Analysis

  • max time kernel
    150s
  • max time network
    130s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    17-05-2023 09:07

General

  • Target

    Order-688930021178.exe

  • Size

    1.4MB

  • MD5

    539273fcc95bb7f4c80a9f2f606d74ec

  • SHA1

    48e3f1b32bd1ea099bdfea58e00c25202a99633c

  • SHA256

    12e44eb4bc1b8ddd19bb13f6794cfed8721e58ac3065d04c2ccb6a8a3ed30f49

  • SHA512

    0994942133fc9dbbe7cbe2f21fe5dfc427508e3985ca8537b2b25104073e38040d7e632e4df0a7d285ef61893a3846123fa60179104d64dbd4cf22968ca99a6f

  • SSDEEP

    24576:UhtPtftOfNmMvnYJJeT9zZm2ifn9fvt6quQyFyyHC2bP6nD:EtPVtymM/eeTFZm28xtxZabP6nD

Malware Config

Extracted

Family

blustealer

C2

https://api.telegram.org/bot5797428905:AAGaRRXGZN1d9GGFd3sE5x4uSpCGF0PU4m4/sendMessage?chat_id=1251788325

Signatures

  • BluStealer

    A Modular information stealer written in Visual Basic.

  • Executes dropped EXE 34 IoCs
  • Loads dropped DLL 16 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Drops file in System32 directory 17 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 28 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies data under HKEY_USERS 33 IoCs
  • Suspicious behavior: EnumeratesProcesses 26 IoCs
  • Suspicious use of AdjustPrivilegeToken 30 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 46 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Order-688930021178.exe
    "C:\Users\Admin\AppData\Local\Temp\Order-688930021178.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1888
    • C:\Users\Admin\AppData\Local\Temp\Order-688930021178.exe
      "C:\Users\Admin\AppData\Local\Temp\Order-688930021178.exe"
      2⤵
      • Drops file in System32 directory
      • Suspicious use of SetThreadContext
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1192
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
        3⤵
        • Accesses Microsoft Outlook profiles
        • outlook_office_path
        • outlook_win_path
        PID:1956
  • C:\Windows\System32\alg.exe
    C:\Windows\System32\alg.exe
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    PID:1680
  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe
    C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe
    1⤵
    • Executes dropped EXE
    PID:808
  • C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe
    C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe
    1⤵
    • Executes dropped EXE
    • Drops file in Windows directory
    PID:1932
  • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe
    C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe
    1⤵
    • Executes dropped EXE
    • Drops file in Windows directory
    PID:1772
  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
    C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
    1⤵
    • Executes dropped EXE
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1872
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1e4 -InterruptEvent 1d0 -NGENProcess 1d4 -Pipe 1e0 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2200
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 254 -InterruptEvent 1d0 -NGENProcess 1d4 -Pipe 1e4 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2500
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1d0 -InterruptEvent 258 -NGENProcess 248 -Pipe 244 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2620
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 238 -InterruptEvent 260 -NGENProcess 258 -Pipe 24c -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2828
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 260 -InterruptEvent 240 -NGENProcess 254 -Pipe 1ec -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2952
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 23c -InterruptEvent 268 -NGENProcess 240 -Pipe 250 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:3060
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 268 -InterruptEvent 26c -NGENProcess 238 -Pipe 1d4 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2980
  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
    C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
    1⤵
    • Executes dropped EXE
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:1556
  • C:\Windows\system32\dllhost.exe
    C:\Windows\system32\dllhost.exe /Processid:{02D4B3F1-FD88-11D1-960D-00805FC79235}
    1⤵
    • Executes dropped EXE
    • Drops file in Windows directory
    PID:1008
  • C:\Windows\ehome\ehRecvr.exe
    C:\Windows\ehome\ehRecvr.exe
    1⤵
    • Executes dropped EXE
    • Modifies data under HKEY_USERS
    PID:1208
  • C:\Windows\ehome\ehsched.exe
    C:\Windows\ehome\ehsched.exe
    1⤵
    • Executes dropped EXE
    PID:1840
  • C:\Windows\eHome\EhTray.exe
    "C:\Windows\eHome\EhTray.exe" /nav:-2
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:1596
  • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
    "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
    1⤵
    • Executes dropped EXE
    PID:280
  • C:\Windows\ehome\ehRec.exe
    C:\Windows\ehome\ehRec.exe -Embedding
    1⤵
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1580
  • C:\Windows\system32\IEEtwCollector.exe
    C:\Windows\system32\IEEtwCollector.exe /V
    1⤵
    • Executes dropped EXE
    PID:1616
  • C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE" /auditservice
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Modifies data under HKEY_USERS
    PID:1540
  • C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe
    "C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"
    1⤵
    • Executes dropped EXE
    PID:1464
  • C:\Windows\System32\msdtc.exe
    C:\Windows\System32\msdtc.exe
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Drops file in Windows directory
    PID:2116
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Suspicious use of AdjustPrivilegeToken
    PID:2292
  • C:\Program Files (x86)\Common Files\Microsoft Shared\Source Engine\OSE.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\Source Engine\OSE.EXE"
    1⤵
    • Executes dropped EXE
    PID:2468
  • C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE
    "C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"
    1⤵
    • Executes dropped EXE
    PID:2712
  • C:\Windows\SysWow64\perfhost.exe
    C:\Windows\SysWow64\perfhost.exe
    1⤵
    • Executes dropped EXE
    PID:2856
  • C:\Windows\system32\locator.exe
    C:\Windows\system32\locator.exe
    1⤵
    • Executes dropped EXE
    PID:2992
  • C:\Windows\System32\snmptrap.exe
    C:\Windows\System32\snmptrap.exe
    1⤵
    • Executes dropped EXE
    PID:2136
  • C:\Windows\System32\vds.exe
    C:\Windows\System32\vds.exe
    1⤵
    • Executes dropped EXE
    PID:2080
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    PID:2452
  • C:\Windows\system32\wbengine.exe
    "C:\Windows\system32\wbengine.exe"
    1⤵
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    PID:2284
  • C:\Windows\system32\wbem\WmiApSrv.exe
    C:\Windows\system32\wbem\WmiApSrv.exe
    1⤵
    • Executes dropped EXE
    PID:2740
  • C:\Program Files\Windows Media Player\wmpnetwk.exe
    "C:\Program Files\Windows Media Player\wmpnetwk.exe"
    1⤵
    • Executes dropped EXE
    • Modifies data under HKEY_USERS
    • Suspicious use of AdjustPrivilegeToken
    PID:2804
  • C:\Windows\system32\SearchIndexer.exe
    C:\Windows\system32\SearchIndexer.exe /Embedding
    1⤵
    • Executes dropped EXE
    PID:3012

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Common Files\microsoft shared\Source Engine\OSE.EXE

    Filesize

    1.4MB

    MD5

    2bb518ffc9ce8d753c08693caf6d9db1

    SHA1

    9ab19b232ff90f1d152b7c3e774b88ff7ac70036

    SHA256

    afb0bd6ebcd982faea7d6c75d91de297bbcf8f200eb654f2f10312861bf1ce25

    SHA512

    4494167670495ad432eaf5be73313a8dc390d18a8396e146425f71212ce03bb7ceb886801d2682b1106278db15bfb7ced114bcfc718ef4d12a45b5fd82557ffb

  • C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE

    Filesize

    30.1MB

    MD5

    5e8827f4f2b3cc46dbd4052be67a5213

    SHA1

    64726c9d746109d3ef452b544540a3ddf2b744c9

    SHA256

    a231933012a34d210548843304a586032944d1c68f40415e7af255c171afe12d

    SHA512

    5bd2a32d64498795469f6fdfab5efc134fe3a7e671d12c23e3adcdc2bc0fa3360fd20561a98db153e52961c4cc021c6f9ab155c4c9a949648ee62c7e5ca0c9f1

  • C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe

    Filesize

    1.4MB

    MD5

    e64a9fa8bee53a04cc17d88c59db72e8

    SHA1

    78bd5083b9ee4e1b76117d709058b7b81944b923

    SHA256

    1139b57f42514aabb71fa1d98087601ef6c58838ef80dfeb66da60058cb3ab29

    SHA512

    81c3e73ab508eebaf6b8dea0ba1049dedfd8734befe908dbf975b9db31b331eb2edfc3d2bab97067a4e16da3576bc7219eed14a524d1cbcb346193aa1aeb1e35

  • C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE

    Filesize

    5.2MB

    MD5

    efb1c185bdba5c0735cd119fd26c8bb7

    SHA1

    03f5bb631f22875579ab0946e26867ae93fe37bf

    SHA256

    525d49282be57a4b2d56817ca236601a8ccabf0dcd736a1f4eb8c802fd50dfae

    SHA512

    97a977d27c8307753fa741c2c49b205a45a740e6ede6e07af99d9a15bfd3fb335463f734ec7c9561a6cf1d51ca93947f388506bc1e7c2c68553f0344b780f5eb

  • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe

    Filesize

    2.1MB

    MD5

    e8f21ab5bc8949201334a7cacd613a05

    SHA1

    c7e672a772feedf63950b1555f50fb46b45c0a76

    SHA256

    593769af0c89362fecc9e5bf3ca1cb2df4735602590001f302cdc3748286c149

    SHA512

    8171020daafac0b5c43c35d4ccab0d4d228c548a891fab6f70ccb05ec4dccb3cb94fef86f0dcf096645a75322afaefca5fbae2cf4d0d2bcc02552dc462ab432d

  • C:\Program Files\Windows Media Player\wmpnetwk.exe

    Filesize

    2.0MB

    MD5

    94a119ad5def8e8c0fb28be2510f750c

    SHA1

    30059fbec0f86ba3609c7185d7c1c87ae0d416b7

    SHA256

    59560ebeb0363372e561974cc01d4192972f07387ffc67f1293712698def5700

    SHA512

    6d34650ec619ff6f9abbaba3376f7b39598b2af19850e2417013221db81425c235442e9a0038e6f55d6089e14747158ac5d72299cab20fc647e7e09bc81466be

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b91050d8b077a4e8.customDestinations-ms

    Filesize

    24B

    MD5

    b9bd716de6739e51c620f2086f9c31e4

    SHA1

    9733d94607a3cba277e567af584510edd9febf62

    SHA256

    7116ff028244a01f3d17f1d3bc2e1506bc9999c2e40e388458f0cccc4e117312

    SHA512

    cef609e54c7a81a646ad38dba7ac0b82401b220773b9c792cefac80c6564753229f0c011b34ffb56381dd3154a19aee2bf5f602c4d1af01f2cf0fbc1574e4478

  • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe

    Filesize

    1.3MB

    MD5

    c261203c2d4524954a5a9bce51e369dd

    SHA1

    a649ac30079675d32754a59685aa8a533f70738e

    SHA256

    831b234f81eeaadc3e0262259b8c1d93b184e56b982fffc067476e346e918ec4

    SHA512

    699829bf62a0eb0d80710f1a3d481ec92ecd404c458b403c5f0e65d93ce99d327b3b2a468fa220394a32330955a8fb99ced07d81a848788aa300b5f429ed24e1

  • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe

    Filesize

    1.3MB

    MD5

    c261203c2d4524954a5a9bce51e369dd

    SHA1

    a649ac30079675d32754a59685aa8a533f70738e

    SHA256

    831b234f81eeaadc3e0262259b8c1d93b184e56b982fffc067476e346e918ec4

    SHA512

    699829bf62a0eb0d80710f1a3d481ec92ecd404c458b403c5f0e65d93ce99d327b3b2a468fa220394a32330955a8fb99ced07d81a848788aa300b5f429ed24e1

  • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ngen_service.log

    Filesize

    872KB

    MD5

    7e62c15d6dea772c638cbf13d86278dd

    SHA1

    56869bd590be6a0b94f05fabb57c680300d4ea37

    SHA256

    337159b8781e397a8cf753cea919de5f1130b706cbdc32ffed671fe7449a1ff2

    SHA512

    7cead6a11b8574dae5b1947a5c8a56db9be92ba13af71c98dfb313a0d64a7641278ea6e4662c3cf5f302422ed5ad821fc410632ced19c91f73ce32a48edb732b

  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe

    Filesize

    1.3MB

    MD5

    0acd41ac0679f53ca15f4c0a66e57aac

    SHA1

    10401ea61bf7752d8438d6b708609da1bac77d0f

    SHA256

    a3ccee634eaf1eceaa8d3c50e59218dea0f1c9642017565c6d6c03dc36710e85

    SHA512

    5f724c45e2fc243b1b73544c04bf430be8b06cab52e69d68ffb1a0812a8638ce0fac25407ca8e6a460df9fcf276d40832dfcf99bb5eb1f0ec9b4e1eda85413ca

  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe

    Filesize

    1.3MB

    MD5

    762e7315b37086c998d2760ba7796c72

    SHA1

    891dd40347392f2ec48a9b4529dac6ce1f4a3937

    SHA256

    309076474c1055cca75c0bb4352b253457dfdec9fd751eec833b8da74b46bdee

    SHA512

    eccedfc28f00dcb2586da0c0fbb91d0ca17ae2b92fdd25714bd28def77bec6a91aa1197998442bdf979caef81887b6fe48eeaa7d359d28ac23c275312dae5993

  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe

    Filesize

    1.3MB

    MD5

    762e7315b37086c998d2760ba7796c72

    SHA1

    891dd40347392f2ec48a9b4529dac6ce1f4a3937

    SHA256

    309076474c1055cca75c0bb4352b253457dfdec9fd751eec833b8da74b46bdee

    SHA512

    eccedfc28f00dcb2586da0c0fbb91d0ca17ae2b92fdd25714bd28def77bec6a91aa1197998442bdf979caef81887b6fe48eeaa7d359d28ac23c275312dae5993

  • C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe

    Filesize

    1.3MB

    MD5

    fae11c921baa78e38ed02f9527484179

    SHA1

    c027bdc190f3d10dfb65d2606a97c731583d70a4

    SHA256

    a47ebda155e2f16eee7fa5c00f03addc46f256f7f11d5394e45f6e0eaf771784

    SHA512

    9fd60853ecb182c1230172bc818b0cd93ac6e885cdea615eb0b8b48585a9509e90f8521dd96a207eb8ac7140f90418b2de3a71d1b8f9927b9e770aea1d1ac034

  • C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe

    Filesize

    1.3MB

    MD5

    fae11c921baa78e38ed02f9527484179

    SHA1

    c027bdc190f3d10dfb65d2606a97c731583d70a4

    SHA256

    a47ebda155e2f16eee7fa5c00f03addc46f256f7f11d5394e45f6e0eaf771784

    SHA512

    9fd60853ecb182c1230172bc818b0cd93ac6e885cdea615eb0b8b48585a9509e90f8521dd96a207eb8ac7140f90418b2de3a71d1b8f9927b9e770aea1d1ac034

  • C:\Windows\Microsoft.NET\Framework\v2.0.50727\ngen_service.log

    Filesize

    1003KB

    MD5

    e7ee2b8943136b808e01f15e2962577c

    SHA1

    542877cdeb0427da85f766ae965f50ed3ba40bde

    SHA256

    b6c9bb851514024f9e02acd84c058b0254fc26f224ea3277b49691d836eee1cb

    SHA512

    c52c23bd2e75d435cc7b0af3f2f2f5b0725ab0959da3b7300e536643eede3de78b33f45fe872514052f0003b163fee156396bdbdee902d3881ec8c448041ad53

  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe

    Filesize

    1.3MB

    MD5

    53a6479afb2ef6acfc3257f028abe02f

    SHA1

    505e518aee21621e993ef293ab19b956e5c354ba

    SHA256

    9cf8f91c0409522f8bcfbb4ac1ab0300bf5a940247c8747b51ed8f2783839b0d

    SHA512

    86be45af5a2d79478cd55d069e3df959eef4703545c88442b0b9ccca8c5044fe09d0a8e379c2cd822fef35c57e44ca5955ee0663373b183dd3e6b5cfbf07d14e

  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe

    Filesize

    1.3MB

    MD5

    53a6479afb2ef6acfc3257f028abe02f

    SHA1

    505e518aee21621e993ef293ab19b956e5c354ba

    SHA256

    9cf8f91c0409522f8bcfbb4ac1ab0300bf5a940247c8747b51ed8f2783839b0d

    SHA512

    86be45af5a2d79478cd55d069e3df959eef4703545c88442b0b9ccca8c5044fe09d0a8e379c2cd822fef35c57e44ca5955ee0663373b183dd3e6b5cfbf07d14e

  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe

    Filesize

    1.3MB

    MD5

    53a6479afb2ef6acfc3257f028abe02f

    SHA1

    505e518aee21621e993ef293ab19b956e5c354ba

    SHA256

    9cf8f91c0409522f8bcfbb4ac1ab0300bf5a940247c8747b51ed8f2783839b0d

    SHA512

    86be45af5a2d79478cd55d069e3df959eef4703545c88442b0b9ccca8c5044fe09d0a8e379c2cd822fef35c57e44ca5955ee0663373b183dd3e6b5cfbf07d14e

  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe

    Filesize

    1.3MB

    MD5

    53a6479afb2ef6acfc3257f028abe02f

    SHA1

    505e518aee21621e993ef293ab19b956e5c354ba

    SHA256

    9cf8f91c0409522f8bcfbb4ac1ab0300bf5a940247c8747b51ed8f2783839b0d

    SHA512

    86be45af5a2d79478cd55d069e3df959eef4703545c88442b0b9ccca8c5044fe09d0a8e379c2cd822fef35c57e44ca5955ee0663373b183dd3e6b5cfbf07d14e

  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe

    Filesize

    1.3MB

    MD5

    53a6479afb2ef6acfc3257f028abe02f

    SHA1

    505e518aee21621e993ef293ab19b956e5c354ba

    SHA256

    9cf8f91c0409522f8bcfbb4ac1ab0300bf5a940247c8747b51ed8f2783839b0d

    SHA512

    86be45af5a2d79478cd55d069e3df959eef4703545c88442b0b9ccca8c5044fe09d0a8e379c2cd822fef35c57e44ca5955ee0663373b183dd3e6b5cfbf07d14e

  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe

    Filesize

    1.3MB

    MD5

    53a6479afb2ef6acfc3257f028abe02f

    SHA1

    505e518aee21621e993ef293ab19b956e5c354ba

    SHA256

    9cf8f91c0409522f8bcfbb4ac1ab0300bf5a940247c8747b51ed8f2783839b0d

    SHA512

    86be45af5a2d79478cd55d069e3df959eef4703545c88442b0b9ccca8c5044fe09d0a8e379c2cd822fef35c57e44ca5955ee0663373b183dd3e6b5cfbf07d14e

  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe

    Filesize

    1.3MB

    MD5

    53a6479afb2ef6acfc3257f028abe02f

    SHA1

    505e518aee21621e993ef293ab19b956e5c354ba

    SHA256

    9cf8f91c0409522f8bcfbb4ac1ab0300bf5a940247c8747b51ed8f2783839b0d

    SHA512

    86be45af5a2d79478cd55d069e3df959eef4703545c88442b0b9ccca8c5044fe09d0a8e379c2cd822fef35c57e44ca5955ee0663373b183dd3e6b5cfbf07d14e

  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe

    Filesize

    1.3MB

    MD5

    53a6479afb2ef6acfc3257f028abe02f

    SHA1

    505e518aee21621e993ef293ab19b956e5c354ba

    SHA256

    9cf8f91c0409522f8bcfbb4ac1ab0300bf5a940247c8747b51ed8f2783839b0d

    SHA512

    86be45af5a2d79478cd55d069e3df959eef4703545c88442b0b9ccca8c5044fe09d0a8e379c2cd822fef35c57e44ca5955ee0663373b183dd3e6b5cfbf07d14e

  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe

    Filesize

    1.3MB

    MD5

    53a6479afb2ef6acfc3257f028abe02f

    SHA1

    505e518aee21621e993ef293ab19b956e5c354ba

    SHA256

    9cf8f91c0409522f8bcfbb4ac1ab0300bf5a940247c8747b51ed8f2783839b0d

    SHA512

    86be45af5a2d79478cd55d069e3df959eef4703545c88442b0b9ccca8c5044fe09d0a8e379c2cd822fef35c57e44ca5955ee0663373b183dd3e6b5cfbf07d14e

  • C:\Windows\SysWOW64\perfhost.exe

    Filesize

    1.2MB

    MD5

    60f6d0328b10752e2a4f49b2c17bf75d

    SHA1

    304d24c2d524b2f0db76f4e04199b5c010e1413b

    SHA256

    caf8c3eef3773c2e2aa8c2b747bc8f4ea5182929ba49a4834560a121349aaac5

    SHA512

    7fe458e628cfd400d90cbc0cfba2533a2fc040fcbd7d31450a0fa6776173d5d03d9274fd2dd24bc34a85d8a50a63f380589b3c479446d0578bd196ec08c95949

  • C:\Windows\System32\Locator.exe

    Filesize

    1.2MB

    MD5

    89d0fd08c26471dacee3ac360ad96d02

    SHA1

    f159ca60d198f6a7281173a3ab252c8e8ab94b95

    SHA256

    dd12dea4ed7d48862620ec2e64381f3cefa22009f8f869ea7a771e0d03370ce7

    SHA512

    b6d51c0ef714373fe72c9e316c72611153140654c17204a17ed4c7cabe74744b6c684b0f16ea54bcfe5fcddbda2bf5be0bb5569ffb55e4619a3181776efae41f

  • C:\Windows\System32\SearchIndexer.exe

    Filesize

    1.1MB

    MD5

    4d07a4671540f28bb240791db3c80f90

    SHA1

    659e73638282dec474c27a1bcc54501448671a92

    SHA256

    5012ade1fa3c218fc86464444b416b93cf8150e23d37373e0b59d0d91b954cea

    SHA512

    931b30882e450941c0f2865222f91cddac60da8c95c772f6064da5eace4f184df9d81f4a17d9e471ba479bcf181b94d7ff35b1fbb431ad8cedfdff3b55e53c37

  • C:\Windows\System32\VSSVC.exe

    Filesize

    2.1MB

    MD5

    49145e4d9afd35a645c6153b758c436f

    SHA1

    104d115c1cdfcaec5223e1a97fe3c4bc1b3df7ed

    SHA256

    6a34511d8f0be53dcac67bfbc0b5d8f7fc046cf4930319e984bf1d30820612f0

    SHA512

    e9b3657e773a0e096f241fee8207eed968b731186028e60b37097d4e30eb0603891968e494046ad3405811b12719d950c7ff736d4f4b0d6b129e4fe62ec357c8

  • C:\Windows\System32\alg.exe

    Filesize

    1.3MB

    MD5

    7157c3d775c3d55590b9557989c95913

    SHA1

    ae02942816b6529a6cb03e38243bd3f5af021ebc

    SHA256

    44794deb2a6e5c957409cd18aadb306f793ac2dbe4fb50686a45a27db0d51682

    SHA512

    64c885cdb0a08a6f77f134ebdaa845841bf0ec278ec1f2e774f2d202b2e23d425991157cd0c371d3c2a7915c2769b83d237c3f3ff9b072646ab646991b8dc3d7

  • C:\Windows\System32\dllhost.exe

    Filesize

    1.2MB

    MD5

    da2f8de08dae0cc3c6beb85690d99ff5

    SHA1

    dcfff26b329fc8e664fb82b8b0348a63af850c8b

    SHA256

    173ded0e1c7a56d9017dd0908708b018af66f2d969a656163b388983f5552b52

    SHA512

    e41e1abfc54126714c871199f26b0a08cef42424b05759a0fc8525f4f3b5093aeee284956ff1d57942807bfbf1f0bdccd2f8222d466be29b96d0bdc87a554ab4

  • C:\Windows\System32\ieetwcollector.exe

    Filesize

    1.3MB

    MD5

    04fc0c1674c2c7d2b8cf4e85a3b03d99

    SHA1

    cbd116af6023091397e6f62e19a361261846c3d9

    SHA256

    375e78d36dbfa3be3dcb1b4e21f9b552234168c268930ea76368994684d63a20

    SHA512

    ba935aa6e5e781f81ac8276ced445c03096012b378868af575a4f90512292ed0e5fdb76e1b8b3818650bb779b3571981d4b024e37ee7226b5f0d71a08ccec798

  • C:\Windows\System32\msdtc.exe

    Filesize

    1.4MB

    MD5

    8efeffccaaf55d7c3a69dde6727518f9

    SHA1

    1f40012d9403b54cf786c1de23008e5907a93094

    SHA256

    2616d9b9ae98274ef57e7925b5dabbbf7345697d8725ee5ea5f562d930817127

    SHA512

    7865f740dc02f7ed4626725fcdfad1a836015a4db598143265f0a39929e6ed0d5c8a10239460922fae1bfbd87a462c129dce207a80ff4fe377b5f54b5e31ced0

  • C:\Windows\System32\msiexec.exe

    Filesize

    1.3MB

    MD5

    d199cd1aed824cb7bd809e95b8538adf

    SHA1

    7c2ca0ad6d3b0d73a2b92416d5f3ec8d6b8fe4a7

    SHA256

    9d0e3c16d51bcf4718b53d8c650423ad947e278f0f9dfff7782370f43f025b4b

    SHA512

    f456dc7e41e0ad599c5dec125e1060014f623b60451660016813cc2156be98f6993768fe96448d9febbb62f25c3c70b7fa26d4cc4e0de521b4bc29a8c0832315

  • C:\Windows\System32\snmptrap.exe

    Filesize

    1.2MB

    MD5

    9f808a06b1d1b000beff2726070e7586

    SHA1

    999c757c353ee2629a34664485d5c4356b1bffa2

    SHA256

    b4a9df2de9fe657dc8f02a261c8af882e08892e4e3b813f8a7f02ab984af3d13

    SHA512

    7df5148693d622f4e989c9fdaf221e4f42cbbfc2b5a1ff8994d0992cfb0ef3b3f8e74b971fcb6a7b436240fc6c1bede989ba3892eb22f962f87d96337771b71d

  • C:\Windows\System32\vds.exe

    Filesize

    1.7MB

    MD5

    54eedd0d0cd13096382faea1f57ea699

    SHA1

    09c6805597381290ef6d26fbf3fac2bfff4d5672

    SHA256

    ba1c0dfcc27bc259a3acbd0155f3534eedf301cdbaec58065cf85688eaef5060

    SHA512

    470d77896a1229a974533ecaf8617a41e3299ab1f9078232ff5606e454c4b01a433970bb11c8b364fe17978a657ab6a11b645863c0a1e2dc8550a559e4c258b5

  • C:\Windows\System32\wbem\WmiApSrv.exe

    Filesize

    1.4MB

    MD5

    e0ffae073fade64c8f970c9003f35200

    SHA1

    15e65c2aa928ff0928e3bfa1deae387416789c4b

    SHA256

    0f7ed196d2454daad78ac5d147a42de2e2dc77a2cdb53a291859b58b67ceeda8

    SHA512

    d696058a77b80e7e519d8884b2407ae502b0eb341109dc40c5c129a6dc6d2c5315151d7a0e020f7017b08abae18960aa16e1232bbe88fe9f41a0f58f4ad7a27a

  • C:\Windows\System32\wbengine.exe

    Filesize

    2.0MB

    MD5

    664894b39f43be2a2c73eb60aacadccf

    SHA1

    f434d68f354e8448ded53712294d2b660f7627e4

    SHA256

    73141f7519ae40865803137de57f8a21923e423bbe19e49c4f5abcaaf6a2acb4

    SHA512

    30544ede3a950288053d7e166ccfe55896bbe59f60041d39a4919945af2b2f5107fa2ea44bfafc4f97150d4d58bd88dbed55519d6b3ac866adb7d9c477913361

  • C:\Windows\ehome\ehrecvr.exe

    Filesize

    1.2MB

    MD5

    49531abea99db41bd5fd89e2f7b6f47c

    SHA1

    f00696afe2bd824b47a4b258ed1bcb140877b54d

    SHA256

    57a73b1df6b4e2f75fb129a14d4c1138c6f094fa9e554806183c05d098416cc9

    SHA512

    a4901967782113d8522758377a55dd98c9dc6d4ca88c04737e40da707f72e2c656f17ea67aa44d348e0090f4b3eafcb38441589f907b77c1f608f887f10ede30

  • C:\Windows\ehome\ehsched.exe

    Filesize

    1.3MB

    MD5

    43ed46736a2455fce17d39429f1ed854

    SHA1

    5cb65d502b0c07fa118056783df58a93141653f9

    SHA256

    c6ccfb0c70236ccc6f6ce905d20124d6fdd25935adef310abf978752b464c305

    SHA512

    ca10de01ed4180a949499e15767236325be6a0a48056ecbda4973434ba36c6ccac2d3e118e5f2d918d66c43b986e76f3a458aa9a0febad5a47debfb55555bb01

  • C:\Windows\system32\msiexec.exe

    Filesize

    1.3MB

    MD5

    d199cd1aed824cb7bd809e95b8538adf

    SHA1

    7c2ca0ad6d3b0d73a2b92416d5f3ec8d6b8fe4a7

    SHA256

    9d0e3c16d51bcf4718b53d8c650423ad947e278f0f9dfff7782370f43f025b4b

    SHA512

    f456dc7e41e0ad599c5dec125e1060014f623b60451660016813cc2156be98f6993768fe96448d9febbb62f25c3c70b7fa26d4cc4e0de521b4bc29a8c0832315

  • \Program Files\Windows Media Player\wmpnetwk.exe

    Filesize

    2.0MB

    MD5

    94a119ad5def8e8c0fb28be2510f750c

    SHA1

    30059fbec0f86ba3609c7185d7c1c87ae0d416b7

    SHA256

    59560ebeb0363372e561974cc01d4192972f07387ffc67f1293712698def5700

    SHA512

    6d34650ec619ff6f9abbaba3376f7b39598b2af19850e2417013221db81425c235442e9a0038e6f55d6089e14747158ac5d72299cab20fc647e7e09bc81466be

  • \Program Files\Windows Media Player\wmpnetwk.exe

    Filesize

    2.0MB

    MD5

    94a119ad5def8e8c0fb28be2510f750c

    SHA1

    30059fbec0f86ba3609c7185d7c1c87ae0d416b7

    SHA256

    59560ebeb0363372e561974cc01d4192972f07387ffc67f1293712698def5700

    SHA512

    6d34650ec619ff6f9abbaba3376f7b39598b2af19850e2417013221db81425c235442e9a0038e6f55d6089e14747158ac5d72299cab20fc647e7e09bc81466be

  • \Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe

    Filesize

    1.3MB

    MD5

    c261203c2d4524954a5a9bce51e369dd

    SHA1

    a649ac30079675d32754a59685aa8a533f70738e

    SHA256

    831b234f81eeaadc3e0262259b8c1d93b184e56b982fffc067476e346e918ec4

    SHA512

    699829bf62a0eb0d80710f1a3d481ec92ecd404c458b403c5f0e65d93ce99d327b3b2a468fa220394a32330955a8fb99ced07d81a848788aa300b5f429ed24e1

  • \Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe

    Filesize

    1.3MB

    MD5

    0acd41ac0679f53ca15f4c0a66e57aac

    SHA1

    10401ea61bf7752d8438d6b708609da1bac77d0f

    SHA256

    a3ccee634eaf1eceaa8d3c50e59218dea0f1c9642017565c6d6c03dc36710e85

    SHA512

    5f724c45e2fc243b1b73544c04bf430be8b06cab52e69d68ffb1a0812a8638ce0fac25407ca8e6a460df9fcf276d40832dfcf99bb5eb1f0ec9b4e1eda85413ca

  • \Windows\System32\Locator.exe

    Filesize

    1.2MB

    MD5

    89d0fd08c26471dacee3ac360ad96d02

    SHA1

    f159ca60d198f6a7281173a3ab252c8e8ab94b95

    SHA256

    dd12dea4ed7d48862620ec2e64381f3cefa22009f8f869ea7a771e0d03370ce7

    SHA512

    b6d51c0ef714373fe72c9e316c72611153140654c17204a17ed4c7cabe74744b6c684b0f16ea54bcfe5fcddbda2bf5be0bb5569ffb55e4619a3181776efae41f

  • \Windows\System32\alg.exe

    Filesize

    1.3MB

    MD5

    7157c3d775c3d55590b9557989c95913

    SHA1

    ae02942816b6529a6cb03e38243bd3f5af021ebc

    SHA256

    44794deb2a6e5c957409cd18aadb306f793ac2dbe4fb50686a45a27db0d51682

    SHA512

    64c885cdb0a08a6f77f134ebdaa845841bf0ec278ec1f2e774f2d202b2e23d425991157cd0c371d3c2a7915c2769b83d237c3f3ff9b072646ab646991b8dc3d7

  • \Windows\System32\dllhost.exe

    Filesize

    1.2MB

    MD5

    da2f8de08dae0cc3c6beb85690d99ff5

    SHA1

    dcfff26b329fc8e664fb82b8b0348a63af850c8b

    SHA256

    173ded0e1c7a56d9017dd0908708b018af66f2d969a656163b388983f5552b52

    SHA512

    e41e1abfc54126714c871199f26b0a08cef42424b05759a0fc8525f4f3b5093aeee284956ff1d57942807bfbf1f0bdccd2f8222d466be29b96d0bdc87a554ab4

  • \Windows\System32\ieetwcollector.exe

    Filesize

    1.3MB

    MD5

    04fc0c1674c2c7d2b8cf4e85a3b03d99

    SHA1

    cbd116af6023091397e6f62e19a361261846c3d9

    SHA256

    375e78d36dbfa3be3dcb1b4e21f9b552234168c268930ea76368994684d63a20

    SHA512

    ba935aa6e5e781f81ac8276ced445c03096012b378868af575a4f90512292ed0e5fdb76e1b8b3818650bb779b3571981d4b024e37ee7226b5f0d71a08ccec798

  • \Windows\System32\msdtc.exe

    Filesize

    1.4MB

    MD5

    8efeffccaaf55d7c3a69dde6727518f9

    SHA1

    1f40012d9403b54cf786c1de23008e5907a93094

    SHA256

    2616d9b9ae98274ef57e7925b5dabbbf7345697d8725ee5ea5f562d930817127

    SHA512

    7865f740dc02f7ed4626725fcdfad1a836015a4db598143265f0a39929e6ed0d5c8a10239460922fae1bfbd87a462c129dce207a80ff4fe377b5f54b5e31ced0

  • \Windows\System32\msiexec.exe

    Filesize

    1.3MB

    MD5

    d199cd1aed824cb7bd809e95b8538adf

    SHA1

    7c2ca0ad6d3b0d73a2b92416d5f3ec8d6b8fe4a7

    SHA256

    9d0e3c16d51bcf4718b53d8c650423ad947e278f0f9dfff7782370f43f025b4b

    SHA512

    f456dc7e41e0ad599c5dec125e1060014f623b60451660016813cc2156be98f6993768fe96448d9febbb62f25c3c70b7fa26d4cc4e0de521b4bc29a8c0832315

  • \Windows\System32\msiexec.exe

    Filesize

    1.3MB

    MD5

    d199cd1aed824cb7bd809e95b8538adf

    SHA1

    7c2ca0ad6d3b0d73a2b92416d5f3ec8d6b8fe4a7

    SHA256

    9d0e3c16d51bcf4718b53d8c650423ad947e278f0f9dfff7782370f43f025b4b

    SHA512

    f456dc7e41e0ad599c5dec125e1060014f623b60451660016813cc2156be98f6993768fe96448d9febbb62f25c3c70b7fa26d4cc4e0de521b4bc29a8c0832315

  • \Windows\System32\snmptrap.exe

    Filesize

    1.2MB

    MD5

    9f808a06b1d1b000beff2726070e7586

    SHA1

    999c757c353ee2629a34664485d5c4356b1bffa2

    SHA256

    b4a9df2de9fe657dc8f02a261c8af882e08892e4e3b813f8a7f02ab984af3d13

    SHA512

    7df5148693d622f4e989c9fdaf221e4f42cbbfc2b5a1ff8994d0992cfb0ef3b3f8e74b971fcb6a7b436240fc6c1bede989ba3892eb22f962f87d96337771b71d

  • \Windows\System32\vds.exe

    Filesize

    1.7MB

    MD5

    54eedd0d0cd13096382faea1f57ea699

    SHA1

    09c6805597381290ef6d26fbf3fac2bfff4d5672

    SHA256

    ba1c0dfcc27bc259a3acbd0155f3534eedf301cdbaec58065cf85688eaef5060

    SHA512

    470d77896a1229a974533ecaf8617a41e3299ab1f9078232ff5606e454c4b01a433970bb11c8b364fe17978a657ab6a11b645863c0a1e2dc8550a559e4c258b5

  • \Windows\System32\wbem\WmiApSrv.exe

    Filesize

    1.4MB

    MD5

    e0ffae073fade64c8f970c9003f35200

    SHA1

    15e65c2aa928ff0928e3bfa1deae387416789c4b

    SHA256

    0f7ed196d2454daad78ac5d147a42de2e2dc77a2cdb53a291859b58b67ceeda8

    SHA512

    d696058a77b80e7e519d8884b2407ae502b0eb341109dc40c5c129a6dc6d2c5315151d7a0e020f7017b08abae18960aa16e1232bbe88fe9f41a0f58f4ad7a27a

  • \Windows\System32\wbengine.exe

    Filesize

    2.0MB

    MD5

    664894b39f43be2a2c73eb60aacadccf

    SHA1

    f434d68f354e8448ded53712294d2b660f7627e4

    SHA256

    73141f7519ae40865803137de57f8a21923e423bbe19e49c4f5abcaaf6a2acb4

    SHA512

    30544ede3a950288053d7e166ccfe55896bbe59f60041d39a4919945af2b2f5107fa2ea44bfafc4f97150d4d58bd88dbed55519d6b3ac866adb7d9c477913361

  • \Windows\ehome\ehrecvr.exe

    Filesize

    1.2MB

    MD5

    49531abea99db41bd5fd89e2f7b6f47c

    SHA1

    f00696afe2bd824b47a4b258ed1bcb140877b54d

    SHA256

    57a73b1df6b4e2f75fb129a14d4c1138c6f094fa9e554806183c05d098416cc9

    SHA512

    a4901967782113d8522758377a55dd98c9dc6d4ca88c04737e40da707f72e2c656f17ea67aa44d348e0090f4b3eafcb38441589f907b77c1f608f887f10ede30

  • \Windows\ehome\ehsched.exe

    Filesize

    1.3MB

    MD5

    43ed46736a2455fce17d39429f1ed854

    SHA1

    5cb65d502b0c07fa118056783df58a93141653f9

    SHA256

    c6ccfb0c70236ccc6f6ce905d20124d6fdd25935adef310abf978752b464c305

    SHA512

    ca10de01ed4180a949499e15767236325be6a0a48056ecbda4973434ba36c6ccac2d3e118e5f2d918d66c43b986e76f3a458aa9a0febad5a47debfb55555bb01

  • memory/280-178-0x00000000001E0000-0x0000000000240000-memory.dmp

    Filesize

    384KB

  • memory/280-196-0x0000000140000000-0x0000000140237000-memory.dmp

    Filesize

    2.2MB

  • memory/280-184-0x00000000001E0000-0x0000000000240000-memory.dmp

    Filesize

    384KB

  • memory/808-104-0x0000000140000000-0x00000001401F4000-memory.dmp

    Filesize

    2.0MB

  • memory/1008-160-0x0000000100000000-0x00000001001EC000-memory.dmp

    Filesize

    1.9MB

  • memory/1192-90-0x0000000000400000-0x0000000000654000-memory.dmp

    Filesize

    2.3MB

  • memory/1192-61-0x0000000000400000-0x0000000000654000-memory.dmp

    Filesize

    2.3MB

  • memory/1192-63-0x0000000000400000-0x0000000000654000-memory.dmp

    Filesize

    2.3MB

  • memory/1192-68-0x0000000000400000-0x0000000000654000-memory.dmp

    Filesize

    2.3MB

  • memory/1192-62-0x0000000000400000-0x0000000000654000-memory.dmp

    Filesize

    2.3MB

  • memory/1192-66-0x0000000000400000-0x0000000000654000-memory.dmp

    Filesize

    2.3MB

  • memory/1192-65-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/1192-328-0x0000000000400000-0x0000000000654000-memory.dmp

    Filesize

    2.3MB

  • memory/1192-74-0x0000000000300000-0x0000000000366000-memory.dmp

    Filesize

    408KB

  • memory/1192-69-0x0000000000300000-0x0000000000366000-memory.dmp

    Filesize

    408KB

  • memory/1208-175-0x0000000000BB0000-0x0000000000BC0000-memory.dmp

    Filesize

    64KB

  • memory/1208-198-0x0000000001430000-0x0000000001431000-memory.dmp

    Filesize

    4KB

  • memory/1208-421-0x0000000140000000-0x000000014013C000-memory.dmp

    Filesize

    1.2MB

  • memory/1208-152-0x0000000000290000-0x00000000002F0000-memory.dmp

    Filesize

    384KB

  • memory/1208-176-0x0000000000BC0000-0x0000000000BD0000-memory.dmp

    Filesize

    64KB

  • memory/1208-158-0x0000000000290000-0x00000000002F0000-memory.dmp

    Filesize

    384KB

  • memory/1208-161-0x0000000140000000-0x000000014013C000-memory.dmp

    Filesize

    1.2MB

  • memory/1464-245-0x0000000140000000-0x0000000140221000-memory.dmp

    Filesize

    2.1MB

  • memory/1464-225-0x0000000140000000-0x0000000140221000-memory.dmp

    Filesize

    2.1MB

  • memory/1540-211-0x000000002E000000-0x000000002FE1E000-memory.dmp

    Filesize

    30.1MB

  • memory/1540-546-0x000000002E000000-0x000000002FE1E000-memory.dmp

    Filesize

    30.1MB

  • memory/1556-139-0x0000000140000000-0x0000000140205000-memory.dmp

    Filesize

    2.0MB

  • memory/1580-270-0x0000000000EB0000-0x0000000000F30000-memory.dmp

    Filesize

    512KB

  • memory/1580-374-0x0000000000EB0000-0x0000000000F30000-memory.dmp

    Filesize

    512KB

  • memory/1580-199-0x0000000000EB0000-0x0000000000F30000-memory.dmp

    Filesize

    512KB

  • memory/1616-451-0x0000000140000000-0x0000000140205000-memory.dmp

    Filesize

    2.0MB

  • memory/1616-201-0x0000000140000000-0x0000000140205000-memory.dmp

    Filesize

    2.0MB

  • memory/1616-189-0x0000000000380000-0x00000000003E0000-memory.dmp

    Filesize

    384KB

  • memory/1616-639-0x0000000140000000-0x0000000140205000-memory.dmp

    Filesize

    2.0MB

  • memory/1680-88-0x0000000000440000-0x00000000004A0000-memory.dmp

    Filesize

    384KB

  • memory/1680-329-0x0000000100000000-0x00000001001FB000-memory.dmp

    Filesize

    2.0MB

  • memory/1680-82-0x0000000000440000-0x00000000004A0000-memory.dmp

    Filesize

    384KB

  • memory/1680-91-0x0000000100000000-0x00000001001FB000-memory.dmp

    Filesize

    2.0MB

  • memory/1772-112-0x0000000010000000-0x00000000101FE000-memory.dmp

    Filesize

    2.0MB

  • memory/1840-650-0x0000000140000000-0x0000000140209000-memory.dmp

    Filesize

    2.0MB

  • memory/1840-446-0x0000000140000000-0x0000000140209000-memory.dmp

    Filesize

    2.0MB

  • memory/1840-165-0x0000000000820000-0x0000000000880000-memory.dmp

    Filesize

    384KB

  • memory/1840-171-0x0000000000820000-0x0000000000880000-memory.dmp

    Filesize

    384KB

  • memory/1840-194-0x0000000140000000-0x0000000140209000-memory.dmp

    Filesize

    2.0MB

  • memory/1872-138-0x0000000000400000-0x00000000005FF000-memory.dmp

    Filesize

    2.0MB

  • memory/1872-114-0x0000000000370000-0x00000000003D6000-memory.dmp

    Filesize

    408KB

  • memory/1872-119-0x0000000000370000-0x00000000003D6000-memory.dmp

    Filesize

    408KB

  • memory/1888-58-0x0000000000370000-0x000000000037A000-memory.dmp

    Filesize

    40KB

  • memory/1888-55-0x0000000001320000-0x0000000001360000-memory.dmp

    Filesize

    256KB

  • memory/1888-59-0x0000000005A60000-0x0000000005B98000-memory.dmp

    Filesize

    1.2MB

  • memory/1888-60-0x000000000A290000-0x000000000A440000-memory.dmp

    Filesize

    1.7MB

  • memory/1888-57-0x0000000001320000-0x0000000001360000-memory.dmp

    Filesize

    256KB

  • memory/1888-54-0x0000000001360000-0x00000000014D4000-memory.dmp

    Filesize

    1.5MB

  • memory/1888-56-0x0000000000360000-0x000000000036E000-memory.dmp

    Filesize

    56KB

  • memory/1932-111-0x0000000010000000-0x00000000101F6000-memory.dmp

    Filesize

    2.0MB

  • memory/1956-123-0x0000000000110000-0x0000000000176000-memory.dmp

    Filesize

    408KB

  • memory/1956-121-0x0000000000110000-0x0000000000176000-memory.dmp

    Filesize

    408KB

  • memory/1956-140-0x0000000004C70000-0x0000000004CB0000-memory.dmp

    Filesize

    256KB

  • memory/1956-133-0x0000000000110000-0x0000000000176000-memory.dmp

    Filesize

    408KB

  • memory/1956-135-0x0000000000110000-0x0000000000176000-memory.dmp

    Filesize

    408KB

  • memory/1956-122-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/1956-137-0x0000000004BB0000-0x0000000004C6C000-memory.dmp

    Filesize

    752KB

  • memory/2080-651-0x0000000100000000-0x000000010026B000-memory.dmp

    Filesize

    2.4MB

  • memory/2080-400-0x0000000100000000-0x000000010026B000-memory.dmp

    Filesize

    2.4MB

  • memory/2116-620-0x0000000140000000-0x000000014020D000-memory.dmp

    Filesize

    2.1MB

  • memory/2116-234-0x0000000140000000-0x000000014020D000-memory.dmp

    Filesize

    2.1MB

  • memory/2136-376-0x0000000100000000-0x00000001001ED000-memory.dmp

    Filesize

    1.9MB

  • memory/2200-279-0x0000000000400000-0x00000000005FF000-memory.dmp

    Filesize

    2.0MB

  • memory/2200-269-0x0000000000400000-0x00000000005FF000-memory.dmp

    Filesize

    2.0MB

  • memory/2284-404-0x0000000100000000-0x0000000100202000-memory.dmp

    Filesize

    2.0MB

  • memory/2284-653-0x0000000100000000-0x0000000100202000-memory.dmp

    Filesize

    2.0MB

  • memory/2292-271-0x00000000005C0000-0x00000000007C9000-memory.dmp

    Filesize

    2.0MB

  • memory/2292-636-0x00000000005C0000-0x00000000007C9000-memory.dmp

    Filesize

    2.0MB

  • memory/2292-267-0x0000000100000000-0x0000000100209000-memory.dmp

    Filesize

    2.0MB

  • memory/2452-403-0x0000000100000000-0x0000000100219000-memory.dmp

    Filesize

    2.1MB

  • memory/2452-652-0x0000000100000000-0x0000000100219000-memory.dmp

    Filesize

    2.1MB

  • memory/2468-306-0x000000002E000000-0x000000002E20C000-memory.dmp

    Filesize

    2.0MB

  • memory/2500-305-0x0000000000400000-0x00000000005FF000-memory.dmp

    Filesize

    2.0MB

  • memory/2620-322-0x0000000000400000-0x00000000005FF000-memory.dmp

    Filesize

    2.0MB

  • memory/2620-307-0x0000000000400000-0x00000000005FF000-memory.dmp

    Filesize

    2.0MB

  • memory/2712-308-0x0000000100000000-0x0000000100542000-memory.dmp

    Filesize

    5.3MB

  • memory/2712-644-0x0000000100000000-0x0000000100542000-memory.dmp

    Filesize

    5.3MB

  • memory/2740-426-0x0000000100000000-0x000000010021B000-memory.dmp

    Filesize

    2.1MB

  • memory/2804-428-0x0000000100000000-0x000000010020A000-memory.dmp

    Filesize

    2.0MB

  • memory/2828-338-0x0000000000400000-0x00000000005FF000-memory.dmp

    Filesize

    2.0MB

  • memory/2856-346-0x0000000001000000-0x00000000011ED000-memory.dmp

    Filesize

    1.9MB

  • memory/2952-645-0x0000000000400000-0x00000000005FF000-memory.dmp

    Filesize

    2.0MB

  • memory/2952-336-0x0000000000400000-0x00000000005FF000-memory.dmp

    Filesize

    2.0MB

  • memory/2992-370-0x0000000100000000-0x00000001001EC000-memory.dmp

    Filesize

    1.9MB

  • memory/3012-456-0x0000000100000000-0x0000000100123000-memory.dmp

    Filesize

    1.1MB