Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    27-03-2023 07:20

General

  • Target

    QUOTATION _RFQ# 1043999.exe

  • Size

    1.1MB

  • MD5

    e3b24ec113f20b978b0219371f76ccb3

  • SHA1

    fe3812e07afa7def4224a68a8a3d5db849997e94

  • SHA256

    d1a8dddd0be7a7932b576b395adf6c8a3ab4796420b0f967c39d6ffe65604807

  • SHA512

    aa0b97ad2db777fccb44e087fd986b4f0c3d00175315397c2cc343c45d169a031f0587c033aedcd14918cc1e6d6af41dec697771ac4ca36c517e23b860a67f1b

  • SSDEEP

    24576:DYpFDsStI/zStNEjHMjT9MVNRQSXnhRafrMO9RRH:s8+IutNEcARF+fTD9

Malware Config

Extracted

Family

blustealer

C2

https://api.telegram.org/bot5797428905:AAGaRRXGZN1d9GGFd3sE5x4uSpCGF0PU4m4/sendMessage?chat_id=1251788325

Signatures

  • BluStealer

    A Modular information stealer written in Visual Basic.

  • Executes dropped EXE 64 IoCs
  • Loads dropped DLL 51 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Drops file in System32 directory 19 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 26 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of SetWindowsHookEx 15 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\QUOTATION _RFQ# 1043999.exe
    "C:\Users\Admin\AppData\Local\Temp\QUOTATION _RFQ# 1043999.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1760
    • C:\Users\Admin\AppData\Local\Temp\mwmyjwne.exe
      "C:\Users\Admin\AppData\Local\Temp\mwmyjwne.exe" C:\Users\Admin\AppData\Local\Temp\hbgistyk.l
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:796
      • C:\Users\Admin\AppData\Local\Temp\mwmyjwne.exe
        "C:\Users\Admin\AppData\Local\Temp\mwmyjwne.exe"
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Suspicious use of SetThreadContext
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:328
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
          C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
          4⤵
          • Accesses Microsoft Outlook profiles
          • outlook_office_path
          • outlook_win_path
          PID:1136
  • C:\Windows\System32\alg.exe
    C:\Windows\System32\alg.exe
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:1808
  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe
    C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe
    1⤵
    • Executes dropped EXE
    PID:1032
  • C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe
    C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe
    1⤵
    • Executes dropped EXE
    • Drops file in Windows directory
    PID:1628
  • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe
    C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe
    1⤵
    • Executes dropped EXE
    • Drops file in Windows directory
    PID:1720
  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
    C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
    1⤵
    • Executes dropped EXE
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:956
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1ec -InterruptEvent 1d8 -NGENProcess 1dc -Pipe 1e8 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2188
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1e4 -InterruptEvent 250 -NGENProcess 258 -Pipe 25c -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2328
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 244 -InterruptEvent 1e4 -NGENProcess 248 -Pipe 258 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2528
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 260 -InterruptEvent 1e4 -NGENProcess 244 -Pipe 24c -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2912
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1e4 -InterruptEvent 240 -NGENProcess 248 -Pipe 1ec -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2128
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 268 -InterruptEvent 260 -NGENProcess 26c -Pipe 1e4 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2344
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 260 -InterruptEvent 270 -NGENProcess 248 -Pipe 1dc -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:3048
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 274 -InterruptEvent 268 -NGENProcess 278 -Pipe 244 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2612
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 268 -InterruptEvent 264 -NGENProcess 260 -Pipe 240 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:3000
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 264 -InterruptEvent 280 -NGENProcess 250 -Pipe 27c -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2208
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 268 -InterruptEvent 1d8 -NGENProcess 254 -Pipe 248 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:1472
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1d8 -InterruptEvent 278 -NGENProcess 288 -Pipe 260 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2564
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 278 -InterruptEvent 270 -NGENProcess 250 -Pipe 284 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:1624
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 270 -InterruptEvent 26c -NGENProcess 280 -Pipe 264 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2888
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 28c -InterruptEvent 278 -NGENProcess 290 -Pipe 270 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2380
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 278 -InterruptEvent 274 -NGENProcess 280 -Pipe 268 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2100
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 294 -InterruptEvent 28c -NGENProcess 298 -Pipe 278 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2220
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 28c -InterruptEvent 254 -NGENProcess 280 -Pipe 1d8 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2656
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 254 -InterruptEvent 2a0 -NGENProcess 290 -Pipe 29c -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2832
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2a0 -InterruptEvent 290 -NGENProcess 294 -Pipe 2a8 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:3016
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 250 -InterruptEvent 290 -NGENProcess 2a0 -Pipe 2a4 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2908
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 298 -InterruptEvent 290 -NGENProcess 250 -Pipe 294 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2520
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 288 -InterruptEvent 2ac -NGENProcess 2b4 -Pipe 298 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2412
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 294 -InterruptEvent 1f0 -NGENProcess 1fc -Pipe 2a4 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:1756
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1f0 -InterruptEvent 1ec -NGENProcess 29c -Pipe 1e4 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2236
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 24c -InterruptEvent 1ec -NGENProcess 1f0 -Pipe 240 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:784
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1dc -InterruptEvent 1ec -NGENProcess 24c -Pipe 29c -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2716
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 27c -InterruptEvent 1ec -NGENProcess 1dc -Pipe 1f0 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Windows directory
      PID:2744
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1ec -InterruptEvent 230 -NGENProcess 1dc -Pipe 258 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2696
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2ac -InterruptEvent 230 -NGENProcess 1ec -Pipe 1c8 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Windows directory
      PID:316
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1d4 -InterruptEvent 24c -NGENProcess 2b0 -Pipe 2ac -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2084
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 25c -InterruptEvent 24c -NGENProcess 1d4 -Pipe 1ec -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Windows directory
      PID:2612
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2b0 -InterruptEvent 280 -NGENProcess 24c -Pipe 250 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:1960
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 294 -InterruptEvent 280 -NGENProcess 2b0 -Pipe 288 -Comment "NGen Worker Process"
      2⤵
      • Loads dropped DLL
      • Drops file in Windows directory
      PID:2344
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1dc -InterruptEvent 220 -NGENProcess 2a0 -Pipe 294 -Comment "NGen Worker Process"
      2⤵
        PID:2180
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1d4 -InterruptEvent 220 -NGENProcess 1dc -Pipe 2b0 -Comment "NGen Worker Process"
        2⤵
        • Loads dropped DLL
        • Drops file in Windows directory
        PID:2468
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 230 -InterruptEvent 244 -NGENProcess 274 -Pipe 1d4 -Comment "NGen Worker Process"
        2⤵
          PID:2076
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
          C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1fc -InterruptEvent 244 -NGENProcess 230 -Pipe 1dc -Comment "NGen Worker Process"
          2⤵
          • Loads dropped DLL
          • Drops file in Windows directory
          PID:612
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
          C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 25c -InterruptEvent 2b4 -NGENProcess 28c -Pipe 1fc -Comment "NGen Worker Process"
          2⤵
            PID:2296
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
            C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 280 -InterruptEvent 2b4 -NGENProcess 25c -Pipe 230 -Comment "NGen Worker Process"
            2⤵
            • Loads dropped DLL
            • Drops file in Windows directory
            PID:2016
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
            C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 24c -InterruptEvent 290 -NGENProcess 2bc -Pipe 280 -Comment "NGen Worker Process"
            2⤵
              PID:1680
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
              C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 220 -InterruptEvent 28c -NGENProcess 2c0 -Pipe 24c -Comment "NGen Worker Process"
              2⤵
              • Loads dropped DLL
              • Drops file in Windows directory
              PID:1576
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
              C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2a0 -InterruptEvent 25c -NGENProcess 2c4 -Pipe 220 -Comment "NGen Worker Process"
              2⤵
                PID:1068
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 25c -InterruptEvent 2c8 -NGENProcess 2c0 -Pipe 244 -Comment "NGen Worker Process"
                2⤵
                • Loads dropped DLL
                • Drops file in Windows directory
                PID:2112
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 290 -InterruptEvent 2d0 -NGENProcess 2c8 -Pipe 2bc -Comment "NGen Worker Process"
                2⤵
                  PID:2260
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                  C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 28c -InterruptEvent 2d0 -NGENProcess 290 -Pipe 2a0 -Comment "NGen Worker Process"
                  2⤵
                  • Loads dropped DLL
                  • Drops file in Windows directory
                  PID:2356
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                  C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2c4 -InterruptEvent 254 -NGENProcess 2d4 -Pipe 28c -Comment "NGen Worker Process"
                  2⤵
                    PID:2580
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                    C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2c0 -InterruptEvent 254 -NGENProcess 2c4 -Pipe 290 -Comment "NGen Worker Process"
                    2⤵
                    • Loads dropped DLL
                    • Drops file in Windows directory
                    PID:2340
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                    C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2b4 -InterruptEvent 274 -NGENProcess 2dc -Pipe 2c0 -Comment "NGen Worker Process"
                    2⤵
                      PID:2900
                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2cc -InterruptEvent 274 -NGENProcess 2b4 -Pipe 2c4 -Comment "NGen Worker Process"
                      2⤵
                      • Loads dropped DLL
                      • Drops file in Windows directory
                      PID:1588
                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 274 -InterruptEvent 2b4 -NGENProcess 2d8 -Pipe 2dc -Comment "NGen Worker Process"
                      2⤵
                        PID:1944
                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2e4 -InterruptEvent 2b4 -NGENProcess 274 -Pipe 2d4 -Comment "NGen Worker Process"
                        2⤵
                        • Loads dropped DLL
                        • Drops file in Windows directory
                        PID:2468
                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2d8 -InterruptEvent 2e8 -NGENProcess 274 -Pipe 2c8 -Comment "NGen Worker Process"
                        2⤵
                          PID:2444
                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                          C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2e0 -InterruptEvent 2e8 -NGENProcess 2d8 -Pipe 2ec -Comment "NGen Worker Process"
                          2⤵
                          • Loads dropped DLL
                          • Drops file in Windows directory
                          PID:2548
                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                          C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2e8 -InterruptEvent 2d8 -NGENProcess 2e4 -Pipe 274 -Comment "NGen Worker Process"
                          2⤵
                            PID:1712
                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                            C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2f4 -InterruptEvent 2d8 -NGENProcess 2e8 -Pipe 2cc -Comment "NGen Worker Process"
                            2⤵
                            • Loads dropped DLL
                            • Drops file in Windows directory
                            PID:1236
                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                            C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2d8 -InterruptEvent 2e8 -NGENProcess 2e0 -Pipe 2e4 -Comment "NGen Worker Process"
                            2⤵
                              PID:2492
                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                              C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 300 -InterruptEvent 2e8 -NGENProcess 2d8 -Pipe 254 -Comment "NGen Worker Process"
                              2⤵
                              • Loads dropped DLL
                              • Drops file in Windows directory
                              PID:1476
                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                              C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2f0 -InterruptEvent 2f4 -NGENProcess 308 -Pipe 300 -Comment "NGen Worker Process"
                              2⤵
                                PID:1096
                            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
                              C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
                              1⤵
                              • Executes dropped EXE
                              • Drops file in Windows directory
                              • Suspicious use of AdjustPrivilegeToken
                              PID:580
                              • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
                                C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 174 -InterruptEvent 160 -NGENProcess 164 -Pipe 170 -Comment "NGen Worker Process"
                                2⤵
                                • Executes dropped EXE
                                PID:836
                              • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
                                C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 1e8 -InterruptEvent 160 -NGENProcess 164 -Pipe 174 -Comment "NGen Worker Process"
                                2⤵
                                • Executes dropped EXE
                                PID:452
                            • C:\Windows\system32\dllhost.exe
                              C:\Windows\system32\dllhost.exe /Processid:{02D4B3F1-FD88-11D1-960D-00805FC79235}
                              1⤵
                              • Executes dropped EXE
                              • Drops file in Windows directory
                              PID:1596
                            • C:\Windows\ehome\ehRecvr.exe
                              C:\Windows\ehome\ehRecvr.exe
                              1⤵
                              • Executes dropped EXE
                              • Modifies data under HKEY_USERS
                              PID:520
                            • C:\Windows\ehome\ehsched.exe
                              C:\Windows\ehome\ehsched.exe
                              1⤵
                              • Executes dropped EXE
                              PID:896
                            • C:\Windows\eHome\EhTray.exe
                              "C:\Windows\eHome\EhTray.exe" /nav:-2
                              1⤵
                              • Suspicious use of AdjustPrivilegeToken
                              • Suspicious use of FindShellTrayWindow
                              • Suspicious use of SendNotifyMessage
                              PID:1584
                            • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                              "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                              1⤵
                              • Executes dropped EXE
                              PID:1700
                            • C:\Windows\ehome\ehRec.exe
                              C:\Windows\ehome\ehRec.exe -Embedding
                              1⤵
                              • Modifies data under HKEY_USERS
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of AdjustPrivilegeToken
                              PID:596
                            • C:\Windows\system32\IEEtwCollector.exe
                              C:\Windows\system32\IEEtwCollector.exe /V
                              1⤵
                              • Executes dropped EXE
                              PID:576
                            • C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE
                              "C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE" /auditservice
                              1⤵
                              • Executes dropped EXE
                              • Drops file in System32 directory
                              • Modifies data under HKEY_USERS
                              PID:1056
                            • C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe
                              "C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"
                              1⤵
                              • Executes dropped EXE
                              PID:2120
                            • C:\Windows\System32\msdtc.exe
                              C:\Windows\System32\msdtc.exe
                              1⤵
                              • Executes dropped EXE
                              • Drops file in System32 directory
                              PID:2284
                            • C:\Windows\system32\msiexec.exe
                              C:\Windows\system32\msiexec.exe /V
                              1⤵
                              • Executes dropped EXE
                              • Loads dropped DLL
                              • Suspicious use of AdjustPrivilegeToken
                              PID:2620
                            • C:\Program Files (x86)\Common Files\Microsoft Shared\Source Engine\OSE.EXE
                              "C:\Program Files (x86)\Common Files\Microsoft Shared\Source Engine\OSE.EXE"
                              1⤵
                              • Executes dropped EXE
                              PID:2788
                            • C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE
                              "C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"
                              1⤵
                              • Executes dropped EXE
                              • Modifies data under HKEY_USERS
                              PID:2820
                            • C:\Windows\SysWow64\perfhost.exe
                              C:\Windows\SysWow64\perfhost.exe
                              1⤵
                              • Executes dropped EXE
                              PID:2920
                            • C:\Windows\system32\locator.exe
                              C:\Windows\system32\locator.exe
                              1⤵
                              • Executes dropped EXE
                              PID:2980
                            • C:\Windows\System32\snmptrap.exe
                              C:\Windows\System32\snmptrap.exe
                              1⤵
                              • Executes dropped EXE
                              PID:2204
                            • C:\Windows\System32\vds.exe
                              C:\Windows\System32\vds.exe
                              1⤵
                              • Executes dropped EXE
                              PID:2392
                            • C:\Windows\system32\vssvc.exe
                              C:\Windows\system32\vssvc.exe
                              1⤵
                              • Executes dropped EXE
                              • Suspicious use of AdjustPrivilegeToken
                              PID:2592
                            • C:\Windows\system32\wbengine.exe
                              "C:\Windows\system32\wbengine.exe"
                              1⤵
                              • Executes dropped EXE
                              • Suspicious use of AdjustPrivilegeToken
                              PID:2700
                            • C:\Windows\system32\wbem\WmiApSrv.exe
                              C:\Windows\system32\wbem\WmiApSrv.exe
                              1⤵
                              • Executes dropped EXE
                              PID:2608
                            • C:\Program Files\Windows Media Player\wmpnetwk.exe
                              "C:\Program Files\Windows Media Player\wmpnetwk.exe"
                              1⤵
                              • Executes dropped EXE
                              • Modifies data under HKEY_USERS
                              • Suspicious use of AdjustPrivilegeToken
                              PID:2972
                            • C:\Windows\system32\SearchIndexer.exe
                              C:\Windows\system32\SearchIndexer.exe /Embedding
                              1⤵
                              • Executes dropped EXE
                              • Modifies data under HKEY_USERS
                              • Suspicious use of AdjustPrivilegeToken
                              • Suspicious use of WriteProcessMemory
                              PID:2528
                              • C:\Windows\system32\SearchProtocolHost.exe
                                "C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe_S-1-5-21-3499517378-2376672570-1134980332-10001_ Global\UsGthrCtrlFltPipeMssGthrPipe_S-1-5-21-3499517378-2376672570-1134980332-10001 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon" "1"
                                2⤵
                                • Suspicious use of SetWindowsHookEx
                                PID:2056
                              • C:\Windows\system32\SearchFilterHost.exe
                                "C:\Windows\system32\SearchFilterHost.exe" 0 588 592 600 65536 596
                                2⤵
                                  PID:596
                                • C:\Windows\system32\SearchProtocolHost.exe
                                  "C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe2_ Global\UsGthrCtrlFltPipeMssGthrPipe2 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon"
                                  2⤵
                                  • Modifies data under HKEY_USERS
                                  • Suspicious use of SetWindowsHookEx
                                  PID:1156

                              Network

                              MITRE ATT&CK Enterprise v6

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads

                              • C:\Program Files (x86)\Common Files\microsoft shared\Source Engine\OSE.EXE

                                Filesize

                                1.4MB

                                MD5

                                162b97294d011b69051a25995c2a3e7b

                                SHA1

                                5367b31ba941f939b38d46dfa5bee3255b2d1c72

                                SHA256

                                c187ee625aa43050d23603359d42f500a733d20c6e2c4977ee99192f2a3812a3

                                SHA512

                                8708782cac59a633115deb5ae4b924dd243ffcafde66f973139f1b93f282f8bb0cfc1dbc5c1d19168d0157bbcb551c5738baf5c014ada172a663bfc09e5f59d3

                              • C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE

                                Filesize

                                30.1MB

                                MD5

                                d64b424bd0b5a5ee08cf3c7a1fe547cd

                                SHA1

                                67030be37683d5d0c862b874b81b9805b9f7ddd1

                                SHA256

                                ccf0bc92eeced0427b58b76b1f0f4b5c9f5ded9578c810b15bcc0491dcd6357e

                                SHA512

                                b06764c0aa175beb71c37a7f705d3f210f8c83046591834deb2bdad91caea6e472ca68a79d6c2a02b1b0ee092fa3705d75ea3f7303902ea396cd5e6186ff89ca

                              • C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe

                                Filesize

                                1.4MB

                                MD5

                                c63c045f58e86efa1bc92100b9f9dccd

                                SHA1

                                ef06f2052c3fba2038821ac757803ab260b00a78

                                SHA256

                                20479e6a8a4ac86793585627ce06158ad2cf25375daf7a81233de4e16c575731

                                SHA512

                                a90f6810bcbdf7032de9e928a3f92e822d112069bf39542b42fd31f5505c456604a50054572a0d8c1fb0f1b3519ee3c79e52def97612446642bf11b64d749767

                              • C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE

                                Filesize

                                5.2MB

                                MD5

                                3abbbc11da76251e24599c049afc32f5

                                SHA1

                                4d75afd9ec0e28043987f7668a2babb5888bdbe0

                                SHA256

                                665ab0c4e7badfd0fa34a6eea0e286a49c2b1611e7e5caf79d8daa3cd7b8ed03

                                SHA512

                                971ac0042a96832cccf44ee776f240c5c32b896444d35f4e5844ccc4cd5cc8af65d261bb5e09677ac63738169f96bf73090213ea157b049070aaa4e30dc9334b

                              • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe

                                Filesize

                                2.1MB

                                MD5

                                410b56fa920dea975a13fcf14521745b

                                SHA1

                                a4dbd029f0d3381b0fa5404a5f10ac27d09a9276

                                SHA256

                                f79d140a767f3016bfaaa27dcba9883a92c07002d3ca09a99bf9619fac02e579

                                SHA512

                                71f97dcca50a5a88d8b5232605b4b8fbcac5f48d2f9edfcdeeffc3739232ac6e4cfa2658c4cfc874c3223e5479af2b5e1635146856f7d3f7338e77f059307a5a

                              • C:\Program Files\Windows Media Player\wmpnetwk.exe

                                Filesize

                                2.0MB

                                MD5

                                c2ec642ddb73ed005cf0a4b3690f3e68

                                SHA1

                                72999bf6c2fe07756a6b77664fa721788c0e5181

                                SHA256

                                a772025a5da7c60409656c64455f57fe8ffc0cc1001046f662d6075062579da9

                                SHA512

                                7a25f4074c132005507393c2fc4dcfd128ce9317770baf784b19a36f354523e8ec0d8530d88fa98619da9d1bf7b91d8f58aaced9e4d80cdf05eccb5b455f8dc1

                              • C:\ProgramData\Microsoft\Search\Data\Applications\Windows\MSS.log

                                Filesize

                                1024KB

                                MD5

                                d29973db8cc9986b245bce0a21d3fa5b

                                SHA1

                                591fb6a0f026503992e830a354f44b4a9692a401

                                SHA256

                                cd6ea3a57abbed894ce5e6ce51f0132238e09fb13a624d17898a9e92323fdf6c

                                SHA512

                                9e7a605768eefaf8e254c2b26bc985becec0888d5403203bc8ae39220ac684e22d2b217eea0e5ab7a2588b7bf0ec73e4381239cbec50522f0ae3cbcea97194d0

                              • C:\Users\Admin\AppData\Local\Temp\hbgistyk.l

                                Filesize

                                5KB

                                MD5

                                f7aa6aa562eed72f57dae51a4600bd15

                                SHA1

                                83c485c9f87dad98e674c2367edde4bdb634ad99

                                SHA256

                                e88095aa3ad132af63e6217c5ae27b90e03eb8b5bb895bd25a30eb3b7c8495cf

                                SHA512

                                df14b0f46a566c805714d91b117791e5b0cec8dbc5ca5096488621fcc162d02eea21f9be8c6cbfcd9f54ce3f15472ee683e4ae060ca6892ba1dc5d5a703c40c0

                              • C:\Users\Admin\AppData\Local\Temp\mwmyjwne.exe

                                Filesize

                                85KB

                                MD5

                                ecc112538fbc387407826a46bd7f840b

                                SHA1

                                6118b642fa60a2136f63a4357e224063287ba0ae

                                SHA256

                                deeac2f4df3fefb53950790f5a89178691f4397683a1470a0663d7d33a56b9ed

                                SHA512

                                c1cc27e1e93398074d845a0da9df2eec8a00c46dc529191c7821556b21002e642b75aec14a6ae056e6fcbb996190eccd9795e11d47005235e7d2204d008ea5f2

                              • C:\Users\Admin\AppData\Local\Temp\mwmyjwne.exe

                                Filesize

                                85KB

                                MD5

                                ecc112538fbc387407826a46bd7f840b

                                SHA1

                                6118b642fa60a2136f63a4357e224063287ba0ae

                                SHA256

                                deeac2f4df3fefb53950790f5a89178691f4397683a1470a0663d7d33a56b9ed

                                SHA512

                                c1cc27e1e93398074d845a0da9df2eec8a00c46dc529191c7821556b21002e642b75aec14a6ae056e6fcbb996190eccd9795e11d47005235e7d2204d008ea5f2

                              • C:\Users\Admin\AppData\Local\Temp\mwmyjwne.exe

                                Filesize

                                85KB

                                MD5

                                ecc112538fbc387407826a46bd7f840b

                                SHA1

                                6118b642fa60a2136f63a4357e224063287ba0ae

                                SHA256

                                deeac2f4df3fefb53950790f5a89178691f4397683a1470a0663d7d33a56b9ed

                                SHA512

                                c1cc27e1e93398074d845a0da9df2eec8a00c46dc529191c7821556b21002e642b75aec14a6ae056e6fcbb996190eccd9795e11d47005235e7d2204d008ea5f2

                              • C:\Users\Admin\AppData\Local\Temp\mwmyjwne.exe

                                Filesize

                                85KB

                                MD5

                                ecc112538fbc387407826a46bd7f840b

                                SHA1

                                6118b642fa60a2136f63a4357e224063287ba0ae

                                SHA256

                                deeac2f4df3fefb53950790f5a89178691f4397683a1470a0663d7d33a56b9ed

                                SHA512

                                c1cc27e1e93398074d845a0da9df2eec8a00c46dc529191c7821556b21002e642b75aec14a6ae056e6fcbb996190eccd9795e11d47005235e7d2204d008ea5f2

                              • C:\Users\Admin\AppData\Local\Temp\wrfjwztu.aq

                                Filesize

                                1.7MB

                                MD5

                                1150bbc219a67bd8998f8e853649eda7

                                SHA1

                                9e9b53fd8b25217cd3cdac31ccf2ece1c5101304

                                SHA256

                                ddc00b80b46094456c327e3706744b194e32c308d47b159724762fae9b00ad0e

                                SHA512

                                dde58a0d446922b4777d4b5faad58c3698dcdadff04fdfd7ea7250534d73eae2fc08d0202af3bd5dd91787f782ab46b67ebcbb1fa15e23d2bbb807b6668a49c8

                              • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b91050d8b077a4e8.customDestinations-ms

                                Filesize

                                24B

                                MD5

                                b9bd716de6739e51c620f2086f9c31e4

                                SHA1

                                9733d94607a3cba277e567af584510edd9febf62

                                SHA256

                                7116ff028244a01f3d17f1d3bc2e1506bc9999c2e40e388458f0cccc4e117312

                                SHA512

                                cef609e54c7a81a646ad38dba7ac0b82401b220773b9c792cefac80c6564753229f0c011b34ffb56381dd3154a19aee2bf5f602c4d1af01f2cf0fbc1574e4478

                              • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe

                                Filesize

                                1.3MB

                                MD5

                                37d912763113be727c3d03757412d81e

                                SHA1

                                c908790d3b769d489073bc7658f49e25fe9c0272

                                SHA256

                                b88a5b6d0ec335d01c6b7748eea42cdc03539275749f6931299326e1e21d2337

                                SHA512

                                1655230fde7fe4a9a23fc3071aefdc12abc893642c56d91c1971b4cdce765ab997094204d58aeb7b22b1d2b0613ceec50ba2ab191b3eb2418957b8a2097c3737

                              • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe

                                Filesize

                                1.3MB

                                MD5

                                37d912763113be727c3d03757412d81e

                                SHA1

                                c908790d3b769d489073bc7658f49e25fe9c0272

                                SHA256

                                b88a5b6d0ec335d01c6b7748eea42cdc03539275749f6931299326e1e21d2337

                                SHA512

                                1655230fde7fe4a9a23fc3071aefdc12abc893642c56d91c1971b4cdce765ab997094204d58aeb7b22b1d2b0613ceec50ba2ab191b3eb2418957b8a2097c3737

                              • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ngen_service.log

                                Filesize

                                872KB

                                MD5

                                d3e7b9a7b5bc4739326de77404dfce8d

                                SHA1

                                00d6d5bd9b3a5d96066f811ba954bed3e82e4ea7

                                SHA256

                                60baf8d2bae4baf9e1a0bb33779001b314d1fd0a4264d564a8e304cc4d53c7fa

                                SHA512

                                24e1a32060bd6a05967944e0ccd5127fc0db4a92fda77162c98494a430662237e79c6d8a0827488c0214502bb2a2852e9451379b04cc03b0020aa27658bc223b

                              • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe

                                Filesize

                                1.3MB

                                MD5

                                0cb9561f7daea0a3d7c28cff92a17f8f

                                SHA1

                                0c0601cafba841134799836e0c073eeaa4ae08ca

                                SHA256

                                17852fd6c07070668d53aca35a65986e25926df25cd0fcc9bfe8ec306cfc0385

                                SHA512

                                7975bdb9172ff28130cc31ae406f5e2f6999a5905ba3a163ed6ed4b1b9e0583a6b5d3b4bfd957c1f5b27ef0e47687efaed6e0d4ca7318a65da024ece4693bc6d

                              • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe

                                Filesize

                                1.3MB

                                MD5

                                bb6488f568a79bbd33160222b1d53875

                                SHA1

                                7b7ac831075b887c536c0f41d35c660aeaf77589

                                SHA256

                                f45b6247996d90f68849a16413318a3113d0ba937b3c246e4c2feeb72f737bc3

                                SHA512

                                8fb23473cf8fad416e87009c6ea4b26b12182741dd259d61ef1cd0f1f928154bd7a982f3b49f03fbcbb73e8f0f6dfb964dceee4a4ea6d74b62dd1951e269f2af

                              • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe

                                Filesize

                                1.3MB

                                MD5

                                bb6488f568a79bbd33160222b1d53875

                                SHA1

                                7b7ac831075b887c536c0f41d35c660aeaf77589

                                SHA256

                                f45b6247996d90f68849a16413318a3113d0ba937b3c246e4c2feeb72f737bc3

                                SHA512

                                8fb23473cf8fad416e87009c6ea4b26b12182741dd259d61ef1cd0f1f928154bd7a982f3b49f03fbcbb73e8f0f6dfb964dceee4a4ea6d74b62dd1951e269f2af

                              • C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe

                                Filesize

                                1.3MB

                                MD5

                                c265272dca69a745e736c7048d89e236

                                SHA1

                                c463489cfb826f65a9eb6016a51bc74916d5bf2f

                                SHA256

                                bf894f0adfe5643f05b4f9f841646d356bce2cd3b7c3c7e714a5fbda0fe95c95

                                SHA512

                                bb4a85a61e83cd378bb57f2016c3b6b2575fd2a0a97011ef274b256beb408ff45914dd91f0ade124759f908a2211ea7b0c2dc2b8a8ae127a4d605ce2d54ad5b3

                              • C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe

                                Filesize

                                1.3MB

                                MD5

                                c265272dca69a745e736c7048d89e236

                                SHA1

                                c463489cfb826f65a9eb6016a51bc74916d5bf2f

                                SHA256

                                bf894f0adfe5643f05b4f9f841646d356bce2cd3b7c3c7e714a5fbda0fe95c95

                                SHA512

                                bb4a85a61e83cd378bb57f2016c3b6b2575fd2a0a97011ef274b256beb408ff45914dd91f0ade124759f908a2211ea7b0c2dc2b8a8ae127a4d605ce2d54ad5b3

                              • C:\Windows\Microsoft.NET\Framework\v2.0.50727\ngen_service.log

                                Filesize

                                1003KB

                                MD5

                                73f8d1a0d5fb874457a2743325ba174f

                                SHA1

                                b3dd10fd9ff118621bbb0c394ec287ed014ffcc0

                                SHA256

                                0eee80d95c30385b232f1529b86b147ff4d1b2ffebb6a8851ddd4c472e18b0be

                                SHA512

                                8aab93a6504498f7deeace8920c3b5f7c69ea0b663ca8caef1dde65f41efc0b9421487b1f6133303b815b47d7ccbe66e00afff3eae193ce80544e89b5e6c13b9

                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe

                                Filesize

                                1.3MB

                                MD5

                                183ecb79314b85fc5fb2862d69bf9d8c

                                SHA1

                                6331120f076109cba09679e4d2389b65de8ec48f

                                SHA256

                                45b6e3adb1d280b0e7bbf4b8bae9af62c576b042df21a9881e525a838d034f22

                                SHA512

                                614670e394aa58bb8ea5bec40b92418866621a2f3de3cab42a5f57c685eb7d9f352f770e1205dba57c5244a3205b15b5df9d621a7178a3e361477ee0df947342

                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe

                                Filesize

                                1.3MB

                                MD5

                                183ecb79314b85fc5fb2862d69bf9d8c

                                SHA1

                                6331120f076109cba09679e4d2389b65de8ec48f

                                SHA256

                                45b6e3adb1d280b0e7bbf4b8bae9af62c576b042df21a9881e525a838d034f22

                                SHA512

                                614670e394aa58bb8ea5bec40b92418866621a2f3de3cab42a5f57c685eb7d9f352f770e1205dba57c5244a3205b15b5df9d621a7178a3e361477ee0df947342

                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe

                                Filesize

                                1.3MB

                                MD5

                                183ecb79314b85fc5fb2862d69bf9d8c

                                SHA1

                                6331120f076109cba09679e4d2389b65de8ec48f

                                SHA256

                                45b6e3adb1d280b0e7bbf4b8bae9af62c576b042df21a9881e525a838d034f22

                                SHA512

                                614670e394aa58bb8ea5bec40b92418866621a2f3de3cab42a5f57c685eb7d9f352f770e1205dba57c5244a3205b15b5df9d621a7178a3e361477ee0df947342

                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe

                                Filesize

                                1.3MB

                                MD5

                                183ecb79314b85fc5fb2862d69bf9d8c

                                SHA1

                                6331120f076109cba09679e4d2389b65de8ec48f

                                SHA256

                                45b6e3adb1d280b0e7bbf4b8bae9af62c576b042df21a9881e525a838d034f22

                                SHA512

                                614670e394aa58bb8ea5bec40b92418866621a2f3de3cab42a5f57c685eb7d9f352f770e1205dba57c5244a3205b15b5df9d621a7178a3e361477ee0df947342

                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe

                                Filesize

                                1.3MB

                                MD5

                                183ecb79314b85fc5fb2862d69bf9d8c

                                SHA1

                                6331120f076109cba09679e4d2389b65de8ec48f

                                SHA256

                                45b6e3adb1d280b0e7bbf4b8bae9af62c576b042df21a9881e525a838d034f22

                                SHA512

                                614670e394aa58bb8ea5bec40b92418866621a2f3de3cab42a5f57c685eb7d9f352f770e1205dba57c5244a3205b15b5df9d621a7178a3e361477ee0df947342

                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe

                                Filesize

                                1.3MB

                                MD5

                                183ecb79314b85fc5fb2862d69bf9d8c

                                SHA1

                                6331120f076109cba09679e4d2389b65de8ec48f

                                SHA256

                                45b6e3adb1d280b0e7bbf4b8bae9af62c576b042df21a9881e525a838d034f22

                                SHA512

                                614670e394aa58bb8ea5bec40b92418866621a2f3de3cab42a5f57c685eb7d9f352f770e1205dba57c5244a3205b15b5df9d621a7178a3e361477ee0df947342

                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe

                                Filesize

                                1.3MB

                                MD5

                                183ecb79314b85fc5fb2862d69bf9d8c

                                SHA1

                                6331120f076109cba09679e4d2389b65de8ec48f

                                SHA256

                                45b6e3adb1d280b0e7bbf4b8bae9af62c576b042df21a9881e525a838d034f22

                                SHA512

                                614670e394aa58bb8ea5bec40b92418866621a2f3de3cab42a5f57c685eb7d9f352f770e1205dba57c5244a3205b15b5df9d621a7178a3e361477ee0df947342

                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe

                                Filesize

                                1.3MB

                                MD5

                                183ecb79314b85fc5fb2862d69bf9d8c

                                SHA1

                                6331120f076109cba09679e4d2389b65de8ec48f

                                SHA256

                                45b6e3adb1d280b0e7bbf4b8bae9af62c576b042df21a9881e525a838d034f22

                                SHA512

                                614670e394aa58bb8ea5bec40b92418866621a2f3de3cab42a5f57c685eb7d9f352f770e1205dba57c5244a3205b15b5df9d621a7178a3e361477ee0df947342

                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe

                                Filesize

                                1.3MB

                                MD5

                                183ecb79314b85fc5fb2862d69bf9d8c

                                SHA1

                                6331120f076109cba09679e4d2389b65de8ec48f

                                SHA256

                                45b6e3adb1d280b0e7bbf4b8bae9af62c576b042df21a9881e525a838d034f22

                                SHA512

                                614670e394aa58bb8ea5bec40b92418866621a2f3de3cab42a5f57c685eb7d9f352f770e1205dba57c5244a3205b15b5df9d621a7178a3e361477ee0df947342

                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe

                                Filesize

                                1.3MB

                                MD5

                                183ecb79314b85fc5fb2862d69bf9d8c

                                SHA1

                                6331120f076109cba09679e4d2389b65de8ec48f

                                SHA256

                                45b6e3adb1d280b0e7bbf4b8bae9af62c576b042df21a9881e525a838d034f22

                                SHA512

                                614670e394aa58bb8ea5bec40b92418866621a2f3de3cab42a5f57c685eb7d9f352f770e1205dba57c5244a3205b15b5df9d621a7178a3e361477ee0df947342

                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen_service.log

                                Filesize

                                8KB

                                MD5

                                9c198ad9bf7d5215c6618ac502208f13

                                SHA1

                                eef1ab6cf2337445528a97da512ef161633d6b42

                                SHA256

                                6b6e8985056a5025f292c31a1bc4ba63f3fe3a5b8cd7ceb074fc40daa60905b9

                                SHA512

                                7f573bdbfb052e567111473ffdd6a3952cdc16ac27d73988d79c763f59e02efb797f60442dcc527af68a7b5f914fa6bb6ad64f24c29b892bfda3c2c7a715802b

                              • C:\Windows\SysWOW64\perfhost.exe

                                Filesize

                                1.2MB

                                MD5

                                daaed3b29f6b539bd42e06054da2f2c5

                                SHA1

                                39f0030eea6dfee1f52aef7d453e05a9ff247aa8

                                SHA256

                                0e938c6fef3146f9966512fb4dbd0420af9881410fbe91c59534b16a987ef8fb

                                SHA512

                                57dc79ed4e4c900127fb1df767ba0b72495b37debfe6bfb5e2c571fac4cee0910c0ca7f0e1a7adabd348dcec340e7f15171986b795960b0b4bfc34c592915aed

                              • C:\Windows\System32\Locator.exe

                                Filesize

                                1.2MB

                                MD5

                                c46b6cf85b28bc9a736fbf4d17a2fa15

                                SHA1

                                3ca14dc7af45243bd766fa562c42ff9fcfd5132e

                                SHA256

                                fc2ad01ba63b330ec5f2534356e0c232fc5a9a2a9ccf26cb28caeeab41e02418

                                SHA512

                                f5f9311e5b2b4cb0c9026c246b72f7795307b5cd7cf88a64a367af6b9eead5cadf06120c9cb1f2a330a76cf2ac68969d1c1143f6e8f52808908047a86a535967

                              • C:\Windows\System32\SearchIndexer.exe

                                Filesize

                                1.1MB

                                MD5

                                9f6daa19bbb378ce3fbcce4efbb294c9

                                SHA1

                                cb08b1872db0b2c8efdba74fbe5ed06c14edee9f

                                SHA256

                                b655b080da3d6016bb8db97d6ee6d05cf3dd4d2afd6f664dfab8b66929207cca

                                SHA512

                                bb49491f58bcdae93bbba2c10f5b608035d0c4d0ce24cd449383a817da4f029ed8850194df7686a59e29d9af3576b5af2155b562359c924779e2416663b55ce5

                              • C:\Windows\System32\VSSVC.exe

                                Filesize

                                2.1MB

                                MD5

                                5fdc2a3c6e5c8b52d4dbbc880b8b3898

                                SHA1

                                120155056cb75fb2123eca6b51585d4f773eda77

                                SHA256

                                4a411e1efba39b8945a042e11498d9b3a261676242f4e7f2f64762844832fd16

                                SHA512

                                a3812173f03336125f4343e695b0a5290aac4779aebc1342be426c13054839bc2d308e12d5725bbab60ba080a080ac7c91155253a668dd8a19c6bacb809cf2e6

                              • C:\Windows\System32\alg.exe

                                Filesize

                                1.3MB

                                MD5

                                53ee267c96e2b5b2843ae76325e59e1c

                                SHA1

                                1ba0073ae328b408e0f0646c54ecbfed51e55ae2

                                SHA256

                                4921e5b4b3fc90f1c2691e6614ef9779aba8785615163f6828a82adfc2075a7d

                                SHA512

                                ce6a8edc51ed99058ff2326db222e4c0a321160865a64efeb7c80e067c4ee214fe43ad1dfc0183788e7409124d89214217826fc6df085a4743e60fd2d3cfca2d

                              • C:\Windows\System32\dllhost.exe

                                Filesize

                                1.2MB

                                MD5

                                961a6b33f7ea1a458128c844044704bb

                                SHA1

                                3c2dd7f80c582213c5d105340ef98b75553eea27

                                SHA256

                                87c6455746d959e341450eb0c2a4f035a0d270b013af830f221e1d4b6eb05062

                                SHA512

                                805536b2b32392dbd97488793a0f5fa0c95521fbc3dad06f9a401acd8a664ef2a040853ee7a9b7fac32c063d28e92a6c0ad8e213e67503419ee4c765cdf71e70

                              • C:\Windows\System32\ieetwcollector.exe

                                Filesize

                                1.3MB

                                MD5

                                96d4de690d4f6b8c42ba950fc1f49056

                                SHA1

                                ed5dd4055e5f1033af4a7f693c81e393442b3dcb

                                SHA256

                                c44f710f960241073156e2608472797e2e7ffd15151535f5e5c7d731ecb4fb30

                                SHA512

                                ac4ec30ef13507907d96f60f40525ccedb8d03dfea86f9adcd5e5e4657a1d67fbb37ef23902b4c056322d37498fcd7d2fd8ca053f013bcf689d53e49a4145fdd

                              • C:\Windows\System32\msdtc.exe

                                Filesize

                                1.4MB

                                MD5

                                0d800555271ea26b68c7d4febc23d0b9

                                SHA1

                                b436acf5be9e727206300df620e3736998428b18

                                SHA256

                                0ec22592e9049a2b521f90dccc9f41b7c1cd2e1fc1d93decf6e3201ce9713a97

                                SHA512

                                fc25c6f99938b3c145321d9241eb8051ef6214f158f54ef60a85eebed5bc0436fc4c53be92dc7721870621cd7930f27e80672ec2f43102a2fe339578972897e1

                              • C:\Windows\System32\msiexec.exe

                                Filesize

                                1.3MB

                                MD5

                                3d03c036e8a74c0bbd653256c7222117

                                SHA1

                                83f01b80fe3a6fa5a78f9e75d19093b7b1886771

                                SHA256

                                f73672205825cc7ca49f04786c39e0d96531f3071ac5ac9ae3ce5d41d4d2fe19

                                SHA512

                                a76fd5d197229be2a63de9a2b8a72434a9512c392a6725af6960c2a88395dd6068b85aed302a1a010b60842ea9861c0254a404ef1157d606b5679b164b351a19

                              • C:\Windows\System32\snmptrap.exe

                                Filesize

                                1.2MB

                                MD5

                                510bed35250b32b7a043bbf7478cafab

                                SHA1

                                04e56b21a66daa0ad1b08cab50ece6dd095d0caf

                                SHA256

                                b46074d86af4decd4e13205fe60c391658572a260eabdfb8cafb7d65696d8efb

                                SHA512

                                f18f567607afa17dbbb10d0903c854104fc13d7b03dd538e30fb102914d80bb0bfebcddda78e05c4e28dfd826c83adf17cb1fec5c23747587f1515a6c7e36582

                              • C:\Windows\System32\vds.exe

                                Filesize

                                1.7MB

                                MD5

                                76814d51128ba4f9e1cba2bf602b778e

                                SHA1

                                89e146cbd8f8d9505030d1ff3ea92e0fa6723315

                                SHA256

                                fa4422db208145943fee6af87a9f2cbd438fa622b21ffa72ef3005bdbfb49249

                                SHA512

                                5e428de3c1ffded367b58d5a03658a712334fc25c9c3f8a41f512dabcef3356dc96456b22b8b3aea75d60dc7627d6bbe03e209cdc32de1428c5bbdf826a86f8f

                              • C:\Windows\System32\wbem\WmiApSrv.exe

                                Filesize

                                1.4MB

                                MD5

                                a6ffad65eab763517ff71a12f1c27cd6

                                SHA1

                                47cfc7ec40721fbcd065c1ee866b18b4fd6b5094

                                SHA256

                                a5b9efe9b2d521d252f3a40e994266adb2e42435061695274136ca1e91079958

                                SHA512

                                e02d654e2d5723ce2057fdb119c4409e7d5d2c323f85f60f2da4f29cd78a060b1dc704bf4040aff537f2f3e89d14dfd28306085a9f9b51e2441c72217fef8150

                              • C:\Windows\System32\wbengine.exe

                                Filesize

                                2.0MB

                                MD5

                                ed51c797d84f996f72c20c525015f073

                                SHA1

                                4fa586fffe14cedb684f25f603328011e0bf8eca

                                SHA256

                                e80417d44cf88edee503275b415ddb9b727b391f8d7e1643a6f287a85a5685bc

                                SHA512

                                3b1a5ed50a250ebe89dad7cf79097903c1f63288e7a7fe9b87c8bf686067e48011024dccefe290a0832cb4c3e9a44b8c4336b292ea345e5396917cf65508a60d

                              • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.Office.To#\e1f8e4d08d4b7f811b7dbbacd324027b\Microsoft.Office.Tools.v9.0.ni.dll

                                Filesize

                                148KB

                                MD5

                                ac901cf97363425059a50d1398e3454b

                                SHA1

                                2f8bd4ac2237a7b7606cb77a3d3c58051793c5c7

                                SHA256

                                f6c7aecb211d9aac911bf80c91e84a47a72ac52cbb523e34e9da6482c0b24c58

                                SHA512

                                6a340b6d5fa8e214f2a58d8b691c749336df087fa75bcc8d8c46f708e4b4ff3d68a61a17d13ee62322b75cbc61d39f5a572588772f3c5d6e5ff32036e5bc5a00

                              • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\03cad6bd8b37d21b28dcb4f955be2158\Microsoft.VisualStudio.Tools.Applications.Contract.v9.0.ni.dll

                                Filesize

                                34KB

                                MD5

                                c26b034a8d6ab845b41ed6e8a8d6001d

                                SHA1

                                3a55774cf22d3244d30f9eb5e26c0a6792a3e493

                                SHA256

                                620b41f5e02df56c33919218bedc238ca7e76552c43da4f0f39a106835a4edc3

                                SHA512

                                483424665c3bc79aeb1de6dfdd633c8526331c7b271b1ea6fe93ab298089e2aceefe7f9c7d0c6e33e604ca7b2ed62e7bb586147fecdf9a0eea60e8c03816f537

                              • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\0cb958acb9cd4cacb46ebc0396e30aa3\Microsoft.VisualStudio.Tools.Office.Contract.v9.0.ni.dll

                                Filesize

                                109KB

                                MD5

                                0fd0f978e977a4122b64ae8f8541de54

                                SHA1

                                153d3390416fdeba1b150816cbbf968e355dc64f

                                SHA256

                                211d2b83bb82042385757f811d90c5ae0a281f3abb3bf1c7901e8559db479e60

                                SHA512

                                ceddfc031bfe4fcf5093d0bbc5697b5fb0cd69b03bc32612325a82ea273dae5daff7e670b0d45816a33307b8b042d27669f5d5391cb2bdcf3e5a0c847c6dcaa8

                              • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\273c5e6be9c3b1b950b5ee110b4c9128\Microsoft.VisualStudio.Tools.Office.Excel.HostAdapter.v10.0.ni.dll

                                Filesize

                                180KB

                                MD5

                                fdda1aced4072ce711f7ec204361029b

                                SHA1

                                03f8cb8a8353f95d4b3fda3d32d38cf883e0801d

                                SHA256

                                f2379c648e15b269cba3289cb449a8e4d6cd3d0e0c044f9c94f6aa143c67f7e8

                                SHA512

                                c40f17cb5aca2375cbbd8c16518fb8b58f117a6950b19fc14393e5b0a7de281733433b27e0d124f61e92bd9fc5806417395105b9cef3d51fd380dc92e87e3c17

                              • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\367516b7878af19f5c84c67f2cd277ae\Microsoft.VisualStudio.Tools.Office.Word.AddInAdapter.v9.0.ni.dll

                                Filesize

                                41KB

                                MD5

                                3c269caf88ccaf71660d8dc6c56f4873

                                SHA1

                                f9481bf17e10fe1914644e1b590b82a0ecc2c5c4

                                SHA256

                                de21619e70f9ef8ccbb274bcd0d9d2ace1bae0442dfefab45976671587cf0a48

                                SHA512

                                bd5be3721bf5bd4001127e0381a0589033cb17aa35852f8f073ba9684af7d8c5a0f3ee29987b345fc15fdf28c5b56686087001ef41221a2cfb16498cf4c016c6

                              • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\3bbf261567d51c53c25a667de0739f9c\Microsoft.VisualStudio.Tools.Office.Outlook.HostAdapter.v10.0.ni.dll

                                Filesize

                                83KB

                                MD5

                                97f5d39cf376e4071db08e8ab2331b1a

                                SHA1

                                dc1967e73227fe938258d49c3c0d4ebcd431ea6b

                                SHA256

                                89b49599668792a87bd7ab1c2900eacd0de223d89cedd5ec916e488c194dd130

                                SHA512

                                add55c2d6895fa41867eb7022eb6c18d7fe17ad924085ab48442afc90905c8e68575076b29909b441899f3f5a7b8905bce7ea36e3fb5e450577c8cd937dc20d1

                              • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\4fc1dbada32d91a9a03cb35f7c942938\Microsoft.VisualStudio.Tools.Office.Word.HostAdapter.v10.0.ni.dll

                                Filesize

                                187KB

                                MD5

                                4d548ae6d731c3438d53eb7e32b20dd5

                                SHA1

                                2fd715cea9fbc80b2945cda43335ee57a7fda39c

                                SHA256

                                abc659faddeaf9f922088f890340eda1fbcb2d63e79364ef524c9d28f976a0de

                                SHA512

                                feffe440459328d30f9fee647d34c100dca815e2045cba54a0ad246394dde5c5a55b89bd68a9ebdf204521957f5433f2dc4b8fd8c118eccf36b3b3d593d2ef61

                              • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\8c6bac317f75b51647ea3a8da141b143\Microsoft.VisualStudio.Tools.Office.AddInAdapter.v9.0.ni.dll

                                Filesize

                                210KB

                                MD5

                                4f40997b51420653706cb0958086cd2d

                                SHA1

                                0069b956d17ce7d782a0e054995317f2f621b502

                                SHA256

                                8cd6a0b061b43e0b660b81859c910290a3672b00d7647ba0e86eda6ddcc8c553

                                SHA512

                                e18953d7a348859855e5f6e279bc9924fc3707b57a733ce9b8f7d21bd631d419f1ebfb29202608192eb346569ca9a55264f5b4c2aedd474c22060734a68a4ee6

                              • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\9306fc630870a75ddd23441ad77bdc57\Microsoft.VisualStudio.Tools.Applications.Runtime.v10.0.ni.dll

                                Filesize

                                53KB

                                MD5

                                e3a7a2b65afd8ab8b154fdc7897595c3

                                SHA1

                                b21eefd6e23231470b5cf0bd0d7363879a2ed228

                                SHA256

                                e5faf5e8adf46a8246e6b5038409dadca46985a9951343a1936237d2c8d7a845

                                SHA512

                                6537c7ed398deb23be1256445297cb7c8d7801bf6e163d918d8e258213708b28f7255ecff9fbd3431d8f5e5a746aa95a29d3a777b28fcd688777aed6d8205a33

                              • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\99cac16778c04165501d0b280f8d5c54\Microsoft.VisualStudio.Tools.Office.HostAdapter.v10.0.ni.dll

                                Filesize

                                143KB

                                MD5

                                e0e0d41db0389c475c361f4c4b269980

                                SHA1

                                2971c9e4d3e464461df56fc0d57b003b4e42c395

                                SHA256

                                589c97cae16d9567c80b285f37dbbed63c385a1c2e32fff8373145f560865555

                                SHA512

                                57566d3c0b74eba757ac67ce43ad93ef3a7e762afc8ef3b3044155b978f43ef4e7d603e43a8e87fb3f99047b6630a7d76070d34eacd3728f339f0fa395067581

                              • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\afa5bb1a39443d7dc81dfff54073929b\Microsoft.VisualStudio.Tools.Office.Contract.v10.0.ni.dll

                                Filesize

                                28KB

                                MD5

                                aefc3f3c8e7499bad4d05284e8abd16c

                                SHA1

                                7ab718bde7fdb2d878d8725dc843cfeba44a71f7

                                SHA256

                                4436550409cfb3d06b15dd0c3131e87e7002b0749c7c6e9dc3378c99dbec815d

                                SHA512

                                1d7dbc9764855a9a1f945c1bc8e86406c0625f1381d71b3ea6924322fbe419d1c70c3f3efd57ee2cb2097bb9385e0bf54965ab789328a80eb4946849648fe20b

                              • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\de06a98a598aa0ff716a25b24d56ad7f\Microsoft.VisualStudio.Tools.Applications.Contract.v10.0.ni.dll

                                Filesize

                                27KB

                                MD5

                                9c60454398ce4bce7a52cbda4a45d364

                                SHA1

                                da1e5de264a6f6051b332f8f32fa876d297bf620

                                SHA256

                                edc90887d38c87282f49adbb12a94040f9ac86058bfae15063aaaff2672b54e1

                                SHA512

                                533b7e9c55102b248f4a7560955734b4156eb4c02539c6f978aeacecff1ff182ba0f04a07d32ed90707a62d73191b0e2d2649f38ae1c3e7a5a4c0fbea9a94300

                              • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\e0220058091b941725ef02be0b84abe7\Microsoft.VisualStudio.Tools.Applications.HostAdapter.v10.0.ni.dll

                                Filesize

                                57KB

                                MD5

                                6eaaa1f987d6e1d81badf8665c55a341

                                SHA1

                                e52db4ad92903ca03a5a54fdb66e2e6fad59efd5

                                SHA256

                                4b78ffa5f0b6751aea11917db5961d566e2f59beaa054b41473d331fd392329e

                                SHA512

                                dbedfa6c569670c22d34d923e22b7dae7332b932b809082dad87a1f0bb125c912db37964b5881667867ccf23dc5e5be596aad85485746f8151ce1c51ffd097b2

                              • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\ee73646032cbb022d16771203727e3b2\Microsoft.VisualStudio.Tools.Applications.Runtime.v9.0.ni.dll

                                Filesize

                                130KB

                                MD5

                                2735d2ab103beb0f7c1fbd6971838274

                                SHA1

                                6063646bc072546798bf8bf347425834f2bfad71

                                SHA256

                                f00156860ec7e88f4ccb459ca29b7e0e5c169cdc8a081cb043603187d25d92b3

                                SHA512

                                fe2ce60c7f61760a29344e254771d48995e983e158da0725818f37441f9690bda46545bf10c84b163f6afb163ffb504913d6ffddf84f72b062c7f233aed896de

                              • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\f1a7ac664667f2d6bcd6c388b230c22b\Microsoft.VisualStudio.Tools.Applications.AddInAdapter.v9.0.ni.dll

                                Filesize

                                59KB

                                MD5

                                8c69bbdfbc8cc3fa3fa5edcd79901e94

                                SHA1

                                b8028f0f557692221d5c0160ec6ce414b2bdf19b

                                SHA256

                                a21471690e7c32c80049e17c13624820e77bca6c9c38b83d9ea8a7248086660d

                                SHA512

                                825f5b87b76303b62fc16a96b108fb1774c2aca52ac5e44cd0ac2fe2ee47d5d67947dfe7498e36bc849773f608ec5824711f8c36e375a378582eefb57c9c2557

                              • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\fc36797f7054935a6033077612905a0f\Microsoft.VisualStudio.Tools.Office.Excel.AddInAdapter.v9.0.ni.dll

                                Filesize

                                42KB

                                MD5

                                71d4273e5b77cf01239a5d4f29e064fc

                                SHA1

                                e8876dea4e4c4c099e27234742016be3c80d8b62

                                SHA256

                                f019899f829731f899a99885fd52fde1fe4a4f6fe3ecf7f7a7cfa78517c00575

                                SHA512

                                41fe67cda988c53bd087df6296d1a242cddac688718ea5a5884a72b43e9638538e64d7a59e045c0b4d490496d884cf0ec694ddf7fcb41ae3b8cbc65b7686b180

                              • C:\Windows\ehome\ehrecvr.exe

                                Filesize

                                1.2MB

                                MD5

                                4d55a0a25f3327afb93f3cab9475874e

                                SHA1

                                7b920ed0094bbcd71a128f6beab9045e9b4d0542

                                SHA256

                                7bd0d0d0a18147109d314e98b9cc22e74188d9e8a37535978b885587325a7251

                                SHA512

                                3c607eda702fa9b43fbcdcecbc04737dd161264e54434fcb4b8d4cf72df93b1eb95dcf20917a1bee226e716521504cac0761f68e46e67d4759da7a44bfb072f9

                              • C:\Windows\ehome\ehsched.exe

                                Filesize

                                1.3MB

                                MD5

                                533ca756b471d41e66346c4af5f69f37

                                SHA1

                                ad6929fdd4ac1e4a8b386eacbfa70c7dff545315

                                SHA256

                                836269435311ff2aaae44d33454238279beb14ac57965ecb5a2ec937e8ac2d84

                                SHA512

                                9f6d610abbdae19f7d412b74dbb13ee6c7233ff64efdbe8b5cac6e806d8bf77a1f337f37c1c8cbc59bcfdc586ace4e37a660a0da7ba9d198bf435dd3f74084d4

                              • C:\Windows\system32\msiexec.exe

                                Filesize

                                1.3MB

                                MD5

                                3d03c036e8a74c0bbd653256c7222117

                                SHA1

                                83f01b80fe3a6fa5a78f9e75d19093b7b1886771

                                SHA256

                                f73672205825cc7ca49f04786c39e0d96531f3071ac5ac9ae3ce5d41d4d2fe19

                                SHA512

                                a76fd5d197229be2a63de9a2b8a72434a9512c392a6725af6960c2a88395dd6068b85aed302a1a010b60842ea9861c0254a404ef1157d606b5679b164b351a19

                              • \Program Files\Windows Media Player\wmpnetwk.exe

                                Filesize

                                2.0MB

                                MD5

                                c2ec642ddb73ed005cf0a4b3690f3e68

                                SHA1

                                72999bf6c2fe07756a6b77664fa721788c0e5181

                                SHA256

                                a772025a5da7c60409656c64455f57fe8ffc0cc1001046f662d6075062579da9

                                SHA512

                                7a25f4074c132005507393c2fc4dcfd128ce9317770baf784b19a36f354523e8ec0d8530d88fa98619da9d1bf7b91d8f58aaced9e4d80cdf05eccb5b455f8dc1

                              • \Program Files\Windows Media Player\wmpnetwk.exe

                                Filesize

                                2.0MB

                                MD5

                                c2ec642ddb73ed005cf0a4b3690f3e68

                                SHA1

                                72999bf6c2fe07756a6b77664fa721788c0e5181

                                SHA256

                                a772025a5da7c60409656c64455f57fe8ffc0cc1001046f662d6075062579da9

                                SHA512

                                7a25f4074c132005507393c2fc4dcfd128ce9317770baf784b19a36f354523e8ec0d8530d88fa98619da9d1bf7b91d8f58aaced9e4d80cdf05eccb5b455f8dc1

                              • \Users\Admin\AppData\Local\Temp\mwmyjwne.exe

                                Filesize

                                85KB

                                MD5

                                ecc112538fbc387407826a46bd7f840b

                                SHA1

                                6118b642fa60a2136f63a4357e224063287ba0ae

                                SHA256

                                deeac2f4df3fefb53950790f5a89178691f4397683a1470a0663d7d33a56b9ed

                                SHA512

                                c1cc27e1e93398074d845a0da9df2eec8a00c46dc529191c7821556b21002e642b75aec14a6ae056e6fcbb996190eccd9795e11d47005235e7d2204d008ea5f2

                              • \Users\Admin\AppData\Local\Temp\mwmyjwne.exe

                                Filesize

                                85KB

                                MD5

                                ecc112538fbc387407826a46bd7f840b

                                SHA1

                                6118b642fa60a2136f63a4357e224063287ba0ae

                                SHA256

                                deeac2f4df3fefb53950790f5a89178691f4397683a1470a0663d7d33a56b9ed

                                SHA512

                                c1cc27e1e93398074d845a0da9df2eec8a00c46dc529191c7821556b21002e642b75aec14a6ae056e6fcbb996190eccd9795e11d47005235e7d2204d008ea5f2

                              • \Users\Admin\AppData\Local\Temp\mwmyjwne.exe

                                Filesize

                                85KB

                                MD5

                                ecc112538fbc387407826a46bd7f840b

                                SHA1

                                6118b642fa60a2136f63a4357e224063287ba0ae

                                SHA256

                                deeac2f4df3fefb53950790f5a89178691f4397683a1470a0663d7d33a56b9ed

                                SHA512

                                c1cc27e1e93398074d845a0da9df2eec8a00c46dc529191c7821556b21002e642b75aec14a6ae056e6fcbb996190eccd9795e11d47005235e7d2204d008ea5f2

                              • \Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe

                                Filesize

                                1.3MB

                                MD5

                                37d912763113be727c3d03757412d81e

                                SHA1

                                c908790d3b769d489073bc7658f49e25fe9c0272

                                SHA256

                                b88a5b6d0ec335d01c6b7748eea42cdc03539275749f6931299326e1e21d2337

                                SHA512

                                1655230fde7fe4a9a23fc3071aefdc12abc893642c56d91c1971b4cdce765ab997094204d58aeb7b22b1d2b0613ceec50ba2ab191b3eb2418957b8a2097c3737

                              • \Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe

                                Filesize

                                1.3MB

                                MD5

                                0cb9561f7daea0a3d7c28cff92a17f8f

                                SHA1

                                0c0601cafba841134799836e0c073eeaa4ae08ca

                                SHA256

                                17852fd6c07070668d53aca35a65986e25926df25cd0fcc9bfe8ec306cfc0385

                                SHA512

                                7975bdb9172ff28130cc31ae406f5e2f6999a5905ba3a163ed6ed4b1b9e0583a6b5d3b4bfd957c1f5b27ef0e47687efaed6e0d4ca7318a65da024ece4693bc6d

                              • \Windows\System32\Locator.exe

                                Filesize

                                1.2MB

                                MD5

                                c46b6cf85b28bc9a736fbf4d17a2fa15

                                SHA1

                                3ca14dc7af45243bd766fa562c42ff9fcfd5132e

                                SHA256

                                fc2ad01ba63b330ec5f2534356e0c232fc5a9a2a9ccf26cb28caeeab41e02418

                                SHA512

                                f5f9311e5b2b4cb0c9026c246b72f7795307b5cd7cf88a64a367af6b9eead5cadf06120c9cb1f2a330a76cf2ac68969d1c1143f6e8f52808908047a86a535967

                              • \Windows\System32\alg.exe

                                Filesize

                                1.3MB

                                MD5

                                53ee267c96e2b5b2843ae76325e59e1c

                                SHA1

                                1ba0073ae328b408e0f0646c54ecbfed51e55ae2

                                SHA256

                                4921e5b4b3fc90f1c2691e6614ef9779aba8785615163f6828a82adfc2075a7d

                                SHA512

                                ce6a8edc51ed99058ff2326db222e4c0a321160865a64efeb7c80e067c4ee214fe43ad1dfc0183788e7409124d89214217826fc6df085a4743e60fd2d3cfca2d

                              • \Windows\System32\dllhost.exe

                                Filesize

                                1.2MB

                                MD5

                                961a6b33f7ea1a458128c844044704bb

                                SHA1

                                3c2dd7f80c582213c5d105340ef98b75553eea27

                                SHA256

                                87c6455746d959e341450eb0c2a4f035a0d270b013af830f221e1d4b6eb05062

                                SHA512

                                805536b2b32392dbd97488793a0f5fa0c95521fbc3dad06f9a401acd8a664ef2a040853ee7a9b7fac32c063d28e92a6c0ad8e213e67503419ee4c765cdf71e70

                              • \Windows\System32\ieetwcollector.exe

                                Filesize

                                1.3MB

                                MD5

                                96d4de690d4f6b8c42ba950fc1f49056

                                SHA1

                                ed5dd4055e5f1033af4a7f693c81e393442b3dcb

                                SHA256

                                c44f710f960241073156e2608472797e2e7ffd15151535f5e5c7d731ecb4fb30

                                SHA512

                                ac4ec30ef13507907d96f60f40525ccedb8d03dfea86f9adcd5e5e4657a1d67fbb37ef23902b4c056322d37498fcd7d2fd8ca053f013bcf689d53e49a4145fdd

                              • \Windows\System32\msdtc.exe

                                Filesize

                                1.4MB

                                MD5

                                0d800555271ea26b68c7d4febc23d0b9

                                SHA1

                                b436acf5be9e727206300df620e3736998428b18

                                SHA256

                                0ec22592e9049a2b521f90dccc9f41b7c1cd2e1fc1d93decf6e3201ce9713a97

                                SHA512

                                fc25c6f99938b3c145321d9241eb8051ef6214f158f54ef60a85eebed5bc0436fc4c53be92dc7721870621cd7930f27e80672ec2f43102a2fe339578972897e1

                              • \Windows\System32\msiexec.exe

                                Filesize

                                1.3MB

                                MD5

                                3d03c036e8a74c0bbd653256c7222117

                                SHA1

                                83f01b80fe3a6fa5a78f9e75d19093b7b1886771

                                SHA256

                                f73672205825cc7ca49f04786c39e0d96531f3071ac5ac9ae3ce5d41d4d2fe19

                                SHA512

                                a76fd5d197229be2a63de9a2b8a72434a9512c392a6725af6960c2a88395dd6068b85aed302a1a010b60842ea9861c0254a404ef1157d606b5679b164b351a19

                              • \Windows\System32\msiexec.exe

                                Filesize

                                1.3MB

                                MD5

                                3d03c036e8a74c0bbd653256c7222117

                                SHA1

                                83f01b80fe3a6fa5a78f9e75d19093b7b1886771

                                SHA256

                                f73672205825cc7ca49f04786c39e0d96531f3071ac5ac9ae3ce5d41d4d2fe19

                                SHA512

                                a76fd5d197229be2a63de9a2b8a72434a9512c392a6725af6960c2a88395dd6068b85aed302a1a010b60842ea9861c0254a404ef1157d606b5679b164b351a19

                              • \Windows\System32\snmptrap.exe

                                Filesize

                                1.2MB

                                MD5

                                510bed35250b32b7a043bbf7478cafab

                                SHA1

                                04e56b21a66daa0ad1b08cab50ece6dd095d0caf

                                SHA256

                                b46074d86af4decd4e13205fe60c391658572a260eabdfb8cafb7d65696d8efb

                                SHA512

                                f18f567607afa17dbbb10d0903c854104fc13d7b03dd538e30fb102914d80bb0bfebcddda78e05c4e28dfd826c83adf17cb1fec5c23747587f1515a6c7e36582

                              • \Windows\System32\vds.exe

                                Filesize

                                1.7MB

                                MD5

                                76814d51128ba4f9e1cba2bf602b778e

                                SHA1

                                89e146cbd8f8d9505030d1ff3ea92e0fa6723315

                                SHA256

                                fa4422db208145943fee6af87a9f2cbd438fa622b21ffa72ef3005bdbfb49249

                                SHA512

                                5e428de3c1ffded367b58d5a03658a712334fc25c9c3f8a41f512dabcef3356dc96456b22b8b3aea75d60dc7627d6bbe03e209cdc32de1428c5bbdf826a86f8f

                              • \Windows\System32\wbem\WmiApSrv.exe

                                Filesize

                                1.4MB

                                MD5

                                a6ffad65eab763517ff71a12f1c27cd6

                                SHA1

                                47cfc7ec40721fbcd065c1ee866b18b4fd6b5094

                                SHA256

                                a5b9efe9b2d521d252f3a40e994266adb2e42435061695274136ca1e91079958

                                SHA512

                                e02d654e2d5723ce2057fdb119c4409e7d5d2c323f85f60f2da4f29cd78a060b1dc704bf4040aff537f2f3e89d14dfd28306085a9f9b51e2441c72217fef8150

                              • \Windows\System32\wbengine.exe

                                Filesize

                                2.0MB

                                MD5

                                ed51c797d84f996f72c20c525015f073

                                SHA1

                                4fa586fffe14cedb684f25f603328011e0bf8eca

                                SHA256

                                e80417d44cf88edee503275b415ddb9b727b391f8d7e1643a6f287a85a5685bc

                                SHA512

                                3b1a5ed50a250ebe89dad7cf79097903c1f63288e7a7fe9b87c8bf686067e48011024dccefe290a0832cb4c3e9a44b8c4336b292ea345e5396917cf65508a60d

                              • \Windows\ehome\ehrecvr.exe

                                Filesize

                                1.2MB

                                MD5

                                4d55a0a25f3327afb93f3cab9475874e

                                SHA1

                                7b920ed0094bbcd71a128f6beab9045e9b4d0542

                                SHA256

                                7bd0d0d0a18147109d314e98b9cc22e74188d9e8a37535978b885587325a7251

                                SHA512

                                3c607eda702fa9b43fbcdcecbc04737dd161264e54434fcb4b8d4cf72df93b1eb95dcf20917a1bee226e716521504cac0761f68e46e67d4759da7a44bfb072f9

                              • \Windows\ehome\ehsched.exe

                                Filesize

                                1.3MB

                                MD5

                                533ca756b471d41e66346c4af5f69f37

                                SHA1

                                ad6929fdd4ac1e4a8b386eacbfa70c7dff545315

                                SHA256

                                836269435311ff2aaae44d33454238279beb14ac57965ecb5a2ec937e8ac2d84

                                SHA512

                                9f6d610abbdae19f7d412b74dbb13ee6c7233ff64efdbe8b5cac6e806d8bf77a1f337f37c1c8cbc59bcfdc586ace4e37a660a0da7ba9d198bf435dd3f74084d4

                              • memory/328-101-0x0000000000400000-0x0000000000654000-memory.dmp

                                Filesize

                                2.3MB

                              • memory/328-68-0x0000000000400000-0x0000000000654000-memory.dmp

                                Filesize

                                2.3MB

                              • memory/328-72-0x0000000000400000-0x0000000000654000-memory.dmp

                                Filesize

                                2.3MB

                              • memory/328-343-0x0000000000400000-0x0000000000654000-memory.dmp

                                Filesize

                                2.3MB

                              • memory/328-321-0x0000000000400000-0x0000000000654000-memory.dmp

                                Filesize

                                2.3MB

                              • memory/328-74-0x0000000000400000-0x0000000000654000-memory.dmp

                                Filesize

                                2.3MB

                              • memory/328-79-0x0000000000220000-0x0000000000286000-memory.dmp

                                Filesize

                                408KB

                              • memory/328-73-0x0000000000220000-0x0000000000286000-memory.dmp

                                Filesize

                                408KB

                              • memory/520-160-0x0000000000860000-0x00000000008C0000-memory.dmp

                                Filesize

                                384KB

                              • memory/520-154-0x0000000000860000-0x00000000008C0000-memory.dmp

                                Filesize

                                384KB

                              • memory/520-191-0x0000000001430000-0x0000000001431000-memory.dmp

                                Filesize

                                4KB

                              • memory/520-412-0x0000000140000000-0x000000014013C000-memory.dmp

                                Filesize

                                1.2MB

                              • memory/520-178-0x0000000001380000-0x0000000001390000-memory.dmp

                                Filesize

                                64KB

                              • memory/520-164-0x0000000140000000-0x000000014013C000-memory.dmp

                                Filesize

                                1.2MB

                              • memory/520-179-0x0000000001390000-0x00000000013A0000-memory.dmp

                                Filesize

                                64KB

                              • memory/576-215-0x0000000140000000-0x0000000140205000-memory.dmp

                                Filesize

                                2.0MB

                              • memory/576-719-0x0000000140000000-0x0000000140205000-memory.dmp

                                Filesize

                                2.0MB

                              • memory/576-197-0x0000000000840000-0x00000000008A0000-memory.dmp

                                Filesize

                                384KB

                              • memory/580-162-0x0000000140000000-0x0000000140205000-memory.dmp

                                Filesize

                                2.0MB

                              • memory/596-194-0x0000000000A10000-0x0000000000A90000-memory.dmp

                                Filesize

                                512KB

                              • memory/596-265-0x0000000000A10000-0x0000000000A90000-memory.dmp

                                Filesize

                                512KB

                              • memory/596-218-0x0000000000A10000-0x0000000000A90000-memory.dmp

                                Filesize

                                512KB

                              • memory/896-175-0x0000000000890000-0x00000000008F0000-memory.dmp

                                Filesize

                                384KB

                              • memory/896-692-0x0000000140000000-0x0000000140209000-memory.dmp

                                Filesize

                                2.0MB

                              • memory/896-169-0x0000000000890000-0x00000000008F0000-memory.dmp

                                Filesize

                                384KB

                              • memory/896-437-0x0000000140000000-0x0000000140209000-memory.dmp

                                Filesize

                                2.0MB

                              • memory/896-192-0x0000000140000000-0x0000000140209000-memory.dmp

                                Filesize

                                2.0MB

                              • memory/956-388-0x0000000000400000-0x00000000005FF000-memory.dmp

                                Filesize

                                2.0MB

                              • memory/956-134-0x00000000002E0000-0x0000000000346000-memory.dmp

                                Filesize

                                408KB

                              • memory/956-125-0x00000000002E0000-0x0000000000346000-memory.dmp

                                Filesize

                                408KB

                              • memory/956-136-0x0000000000400000-0x00000000005FF000-memory.dmp

                                Filesize

                                2.0MB

                              • memory/1032-107-0x0000000140000000-0x00000001401F4000-memory.dmp

                                Filesize

                                2.0MB

                              • memory/1056-483-0x000000002E000000-0x000000002FE1E000-memory.dmp

                                Filesize

                                30.1MB

                              • memory/1056-216-0x000000002E000000-0x000000002FE1E000-memory.dmp

                                Filesize

                                30.1MB

                              • memory/1136-130-0x00000000000D0000-0x0000000000136000-memory.dmp

                                Filesize

                                408KB

                              • memory/1136-126-0x00000000000D0000-0x0000000000136000-memory.dmp

                                Filesize

                                408KB

                              • memory/1136-122-0x00000000000D0000-0x0000000000136000-memory.dmp

                                Filesize

                                408KB

                              • memory/1136-121-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

                                Filesize

                                4KB

                              • memory/1136-120-0x00000000000D0000-0x0000000000136000-memory.dmp

                                Filesize

                                408KB

                              • memory/1136-165-0x0000000002550000-0x000000000260C000-memory.dmp

                                Filesize

                                752KB

                              • memory/1472-756-0x0000000000400000-0x00000000005FF000-memory.dmp

                                Filesize

                                2.0MB

                              • memory/1596-163-0x0000000100000000-0x00000001001EC000-memory.dmp

                                Filesize

                                1.9MB

                              • memory/1628-108-0x0000000010000000-0x00000000101F6000-memory.dmp

                                Filesize

                                2.0MB

                              • memory/1700-438-0x0000000140000000-0x0000000140237000-memory.dmp

                                Filesize

                                2.2MB

                              • memory/1700-182-0x0000000000900000-0x0000000000960000-memory.dmp

                                Filesize

                                384KB

                              • memory/1700-193-0x0000000140000000-0x0000000140237000-memory.dmp

                                Filesize

                                2.2MB

                              • memory/1700-188-0x0000000000900000-0x0000000000960000-memory.dmp

                                Filesize

                                384KB

                              • memory/1720-117-0x0000000010000000-0x00000000101FE000-memory.dmp

                                Filesize

                                2.0MB

                              • memory/1808-104-0x0000000100000000-0x00000001001FB000-memory.dmp

                                Filesize

                                2.0MB

                              • memory/1808-93-0x00000000001C0000-0x0000000000220000-memory.dmp

                                Filesize

                                384KB

                              • memory/1808-87-0x00000000001C0000-0x0000000000220000-memory.dmp

                                Filesize

                                384KB

                              • memory/2120-224-0x0000000140000000-0x0000000140221000-memory.dmp

                                Filesize

                                2.1MB

                              • memory/2120-241-0x0000000140000000-0x0000000140221000-memory.dmp

                                Filesize

                                2.1MB

                              • memory/2128-401-0x0000000000400000-0x00000000005FF000-memory.dmp

                                Filesize

                                2.0MB

                              • memory/2188-260-0x0000000000400000-0x00000000005FF000-memory.dmp

                                Filesize

                                2.0MB

                              • memory/2204-399-0x0000000100000000-0x00000001001ED000-memory.dmp

                                Filesize

                                1.9MB

                              • memory/2208-754-0x0000000000400000-0x00000000005FF000-memory.dmp

                                Filesize

                                2.0MB

                              • memory/2284-270-0x0000000140000000-0x000000014020D000-memory.dmp

                                Filesize

                                2.1MB

                              • memory/2284-687-0x0000000140000000-0x000000014020D000-memory.dmp

                                Filesize

                                2.1MB

                              • memory/2328-266-0x0000000000400000-0x00000000005FF000-memory.dmp

                                Filesize

                                2.0MB

                              • memory/2328-290-0x0000000000400000-0x00000000005FF000-memory.dmp

                                Filesize

                                2.0MB

                              • memory/2344-394-0x0000000000400000-0x00000000005FF000-memory.dmp

                                Filesize

                                2.0MB

                              • memory/2344-706-0x0000000000400000-0x00000000005FF000-memory.dmp

                                Filesize

                                2.0MB

                              • memory/2392-391-0x0000000100000000-0x000000010026B000-memory.dmp

                                Filesize

                                2.4MB

                              • memory/2528-487-0x0000000100000000-0x0000000100123000-memory.dmp

                                Filesize

                                1.1MB

                              • memory/2528-295-0x0000000000400000-0x00000000005FF000-memory.dmp

                                Filesize

                                2.0MB

                              • memory/2528-330-0x0000000000400000-0x00000000005FF000-memory.dmp

                                Filesize

                                2.0MB

                              • memory/2592-413-0x0000000100000000-0x0000000100219000-memory.dmp

                                Filesize

                                2.1MB

                              • memory/2608-444-0x0000000100000000-0x000000010021B000-memory.dmp

                                Filesize

                                2.1MB

                              • memory/2612-734-0x0000000000400000-0x00000000005FF000-memory.dmp

                                Filesize

                                2.0MB

                              • memory/2620-322-0x0000000000580000-0x0000000000789000-memory.dmp

                                Filesize

                                2.0MB

                              • memory/2620-294-0x0000000100000000-0x0000000100209000-memory.dmp

                                Filesize

                                2.0MB

                              • memory/2620-693-0x0000000100000000-0x0000000100209000-memory.dmp

                                Filesize

                                2.0MB

                              • memory/2620-713-0x0000000000580000-0x0000000000789000-memory.dmp

                                Filesize

                                2.0MB

                              • memory/2700-440-0x0000000100000000-0x0000000100202000-memory.dmp

                                Filesize

                                2.0MB

                              • memory/2788-323-0x000000002E000000-0x000000002E20C000-memory.dmp

                                Filesize

                                2.0MB

                              • memory/2820-324-0x0000000100000000-0x0000000100542000-memory.dmp

                                Filesize

                                5.3MB

                              • memory/2820-718-0x0000000100000000-0x0000000100542000-memory.dmp

                                Filesize

                                5.3MB

                              • memory/2912-364-0x0000000000400000-0x00000000005FF000-memory.dmp

                                Filesize

                                2.0MB

                              • memory/2912-352-0x0000000000400000-0x00000000005FF000-memory.dmp

                                Filesize

                                2.0MB

                              • memory/2920-351-0x0000000001000000-0x00000000011ED000-memory.dmp

                                Filesize

                                1.9MB

                              • memory/2972-485-0x0000000100000000-0x000000010020A000-memory.dmp

                                Filesize

                                2.0MB

                              • memory/2980-755-0x0000000100000000-0x00000001001EC000-memory.dmp

                                Filesize

                                1.9MB

                              • memory/2980-348-0x0000000100000000-0x00000001001EC000-memory.dmp

                                Filesize

                                1.9MB

                              • memory/3000-742-0x0000000000400000-0x00000000005FF000-memory.dmp

                                Filesize

                                2.0MB

                              • memory/3048-723-0x0000000000400000-0x00000000005FF000-memory.dmp

                                Filesize

                                2.0MB