a96b5366a14e860b2fc4c95367d79d5c216b6c35cd6b489ba318bcb5e88f959b44d9acf88a285599987cf2b445e79fb3cce
-
Filesize
606KB
MD56305583ee62acd4dea5e2420aaa017b2
SHA17ced92766382005396d4316a59e3ac25ba6489a2
SHA256aadcc88a171b6b1d24ff93acfa9a7c372ce70f249f261faf10035bdabbf445f5
SHA51202d34a280c138c9271450198abea96a280a1f242ad97aea185010354d3f3c6d1e57de0a2a17ff41ef20cabf2a2f96a62870bf3b460fa6cbbb1dce0a1f831afd9
-
Filesize
4KB
MD5c55f38f077b00203350e302afb96d27d
SHA17287d67b776dd9ce512f1e3082a84b57620e6382
SHA256041412d3f76cbf06883e22a586f631eea35e2ebea6dd8b0704c4c9338c535e22
SHA5120d13f648c09023cc108278804d8d21ccb31d92980c634475c2fcb89f2885f7dae76c2983904fe37e6bfff7e7a6dc184726cb0b4921c1485cc123f48b54dcc9cd
-
Filesize
555KB
MD5013acda3cef61bdb233ab2e08a732d6f
SHA12100757923b50fe7118eb63b2154a8df6946375b
SHA2569a3920f267894d42d48ec4a9c8aa6c4a5dcaf7c5b246949f147368bbd50de635
SHA51261e72399754c0652a1f3e6f67c425d8381ee4cf6a38bb87fe9b65f2e8b099d36fce44c13113647b1e27a78d2c5ed2a775d14b25051970cf98cf70a166982475d
-
Filesize
1003KB
MD5b1815822707ab106e0268675df036f88
SHA167b64dfc7eccf20b55d090a952ad62a9c19cb1c7
SHA2560fc1c015f7190848f19e34239f4b82c47d523915e07649007c0ea60e05ba3ed8
SHA5123a0f743ca91699f9559bf899883b7869f2b07d5a5eeeac299c273ca29dfedf96c68ab56485623f80558a98ea585e9d04db863726b7ff77bec34a2fa6d03b2971
-
Filesize
586KB
MD5af7992b2c3d2b7c46578688cc91ed2c2
SHA11d3599805ac11ebddaba92634f69b174f5f21c31
SHA256e2af24557c3edf8d352517458f2081bf2d382cdc6493cc0114a6931f1efef65b
SHA512eab6f39ecfad0a7bceb15ef980fc685c004c1b025506974b352f1fc2d93e3321d03d3e048699fd68db253015a673ec918794fac0bc0bc7a5ccd256ed41733ea3
-
Filesize
29KB
MD5d59a6b36c5a94916241a3ead50222b6f
SHA1e274e9486d318c383bc4b9812844ba56f0cff3c6
SHA256a38d01d3f024e626d579cf052ac3bd4260bb00c34bc6085977a5f4135ab09b53
SHA51217012307955fef045e7c13bf0613bd40df27c29778ba6572640b76c18d379e02dc478e855c9276737363d0ad09b9a94f2adaa85da9c77ebb3c2d427aa68e2489
-
Filesize
81KB
MD5b13f51572f55a2d31ed9f266d581e9ea
SHA17eef3111b878e159e520f34410ad87adecf0ca92
SHA256725980edc240c928bec5a5f743fdabeee1692144da7091cf836dc7d0997cef15
SHA512f437202723b2817f2fef64b53d4eb67f782bdc61884c0c1890b46deca7ca63313ee2ad093428481f94edfcecd9c77da6e72b604998f7d551af959dbd6915809c
-
C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft-Windows-H#\a46df77acafec60e31859608625e6354\Microsoft-Windows-HomeGroupDiagnostic.NetListMgr.Interop.ni.dll
Filesize105KB
MD5d9c0055c0c93a681947027f5282d5dcd
SHA19bd104f4d6bd68d09ae2a55b1ffc30673850780f
SHA256dc7eb30a161a2f747238c8621adb963b50227a596d802b5f9110650357f7f7ed
SHA5125404050caa320cdb48a6ccd34282c12788ee8db4e00397dde936cee00e297e9e438dcaa5fcb4e92525f167637b500db074ac91971d4730d222ac4713a3e7b930
-
C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft.Office.To#\11940d5133d63001fa4499c315655e15\Microsoft.Office.Tools.Word.v9.0.ni.dll
Filesize1.1MB
MD57835e60e560a49049ae728698da3d301
SHA187b357b1b3c9a2ad2f3b89b10a42af021ab76afe
SHA256df34cbc18c66aa387324c45196d71ebe7c91a83fbbdc91766f9f47330a0cb2fa
SHA512b95c33a2746a331e4416f7449c8ab613ba16c716a449e446d825f34dfaf754ea7562bf77cf5a73a78599e0b67a3a697437baa9aa516e40e06981693c8ea5b993
-
C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft.Office.To#\6337d25ea4dd40045a047cb662ee4394\Microsoft.Office.Tools.Outlook.v9.0.ni.dll
Filesize238KB
MD50a4ed78b7995d94fa42379f84cd5f8e9
SHA190ba188fe0ebd38ad225e7ce3a24dd9b6b68056b
SHA2560a75d0d332692cc36d539abdd36f3ff5ef2ab786a9404548ca6c98fd566c4d86
SHA51286ac346de836aa6dd7e017ff4329803c9165758dcfe3aa1881e46ca73e15e6cdb269fcc5b082d717774666f9bc40051a47b5261bfe73901804eb4b0bfacd1184
-
C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft.Office.To#\dc8ba97b4a8deefeb1efac60e1bdb693\Microsoft.Office.Tools.Excel.v9.0.ni.dll
Filesize1.8MB
MD59958f23efa2a86f8195f11054f94189a
SHA178ec93b44569ea7ebce452765568da5c73511931
SHA2563235e629454949220524dd976bec494f7cc4c9abeaf3ee63fc430cbe4fbcf7b6
SHA5123061f8de0abf4b2b37fbc5b930663414499fb6127e2892fe0a0f3dfba6da3927e6caa7bcba31d05faee717d271ecf277607070452701a140dc7d3d4b8d0bfeb1
-
C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft.Office.To#\dd4deeafd891c39e6eb4a2daaafa9124\Microsoft.Office.Tools.Common.v9.0.ni.dll
Filesize1.0MB
MD5598a06ea8f1611a24f86bc0bef0f547e
SHA15a4401a54aa6cd5d8fd883702467879fb5823e37
SHA256e55484d4fe504e02cc49fde33622d1a00cdae29266775dcb7c850203d5ed2512
SHA512774e6facd3c56d1c700d9f97ee2e678d06b17e0493e8dc347be22bcba361bd6225caef702e53f0b08cacc9e6a4c4556280b43d96c928642266286f4dec8b5570
-
C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft.VisualStu#\077a55be734d6ef6e2de59fa7325dac5\Microsoft.VisualStudio.Tools.Office.Contract.v9.0.ni.dll
Filesize205KB
MD50a41e63195a60814fe770be368b4992f
SHA1d826fd4e4d1c9256abd6c59ce8adb6074958a3e7
SHA2564a8ccb522a4076bcd5f217437c195b43914ea26da18096695ee689355e2740e1
SHA5121c916165eb5a2e30d4c6a67f2023ab5df4e393e22d9d8123aa5b9b8522fdb5dfe539bcb772a6e55219b23d865ee1438d066e78f0cb138a4a61cc2a1cecf54728
-
C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft.VisualStu#\21f274f8ea54315a8ca96e534035b03c\Microsoft.VisualStudio.Tools.Office.Word.HostAdapter.v10.0.ni.dll
Filesize305KB
MD5e74a028997c64d8f8ad78cb3696f7147
SHA197fca5a9ac828dd41a4859e1bdde5eada06c84ff
SHA2566cfce93b51ac690c674881a04013c74c204135dfcc5d69e1d86d23fd9de2cbcf
SHA512c47b86f312d710a23254a75d22f656b79de3fc69160cc1ec6f936b6a4b3e34a096777f221201a99503f144103b3b425046e81ee49f6207a5a821b7a07757e268
-
C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft.VisualStu#\2951791a1aa22719b6fdcb816f7e6c04\Microsoft.VisualStudio.Tools.Office.Contract.v10.0.ni.dll
Filesize43KB
MD568c51bcdc03e97a119431061273f045a
SHA16ecba97b7be73bf465adf3aa1d6798fedcc1e435
SHA2564a3aa6bd2a02778759886aaa884d1e8e4a089a1e0578c973fcb4fc885901ebaf
SHA512d71d6275c6f389f6b7becb54cb489da149f614454ae739e95c33a32ed805820bef14c98724882c4ebb51b4705f41b3cdb5a8ed134411011087774cac6e9d23e8
-
C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft.VisualStu#\369a81b278211f8d96a305e918172713\Microsoft.VisualStudio.Tools.Applications.Runtime.v9.0.ni.dll
Filesize198KB
MD59d9305a1998234e5a8f7047e1d8c0efe
SHA1ba7e589d4943cd4fc9f26c55e83c77559e7337a8
SHA256469ff9727392795925c7fe5625afcf508ba07e145c7940e4a12dbd6f14afc268
SHA51258b8cc718ae1a72a9d596f7779aeb0d5492a19e5d668828fd6cff1aa37181cc62878799b4c97beec9c71c67a0c215162ff544b2417f6017cd892a1ce64f7878c
-
C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft.VisualStu#\585e8f83eff436c8156f071e8f2bdaa0\Microsoft.VisualStudio.Tools.Applications.Adapter.v9.0.ni.dll
Filesize1.8MB
MD504a6857c04546270358d14398fde209e
SHA1596a3e11ac6c303c679edfd6c30aa71e8eaf8a23
SHA2568eb8d5e0c2097d6fdae4b58cfde3e1be1dd6e59968891ac6d11efe8adf227285
SHA5124e8bfd6bf9463a004c17a897026bcc1b4edb0764c7e959f09a744d395e9885b24f8e869b78896218ce930562796a3a8e3a7f0a59ba11c8dfa32b0908c5706b22
-
C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft.VisualStu#\6e100177db1ef25970ca4a9eba03c352\Microsoft.VisualStudio.Tools.Applications.Contract.v9.0.ni.dll
Filesize70KB
MD557b601497b76f8cd4f0486d8c8bf918e
SHA1da797c446d4ca5a328f6322219f14efe90a5be54
SHA2561380d349abb6d461254118591637c8198859d8aadfdb098b8d532fdc4d776e2d
SHA5121347793a9dbff305975f4717afa9ee56443bc48586d35a64e8a375535fa9e0f6333e13c2267d5dbb7fe868aa863b23034a2e655dcd68b59dca75f17a4cbc1850
-
C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft.VisualStu#\867e932f89f8d4baf58b1e7219c9752f\Microsoft.VisualStudio.Tools.Office.Excel.HostAdapter.v10.0.ni.dll
Filesize271KB
MD51c2083478b6a86290b857a8038333bc6
SHA13e1e22c3a428c6aca81e2316a387acc0b6870a39
SHA2568ced8dc9c2b01d6d09b15e42070a8f7a1e704fe98c9a1cc4fb3ea4651a6718f9
SHA5128b320fa68ba8e8d203da20bc7e7e40aadea12774d0ea5089cbec7f254d7e7b5c77e02aa6480091b6451ae6aeef72cd01a51b645b86a21af4c65d1ebfb5d5121b
-
C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft.VisualStu#\9e076728e51ab285a8bc0f0b0a226e2c\Microsoft.VisualStudio.Tools.Applications.HostAdapter.v10.0.ni.dll
Filesize82KB
MD52eeeff61d87428ae7a2e651822adfdc4
SHA166f3811045a785626e6e1ea7bab7e42262f4c4c1
SHA25637f2ee9f8794df6d51a678c62b4838463a724fdf1bd65277cd41feaf2e6c9047
SHA512cadf3a04aa6dc2b6b781c292d73e195be5032b755616f4b49c6bdde8b3ae297519fc255b0a46280b60aaf45d4dedb9b828d33f1400792b87074f01bbab19e41a
-
C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft.VisualStu#\a0579239d3772a518145f4fb46674f8d\Microsoft.VisualStudio.Tools.Office.Outlook.HostAdapter.v10.0.ni.dll
Filesize122KB
MD5c581c33809d3dcd6cf8bc8524476b1c2
SHA13f3cd499b6477feadc5518e480658dfbdd12ff65
SHA2560c07c36172d8c388fcd13c0d4d47cfcaa049250e3fe7c2994d475a9ec02868ab
SHA512e66a17b45532c9dfb67f1b0e8f07ea3503c4577c4a2f8301f5a4a681019eae4bd65bf97180658cae778ff1126d290dc043ce43fb1eda2d6fc3f66d22b0f5c671
-
C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft.VisualStu#\fdbd6e8a0227fb4818339a309440c708\Microsoft.VisualStudio.Tools.Office.HostAdapter.v10.0.ni.dll
Filesize221KB
MD5df69d69529f728420175efa1932bc4c9
SHA11a77418a5ad481de19395035a227e9bf1eae0a39
SHA256fa36057e8aba319f1f349c297c03614d2c8d6116cb29fe05840236fd7819d995
SHA512d8ea275a8499dc6984a02e47c6abc594776b7b849e15bb8e340cf47e730f90922b05485e5a7432e9d7bc0608e8470ddb1f2107c6979060386ce4a646a6c4bfa7
-
C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft.VisualStu#\fe8d06712eb58d0150803744020b072a\Microsoft.VisualStudio.Tools.Applications.Contract.v10.0.ni.dll
Filesize43KB
MD5dd1dfa421035fdfb6fd96d301a8c3d96
SHA1d535030ad8d53d57f45bc14c7c7b69efd929efb3
SHA256f71293fe6cf29af54d61bd2070df0a5ff17a661baf1b0b6c1d3393fd23ccd30c
SHA5128e0f2bee9801a4eba974132811d7274e52e6e17ccd60e8b3f74959994f007bdb0c60eb9facb6321c0fdfbcc44e9a77d8c5c776d998ccce256fa864338a6f63b1
-
C:\Windows\assembly\NativeImages_v2.0.50727_64\ehiActivScp\ee22f412f6314443add3ca412afd6569\ehiActivScp.ni.dll
Filesize124KB
MD5929653b5b019b4555b25d55e6bf9987b
SHA1993844805819ee445ff8136ee38c1aee70de3180
SHA2562766353ca5c6a87169474692562282005905f1ca82eaa08e08223fc084dbb9a2
SHA512effc809cca6170575efa7b4b23af9c49712ee9a7aaffd8f3a954c2d293be5be2cf3c388df4af2043f82b9b2ea041acdbb9d7ddd99a2fc744cce95cf4d820d013
-
C:\Windows\assembly\NativeImages_v2.0.50727_64\ehiVidCtl\11d57f5c033326954c0bc4f0b2680812\ehiVidCtl.ni.dll
Filesize2.1MB
MD510b5a285eafccdd35390bb49861657e7
SHA162c05a4380e68418463529298058f3d2de19660d
SHA2565f3bb3296ab50050e6b4ea7e95caa937720689db735c70309e5603a778be3a9a
SHA51219ff9ac75f80814ed5124adc25fc2a6d1d7b825c770e1edb8f5b6990e44f9d2d0c1c0ed75b984e729709d603350055e5a543993a80033367810c417864df1452
-
C:\Windows\assembly\NativeImages_v2.0.50727_64\stdole\70f1aed4a280583cbd09e0f5d9bbc1f5\stdole.ni.dll
Filesize88KB
MD51f394b5ca6924de6d9dbfb0e90ea50ef
SHA14e2caa5e98531c6fbf5728f4ae4d90a1ad150920
SHA2569db0e4933b95ad289129c91cd9e14a0c530f42b55e8c92dc8c881bc3dd40b998
SHA512e27ea0f7b59d41a85547d607ae3c05f32ce19fa5d008c8eaf11d0c253a73af3cfa6df25e3ee7f3920cd775e1a3a2db934e5891b4aafd4270d65a727b439f7476
-
Filesize
636KB
MD5aa039a31ae75332a41add667ec626a9d
SHA112f5e01cb4f2e3a793888f46cc5b7bcb46e23f8a
SHA256889a136ad4330f9a2ca517af27e31d325239703413204cd3658fbf672d1b006a
SHA5121dedfaef4c531482dee835cbe330cc5ef452a1d165656e126d0d27153235c9668a97f8eab56ab2d41d6e28a13ab9286c76d30cf6d74ba2ac1a909d34243f43af
-
Filesize
30.0MB
MD586166127ede6c0e3941bc2e795d80951
SHA1a4004018a0bc36fc4582c5d4b1b38a28a146ee77
SHA256065f40ac1d741aec6e5a78bdcccb3f52e19e12d372c252957a9c1300d9664d28
SHA512c256840d9cf6f370da384ca55afdfd6b814f875ea5380b160716a19c87a7041b20b6435c54f55dce13dc72ff7d8516028537f1b15db6e8568d8b75f8aefb1daf
-
Filesize
711KB
MD530f6f9747b1aaae143569a83a6b9f0bc
SHA1692f16e0cba87b0c21dc705cdcde4401dd508a03
SHA25646aacafb0e0a77a51c9cb1fd4faf41b29e914aaf062187b7e1419f21c647ca3d
SHA5126c9a19d1ef79b5df2d1fd5e2332651623e26e9e29e87274bbf41e63d71b15918432e81e4bfa548ca2ee597d2b753a30261217bc48cd2ed8417309b31994cb801
-
Filesize
620KB
MD5243a5435abeb21918b1323e2165b06e4
SHA1f755651798931b5c45c2b354b639a9a7b9ee7500
SHA256b14edaea04a7a050f39a3128624f0a4c886bd1883869cee4a2178572a36b9280
SHA5127f4beaaea413cf7c55bd46ef56ff95fac004e8d6b2cf067124ee140d61df5c622f9f411d8bea6cc2c65a053d52ab194e6812bc0972904661118d0b0a346a66a6
-
Filesize
532KB
MD53bdbe124c0157d4d622b71be93d5e331
SHA10c318f2ed725a56701afe89ecafdd45e7e663d49
SHA256ba0c35b12c48ffe7f871e3d23e94e840ea662acbb6739ba7bca21657ad239729
SHA5124dccd34e0ff61e446cb24b85c43e1f4cdaf6020c9fcb851199f81ac2ca8eab63cf2677503fe1b43a3106d891b6f1022c6c65086a36ee576ef6d2d64136092ba0
-
Filesize
573KB
MD5ba2189cb3a89138b8f2436ffcca8c5cc
SHA1463e17145517f561314dcc193d253c85d2778cee
SHA2564091c610ebfdddddba556ebf25ce5d07769158073f7247cb5cd2f3e155ed0e53
SHA512ce2b53dccf90642081a7688889a531ee0f10741a82ddf6efba16a4a07f726351000493f5ce5f2f272f8bd123a60a4203db9626cb656ad094af0989766c778b94
-
Filesize
1.1MB
MD587f95560deb93a70ad73fb200e68539d
SHA1f6d1d367e82cdcc9bc6bb835a2a677160479e6c4
SHA2563c00e98c1740081b587f4f2928f62bcf4231c821827d22b4dd671d9025d3961b
SHA5121b3fdceb76e5574f496e00b0f0c6bb70af3adf195db827fc57bae0312a474357f452ef606f1e8a6dfbdeb8fa2d700f49ddd2becf1dd4b5aeee8f13bba6adeb1f
-
Filesize
634KB
MD556251c9efe0eb3b9d4edd650756f3c89
SHA1690661147f6b45ada4767a77a8e861a8a9ac42c7
SHA256a5e0d8124d6b8dfce197558da94c1b2bfef22a6fe8ad23da7c98355907ec4e57
SHA51242dbe58204e1e8f42b5c7ed6d37a4b1798c29ebeb8ce701b994c62acde71fdf8a323c0244967502234cbf30216f286e0c880711fef6f67d39d216f881dbe652e
-
Filesize
621KB
MD5e6cf32b8066489d32323ee3831477370
SHA19b32548e59edea45dc8d55d351247d10e8985d26
SHA256dbfa16a5a4014c36e787f3ea577bb903fabb5c89afa3a1291a6e8a20cb6eaaf7
SHA512501364cc219f4fb09b19630cf58c31911daa8fb5d48064d898b4bf1100882adc8add51b127b37a13f1dc2cb27a9579810fcc8815fbf1bccc35816cc50dbc51ea
-
Filesize
510KB
MD5563a9504227fb90ae546fec38016cf70
SHA14aeb55228462b488355524eeccbff4b32271c34c
SHA2563ef98a8d0fb4a23312566c2557b4e5a2408e94f625f5e4d9f68dd4a2e55f658f
SHA512f71606e7fb7bfb0d19751216026f4c5e95cf1b3cf270d6d30954af661925fa3e12e06f11a68e7c5721cdc3dd3358e7f666135704845407f7607007ea71c57dfa
-
Filesize
536KB
MD56542a4e7527e59e805f16f18f54f2dd4
SHA15cbac8a1a6a8960ce71bc5b85dacf4a6eda9a018
SHA2567482f6d8331c96f1f783fbfe9016bd5dda383ec36e58def57ed89d22cd636010
SHA51250e85483a21e45108cc9388b92f7aa8a51873015ebe8939f9268fbf953904600bf827fe18b8da135dc019ef40edd175f9b73bb8294d01f220004f66c9b8d3c6f
-
Filesize
1017KB
MD5ea4fd12fabeb5ae65bd74e96aa2d743d
SHA1029f4f8d85f3e74d256b12954d410ffb1729ff65
SHA256042b19723d027816e8f1056f133d9a73ad276fbb208093343085c923c22a922d
SHA512989dae043098cb8971599770bd457a4f404db5cc631340b8bae3f8018907a5f3a4f3e17aec4db9a7a3804b57069a12efaef9adf4da2f5e4e33ff6ada48509582
-
Filesize
2.0MB
MD5cab97ae95d63a92415f71c3327414633
SHA1a2f34baaabf8174547c80b0945120a4a72149fdb
SHA256a024034169507eccef82e729800feca337fb5e3248a213dbf2a0b7e60e75af57
SHA512f7199533e5669f8e282c80dd02439bee664a03f5373c79396d31bf2115bf7ff0d8cfaab8b4a5c77848958bf3915f8444c3ba2eb3efe8488f314192d7a31f0b21
-
Filesize
694KB
MD58e3692528ca6f5040fc4a50c72ae69f4
SHA1ffc9cd787fdedbd454d42c59f2157471b9768f4f
SHA256058dc5afc643b85811729783783abb567577e39167c9ab419dda49d610c29477
SHA512e3d43d7e7b7f678033e05e5cfa58ec8c267c012a037311f940665a28cd710e643172cf34a431c513a74e29f1b8d9921c562dadb0d5a7e27705af14edc41a2560
-
Filesize
1.9MB
MD5ef31b05e0c3d7c83284382c926f6e32d
SHA1c0c3e1b3516b88c29689ac2e8f3219082672d8bb
SHA256cda7d90f2da495a729ab5872800e22329959f544d5ad4a17f64b7879586e1757
SHA51278e0b4a2d0887fe9daa1ffd9b1efb4772d5f8beb8461f7676564021c45294997c2d0d49884142a62866b41f7a34ce25bf2f60dbbc9e88ae3b9bef75d8b3a8905
-
Filesize
2.1MB
MD5d2300db4eac2ec611198a687d66f34b4
SHA1a85aa4357d1fb243281e4181ed0fa2e171b6e653
SHA25627951118b004205502ee4b397b29d045d529d5dc85c7f9c399886ff2d07e19ce
SHA512da4caea9a908c43e1ae96a14755aaebecdd6037ddb6fa5cac885f0101971736ef36ecfbf776495325318ac715790d62424a3a4658d0244f886f34d1cf0c00f71
-
Filesize
578KB
MD586e0ca43aaed120da7c4e6b7b0c81b62
SHA1e36b5fad89095fc1c469c2ae7186216b2f3bb060
SHA256b0c43929b0cc934ae907ed9c57356ef317567e76de288e39c5e3ff63c6ccafcc
SHA51246bf8de72083ab2a129158207df0df97163bf7c6549542aa12deac10d60bc02d1b1a4a6e62af0b180a4cdb607edd74774d66b1776e3fb6f7122d50bf79b913dc
-
Filesize
605KB
MD567943bd469dae8d47c349c002a7344e4
SHA11099f931b30e38df2ee56001b75789995672702c
SHA256c9a07c97829d81247bb1d2c8262e5d2cb0cb06d3eae6551b7884bdaf744b9c3b
SHA5126930e54ff99dcad67d6ed82c4f9cbbbdb39f6687ef62c63be85c77ae947335da01c051c7ce8f08fe53116391aae0591bbb7030525a46a9b7012b26e5742c39b2
-
\Windows\assembly\NativeImages_v2.0.50727_64\Temp\ZAP65F4.tmp\Microsoft.VisualStudio.Tools.Applications.AddInAdapter.v9.0.dll
Filesize85KB
MD55180107f98e16bdca63e67e7e3169d22
SHA1dd2e82756dcda2f5a82125c4d743b4349955068d
SHA256d0658cbf473ef3666c758d28a1c4bcdcb25b2e515ad5251127d0906e65938f01
SHA51227d785971c28181cf9115ab14de066931c4d81f8d357ea8b9eabfe0f70bd5848023b69948ac6a586989e892bcde40999f8895a0bd2e7a28bac7f2fa64bb22363
-
\Windows\assembly\NativeImages_v2.0.50727_64\Temp\ZAP6900.tmp\Microsoft.VisualStudio.Tools.Office.AddInAdapter.v9.0.dll
Filesize298KB
MD55fd34a21f44ccbeda1bf502aa162a96a
SHA11f3b1286c01dea47be5e65cb72956a2355e1ae5e
SHA2565d88539a1b7be77e11fe33572606c1093c54a80eea8bd3662f2ef5078a35ce01
SHA51258c3904cd1a06fbd3a432b3b927e189a744282cc105eda6f0d7f406971ccbc942c7403c2dcbb2d042981cf53419ca5e2cf4d9f57175e45cc5c484b0c121bb125
-
\Windows\assembly\NativeImages_v2.0.50727_64\Temp\ZAP6C3B.tmp\Microsoft.VisualStudio.Tools.Office.Excel.AddInAdapter.v9.0.dll
Filesize58KB
MD53d6987fc36386537669f2450761cdd9d
SHA17a35de593dce75d1cb6a50c68c96f200a93eb0c9
SHA25634c0302fcf7d2237f914aaa484b24f5a222745f21f5b5806b9c519538665d9cb
SHA5121d74371f0b6c68ead18b083c08b7e44fcaf930a16e0641ad6cd8d8defb4bde838377741e5b827f7f05d4f0ad4550b509ba6dff787f51fc6830d8f2c88dbf0e11
-
\Windows\assembly\NativeImages_v2.0.50727_64\Temp\ZAP6E8B.tmp\Microsoft.VisualStudio.Tools.Office.Word.AddInAdapter.v9.0.dll
Filesize58KB
MD5a8b651d9ae89d5e790ab8357edebbffe
SHA1500cff2ba14e4c86c25c045a51aec8aa6e62d796
SHA2561c8239c49fb10c715b52e60afd0e6668592806ef447ad0c52599231f995a95d7
SHA512b4d87ee520353113bb5cf242a855057627fde9f79b74031ba11d5feee1a371612154940037954cd1e411da0c102f616be72617a583512420fd1fc743541a10ce
-
Filesize
248KB
MD54bbf44ea6ee52d7af8e58ea9c0caa120
SHA1f7dcafcf850b4081b61ec7d313d7ec35d6ac66d2
SHA256c89c478c2d7134cd28b3d28d4216ad6aa41de3edd9d87a227ec19cf1cbf3fb08
SHA512c82356750a03bd6f92f03c67acdd5e1085fbd70533a8b314ae54676f37762d9ca5fa91574529b147d3e1c983bf042106b75f41206f5ddc37094a5e1c327c0fd3
-
\Windows\assembly\NativeImages_v2.0.50727_64\Temp\ZAP738B.tmp\Microsoft.VisualStudio.Tools.Applications.Runtime.v10.0.dll
Filesize87KB
MD5ed5c3f3402e320a8b4c6a33245a687d1
SHA14da11c966616583a817e98f7ee6fce6cde381dae
SHA256b58d8890d884e60af0124555472e23dee55905e678ec9506a3fbe00fffab0a88
SHA512d664b1f9f37c50d0e730a25ff7b79618f1ca99a0f1df0b32a4c82c95b2d15b6ef04ce5560db7407c6c3d2dff70514dac77cb0598f6d32b25362ae83fedb2bc2a