Analysis

  • max time kernel
    149s
  • max time network
    135s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    10-05-2023 12:06

General

  • Target

    Purchase Order FP2305006.exe

  • Size

    1.6MB

  • MD5

    c7c88b125e27183372fb3d59c959f637

  • SHA1

    47da39de6edee6bbe9680d830e8f64b7f3fccf3a

  • SHA256

    e44e1135888701ba8cbf462efa9d992a2fa1f83e52c471f65c62c16fdecade26

  • SHA512

    f6beaf1a6e4d8fdde08fb44c90f93c75c6f88bf04d35a90de0711a683c4a19cc82f0e846b038af4b30f6e18d5905d6006de5e00dad5cfd629d673dd81015ed63

  • SSDEEP

    24576:04LpeAT/4TUmBmsV7ckan9wLb+mkA2NffoYF2zEg06nLnH8b/5cN:ptADBmsmkanaLb+XJwS2zECLH8bI

Malware Config

Extracted

Family

blustealer

C2

https://api.telegram.org/bot5797428905:AAGaRRXGZN1d9GGFd3sE5x4uSpCGF0PU4m4/sendMessage?chat_id=1251788325

Signatures

  • BluStealer

    A Modular information stealer written in Visual Basic.

  • Executes dropped EXE 33 IoCs
  • Loads dropped DLL 16 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Drops file in System32 directory 17 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 29 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies data under HKEY_USERS 36 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 29 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 46 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Purchase Order FP2305006.exe
    "C:\Users\Admin\AppData\Local\Temp\Purchase Order FP2305006.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1616
    • C:\Users\Admin\AppData\Local\Temp\Purchase Order FP2305006.exe
      "C:\Users\Admin\AppData\Local\Temp\Purchase Order FP2305006.exe"
      2⤵
      • Drops file in System32 directory
      • Suspicious use of SetThreadContext
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:560
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
        3⤵
        • Accesses Microsoft Outlook profiles
        • outlook_office_path
        • outlook_win_path
        PID:1724
  • C:\Windows\System32\alg.exe
    C:\Windows\System32\alg.exe
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    PID:1468
  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe
    C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe
    1⤵
    • Executes dropped EXE
    PID:1512
  • C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe
    C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe
    1⤵
    • Executes dropped EXE
    • Drops file in Windows directory
    PID:1308
  • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe
    C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe
    1⤵
    • Executes dropped EXE
    • Drops file in Windows directory
    PID:1008
  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
    C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
    1⤵
    • Executes dropped EXE
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1588
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1ec -InterruptEvent 1d8 -NGENProcess 1dc -Pipe 1e8 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2240
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 25c -InterruptEvent 1d8 -NGENProcess 1dc -Pipe 1ec -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2452
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 258 -InterruptEvent 1d8 -NGENProcess 1dc -Pipe 1ec -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2372
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1d8 -InterruptEvent 248 -NGENProcess 1b0 -Pipe 244 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2540
  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
    C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
    1⤵
    • Executes dropped EXE
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2008
    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 174 -InterruptEvent 160 -NGENProcess 164 -Pipe 170 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:1940
    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 1ec -InterruptEvent 160 -NGENProcess 164 -Pipe 174 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:1972
  • C:\Windows\system32\dllhost.exe
    C:\Windows\system32\dllhost.exe /Processid:{02D4B3F1-FD88-11D1-960D-00805FC79235}
    1⤵
    • Executes dropped EXE
    • Drops file in Windows directory
    PID:1664
  • C:\Windows\ehome\ehRecvr.exe
    C:\Windows\ehome\ehRecvr.exe
    1⤵
    • Executes dropped EXE
    • Modifies data under HKEY_USERS
    PID:760
  • C:\Windows\ehome\ehsched.exe
    C:\Windows\ehome\ehsched.exe
    1⤵
    • Executes dropped EXE
    PID:1884
  • C:\Windows\eHome\EhTray.exe
    "C:\Windows\eHome\EhTray.exe" /nav:-2
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1612
  • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
    "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
    1⤵
    • Executes dropped EXE
    PID:1432
  • C:\Windows\system32\IEEtwCollector.exe
    C:\Windows\system32\IEEtwCollector.exe /V
    1⤵
    • Executes dropped EXE
    PID:908
  • C:\Windows\ehome\ehRec.exe
    C:\Windows\ehome\ehRec.exe -Embedding
    1⤵
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1472
  • C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE" /auditservice
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Modifies data under HKEY_USERS
    PID:2084
  • C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe
    "C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"
    1⤵
    • Executes dropped EXE
    • Drops file in Program Files directory
    PID:2188
  • C:\Windows\System32\msdtc.exe
    C:\Windows\System32\msdtc.exe
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Drops file in Windows directory
    PID:2344
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Suspicious use of AdjustPrivilegeToken
    PID:2500
  • C:\Program Files (x86)\Common Files\Microsoft Shared\Source Engine\OSE.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\Source Engine\OSE.EXE"
    1⤵
    • Executes dropped EXE
    PID:2608
  • C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE
    "C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"
    1⤵
    • Executes dropped EXE
    PID:2708
  • C:\Windows\SysWow64\perfhost.exe
    C:\Windows\SysWow64\perfhost.exe
    1⤵
    • Executes dropped EXE
    PID:2808
  • C:\Windows\system32\locator.exe
    C:\Windows\system32\locator.exe
    1⤵
    • Executes dropped EXE
    PID:2836
  • C:\Windows\System32\snmptrap.exe
    C:\Windows\System32\snmptrap.exe
    1⤵
    • Executes dropped EXE
    PID:2920
  • C:\Windows\System32\vds.exe
    C:\Windows\System32\vds.exe
    1⤵
    • Executes dropped EXE
    PID:3016
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    PID:1068
  • C:\Windows\system32\wbengine.exe
    "C:\Windows\system32\wbengine.exe"
    1⤵
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    PID:2136
  • C:\Windows\system32\wbem\WmiApSrv.exe
    C:\Windows\system32\wbem\WmiApSrv.exe
    1⤵
    • Executes dropped EXE
    PID:2200
  • C:\Program Files\Windows Media Player\wmpnetwk.exe
    "C:\Program Files\Windows Media Player\wmpnetwk.exe"
    1⤵
    • Executes dropped EXE
    • Modifies data under HKEY_USERS
    • Suspicious use of AdjustPrivilegeToken
    PID:2188
  • C:\Windows\system32\SearchIndexer.exe
    C:\Windows\system32\SearchIndexer.exe /Embedding
    1⤵
    • Executes dropped EXE
    • Modifies data under HKEY_USERS
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2512
    • C:\Windows\system32\SearchProtocolHost.exe
      "C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe_S-1-5-21-1563773381-2037468142-1146002597-10001_ Global\UsGthrCtrlFltPipeMssGthrPipe_S-1-5-21-1563773381-2037468142-1146002597-10001 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon" "1"
      2⤵
      • Suspicious use of SetWindowsHookEx
      PID:2232
    • C:\Windows\system32\SearchFilterHost.exe
      "C:\Windows\system32\SearchFilterHost.exe" 0 588 592 600 65536 596
      2⤵
        PID:2872

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\Common Files\microsoft shared\Source Engine\OSE.EXE

      Filesize

      1.4MB

      MD5

      81852ae3d34c1af275c958ad0c50cc26

      SHA1

      d20dfdbd8b34162f41741a616f5cbc6234882d29

      SHA256

      bc65368fa35465f52954b1a5ca9f531025741493b6b755222013bc11356f9847

      SHA512

      d27e6aa52bf98ea7aa5200771324d372989bc51cbc7ab6659e5b836c8a97473ef77f40e4228bb848cdca27cc97bfbeb897d59802901b5a02675f876ad42ef94a

    • C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE

      Filesize

      30.1MB

      MD5

      a7dd12af858df826b55760a278d013ca

      SHA1

      dec39c66a150927386275c4702ad3456d140c403

      SHA256

      cb65d39904d670d0a3aca59d9846685deb16c9048722a46f62038f74c0de66cf

      SHA512

      9be8281f3feb481bcbfe1c0d28e3205f07daac445a4c2753bce00f0b5e9b65335b73538f3afdcd971a591e9117eb9b15a4e68af3446b00a515dccc362c999e13

    • C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe

      Filesize

      1.4MB

      MD5

      cf6edbecdce43050270aa11f73dc8408

      SHA1

      ab14632c2af51f1d75006367d7e4323ce00bfb05

      SHA256

      b8116d56afed03209c04dfd35dc2e2c6393dc8ce81abbd70a69c6c797a4c8d5a

      SHA512

      902f3a4fda887a01b194516d94aa91ae4e52e5c84e7feb49b206aff11520305f8140498837eb82e42ebf007602fe368cfb9d9a90cb050931e816528354085f43

    • C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE

      Filesize

      5.2MB

      MD5

      99f2271b9d19b8697980d6b4eea2262a

      SHA1

      c403db86c2530a4fbd899e146fe3a7e1f5b364ab

      SHA256

      23388576f6b2a073c4247409e5c3cfc06ea5901c00c9e7dac468b3ef85b0aa2b

      SHA512

      c6c28f1bd3495ede94773ab33049dee056d587188a3dee9c4abc82f1ed1c388cab9fb3cca0cbbd36cf60abec8eb6ea67e55d273c247d6416f35918c9ac864b72

    • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe

      Filesize

      2.1MB

      MD5

      61ed7235fcf44c2252283db0486f920e

      SHA1

      d969fcf4d19a685e3e2f3fc2160a989330ce9c1e

      SHA256

      d2c069fd8101ff99d65a69e0c850b813db6d027f59ac60edc1e46fae4a13d460

      SHA512

      103fa7a4a8a302282c7538778da745a34f7d3bd7b430ebbf73469e62d667a81f20fa8590832dff701daf56d49a15fae4fdfb15bc53ceda4a68ceedd74001aef4

    • C:\Program Files\Windows Media Player\wmpnetwk.exe

      Filesize

      2.0MB

      MD5

      f0cc5d270587f2bfc4f1d288af88d26d

      SHA1

      61a7252c21e5e8570c9e599a7d7c7a9d362d71b3

      SHA256

      c55b4ea5b433d83e5f07fe874fe1d5ff78da4332e922857c670aa1ad73422dd3

      SHA512

      33ecbb720b4191fe91d21c612ad77476e3afe4225fe7319553ca1fdf1d78f3db2873c0b02dacf234792631496c432546ece6bd83b3557c4ce4322f5fe4a406c1

    • C:\ProgramData\Microsoft\Search\Data\Applications\Windows\MSS.log

      Filesize

      1024KB

      MD5

      db00eba02cdd2eadb056f64e63d3f6e4

      SHA1

      793ff1fb71239093af61d34f5e69ac1550842482

      SHA256

      1def3fabc184cc09761c5987a01358840cf126b30a17d3bacbd5906275c94f44

      SHA512

      b2504024342805748bcbe54b21d664560df24470b121115b6af0770ef44fc14193e4d19f0fe01f23be7451fdca85e61397c9746edcbddf2e7650e62c8f9065a4

    • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe

      Filesize

      1.3MB

      MD5

      036e59a4baee8bb7f3373e0695871c32

      SHA1

      c5195900e61b16430b4d0802024e544e6b4411e1

      SHA256

      be958a4dc3230273e0a70ec004c9b1907731fa38e9dd657b30272a94394280ce

      SHA512

      9b804a929288e4d0c1f26e5271c8be37d6270f9deb5923e2e825322384ee02a408322ff41a203e944d3e019f774d138cc8d3424d49857bf5c4bdc2b6cf1759ea

    • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe

      Filesize

      1.3MB

      MD5

      036e59a4baee8bb7f3373e0695871c32

      SHA1

      c5195900e61b16430b4d0802024e544e6b4411e1

      SHA256

      be958a4dc3230273e0a70ec004c9b1907731fa38e9dd657b30272a94394280ce

      SHA512

      9b804a929288e4d0c1f26e5271c8be37d6270f9deb5923e2e825322384ee02a408322ff41a203e944d3e019f774d138cc8d3424d49857bf5c4bdc2b6cf1759ea

    • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ngen_service.log

      Filesize

      872KB

      MD5

      9ef27b121a15ccd67e31c71f58050d46

      SHA1

      fc1ecd54346359d222b2e5eb1b0ed2a8d6df07a9

      SHA256

      52ef4c94ed0e79ff6d45d93d56b56f4ac6194e993b20b55a95e18bc44d569720

      SHA512

      8d1a2bdcc2d647a9fae04c66d55dde7fa9ce51aef9323aaebbb6f45b3a31c938fdd89b89b5196177dd9b136e76f3d63f51cb0d1d514064f296256d337dc0323a

    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe

      Filesize

      1.3MB

      MD5

      c075bb61ecf6a84e612566a8f7e747de

      SHA1

      602ce6dc4313ea46178739722d8b03850945258e

      SHA256

      a874dce9f16ce257a60fea6e55218a1e7bdbbb871fff8324d55b864baf636931

      SHA512

      313c89f160a6595208a65465d73502e0d5ba984079ec83a3502478d326408cb0bad5dd987535c7954a1dfdeb51afff1dca76c596550e325f08ddcefaa497eeff

    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe

      Filesize

      1.3MB

      MD5

      5558e70c414a1578b3f8a23ea028b485

      SHA1

      34e06f4d1c02eee931114c65b300ded744180fd6

      SHA256

      403fd71df202fa076184d3ddde0e046376995890ae7b05eeb3dbdd9ad15d187e

      SHA512

      e2612b665e34d69a53732ed518f1db9d97dfaf3852289225dbb5b8375b0d00bb82b86e10490c693a79ccf8b3595486621d7ac72d9dc8749872f545913a9e690c

    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe

      Filesize

      1.3MB

      MD5

      5558e70c414a1578b3f8a23ea028b485

      SHA1

      34e06f4d1c02eee931114c65b300ded744180fd6

      SHA256

      403fd71df202fa076184d3ddde0e046376995890ae7b05eeb3dbdd9ad15d187e

      SHA512

      e2612b665e34d69a53732ed518f1db9d97dfaf3852289225dbb5b8375b0d00bb82b86e10490c693a79ccf8b3595486621d7ac72d9dc8749872f545913a9e690c

    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe

      Filesize

      1.3MB

      MD5

      5558e70c414a1578b3f8a23ea028b485

      SHA1

      34e06f4d1c02eee931114c65b300ded744180fd6

      SHA256

      403fd71df202fa076184d3ddde0e046376995890ae7b05eeb3dbdd9ad15d187e

      SHA512

      e2612b665e34d69a53732ed518f1db9d97dfaf3852289225dbb5b8375b0d00bb82b86e10490c693a79ccf8b3595486621d7ac72d9dc8749872f545913a9e690c

    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe

      Filesize

      1.3MB

      MD5

      5558e70c414a1578b3f8a23ea028b485

      SHA1

      34e06f4d1c02eee931114c65b300ded744180fd6

      SHA256

      403fd71df202fa076184d3ddde0e046376995890ae7b05eeb3dbdd9ad15d187e

      SHA512

      e2612b665e34d69a53732ed518f1db9d97dfaf3852289225dbb5b8375b0d00bb82b86e10490c693a79ccf8b3595486621d7ac72d9dc8749872f545913a9e690c

    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe

      Filesize

      1.3MB

      MD5

      4fd4731320a683b3416c9e0d275ca888

      SHA1

      39674155766fac8938026f31e15f7430e74c5298

      SHA256

      959efb4bc3949862f73137a0c5c5a30fcaad246128c918a3de049c41d563b0d4

      SHA512

      d3cdb4ce05d159458580ec81eb183ec7aaefec24b5606cdf9496d0a3e5a8d389fb2138bc869af13add20958476e9b9235575294cb81a9e5531f5d2bd7a2bfebf

    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe

      Filesize

      1.3MB

      MD5

      4fd4731320a683b3416c9e0d275ca888

      SHA1

      39674155766fac8938026f31e15f7430e74c5298

      SHA256

      959efb4bc3949862f73137a0c5c5a30fcaad246128c918a3de049c41d563b0d4

      SHA512

      d3cdb4ce05d159458580ec81eb183ec7aaefec24b5606cdf9496d0a3e5a8d389fb2138bc869af13add20958476e9b9235575294cb81a9e5531f5d2bd7a2bfebf

    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\ngen_service.log

      Filesize

      1003KB

      MD5

      5d53b50bb5bfef2ed0b0b5754bb21d6c

      SHA1

      63c62d1e3959907bd6d49fa210acbebc6003a96b

      SHA256

      70a80a070e7a2c7a9269a39c0ac60206d2b0d5f3f79824a0e2fd06e06eed0b8f

      SHA512

      0f7c373410b09f5d7f62f016bc0ec2438f7a003591b7014ad0a443e002d0900925c6ee71cd120e611a545135eade91121aad3a06b07e810a63009bf110da8c9e

    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe

      Filesize

      1.3MB

      MD5

      19b13f69287d5921f75249688258cfa5

      SHA1

      f8b5d4ecb4aaac85ee8b9f9842ab97619c0af50d

      SHA256

      cc2a4891729d80457834d33464ea0eece0950b5a6ba1aca7a13b57b5a757ae9c

      SHA512

      a0b85614c0123a9d35a867e8821812d0d3bad9ef3ade051d649d58b0e6a09859b4b1c52edf1ef1372bae7d74009ec7d968becd62d9da74b9ff8ed33b79d168cd

    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe

      Filesize

      1.3MB

      MD5

      19b13f69287d5921f75249688258cfa5

      SHA1

      f8b5d4ecb4aaac85ee8b9f9842ab97619c0af50d

      SHA256

      cc2a4891729d80457834d33464ea0eece0950b5a6ba1aca7a13b57b5a757ae9c

      SHA512

      a0b85614c0123a9d35a867e8821812d0d3bad9ef3ade051d649d58b0e6a09859b4b1c52edf1ef1372bae7d74009ec7d968becd62d9da74b9ff8ed33b79d168cd

    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe

      Filesize

      1.3MB

      MD5

      19b13f69287d5921f75249688258cfa5

      SHA1

      f8b5d4ecb4aaac85ee8b9f9842ab97619c0af50d

      SHA256

      cc2a4891729d80457834d33464ea0eece0950b5a6ba1aca7a13b57b5a757ae9c

      SHA512

      a0b85614c0123a9d35a867e8821812d0d3bad9ef3ade051d649d58b0e6a09859b4b1c52edf1ef1372bae7d74009ec7d968becd62d9da74b9ff8ed33b79d168cd

    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe

      Filesize

      1.3MB

      MD5

      19b13f69287d5921f75249688258cfa5

      SHA1

      f8b5d4ecb4aaac85ee8b9f9842ab97619c0af50d

      SHA256

      cc2a4891729d80457834d33464ea0eece0950b5a6ba1aca7a13b57b5a757ae9c

      SHA512

      a0b85614c0123a9d35a867e8821812d0d3bad9ef3ade051d649d58b0e6a09859b4b1c52edf1ef1372bae7d74009ec7d968becd62d9da74b9ff8ed33b79d168cd

    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe

      Filesize

      1.3MB

      MD5

      19b13f69287d5921f75249688258cfa5

      SHA1

      f8b5d4ecb4aaac85ee8b9f9842ab97619c0af50d

      SHA256

      cc2a4891729d80457834d33464ea0eece0950b5a6ba1aca7a13b57b5a757ae9c

      SHA512

      a0b85614c0123a9d35a867e8821812d0d3bad9ef3ade051d649d58b0e6a09859b4b1c52edf1ef1372bae7d74009ec7d968becd62d9da74b9ff8ed33b79d168cd

    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe

      Filesize

      1.3MB

      MD5

      19b13f69287d5921f75249688258cfa5

      SHA1

      f8b5d4ecb4aaac85ee8b9f9842ab97619c0af50d

      SHA256

      cc2a4891729d80457834d33464ea0eece0950b5a6ba1aca7a13b57b5a757ae9c

      SHA512

      a0b85614c0123a9d35a867e8821812d0d3bad9ef3ade051d649d58b0e6a09859b4b1c52edf1ef1372bae7d74009ec7d968becd62d9da74b9ff8ed33b79d168cd

    • C:\Windows\SysWOW64\perfhost.exe

      Filesize

      1.2MB

      MD5

      77535e18fe7e8a65d185b2a4dce86492

      SHA1

      09c760ae5113da9dd2bedef8c506c041104e96a7

      SHA256

      5fc91d07030119778b670e73f58c8f680dea3bba86008c226e374f2c4b1ab00c

      SHA512

      5b4d01092ec0a654ffb68fc4f9d49e94df32eb24795447a5bb44eababb5047fe5c9274f6b67438446bc08e80991675c78104f6de86b9923926ca19085fdb083f

    • C:\Windows\System32\Locator.exe

      Filesize

      1.2MB

      MD5

      221b2c32f983083bafd926c620d97319

      SHA1

      b689825de40a75cd7de9d99b6d6d50bf3f8d4b97

      SHA256

      e0cd6a298cfbbbff161f1506803d174bff83d202e10ad85b856c02c37590e293

      SHA512

      53f2ad15d4c5bff219922062cd9eed339d06e551421d795c333f9279f0ea82549153ee01e42d0cea55958d82e5bb57dd41efe48fd58d24892fe84d53335c381e

    • C:\Windows\System32\SearchIndexer.exe

      Filesize

      1.1MB

      MD5

      369f78ed4568ddf752eb08270c930cf4

      SHA1

      5d57484c49f84a71edb17c16ef2b030715261e74

      SHA256

      8e6a1cfe65a65690ca4dc5891a4bb57be03493145e2292859a9667eae1151c97

      SHA512

      2ec2a2b7bda92016d5a402f3ea405ce47d3a1e4af2871228d2cf2fef0a816b48355ac6959c7ba55d009e7fe4b91c04466b2d6572edf15d069c89c4f7a9a50f30

    • C:\Windows\System32\VSSVC.exe

      Filesize

      2.1MB

      MD5

      af5e3000de21bb17f152db1929f67db6

      SHA1

      641bedea767776e30d854d2e2fc5cdeaeb47088f

      SHA256

      74b88446407e48aa48721ca2a593ab871fa52a582ad4f76b031e1132026ce499

      SHA512

      9c8f55bed2436152f748f9e9951867ae1509aaade1e000cc705b3465a5b3ad7525a853b88b320f56a08d0fff0820328450c1c588559f8b3ceab3ddc63b8e82eb

    • C:\Windows\System32\alg.exe

      Filesize

      1.3MB

      MD5

      6ec2e074e6146d09d6812faa271b0b3f

      SHA1

      44c94747b6584f2005d694c480e21f9a3fc99069

      SHA256

      9103b102b4b6a37cd6b4f2cd534276fda418f4112769e0e62bd778b247850234

      SHA512

      7dfdce5aa14b2f7ab719bc5dc8fb5de90551654844e2781fad46869960beca9228ed9c8866fb0df5698d02073f0bc6b07c8568c354e263df0b7e61990205938e

    • C:\Windows\System32\dllhost.exe

      Filesize

      1.2MB

      MD5

      ce9538658707c7a483984ffc6d7e6f7a

      SHA1

      e1e5bdaa636fb0808fa4bb8f76a14f07b7c4a376

      SHA256

      94d97ddc5ba0afe74cb0ca0ae8a2a636f7bfe85a542c3eb5bfba8e4f1220ab91

      SHA512

      fd872cec7e422642d2a9e5e2a2ae4b9b058a12b48bad0d96d5dbcd9bd2dd5c5acf258eab77f3772c4adeb8cac703f143d66239bd947c54e6ecadedbca08cdfe5

    • C:\Windows\System32\ieetwcollector.exe

      Filesize

      1.3MB

      MD5

      7f7d226fa087a1a31ad4e6575c6c18fd

      SHA1

      693c09d27db5c913e3c36844bb6a7ecd4dcba63c

      SHA256

      9ca6273b9eff0c0dd433e9c5566ae3177f3dd83254f9eeeb5d8ca386bd69df86

      SHA512

      8fcd19f8a6c13572e05239ce41451f8d9d215c1f7a5071f3cd47244e6ecb4de6fd988eb827caef95e580807f7108cbdac1454dd731b2a6c0a04fbc1196f7a23a

    • C:\Windows\System32\msdtc.exe

      Filesize

      1.4MB

      MD5

      d9f0bdeb5d8e90560b6dbd3e545997db

      SHA1

      99ebb8594758462ba27e034ce1174dc8fbaedd8a

      SHA256

      ae8dd6c58863b2374d6e3f770c673b931a7946b72991def15835d1ba381c1d94

      SHA512

      e7f3b8ed984a97972f2908c8aa545a53d6096f939bb0c81a1f3b15af89f235972f475711ef0a85af71c4c915f5a102b228397049b98e19ffdf748f0ce7313113

    • C:\Windows\System32\msiexec.exe

      Filesize

      1.3MB

      MD5

      1720461a083ae8e3a862bedc2a9fecb7

      SHA1

      238f766b223456e7f15f31a9eeaedf751f717d92

      SHA256

      f44a7802f3b859c53f5f6382b29b48f3a5900fa91af837df3448f360bdbf8c1a

      SHA512

      df8aad4b003600b397d479c2042bf6b918fe4f1ff96fb90e22a3f4758d40d7fd26416089f38d68759f37b3dc9947c8cc1b46c69f074d55fc9270c2ab2e6f1179

    • C:\Windows\System32\snmptrap.exe

      Filesize

      1.2MB

      MD5

      df184f1bf12f1c01d4c70d219b7fd2b1

      SHA1

      38b9e9b85baa1db1558681be6a6de1bee42b4a52

      SHA256

      90fa4e8b9392b9b311c539dc06e78a258e8f84962963ae77128dd7a6d4687a51

      SHA512

      baf0ea29099ca41df903fa8a14b68056782811bdfcac929b26893b32059f5b9ba5c5cb189fa261db425682c5023ee1d6828fe017609cc8b5de3bd303f46a9fbd

    • C:\Windows\System32\vds.exe

      Filesize

      1.7MB

      MD5

      aa1dbd0ffb6ea642f19c862f20c7b7e3

      SHA1

      ed7d4ed48ad417b40042c695e7915c667a98100e

      SHA256

      842bd2980a577d1532b0b9b077322a6533989aa080a27e2814b3c9d25d1d6c9f

      SHA512

      128296619595188c0cd6b6d86cccf32677a37b87cf658f754bc921003c5555488343416f2ddfb38942aff5ec43c1edec910f351812bbd486aed4ed7a711d4b3a

    • C:\Windows\System32\wbem\WmiApSrv.exe

      Filesize

      1.4MB

      MD5

      759aa7a245fa6848a1ee8e24804a226b

      SHA1

      66af8618b136258d016c2570894b26f559abc8b2

      SHA256

      f1e30292f3df486c633222766f4d89bd312624945452eb7aa841b02af2120f2f

      SHA512

      e3304a19b0ac3ebfbb201f3bb55d18351c1606fb48c20693f0273997305814ae3c2f41568caad193817fa6331ce1d7e4c301714953f10d9df4c740eccd7d0fe0

    • C:\Windows\System32\wbengine.exe

      Filesize

      2.0MB

      MD5

      62fbddfc3ead9b4d7876ef554bc46cef

      SHA1

      1d13e5d0fc0c22c0a560e5df71dd716c5d6b8f67

      SHA256

      d8dddd4193c639a67e802f1ee753a5fdd7d79999201e6236604b7e0f87355988

      SHA512

      81a7034117e64cff658c771dee8558cec1bc739496404efc25ea1bd9a9d5194a6857e3b0b88aa45fb0d58fb5fe98cfa6cba10c5fcf54bcdeddd163af3f62f829

    • C:\Windows\ehome\ehrecvr.exe

      Filesize

      1.2MB

      MD5

      94ee278417d328244b43fbdc89b47681

      SHA1

      aa98c0ef39eb61c14bbaff955c0488226a3968ae

      SHA256

      89eecc9e09bd4a35b3085d0360fa89c8a4347b5a016a3bbf49510306492dba46

      SHA512

      2d4a5fbf515d5203acb64364caa6153a6f545de9cc0bf9a66e6586301e2cb5b29c398fac57e2caf05522dd2553afc8a3f7785c650a798b2b3da22709f56cb1b0

    • C:\Windows\ehome\ehsched.exe

      Filesize

      1.3MB

      MD5

      eef6086bfd13c7e21edc9ae997c194eb

      SHA1

      2d5db826c5f958c8dfcba337e83e65d5f9f712e5

      SHA256

      8b4541c9a110b24137add1fb32364018fcbe86daaabd20a74c413a07f2928ac2

      SHA512

      f997d9b3c5edb22f5ba9e137f049e92c1d8a5fb5ec4b360f9720926950956645aad26faf4246bb017343ccde889a9ac7242d4e542bd738513f49ce8cf1cecec4

    • C:\Windows\system32\msiexec.exe

      Filesize

      1.3MB

      MD5

      1720461a083ae8e3a862bedc2a9fecb7

      SHA1

      238f766b223456e7f15f31a9eeaedf751f717d92

      SHA256

      f44a7802f3b859c53f5f6382b29b48f3a5900fa91af837df3448f360bdbf8c1a

      SHA512

      df8aad4b003600b397d479c2042bf6b918fe4f1ff96fb90e22a3f4758d40d7fd26416089f38d68759f37b3dc9947c8cc1b46c69f074d55fc9270c2ab2e6f1179

    • \Program Files\Windows Media Player\wmpnetwk.exe

      Filesize

      2.0MB

      MD5

      f0cc5d270587f2bfc4f1d288af88d26d

      SHA1

      61a7252c21e5e8570c9e599a7d7c7a9d362d71b3

      SHA256

      c55b4ea5b433d83e5f07fe874fe1d5ff78da4332e922857c670aa1ad73422dd3

      SHA512

      33ecbb720b4191fe91d21c612ad77476e3afe4225fe7319553ca1fdf1d78f3db2873c0b02dacf234792631496c432546ece6bd83b3557c4ce4322f5fe4a406c1

    • \Program Files\Windows Media Player\wmpnetwk.exe

      Filesize

      2.0MB

      MD5

      f0cc5d270587f2bfc4f1d288af88d26d

      SHA1

      61a7252c21e5e8570c9e599a7d7c7a9d362d71b3

      SHA256

      c55b4ea5b433d83e5f07fe874fe1d5ff78da4332e922857c670aa1ad73422dd3

      SHA512

      33ecbb720b4191fe91d21c612ad77476e3afe4225fe7319553ca1fdf1d78f3db2873c0b02dacf234792631496c432546ece6bd83b3557c4ce4322f5fe4a406c1

    • \Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe

      Filesize

      1.3MB

      MD5

      036e59a4baee8bb7f3373e0695871c32

      SHA1

      c5195900e61b16430b4d0802024e544e6b4411e1

      SHA256

      be958a4dc3230273e0a70ec004c9b1907731fa38e9dd657b30272a94394280ce

      SHA512

      9b804a929288e4d0c1f26e5271c8be37d6270f9deb5923e2e825322384ee02a408322ff41a203e944d3e019f774d138cc8d3424d49857bf5c4bdc2b6cf1759ea

    • \Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe

      Filesize

      1.3MB

      MD5

      c075bb61ecf6a84e612566a8f7e747de

      SHA1

      602ce6dc4313ea46178739722d8b03850945258e

      SHA256

      a874dce9f16ce257a60fea6e55218a1e7bdbbb871fff8324d55b864baf636931

      SHA512

      313c89f160a6595208a65465d73502e0d5ba984079ec83a3502478d326408cb0bad5dd987535c7954a1dfdeb51afff1dca76c596550e325f08ddcefaa497eeff

    • \Windows\System32\Locator.exe

      Filesize

      1.2MB

      MD5

      221b2c32f983083bafd926c620d97319

      SHA1

      b689825de40a75cd7de9d99b6d6d50bf3f8d4b97

      SHA256

      e0cd6a298cfbbbff161f1506803d174bff83d202e10ad85b856c02c37590e293

      SHA512

      53f2ad15d4c5bff219922062cd9eed339d06e551421d795c333f9279f0ea82549153ee01e42d0cea55958d82e5bb57dd41efe48fd58d24892fe84d53335c381e

    • \Windows\System32\alg.exe

      Filesize

      1.3MB

      MD5

      6ec2e074e6146d09d6812faa271b0b3f

      SHA1

      44c94747b6584f2005d694c480e21f9a3fc99069

      SHA256

      9103b102b4b6a37cd6b4f2cd534276fda418f4112769e0e62bd778b247850234

      SHA512

      7dfdce5aa14b2f7ab719bc5dc8fb5de90551654844e2781fad46869960beca9228ed9c8866fb0df5698d02073f0bc6b07c8568c354e263df0b7e61990205938e

    • \Windows\System32\dllhost.exe

      Filesize

      1.2MB

      MD5

      ce9538658707c7a483984ffc6d7e6f7a

      SHA1

      e1e5bdaa636fb0808fa4bb8f76a14f07b7c4a376

      SHA256

      94d97ddc5ba0afe74cb0ca0ae8a2a636f7bfe85a542c3eb5bfba8e4f1220ab91

      SHA512

      fd872cec7e422642d2a9e5e2a2ae4b9b058a12b48bad0d96d5dbcd9bd2dd5c5acf258eab77f3772c4adeb8cac703f143d66239bd947c54e6ecadedbca08cdfe5

    • \Windows\System32\ieetwcollector.exe

      Filesize

      1.3MB

      MD5

      7f7d226fa087a1a31ad4e6575c6c18fd

      SHA1

      693c09d27db5c913e3c36844bb6a7ecd4dcba63c

      SHA256

      9ca6273b9eff0c0dd433e9c5566ae3177f3dd83254f9eeeb5d8ca386bd69df86

      SHA512

      8fcd19f8a6c13572e05239ce41451f8d9d215c1f7a5071f3cd47244e6ecb4de6fd988eb827caef95e580807f7108cbdac1454dd731b2a6c0a04fbc1196f7a23a

    • \Windows\System32\msdtc.exe

      Filesize

      1.4MB

      MD5

      d9f0bdeb5d8e90560b6dbd3e545997db

      SHA1

      99ebb8594758462ba27e034ce1174dc8fbaedd8a

      SHA256

      ae8dd6c58863b2374d6e3f770c673b931a7946b72991def15835d1ba381c1d94

      SHA512

      e7f3b8ed984a97972f2908c8aa545a53d6096f939bb0c81a1f3b15af89f235972f475711ef0a85af71c4c915f5a102b228397049b98e19ffdf748f0ce7313113

    • \Windows\System32\msiexec.exe

      Filesize

      1.3MB

      MD5

      1720461a083ae8e3a862bedc2a9fecb7

      SHA1

      238f766b223456e7f15f31a9eeaedf751f717d92

      SHA256

      f44a7802f3b859c53f5f6382b29b48f3a5900fa91af837df3448f360bdbf8c1a

      SHA512

      df8aad4b003600b397d479c2042bf6b918fe4f1ff96fb90e22a3f4758d40d7fd26416089f38d68759f37b3dc9947c8cc1b46c69f074d55fc9270c2ab2e6f1179

    • \Windows\System32\msiexec.exe

      Filesize

      1.3MB

      MD5

      1720461a083ae8e3a862bedc2a9fecb7

      SHA1

      238f766b223456e7f15f31a9eeaedf751f717d92

      SHA256

      f44a7802f3b859c53f5f6382b29b48f3a5900fa91af837df3448f360bdbf8c1a

      SHA512

      df8aad4b003600b397d479c2042bf6b918fe4f1ff96fb90e22a3f4758d40d7fd26416089f38d68759f37b3dc9947c8cc1b46c69f074d55fc9270c2ab2e6f1179

    • \Windows\System32\snmptrap.exe

      Filesize

      1.2MB

      MD5

      df184f1bf12f1c01d4c70d219b7fd2b1

      SHA1

      38b9e9b85baa1db1558681be6a6de1bee42b4a52

      SHA256

      90fa4e8b9392b9b311c539dc06e78a258e8f84962963ae77128dd7a6d4687a51

      SHA512

      baf0ea29099ca41df903fa8a14b68056782811bdfcac929b26893b32059f5b9ba5c5cb189fa261db425682c5023ee1d6828fe017609cc8b5de3bd303f46a9fbd

    • \Windows\System32\vds.exe

      Filesize

      1.7MB

      MD5

      aa1dbd0ffb6ea642f19c862f20c7b7e3

      SHA1

      ed7d4ed48ad417b40042c695e7915c667a98100e

      SHA256

      842bd2980a577d1532b0b9b077322a6533989aa080a27e2814b3c9d25d1d6c9f

      SHA512

      128296619595188c0cd6b6d86cccf32677a37b87cf658f754bc921003c5555488343416f2ddfb38942aff5ec43c1edec910f351812bbd486aed4ed7a711d4b3a

    • \Windows\System32\wbem\WmiApSrv.exe

      Filesize

      1.4MB

      MD5

      759aa7a245fa6848a1ee8e24804a226b

      SHA1

      66af8618b136258d016c2570894b26f559abc8b2

      SHA256

      f1e30292f3df486c633222766f4d89bd312624945452eb7aa841b02af2120f2f

      SHA512

      e3304a19b0ac3ebfbb201f3bb55d18351c1606fb48c20693f0273997305814ae3c2f41568caad193817fa6331ce1d7e4c301714953f10d9df4c740eccd7d0fe0

    • \Windows\System32\wbengine.exe

      Filesize

      2.0MB

      MD5

      62fbddfc3ead9b4d7876ef554bc46cef

      SHA1

      1d13e5d0fc0c22c0a560e5df71dd716c5d6b8f67

      SHA256

      d8dddd4193c639a67e802f1ee753a5fdd7d79999201e6236604b7e0f87355988

      SHA512

      81a7034117e64cff658c771dee8558cec1bc739496404efc25ea1bd9a9d5194a6857e3b0b88aa45fb0d58fb5fe98cfa6cba10c5fcf54bcdeddd163af3f62f829

    • \Windows\ehome\ehrecvr.exe

      Filesize

      1.2MB

      MD5

      94ee278417d328244b43fbdc89b47681

      SHA1

      aa98c0ef39eb61c14bbaff955c0488226a3968ae

      SHA256

      89eecc9e09bd4a35b3085d0360fa89c8a4347b5a016a3bbf49510306492dba46

      SHA512

      2d4a5fbf515d5203acb64364caa6153a6f545de9cc0bf9a66e6586301e2cb5b29c398fac57e2caf05522dd2553afc8a3f7785c650a798b2b3da22709f56cb1b0

    • \Windows\ehome\ehsched.exe

      Filesize

      1.3MB

      MD5

      eef6086bfd13c7e21edc9ae997c194eb

      SHA1

      2d5db826c5f958c8dfcba337e83e65d5f9f712e5

      SHA256

      8b4541c9a110b24137add1fb32364018fcbe86daaabd20a74c413a07f2928ac2

      SHA512

      f997d9b3c5edb22f5ba9e137f049e92c1d8a5fb5ec4b360f9720926950956645aad26faf4246bb017343ccde889a9ac7242d4e542bd738513f49ce8cf1cecec4

    • memory/560-66-0x0000000000400000-0x0000000000654000-memory.dmp

      Filesize

      2.3MB

    • memory/560-95-0x0000000000400000-0x0000000000654000-memory.dmp

      Filesize

      2.3MB

    • memory/560-299-0x0000000000400000-0x0000000000654000-memory.dmp

      Filesize

      2.3MB

    • memory/560-61-0x0000000000400000-0x0000000000654000-memory.dmp

      Filesize

      2.3MB

    • memory/560-62-0x0000000000400000-0x0000000000654000-memory.dmp

      Filesize

      2.3MB

    • memory/560-74-0x00000000000F0000-0x0000000000156000-memory.dmp

      Filesize

      408KB

    • memory/560-69-0x00000000000F0000-0x0000000000156000-memory.dmp

      Filesize

      408KB

    • memory/560-68-0x0000000000400000-0x0000000000654000-memory.dmp

      Filesize

      2.3MB

    • memory/560-63-0x0000000000400000-0x0000000000654000-memory.dmp

      Filesize

      2.3MB

    • memory/560-65-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/760-158-0x0000000000820000-0x0000000000880000-memory.dmp

      Filesize

      384KB

    • memory/760-152-0x0000000000820000-0x0000000000880000-memory.dmp

      Filesize

      384KB

    • memory/760-166-0x0000000001380000-0x0000000001390000-memory.dmp

      Filesize

      64KB

    • memory/760-169-0x0000000001390000-0x00000000013A0000-memory.dmp

      Filesize

      64KB

    • memory/760-167-0x0000000140000000-0x000000014013C000-memory.dmp

      Filesize

      1.2MB

    • memory/760-172-0x0000000001430000-0x0000000001431000-memory.dmp

      Filesize

      4KB

    • memory/760-308-0x0000000140000000-0x000000014013C000-memory.dmp

      Filesize

      1.2MB

    • memory/908-225-0x0000000140000000-0x0000000140205000-memory.dmp

      Filesize

      2.0MB

    • memory/908-438-0x0000000140000000-0x0000000140205000-memory.dmp

      Filesize

      2.0MB

    • memory/1008-122-0x0000000010000000-0x00000000101FE000-memory.dmp

      Filesize

      2.0MB

    • memory/1068-370-0x0000000100000000-0x0000000100219000-memory.dmp

      Filesize

      2.1MB

    • memory/1068-575-0x0000000100000000-0x0000000100219000-memory.dmp

      Filesize

      2.1MB

    • memory/1308-120-0x0000000010000000-0x00000000101F6000-memory.dmp

      Filesize

      2.0MB

    • memory/1432-333-0x0000000140000000-0x0000000140237000-memory.dmp

      Filesize

      2.2MB

    • memory/1432-190-0x00000000008F0000-0x0000000000950000-memory.dmp

      Filesize

      384KB

    • memory/1432-200-0x0000000140000000-0x0000000140237000-memory.dmp

      Filesize

      2.2MB

    • memory/1468-88-0x0000000000370000-0x00000000003D0000-memory.dmp

      Filesize

      384KB

    • memory/1468-96-0x0000000100000000-0x00000001001FB000-memory.dmp

      Filesize

      2.0MB

    • memory/1468-82-0x0000000000370000-0x00000000003D0000-memory.dmp

      Filesize

      384KB

    • memory/1472-368-0x00000000009C0000-0x0000000000A40000-memory.dmp

      Filesize

      512KB

    • memory/1472-346-0x00000000009C0000-0x0000000000A40000-memory.dmp

      Filesize

      512KB

    • memory/1472-577-0x00000000009C0000-0x0000000000A40000-memory.dmp

      Filesize

      512KB

    • memory/1472-573-0x00000000009C0000-0x0000000000A40000-memory.dmp

      Filesize

      512KB

    • memory/1472-226-0x00000000009C0000-0x0000000000A40000-memory.dmp

      Filesize

      512KB

    • memory/1512-97-0x0000000140000000-0x00000001401F4000-memory.dmp

      Filesize

      2.0MB

    • memory/1588-126-0x0000000000230000-0x0000000000296000-memory.dmp

      Filesize

      408KB

    • memory/1588-149-0x0000000000400000-0x00000000005FF000-memory.dmp

      Filesize

      2.0MB

    • memory/1588-131-0x0000000000230000-0x0000000000296000-memory.dmp

      Filesize

      408KB

    • memory/1616-57-0x0000000004E30000-0x0000000004E70000-memory.dmp

      Filesize

      256KB

    • memory/1616-59-0x0000000005D40000-0x0000000005E98000-memory.dmp

      Filesize

      1.3MB

    • memory/1616-60-0x00000000081B0000-0x0000000008380000-memory.dmp

      Filesize

      1.8MB

    • memory/1616-58-0x0000000000530000-0x000000000053A000-memory.dmp

      Filesize

      40KB

    • memory/1616-54-0x0000000000EE0000-0x0000000001078000-memory.dmp

      Filesize

      1.6MB

    • memory/1616-56-0x0000000000510000-0x0000000000522000-memory.dmp

      Filesize

      72KB

    • memory/1616-55-0x0000000004E30000-0x0000000004E70000-memory.dmp

      Filesize

      256KB

    • memory/1664-148-0x0000000100000000-0x00000001001EC000-memory.dmp

      Filesize

      1.9MB

    • memory/1724-105-0x00000000000D0000-0x0000000000136000-memory.dmp

      Filesize

      408KB

    • memory/1724-124-0x0000000004B40000-0x0000000004BFC000-memory.dmp

      Filesize

      752KB

    • memory/1724-113-0x00000000000D0000-0x0000000000136000-memory.dmp

      Filesize

      408KB

    • memory/1724-106-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

      Filesize

      4KB

    • memory/1724-110-0x00000000000D0000-0x0000000000136000-memory.dmp

      Filesize

      408KB

    • memory/1724-107-0x00000000000D0000-0x0000000000136000-memory.dmp

      Filesize

      408KB

    • memory/1884-176-0x0000000000820000-0x0000000000880000-memory.dmp

      Filesize

      384KB

    • memory/1884-310-0x0000000140000000-0x0000000140209000-memory.dmp

      Filesize

      2.0MB

    • memory/1884-171-0x0000000140000000-0x0000000140209000-memory.dmp

      Filesize

      2.0MB

    • memory/1940-185-0x0000000000210000-0x0000000000270000-memory.dmp

      Filesize

      384KB

    • memory/1940-179-0x0000000000210000-0x0000000000270000-memory.dmp

      Filesize

      384KB

    • memory/1940-198-0x0000000140000000-0x0000000140205000-memory.dmp

      Filesize

      2.0MB

    • memory/1940-222-0x0000000140000000-0x0000000140205000-memory.dmp

      Filesize

      2.0MB

    • memory/1972-224-0x0000000140000000-0x0000000140205000-memory.dmp

      Filesize

      2.0MB

    • memory/1972-237-0x0000000140000000-0x0000000140205000-memory.dmp

      Filesize

      2.0MB

    • memory/2008-146-0x0000000140000000-0x0000000140205000-memory.dmp

      Filesize

      2.0MB

    • memory/2084-364-0x000000002E000000-0x000000002FE1E000-memory.dmp

      Filesize

      30.1MB

    • memory/2084-241-0x000000002E000000-0x000000002FE1E000-memory.dmp

      Filesize

      30.1MB

    • memory/2136-388-0x0000000100000000-0x0000000100202000-memory.dmp

      Filesize

      2.0MB

    • memory/2188-414-0x0000000100000000-0x000000010020A000-memory.dmp

      Filesize

      2.0MB

    • memory/2188-260-0x0000000140000000-0x0000000140221000-memory.dmp

      Filesize

      2.1MB

    • memory/2200-397-0x0000000100000000-0x000000010021B000-memory.dmp

      Filesize

      2.1MB

    • memory/2240-264-0x0000000000400000-0x00000000005FF000-memory.dmp

      Filesize

      2.0MB

    • memory/2240-386-0x0000000000400000-0x00000000005FF000-memory.dmp

      Filesize

      2.0MB

    • memory/2344-280-0x0000000140000000-0x000000014020D000-memory.dmp

      Filesize

      2.1MB

    • memory/2452-282-0x0000000000400000-0x00000000005FF000-memory.dmp

      Filesize

      2.0MB

    • memory/2500-302-0x00000000004C0000-0x00000000006C9000-memory.dmp

      Filesize

      2.0MB

    • memory/2500-412-0x0000000100000000-0x0000000100209000-memory.dmp

      Filesize

      2.0MB

    • memory/2500-301-0x0000000100000000-0x0000000100209000-memory.dmp

      Filesize

      2.0MB

    • memory/2500-413-0x00000000004C0000-0x00000000006C9000-memory.dmp

      Filesize

      2.0MB

    • memory/2512-424-0x0000000100000000-0x0000000100123000-memory.dmp

      Filesize

      1.1MB

    • memory/2608-423-0x000000002E000000-0x000000002E20C000-memory.dmp

      Filesize

      2.0MB

    • memory/2608-304-0x000000002E000000-0x000000002E20C000-memory.dmp

      Filesize

      2.0MB

    • memory/2708-446-0x0000000100000000-0x0000000100542000-memory.dmp

      Filesize

      5.3MB

    • memory/2708-320-0x0000000100000000-0x0000000100542000-memory.dmp

      Filesize

      5.3MB

    • memory/2808-335-0x0000000001000000-0x00000000011ED000-memory.dmp

      Filesize

      1.9MB

    • memory/2808-478-0x0000000001000000-0x00000000011ED000-memory.dmp

      Filesize

      1.9MB

    • memory/2836-484-0x0000000100000000-0x00000001001EC000-memory.dmp

      Filesize

      1.9MB

    • memory/2836-336-0x0000000100000000-0x00000001001EC000-memory.dmp

      Filesize

      1.9MB

    • memory/2920-348-0x0000000100000000-0x00000001001ED000-memory.dmp

      Filesize

      1.9MB

    • memory/2920-523-0x0000000100000000-0x00000001001ED000-memory.dmp

      Filesize

      1.9MB

    • memory/3016-572-0x0000000100000000-0x000000010026B000-memory.dmp

      Filesize

      2.4MB

    • memory/3016-366-0x0000000100000000-0x000000010026B000-memory.dmp

      Filesize

      2.4MB