Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
04-01-2025 18:00
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_7b0d937d1ca7495e4f4ddcc5eec85b60.exe
Resource
win7-20241010-en
General
-
Target
JaffaCakes118_7b0d937d1ca7495e4f4ddcc5eec85b60.exe
-
Size
884KB
-
MD5
7b0d937d1ca7495e4f4ddcc5eec85b60
-
SHA1
be9c08dc85620a284f58cb2c7d5c463454aca7e8
-
SHA256
1ed33c34e7942721cd0a459cb852f370b7284af6d775b2db865ac2c97bbceb90
-
SHA512
accfdccc19ae269d4b295d0e217e92ae5f1056770016d62ce70aa83ca2c3b019cd2ad7f1a5b70d4dbb301e92b43432271b0a029cf26482c6e933855d6e4c8fd7
-
SSDEEP
12288:CQoN/7YkrWBfWhvRhKUrFnnFI63RkqxgJmxJSD+yJJRm6YqUhiCQz:CQoN/7DSBfWfRn6uZTxJSis86Yjihz
Malware Config
Signatures
-
Expiro family
-
Expiro payload 2 IoCs
resource yara_rule behavioral1/memory/1948-2-0x000000004AD00000-0x000000004AF08000-memory.dmp family_expiro1 behavioral1/memory/2568-54-0x0000000010000000-0x00000000101B6000-memory.dmp family_expiro1 -
Executes dropped EXE 64 IoCs
pid Process 2568 mscorsvw.exe 476 Process not Found 2380 mscorsvw.exe 2784 mscorsvw.exe 2988 mscorsvw.exe 1628 elevation_service.exe 2616 IEEtwCollector.exe 484 maintenanceservice.exe 316 mscorsvw.exe 1772 mscorsvw.exe 1916 mscorsvw.exe 764 mscorsvw.exe 1264 mscorsvw.exe 584 mscorsvw.exe 2032 mscorsvw.exe 1532 mscorsvw.exe 1524 mscorsvw.exe 984 mscorsvw.exe 2064 mscorsvw.exe 2364 mscorsvw.exe 468 mscorsvw.exe 2092 mscorsvw.exe 2636 mscorsvw.exe 2648 mscorsvw.exe 2460 mscorsvw.exe 2892 mscorsvw.exe 1660 mscorsvw.exe 1616 mscorsvw.exe 1312 mscorsvw.exe 2076 mscorsvw.exe 1932 mscorsvw.exe 1860 mscorsvw.exe 1720 mscorsvw.exe 2196 mscorsvw.exe 2088 mscorsvw.exe 2404 mscorsvw.exe 2044 mscorsvw.exe 2792 mscorsvw.exe 752 mscorsvw.exe 936 mscorsvw.exe 1196 mscorsvw.exe 2484 mscorsvw.exe 2072 mscorsvw.exe 2944 mscorsvw.exe 2952 mscorsvw.exe 1904 mscorsvw.exe 564 mscorsvw.exe 2436 mscorsvw.exe 2016 mscorsvw.exe 3000 mscorsvw.exe 2344 mscorsvw.exe 2064 mscorsvw.exe 2792 mscorsvw.exe 2828 mscorsvw.exe 2664 mscorsvw.exe 752 mscorsvw.exe 2784 mscorsvw.exe 2472 mscorsvw.exe 2732 mscorsvw.exe 2672 mscorsvw.exe 1596 mscorsvw.exe 1812 mscorsvw.exe 872 mscorsvw.exe 2960 mscorsvw.exe -
Loads dropped DLL 55 IoCs
pid Process 476 Process not Found 476 Process not Found 476 Process not Found 476 Process not Found 476 Process not Found 2032 mscorsvw.exe 2032 mscorsvw.exe 1524 mscorsvw.exe 1524 mscorsvw.exe 2064 mscorsvw.exe 2064 mscorsvw.exe 468 mscorsvw.exe 468 mscorsvw.exe 2636 mscorsvw.exe 2636 mscorsvw.exe 2460 mscorsvw.exe 2460 mscorsvw.exe 1660 mscorsvw.exe 1660 mscorsvw.exe 1312 mscorsvw.exe 1312 mscorsvw.exe 1932 mscorsvw.exe 1932 mscorsvw.exe 1720 mscorsvw.exe 1720 mscorsvw.exe 2088 mscorsvw.exe 2088 mscorsvw.exe 2044 mscorsvw.exe 2044 mscorsvw.exe 752 mscorsvw.exe 752 mscorsvw.exe 1196 mscorsvw.exe 1196 mscorsvw.exe 2072 mscorsvw.exe 2072 mscorsvw.exe 2952 mscorsvw.exe 2952 mscorsvw.exe 2344 mscorsvw.exe 2344 mscorsvw.exe 2064 mscorsvw.exe 2064 mscorsvw.exe 2828 mscorsvw.exe 2828 mscorsvw.exe 2228 mscorsvw.exe 2228 mscorsvw.exe 1340 mscorsvw.exe 1340 mscorsvw.exe 468 mscorsvw.exe 468 mscorsvw.exe 2636 mscorsvw.exe 2636 mscorsvw.exe 2956 mscorsvw.exe 2956 mscorsvw.exe 1256 mscorsvw.exe 1256 mscorsvw.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Security Center\Svc\S-1-5-21-2039016743-699959520-214465309-1000 mscorsvw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Security Center\Svc\S-1-5-21-2039016743-699959520-214465309-1000\EnableNotifications = "0" mscorsvw.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\dlddmedljhmbgdhapibnagaanenmajcm\1.0_0\manifest.json JaffaCakes118_7b0d937d1ca7495e4f4ddcc5eec85b60.exe -
Enumerates connected drives 3 TTPs 42 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\U: JaffaCakes118_7b0d937d1ca7495e4f4ddcc5eec85b60.exe File opened (read-only) \??\V: JaffaCakes118_7b0d937d1ca7495e4f4ddcc5eec85b60.exe File opened (read-only) \??\Y: JaffaCakes118_7b0d937d1ca7495e4f4ddcc5eec85b60.exe File opened (read-only) \??\Z: JaffaCakes118_7b0d937d1ca7495e4f4ddcc5eec85b60.exe File opened (read-only) \??\J: mscorsvw.exe File opened (read-only) \??\G: JaffaCakes118_7b0d937d1ca7495e4f4ddcc5eec85b60.exe File opened (read-only) \??\Q: JaffaCakes118_7b0d937d1ca7495e4f4ddcc5eec85b60.exe File opened (read-only) \??\Y: mscorsvw.exe File opened (read-only) \??\E: mscorsvw.exe File opened (read-only) \??\I: mscorsvw.exe File opened (read-only) \??\M: JaffaCakes118_7b0d937d1ca7495e4f4ddcc5eec85b60.exe File opened (read-only) \??\P: JaffaCakes118_7b0d937d1ca7495e4f4ddcc5eec85b60.exe File opened (read-only) \??\W: JaffaCakes118_7b0d937d1ca7495e4f4ddcc5eec85b60.exe File opened (read-only) \??\X: JaffaCakes118_7b0d937d1ca7495e4f4ddcc5eec85b60.exe File opened (read-only) \??\L: mscorsvw.exe File opened (read-only) \??\P: mscorsvw.exe File opened (read-only) \??\H: JaffaCakes118_7b0d937d1ca7495e4f4ddcc5eec85b60.exe File opened (read-only) \??\I: JaffaCakes118_7b0d937d1ca7495e4f4ddcc5eec85b60.exe File opened (read-only) \??\O: JaffaCakes118_7b0d937d1ca7495e4f4ddcc5eec85b60.exe File opened (read-only) \??\U: mscorsvw.exe File opened (read-only) \??\N: JaffaCakes118_7b0d937d1ca7495e4f4ddcc5eec85b60.exe File opened (read-only) \??\O: mscorsvw.exe File opened (read-only) \??\S: mscorsvw.exe File opened (read-only) \??\Q: mscorsvw.exe File opened (read-only) \??\R: mscorsvw.exe File opened (read-only) \??\X: mscorsvw.exe File opened (read-only) \??\K: mscorsvw.exe File opened (read-only) \??\J: JaffaCakes118_7b0d937d1ca7495e4f4ddcc5eec85b60.exe File opened (read-only) \??\T: JaffaCakes118_7b0d937d1ca7495e4f4ddcc5eec85b60.exe File opened (read-only) \??\S: JaffaCakes118_7b0d937d1ca7495e4f4ddcc5eec85b60.exe File opened (read-only) \??\W: mscorsvw.exe File opened (read-only) \??\Z: mscorsvw.exe File opened (read-only) \??\H: mscorsvw.exe File opened (read-only) \??\E: JaffaCakes118_7b0d937d1ca7495e4f4ddcc5eec85b60.exe File opened (read-only) \??\K: JaffaCakes118_7b0d937d1ca7495e4f4ddcc5eec85b60.exe File opened (read-only) \??\M: mscorsvw.exe File opened (read-only) \??\N: mscorsvw.exe File opened (read-only) \??\T: mscorsvw.exe File opened (read-only) \??\V: mscorsvw.exe File opened (read-only) \??\G: mscorsvw.exe File opened (read-only) \??\L: JaffaCakes118_7b0d937d1ca7495e4f4ddcc5eec85b60.exe File opened (read-only) \??\R: JaffaCakes118_7b0d937d1ca7495e4f4ddcc5eec85b60.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created \??\c:\windows\system32\msiexec.vir JaffaCakes118_7b0d937d1ca7495e4f4ddcc5eec85b60.exe File opened for modification \??\c:\windows\system32\svchost.exe mscorsvw.exe File opened for modification \??\c:\windows\system32\dllhost.exe mscorsvw.exe File opened for modification \??\c:\windows\system32\msiexec.exe mscorsvw.exe File opened for modification \??\c:\windows\SysWOW64\alg.exe JaffaCakes118_7b0d937d1ca7495e4f4ddcc5eec85b60.exe File opened for modification \??\c:\windows\system32\fxssvc.exe JaffaCakes118_7b0d937d1ca7495e4f4ddcc5eec85b60.exe File created \??\c:\windows\system32\fxssvc.vir JaffaCakes118_7b0d937d1ca7495e4f4ddcc5eec85b60.exe File created \??\c:\windows\system32\ieetwcollector.vir JaffaCakes118_7b0d937d1ca7495e4f4ddcc5eec85b60.exe File opened for modification \??\c:\windows\system32\snmptrap.exe JaffaCakes118_7b0d937d1ca7495e4f4ddcc5eec85b60.exe File opened for modification \??\c:\windows\syswow64\perfhost.exe mscorsvw.exe File created \??\c:\windows\system32\alg.vir JaffaCakes118_7b0d937d1ca7495e4f4ddcc5eec85b60.exe File opened for modification \??\c:\windows\SysWOW64\msdtc.exe JaffaCakes118_7b0d937d1ca7495e4f4ddcc5eec85b60.exe File opened for modification \??\c:\windows\system32\msdtc.exe JaffaCakes118_7b0d937d1ca7495e4f4ddcc5eec85b60.exe File opened for modification \??\c:\windows\system32\msiexec.exe JaffaCakes118_7b0d937d1ca7495e4f4ddcc5eec85b60.exe File opened for modification \??\c:\windows\system32\vssvc.exe JaffaCakes118_7b0d937d1ca7495e4f4ddcc5eec85b60.exe File opened for modification \??\c:\windows\system32\wbengine.exe mscorsvw.exe File opened for modification \??\c:\windows\system32\wbem\wmiApsrv.exe JaffaCakes118_7b0d937d1ca7495e4f4ddcc5eec85b60.exe File opened for modification \??\c:\windows\system32\vds.exe JaffaCakes118_7b0d937d1ca7495e4f4ddcc5eec85b60.exe File created \??\c:\windows\system32\vssvc.vir JaffaCakes118_7b0d937d1ca7495e4f4ddcc5eec85b60.exe File created \??\c:\windows\system32\snmptrap.vir JaffaCakes118_7b0d937d1ca7495e4f4ddcc5eec85b60.exe File opened for modification \??\c:\windows\system32\wbengine.exe JaffaCakes118_7b0d937d1ca7495e4f4ddcc5eec85b60.exe File opened for modification \??\c:\windows\system32\vds.exe mscorsvw.exe File opened for modification \??\c:\windows\system32\vssvc.exe mscorsvw.exe File opened for modification \??\c:\windows\system32\fxssvc.exe mscorsvw.exe File opened for modification \??\c:\windows\SysWOW64\ui0detect.exe JaffaCakes118_7b0d937d1ca7495e4f4ddcc5eec85b60.exe File created \??\c:\windows\system32\ui0detect.vir JaffaCakes118_7b0d937d1ca7495e4f4ddcc5eec85b60.exe File opened for modification \??\c:\windows\SysWOW64\vssvc.exe JaffaCakes118_7b0d937d1ca7495e4f4ddcc5eec85b60.exe File opened for modification \??\c:\windows\system32\lsass.exe mscorsvw.exe File opened for modification \??\c:\windows\SysWOW64\fxssvc.exe JaffaCakes118_7b0d937d1ca7495e4f4ddcc5eec85b60.exe File opened for modification \??\c:\windows\system32\searchindexer.exe mscorsvw.exe File opened for modification \??\c:\windows\system32\alg.exe JaffaCakes118_7b0d937d1ca7495e4f4ddcc5eec85b60.exe File opened for modification \??\c:\windows\syswow64\perfhost.exe JaffaCakes118_7b0d937d1ca7495e4f4ddcc5eec85b60.exe File opened for modification \??\c:\windows\system32\ui0detect.exe mscorsvw.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7B2238AACCEDC3F1FFE8E7EB5F575EC9 mscorsvw.exe File opened for modification \??\c:\windows\SysWOW64\svchost.exe JaffaCakes118_7b0d937d1ca7495e4f4ddcc5eec85b60.exe File opened for modification \??\c:\windows\system32\ieetwcollector.exe JaffaCakes118_7b0d937d1ca7495e4f4ddcc5eec85b60.exe File created \??\c:\windows\SysWOW64\searchindexer.vir JaffaCakes118_7b0d937d1ca7495e4f4ddcc5eec85b60.exe File opened for modification \??\c:\windows\system32\searchindexer.exe JaffaCakes118_7b0d937d1ca7495e4f4ddcc5eec85b60.exe File opened for modification \??\c:\windows\SysWOW64\wbengine.exe JaffaCakes118_7b0d937d1ca7495e4f4ddcc5eec85b60.exe File opened for modification \??\c:\windows\SysWOW64\wbem\wmiApsrv.exe JaffaCakes118_7b0d937d1ca7495e4f4ddcc5eec85b60.exe File opened for modification \??\c:\windows\SysWOW64\searchindexer.exe JaffaCakes118_7b0d937d1ca7495e4f4ddcc5eec85b60.exe File opened for modification \??\c:\windows\system32\wbem\wmiApsrv.exe mscorsvw.exe File opened for modification \??\c:\windows\SysWOW64\dllhost.exe JaffaCakes118_7b0d937d1ca7495e4f4ddcc5eec85b60.exe File created \??\c:\windows\SysWOW64\dllhost.vir JaffaCakes118_7b0d937d1ca7495e4f4ddcc5eec85b60.exe File opened for modification \??\c:\windows\SysWOW64\lsass.exe JaffaCakes118_7b0d937d1ca7495e4f4ddcc5eec85b60.exe File opened for modification \??\c:\windows\SysWOW64\locator.exe JaffaCakes118_7b0d937d1ca7495e4f4ddcc5eec85b60.exe File opened for modification \??\c:\windows\SysWOW64\ieetwcollector.exe JaffaCakes118_7b0d937d1ca7495e4f4ddcc5eec85b60.exe File opened for modification \??\c:\windows\SysWOW64\msiexec.exe JaffaCakes118_7b0d937d1ca7495e4f4ddcc5eec85b60.exe File opened for modification \??\c:\windows\SysWOW64\snmptrap.exe JaffaCakes118_7b0d937d1ca7495e4f4ddcc5eec85b60.exe File created \??\c:\windows\system32\vds.vir JaffaCakes118_7b0d937d1ca7495e4f4ddcc5eec85b60.exe File created \??\c:\windows\system32\wbem\wmiApsrv.vir JaffaCakes118_7b0d937d1ca7495e4f4ddcc5eec85b60.exe File opened for modification \??\c:\windows\system32\snmptrap.exe mscorsvw.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7B2238AACCEDC3F1FFE8E7EB5F575EC9 mscorsvw.exe File opened for modification \??\c:\windows\system32\dllhost.exe JaffaCakes118_7b0d937d1ca7495e4f4ddcc5eec85b60.exe File created \??\c:\windows\system32\msdtc.vir JaffaCakes118_7b0d937d1ca7495e4f4ddcc5eec85b60.exe File opened for modification \??\c:\windows\system32\locator.exe JaffaCakes118_7b0d937d1ca7495e4f4ddcc5eec85b60.exe File opened for modification \??\c:\windows\SysWOW64\vds.exe JaffaCakes118_7b0d937d1ca7495e4f4ddcc5eec85b60.exe File opened for modification \??\c:\windows\system32\alg.exe mscorsvw.exe File opened for modification \??\c:\windows\system32\msdtc.exe mscorsvw.exe File created \??\c:\windows\SysWOW64\svchost.vir JaffaCakes118_7b0d937d1ca7495e4f4ddcc5eec85b60.exe File opened for modification \??\c:\windows\system32\svchost.exe JaffaCakes118_7b0d937d1ca7495e4f4ddcc5eec85b60.exe File created \??\c:\windows\SysWOW64\msiexec.vir JaffaCakes118_7b0d937d1ca7495e4f4ddcc5eec85b60.exe File created \??\c:\windows\system32\wbengine.vir JaffaCakes118_7b0d937d1ca7495e4f4ddcc5eec85b60.exe File opened for modification \??\c:\windows\system32\lsass.exe JaffaCakes118_7b0d937d1ca7495e4f4ddcc5eec85b60.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javadoc.exe JaffaCakes118_7b0d937d1ca7495e4f4ddcc5eec85b60.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jcmd.exe JaffaCakes118_7b0d937d1ca7495e4f4ddcc5eec85b60.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\bin\jp2launcher.vir JaffaCakes118_7b0d937d1ca7495e4f4ddcc5eec85b60.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\rmiregistry.exe JaffaCakes118_7b0d937d1ca7495e4f4ddcc5eec85b60.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ConvertInkStore.exe JaffaCakes118_7b0d937d1ca7495e4f4ddcc5eec85b60.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\InputPersonalization.exe JaffaCakes118_7b0d937d1ca7495e4f4ddcc5eec85b60.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\kinit.exe JaffaCakes118_7b0d937d1ca7495e4f4ddcc5eec85b60.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\jp2launcher.exe JaffaCakes118_7b0d937d1ca7495e4f4ddcc5eec85b60.exe File opened for modification \??\c:\program files (x86)\mozilla maintenance service\maintenanceservice.exe JaffaCakes118_7b0d937d1ca7495e4f4ddcc5eec85b60.exe File created C:\Program Files\Common Files\Microsoft Shared\VSTO\10.0\VSTOInstaller.vir JaffaCakes118_7b0d937d1ca7495e4f4ddcc5eec85b60.exe File opened for modification C:\Program Files\DVD Maker\DVDMaker.exe JaffaCakes118_7b0d937d1ca7495e4f4ddcc5eec85b60.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\extcheck.exe JaffaCakes118_7b0d937d1ca7495e4f4ddcc5eec85b60.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javaws.exe JaffaCakes118_7b0d937d1ca7495e4f4ddcc5eec85b60.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jsadebugd.exe JaffaCakes118_7b0d937d1ca7495e4f4ddcc5eec85b60.exe File created \??\c:\program files (x86)\mozilla maintenance service\maintenanceservice.vir JaffaCakes118_7b0d937d1ca7495e4f4ddcc5eec85b60.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.vir JaffaCakes118_7b0d937d1ca7495e4f4ddcc5eec85b60.exe File created C:\Program Files\Internet Explorer\ielowutil.vir JaffaCakes118_7b0d937d1ca7495e4f4ddcc5eec85b60.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\keytool.exe JaffaCakes118_7b0d937d1ca7495e4f4ddcc5eec85b60.exe File opened for modification C:\Program Files\7-Zip\7z.exe JaffaCakes118_7b0d937d1ca7495e4f4ddcc5eec85b60.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\TabTip.exe JaffaCakes118_7b0d937d1ca7495e4f4ddcc5eec85b60.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\rmiregistry.exe JaffaCakes118_7b0d937d1ca7495e4f4ddcc5eec85b60.exe File created \??\c:\program files\google\chrome\Application\106.0.5249.119\elevation_service.vir JaffaCakes118_7b0d937d1ca7495e4f4ddcc5eec85b60.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\mip.vir JaffaCakes118_7b0d937d1ca7495e4f4ddcc5eec85b60.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javap.exe JaffaCakes118_7b0d937d1ca7495e4f4ddcc5eec85b60.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jstatd.exe JaffaCakes118_7b0d937d1ca7495e4f4ddcc5eec85b60.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\ssvagent.exe JaffaCakes118_7b0d937d1ca7495e4f4ddcc5eec85b60.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\bin\javaws.vir JaffaCakes118_7b0d937d1ca7495e4f4ddcc5eec85b60.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jarsigner.exe JaffaCakes118_7b0d937d1ca7495e4f4ddcc5eec85b60.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\bin\javaw.vir JaffaCakes118_7b0d937d1ca7495e4f4ddcc5eec85b60.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\servertool.exe JaffaCakes118_7b0d937d1ca7495e4f4ddcc5eec85b60.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jar.exe JaffaCakes118_7b0d937d1ca7495e4f4ddcc5eec85b60.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javaw.exe JaffaCakes118_7b0d937d1ca7495e4f4ddcc5eec85b60.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\servertool.exe JaffaCakes118_7b0d937d1ca7495e4f4ddcc5eec85b60.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\xjc.exe JaffaCakes118_7b0d937d1ca7495e4f4ddcc5eec85b60.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\java-rmi.exe JaffaCakes118_7b0d937d1ca7495e4f4ddcc5eec85b60.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\javaws.exe JaffaCakes118_7b0d937d1ca7495e4f4ddcc5eec85b60.exe File created C:\Program Files\Internet Explorer\iexplore.vir JaffaCakes118_7b0d937d1ca7495e4f4ddcc5eec85b60.exe File created C:\Program Files\Java\jdk1.7.0_80\bin\jconsole.vir JaffaCakes118_7b0d937d1ca7495e4f4ddcc5eec85b60.exe File opened for modification \??\c:\program files\google\chrome\Application\106.0.5249.119\elevation_service.exe mscorsvw.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jhat.exe JaffaCakes118_7b0d937d1ca7495e4f4ddcc5eec85b60.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\policytool.exe JaffaCakes118_7b0d937d1ca7495e4f4ddcc5eec85b60.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE JaffaCakes118_7b0d937d1ca7495e4f4ddcc5eec85b60.exe File opened for modification C:\Program Files\Internet Explorer\iexplore.exe JaffaCakes118_7b0d937d1ca7495e4f4ddcc5eec85b60.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\ConvertInkStore.vir JaffaCakes118_7b0d937d1ca7495e4f4ddcc5eec85b60.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome_proxy.exe JaffaCakes118_7b0d937d1ca7495e4f4ddcc5eec85b60.exe File opened for modification C:\Program Files\Internet Explorer\ieinstal.exe JaffaCakes118_7b0d937d1ca7495e4f4ddcc5eec85b60.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\jabswitch.exe JaffaCakes118_7b0d937d1ca7495e4f4ddcc5eec85b60.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\orbd.exe JaffaCakes118_7b0d937d1ca7495e4f4ddcc5eec85b60.exe File created C:\Program Files\DVD Maker\DVDMaker.vir JaffaCakes118_7b0d937d1ca7495e4f4ddcc5eec85b60.exe File created \??\c:\program files (x86)\microsoft office\office14\groove.vir JaffaCakes118_7b0d937d1ca7495e4f4ddcc5eec85b60.exe File opened for modification \??\c:\program files (x86)\common files\microsoft shared\source engine\ose.exe JaffaCakes118_7b0d937d1ca7495e4f4ddcc5eec85b60.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe JaffaCakes118_7b0d937d1ca7495e4f4ddcc5eec85b60.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\bin\ssvagent.vir JaffaCakes118_7b0d937d1ca7495e4f4ddcc5eec85b60.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\InputPersonalization.vir JaffaCakes118_7b0d937d1ca7495e4f4ddcc5eec85b60.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\ShapeCollector.vir JaffaCakes118_7b0d937d1ca7495e4f4ddcc5eec85b60.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jvisualvm.exe JaffaCakes118_7b0d937d1ca7495e4f4ddcc5eec85b60.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\tnameserv.exe JaffaCakes118_7b0d937d1ca7495e4f4ddcc5eec85b60.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jmc.exe JaffaCakes118_7b0d937d1ca7495e4f4ddcc5eec85b60.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\orbd.exe JaffaCakes118_7b0d937d1ca7495e4f4ddcc5eec85b60.exe File opened for modification \??\c:\program files\google\chrome\Application\106.0.5249.119\elevation_service.exe JaffaCakes118_7b0d937d1ca7495e4f4ddcc5eec85b60.exe File opened for modification \??\c:\program files (x86)\google\update\googleupdate.exe JaffaCakes118_7b0d937d1ca7495e4f4ddcc5eec85b60.exe File opened for modification \??\c:\program files\windows media player\wmpnetwk.exe JaffaCakes118_7b0d937d1ca7495e4f4ddcc5eec85b60.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\notification_helper.vir JaffaCakes118_7b0d937d1ca7495e4f4ddcc5eec85b60.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jabswitch.exe JaffaCakes118_7b0d937d1ca7495e4f4ddcc5eec85b60.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File created C:\Windows\assembly\GACLock.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\index155.dat mscorsvw.exe File opened for modification \??\c:\windows\ehome\ehrecvr.exe JaffaCakes118_7b0d937d1ca7495e4f4ddcc5eec85b60.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\index14b.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index14b.dat mscorsvw.exe File created C:\Windows\assembly\ngenlock.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index156.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\Temp\ZAPCF70.tmp\Microsoft.Office.Tools.Excel.v9.0.dll mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index14f.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\index14f.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\index150.dat mscorsvw.exe File created C:\Windows\assembly\ngenlock.dat mscorsvw.exe File opened for modification \??\c:\windows\microsoft.net\framework64\v4.0.30319\aspnet_state.exe mscorsvw.exe File created C:\Windows\assembly\GACLock.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index153.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index152.dat mscorsvw.exe File created C:\Windows\assembly\GACLock.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index157.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index145.dat mscorsvw.exe File created C:\Windows\assembly\ngenlock.dat mscorsvw.exe File created \??\c:\windows\servicing\trustedinstaller.vir JaffaCakes118_7b0d937d1ca7495e4f4ddcc5eec85b60.exe File created C:\Windows\assembly\ngenlock.dat mscorsvw.exe File created C:\Windows\assembly\ngenlock.dat mscorsvw.exe File created C:\Windows\assembly\ngenlock.dat mscorsvw.exe File created C:\Windows\assembly\ngenlock.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index146.dat mscorsvw.exe File opened for modification \??\c:\windows\microsoft.net\framework64\v3.0\windows communication foundation\infocard.exe JaffaCakes118_7b0d937d1ca7495e4f4ddcc5eec85b60.exe File created C:\Windows\assembly\ngenlock.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index14f.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\Temp\ZAP7FF9.tmp\ehiActivScp.dll mscorsvw.exe File created C:\Windows\assembly\GACLock.dat mscorsvw.exe File created C:\Windows\Microsoft.NET\Framework\v2.0.50727\ngenservicelock.dat mscorsvw.exe File created \??\c:\windows\microsoft.net\framework64\v2.0.50727\mscorsvw.vir JaffaCakes118_7b0d937d1ca7495e4f4ddcc5eec85b60.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index145.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\index147.dat mscorsvw.exe File created C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngenrootstorelock.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\Temp\ZAPD9DB.tmp\Microsoft.Office.Tools.v9.0.dll mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index14d.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index153.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\index156.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index15b.dat mscorsvw.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ngenservicelock.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\index149.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index14e.dat mscorsvw.exe File created C:\Windows\assembly\GACLock.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index15a.dat mscorsvw.exe File created C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngenofflinequeuelock.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index150.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index14f.dat mscorsvw.exe File created C:\Windows\assembly\ngenlock.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\index14a.dat mscorsvw.exe File created C:\Windows\assembly\GACLock.dat mscorsvw.exe File created C:\Windows\assembly\GACLock.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\index152.dat mscorsvw.exe File created C:\Windows\Microsoft.NET\ngenservice_pri1_lock.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\Temp\ZAP61A0.tmp\Microsoft.VisualStudio.Tools.Applications.HostAdapter.v10.0.dll mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\Temp\ZAP6D73.tmp\Microsoft.VisualStudio.Tools.Office.Word.HostAdapter.v10.0.dll mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index159.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index147.dat mscorsvw.exe File created C:\Windows\assembly\GACLock.dat mscorsvw.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\index14e.dat mscorsvw.exe File opened for modification \??\c:\windows\microsoft.net\framework64\v4.0.30319\aspnet_state.exe JaffaCakes118_7b0d937d1ca7495e4f4ddcc5eec85b60.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index14c.dat mscorsvw.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\index155.dat mscorsvw.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_7b0d937d1ca7495e4f4ddcc5eec85b60.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscorsvw.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CRLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CRLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\Certificates mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\Certificates mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\Certificates mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CRLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\Certificates mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\Certificates mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\Certificates mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\Certificates mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\Certificates mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\Certificates mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CRLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CRLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\Certificates mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CRLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CRLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CRLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\Certificates mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople mscorsvw.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\Certificates mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\Certificates mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CRLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\Certificates mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\Certificates mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\Certificates mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\Certificates mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CTLs mscorsvw.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\Certificates mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\Certificates mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\Certificates mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CTLs mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs mscorsvw.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 mscorsvw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CTLs mscorsvw.exe -
Suspicious behavior: EnumeratesProcesses 26 IoCs
pid Process 2988 mscorsvw.exe 2988 mscorsvw.exe 2988 mscorsvw.exe 2988 mscorsvw.exe 2988 mscorsvw.exe 2988 mscorsvw.exe 2988 mscorsvw.exe 2988 mscorsvw.exe 2988 mscorsvw.exe 2988 mscorsvw.exe 2988 mscorsvw.exe 2988 mscorsvw.exe 2988 mscorsvw.exe 2988 mscorsvw.exe 2988 mscorsvw.exe 2988 mscorsvw.exe 2988 mscorsvw.exe 2988 mscorsvw.exe 2988 mscorsvw.exe 2988 mscorsvw.exe 2988 mscorsvw.exe 2988 mscorsvw.exe 2988 mscorsvw.exe 2988 mscorsvw.exe 2988 mscorsvw.exe 2988 mscorsvw.exe -
Suspicious use of AdjustPrivilegeToken 60 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 1948 JaffaCakes118_7b0d937d1ca7495e4f4ddcc5eec85b60.exe Token: SeShutdownPrivilege 2988 mscorsvw.exe Token: SeShutdownPrivilege 2988 mscorsvw.exe Token: SeShutdownPrivilege 2988 mscorsvw.exe Token: SeShutdownPrivilege 2988 mscorsvw.exe Token: SeTakeOwnershipPrivilege 2988 mscorsvw.exe Token: SeShutdownPrivilege 2988 mscorsvw.exe Token: SeShutdownPrivilege 2988 mscorsvw.exe Token: SeShutdownPrivilege 2988 mscorsvw.exe Token: SeShutdownPrivilege 2988 mscorsvw.exe Token: SeShutdownPrivilege 2988 mscorsvw.exe Token: SeShutdownPrivilege 2988 mscorsvw.exe Token: SeShutdownPrivilege 2988 mscorsvw.exe Token: SeShutdownPrivilege 2988 mscorsvw.exe Token: SeShutdownPrivilege 2988 mscorsvw.exe Token: SeShutdownPrivilege 2988 mscorsvw.exe Token: SeShutdownPrivilege 2988 mscorsvw.exe Token: SeShutdownPrivilege 2988 mscorsvw.exe Token: SeShutdownPrivilege 2988 mscorsvw.exe Token: SeShutdownPrivilege 2988 mscorsvw.exe Token: SeShutdownPrivilege 2988 mscorsvw.exe Token: SeShutdownPrivilege 2988 mscorsvw.exe Token: SeShutdownPrivilege 2988 mscorsvw.exe Token: SeShutdownPrivilege 2988 mscorsvw.exe Token: SeShutdownPrivilege 2988 mscorsvw.exe Token: SeShutdownPrivilege 2988 mscorsvw.exe Token: SeShutdownPrivilege 2988 mscorsvw.exe Token: SeShutdownPrivilege 2988 mscorsvw.exe Token: SeShutdownPrivilege 2988 mscorsvw.exe Token: SeShutdownPrivilege 2988 mscorsvw.exe Token: SeShutdownPrivilege 2988 mscorsvw.exe Token: SeShutdownPrivilege 2988 mscorsvw.exe Token: SeShutdownPrivilege 2988 mscorsvw.exe Token: SeShutdownPrivilege 2988 mscorsvw.exe Token: SeShutdownPrivilege 2988 mscorsvw.exe Token: SeShutdownPrivilege 2988 mscorsvw.exe Token: SeShutdownPrivilege 2988 mscorsvw.exe Token: SeShutdownPrivilege 2988 mscorsvw.exe Token: SeShutdownPrivilege 2988 mscorsvw.exe Token: SeShutdownPrivilege 2988 mscorsvw.exe Token: SeShutdownPrivilege 2988 mscorsvw.exe Token: SeShutdownPrivilege 2988 mscorsvw.exe Token: SeShutdownPrivilege 2988 mscorsvw.exe Token: SeShutdownPrivilege 2988 mscorsvw.exe Token: SeShutdownPrivilege 2988 mscorsvw.exe Token: SeShutdownPrivilege 2988 mscorsvw.exe Token: SeShutdownPrivilege 2988 mscorsvw.exe Token: SeShutdownPrivilege 2988 mscorsvw.exe Token: SeShutdownPrivilege 2988 mscorsvw.exe Token: SeShutdownPrivilege 2988 mscorsvw.exe Token: SeShutdownPrivilege 2988 mscorsvw.exe Token: SeShutdownPrivilege 2988 mscorsvw.exe Token: SeShutdownPrivilege 2988 mscorsvw.exe Token: SeShutdownPrivilege 2988 mscorsvw.exe Token: SeShutdownPrivilege 2988 mscorsvw.exe Token: SeShutdownPrivilege 2988 mscorsvw.exe Token: SeShutdownPrivilege 2988 mscorsvw.exe Token: SeShutdownPrivilege 2988 mscorsvw.exe Token: SeShutdownPrivilege 2988 mscorsvw.exe Token: SeShutdownPrivilege 2988 mscorsvw.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2988 wrote to memory of 316 2988 mscorsvw.exe 40 PID 2988 wrote to memory of 316 2988 mscorsvw.exe 40 PID 2988 wrote to memory of 316 2988 mscorsvw.exe 40 PID 2988 wrote to memory of 1772 2988 mscorsvw.exe 41 PID 2988 wrote to memory of 1772 2988 mscorsvw.exe 41 PID 2988 wrote to memory of 1772 2988 mscorsvw.exe 41 PID 2988 wrote to memory of 1916 2988 mscorsvw.exe 42 PID 2988 wrote to memory of 1916 2988 mscorsvw.exe 42 PID 2988 wrote to memory of 1916 2988 mscorsvw.exe 42 PID 2988 wrote to memory of 764 2988 mscorsvw.exe 43 PID 2988 wrote to memory of 764 2988 mscorsvw.exe 43 PID 2988 wrote to memory of 764 2988 mscorsvw.exe 43 PID 2988 wrote to memory of 1264 2988 mscorsvw.exe 44 PID 2988 wrote to memory of 1264 2988 mscorsvw.exe 44 PID 2988 wrote to memory of 1264 2988 mscorsvw.exe 44 PID 2988 wrote to memory of 584 2988 mscorsvw.exe 45 PID 2988 wrote to memory of 584 2988 mscorsvw.exe 45 PID 2988 wrote to memory of 584 2988 mscorsvw.exe 45 PID 2988 wrote to memory of 2032 2988 mscorsvw.exe 46 PID 2988 wrote to memory of 2032 2988 mscorsvw.exe 46 PID 2988 wrote to memory of 2032 2988 mscorsvw.exe 46 PID 2988 wrote to memory of 1532 2988 mscorsvw.exe 47 PID 2988 wrote to memory of 1532 2988 mscorsvw.exe 47 PID 2988 wrote to memory of 1532 2988 mscorsvw.exe 47 PID 2988 wrote to memory of 1524 2988 mscorsvw.exe 48 PID 2988 wrote to memory of 1524 2988 mscorsvw.exe 48 PID 2988 wrote to memory of 1524 2988 mscorsvw.exe 48 PID 2988 wrote to memory of 984 2988 mscorsvw.exe 49 PID 2988 wrote to memory of 984 2988 mscorsvw.exe 49 PID 2988 wrote to memory of 984 2988 mscorsvw.exe 49 PID 2988 wrote to memory of 2064 2988 mscorsvw.exe 50 PID 2988 wrote to memory of 2064 2988 mscorsvw.exe 50 PID 2988 wrote to memory of 2064 2988 mscorsvw.exe 50 PID 2988 wrote to memory of 2364 2988 mscorsvw.exe 51 PID 2988 wrote to memory of 2364 2988 mscorsvw.exe 51 PID 2988 wrote to memory of 2364 2988 mscorsvw.exe 51 PID 2988 wrote to memory of 468 2988 mscorsvw.exe 52 PID 2988 wrote to memory of 468 2988 mscorsvw.exe 52 PID 2988 wrote to memory of 468 2988 mscorsvw.exe 52 PID 2988 wrote to memory of 2092 2988 mscorsvw.exe 53 PID 2988 wrote to memory of 2092 2988 mscorsvw.exe 53 PID 2988 wrote to memory of 2092 2988 mscorsvw.exe 53 PID 2988 wrote to memory of 2636 2988 mscorsvw.exe 54 PID 2988 wrote to memory of 2636 2988 mscorsvw.exe 54 PID 2988 wrote to memory of 2636 2988 mscorsvw.exe 54 PID 2988 wrote to memory of 2648 2988 mscorsvw.exe 55 PID 2988 wrote to memory of 2648 2988 mscorsvw.exe 55 PID 2988 wrote to memory of 2648 2988 mscorsvw.exe 55 PID 2988 wrote to memory of 2460 2988 mscorsvw.exe 56 PID 2988 wrote to memory of 2460 2988 mscorsvw.exe 56 PID 2988 wrote to memory of 2460 2988 mscorsvw.exe 56 PID 2988 wrote to memory of 2892 2988 mscorsvw.exe 57 PID 2988 wrote to memory of 2892 2988 mscorsvw.exe 57 PID 2988 wrote to memory of 2892 2988 mscorsvw.exe 57 PID 2988 wrote to memory of 1660 2988 mscorsvw.exe 58 PID 2988 wrote to memory of 1660 2988 mscorsvw.exe 58 PID 2988 wrote to memory of 1660 2988 mscorsvw.exe 58 PID 2988 wrote to memory of 1616 2988 mscorsvw.exe 59 PID 2988 wrote to memory of 1616 2988 mscorsvw.exe 59 PID 2988 wrote to memory of 1616 2988 mscorsvw.exe 59 PID 2988 wrote to memory of 1312 2988 mscorsvw.exe 60 PID 2988 wrote to memory of 1312 2988 mscorsvw.exe 60 PID 2988 wrote to memory of 1312 2988 mscorsvw.exe 60 PID 2988 wrote to memory of 2076 2988 mscorsvw.exe 61
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7b0d937d1ca7495e4f4ddcc5eec85b60.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7b0d937d1ca7495e4f4ddcc5eec85b60.exe"1⤵
- Drops Chrome extension
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1948
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2568
-
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2380
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe1⤵
- Executes dropped EXE
PID:2784
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe1⤵
- Executes dropped EXE
- Windows security modification
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 1a8 -InterruptEvent 194 -NGENProcess 198 -Pipe 1a4 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:316
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 1a0 -InterruptEvent 244 -NGENProcess 24c -Pipe 250 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1772
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 15c -InterruptEvent 208 -NGENProcess 1ec -Pipe 150 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1916
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 208 -InterruptEvent 258 -NGENProcess 1b0 -Pipe 254 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:764
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 258 -InterruptEvent 25c -NGENProcess 230 -Pipe 240 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1264
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 25c -InterruptEvent 260 -NGENProcess 1ec -Pipe 194 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:584
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 20c -InterruptEvent 258 -NGENProcess 264 -Pipe 25c -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2032
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 258 -InterruptEvent 260 -NGENProcess 230 -Pipe 15c -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1532
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 260 -InterruptEvent 274 -NGENProcess 264 -Pipe 270 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:1524
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 274 -InterruptEvent 258 -NGENProcess 264 -Pipe 1b0 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:984
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 258 -InterruptEvent 27c -NGENProcess 230 -Pipe 198 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:2064
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 280 -InterruptEvent 274 -NGENProcess 284 -Pipe 258 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2364
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 274 -InterruptEvent 208 -NGENProcess 230 -Pipe 260 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:468
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 208 -InterruptEvent 230 -NGENProcess 280 -Pipe 27c -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2092
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 230 -InterruptEvent 28c -NGENProcess 284 -Pipe 268 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2636
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 28c -InterruptEvent 284 -NGENProcess 208 -Pipe 288 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2648
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 284 -InterruptEvent 278 -NGENProcess 264 -Pipe 280 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:2460
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 278 -InterruptEvent 264 -NGENProcess 28c -Pipe 230 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2892
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 264 -InterruptEvent 29c -NGENProcess 208 -Pipe 26c -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:1660
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 29c -InterruptEvent 208 -NGENProcess 278 -Pipe 298 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1616
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 264 -InterruptEvent 2a4 -NGENProcess 290 -Pipe 208 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:1312
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2a4 -InterruptEvent 290 -NGENProcess 28c -Pipe 278 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2076
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 290 -InterruptEvent 2ac -NGENProcess 29c -Pipe 294 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:1932
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2ac -InterruptEvent 29c -NGENProcess 2a4 -Pipe 284 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1860
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 29c -InterruptEvent 2b4 -NGENProcess 28c -Pipe 264 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:1720
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2b4 -InterruptEvent 28c -NGENProcess 2ac -Pipe 2b0 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2196
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 28c -InterruptEvent 2bc -NGENProcess 2a4 -Pipe 290 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:2088
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2bc -InterruptEvent 2a4 -NGENProcess 2b4 -Pipe 2b8 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2404
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2a4 -InterruptEvent 2c4 -NGENProcess 2ac -Pipe 29c -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:2044
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2c4 -InterruptEvent 2ac -NGENProcess 2bc -Pipe 2c0 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2792
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2ac -InterruptEvent 2cc -NGENProcess 2b4 -Pipe 28c -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:752
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2cc -InterruptEvent 2b4 -NGENProcess 2c4 -Pipe 2c8 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:936
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2b4 -InterruptEvent 2d4 -NGENProcess 2bc -Pipe 2a4 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:1196
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2d4 -InterruptEvent 2bc -NGENProcess 2cc -Pipe 2d0 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2484
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2bc -InterruptEvent 2e4 -NGENProcess 2c4 -Pipe 2e0 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:2072
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2e4 -InterruptEvent 2c4 -NGENProcess 2d4 -Pipe 2a8 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2944
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2c4 -InterruptEvent 2ec -NGENProcess 2cc -Pipe 2a0 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:2952
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2ec -InterruptEvent 2cc -NGENProcess 2e4 -Pipe 2e8 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:1904
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2cc -InterruptEvent 2f4 -NGENProcess 2d4 -Pipe 2bc -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:564
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2f4 -InterruptEvent 2f8 -NGENProcess 2f0 -Pipe 2dc -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2436
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2f8 -InterruptEvent 2fc -NGENProcess 2e4 -Pipe 2c4 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2016
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2fc -InterruptEvent 300 -NGENProcess 2d4 -Pipe 274 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:3000
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 300 -InterruptEvent 2f4 -NGENProcess 2f0 -Pipe 308 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:2344
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2f4 -InterruptEvent 2f0 -NGENProcess 2fc -Pipe 304 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:2064
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2f0 -InterruptEvent 2fc -NGENProcess 2cc -Pipe 2d4 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2792
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2fc -InterruptEvent 310 -NGENProcess 2ec -Pipe 2f8 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:2828
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 310 -InterruptEvent 2ec -NGENProcess 2f0 -Pipe 30c -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2664
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2ec -InterruptEvent 318 -NGENProcess 2cc -Pipe 2f4 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:752
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 318 -InterruptEvent 31c -NGENProcess 314 -Pipe 2ac -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2784
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 31c -InterruptEvent 320 -NGENProcess 2f0 -Pipe 2fc -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2472
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 320 -InterruptEvent 324 -NGENProcess 2cc -Pipe 300 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2732
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 324 -InterruptEvent 328 -NGENProcess 314 -Pipe 310 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2672
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 328 -InterruptEvent 32c -NGENProcess 2f0 -Pipe 2ec -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1596
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 32c -InterruptEvent 330 -NGENProcess 2cc -Pipe 318 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1812
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 330 -InterruptEvent 334 -NGENProcess 314 -Pipe 31c -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:872
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 334 -InterruptEvent 338 -NGENProcess 2f0 -Pipe 320 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2960
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 338 -InterruptEvent 33c -NGENProcess 2cc -Pipe 324 -Comment "NGen Worker Process"2⤵PID:1764
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 33c -InterruptEvent 340 -NGENProcess 314 -Pipe 328 -Comment "NGen Worker Process"2⤵PID:2964
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 340 -InterruptEvent 344 -NGENProcess 2f0 -Pipe 32c -Comment "NGen Worker Process"2⤵PID:1304
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 344 -InterruptEvent 330 -NGENProcess 2cc -Pipe 334 -Comment "NGen Worker Process"2⤵PID:2224
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 330 -InterruptEvent 348 -NGENProcess 2d8 -Pipe 2e4 -Comment "NGen Worker Process"2⤵PID:1640
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 348 -InterruptEvent 34c -NGENProcess 2f0 -Pipe 338 -Comment "NGen Worker Process"2⤵PID:1532
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 34c -InterruptEvent 350 -NGENProcess 2cc -Pipe 33c -Comment "NGen Worker Process"2⤵PID:2976
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 350 -InterruptEvent 354 -NGENProcess 2d8 -Pipe 340 -Comment "NGen Worker Process"2⤵PID:2216
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 354 -InterruptEvent 358 -NGENProcess 2f0 -Pipe 344 -Comment "NGen Worker Process"2⤵PID:1028
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 358 -InterruptEvent 35c -NGENProcess 2cc -Pipe 330 -Comment "NGen Worker Process"2⤵PID:2156
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 35c -InterruptEvent 360 -NGENProcess 2d8 -Pipe 348 -Comment "NGen Worker Process"2⤵PID:376
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 360 -InterruptEvent 364 -NGENProcess 2f0 -Pipe 34c -Comment "NGen Worker Process"2⤵PID:2356
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 364 -InterruptEvent 368 -NGENProcess 2cc -Pipe 350 -Comment "NGen Worker Process"2⤵PID:568
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 368 -InterruptEvent 36c -NGENProcess 2d8 -Pipe 354 -Comment "NGen Worker Process"2⤵
- Loads dropped DLL
- Drops file in Windows directory
PID:2228
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 36c -InterruptEvent 2d8 -NGENProcess 364 -Pipe 2f0 -Comment "NGen Worker Process"2⤵PID:1816
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2d8 -InterruptEvent 374 -NGENProcess 2cc -Pipe 35c -Comment "NGen Worker Process"2⤵PID:1128
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 374 -InterruptEvent 378 -NGENProcess 370 -Pipe 360 -Comment "NGen Worker Process"2⤵PID:2712
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 378 -InterruptEvent 37c -NGENProcess 364 -Pipe 368 -Comment "NGen Worker Process"2⤵PID:1480
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 37c -InterruptEvent 380 -NGENProcess 2cc -Pipe 358 -Comment "NGen Worker Process"2⤵PID:2752
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 380 -InterruptEvent 384 -NGENProcess 370 -Pipe 36c -Comment "NGen Worker Process"2⤵PID:2852
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 384 -InterruptEvent 388 -NGENProcess 364 -Pipe 2d8 -Comment "NGen Worker Process"2⤵PID:2764
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 388 -InterruptEvent 38c -NGENProcess 2cc -Pipe 374 -Comment "NGen Worker Process"2⤵PID:2748
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 38c -InterruptEvent 390 -NGENProcess 370 -Pipe 378 -Comment "NGen Worker Process"2⤵PID:2556
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 390 -InterruptEvent 394 -NGENProcess 364 -Pipe 37c -Comment "NGen Worker Process"2⤵PID:2268
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 394 -InterruptEvent 398 -NGENProcess 2cc -Pipe 380 -Comment "NGen Worker Process"2⤵PID:2692
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 384 -InterruptEvent 398 -NGENProcess 370 -Pipe 39c -Comment "NGen Worker Process"2⤵PID:1484
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 398 -InterruptEvent 3a0 -NGENProcess 364 -Pipe 388 -Comment "NGen Worker Process"2⤵PID:2484
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 3a0 -InterruptEvent 3a4 -NGENProcess 2cc -Pipe 38c -Comment "NGen Worker Process"2⤵PID:1308
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 3a4 -InterruptEvent 3a8 -NGENProcess 370 -Pipe 390 -Comment "NGen Worker Process"2⤵PID:1756
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 3a8 -InterruptEvent 3ac -NGENProcess 364 -Pipe 394 -Comment "NGen Worker Process"2⤵PID:1732
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 3ac -InterruptEvent 3b0 -NGENProcess 2cc -Pipe 384 -Comment "NGen Worker Process"2⤵PID:1220
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 3b0 -InterruptEvent 3b4 -NGENProcess 370 -Pipe 398 -Comment "NGen Worker Process"2⤵PID:1344
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 3b4 -InterruptEvent 3b8 -NGENProcess 364 -Pipe 3a0 -Comment "NGen Worker Process"2⤵PID:2964
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 3b8 -InterruptEvent 3bc -NGENProcess 2cc -Pipe 3a4 -Comment "NGen Worker Process"2⤵PID:1304
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 3bc -InterruptEvent 3a8 -NGENProcess 370 -Pipe 3ac -Comment "NGen Worker Process"2⤵PID:2820
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 314 -InterruptEvent 3b8 -NGENProcess 3c0 -Pipe 3bc -Comment "NGen Worker Process"2⤵PID:1860
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 3b8 -InterruptEvent 3b0 -NGENProcess 370 -Pipe 364 -Comment "NGen Worker Process"2⤵PID:2984
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 3b0 -InterruptEvent 3c4 -NGENProcess 3a8 -Pipe 2cc -Comment "NGen Worker Process"2⤵PID:1608
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 3c4 -InterruptEvent 3c8 -NGENProcess 3c0 -Pipe 1ec -Comment "NGen Worker Process"2⤵PID:2936
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 3c8 -InterruptEvent 3cc -NGENProcess 370 -Pipe 2b4 -Comment "NGen Worker Process"2⤵PID:2456
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 3cc -InterruptEvent 3d0 -NGENProcess 3a8 -Pipe 314 -Comment "NGen Worker Process"2⤵PID:1904
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 3d0 -InterruptEvent 3d4 -NGENProcess 3c0 -Pipe 3b8 -Comment "NGen Worker Process"2⤵PID:1576
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 3d4 -InterruptEvent 3d8 -NGENProcess 370 -Pipe 3b0 -Comment "NGen Worker Process"2⤵PID:1524
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 3d8 -InterruptEvent 3dc -NGENProcess 3a8 -Pipe 3c4 -Comment "NGen Worker Process"2⤵
- Modifies data under HKEY_USERS
PID:2508
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 3dc -InterruptEvent 3e0 -NGENProcess 3c0 -Pipe 3c8 -Comment "NGen Worker Process"2⤵
- Loads dropped DLL
- Drops file in Windows directory
- Modifies data under HKEY_USERS
PID:1340
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 3e0 -InterruptEvent 3c0 -NGENProcess 3d8 -Pipe 370 -Comment "NGen Worker Process"2⤵
- Modifies data under HKEY_USERS
PID:2712
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 3c0 -InterruptEvent 3e8 -NGENProcess 3a8 -Pipe 3d0 -Comment "NGen Worker Process"2⤵
- Loads dropped DLL
- Drops file in Windows directory
- Modifies data under HKEY_USERS
PID:468
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 3e8 -InterruptEvent 3a8 -NGENProcess 3e0 -Pipe 3e4 -Comment "NGen Worker Process"2⤵
- Modifies data under HKEY_USERS
PID:2784
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 3a8 -InterruptEvent 3f0 -NGENProcess 3d8 -Pipe 3dc -Comment "NGen Worker Process"2⤵
- Loads dropped DLL
- Drops file in Windows directory
- Modifies data under HKEY_USERS
PID:2636
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 3cc -InterruptEvent 3e8 -NGENProcess 3f4 -Pipe 3a8 -Comment "NGen Worker Process"2⤵PID:1408
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 3e8 -InterruptEvent 3c0 -NGENProcess 3d8 -Pipe 3b4 -Comment "NGen Worker Process"2⤵
- Loads dropped DLL
- Drops file in Windows directory
PID:2956
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 3c0 -InterruptEvent 3d8 -NGENProcess 3cc -Pipe 3f0 -Comment "NGen Worker Process"2⤵
- Modifies data under HKEY_USERS
PID:1440
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 3d8 -InterruptEvent 3fc -NGENProcess 3f4 -Pipe 134 -Comment "NGen Worker Process"2⤵
- Loads dropped DLL
- Modifies data under HKEY_USERS
PID:1256
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 3fc -InterruptEvent 3d8 -NGENProcess 3f8 -Pipe 3e0 -Comment "NGen Worker Process"2⤵PID:484
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 408 -InterruptEvent 3f8 -NGENProcess 3d8 -Pipe 3ec -Comment "NGen Worker Process"2⤵PID:2952
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 3f8 -InterruptEvent 414 -NGENProcess 3cc -Pipe 410 -Comment "NGen Worker Process"2⤵PID:1036
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 414 -InterruptEvent 418 -NGENProcess 3c0 -Pipe 3d4 -Comment "NGen Worker Process"2⤵PID:1080
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 3c0 -InterruptEvent 41c -NGENProcess 414 -Pipe 418 -Comment "NGen Worker Process"2⤵PID:1696
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 41c -InterruptEvent 420 -NGENProcess 3cc -Pipe 3e8 -Comment "NGen Worker Process"2⤵PID:376
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 420 -InterruptEvent 424 -NGENProcess 3d8 -Pipe 408 -Comment "NGen Worker Process"2⤵PID:1428
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵
- Executes dropped EXE
PID:1628
-
C:\Windows\system32\IEEtwCollector.exeC:\Windows\system32\IEEtwCollector.exe /V1⤵
- Executes dropped EXE
PID:2616
-
C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"1⤵
- Executes dropped EXE
PID:484
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
636KB
MD5286184ce6a865747266ba04f5f75755f
SHA19e022ec95371bfc8cb1c7fbb6253f18ff8035daa
SHA256bc90f7d42627590b6c81f138611c0c496dde436c281ba2c81c7a2f9104148313
SHA512bdc67de16cb4889954f43d0dc765d5bde6c9941794c5e1d890cbe8fa20abd3e41c8ce084d4510d80ebab44c26d3f396ad5b3b0b68299207d8bb899e3c6bac973
-
Filesize
1.5MB
MD5e93321722a80a8f69d858db5c744311a
SHA1e31180dd824eedb4523e5492954e57cc6f176510
SHA2568ad7fd6bcfda7bc823cdc581899c0a1789abf1cc3d5585c88ae9f059ef6c1f0f
SHA512b0bd71dfb30338ac5a8bd2ef345647ce42eb29f12e592f28a46f86ca9a53ea9dec98a4052138c26ca70193d3bbd42a60a58221b30b565f21d9131e67d12322c7
-
Filesize
4.8MB
MD5cc0fec4b2a24973cd56f61d576042ca8
SHA169f252cd76f8b5d0cf4e58c5ffdbc666500d4aee
SHA256a801a99c891f9d30a1d9a3b6147cf1f9cf46ffdbaa418cdf00ab2d61c8fb372e
SHA512721a6d3c01519b76ee43620e577a3c78a53056b280e6327abf6bbbc6eb9b4617e518e7210d454e96ea774127e691d6fb31e1f29c2a05a9cbd548104ba2ce88fb
-
Filesize
1.2MB
MD54ef545f6162292b52886ec64ca2987ef
SHA17933126df8c5565f78f579bfae89cd4431d38607
SHA2565d0f45d3fc8c49e0c9c2d98174343a1224417ab8fc76de241ba94c96dcad837c
SHA512039241dec8f7c4e8920bae8e813ee5ae0115550afa6896717e40df925df9a55927c00f1c97da7c684b4a921281be338a7ef83f5d17643737f96d015d43ecaff8
-
Filesize
872KB
MD593adda41b98c8c7e0a5f1bb019687251
SHA1a1423ad3ac339dd7ba28b2346e2e53b945307f51
SHA256039a4366f5f9f1c366999a9e9cbb7454e2a07e413336c06b517f38e0719b10a1
SHA5129d9c007055c851138ca65d1445e7a2c737bc65f150359e913dbeb3f267deda0473758a560bdefa39ff36cb86219bc583ec94bf9db34521e3aedca92a86070a2c
-
Filesize
610KB
MD53baab8ff2697d15fba676548e3d4ee8b
SHA115aa646e22c62bf0b4801ae5758f2d4add75528a
SHA256dfd7d94596467dfb90203f8a64a90d13d08d89a7b88a8dd1f7790560ab15b9f0
SHA512e2e6273032fdf637c7341a9c573723d0a1d140bb3a8eb0116192e5214b289e7bef4676186ae076397f3d0507a90694bcc2af50d8d72b58b4888f13d94ce48aa2
-
Filesize
4KB
MD59314cc9f9cc89519c39ff3dbdec5b72f
SHA10522b2f770aa3c36eee5b6a58d06c278f0f619f8
SHA2565398423ecc303a7ec4892352d798a3529e76be2abfd589699133e881f60ad5cf
SHA512d5415d91a7c8eada31d24e271c13feeb12bd6224739db2e7ce6ca81d6308843a96e1315496564b07ba546f541b24c080a80c828d3582483e7c0d16f8a0e48e3a
-
Filesize
555KB
MD5c552892db62e2b0bc5764fad63087037
SHA19f558bf25d002cf46103528d3041e7bbad3fa6b6
SHA256dfb86e88f6470a425204b29345c2b6fa99a84d9526b4f5c0e9809a0e95f697f6
SHA512d52bf5d97f3b8fb5fee99722145b5fc74a8e3f7fe348753d41e7501e2b20d5ad2b3a947600ab45b63d4262cc2699327a90e872fbbd5f0e6ccb92b741b2b7f9d9
-
Filesize
1003KB
MD58f58b351f58e4056b5e7004c30f29337
SHA1f6bf70ee0c6a157bc5dd3b9c893de0701d93b415
SHA256f2b527a36f6ae1579b0c662a62bef6db0753f1b3fd1e0aed47f14eea0c15adb2
SHA51230dd64e96911cb4a1cd865839935aafdf1656820b7e4e320b99023c982c179209194c7082a7d4b5bc99e3e4e6ef0b64e14c5ab8b4a99c17f203f7513fe567f0a
-
Filesize
586KB
MD55025fbb0f9732abac04a84fa6ff28b06
SHA10fcfec4f256d52511f944c4de045344bed4e3a3e
SHA256ec4715933a25cbaa33172de434bf979d5dea1a8b0a5b2ca545b8269f074a216e
SHA51277b0f5f3a369a216ce3ac9d4e61c29112691c4015f24780718eb62b6ef3dc48568de93b5597318939f260761d255c08509a7c3a87e34dfb7ab8473aad336239a
-
Filesize
609KB
MD57736e3feb86d69aa67988ccb5e67c5f9
SHA1efd4b0a599dafcc9ae95f722f2a6da8586b0b528
SHA256c5ea98b093b22f9df306e8be066a7b2ad487e03170b9c87bacbe13d1176a86c4
SHA512ecd8f57c37e01837ff48e3f8d88f81fc8b11d3b2c66e3423631ab5d01d34803abeb9710e7ed695d9a79f87b2f9c9abd3a1bbbfc8f669ed903dd753fd3288e790
-
Filesize
29KB
MD5d59a6b36c5a94916241a3ead50222b6f
SHA1e274e9486d318c383bc4b9812844ba56f0cff3c6
SHA256a38d01d3f024e626d579cf052ac3bd4260bb00c34bc6085977a5f4135ab09b53
SHA51217012307955fef045e7c13bf0613bd40df27c29778ba6572640b76c18d379e02dc478e855c9276737363d0ad09b9a94f2adaa85da9c77ebb3c2d427aa68e2489
-
Filesize
81KB
MD5b13f51572f55a2d31ed9f266d581e9ea
SHA17eef3111b878e159e520f34410ad87adecf0ca92
SHA256725980edc240c928bec5a5f743fdabeee1692144da7091cf836dc7d0997cef15
SHA512f437202723b2817f2fef64b53d4eb67f782bdc61884c0c1890b46deca7ca63313ee2ad093428481f94edfcecd9c77da6e72b604998f7d551af959dbd6915809c
-
C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft-Windows-H#\a46df77acafec60e31859608625e6354\Microsoft-Windows-HomeGroupDiagnostic.NetListMgr.Interop.ni.dll
Filesize105KB
MD5d9c0055c0c93a681947027f5282d5dcd
SHA19bd104f4d6bd68d09ae2a55b1ffc30673850780f
SHA256dc7eb30a161a2f747238c8621adb963b50227a596d802b5f9110650357f7f7ed
SHA5125404050caa320cdb48a6ccd34282c12788ee8db4e00397dde936cee00e297e9e438dcaa5fcb4e92525f167637b500db074ac91971d4730d222ac4713a3e7b930
-
C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft.Office.To#\11940d5133d63001fa4499c315655e15\Microsoft.Office.Tools.Word.v9.0.ni.dll
Filesize1.1MB
MD57835e60e560a49049ae728698da3d301
SHA187b357b1b3c9a2ad2f3b89b10a42af021ab76afe
SHA256df34cbc18c66aa387324c45196d71ebe7c91a83fbbdc91766f9f47330a0cb2fa
SHA512b95c33a2746a331e4416f7449c8ab613ba16c716a449e446d825f34dfaf754ea7562bf77cf5a73a78599e0b67a3a697437baa9aa516e40e06981693c8ea5b993
-
C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft.Office.To#\6337d25ea4dd40045a047cb662ee4394\Microsoft.Office.Tools.Outlook.v9.0.ni.dll
Filesize238KB
MD50a4ed78b7995d94fa42379f84cd5f8e9
SHA190ba188fe0ebd38ad225e7ce3a24dd9b6b68056b
SHA2560a75d0d332692cc36d539abdd36f3ff5ef2ab786a9404548ca6c98fd566c4d86
SHA51286ac346de836aa6dd7e017ff4329803c9165758dcfe3aa1881e46ca73e15e6cdb269fcc5b082d717774666f9bc40051a47b5261bfe73901804eb4b0bfacd1184
-
C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft.Office.To#\dc8ba97b4a8deefeb1efac60e1bdb693\Microsoft.Office.Tools.Excel.v9.0.ni.dll
Filesize1.8MB
MD59958f23efa2a86f8195f11054f94189a
SHA178ec93b44569ea7ebce452765568da5c73511931
SHA2563235e629454949220524dd976bec494f7cc4c9abeaf3ee63fc430cbe4fbcf7b6
SHA5123061f8de0abf4b2b37fbc5b930663414499fb6127e2892fe0a0f3dfba6da3927e6caa7bcba31d05faee717d271ecf277607070452701a140dc7d3d4b8d0bfeb1
-
C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft.Office.To#\dd4deeafd891c39e6eb4a2daaafa9124\Microsoft.Office.Tools.Common.v9.0.ni.dll
Filesize1.0MB
MD5598a06ea8f1611a24f86bc0bef0f547e
SHA15a4401a54aa6cd5d8fd883702467879fb5823e37
SHA256e55484d4fe504e02cc49fde33622d1a00cdae29266775dcb7c850203d5ed2512
SHA512774e6facd3c56d1c700d9f97ee2e678d06b17e0493e8dc347be22bcba361bd6225caef702e53f0b08cacc9e6a4c4556280b43d96c928642266286f4dec8b5570
-
C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft.VisualStu#\077a55be734d6ef6e2de59fa7325dac5\Microsoft.VisualStudio.Tools.Office.Contract.v9.0.ni.dll
Filesize205KB
MD50a41e63195a60814fe770be368b4992f
SHA1d826fd4e4d1c9256abd6c59ce8adb6074958a3e7
SHA2564a8ccb522a4076bcd5f217437c195b43914ea26da18096695ee689355e2740e1
SHA5121c916165eb5a2e30d4c6a67f2023ab5df4e393e22d9d8123aa5b9b8522fdb5dfe539bcb772a6e55219b23d865ee1438d066e78f0cb138a4a61cc2a1cecf54728
-
C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft.VisualStu#\20e831c14ae9c0dd57549d3e327dd835\Microsoft.VisualStudio.Tools.Office.Excel.HostAdapter.v10.0.ni.dll
Filesize271KB
MD574481975257f3f65d120c41c7a1ac650
SHA1f24a6a93eedae97089b7aae9bf082f58646c9c9e
SHA2560c0432b6c4e4516bbafb1eb4c1745a01c3404bd816f2e5a6cd5e532696a39e46
SHA512a8a4712ba389447b19733efadede64e3ae497d0f22dedcfd60688fb23cad81db1d122f6c680beb76e4a731e7f810d74513ca43b9cdac821ad75f13f0bd339d39
-
C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft.VisualStu#\2951791a1aa22719b6fdcb816f7e6c04\Microsoft.VisualStudio.Tools.Office.Contract.v10.0.ni.dll
Filesize43KB
MD568c51bcdc03e97a119431061273f045a
SHA16ecba97b7be73bf465adf3aa1d6798fedcc1e435
SHA2564a3aa6bd2a02778759886aaa884d1e8e4a089a1e0578c973fcb4fc885901ebaf
SHA512d71d6275c6f389f6b7becb54cb489da149f614454ae739e95c33a32ed805820bef14c98724882c4ebb51b4705f41b3cdb5a8ed134411011087774cac6e9d23e8
-
C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft.VisualStu#\369a81b278211f8d96a305e918172713\Microsoft.VisualStudio.Tools.Applications.Runtime.v9.0.ni.dll
Filesize198KB
MD59d9305a1998234e5a8f7047e1d8c0efe
SHA1ba7e589d4943cd4fc9f26c55e83c77559e7337a8
SHA256469ff9727392795925c7fe5625afcf508ba07e145c7940e4a12dbd6f14afc268
SHA51258b8cc718ae1a72a9d596f7779aeb0d5492a19e5d668828fd6cff1aa37181cc62878799b4c97beec9c71c67a0c215162ff544b2417f6017cd892a1ce64f7878c
-
C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft.VisualStu#\4e0fee89cd97376182cd9a82ec9909c9\Microsoft.VisualStudio.Tools.Office.HostAdapter.v10.0.ni.dll
Filesize221KB
MD528b531c1785a20b8f2cc09ec67f1ad0f
SHA1d6d440672c0eea318b1454aa015d29fe18e4c13d
SHA256abc65669e06b79ee0a8056284132ea3770a4a2e1583c6248a3bc201700cd5ab4
SHA512b16f6408fbeb6b3b2e14c36a3531e824224ab9d8835a7ad2fdd3724016e7f8c1d70143667120de473e7fb0235f69545ac38b90e8b4d92cca6224175346b57489
-
C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft.VisualStu#\6e100177db1ef25970ca4a9eba03c352\Microsoft.VisualStudio.Tools.Applications.Contract.v9.0.ni.dll
Filesize70KB
MD557b601497b76f8cd4f0486d8c8bf918e
SHA1da797c446d4ca5a328f6322219f14efe90a5be54
SHA2561380d349abb6d461254118591637c8198859d8aadfdb098b8d532fdc4d776e2d
SHA5121347793a9dbff305975f4717afa9ee56443bc48586d35a64e8a375535fa9e0f6333e13c2267d5dbb7fe868aa863b23034a2e655dcd68b59dca75f17a4cbc1850
-
C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft.VisualStu#\9e076728e51ab285a8bc0f0b0a226e2c\Microsoft.VisualStudio.Tools.Applications.HostAdapter.v10.0.ni.dll
Filesize82KB
MD52eeeff61d87428ae7a2e651822adfdc4
SHA166f3811045a785626e6e1ea7bab7e42262f4c4c1
SHA25637f2ee9f8794df6d51a678c62b4838463a724fdf1bd65277cd41feaf2e6c9047
SHA512cadf3a04aa6dc2b6b781c292d73e195be5032b755616f4b49c6bdde8b3ae297519fc255b0a46280b60aaf45d4dedb9b828d33f1400792b87074f01bbab19e41a
-
C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft.VisualStu#\9e821315a3dc3dc0dcc53007ab21f49a\Microsoft.VisualStudio.Tools.Office.Word.HostAdapter.v10.0.ni.dll
Filesize305KB
MD54463b03940e9be3fdf7952b3a36d9fcb
SHA1ea32f1c421ed14d6b8369e033545704795eb26c4
SHA256970a57e14179a55510d7fcd43c9f2588a7afb37c18763c762fc2a5dd42d5feb8
SHA51287bb0302e0e296d145a807348a6dcbbbf56872baa97f8a74361e631457e4d0103e674e24c657e805e2602e5e17cc9d9c106984895d1181cbb113277e18d1e9a4
-
C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft.VisualStu#\d62d09fe2e77c9fd092fc2237ba43872\Microsoft.VisualStudio.Tools.Office.Outlook.HostAdapter.v10.0.ni.dll
Filesize122KB
MD5ce346d9f706fe2595faf67185f4b2aa6
SHA12d64078d7806f161da0954f7bf1e4481a2e5af89
SHA25641865af9c0bc25008cc850fb85c0db7a358408153b6b524d0af787749966eb13
SHA5126d3b5b1d5805ce4a90e51b85af16196935bdb9ab1c5fb1f06f5ff929e693fb7409005d5761798b342bccdbd6bcc5019d92fa7c49a16fbb953a63377920263636
-
C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft.VisualStu#\fe8d06712eb58d0150803744020b072a\Microsoft.VisualStudio.Tools.Applications.Contract.v10.0.ni.dll
Filesize43KB
MD5dd1dfa421035fdfb6fd96d301a8c3d96
SHA1d535030ad8d53d57f45bc14c7c7b69efd929efb3
SHA256f71293fe6cf29af54d61bd2070df0a5ff17a661baf1b0b6c1d3393fd23ccd30c
SHA5128e0f2bee9801a4eba974132811d7274e52e6e17ccd60e8b3f74959994f007bdb0c60eb9facb6321c0fdfbcc44e9a77d8c5c776d998ccce256fa864338a6f63b1
-
C:\Windows\assembly\NativeImages_v2.0.50727_64\ehiActivScp\ee22f412f6314443add3ca412afd6569\ehiActivScp.ni.dll
Filesize124KB
MD5929653b5b019b4555b25d55e6bf9987b
SHA1993844805819ee445ff8136ee38c1aee70de3180
SHA2562766353ca5c6a87169474692562282005905f1ca82eaa08e08223fc084dbb9a2
SHA512effc809cca6170575efa7b4b23af9c49712ee9a7aaffd8f3a954c2d293be5be2cf3c388df4af2043f82b9b2ea041acdbb9d7ddd99a2fc744cce95cf4d820d013
-
C:\Windows\assembly\NativeImages_v2.0.50727_64\ehiVidCtl\11d57f5c033326954c0bc4f0b2680812\ehiVidCtl.ni.dll
Filesize2.1MB
MD510b5a285eafccdd35390bb49861657e7
SHA162c05a4380e68418463529298058f3d2de19660d
SHA2565f3bb3296ab50050e6b4ea7e95caa937720689db735c70309e5603a778be3a9a
SHA51219ff9ac75f80814ed5124adc25fc2a6d1d7b825c770e1edb8f5b6990e44f9d2d0c1c0ed75b984e729709d603350055e5a543993a80033367810c417864df1452
-
C:\Windows\assembly\NativeImages_v2.0.50727_64\stdole\70f1aed4a280583cbd09e0f5d9bbc1f5\stdole.ni.dll
Filesize88KB
MD51f394b5ca6924de6d9dbfb0e90ea50ef
SHA14e2caa5e98531c6fbf5728f4ae4d90a1ad150920
SHA2569db0e4933b95ad289129c91cd9e14a0c530f42b55e8c92dc8c881bc3dd40b998
SHA512e27ea0f7b59d41a85547d607ae3c05f32ce19fa5d008c8eaf11d0c253a73af3cfa6df25e3ee7f3920cd775e1a3a2db934e5891b4aafd4270d65a727b439f7476
-
Filesize
636KB
MD5014b7ed2306a784ce52cd3fdcbd0a587
SHA19daa52ee884b48f7f6fdd38d6c959603e8eb73db
SHA25660e308d85f905ba832ce34070a00c39614422e2ba4891ae0cee7d59360819910
SHA5123497ebb75fa2a349e8b4f347a7610083c31ff924c6aadc832ef48dd9009805154806d022a4caf9cc84a20b7336afb7507d88c925fe1ddfbe929cb07ad4ba973f
-
Filesize
30.0MB
MD5fd14f81d2e384f067df6bfd2d9ad9401
SHA107706dbc6c2b8c3a7ef00c4e7a2de9b2e8efc53c
SHA2560e7a400430adcdd77d3ce7f4cd4368f653bd04bf1873b4c2fb923ecd3225d63a
SHA512424760acdaadb9362c2fbedfd37d977fdc970dd61e554306ae37280ab7aa11aca957780cacace50ec92ec10c0a19326db370e1e5ae87eb5170ad0d37f8bb273d
-
Filesize
624KB
MD5e065f60653bce6ee5176f4060b1a5368
SHA17e74782598c0eb5bd2efca2f514324f15f771cd6
SHA256102403f32f089f5c3b079e9604e543c65e716403ecb04e86eec1098dcd80f429
SHA512d16ed883e9b13475986544cfed06b61a9ec9d0b57f8adfbff5be782971336f671653526c705bd7e5a353a1163815ede586ac025995d3ca6abba1063784d73b2c
-
Filesize
536KB
MD5df19604512428f7be012f32fb73494fa
SHA13108509a36a361a1d6f3a20f1615f035609b30b1
SHA2560f3d3c241e2546538cd86bf83346634ca00a334f950a8f6f9d2986ed05587dbf
SHA51219175b202c039371048c6434d07700afcbfd60a86126a3a35ddf537890043b70da688c397fbb55f05fb984637c7b89fdfe574619e7f938fa2528e44af47fceb5
-
Filesize
577KB
MD55fddb9a73c661e1c0eb4feb63c0ba11d
SHA12cce91ca11e93a286d3521f59e625216b14cea1f
SHA256cdfdd57f0ce2cd025bff28eea3c67bbc8589c160d4f7fe6dfbde839596cf2fe9
SHA51264b218a720357a3939818a6341e4d931e7d4c19ec655a6cf376337323129577b19462258f509ccf93a128acf85161818c6b1a07b23d54364f605bc9ca8500452
-
Filesize
1.1MB
MD525628a74db1891c34d6e01af5006e066
SHA1561209e3074a5de401f9fc8f430efe14b54aaa7e
SHA256958c02d43d7e78501cf914a4997614bffce6aee7aec9a6ec79906df794e6d245
SHA512849807a292366e2a0168f75b111069c97943dc24eac94ef807a681781763626aa0de4e5048309eef4ab0177d08a98265ee576afe4af17c1f03967c6e5d0dfe26
-
Filesize
638KB
MD592fbb2b4777aea0d99fe2857c69038e3
SHA16172a71ea3a6ac24ee0a2bc77e2fea7bf4e22630
SHA256ce8af9b5e75ae66c608d09da45bac6264561c348a5ee7c932e9090f6f878f37d
SHA512019c29b8d5b33f99d034062e6d9d677a3e4f625331bb8d20c861c8bc4c1530c00b5bf03d990e5c111f28a15398b26a6d78bc8ab1e3af6b293d75069eaf3df489
-
Filesize
625KB
MD59a14c5b5309454a9f4c1028e401affe2
SHA127e40cde9aba96abf8d579029721d52e219affb8
SHA2563b116e150e6070cd697115fa6e41d451b75b622a3e310dc409d6bd9827c6508f
SHA5125e9ac33794ca53340626ad0995878f28f93d3b28d7435c0f198bb5a103f882b2c27cc919f455987c78553fc98db3d9bca1961a44991f34023fd8026750b2309d
-
Filesize
514KB
MD55a44ee451825cb6431c97d885a8ef21c
SHA12758061bbbe10931ac2ff865f9a29c8cb4445354
SHA2560ee462f90c56e7842626bc38e9e5f4778da179a7cb4c7234c3b96c46f65cef54
SHA51267e5fed1f3628555c0336e58f67e8992f1f51049c3f40a089a5bd000c3abf9adac1f1eda6c4ba912b12889a64e70dbdfe1f16f984642a7a617dbbc536cf2b3d0
-
Filesize
540KB
MD58b6b6fa0dc7ef8c1656948d6176d0045
SHA1f85a1d82a829a6b5ee21e9169e895202c6f81136
SHA256da9784eb46a7350b21fcff841d175e75856a1b284416ba25ab4589b85a183ccf
SHA512f36af546a69b4149d98ed13bf224a12d4c4c1f35239e1f501c2d8020d707fad8f2bcb01c47b247b99be31aa0b4f3901c7f11869f1545ffd971a1dc47abef624c
-
Filesize
1021KB
MD57dd7799c65aeb3f26b98ad63c2f59f88
SHA127be8dafa3b1b0edd279974072914802c5504bd5
SHA256a4b64e26dd3062e7f60698d50909a864003010d07e3182c5094b3c60d3dfabf7
SHA5129be892c004fc8c8e91f3276304e9c38108620c411ce6427b8bbae2bde20f3b3a8a845729a190e62d80413d284dbaf404f298bf5775973fea48bbbb99f8e6d0e4
-
Filesize
2.0MB
MD57dd3ebe3be303ac37fbae8d2a428142e
SHA194f4a2e39a5e6d65a52fcf444a53091191cd2c91
SHA25645f84090afaa5b884d8bce87c357cbb8424b187d897cb42c4efab4afd82ba131
SHA512455339f34eda5ef0f228bd5d602620494079fbb27e54cda4c002991fb5463a9e1eda2fcaf4c00cde30a107a8c13dce46d38d9391830631da4c99a563b92efff0
-
Filesize
698KB
MD5d9b2013e0afcdffb8475af0b02c5813d
SHA1b367b5aabf90e99bf950fe001debfcbf89e985cc
SHA256ed316bfcf344bf98bbf9a63003d2451c3560039578d859f7a9314a01d4a7a3af
SHA5129ac0cfc446ab044c8bdde3654eff65eef2c4b840024284a9507bb4ebb096c6ca498ff1d800e68d4bad656ccff0658b45029f82134e4a7f08bce3fcd8a1f5e2b4
-
Filesize
1.9MB
MD52e8edb885d1a46f48ee49ac9a0332e83
SHA1f776025f624c0b05d089484a19ba0cd75a6c13a7
SHA25646d36ac5d0779c3957a3186c6bcb9df17b98af63d52ddb03b0efaec7a0ea16e2
SHA5125465c2261801c2618415bacc809b2120a62631d010805f35f45aa0be8b8bebdf2abf32362b3251cab419320953839d18c379b6b6bff1bafb52eb7d25cd95b58b
-
Filesize
715KB
MD5609a6e5571e0f2eb2c7c7df3c20dec54
SHA149b9282555bed7f182aec3c7622d928759159df9
SHA2566b21d50981dd470030d7aea51b741852c454cb0d56b4c6dd3b76b6935d4e0109
SHA512321047539d88fa80905233b50aa0bcc5d875d261885d9fdb898c41b073523d4e2d9d5bc52856f3dbd64b84829454f395a2ccb8ac9bc1fc38287907d791be1a27
-
Filesize
2.1MB
MD55497e6b053fe834814ab5bc8656e463f
SHA140786141b419a20c9ab17c6b78bf4e67af6d0434
SHA2567c0a6c3b7a629da16fc935c4e2cf35d8847e25871f6e3dd63bd6e971f21865c1
SHA5127daf8018e32ad2df44440988ed74a85ff3ebca9bbeca517c2f488a52aaca8567027e8e88b452792a68f453a2273032eea5d336dde5afaa38fedf7a358df8acfb
-
Filesize
582KB
MD584737f0da8740130e6493e9972234ebb
SHA13ecfb765893733c8a18a52dae5773e7ce7897413
SHA2560415d0daaff7e9b05599e8d716fb817476ff25705f06ae2a735ead598b6f65dc
SHA5127f4b935ce8b00fb117749ef4ba2828025b5d6ac69eec3c4135a8ad64a5b401c71715ebbb7017ce4029166bb69d3dd206a3d447b07eef3ebfcd78efdb1c228f8f
-
\Windows\assembly\NativeImages_v2.0.50727_64\Temp\ZAP425D.tmp\Microsoft.VisualStudio.Tools.Applications.AddInAdapter.v9.0.dll
Filesize85KB
MD55180107f98e16bdca63e67e7e3169d22
SHA1dd2e82756dcda2f5a82125c4d743b4349955068d
SHA256d0658cbf473ef3666c758d28a1c4bcdcb25b2e515ad5251127d0906e65938f01
SHA51227d785971c28181cf9115ab14de066931c4d81f8d357ea8b9eabfe0f70bd5848023b69948ac6a586989e892bcde40999f8895a0bd2e7a28bac7f2fa64bb22363
-
\Windows\assembly\NativeImages_v2.0.50727_64\Temp\ZAP4588.tmp\Microsoft.VisualStudio.Tools.Office.AddInAdapter.v9.0.dll
Filesize298KB
MD55fd34a21f44ccbeda1bf502aa162a96a
SHA11f3b1286c01dea47be5e65cb72956a2355e1ae5e
SHA2565d88539a1b7be77e11fe33572606c1093c54a80eea8bd3662f2ef5078a35ce01
SHA51258c3904cd1a06fbd3a432b3b927e189a744282cc105eda6f0d7f406971ccbc942c7403c2dcbb2d042981cf53419ca5e2cf4d9f57175e45cc5c484b0c121bb125
-
\Windows\assembly\NativeImages_v2.0.50727_64\Temp\ZAP498E.tmp\Microsoft.VisualStudio.Tools.Office.Excel.AddInAdapter.v9.0.dll
Filesize58KB
MD53d6987fc36386537669f2450761cdd9d
SHA17a35de593dce75d1cb6a50c68c96f200a93eb0c9
SHA25634c0302fcf7d2237f914aaa484b24f5a222745f21f5b5806b9c519538665d9cb
SHA5121d74371f0b6c68ead18b083c08b7e44fcaf930a16e0641ad6cd8d8defb4bde838377741e5b827f7f05d4f0ad4550b509ba6dff787f51fc6830d8f2c88dbf0e11
-
\Windows\assembly\NativeImages_v2.0.50727_64\Temp\ZAP4CAA.tmp\Microsoft.VisualStudio.Tools.Office.Word.AddInAdapter.v9.0.dll
Filesize58KB
MD5a8b651d9ae89d5e790ab8357edebbffe
SHA1500cff2ba14e4c86c25c045a51aec8aa6e62d796
SHA2561c8239c49fb10c715b52e60afd0e6668592806ef447ad0c52599231f995a95d7
SHA512b4d87ee520353113bb5cf242a855057627fde9f79b74031ba11d5feee1a371612154940037954cd1e411da0c102f616be72617a583512420fd1fc743541a10ce
-
Filesize
248KB
MD54bbf44ea6ee52d7af8e58ea9c0caa120
SHA1f7dcafcf850b4081b61ec7d313d7ec35d6ac66d2
SHA256c89c478c2d7134cd28b3d28d4216ad6aa41de3edd9d87a227ec19cf1cbf3fb08
SHA512c82356750a03bd6f92f03c67acdd5e1085fbd70533a8b314ae54676f37762d9ca5fa91574529b147d3e1c983bf042106b75f41206f5ddc37094a5e1c327c0fd3
-
\Windows\assembly\NativeImages_v2.0.50727_64\Temp\ZAP533F.tmp\Microsoft.VisualStudio.Tools.Applications.Runtime.v10.0.dll
Filesize87KB
MD5ed5c3f3402e320a8b4c6a33245a687d1
SHA14da11c966616583a817e98f7ee6fce6cde381dae
SHA256b58d8890d884e60af0124555472e23dee55905e678ec9506a3fbe00fffab0a88
SHA512d664b1f9f37c50d0e730a25ff7b79618f1ca99a0f1df0b32a4c82c95b2d15b6ef04ce5560db7407c6c3d2dff70514dac77cb0598f6d32b25362ae83fedb2bc2a