Analysis

  • max time kernel
    146s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-05-2023 18:59

General

  • Target

    Request for Quotation.exe

  • Size

    1.5MB

  • MD5

    67683d83541b578498d12ddc5828260e

  • SHA1

    679904b6c6101f399811885b42e98c4c8c564e6e

  • SHA256

    9a3e3d21954d44054b67a726ecc1c6e54a231f4accc013fa91d0830ccf134680

  • SHA512

    fb3080919598e0bedaa3b429e86f498bbbfcfb257a9c92dc9f6c197e2da9bd17328cc762bd97e7cbb770f0d6f1e8c8c05107a59f6204ce8ebc5ad4996e8e709b

  • SSDEEP

    24576:sLOOmjfJ7uGyhgAzbOQ31ubRVTkK09CDg2bCaUwFDyfCTdNuuVIF/gwqb+:sG17uGmPOQ3oNVTkhC/bCaUwpy2wuV32

Malware Config

Extracted

Family

blustealer

C2

https://api.telegram.org/bot5797428905:AAGaRRXGZN1d9GGFd3sE5x4uSpCGF0PU4m4/sendMessage?chat_id=1251788325

Signatures

  • BluStealer

    A Modular information stealer written in Visual Basic.

  • Executes dropped EXE 22 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Drops file in System32 directory 31 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 64 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 64 IoCs
  • Script User-Agent 1 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: EnumeratesProcesses 37 IoCs
  • Suspicious behavior: LoadsDriver 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 44 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Request for Quotation.exe
    "C:\Users\Admin\AppData\Local\Temp\Request for Quotation.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1368
    • C:\Users\Admin\AppData\Local\Temp\Request for Quotation.exe
      "C:\Users\Admin\AppData\Local\Temp\Request for Quotation.exe"
      2⤵
        PID:4424
      • C:\Users\Admin\AppData\Local\Temp\Request for Quotation.exe
        "C:\Users\Admin\AppData\Local\Temp\Request for Quotation.exe"
        2⤵
        • Drops file in System32 directory
        • Suspicious use of SetThreadContext
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:4920
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
          C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
          3⤵
          • Accesses Microsoft Outlook profiles
          • outlook_office_path
          • outlook_win_path
          PID:4876
    • C:\Windows\System32\alg.exe
      C:\Windows\System32\alg.exe
      1⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Drops file in Windows directory
      PID:3984
    • C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe
      C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe
      1⤵
      • Executes dropped EXE
      PID:4788
    • C:\Windows\System32\svchost.exe
      C:\Windows\System32\svchost.exe -k NetworkService -p -s TapiSrv
      1⤵
        PID:1836
      • C:\Windows\system32\fxssvc.exe
        C:\Windows\system32\fxssvc.exe
        1⤵
        • Executes dropped EXE
        • Modifies data under HKEY_USERS
        • Suspicious use of AdjustPrivilegeToken
        PID:4144
      • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
        "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
        1⤵
        • Executes dropped EXE
        PID:2764
      • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"
        1⤵
        • Executes dropped EXE
        PID:1028
      • C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe
        "C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"
        1⤵
        • Executes dropped EXE
        PID:2804
      • C:\Windows\System32\msdtc.exe
        C:\Windows\System32\msdtc.exe
        1⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        PID:4128
      • \??\c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE
        "c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"
        1⤵
        • Executes dropped EXE
        PID:3752
      • C:\Windows\system32\PerceptionSimulation\PerceptionSimulationService.exe
        C:\Windows\system32\PerceptionSimulation\PerceptionSimulationService.exe
        1⤵
        • Executes dropped EXE
        PID:2424
      • C:\Windows\SysWow64\perfhost.exe
        C:\Windows\SysWow64\perfhost.exe
        1⤵
        • Executes dropped EXE
        PID:1084
      • C:\Windows\system32\locator.exe
        C:\Windows\system32\locator.exe
        1⤵
        • Executes dropped EXE
        PID:3340
      • C:\Windows\System32\SensorDataService.exe
        C:\Windows\System32\SensorDataService.exe
        1⤵
        • Executes dropped EXE
        • Checks SCSI registry key(s)
        PID:1464
      • C:\Windows\System32\snmptrap.exe
        C:\Windows\System32\snmptrap.exe
        1⤵
        • Executes dropped EXE
        PID:1520
      • C:\Windows\system32\spectrum.exe
        C:\Windows\system32\spectrum.exe
        1⤵
        • Executes dropped EXE
        • Checks SCSI registry key(s)
        PID:4244
      • C:\Windows\System32\OpenSSH\ssh-agent.exe
        C:\Windows\System32\OpenSSH\ssh-agent.exe
        1⤵
        • Executes dropped EXE
        PID:3332
      • C:\Windows\system32\svchost.exe
        C:\Windows\system32\svchost.exe -k LocalService -p -s SharedRealitySvc
        1⤵
          PID:1616
        • C:\Windows\system32\TieringEngineService.exe
          C:\Windows\system32\TieringEngineService.exe
          1⤵
          • Executes dropped EXE
          • Checks processor information in registry
          • Suspicious use of AdjustPrivilegeToken
          PID:4716
        • C:\Windows\system32\AgentService.exe
          C:\Windows\system32\AgentService.exe
          1⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:3680
        • C:\Windows\System32\vds.exe
          C:\Windows\System32\vds.exe
          1⤵
          • Executes dropped EXE
          PID:3708
        • C:\Windows\system32\vssvc.exe
          C:\Windows\system32\vssvc.exe
          1⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:4076
        • C:\Windows\system32\wbengine.exe
          "C:\Windows\system32\wbengine.exe"
          1⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:1644
        • C:\Windows\system32\wbem\WmiApSrv.exe
          C:\Windows\system32\wbem\WmiApSrv.exe
          1⤵
          • Executes dropped EXE
          PID:1412
        • C:\Windows\system32\SearchIndexer.exe
          C:\Windows\system32\SearchIndexer.exe /Embedding
          1⤵
          • Executes dropped EXE
          • Modifies data under HKEY_USERS
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:972
          • C:\Windows\system32\SearchProtocolHost.exe
            "C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe1_ Global\UsGthrCtrlFltPipeMssGthrPipe1 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon"
            2⤵
            • Modifies data under HKEY_USERS
            PID:4984
          • C:\Windows\system32\SearchFilterHost.exe
            "C:\Windows\system32\SearchFilterHost.exe" 0 912 916 924 8192 920 896
            2⤵
            • Modifies data under HKEY_USERS
            PID:4756

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe

          Filesize

          2.1MB

          MD5

          8dc69ae8c41eac216009eb29ce580806

          SHA1

          c3f0d5a71ca3c469b834a0cb6d22440cc92783ca

          SHA256

          0d358a7c10d39fb756a5a67f9a7a35a05f0dc5138e988d9a7dcd6ba6f0cbf13e

          SHA512

          f836c2329e8a3e74a8ef5d6956e4dfcefb0cfc1d931744b7c563b2e3d8e02462cf3649205d80a9294b655c24f15da001cd476cea3e23ae8b36192ccd06c8ceaa

        • C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe

          Filesize

          1.4MB

          MD5

          44e5e40768968a23f1e6f7caea05d57e

          SHA1

          282f235a7ef19bec6008b60b5c682d39e250998d

          SHA256

          ae9f5c13a2964f060ef70b050d2b6ccc1ccfa95d3992fb2e2f10e019fb93a0a6

          SHA512

          077af745937be6fc6a89996c81878ad84a9b97e9d5f3cb99300e25e81b63ac3977b9e69b69a066aa39fa52e880d39e76f0e2def91d2101bc1f702fbd5d2b9f07

        • C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe

          Filesize

          1.4MB

          MD5

          44e5e40768968a23f1e6f7caea05d57e

          SHA1

          282f235a7ef19bec6008b60b5c682d39e250998d

          SHA256

          ae9f5c13a2964f060ef70b050d2b6ccc1ccfa95d3992fb2e2f10e019fb93a0a6

          SHA512

          077af745937be6fc6a89996c81878ad84a9b97e9d5f3cb99300e25e81b63ac3977b9e69b69a066aa39fa52e880d39e76f0e2def91d2101bc1f702fbd5d2b9f07

        • C:\Program Files\7-Zip\7z.exe

          Filesize

          1.7MB

          MD5

          2e942daa9957d33b896c37a7c4331d7c

          SHA1

          9559613239a95e206ace903beab638d187837f51

          SHA256

          5098be0e2a9ba0d8305ad01a59ea1815a1de5e3be25b9c3627883eabf767621f

          SHA512

          8f8f128c75f1e2d957db7933361fcb6468bbcb44f1877fbfca4bec8b1bc204e7660e91682c7d798978a601b5add6264e16e530d790b6a3d203066787711c9cc9

        • C:\Program Files\7-Zip\7zFM.exe

          Filesize

          1.4MB

          MD5

          236640144ebffce8f3ef01eb8e905f46

          SHA1

          f00f24f87db510b710cf7ca5b8e93ab776cdce06

          SHA256

          7c679a83f2058e269b5ccc8ec75518f972f9e2eafe51152fc0c4bb37a77c0403

          SHA512

          065539156bae614c70f8d249b456ebcf1843c44a1e93ea590a04708b9aea85983cc6965754a588747ae9efe1def2ef46093196f7d49728dde5153eb0277b3713

        • C:\Program Files\7-Zip\7zG.exe

          Filesize

          1.1MB

          MD5

          ddb44f73081b82fcbf9be28380fff70e

          SHA1

          8d7600e2cde05b21396bee488de4412b22ca7733

          SHA256

          d02805ed3f27ed015231380fc3a6c755570c9dc85b2586b6d3e30bff5a65cd72

          SHA512

          9a48fb68585d7efd6268e6dd87bc91204c769eabf133f782dc92ee5a18646dcb14ab666fad45db266e9fe0ff8b54321aba5a99e7f9cfe57b3c2f9039f3be9a38

        • C:\Program Files\7-Zip\Uninstall.exe

          Filesize

          1.2MB

          MD5

          782b1d043c7a41a32de35938fa7325b4

          SHA1

          b1f9ea4bf42e51adfa3fab5df095cde33f59bcc9

          SHA256

          572da2e8e0998cd9d46bff79099c0ed6886fa1dc712f7f48389c3267edcd19cf

          SHA512

          192df5243ed54ed3ed099c020a090185f4d9128ba96f5c4dca81ca12f68f14dd8c2339a30f62d2c8ae6604b6880de01e815ff755094b09c9e7caf652cd17b116

        • C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVShNotify.exe

          Filesize

          1.5MB

          MD5

          f882d17dca4c5c364cbce83faeefe124

          SHA1

          1253311d4a66a999df0abdd3be618c537b38a121

          SHA256

          15ae36ee5c1e00303156242d04abbccc22f91f1fefb7b3ae49cdc86374477565

          SHA512

          382b1afd85f565bf412be2020c594c8e5d1c7a29578958f4828745f5dbd1105942ad6855125d34dd6f4fd0cfb5bce7f9651bc03a76a7e4edefce9dbfb570ac53

        • C:\Program Files\Common Files\microsoft shared\ClickToRun\IntegratedOffice.exe

          Filesize

          3.4MB

          MD5

          84e5d88fdd7672d6b4c8b0d7c8217be6

          SHA1

          20109585243c0e1ee8d9bc4e4d432e0e38bd9777

          SHA256

          4fe5865179d701bb698dfa86d5acccb2dfdd6a19a97622077f7af8c624e09081

          SHA512

          c2ffcf8232f5bab67031b1eacf1a3b5316a2d03eaa180e3525b2d046f03557d3ad5edb923c89c3b54b6c67d79bfd7107d2251920745d9ca7086754cfcca479c1

        • C:\Program Files\Common Files\microsoft shared\ClickToRun\MavInject32.exe

          Filesize

          1.6MB

          MD5

          c6362426d139706a831ba7bea6a83e10

          SHA1

          374bc07cb977910e6515f05274cdb1dde8da8b24

          SHA256

          c401794ef63270ec2f7228e92b7e9f9d864dffa58119604f21da590e9724f8bf

          SHA512

          53d9e7aa0a7399676a165b05459af6192ef15c0a921c160a00a748e75c4a24693ebaeab7863b1c5c0a97a02bac33ddcc28534eb480f1de1032f1c53cc2d34bce

        • C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeC2RClient.exe

          Filesize

          3.3MB

          MD5

          8ad016169c6811cbe0387f9ef66240f9

          SHA1

          6faedc1f43d4fee8fc4536fe9437e488286b7c2b

          SHA256

          e502aedb00f11217646506a590d532992fe513a8d7b129f207b13b031af34230

          SHA512

          4f2538f0d2424b8703f14bbd9950b526a0e3a9e5bbcb933d23f09110990cf877e9ab4f4aa1622c9a076a9d638c7a4d4b4cab534fcc40cf014adb97a222508042

        • C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe

          Filesize

          2.7MB

          MD5

          413d331021d865e427852482fc03656f

          SHA1

          65cbb415ae6a4fd2c6aaa93e9f02d33a2dd65566

          SHA256

          5d04657c3fd3c2ccc73af387aca9447b3ff13f24dfa2e6f36b6892eaa51fcc77

          SHA512

          dbfb10c3e61d8c24bbdc6e3c9aad8c2162a55a7cec2e02dbc6e9f8b9f73c69900fe8434e0501748f12d0601a77e8f934fe5b57096c0322a2fd273f1da846d329

        • C:\Program Files\Common Files\microsoft shared\OFFICE16\LICLUA.EXE

          Filesize

          1.1MB

          MD5

          5a5dda11e02546ff8ed8c6c21cdd7a03

          SHA1

          77c6ffdabb13022cbecd953f92bfd0e20ca6bc44

          SHA256

          7c90df42d59df85e9e69d08aa09edfefca0812e28e06ff48f88d6db40ab47efa

          SHA512

          61c94d310d9658f51c4f04fc9b4bdc7dd2d85c93aae4c350dca0287cef3d5a6b78e4b7134c50f308daf79a51f13834ab24d21658fcf1eca1671f492173a5f400

        • C:\Program Files\Common Files\microsoft shared\Source Engine\OSE.EXE

          Filesize

          1.5MB

          MD5

          44d7c1ac7f2b884f25afe4836b59c5ee

          SHA1

          4a84087f0677933b9708ef8cbbe946eff4667c40

          SHA256

          aa14a4af3a6cc4f472341259f440d0097f0adc242817f523c8c79097eb325832

          SHA512

          d6ef89de62e58176448351cf8d1e9a95d7eb7e82c46258f915feb0ba3fe32b0710b4f7ced1ad75b6c2447c73e90cfec53adfb7f715a5306dbf21e41ba6389305

        • C:\Program Files\Common Files\microsoft shared\VSTO\10.0\VSTOInstaller.exe

          Filesize

          1.3MB

          MD5

          4863bfc45de31898c31de7d8ba032da9

          SHA1

          b73486e336d0461669aa9d26f08d8c08c0213d2f

          SHA256

          e02cc92d102bb215fce2656f7ef9a40e2624498421cb80028bb395cf4f500eb7

          SHA512

          6d7903616e7f00f40572b6543797babc13a729b3d2335ef37596ebf78ea9a30a6a0aac57ae42d2e49c4cfb0a65e6ef1dde6b3903d8f892da37e954171741e606

        • C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\chrmstp.exe

          Filesize

          3.2MB

          MD5

          65ce457d1342b753aa2a3334ba90540d

          SHA1

          5952efbfed9d80ec521f9f0db91cd67cbdeeba97

          SHA256

          22c1e41d89950ab007d226d67aa5da3214a7b78e5934f1fc7a7a7beafa95b067

          SHA512

          fae89f221301fac3a8775cc6f0768e78a3039d3d970d440f72fd26b29223785942d8bb0c338dea1d9ecc9ac5ccd06edd0a83ff9d1333f0706067e5d5e3674e42

        • C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe

          Filesize

          3.2MB

          MD5

          b9a9c33723602807035f2da6f806a2e1

          SHA1

          2233dadd2751d43be2e722cac5d27073e10fa7db

          SHA256

          c36ca60393838fd4835931760aa1c9a3f2580a9f2b03b8d66c5bdb77edc018f9

          SHA512

          035b2b046908350932582567d0c20612c571f956a7f29f23015275372df2e012a4e562fdcf9208f6fde1e46bae72b52c45ecf30e47b8d4fbd85f7814742f5278

        • C:\Program Files\Google\Chrome\Application\106.0.5249.119\chrome_pwa_launcher.exe

          Filesize

          2.2MB

          MD5

          21c50fbc9bf16e59344e1be968c26b97

          SHA1

          f2efd0714c8720f2238180bb9bc0c8bc6a736fcf

          SHA256

          0da59c74777c031a0a66f626d4c4105bcc44f84708a831bf25d870d9fda62cbf

          SHA512

          c9fefadb56611645d7854b43cd74e2c0f96ac88167f32ddb23354be844d715aba16a7097dbc92dba5507647d706690761af22d2955bcf9ce3c800a84ca11d806

        • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe

          Filesize

          2.1MB

          MD5

          ce0b7cbed848f47d64ad045b7433df58

          SHA1

          02cdd120f2ddebe472ea68161a402bb154f03a34

          SHA256

          238d396de0e6aa99b5e495d3f83d60aff619e3b59e71f286be110941b855ab0f

          SHA512

          f0c2baf8ebf25f4c98d2bf40a88a9679d32d59236ed3e635e43381b50685f4c0a8e4114eb38b372f9f7b7e97f3752c20d781e35efcd21ffdee1b3a85572ecb5c

        • C:\Program Files\Google\Chrome\Application\106.0.5249.119\notification_helper.exe

          Filesize

          1.8MB

          MD5

          8245bfba8984c9c85231191e7c5307ac

          SHA1

          14c9a03fae78709aef977791cb8b3685969ebf50

          SHA256

          35d0d5b964856228ef5c0db2234da2c27b2e4085836d91518f21eba615e27e62

          SHA512

          6e9f50822f324c628b8636f4bd87485bfb6fe7746123f1d858ddd7513c2ea0cac4c243b3de0db598355be23ae2c7fee5e387d93d37c92de17ed3bd9c5880f459

        • C:\Program Files\Google\Chrome\Application\chrome_proxy.exe

          Filesize

          1.5MB

          MD5

          81227c9ef4319443576734f7ad7abe93

          SHA1

          93decb22443d8c1ae2b268a43588bba120f5d4ba

          SHA256

          e341e4ca2f0f4a07601428d42b3e0c48dc4c443f2dc21aa68cf7691bc56bdc1b

          SHA512

          935a876cc63d75477f9c5e72e3c9e93494af08ed696d94417b360db3e388e8820bb765cc5c122772ea636d149262c011971f07821c6b9ffe2e38687ba496c1aa

        • C:\Program Files\Java\jdk1.8.0_66\bin\appletviewer.exe

          Filesize

          1.2MB

          MD5

          729e6ebd80ff5a37d181982f71abb9af

          SHA1

          1f219725661b49bfd516989ff21ebfc296d5786d

          SHA256

          44f19e937761b15d4c1ae30e660fcfb731db4a38aaf612dae6c273138793fa65

          SHA512

          b5cd68e71d3950e345ca66a59eb3d939933b5d729382b8b50cf7fc19f86d94f38ebff31e5e8f82a966c7affde8ebcaa5a47cf2c8e65ad660d4e39da751122509

        • C:\Program Files\Java\jdk1.8.0_66\bin\extcheck.exe

          Filesize

          1.2MB

          MD5

          ae482faab47692915fcb8803be574a5d

          SHA1

          bfe9480812e471aa754a2befe1e77bbbcf84194c

          SHA256

          5be17a3d9661e17065f21a9d91ad617a3fdbcab11d0a1f3603857ff532746d42

          SHA512

          7237e17f96e6baff78e7d5d3c1365418deb0e8c2fc124459e101c4d4672d281e7b842b522208e056d34f0aa9f846720ec68ab3bc02bd634644c84cfd52462a6f

        • C:\Program Files\Java\jdk1.8.0_66\bin\idlj.exe

          Filesize

          1.2MB

          MD5

          845996453f4bc3bc9a56451a0f72adb5

          SHA1

          206125a8b9bd8ccb9c1ec5d1e63032796c319330

          SHA256

          24f6c92fe5193338de01e8efe135df95fafef86d16ece59bf7e52d3b0eac5f25

          SHA512

          9676264442b5c003468f587d5d089c660ce11d22b7e497dd11db1fa4c502c6ca54fe3e441e694456e27252054a7e1dc706938d8c6b66cd8bf7b56d582f0d36ab

        • C:\Program Files\Java\jdk1.8.0_66\bin\jabswitch.exe

          Filesize

          1.3MB

          MD5

          0fa137bcb38b1615bb4d53d5cf2e5002

          SHA1

          e3f02693583a7162e26a935bf04a9d6e269418ed

          SHA256

          cf1ad4ac7ad958f696dc263b545de635f26793b63d9a14773a498c3b5587f5f3

          SHA512

          02fb9fdf1fad04b1703b791e01f48725cdf64a7884acbecf88f93c012cd40ecd221592712f933c618e6d53fd933ab071661de780609b05ec0e94817a00b3153e

        • C:\Program Files\Java\jdk1.8.0_66\bin\jar.exe

          Filesize

          1.2MB

          MD5

          14241bee6639a44a48adda159ca7488a

          SHA1

          0c7d9f0cffbffd32e08ef6cdc05043d16e0c568c

          SHA256

          decbf20036c9008444d25dbb45adadbd95848f55d3f1b496bc453e9aa4692c93

          SHA512

          32de2cbf03229c897c0ec764da27ab5a458988dde24d2f2a498f4d655d2b8786bc05b520a73b1db3f0e63c2e24b19f68703456f667069f2c63c31f989010b1e8

        • C:\Program Files\Java\jdk1.8.0_66\bin\jarsigner.exe

          Filesize

          1.2MB

          MD5

          7f16458ee186f5dac9ba24668fadd35d

          SHA1

          6576eed8c669e40727b460375ce62a12f74dd887

          SHA256

          3a069b64afd9b9224e647c9f7a8574368fb9007a2bb6cbc6fbf26da021570030

          SHA512

          692050bae9e596379e1e6d52c84cedc1f91d01ecc1beb2010cdcb0cc34c7ea5ffae52be592a1d5308ac48a980ef7f2386695a0499d2925e990cf62d67e0aa6e9

        • C:\Program Files\Java\jdk1.8.0_66\bin\java-rmi.exe

          Filesize

          1.2MB

          MD5

          5ccb51447aae14cb826e8c2944e20f19

          SHA1

          bbdc8285b1660156ffe1447fe55ea352abc93590

          SHA256

          c358d0f47b556aa0ad54c804eb8a08d448576546dd96dd24ff764865caa26feb

          SHA512

          3fd7c32d0702e293fda7ceb158c0ac91e6e425c61d3b69f5fdafb1e2cd5d9e8c4c0efddfd3ad34b890873f08cba3486b388ffa184678956218225158f8792528

        • C:\Program Files\Java\jdk1.8.0_66\bin\java.exe

          Filesize

          1.4MB

          MD5

          9c9fec0fb91f8a8fa646515a115ac5d7

          SHA1

          052ebb76260dafaca4ddc00ddc34e1e62af63213

          SHA256

          b78d007471108ca3dab6485a24e3f7e663ef4b05f6a188daa7077ce3b79f8a7c

          SHA512

          357f090d0c92bc3f053d2ce2f785a32fe116dc6ac7a23a5b6c8ba6d0ac5e78dcdd883f3aa0dbb524401a12be22689b80d695f40673e3cdf6be09447be278b161

        • C:\Program Files\Java\jdk1.8.0_66\bin\javac.exe

          Filesize

          1.2MB

          MD5

          b4dae1530c2cf4af29cf566bdd5d4615

          SHA1

          4607f4cd9aaa746294cdd4245afe016f85139243

          SHA256

          ddf618e12c377020f601d57fc48478101b8b9d53049d33583a6b209d5f940b6f

          SHA512

          8b9940f82e6eb42b40cc1660fec83329454e25ee21b566d4628aa048cc86ae301bc473119845d518b2f8ae09101c9ec734390f94effe2e29d5457837b06c88cf

        • C:\Program Files\Java\jdk1.8.0_66\bin\javadoc.exe

          Filesize

          1.2MB

          MD5

          5fbcaa0ccb10ad7a8ac272739028fcde

          SHA1

          2481b867b6c43bcaa518aa948537e7ccec756cb1

          SHA256

          b4bbd33b1eb0728072eea711be492630994d654519238c1271eee0a8ae49d150

          SHA512

          d9d30e8b7e7b7ce09b9fa77500a047b888873512ecd78670b384b2195b502c404f974f00de4037b9d6a820b5ca2c50629991bc2e547824794c41beac9a189688

        • C:\Program Files\Java\jdk1.8.0_66\bin\javafxpackager.exe

          Filesize

          1.3MB

          MD5

          f61c7dea38d2574df7b24594f24721c8

          SHA1

          16e7bf2a3d1a07161ddf14a2a81a1b4b43fba635

          SHA256

          8580674893853a91466f13ba5f7ce5e1e21d466d5636374c569fcb6fb905f0ac

          SHA512

          7e0212036fde97a068ba9446a10c93e158e9741b5cf4302305ca3fc7a83b7d7977094191d2fee7ee23cfeb76d3c26b92a514ca7ad44ebc6b8fcdf2240dd104f8

        • C:\Program Files\Java\jdk1.8.0_66\bin\javah.exe

          Filesize

          1.2MB

          MD5

          99615cc2b164bcad6c9cbc6ee63e8a11

          SHA1

          76b264d6c90d7fbe5b8f7e1b267d23633d3bef7d

          SHA256

          f88b2084c5bbdc16976643845c03d663e55edbf7b3b439a0f86efa258672e213

          SHA512

          4b5aa680da2307c03d8fc6d6c71aae29df2eba64dd462c6dfc892e9ee02a606e19de6485cfa15cbb2bab9fe5649f8be4ee90ba002c2dc20b08da4c45110fb7de

        • C:\Program Files\Java\jdk1.8.0_66\bin\javap.exe

          Filesize

          1.2MB

          MD5

          8b3782a4e5dbb39fcd9e7cb750147bf0

          SHA1

          34ab7197140fe5c3aaaef942d2a6a107f5f12d84

          SHA256

          6a69823dedc41f7f4e4a2d10f24976f927989b4c0cf3598654dacaf759bf2199

          SHA512

          eb0e54bbe43dbf7d54e1137602792769f9a83cfcf17d35c2f35e51a1370e93d4707b88ce087054ce10617d87bad8dd65165648b65e102b3d5e71db9d79d95df1

        • C:\Program Files\Java\jdk1.8.0_66\bin\javapackager.exe

          Filesize

          1.3MB

          MD5

          88da8614e8f564c36447356303777a5b

          SHA1

          dfce6148d78d7aa59c002fdc0753e352ecb41b03

          SHA256

          7c480e93d649202f8c9809494de917b0f9573f952d2399a32365b172a7e6974c

          SHA512

          f614394912e3222480dab87cad73b8d697e4467f01eaa8a26ee701eb5dfef2ec5ea26535cbbe72ba3250dc30b94f476d506596f96e162f98db29f866358d4afd

        • C:\Program Files\Java\jdk1.8.0_66\bin\javaw.exe

          Filesize

          1.4MB

          MD5

          cdbb3a76e3d90c01bcc4759a86efc8e6

          SHA1

          96693b8a20b532332b90fa94cd4cb75ce0767775

          SHA256

          d4a1bae09bb161ca9aebcf1b64f4dd4799b0149558437983e8000db003fc8bd2

          SHA512

          10ddc64e7a46c573a5ea130b1d38ba01d533ef69e3530f8ef5f5e9dc89db8e62e5e1d56ca3f072833d8aa723f4841a6badcf6b24c92294abf5b6bc145f4253fd

        • C:\Program Files\Java\jdk1.8.0_66\bin\javaws.exe

          Filesize

          1.5MB

          MD5

          45b62cf1d21329f7d9e21140334a8c46

          SHA1

          fcfbf6202ab75ae846908039b8756fe962ee99e4

          SHA256

          e0712bcac432d1e66275a0fc185c91e9278711d385936d2fea63fd25117dd231

          SHA512

          396a2a462af973a355df947254401a6b0a800e10c9ff02d63f7462eb89a16d7e010ae15daec7784349f80b2130aaacea6fbdd39acddafabc6eaeeda8757632fb

        • C:\Program Files\Windows Media Player\wmpnetwk.exe

          Filesize

          1.5MB

          MD5

          8de58e94e187e5d7ab84aa86d7fab6d4

          SHA1

          3acd7b830e571ef5c87bd545c6eb7c6b42353f62

          SHA256

          161a78b5b9af0d1466974346c63b93cebadf1c5782aa144c0ef5570849192f76

          SHA512

          66b9c0306a1642afe1dbd2acb6cdf894b361c7f1b1fe162debbc6e100d992eb4ec669ac257bb47fc40649b43859c45be6d3de8867ea72dd22e0abdf1f0dcb343

        • C:\Windows\SysWOW64\perfhost.exe

          Filesize

          1.2MB

          MD5

          2abf81b7bfd8fb38d0275aa23779af21

          SHA1

          e6e917c0786fa4a074dda81d0a71a71be2c90a37

          SHA256

          547307f035a499206d957f639eefdf40f40a91a9f6e181547b6be9fb91a23994

          SHA512

          936e18929e0444c0d38ede832b3fb34e727f5cbe15425c12b2978d872ec589ada2028ef585c5f370c0f26fedb72bb2b75c0db6845ce11b616427849e72d2b297

        • C:\Windows\System32\AgentService.exe

          Filesize

          1.7MB

          MD5

          8f1232114139e8110da7a1e4123ce396

          SHA1

          8f94bfefcff99b2f67872ebdaa6796b08da3a782

          SHA256

          2947de8102558b4157300b382548f187d125060947285a29212da46b19c958ae

          SHA512

          bbea4518118eca417cc37d80c775b3c639f3315d5707d019cbd032a0b244fdfd86c338ef79838057497e3b005e8cadb90ca51833c0a692b0689ad06d8d0e45cb

        • C:\Windows\System32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe

          Filesize

          1.3MB

          MD5

          b8e782a2e95c0df39ffe58071ee961dc

          SHA1

          3b4a6f8167acd9a660352798d2499f96d5ca94bb

          SHA256

          21461057d8f6d0b3fcb0208f7114bca19ebc4904039846ca3aa693bfddc6b04c

          SHA512

          beaa8e0dfa4d0b74d347a61e62cd3fc10391f38e1151a70142748ea78b84350d206460099086cd3bc7ab8fa96ca689d003e6e45d672aa4ceed71cf706bb84d15

        • C:\Windows\System32\FXSSVC.exe

          Filesize

          1.2MB

          MD5

          8911c7e46fece1eb4cb2b18b4340b308

          SHA1

          2a00286276b4ebdf870b7571ffb51b4f39f2b8fb

          SHA256

          f0d11d1d8eb493a298f4cbda961e8d207dbf4373fcc1e1dba188519afd2bd0c3

          SHA512

          9a14604ad21c98d35e0fc976fbff34fe5f45c80f68cf2187c209d3944a3484f3bda3f3f2438504c5fb819ab206da6a6f968ebdbca24ed6c2cddae196aabc7e5c

        • C:\Windows\System32\Locator.exe

          Filesize

          1.2MB

          MD5

          43ab8d981afc222262798382019d1c23

          SHA1

          d89f836ce53e07422aafa2246acd78755ac0d929

          SHA256

          f4f811f1dccdf67b7b749419bcd94e8934cea90eb130b8e8fadbb1288fcdc69a

          SHA512

          6e063aa9fdb65ee54b2945ae263f876f9bdd3c271434ed64bada81cbc920ce0582e777ccd28ce7277fb1a23fd050fa352c5cbeac76d98d07cff4ba946b14fdb0

        • C:\Windows\System32\OpenSSH\ssh-agent.exe

          Filesize

          1.6MB

          MD5

          4586eae21f53f3aa96d604d9c7f03a82

          SHA1

          8e252892cdad6c9535792bdd6eb7e57a4547de2c

          SHA256

          f008deed48021baa99d7c447d2f15e63b32fd5bace5087b6f0ed1c936399262b

          SHA512

          36df392bc55bc199add099f8ebe689efbfa155eea90797020e56bacdd59bd4d003ef28c6d2c7ad8ae04c3133ed9b6131da840efe9871418220c129bdfefb0591

        • C:\Windows\System32\OpenSSH\ssh-agent.exe

          Filesize

          1.6MB

          MD5

          4586eae21f53f3aa96d604d9c7f03a82

          SHA1

          8e252892cdad6c9535792bdd6eb7e57a4547de2c

          SHA256

          f008deed48021baa99d7c447d2f15e63b32fd5bace5087b6f0ed1c936399262b

          SHA512

          36df392bc55bc199add099f8ebe689efbfa155eea90797020e56bacdd59bd4d003ef28c6d2c7ad8ae04c3133ed9b6131da840efe9871418220c129bdfefb0591

        • C:\Windows\System32\PerceptionSimulation\PerceptionSimulationService.exe

          Filesize

          1.3MB

          MD5

          6be10f8c7f920a015ca59d4a75470d3d

          SHA1

          b4720333a2712ef9f8f17b80fc424b4c13b8a8dc

          SHA256

          8396005e8fb5a0e4bce82740f6564e0e82bbe051e440d190db1098e307b250e5

          SHA512

          d7b071fc0347697b9cabb767cd713ba1547a28b4233ecd70f408810d212365aa24425dfac0ff36ad3809e23f7c29209504a44030afffcbd55b0d1236f11d25b8

        • C:\Windows\System32\SearchIndexer.exe

          Filesize

          1.4MB

          MD5

          b0ba393307d9486c8c3b22c281f3e711

          SHA1

          9acd6a1e19fd8dedf079ea646e8f17e9ecc82eae

          SHA256

          27c844882c654351cfb745b81973d3d02400816ab037d011689ce3f2e521d5ba

          SHA512

          28d4274bb24105c67583bb8d374c5237cde2c660c73c234b803b61fa5ab459cc7e14c52697b71be88db416728c33221b88e9372835919794bb1df3670f58cc15

        • C:\Windows\System32\SensorDataService.exe

          Filesize

          1.8MB

          MD5

          db9279a2177631fee42e85ca74698577

          SHA1

          64d7baf0290683cce934b1bd1701bcdc8d25a4fe

          SHA256

          daf038988ce750e24946b8b1038694922d173fcf0e971544c5f3bdaf399c9d32

          SHA512

          23a5f3bb0d7916804ed50bc6bdcf758caad579aefbc5af79f773660fcdab73e0d1d28aab907f5b4d300e9561c934356624d23f3e7378a1d564d22999ece13b1b

        • C:\Windows\System32\SensorDataService.exe

          Filesize

          1.8MB

          MD5

          db9279a2177631fee42e85ca74698577

          SHA1

          64d7baf0290683cce934b1bd1701bcdc8d25a4fe

          SHA256

          daf038988ce750e24946b8b1038694922d173fcf0e971544c5f3bdaf399c9d32

          SHA512

          23a5f3bb0d7916804ed50bc6bdcf758caad579aefbc5af79f773660fcdab73e0d1d28aab907f5b4d300e9561c934356624d23f3e7378a1d564d22999ece13b1b

        • C:\Windows\System32\Spectrum.exe

          Filesize

          1.4MB

          MD5

          357a331cbe5ba08590e1ffebe2962685

          SHA1

          16c6291b8ffe79ff795649933248958faf10f155

          SHA256

          bde6b9131dd51d4d998f4e531d417f9d19fd317c94064bab5bda0155a37df939

          SHA512

          33f08f4c48cb22e527ccc2f5cd82a6c26e7a68a7fcc9177892393f49ec42719ac0b53968490112d0f7fcc3b11193a72230ecabc68d024817d468706461dc0b1d

        • C:\Windows\System32\TieringEngineService.exe

          Filesize

          1.5MB

          MD5

          639961911efe7a0b7aabe39102a9ce83

          SHA1

          5d082b47d4d55a817ff78ea1179e4267ebc1ba6d

          SHA256

          af94a5338383c6504e3169aa9ef8c3b6177fd719792955ce5e42c61497d3e4b7

          SHA512

          ede6a242a45e22964a98e7ef278bcf35e3d14783a65bf0bedde7f3eefcc159e457a3cd6d4a4e2c3e9b761d32ff54bc247c18e8d256bbaab206f41bf7baa926ad

        • C:\Windows\System32\VSSVC.exe

          Filesize

          2.0MB

          MD5

          e2213b1427a634e0272d0a20aa46f590

          SHA1

          a42d658494e3a6edc67abd199b48ee6d8cef9c66

          SHA256

          159997bc9bf7895604d200205e4b13934b099414fcc0240e687aaa9359a59c5b

          SHA512

          3ecd10b6c265b842d6ba3593244a6308827b409601f6242082363a4b4c910c423237d47fe39bff8b6057b21be9f6ff7f0350049c51a823e595e7b0d6c72c3b42

        • C:\Windows\System32\alg.exe

          Filesize

          1.3MB

          MD5

          7e44ba1bc44f34195551d854f8838c21

          SHA1

          351027c9b2d2a306a219eb97c7364cf1482c3e2b

          SHA256

          c1c8b83d8b9aa0a91c20fe98757d260c42f21c174668bf6a766b2487acf53d8a

          SHA512

          aa43e22fbe6f08d9fc31f95121abc09961c7998c67d5a02961eb912ce459ad4e83d5c4479140561ea5119c00ce02aefef2e0e278b1732cfcb35ab4fe03bbc200

        • C:\Windows\System32\msdtc.exe

          Filesize

          1.4MB

          MD5

          de38e48cabf6ea04376a68dacf159ff6

          SHA1

          6c32e4013e9cd544e257139e7cd4677aae924b7c

          SHA256

          bfb9fcb13324cfd6161cd7c58644a559ef1ef6e1bd52f4aaf997829c9bf2946e

          SHA512

          5f17eaec0d430913b8664c24de2fd2161d6016d7fc96d20f09e8f5b2ae8b3ec6c4925779f1fcb90a0f5f4fe6ef298b7dbe339f11edfc7e768bcd15c75a42c82a

        • C:\Windows\System32\snmptrap.exe

          Filesize

          1.2MB

          MD5

          1c12b8738f201f899a87016ba2e5f1c4

          SHA1

          48873bb7b762a935332aaf690ec50f200c7d9f13

          SHA256

          5842862e8ada08a0d91546247ba15d4a199c13061533920c3d51f80a8ba00c2f

          SHA512

          b771386e8b84db3f05bdeda0fa184561b71193777ebc9fde46739107b073a93e3a732528b5df7116eac2096b51963397aa66e84e41aec179b0a78141e2817712

        • C:\Windows\System32\vds.exe

          Filesize

          1.3MB

          MD5

          b4bfde69eb9d30582ec20fa4b419f129

          SHA1

          10f1ee8c53c6bdde9a0f8189da0e49535ce317da

          SHA256

          3244b0c1de326cf97b33ca04003a2ad2ad5f2126a4b2bd0ec8de4a91c51cc553

          SHA512

          bcbe5fed68c1d2c389ee8affc6884b9712c8650935285d487bc3098398f32e1e00e02bda95bf1c90bf08b3a84509f6b05fbed28bceb3a21f64d65cc5b4897d42

        • C:\Windows\System32\wbem\WmiApSrv.exe

          Filesize

          1.4MB

          MD5

          f1a7abfb94bd00eea8b1d2f0420df986

          SHA1

          8349d6c33c795939308ca954898627f8982598b0

          SHA256

          151adf060036b76fffc7cfe99307d78d15a2edcf8c31af4c3f4751e62b4340ab

          SHA512

          0f568502f40c433ee46cf731f02a39496de11d0078a91f018c883b08fb8873f91fd7663472a16d0043d83178b0e8d8fa5d3777046338a9ed8bbd8651632515e2

        • C:\Windows\System32\wbengine.exe

          Filesize

          2.1MB

          MD5

          3b07f7b8c932e10b028ec375cfc8f544

          SHA1

          2a72525f86051e6e1757de2a38863eb67294425b

          SHA256

          1e0e0fd7aba0b86bfa756a536d34592ca54323aca338dae721c585650ad1c47c

          SHA512

          9676cd29e4c6b9725f532fa222368bf8f9ac781fd32dfbdce057ad0b654a78aca1a40cc2cdbd5b858d277b0233cb7ae9cf43e2b6d7a330078865376aa9ca23a4

        • C:\Windows\system32\AgentService.exe

          Filesize

          1.7MB

          MD5

          8f1232114139e8110da7a1e4123ce396

          SHA1

          8f94bfefcff99b2f67872ebdaa6796b08da3a782

          SHA256

          2947de8102558b4157300b382548f187d125060947285a29212da46b19c958ae

          SHA512

          bbea4518118eca417cc37d80c775b3c639f3315d5707d019cbd032a0b244fdfd86c338ef79838057497e3b005e8cadb90ca51833c0a692b0689ad06d8d0e45cb

        • C:\Windows\system32\AppVClient.exe

          Filesize

          1.3MB

          MD5

          af2f752ddf045cc2d44f45aa302c6662

          SHA1

          29b91780273316349604a9b8f4f63e051cd6d267

          SHA256

          93c78c92a2908583513f419819254e82e7868e21bae8bd679b76ac96e485c5c0

          SHA512

          b4d2b31fadc7695c9d895411490625803217f5cd1fa3335ac9f04f131a4052ea17d2552765454e8f7c047e7df4056481578972f5c0f2756781d314b5a0b17056

        • C:\Windows\system32\SgrmBroker.exe

          Filesize

          1.5MB

          MD5

          dc5cc565db6322223228f9742bf9d34e

          SHA1

          3d9fbe26ad42ff5e74e8ed653083334e3e947aec

          SHA256

          df9b4849113984901bdd97b991608d06debaab30494092afc0fa459030dac498

          SHA512

          704c8ac6d9ec214888be021d8813413cd6ab39288e48ea05bba86520a15a9d6024de30f9ce21ba753ca1b09456c62e3e5f286aed0861288f56759718cabdf481

        • C:\Windows\system32\fxssvc.exe

          Filesize

          1.2MB

          MD5

          8911c7e46fece1eb4cb2b18b4340b308

          SHA1

          2a00286276b4ebdf870b7571ffb51b4f39f2b8fb

          SHA256

          f0d11d1d8eb493a298f4cbda961e8d207dbf4373fcc1e1dba188519afd2bd0c3

          SHA512

          9a14604ad21c98d35e0fc976fbff34fe5f45c80f68cf2187c209d3944a3484f3bda3f3f2438504c5fb819ab206da6a6f968ebdbca24ed6c2cddae196aabc7e5c

        • C:\Windows\system32\msiexec.exe

          Filesize

          1.3MB

          MD5

          8add62b9fe23ea84849bb4fbc65da6a3

          SHA1

          c4345bb249f51ef95fd499e82622aaca5916877c

          SHA256

          6da69f3a1bd0cdb2fd751fe3394a1f099ee14687d52ae157fc4873cc47fd69db

          SHA512

          186b0a1b3a0b7f3411c626baba3b528fefd686661b229f3b4e62de410db9f6d91941b5369243c985ce71c6e559519ab0a4e626329f83f7f21733394df51f3059

        • C:\odt\office2016setup.exe

          Filesize

          5.6MB

          MD5

          6ecc82d529e252ddac865703fcdd6635

          SHA1

          8dcd22b043379f63e79707329974bba399506d96

          SHA256

          afecc13bb3a224af27ac0850e0987d2f4478a45fe7ca212e6cfda7b09032e11c

          SHA512

          1bac4aa050abd31911ad7a140e409b477970caa425f9e559448b6c9655164d95f9cf72cea67ce1ef74d97c3d458335975cbde254d15f614931e2356baccc4494

        • memory/972-424-0x0000000140000000-0x0000000140179000-memory.dmp

          Filesize

          1.5MB

        • memory/972-655-0x0000000140000000-0x0000000140179000-memory.dmp

          Filesize

          1.5MB

        • memory/1028-229-0x0000000140000000-0x000000014022B000-memory.dmp

          Filesize

          2.2MB

        • memory/1028-545-0x0000000140000000-0x000000014022B000-memory.dmp

          Filesize

          2.2MB

        • memory/1028-205-0x0000000000190000-0x00000000001F0000-memory.dmp

          Filesize

          384KB

        • memory/1028-212-0x0000000000190000-0x00000000001F0000-memory.dmp

          Filesize

          384KB

        • memory/1084-286-0x0000000000400000-0x00000000005EE000-memory.dmp

          Filesize

          1.9MB

        • memory/1368-133-0x0000000000640000-0x00000000007BC000-memory.dmp

          Filesize

          1.5MB

        • memory/1368-136-0x0000000005150000-0x000000000515A000-memory.dmp

          Filesize

          40KB

        • memory/1368-138-0x0000000005320000-0x0000000005330000-memory.dmp

          Filesize

          64KB

        • memory/1368-139-0x00000000071E0000-0x000000000727C000-memory.dmp

          Filesize

          624KB

        • memory/1368-137-0x0000000005320000-0x0000000005330000-memory.dmp

          Filesize

          64KB

        • memory/1368-135-0x0000000005160000-0x00000000051F2000-memory.dmp

          Filesize

          584KB

        • memory/1368-134-0x0000000005630000-0x0000000005BD4000-memory.dmp

          Filesize

          5.6MB

        • memory/1412-420-0x0000000140000000-0x000000014021D000-memory.dmp

          Filesize

          2.1MB

        • memory/1412-654-0x0000000140000000-0x000000014021D000-memory.dmp

          Filesize

          2.1MB

        • memory/1464-583-0x0000000140000000-0x00000001401D7000-memory.dmp

          Filesize

          1.8MB

        • memory/1464-311-0x0000000140000000-0x00000001401D7000-memory.dmp

          Filesize

          1.8MB

        • memory/1520-312-0x0000000140000000-0x00000001401ED000-memory.dmp

          Filesize

          1.9MB

        • memory/1644-642-0x0000000140000000-0x0000000140216000-memory.dmp

          Filesize

          2.1MB

        • memory/1644-388-0x0000000140000000-0x0000000140216000-memory.dmp

          Filesize

          2.1MB

        • memory/2424-284-0x0000000140000000-0x0000000140202000-memory.dmp

          Filesize

          2.0MB

        • memory/2764-197-0x0000000140000000-0x0000000140237000-memory.dmp

          Filesize

          2.2MB

        • memory/2764-506-0x0000000140000000-0x0000000140237000-memory.dmp

          Filesize

          2.2MB

        • memory/2764-191-0x00000000004D0000-0x0000000000530000-memory.dmp

          Filesize

          384KB

        • memory/2764-201-0x00000000004D0000-0x0000000000530000-memory.dmp

          Filesize

          384KB

        • memory/2804-216-0x0000000002280000-0x00000000022E0000-memory.dmp

          Filesize

          384KB

        • memory/2804-222-0x0000000002280000-0x00000000022E0000-memory.dmp

          Filesize

          384KB

        • memory/2804-230-0x0000000140000000-0x0000000140221000-memory.dmp

          Filesize

          2.1MB

        • memory/2804-225-0x0000000002280000-0x00000000022E0000-memory.dmp

          Filesize

          384KB

        • memory/3332-335-0x0000000140000000-0x0000000140259000-memory.dmp

          Filesize

          2.3MB

        • memory/3340-288-0x0000000140000000-0x00000001401EC000-memory.dmp

          Filesize

          1.9MB

        • memory/3340-587-0x0000000140000000-0x00000001401EC000-memory.dmp

          Filesize

          1.9MB

        • memory/3680-358-0x0000000140000000-0x00000001401C0000-memory.dmp

          Filesize

          1.8MB

        • memory/3708-384-0x0000000140000000-0x0000000140147000-memory.dmp

          Filesize

          1.3MB

        • memory/3752-259-0x0000000140000000-0x0000000140226000-memory.dmp

          Filesize

          2.1MB

        • memory/3984-178-0x0000000140000000-0x0000000140201000-memory.dmp

          Filesize

          2.0MB

        • memory/3984-163-0x0000000000710000-0x0000000000770000-memory.dmp

          Filesize

          384KB

        • memory/3984-157-0x0000000000710000-0x0000000000770000-memory.dmp

          Filesize

          384KB

        • memory/4076-640-0x0000000140000000-0x00000001401FC000-memory.dmp

          Filesize

          2.0MB

        • memory/4076-386-0x0000000140000000-0x00000001401FC000-memory.dmp

          Filesize

          2.0MB

        • memory/4128-233-0x0000000000D20000-0x0000000000D80000-memory.dmp

          Filesize

          384KB

        • memory/4128-257-0x0000000140000000-0x0000000140210000-memory.dmp

          Filesize

          2.1MB

        • memory/4144-181-0x0000000000E70000-0x0000000000ED0000-memory.dmp

          Filesize

          384KB

        • memory/4144-187-0x0000000000E70000-0x0000000000ED0000-memory.dmp

          Filesize

          384KB

        • memory/4144-196-0x0000000140000000-0x0000000140135000-memory.dmp

          Filesize

          1.2MB

        • memory/4144-193-0x0000000000E70000-0x0000000000ED0000-memory.dmp

          Filesize

          384KB

        • memory/4244-633-0x0000000140000000-0x0000000140169000-memory.dmp

          Filesize

          1.4MB

        • memory/4244-334-0x0000000140000000-0x0000000140169000-memory.dmp

          Filesize

          1.4MB

        • memory/4716-360-0x0000000140000000-0x0000000140239000-memory.dmp

          Filesize

          2.2MB

        • memory/4756-731-0x0000016250BE0000-0x0000016250BE1000-memory.dmp

          Filesize

          4KB

        • memory/4756-671-0x0000016250BE0000-0x0000016250BE1000-memory.dmp

          Filesize

          4KB

        • memory/4756-803-0x00000162519C0000-0x00000162519D0000-memory.dmp

          Filesize

          64KB

        • memory/4756-748-0x00000162519C0000-0x00000162519D0000-memory.dmp

          Filesize

          64KB

        • memory/4756-749-0x00000162519B0000-0x00000162519D0000-memory.dmp

          Filesize

          128KB

        • memory/4756-750-0x00000162519B0000-0x00000162519D0000-memory.dmp

          Filesize

          128KB

        • memory/4756-804-0x00000162519B0000-0x00000162519D0000-memory.dmp

          Filesize

          128KB

        • memory/4756-636-0x0000016250BE0000-0x0000016250BE1000-memory.dmp

          Filesize

          4KB

        • memory/4756-635-0x0000016250BD0000-0x0000016250BE0000-memory.dmp

          Filesize

          64KB

        • memory/4756-805-0x00000162519B0000-0x00000162519D0000-memory.dmp

          Filesize

          128KB

        • memory/4756-799-0x00000162519C0000-0x00000162519C1000-memory.dmp

          Filesize

          4KB

        • memory/4788-179-0x0000000140000000-0x0000000140200000-memory.dmp

          Filesize

          2.0MB

        • memory/4788-175-0x0000000000690000-0x00000000006F0000-memory.dmp

          Filesize

          384KB

        • memory/4788-169-0x0000000000690000-0x00000000006F0000-memory.dmp

          Filesize

          384KB

        • memory/4876-210-0x0000000000980000-0x00000000009E6000-memory.dmp

          Filesize

          408KB

        • memory/4876-231-0x0000000004E40000-0x0000000004E50000-memory.dmp

          Filesize

          64KB

        • memory/4920-418-0x0000000000400000-0x0000000000654000-memory.dmp

          Filesize

          2.3MB

        • memory/4920-150-0x0000000000400000-0x0000000000654000-memory.dmp

          Filesize

          2.3MB

        • memory/4920-149-0x0000000003880000-0x00000000038E6000-memory.dmp

          Filesize

          408KB

        • memory/4920-144-0x0000000003880000-0x00000000038E6000-memory.dmp

          Filesize

          408KB

        • memory/4920-143-0x0000000000400000-0x0000000000654000-memory.dmp

          Filesize

          2.3MB

        • memory/4920-140-0x0000000000400000-0x0000000000654000-memory.dmp

          Filesize

          2.3MB