Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    08-05-2023 13:58

General

  • Target

    2400-141-0x0000000000400000-0x0000000000654000-memory.exe

  • Size

    2.3MB

  • MD5

    5e4d44611a4d8d2430c8211acb694967

  • SHA1

    f430285ee08c520afb744b6627437c63384f0f81

  • SHA256

    4c6787b95635786816b6cfc6547d7581a0bb1ac83be74929b7cc2270c28bf32d

  • SHA512

    1667be8948f54d0e515aba59b7f27a1597749cfcc82386dfc01450872b2ccf719246dcc8b9d9366ee3133cc8f33768bc195a78cad61483b515a7c323b3ef758a

  • SSDEEP

    24576:YxgsRftD0C2nKGL0Djsf9nz4mloFQnpXUMPQDR6q79dA:YaSftDnGYDYf5zaCpXxPuR6E9dA

Malware Config

Extracted

Family

blustealer

C2

https://api.telegram.org/bot5797428905:AAGaRRXGZN1d9GGFd3sE5x4uSpCGF0PU4m4/sendMessage?chat_id=1251788325

Signatures

  • BluStealer

    A Modular information stealer written in Visual Basic.

  • Executes dropped EXE 60 IoCs
  • Loads dropped DLL 20 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Drops file in System32 directory 19 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 50 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 26 IoCs
  • Suspicious use of AdjustPrivilegeToken 49 IoCs
  • Suspicious use of SetWindowsHookEx 15 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2400-141-0x0000000000400000-0x0000000000654000-memory.exe
    "C:\Users\Admin\AppData\Local\Temp\2400-141-0x0000000000400000-0x0000000000654000-memory.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious use of SetThreadContext
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1804
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
      2⤵
      • Accesses Microsoft Outlook profiles
      • outlook_office_path
      • outlook_win_path
      PID:552
  • C:\Windows\System32\alg.exe
    C:\Windows\System32\alg.exe
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:540
  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe
    C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe
    1⤵
    • Executes dropped EXE
    PID:2040
  • C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe
    C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe
    1⤵
    • Executes dropped EXE
    • Drops file in Windows directory
    PID:1296
  • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe
    C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe
    1⤵
    • Executes dropped EXE
    • Drops file in Windows directory
    PID:1952
  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
    C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
    1⤵
    • Executes dropped EXE
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1668
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1f0 -InterruptEvent 1dc -NGENProcess 1e0 -Pipe 1ec -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:836
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1e8 -InterruptEvent 24c -NGENProcess 254 -Pipe 258 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:1760
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 254 -InterruptEvent 1f8 -NGENProcess 1e8 -Pipe 24c -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2264
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 254 -InterruptEvent 1dc -NGENProcess 244 -Pipe 1f0 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2520
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1dc -InterruptEvent 25c -NGENProcess 1f8 -Pipe 1e0 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2700
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1f8 -InterruptEvent 23c -NGENProcess 1dc -Pipe 25c -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:980
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 274 -InterruptEvent 23c -NGENProcess 1f8 -Pipe 244 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2268
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 23c -InterruptEvent 27c -NGENProcess 1dc -Pipe 270 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:1512
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 27c -InterruptEvent 284 -NGENProcess 1e8 -Pipe 280 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:1688
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 27c -InterruptEvent 240 -NGENProcess 278 -Pipe 248 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:1916
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1dc -InterruptEvent 274 -NGENProcess 1f8 -Pipe 27c -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2532
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 274 -InterruptEvent 288 -NGENProcess 278 -Pipe 260 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2988
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 23c -InterruptEvent 1dc -NGENProcess 290 -Pipe 274 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:992
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1dc -InterruptEvent 290 -NGENProcess 28c -Pipe 294 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2192
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 284 -InterruptEvent 290 -NGENProcess 1dc -Pipe 1e8 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:1736
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 240 -InterruptEvent 278 -NGENProcess 29c -Pipe 284 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2744
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 278 -InterruptEvent 1f8 -NGENProcess 1dc -Pipe 288 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2316
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2a0 -InterruptEvent 1f8 -NGENProcess 278 -Pipe 290 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:1344
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 23c -InterruptEvent 1f8 -NGENProcess 2a0 -Pipe 1dc -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2964
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 298 -InterruptEvent 2a4 -NGENProcess 2ac -Pipe 23c -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:1144
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2a4 -InterruptEvent 268 -NGENProcess 2a0 -Pipe 29c -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:1640
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2b0 -InterruptEvent 298 -NGENProcess 2b4 -Pipe 2a4 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2680
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 240 -InterruptEvent 298 -NGENProcess 2b0 -Pipe 2a0 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2380
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 220 -InterruptEvent 230 -NGENProcess 200 -Pipe 1bc -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2900
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 230 -InterruptEvent 280 -NGENProcess 29c -Pipe 248 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:668
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 270 -InterruptEvent 220 -NGENProcess 244 -Pipe 230 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2580
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 27c -InterruptEvent 220 -NGENProcess 270 -Pipe 29c -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:3056
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 294 -InterruptEvent 220 -NGENProcess 27c -Pipe 244 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Windows directory
      PID:2884
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 260 -InterruptEvent 27c -NGENProcess 25c -Pipe 274 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:1232
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 27c -InterruptEvent 258 -NGENProcess 220 -Pipe 24c -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Windows directory
      PID:2736
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 224 -InterruptEvent 260 -NGENProcess 1cc -Pipe 27c -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:544
  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
    C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
    1⤵
    • Executes dropped EXE
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:928
    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 170 -InterruptEvent 15c -NGENProcess 160 -Pipe 16c -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2420
    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 168 -InterruptEvent 1dc -NGENProcess 1e4 -Pipe 1e8 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2192
  • C:\Windows\system32\dllhost.exe
    C:\Windows\system32\dllhost.exe /Processid:{02D4B3F1-FD88-11D1-960D-00805FC79235}
    1⤵
    • Executes dropped EXE
    • Drops file in Windows directory
    PID:1756
  • C:\Windows\ehome\ehRecvr.exe
    C:\Windows\ehome\ehRecvr.exe
    1⤵
    • Executes dropped EXE
    • Modifies data under HKEY_USERS
    PID:1224
  • C:\Windows\ehome\ehsched.exe
    C:\Windows\ehome\ehsched.exe
    1⤵
    • Executes dropped EXE
    PID:1652
  • C:\Windows\eHome\EhTray.exe
    "C:\Windows\eHome\EhTray.exe" /nav:-2
    1⤵
      PID:1536
    • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
      "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
      1⤵
      • Executes dropped EXE
      PID:108
    • C:\Windows\ehome\ehRec.exe
      C:\Windows\ehome\ehRec.exe -Embedding
      1⤵
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1344
    • C:\Windows\system32\IEEtwCollector.exe
      C:\Windows\system32\IEEtwCollector.exe /V
      1⤵
      • Executes dropped EXE
      PID:1544
    • C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE" /auditservice
      1⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Modifies data under HKEY_USERS
      PID:1612
    • C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe
      "C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"
      1⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      PID:2212
    • C:\Windows\System32\msdtc.exe
      C:\Windows\System32\msdtc.exe
      1⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Drops file in Windows directory
      PID:2404
    • C:\Windows\system32\msiexec.exe
      C:\Windows\system32\msiexec.exe /V
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of AdjustPrivilegeToken
      PID:2540
    • C:\Program Files (x86)\Common Files\Microsoft Shared\Source Engine\OSE.EXE
      "C:\Program Files (x86)\Common Files\Microsoft Shared\Source Engine\OSE.EXE"
      1⤵
      • Executes dropped EXE
      PID:2748
    • C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE
      "C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"
      1⤵
      • Executes dropped EXE
      • Modifies data under HKEY_USERS
      PID:2876
    • C:\Windows\SysWow64\perfhost.exe
      C:\Windows\SysWow64\perfhost.exe
      1⤵
      • Executes dropped EXE
      PID:2980
    • C:\Windows\system32\locator.exe
      C:\Windows\system32\locator.exe
      1⤵
      • Executes dropped EXE
      PID:3012
    • C:\Windows\System32\snmptrap.exe
      C:\Windows\System32\snmptrap.exe
      1⤵
      • Executes dropped EXE
      PID:1132
    • C:\Windows\System32\vds.exe
      C:\Windows\System32\vds.exe
      1⤵
      • Executes dropped EXE
      PID:2224
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:2388
    • C:\Windows\system32\wbengine.exe
      "C:\Windows\system32\wbengine.exe"
      1⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:2456
    • C:\Windows\system32\wbem\WmiApSrv.exe
      C:\Windows\system32\wbem\WmiApSrv.exe
      1⤵
      • Executes dropped EXE
      PID:2188
    • C:\Program Files\Windows Media Player\wmpnetwk.exe
      "C:\Program Files\Windows Media Player\wmpnetwk.exe"
      1⤵
      • Executes dropped EXE
      • Modifies data under HKEY_USERS
      • Suspicious use of AdjustPrivilegeToken
      PID:2712
    • C:\Windows\system32\SearchIndexer.exe
      C:\Windows\system32\SearchIndexer.exe /Embedding
      1⤵
      • Executes dropped EXE
      • Modifies data under HKEY_USERS
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2908
      • C:\Windows\system32\SearchProtocolHost.exe
        "C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe_S-1-5-21-2647223082-2067913677-935928954-10001_ Global\UsGthrCtrlFltPipeMssGthrPipe_S-1-5-21-2647223082-2067913677-935928954-10001 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon" "1"
        2⤵
        • Suspicious use of SetWindowsHookEx
        PID:2736
      • C:\Windows\system32\SearchFilterHost.exe
        "C:\Windows\system32\SearchFilterHost.exe" 0 588 592 600 65536 596
        2⤵
        • Modifies data under HKEY_USERS
        PID:1428
      • C:\Windows\system32\SearchProtocolHost.exe
        "C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe2_ Global\UsGthrCtrlFltPipeMssGthrPipe2 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon"
        2⤵
        • Modifies data under HKEY_USERS
        • Suspicious use of SetWindowsHookEx
        PID:2468

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\Common Files\microsoft shared\Source Engine\OSE.EXE

      Filesize

      1.4MB

      MD5

      df5b41fafada5b1346607a785bf59509

      SHA1

      dcafe33369490ef35a44c4e4b5686b98d044d926

      SHA256

      18a1270d161e79cbd54c0f989d78aded8373a203756bcab25c0c6e64a10922f4

      SHA512

      f4815f28eb8eedb1942db352e41e0d0ef02341e3739f73af917c7a961cef739d0bde9bea23942628b9ef406d7748c7f3eb6e78b67647be8e17da6980ae8c118b

    • C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE

      Filesize

      30.1MB

      MD5

      d15c8c3e560801cabd886e780a0270b0

      SHA1

      b6b7a68678db100cb7c4715045714e222585663b

      SHA256

      17a1a4b61ccf390d7ac420350f20c4f2964c0281d996f1100820f0afdd2ef805

      SHA512

      957e9fb6078eae4e38d4e9b471bc6fe38dcccf88a297adf644fd4a4f0afc452651e1f589a4c1105bca7282f57f7772630cbc1f4d686976bfd12d1327be6567cc

    • C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe

      Filesize

      1.4MB

      MD5

      834fe341b98faca5e92c15327f258baf

      SHA1

      a3c66e1ac056c5db82a55afe43fb613137fabf5f

      SHA256

      88277569d85bc8d379e11e092efeac66b74fdf99de825b096a13a01fed1bd977

      SHA512

      270bcd15b2fde8b82b24dabbfbee1436d3d2d135d3a1e330872432ecd9a9433b39de2320c017706e767e414b6abf727efd30cf288ad6441fab705821e72ccdf5

    • C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE

      Filesize

      5.2MB

      MD5

      69349a3728485f20f9f323e856a2f66a

      SHA1

      e3bfcd56b4d902ab7b71590d064bb0023f8aa69c

      SHA256

      3d41b80ce19a34ce720e1e4fe2b2787fab07ed0b9fc258207fdcd1e1477b638a

      SHA512

      8416ec8b7dad2a66f7f594281c4c814b027496304c343d6e7dc771f87b21ec64e7cb8a75978c7447b8c8c36505fcff3f253bb3756b584fc0d871889749785e2f

    • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe

      Filesize

      2.1MB

      MD5

      c000b2d0d37f88fbebc2125764a2490f

      SHA1

      efda2521831819d5348ab31017691be79ca01d24

      SHA256

      b23c52a22ead77999f894787958024a5a244ee2a5c4dd30fb987d168dc538a0c

      SHA512

      0b9e88870f9bbf2cbd8f7056ed0284912f818da3059db62283043115706aa67201408f8638f86f92a32b7180a9a8415f19f00f5ba2790983de80595fca30fcd0

    • C:\Program Files\Windows Media Player\wmpnetwk.exe

      Filesize

      2.0MB

      MD5

      9f806db6822a4bc948d18b3be75f1ea0

      SHA1

      07875a3dfd80bc43427e69a2324b9ac4e41af1a5

      SHA256

      daf00044b727879fb93e11e128db88efcd7781c3c5ad4d9ef341b1a657c5d4ae

      SHA512

      d566374cf60270b9d8dff8e70d8319947ad1001095c799843f7d1b7982a9b9a39bf6cfc5e4694368369b7e865051d277e3938069db8f29b40bf3db479088c327

    • C:\ProgramData\Microsoft\Search\Data\Applications\Windows\MSS.log

      Filesize

      1024KB

      MD5

      c194b25c6f7750aefec4cafb5bd17959

      SHA1

      b10f795fd39e871a7bdf2234c8906a7143483cb9

      SHA256

      8849e045cc953e359023f082406b1eb5e840111cd067910387e8d33fabecd723

      SHA512

      42c90c533641c6df67d7a8dbe60bd0612463f583708fdd0bed10fd482f5f91ee2b1417bd1f11d96f88128b547cd47c1ef3042ca957f36342c0662d7b427d8d0b

    • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe

      Filesize

      1.3MB

      MD5

      9c99d376acc1225cff9bde8f1e2f814a

      SHA1

      295a663c545c68979a33069d4c26135e44d05e07

      SHA256

      e0c5678e1a42072666f1d8622ba43ec7d6288b5a97a01e6ae6960a03c7de4c14

      SHA512

      3ce1f3c363cfa6d2c2088c97c3a865efd7fb1b71b43f40a3efa162e9f34771970e58ae8db7d6a22262e5fb3480a886a9eca8782880bbeb84449e8822d5311a03

    • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe

      Filesize

      1.3MB

      MD5

      9c99d376acc1225cff9bde8f1e2f814a

      SHA1

      295a663c545c68979a33069d4c26135e44d05e07

      SHA256

      e0c5678e1a42072666f1d8622ba43ec7d6288b5a97a01e6ae6960a03c7de4c14

      SHA512

      3ce1f3c363cfa6d2c2088c97c3a865efd7fb1b71b43f40a3efa162e9f34771970e58ae8db7d6a22262e5fb3480a886a9eca8782880bbeb84449e8822d5311a03

    • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ngen_service.log

      Filesize

      872KB

      MD5

      c4a856c27a874e0bd94d00c404952f5c

      SHA1

      5722efc9da18871848dfa903f474bf33af4065d4

      SHA256

      138df7ebfad80d83f040b4807f9a8fb4829c0f0f62e9c07710b4f45af82d48cd

      SHA512

      d2092b604c0f7155a7eae8d0c6f79bbc7fffa38a503f1f779ebf30fa774340e077278d371c51ce3100f7ea4c5d732ce2a15f73322bf3e581839c14ae720b30d0

    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe

      Filesize

      1.3MB

      MD5

      b63dee3113ae0b9fb444ff5594201c0f

      SHA1

      a842f279f489530f297396397a4e89f6858f4da7

      SHA256

      e1d9b00fd5e5b5e8a73c31855d24a430c1a841e62f8d9a9c7f6df2fc850914cb

      SHA512

      3888aee59b491eed07018418a47d78be714faf1d1ebf76706f5f48b6dcb6cabda70ea750788878797cac6b93a353dcfc920bd18cb86b3a0d69c688c3e3f54c8a

    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe

      Filesize

      1.3MB

      MD5

      f169d51dcb256df5b7806fb3e9bebb99

      SHA1

      8076c3fd2bca9b8def1bbf12be7bcb347bd46c8e

      SHA256

      fe89e0aeb8946fd7de666d1f901890c126e2ab8ef7defc979d8a25a2c7601db4

      SHA512

      97f15624c5caac54f170cf9648518b5ffd9498582670750e06d87dd15fb60c12552fdcfd4059fc8b640008de050a8b98561d2b02206e07213c133b168d955d01

    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe

      Filesize

      1.3MB

      MD5

      f169d51dcb256df5b7806fb3e9bebb99

      SHA1

      8076c3fd2bca9b8def1bbf12be7bcb347bd46c8e

      SHA256

      fe89e0aeb8946fd7de666d1f901890c126e2ab8ef7defc979d8a25a2c7601db4

      SHA512

      97f15624c5caac54f170cf9648518b5ffd9498582670750e06d87dd15fb60c12552fdcfd4059fc8b640008de050a8b98561d2b02206e07213c133b168d955d01

    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe

      Filesize

      1.3MB

      MD5

      2307fae32f5639e4274cb7b30f20b396

      SHA1

      bf4efa1b3d89e5887976d039bf6c61852ba669a4

      SHA256

      8566fffb8f7eb38f8e1872c30ca0ecdafaf73c9d65f114c8593fd54322780dbb

      SHA512

      0f538b594f5b74316bf0a3b5aacc31e99eba2e7155d6ab84442f729b4c450aba36309e18b30a77bbf41fa91ea92dcd3a9814b9a695e6ac26aa57768ef5ebb241

    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe

      Filesize

      1.3MB

      MD5

      2307fae32f5639e4274cb7b30f20b396

      SHA1

      bf4efa1b3d89e5887976d039bf6c61852ba669a4

      SHA256

      8566fffb8f7eb38f8e1872c30ca0ecdafaf73c9d65f114c8593fd54322780dbb

      SHA512

      0f538b594f5b74316bf0a3b5aacc31e99eba2e7155d6ab84442f729b4c450aba36309e18b30a77bbf41fa91ea92dcd3a9814b9a695e6ac26aa57768ef5ebb241

    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\ngen_service.log

      Filesize

      1003KB

      MD5

      a2e6f4353e05d5ea44b8f37fa292985f

      SHA1

      da768505a6ea03f86a0e3bce0d87d716e4d66b9e

      SHA256

      899de26c32d1e3b7c9d1cf44dba90e90b76749eeaf7a3f6717d6df36af3d2fa3

      SHA512

      2e4f7a57215fbb83d3c37723c6cece81168bcac7cde3b4b6cb2656fc891cc83016ae05d892196556190d99c9af7d840c24b0c9f1f6b450822ccf1a5e26ad7d8a

    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe

      Filesize

      1.3MB

      MD5

      313ad07ebe1ea9d5f01ad720ed6a03df

      SHA1

      6316736ce5db6b60f79bc0c4290d235c09fa2688

      SHA256

      a1d50ee6a2284dc5f496177f2516813a7911d00ca6f4ec32d19ae66c5cfa476e

      SHA512

      0b5571c5080360684026bb15f975ea1f279799711c8943ed140ae826dbc9d502231490a9e6315abb226b384d51e79c4fe6bfd71c1b98d658011a02fca09dbfe5

    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe

      Filesize

      1.3MB

      MD5

      313ad07ebe1ea9d5f01ad720ed6a03df

      SHA1

      6316736ce5db6b60f79bc0c4290d235c09fa2688

      SHA256

      a1d50ee6a2284dc5f496177f2516813a7911d00ca6f4ec32d19ae66c5cfa476e

      SHA512

      0b5571c5080360684026bb15f975ea1f279799711c8943ed140ae826dbc9d502231490a9e6315abb226b384d51e79c4fe6bfd71c1b98d658011a02fca09dbfe5

    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe

      Filesize

      1.3MB

      MD5

      313ad07ebe1ea9d5f01ad720ed6a03df

      SHA1

      6316736ce5db6b60f79bc0c4290d235c09fa2688

      SHA256

      a1d50ee6a2284dc5f496177f2516813a7911d00ca6f4ec32d19ae66c5cfa476e

      SHA512

      0b5571c5080360684026bb15f975ea1f279799711c8943ed140ae826dbc9d502231490a9e6315abb226b384d51e79c4fe6bfd71c1b98d658011a02fca09dbfe5

    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe

      Filesize

      1.3MB

      MD5

      313ad07ebe1ea9d5f01ad720ed6a03df

      SHA1

      6316736ce5db6b60f79bc0c4290d235c09fa2688

      SHA256

      a1d50ee6a2284dc5f496177f2516813a7911d00ca6f4ec32d19ae66c5cfa476e

      SHA512

      0b5571c5080360684026bb15f975ea1f279799711c8943ed140ae826dbc9d502231490a9e6315abb226b384d51e79c4fe6bfd71c1b98d658011a02fca09dbfe5

    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe

      Filesize

      1.3MB

      MD5

      313ad07ebe1ea9d5f01ad720ed6a03df

      SHA1

      6316736ce5db6b60f79bc0c4290d235c09fa2688

      SHA256

      a1d50ee6a2284dc5f496177f2516813a7911d00ca6f4ec32d19ae66c5cfa476e

      SHA512

      0b5571c5080360684026bb15f975ea1f279799711c8943ed140ae826dbc9d502231490a9e6315abb226b384d51e79c4fe6bfd71c1b98d658011a02fca09dbfe5

    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe

      Filesize

      1.3MB

      MD5

      313ad07ebe1ea9d5f01ad720ed6a03df

      SHA1

      6316736ce5db6b60f79bc0c4290d235c09fa2688

      SHA256

      a1d50ee6a2284dc5f496177f2516813a7911d00ca6f4ec32d19ae66c5cfa476e

      SHA512

      0b5571c5080360684026bb15f975ea1f279799711c8943ed140ae826dbc9d502231490a9e6315abb226b384d51e79c4fe6bfd71c1b98d658011a02fca09dbfe5

    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe

      Filesize

      1.3MB

      MD5

      313ad07ebe1ea9d5f01ad720ed6a03df

      SHA1

      6316736ce5db6b60f79bc0c4290d235c09fa2688

      SHA256

      a1d50ee6a2284dc5f496177f2516813a7911d00ca6f4ec32d19ae66c5cfa476e

      SHA512

      0b5571c5080360684026bb15f975ea1f279799711c8943ed140ae826dbc9d502231490a9e6315abb226b384d51e79c4fe6bfd71c1b98d658011a02fca09dbfe5

    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe

      Filesize

      1.3MB

      MD5

      313ad07ebe1ea9d5f01ad720ed6a03df

      SHA1

      6316736ce5db6b60f79bc0c4290d235c09fa2688

      SHA256

      a1d50ee6a2284dc5f496177f2516813a7911d00ca6f4ec32d19ae66c5cfa476e

      SHA512

      0b5571c5080360684026bb15f975ea1f279799711c8943ed140ae826dbc9d502231490a9e6315abb226b384d51e79c4fe6bfd71c1b98d658011a02fca09dbfe5

    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe

      Filesize

      1.3MB

      MD5

      313ad07ebe1ea9d5f01ad720ed6a03df

      SHA1

      6316736ce5db6b60f79bc0c4290d235c09fa2688

      SHA256

      a1d50ee6a2284dc5f496177f2516813a7911d00ca6f4ec32d19ae66c5cfa476e

      SHA512

      0b5571c5080360684026bb15f975ea1f279799711c8943ed140ae826dbc9d502231490a9e6315abb226b384d51e79c4fe6bfd71c1b98d658011a02fca09dbfe5

    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe

      Filesize

      1.3MB

      MD5

      313ad07ebe1ea9d5f01ad720ed6a03df

      SHA1

      6316736ce5db6b60f79bc0c4290d235c09fa2688

      SHA256

      a1d50ee6a2284dc5f496177f2516813a7911d00ca6f4ec32d19ae66c5cfa476e

      SHA512

      0b5571c5080360684026bb15f975ea1f279799711c8943ed140ae826dbc9d502231490a9e6315abb226b384d51e79c4fe6bfd71c1b98d658011a02fca09dbfe5

    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe

      Filesize

      1.3MB

      MD5

      313ad07ebe1ea9d5f01ad720ed6a03df

      SHA1

      6316736ce5db6b60f79bc0c4290d235c09fa2688

      SHA256

      a1d50ee6a2284dc5f496177f2516813a7911d00ca6f4ec32d19ae66c5cfa476e

      SHA512

      0b5571c5080360684026bb15f975ea1f279799711c8943ed140ae826dbc9d502231490a9e6315abb226b384d51e79c4fe6bfd71c1b98d658011a02fca09dbfe5

    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe

      Filesize

      1.3MB

      MD5

      313ad07ebe1ea9d5f01ad720ed6a03df

      SHA1

      6316736ce5db6b60f79bc0c4290d235c09fa2688

      SHA256

      a1d50ee6a2284dc5f496177f2516813a7911d00ca6f4ec32d19ae66c5cfa476e

      SHA512

      0b5571c5080360684026bb15f975ea1f279799711c8943ed140ae826dbc9d502231490a9e6315abb226b384d51e79c4fe6bfd71c1b98d658011a02fca09dbfe5

    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe

      Filesize

      1.3MB

      MD5

      313ad07ebe1ea9d5f01ad720ed6a03df

      SHA1

      6316736ce5db6b60f79bc0c4290d235c09fa2688

      SHA256

      a1d50ee6a2284dc5f496177f2516813a7911d00ca6f4ec32d19ae66c5cfa476e

      SHA512

      0b5571c5080360684026bb15f975ea1f279799711c8943ed140ae826dbc9d502231490a9e6315abb226b384d51e79c4fe6bfd71c1b98d658011a02fca09dbfe5

    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe

      Filesize

      1.3MB

      MD5

      313ad07ebe1ea9d5f01ad720ed6a03df

      SHA1

      6316736ce5db6b60f79bc0c4290d235c09fa2688

      SHA256

      a1d50ee6a2284dc5f496177f2516813a7911d00ca6f4ec32d19ae66c5cfa476e

      SHA512

      0b5571c5080360684026bb15f975ea1f279799711c8943ed140ae826dbc9d502231490a9e6315abb226b384d51e79c4fe6bfd71c1b98d658011a02fca09dbfe5

    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe

      Filesize

      1.3MB

      MD5

      313ad07ebe1ea9d5f01ad720ed6a03df

      SHA1

      6316736ce5db6b60f79bc0c4290d235c09fa2688

      SHA256

      a1d50ee6a2284dc5f496177f2516813a7911d00ca6f4ec32d19ae66c5cfa476e

      SHA512

      0b5571c5080360684026bb15f975ea1f279799711c8943ed140ae826dbc9d502231490a9e6315abb226b384d51e79c4fe6bfd71c1b98d658011a02fca09dbfe5

    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe

      Filesize

      1.3MB

      MD5

      313ad07ebe1ea9d5f01ad720ed6a03df

      SHA1

      6316736ce5db6b60f79bc0c4290d235c09fa2688

      SHA256

      a1d50ee6a2284dc5f496177f2516813a7911d00ca6f4ec32d19ae66c5cfa476e

      SHA512

      0b5571c5080360684026bb15f975ea1f279799711c8943ed140ae826dbc9d502231490a9e6315abb226b384d51e79c4fe6bfd71c1b98d658011a02fca09dbfe5

    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe

      Filesize

      1.3MB

      MD5

      313ad07ebe1ea9d5f01ad720ed6a03df

      SHA1

      6316736ce5db6b60f79bc0c4290d235c09fa2688

      SHA256

      a1d50ee6a2284dc5f496177f2516813a7911d00ca6f4ec32d19ae66c5cfa476e

      SHA512

      0b5571c5080360684026bb15f975ea1f279799711c8943ed140ae826dbc9d502231490a9e6315abb226b384d51e79c4fe6bfd71c1b98d658011a02fca09dbfe5

    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe

      Filesize

      1.3MB

      MD5

      313ad07ebe1ea9d5f01ad720ed6a03df

      SHA1

      6316736ce5db6b60f79bc0c4290d235c09fa2688

      SHA256

      a1d50ee6a2284dc5f496177f2516813a7911d00ca6f4ec32d19ae66c5cfa476e

      SHA512

      0b5571c5080360684026bb15f975ea1f279799711c8943ed140ae826dbc9d502231490a9e6315abb226b384d51e79c4fe6bfd71c1b98d658011a02fca09dbfe5

    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen_service.log

      Filesize

      8KB

      MD5

      c7783d2026368dd1b37c6ea577b6cd4c

      SHA1

      b46c2ec347a5c6d546395e9e8b2132290967ad8f

      SHA256

      c305723d2d46553f4a401b11ba2e2bc9a2bb86e3d04c02b90eeb627176d85533

      SHA512

      1991467ee58cc8653d458c753c9c21fc64d2e9242de26494d229bde72bd05419c7907739e4c9af4d42ccf9dca5c2b764396752b0619afe5640704b39dbda021c

    • C:\Windows\SysWOW64\perfhost.exe

      Filesize

      1.2MB

      MD5

      439a14c5ee9551625193e243969b7509

      SHA1

      87c211c3029c596c5abfb6224d71caec9b48d4eb

      SHA256

      80af2cf25fc435690fa199d49e312bef93c559733131365b870b23ee8d2841bc

      SHA512

      9d84e6a537f05fc91f2436e25e128c8f99b55900ea76514d0b6717149f6e88a3dd8be39007fb628caa09072cd27844e0c35dd188ee57ba5cf299cf1c6755251a

    • C:\Windows\System32\Locator.exe

      Filesize

      1.2MB

      MD5

      f95d9a47e5edb8d90ef7ea8f9477afff

      SHA1

      a4c3c2c6b8144828d48f24f3a52f6280aa768693

      SHA256

      41325867ea4b474e3b1611f6714e01141bb76a36f4f78b6dc2f7eb236e1fcff2

      SHA512

      842e262bd5c7f4ae238ceb4af01cf8ff14a83adc514d610590bf12ecb8b8f0e2ccc66071ce6a9cbee415e0a79bd9aef9a68bc8993e662cf8837937e323312613

    • C:\Windows\System32\SearchIndexer.exe

      Filesize

      1.1MB

      MD5

      4c34148cb96a53908b83003dfcbe2300

      SHA1

      4c3940afd90305777fe41f86823bcea4d835d20b

      SHA256

      d791e698fc751a7c7a5b226fd386fac25981ede49b62ccfedde94898d57f723c

      SHA512

      1c659262931ae23e0d0dbcd0fc00090aae5304d0f21e584adfe5847447ddd202faec3f89a16741cd6051b0a596ceb4af8f1e0bef1d9e1a55da20e4e6e4eaac35

    • C:\Windows\System32\VSSVC.exe

      Filesize

      2.1MB

      MD5

      0ee581635460841d9dbac0f4e165c72a

      SHA1

      6d8ae88109264260fe607c48b3acea317731466f

      SHA256

      6f870e5be081544d278c19b7b7e635228084fca09952dc8dd23cb0cff9e676e0

      SHA512

      e47c3ef7bdbaf1af92d6cab376bc8d0bd3caad5a4be278ba5c7458542f7de81f6c01c3495c3d8ebe3ef035592078ade77658f3cb99fa0a7d77f1a447740b5bd3

    • C:\Windows\System32\alg.exe

      Filesize

      1.3MB

      MD5

      733531b868134522236308178e816b0e

      SHA1

      82e8d226251b8e0a85d8692cb272654740acdeb5

      SHA256

      e03a045f5170ea7e3b8869986e58fd77059afb45e3c472fbed6a607c6e560c48

      SHA512

      d40ad96fe1a5957ca3a3309807f324978d6b84765e855cde4d48ae40baf00200d750f8bdf274f953f501d6d7dacd543db90ea8ce3041e9ff0845c7edda6b8a09

    • C:\Windows\System32\dllhost.exe

      Filesize

      1.2MB

      MD5

      874b24b6f32743cca8ed222f761d93a0

      SHA1

      8894a154a451fe0b92869574b3b4b1721e6f58ce

      SHA256

      5fc58d964640cf8087c8bbb901436edfca3c872c35bcdc5b9c7a2c692c103aaf

      SHA512

      89a62c7102f6e5facd83d6413bf37ffe3cf47cbf272af51ca590f6e58623dfadbc4b3d105552588274b61d4aaab9b711263f0106cef6ddf990f55d56b21e4bb9

    • C:\Windows\System32\ieetwcollector.exe

      Filesize

      1.3MB

      MD5

      5b8a0453e245e8dfd2f397caff41ed90

      SHA1

      b01dae301f0685a9d4ec81ce668e7c4455bf722f

      SHA256

      9c1714720bdd480e94907e0f39354d95f8534e1052a022eecee0a660b5356e7b

      SHA512

      6423789f67fc7be0b7aad813e2f7b39ded08db023356c3a36ce3f87468aaaaebe5c33433c8fb1c48b761ebd5a280bc274269246a36fbed69ab5613e7ce73fd48

    • C:\Windows\System32\msdtc.exe

      Filesize

      1.4MB

      MD5

      9e15396f6527da30c1b347bd73797fda

      SHA1

      2d3309c5ab9e43f30d7186677056d3d1f9070e4c

      SHA256

      cf38beb185c0a02930820a7a5f1adc85d9b41554a2ef1fc3d92a54d239951d81

      SHA512

      70b30f4b2dd2521e691cca3241e0262eae32a3b9daa903db365e8371329050cf150f5904b9af84ffb1d0e5ef791e02b50e93cdc22292483733128b0b04ab3310

    • C:\Windows\System32\msiexec.exe

      Filesize

      1.3MB

      MD5

      9bbb884369d570c3e071d66a9dd9da56

      SHA1

      4c173e04d5091ca3641e135b2c15869076c2dcbc

      SHA256

      a816255beb20511f2e46053b3285cd8e676f31f439a5c01c1ac08f86bd841602

      SHA512

      d7c23757232d7503f47416295519010bc0902f9952b04c1d504db9d8688d65e33275f57a497dcc5dd6d5dd43f3f2c285d3c00a90ec4b8dd567fcae446e1ddb24

    • C:\Windows\System32\snmptrap.exe

      Filesize

      1.2MB

      MD5

      ff1c0d88b6590bb4943805046d14ea03

      SHA1

      886e3df502bac74733ae85f5247798b57ce6f3e3

      SHA256

      2cece9f3c0365115ee1bd8d73309c31cb030d40911df676312833be6d8f8cf48

      SHA512

      c56ea3259d952a177af2cb60b8ff6e195cb1aac023e23da8982b1517baf5f79710cd556ce46b8da405e640a16b82f9d13a6ab536b148e11f03423003065fab5b

    • C:\Windows\System32\vds.exe

      Filesize

      1.7MB

      MD5

      8fcecd0d58e9724f2223fedbc52886bf

      SHA1

      82a95b2bf60f12b8aa95cae0062d31e6f11d0e31

      SHA256

      33a3761fca4bab1b520f95486574c47ac7b68b57ca4c8d8ab7c3ea5a517eb2d7

      SHA512

      646da509c214dcb43efed33c8afb26f74e2a1c3593f8c7f8b8ec06beefb67bf11ac096eb7f3d89abc754901643bd14e9eca05a465ce68205b9d5d255662d5ccc

    • C:\Windows\System32\wbem\WmiApSrv.exe

      Filesize

      1.4MB

      MD5

      87e787529a7c4a3219dac76c8f2c06f5

      SHA1

      00915a74ba40a3cc36e4e3c826daf4fa43f8f1cc

      SHA256

      209fb399ef9b71087919859c8eb34f8b775d8adbe2a3e40917e28ada2a640bfe

      SHA512

      4483534bc9e35155ce69d1f4e2f5b076fea5eed2980e6a5990637c19d7f3a0d449c8946b71b2b1bbf20dbbc31056938cc729ea3410b1143889558732845fee8e

    • C:\Windows\System32\wbengine.exe

      Filesize

      2.0MB

      MD5

      62f781394140439f36b9f5b6132fc80f

      SHA1

      317f0d18007a1a3db6fe4825d11c6c1d919d2ec8

      SHA256

      3a60dc769388d2c320c503947ab7916a2bf14a5d3b4a1f360dd044deaaf77549

      SHA512

      99041f2fa6ccd4e66a25e555044106207db8f354bc59738ab9c0383250b331e547fd59a9f269422cc4d22e00ab4151509bb7123d186bc773a4a90318ff6266ac

    • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\8c6bac317f75b51647ea3a8da141b143\Microsoft.VisualStudio.Tools.Office.AddInAdapter.v9.0.ni.dll

      Filesize

      210KB

      MD5

      4f40997b51420653706cb0958086cd2d

      SHA1

      0069b956d17ce7d782a0e054995317f2f621b502

      SHA256

      8cd6a0b061b43e0b660b81859c910290a3672b00d7647ba0e86eda6ddcc8c553

      SHA512

      e18953d7a348859855e5f6e279bc9924fc3707b57a733ce9b8f7d21bd631d419f1ebfb29202608192eb346569ca9a55264f5b4c2aedd474c22060734a68a4ee6

    • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\f1a7ac664667f2d6bcd6c388b230c22b\Microsoft.VisualStudio.Tools.Applications.AddInAdapter.v9.0.ni.dll

      Filesize

      59KB

      MD5

      8c69bbdfbc8cc3fa3fa5edcd79901e94

      SHA1

      b8028f0f557692221d5c0160ec6ce414b2bdf19b

      SHA256

      a21471690e7c32c80049e17c13624820e77bca6c9c38b83d9ea8a7248086660d

      SHA512

      825f5b87b76303b62fc16a96b108fb1774c2aca52ac5e44cd0ac2fe2ee47d5d67947dfe7498e36bc849773f608ec5824711f8c36e375a378582eefb57c9c2557

    • C:\Windows\ehome\ehrecvr.exe

      Filesize

      1.2MB

      MD5

      f4746664d809d755a2f4acb27f37fbd1

      SHA1

      10b479246d77c682e3336da03f6d49bb2a80bf12

      SHA256

      465142111813f7a890eda75433570024d7e5869f0c940a249796855a7768ccf3

      SHA512

      ed6e2a033a32d90e7afc99492854b4db48a8f55d3530b8f6ef6bcd819093d3f97fc76b89dc7e3d6aec6374d9ece9659d9bd6871efe36c4e5a0cfbc0f7cec78ee

    • C:\Windows\ehome\ehsched.exe

      Filesize

      1.3MB

      MD5

      85d9e7e5e33d5c3a81c01e6c35ac81f6

      SHA1

      46bb03b234ee8353c5b12c14a6016cb9ca4d88ed

      SHA256

      624bfd2b59c04787dcfc20557c4ef968f65ab80dbdce9bcad99eeee3aa93b7e5

      SHA512

      6935595161e8eb276f91dd9c8a4472ab09d4458ea28005cb23374d7aa94325aa73bc057491557d567027e7f417a190b93a0239c6bd77f54133bb2c1a2b4523f5

    • C:\Windows\system32\msiexec.exe

      Filesize

      1.3MB

      MD5

      9bbb884369d570c3e071d66a9dd9da56

      SHA1

      4c173e04d5091ca3641e135b2c15869076c2dcbc

      SHA256

      a816255beb20511f2e46053b3285cd8e676f31f439a5c01c1ac08f86bd841602

      SHA512

      d7c23757232d7503f47416295519010bc0902f9952b04c1d504db9d8688d65e33275f57a497dcc5dd6d5dd43f3f2c285d3c00a90ec4b8dd567fcae446e1ddb24

    • \Program Files\Windows Media Player\wmpnetwk.exe

      Filesize

      2.0MB

      MD5

      9f806db6822a4bc948d18b3be75f1ea0

      SHA1

      07875a3dfd80bc43427e69a2324b9ac4e41af1a5

      SHA256

      daf00044b727879fb93e11e128db88efcd7781c3c5ad4d9ef341b1a657c5d4ae

      SHA512

      d566374cf60270b9d8dff8e70d8319947ad1001095c799843f7d1b7982a9b9a39bf6cfc5e4694368369b7e865051d277e3938069db8f29b40bf3db479088c327

    • \Program Files\Windows Media Player\wmpnetwk.exe

      Filesize

      2.0MB

      MD5

      9f806db6822a4bc948d18b3be75f1ea0

      SHA1

      07875a3dfd80bc43427e69a2324b9ac4e41af1a5

      SHA256

      daf00044b727879fb93e11e128db88efcd7781c3c5ad4d9ef341b1a657c5d4ae

      SHA512

      d566374cf60270b9d8dff8e70d8319947ad1001095c799843f7d1b7982a9b9a39bf6cfc5e4694368369b7e865051d277e3938069db8f29b40bf3db479088c327

    • \Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe

      Filesize

      1.3MB

      MD5

      9c99d376acc1225cff9bde8f1e2f814a

      SHA1

      295a663c545c68979a33069d4c26135e44d05e07

      SHA256

      e0c5678e1a42072666f1d8622ba43ec7d6288b5a97a01e6ae6960a03c7de4c14

      SHA512

      3ce1f3c363cfa6d2c2088c97c3a865efd7fb1b71b43f40a3efa162e9f34771970e58ae8db7d6a22262e5fb3480a886a9eca8782880bbeb84449e8822d5311a03

    • \Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe

      Filesize

      1.3MB

      MD5

      b63dee3113ae0b9fb444ff5594201c0f

      SHA1

      a842f279f489530f297396397a4e89f6858f4da7

      SHA256

      e1d9b00fd5e5b5e8a73c31855d24a430c1a841e62f8d9a9c7f6df2fc850914cb

      SHA512

      3888aee59b491eed07018418a47d78be714faf1d1ebf76706f5f48b6dcb6cabda70ea750788878797cac6b93a353dcfc920bd18cb86b3a0d69c688c3e3f54c8a

    • \Windows\System32\Locator.exe

      Filesize

      1.2MB

      MD5

      f95d9a47e5edb8d90ef7ea8f9477afff

      SHA1

      a4c3c2c6b8144828d48f24f3a52f6280aa768693

      SHA256

      41325867ea4b474e3b1611f6714e01141bb76a36f4f78b6dc2f7eb236e1fcff2

      SHA512

      842e262bd5c7f4ae238ceb4af01cf8ff14a83adc514d610590bf12ecb8b8f0e2ccc66071ce6a9cbee415e0a79bd9aef9a68bc8993e662cf8837937e323312613

    • \Windows\System32\alg.exe

      Filesize

      1.3MB

      MD5

      733531b868134522236308178e816b0e

      SHA1

      82e8d226251b8e0a85d8692cb272654740acdeb5

      SHA256

      e03a045f5170ea7e3b8869986e58fd77059afb45e3c472fbed6a607c6e560c48

      SHA512

      d40ad96fe1a5957ca3a3309807f324978d6b84765e855cde4d48ae40baf00200d750f8bdf274f953f501d6d7dacd543db90ea8ce3041e9ff0845c7edda6b8a09

    • \Windows\System32\dllhost.exe

      Filesize

      1.2MB

      MD5

      874b24b6f32743cca8ed222f761d93a0

      SHA1

      8894a154a451fe0b92869574b3b4b1721e6f58ce

      SHA256

      5fc58d964640cf8087c8bbb901436edfca3c872c35bcdc5b9c7a2c692c103aaf

      SHA512

      89a62c7102f6e5facd83d6413bf37ffe3cf47cbf272af51ca590f6e58623dfadbc4b3d105552588274b61d4aaab9b711263f0106cef6ddf990f55d56b21e4bb9

    • \Windows\System32\ieetwcollector.exe

      Filesize

      1.3MB

      MD5

      5b8a0453e245e8dfd2f397caff41ed90

      SHA1

      b01dae301f0685a9d4ec81ce668e7c4455bf722f

      SHA256

      9c1714720bdd480e94907e0f39354d95f8534e1052a022eecee0a660b5356e7b

      SHA512

      6423789f67fc7be0b7aad813e2f7b39ded08db023356c3a36ce3f87468aaaaebe5c33433c8fb1c48b761ebd5a280bc274269246a36fbed69ab5613e7ce73fd48

    • \Windows\System32\msdtc.exe

      Filesize

      1.4MB

      MD5

      9e15396f6527da30c1b347bd73797fda

      SHA1

      2d3309c5ab9e43f30d7186677056d3d1f9070e4c

      SHA256

      cf38beb185c0a02930820a7a5f1adc85d9b41554a2ef1fc3d92a54d239951d81

      SHA512

      70b30f4b2dd2521e691cca3241e0262eae32a3b9daa903db365e8371329050cf150f5904b9af84ffb1d0e5ef791e02b50e93cdc22292483733128b0b04ab3310

    • \Windows\System32\msiexec.exe

      Filesize

      1.3MB

      MD5

      9bbb884369d570c3e071d66a9dd9da56

      SHA1

      4c173e04d5091ca3641e135b2c15869076c2dcbc

      SHA256

      a816255beb20511f2e46053b3285cd8e676f31f439a5c01c1ac08f86bd841602

      SHA512

      d7c23757232d7503f47416295519010bc0902f9952b04c1d504db9d8688d65e33275f57a497dcc5dd6d5dd43f3f2c285d3c00a90ec4b8dd567fcae446e1ddb24

    • \Windows\System32\msiexec.exe

      Filesize

      1.3MB

      MD5

      9bbb884369d570c3e071d66a9dd9da56

      SHA1

      4c173e04d5091ca3641e135b2c15869076c2dcbc

      SHA256

      a816255beb20511f2e46053b3285cd8e676f31f439a5c01c1ac08f86bd841602

      SHA512

      d7c23757232d7503f47416295519010bc0902f9952b04c1d504db9d8688d65e33275f57a497dcc5dd6d5dd43f3f2c285d3c00a90ec4b8dd567fcae446e1ddb24

    • \Windows\System32\snmptrap.exe

      Filesize

      1.2MB

      MD5

      ff1c0d88b6590bb4943805046d14ea03

      SHA1

      886e3df502bac74733ae85f5247798b57ce6f3e3

      SHA256

      2cece9f3c0365115ee1bd8d73309c31cb030d40911df676312833be6d8f8cf48

      SHA512

      c56ea3259d952a177af2cb60b8ff6e195cb1aac023e23da8982b1517baf5f79710cd556ce46b8da405e640a16b82f9d13a6ab536b148e11f03423003065fab5b

    • \Windows\System32\vds.exe

      Filesize

      1.7MB

      MD5

      8fcecd0d58e9724f2223fedbc52886bf

      SHA1

      82a95b2bf60f12b8aa95cae0062d31e6f11d0e31

      SHA256

      33a3761fca4bab1b520f95486574c47ac7b68b57ca4c8d8ab7c3ea5a517eb2d7

      SHA512

      646da509c214dcb43efed33c8afb26f74e2a1c3593f8c7f8b8ec06beefb67bf11ac096eb7f3d89abc754901643bd14e9eca05a465ce68205b9d5d255662d5ccc

    • \Windows\System32\wbem\WmiApSrv.exe

      Filesize

      1.4MB

      MD5

      87e787529a7c4a3219dac76c8f2c06f5

      SHA1

      00915a74ba40a3cc36e4e3c826daf4fa43f8f1cc

      SHA256

      209fb399ef9b71087919859c8eb34f8b775d8adbe2a3e40917e28ada2a640bfe

      SHA512

      4483534bc9e35155ce69d1f4e2f5b076fea5eed2980e6a5990637c19d7f3a0d449c8946b71b2b1bbf20dbbc31056938cc729ea3410b1143889558732845fee8e

    • \Windows\System32\wbengine.exe

      Filesize

      2.0MB

      MD5

      62f781394140439f36b9f5b6132fc80f

      SHA1

      317f0d18007a1a3db6fe4825d11c6c1d919d2ec8

      SHA256

      3a60dc769388d2c320c503947ab7916a2bf14a5d3b4a1f360dd044deaaf77549

      SHA512

      99041f2fa6ccd4e66a25e555044106207db8f354bc59738ab9c0383250b331e547fd59a9f269422cc4d22e00ab4151509bb7123d186bc773a4a90318ff6266ac

    • \Windows\ehome\ehrecvr.exe

      Filesize

      1.2MB

      MD5

      f4746664d809d755a2f4acb27f37fbd1

      SHA1

      10b479246d77c682e3336da03f6d49bb2a80bf12

      SHA256

      465142111813f7a890eda75433570024d7e5869f0c940a249796855a7768ccf3

      SHA512

      ed6e2a033a32d90e7afc99492854b4db48a8f55d3530b8f6ef6bcd819093d3f97fc76b89dc7e3d6aec6374d9ece9659d9bd6871efe36c4e5a0cfbc0f7cec78ee

    • \Windows\ehome\ehsched.exe

      Filesize

      1.3MB

      MD5

      85d9e7e5e33d5c3a81c01e6c35ac81f6

      SHA1

      46bb03b234ee8353c5b12c14a6016cb9ca4d88ed

      SHA256

      624bfd2b59c04787dcfc20557c4ef968f65ab80dbdce9bcad99eeee3aa93b7e5

      SHA512

      6935595161e8eb276f91dd9c8a4472ab09d4458ea28005cb23374d7aa94325aa73bc057491557d567027e7f417a190b93a0239c6bd77f54133bb2c1a2b4523f5

    • memory/108-164-0x0000000000920000-0x0000000000980000-memory.dmp

      Filesize

      384KB

    • memory/108-429-0x0000000140000000-0x0000000140237000-memory.dmp

      Filesize

      2.2MB

    • memory/108-173-0x0000000140000000-0x0000000140237000-memory.dmp

      Filesize

      2.2MB

    • memory/108-170-0x0000000000920000-0x0000000000980000-memory.dmp

      Filesize

      384KB

    • memory/540-68-0x0000000000370000-0x00000000003D0000-memory.dmp

      Filesize

      384KB

    • memory/540-78-0x0000000100000000-0x00000001001FB000-memory.dmp

      Filesize

      2.0MB

    • memory/540-74-0x0000000000370000-0x00000000003D0000-memory.dmp

      Filesize

      384KB

    • memory/552-81-0x00000000000F0000-0x0000000000156000-memory.dmp

      Filesize

      408KB

    • memory/552-83-0x00000000000F0000-0x0000000000156000-memory.dmp

      Filesize

      408KB

    • memory/552-82-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

      Filesize

      4KB

    • memory/552-87-0x00000000000F0000-0x0000000000156000-memory.dmp

      Filesize

      408KB

    • memory/552-85-0x00000000000F0000-0x0000000000156000-memory.dmp

      Filesize

      408KB

    • memory/552-122-0x0000000004730000-0x0000000004770000-memory.dmp

      Filesize

      256KB

    • memory/552-115-0x0000000004D30000-0x0000000004DEC000-memory.dmp

      Filesize

      752KB

    • memory/836-209-0x0000000000400000-0x00000000005FF000-memory.dmp

      Filesize

      2.0MB

    • memory/928-137-0x0000000140000000-0x0000000140205000-memory.dmp

      Filesize

      2.0MB

    • memory/980-670-0x0000000000400000-0x00000000005FF000-memory.dmp

      Filesize

      2.0MB

    • memory/1132-351-0x0000000100000000-0x00000001001ED000-memory.dmp

      Filesize

      1.9MB

    • memory/1224-150-0x0000000001380000-0x0000000001390000-memory.dmp

      Filesize

      64KB

    • memory/1224-152-0x0000000001390000-0x00000000013A0000-memory.dmp

      Filesize

      64KB

    • memory/1224-172-0x0000000001430000-0x0000000001431000-memory.dmp

      Filesize

      4KB

    • memory/1224-139-0x00000000001C0000-0x0000000000220000-memory.dmp

      Filesize

      384KB

    • memory/1224-138-0x0000000140000000-0x000000014013C000-memory.dmp

      Filesize

      1.2MB

    • memory/1224-145-0x00000000001C0000-0x0000000000220000-memory.dmp

      Filesize

      384KB

    • memory/1224-396-0x0000000140000000-0x000000014013C000-memory.dmp

      Filesize

      1.2MB

    • memory/1296-104-0x0000000010000000-0x00000000101F6000-memory.dmp

      Filesize

      2.0MB

    • memory/1344-313-0x0000000000C20000-0x0000000000CA0000-memory.dmp

      Filesize

      512KB

    • memory/1344-259-0x0000000000C20000-0x0000000000CA0000-memory.dmp

      Filesize

      512KB

    • memory/1344-201-0x0000000000C20000-0x0000000000CA0000-memory.dmp

      Filesize

      512KB

    • memory/1512-700-0x0000000000400000-0x00000000005FF000-memory.dmp

      Filesize

      2.0MB

    • memory/1512-691-0x0000000000400000-0x00000000005FF000-memory.dmp

      Filesize

      2.0MB

    • memory/1544-650-0x0000000140000000-0x0000000140205000-memory.dmp

      Filesize

      2.0MB

    • memory/1544-182-0x0000000000230000-0x0000000000290000-memory.dmp

      Filesize

      384KB

    • memory/1544-206-0x0000000140000000-0x0000000140205000-memory.dmp

      Filesize

      2.0MB

    • memory/1612-542-0x000000002E000000-0x000000002FE1E000-memory.dmp

      Filesize

      30.1MB

    • memory/1612-216-0x000000002E000000-0x000000002FE1E000-memory.dmp

      Filesize

      30.1MB

    • memory/1652-151-0x0000000000390000-0x00000000003F0000-memory.dmp

      Filesize

      384KB

    • memory/1652-159-0x0000000000390000-0x00000000003F0000-memory.dmp

      Filesize

      384KB

    • memory/1652-646-0x0000000140000000-0x0000000140209000-memory.dmp

      Filesize

      2.0MB

    • memory/1652-426-0x0000000140000000-0x0000000140209000-memory.dmp

      Filesize

      2.0MB

    • memory/1652-155-0x0000000140000000-0x0000000140209000-memory.dmp

      Filesize

      2.0MB

    • memory/1668-340-0x0000000000400000-0x00000000005FF000-memory.dmp

      Filesize

      2.0MB

    • memory/1668-106-0x0000000000C30000-0x0000000000C96000-memory.dmp

      Filesize

      408KB

    • memory/1668-109-0x0000000000400000-0x00000000005FF000-memory.dmp

      Filesize

      2.0MB

    • memory/1668-113-0x0000000000C30000-0x0000000000C96000-memory.dmp

      Filesize

      408KB

    • memory/1688-713-0x0000000000400000-0x00000000005FF000-memory.dmp

      Filesize

      2.0MB

    • memory/1756-136-0x0000000100000000-0x00000001001EC000-memory.dmp

      Filesize

      1.9MB

    • memory/1760-241-0x0000000000400000-0x00000000005FF000-memory.dmp

      Filesize

      2.0MB

    • memory/1760-212-0x0000000000400000-0x00000000005FF000-memory.dmp

      Filesize

      2.0MB

    • memory/1804-54-0x0000000000230000-0x0000000000296000-memory.dmp

      Filesize

      408KB

    • memory/1804-59-0x0000000000230000-0x0000000000296000-memory.dmp

      Filesize

      408KB

    • memory/1804-257-0x0000000000400000-0x0000000000654000-memory.dmp

      Filesize

      2.3MB

    • memory/1804-65-0x0000000000400000-0x0000000000654000-memory.dmp

      Filesize

      2.3MB

    • memory/1916-719-0x0000000000400000-0x00000000005FF000-memory.dmp

      Filesize

      2.0MB

    • memory/1952-111-0x0000000010000000-0x00000000101FE000-memory.dmp

      Filesize

      2.0MB

    • memory/2040-89-0x0000000140000000-0x00000001401F4000-memory.dmp

      Filesize

      2.0MB

    • memory/2040-308-0x0000000140000000-0x00000001401F4000-memory.dmp

      Filesize

      2.0MB

    • memory/2188-399-0x0000000100000000-0x000000010021B000-memory.dmp

      Filesize

      2.1MB

    • memory/2212-246-0x0000000140000000-0x0000000140221000-memory.dmp

      Filesize

      2.1MB

    • memory/2212-237-0x0000000140000000-0x0000000140221000-memory.dmp

      Filesize

      2.1MB

    • memory/2224-375-0x0000000100000000-0x000000010026B000-memory.dmp

      Filesize

      2.4MB

    • memory/2264-389-0x0000000000400000-0x00000000005FF000-memory.dmp

      Filesize

      2.0MB

    • memory/2268-690-0x0000000000400000-0x00000000005FF000-memory.dmp

      Filesize

      2.0MB

    • memory/2388-380-0x0000000100000000-0x0000000100219000-memory.dmp

      Filesize

      2.1MB

    • memory/2388-687-0x0000000100000000-0x0000000100219000-memory.dmp

      Filesize

      2.1MB

    • memory/2404-258-0x0000000140000000-0x000000014020D000-memory.dmp

      Filesize

      2.1MB

    • memory/2456-689-0x0000000100000000-0x0000000100202000-memory.dmp

      Filesize

      2.0MB

    • memory/2456-383-0x0000000100000000-0x0000000100202000-memory.dmp

      Filesize

      2.0MB

    • memory/2520-617-0x0000000000400000-0x00000000005FF000-memory.dmp

      Filesize

      2.0MB

    • memory/2532-736-0x0000000000400000-0x00000000005FF000-memory.dmp

      Filesize

      2.0MB

    • memory/2540-282-0x0000000100000000-0x0000000100209000-memory.dmp

      Filesize

      2.0MB

    • memory/2540-620-0x0000000100000000-0x0000000100209000-memory.dmp

      Filesize

      2.0MB

    • memory/2540-284-0x0000000000680000-0x0000000000889000-memory.dmp

      Filesize

      2.0MB

    • memory/2540-622-0x0000000000680000-0x0000000000889000-memory.dmp

      Filesize

      2.0MB

    • memory/2700-310-0x0000000000400000-0x00000000005FF000-memory.dmp

      Filesize

      2.0MB

    • memory/2700-663-0x0000000000400000-0x00000000005FF000-memory.dmp

      Filesize

      2.0MB

    • memory/2712-401-0x0000000100000000-0x000000010020A000-memory.dmp

      Filesize

      2.0MB

    • memory/2712-711-0x0000000100000000-0x000000010020A000-memory.dmp

      Filesize

      2.0MB

    • memory/2748-312-0x000000002E000000-0x000000002E20C000-memory.dmp

      Filesize

      2.0MB

    • memory/2876-317-0x0000000100000000-0x0000000100542000-memory.dmp

      Filesize

      5.3MB

    • memory/2876-624-0x0000000100000000-0x0000000100542000-memory.dmp

      Filesize

      5.3MB

    • memory/2908-432-0x0000000100000000-0x0000000100123000-memory.dmp

      Filesize

      1.1MB

    • memory/2980-345-0x0000000001000000-0x00000000011ED000-memory.dmp

      Filesize

      1.9MB

    • memory/3012-348-0x0000000100000000-0x00000001001EC000-memory.dmp

      Filesize

      1.9MB