Analysis

  • max time kernel
    66s
  • max time network
    59s
  • platform
    windows10-1703_x64
  • resource
    win10-20230621-en
  • resource tags

    arch:x64arch:x86image:win10-20230621-enlocale:en-usos:windows10-1703-x64system
  • submitted
    01/07/2023, 02:16

General

  • Target

    KeePass-2.54-Setup.exe

  • Size

    4.2MB

  • MD5

    f883d719a05fa120c702d3fd395e7f18

  • SHA1

    e181a3e781d21b18d1c05b6c19bb16b0358f0f57

  • SHA256

    bde840661bb08e10e12edfd49f77e2620c6129bd616046e4da50872429c771fd

  • SHA512

    17e306f00fa0c4d41575b3909a1caa62f02e54f3e1518334fa60d9c506e2ffb45749282f2b0b1154ac16a3a3032120d5899709d1e40b217f1e51212dfbad5cc0

  • SSDEEP

    98304:jkLLdV7tX3ds3gLk3WexTeCvpKLeOKIar:ILdJ5PLtQyCvpK0

Malware Config

Signatures

  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 9 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 23 IoCs
  • Drops file in Windows directory 12 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 12 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\KeePass-2.54-Setup.exe
    "C:\Users\Admin\AppData\Local\Temp\KeePass-2.54-Setup.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3748
    • C:\Users\Admin\AppData\Local\Temp\is-QHGN0.tmp\KeePass-2.54-Setup.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-QHGN0.tmp\KeePass-2.54-Setup.tmp" /SL5="$701D0,3460160,781312,C:\Users\Admin\AppData\Local\Temp\KeePass-2.54-Setup.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:4596
      • C:\Program Files\KeePass Password Safe 2\ShInstUtil.exe
        "C:\Program Files\KeePass Password Safe 2\ShInstUtil.exe" net_check
        3⤵
        • Executes dropped EXE
        PID:1404
      • C:\Program Files\KeePass Password Safe 2\ShInstUtil.exe
        "C:\Program Files\KeePass Password Safe 2\ShInstUtil.exe" preload_register
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        PID:2972
      • C:\Program Files\KeePass Password Safe 2\ShInstUtil.exe
        "C:\Program Files\KeePass Password Safe 2\ShInstUtil.exe" ngen_install
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:4860
        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe
          "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe" uninstall "C:\Program Files\KeePass Password Safe 2\KeePass.exe"
          4⤵
            PID:2028
          • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe
            "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe" install "C:\Program Files\KeePass Password Safe 2\KeePass.exe"
            4⤵
              PID:3652
              • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
                C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 170 -InterruptEvent 0 -NGENProcess 160 -Pipe 16c -Comment "NGen Worker Process"
                5⤵
                  PID:3908
                • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
                  C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 170 -InterruptEvent 0 -NGENProcess 228 -Pipe 168 -Comment "NGen Worker Process"
                  5⤵
                  • Loads dropped DLL
                  • Drops file in Windows directory
                  PID:4176
                • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
                  C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 238 -InterruptEvent 0 -NGENProcess 160 -Pipe 234 -Comment "NGen Worker Process"
                  5⤵
                  • Loads dropped DLL
                  • Drops file in Windows directory
                  PID:4156
                • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
                  C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 274 -InterruptEvent 0 -NGENProcess 228 -Pipe 210 -Comment "NGen Worker Process"
                  5⤵
                  • Loads dropped DLL
                  • Drops file in Windows directory
                  PID:3536
                • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
                  C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 238 -InterruptEvent 0 -NGENProcess 25c -Pipe 160 -Comment "NGen Worker Process"
                  5⤵
                  • Loads dropped DLL
                  • Drops file in Windows directory
                  PID:888
                • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
                  C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 238 -InterruptEvent 0 -NGENProcess 274 -Pipe 270 -Comment "NGen Worker Process"
                  5⤵
                  • Loads dropped DLL
                  • Drops file in Windows directory
                  PID:1768
                • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
                  C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 254 -InterruptEvent 0 -NGENProcess 238 -Pipe 27c -Comment "NGen Worker Process"
                  5⤵
                  • Loads dropped DLL
                  • Drops file in Windows directory
                  PID:3624
            • C:\Program Files\KeePass Password Safe 2\KeePass.exe
              "C:\Program Files\KeePass Password Safe 2\KeePass.exe"
              3⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SendNotifyMessage
              PID:4104

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files\KeePass Password Safe 2\KeePass.XmlSerializers.dll

          Filesize

          436KB

          MD5

          ee53c6f2a733af3780e485e92fd7f5f8

          SHA1

          472925922bc29eecfa99feedc8245e81770fb7b0

          SHA256

          dcef2f3c6b7770fc478a7b68f5df1cd894517c0e6a76549cc36c00072978ec5b

          SHA512

          6df497a3e1eb6a59aeb4fb714cd4eec97e32865e028263ac70747ab83d30020e734640a27fc0b28c68ccf387df5cac8051b882235a9755fdbee81c396e5be075

        • C:\Program Files\KeePass Password Safe 2\KeePass.config.xml

          Filesize

          252B

          MD5

          ac0f1e104f82d295c27646bfff39fecc

          SHA1

          34309b00045503fce52adf638ec8be5f32cb6b1d

          SHA256

          c4a3626bbcdfe4b17759e75582ad5f89beaa28efc857431f373e104fbe7b8440

          SHA512

          be3675bbbe47d929a1ca6c5dfefd31b674c7304cc4bfac914d5be9656937554919478feb363fd3a51561bcf879941fcb54b701648057422c452bf677d500a839

        • C:\Program Files\KeePass Password Safe 2\KeePass.exe

          Filesize

          3.1MB

          MD5

          0053419049f07b9f94ff40d4e97a3c5a

          SHA1

          579f40fbf412732b08ae8270fd4a59e4903aaf47

          SHA256

          cdc5d044b0e5f877ee60401107955d5695f40c37a6eae79a42c2b725171a8255

          SHA512

          e34dbb28e1f78871861fc56d17387343557539daaa61fef4c2f11b0a7f730198513aa128e868d763c70f61da8b9afb8c380717cf0eaf94547f1cad2f1c2a35f9

        • C:\Program Files\KeePass Password Safe 2\KeePass.exe

          Filesize

          3.1MB

          MD5

          0053419049f07b9f94ff40d4e97a3c5a

          SHA1

          579f40fbf412732b08ae8270fd4a59e4903aaf47

          SHA256

          cdc5d044b0e5f877ee60401107955d5695f40c37a6eae79a42c2b725171a8255

          SHA512

          e34dbb28e1f78871861fc56d17387343557539daaa61fef4c2f11b0a7f730198513aa128e868d763c70f61da8b9afb8c380717cf0eaf94547f1cad2f1c2a35f9

        • C:\Program Files\KeePass Password Safe 2\KeePass.exe

          Filesize

          3.1MB

          MD5

          0053419049f07b9f94ff40d4e97a3c5a

          SHA1

          579f40fbf412732b08ae8270fd4a59e4903aaf47

          SHA256

          cdc5d044b0e5f877ee60401107955d5695f40c37a6eae79a42c2b725171a8255

          SHA512

          e34dbb28e1f78871861fc56d17387343557539daaa61fef4c2f11b0a7f730198513aa128e868d763c70f61da8b9afb8c380717cf0eaf94547f1cad2f1c2a35f9

        • C:\Program Files\KeePass Password Safe 2\KeePass.exe.config

          Filesize

          763B

          MD5

          22dc886de3a5aff3c4603dcc56157254

          SHA1

          f6bbadbb9897a60b9f65768cea3c0335bda315a3

          SHA256

          8d971a6c1563f75fa0fe25fa584c591ace80fe92ddba43671a8bb2ecb69e618d

          SHA512

          20367d151f6fe47e886adc718548d73d204022735d3451a476391d3c54e0bb7037ec3fe5a4be802013e62eedc1ab0085a9e85b376037ae04083c0fe555d2ec43

        • C:\Program Files\KeePass Password Safe 2\ShInstUtil.exe

          Filesize

          94KB

          MD5

          173d36cfb847ccee904f08a3cbb0054d

          SHA1

          a99d5dcdd5e538fb3eb9ff7270f9fdd83b46f731

          SHA256

          4b5acea7bc850cb2ba1d781cff7a5c5e515525e9e798837695c94e6db70fd3aa

          SHA512

          cf9c68f895d0ea2352e336e7825f3f6b53c2353888c67aa78021d850faa0d1b4372f4e6e0b45644d0652419d6a6d65910f02e42a7c0197f0684cd2103dd41502

        • C:\Program Files\KeePass Password Safe 2\ShInstUtil.exe

          Filesize

          94KB

          MD5

          173d36cfb847ccee904f08a3cbb0054d

          SHA1

          a99d5dcdd5e538fb3eb9ff7270f9fdd83b46f731

          SHA256

          4b5acea7bc850cb2ba1d781cff7a5c5e515525e9e798837695c94e6db70fd3aa

          SHA512

          cf9c68f895d0ea2352e336e7825f3f6b53c2353888c67aa78021d850faa0d1b4372f4e6e0b45644d0652419d6a6d65910f02e42a7c0197f0684cd2103dd41502

        • C:\Program Files\KeePass Password Safe 2\ShInstUtil.exe

          Filesize

          94KB

          MD5

          173d36cfb847ccee904f08a3cbb0054d

          SHA1

          a99d5dcdd5e538fb3eb9ff7270f9fdd83b46f731

          SHA256

          4b5acea7bc850cb2ba1d781cff7a5c5e515525e9e798837695c94e6db70fd3aa

          SHA512

          cf9c68f895d0ea2352e336e7825f3f6b53c2353888c67aa78021d850faa0d1b4372f4e6e0b45644d0652419d6a6d65910f02e42a7c0197f0684cd2103dd41502

        • C:\Program Files\KeePass Password Safe 2\ShInstUtil.exe

          Filesize

          94KB

          MD5

          173d36cfb847ccee904f08a3cbb0054d

          SHA1

          a99d5dcdd5e538fb3eb9ff7270f9fdd83b46f731

          SHA256

          4b5acea7bc850cb2ba1d781cff7a5c5e515525e9e798837695c94e6db70fd3aa

          SHA512

          cf9c68f895d0ea2352e336e7825f3f6b53c2353888c67aa78021d850faa0d1b4372f4e6e0b45644d0652419d6a6d65910f02e42a7c0197f0684cd2103dd41502

        • C:\Program Files\KeePass Password Safe 2\unins000.exe

          Filesize

          3.0MB

          MD5

          e22876f990f700a47704a2023597dc3b

          SHA1

          9f355c70929abf42c5b8980a2f25e1b1bb7021c7

          SHA256

          3e10e95c3b52e5864a7116b9e856252c4f984da2259da92a441060209c191880

          SHA512

          ca0dd87cec473036a10717e1293f832a9b6c27afda5672dfdd58f4151c880c9fdb365e330f94f1b598f37337eabe0215a53e924f1743e15f00e869cfb9b0b986

        • C:\Users\Admin\AppData\Local\Temp\is-QHGN0.tmp\KeePass-2.54-Setup.tmp

          Filesize

          3.0MB

          MD5

          67aeaaa97b4f43831c7dad4299e51d0c

          SHA1

          8aac37d35bc7ffc36653adc2dee412bb7ba10fde

          SHA256

          e6e53f3ea4c5a63c39c5351fd8f635d43722e71c2561de8952269f333416c0cf

          SHA512

          4899323ecb1c00f40e2af72f6fd0d6ed6b883f9c3c01210db3bcc2865bc64b5e22de9ba481bcaef6a1ac238f76ca28cbac09b9a8166aa61abc7506de0ad784fd

        • C:\Users\Admin\AppData\Local\Temp\is-QHGN0.tmp\KeePass-2.54-Setup.tmp

          Filesize

          3.0MB

          MD5

          67aeaaa97b4f43831c7dad4299e51d0c

          SHA1

          8aac37d35bc7ffc36653adc2dee412bb7ba10fde

          SHA256

          e6e53f3ea4c5a63c39c5351fd8f635d43722e71c2561de8952269f333416c0cf

          SHA512

          4899323ecb1c00f40e2af72f6fd0d6ed6b883f9c3c01210db3bcc2865bc64b5e22de9ba481bcaef6a1ac238f76ca28cbac09b9a8166aa61abc7506de0ad784fd

        • C:\Windows\assembly\NativeImages_v4.0.30319_64\KeePass\95e22e4424c9cc1a4abbf6570b8212ba\KeePass.ni.exe

          Filesize

          11.0MB

          MD5

          ade41e937107e1ca1efe5b4afe21d937

          SHA1

          1d9f6761a9b7086b771b7f02d255e458eb9d9296

          SHA256

          4130e7de4d10ef28c60bf5357d255f25927db32dbac4c5111727bb13c963b4a9

          SHA512

          48ca1fa621b261f76421a9c243ae64b994b2e0684a3b9ad3868e4acb9077d2053d7d06b7f5de0f45f723e41c0f2210a097040e05210c2bec03a47ff867fdb24e

        • C:\Windows\assembly\NativeImages_v4.0.30319_64\KeePass\95e22e4424c9cc1a4abbf6570b8212ba\KeePass.ni.exe.aux

          Filesize

          1KB

          MD5

          7ce2cb81e63c0761b4de85be81ef74a6

          SHA1

          b4f7bcc03752a791cd7df001b37de0febe07739e

          SHA256

          14044bcc3f1f60069e761fd9ff11b93fa6e3a9fd822d23af01a4c88994e9243c

          SHA512

          ec8f207af5f64378a38581fac3164a80369c03e23c20575d68083c9572801bf349cc7ba9c88b22b4ffa26f5ca93c7dbcb8ac9b31d0d4fda84b95897af43ff248

        • C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Data.SqlXml\cd03f7a1d6c4031c515fb3f50c42e268\System.Data.SqlXml.ni.dll

          Filesize

          3.0MB

          MD5

          0bdbc8f0fb2097d58e463ab73f8c44d8

          SHA1

          c159252064305d27d4b6dfbfdbdc233ac331a453

          SHA256

          6cf016fbbee0fd57d6c44b81d913d8206fb7262413d9d15f7c62e7dfe5d5147a

          SHA512

          91afc6b85cbff3fbf4688c117effb8faa1268a2c16e29176a51807204529b40607cda3d6b5a83583a908c791c96073610fe7640f6a934578cc126b560f5d4803

        • C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Data.SqlXml\cd03f7a1d6c4031c515fb3f50c42e268\System.Data.SqlXml.ni.dll.aux

          Filesize

          708B

          MD5

          64da8024a58f95de62721fdc955fda25

          SHA1

          335c70ee6dee771ad2529eb9c2d67b131c682296

          SHA256

          fef476a63a5b7310a2d03c82bd9e579d14304f3d924636cdac194dbba7d6633a

          SHA512

          99f65f10375b8573895d1d91dda0988b2955fc531d7823f6a118a5c8ae894b9b493a1a88df9b3762c7cee88260cea26850fb3734212e9ac7c96408659506b1aa

        • C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Security\cccf0195b8a7b2804875769b64f41f8a\System.Security.ni.dll

          Filesize

          960KB

          MD5

          13bd4f0a19d3ea71a5b1c1b6d5330635

          SHA1

          12909fc81a2cb66a1435803b2c0bbc613a18b243

          SHA256

          3fc2a7a509f23269002e9a5ce3aca634fceb4e4ab70da6cbf56ae1e500fd6052

          SHA512

          400a09b0e29f170c1da464cd4e31f42b1e97de9fb24c29ed531d27014bf1513e6cc943435102e21735973e509c58ed7a099843a35cc2aa115868426047387c96

        • C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Security\cccf0195b8a7b2804875769b64f41f8a\System.Security.ni.dll.aux

          Filesize

          912B

          MD5

          db0c73ec2d077ea9b1c581148b9dd302

          SHA1

          6cb786f06ec5ffa1cf10d26d05441e8eb352405c

          SHA256

          9c1b5c795834a729619880dce0fa9437874f2ab709b81aa6ae9811293bb0cb59

          SHA512

          c6ff914ae88989a89e3aaaf5d76f280714b12d745390be5fe0d16d7f65fe43e1d09950f8035dfa68540de52c9cb835ffc0741ca6651fbd94a84c9ee2331fe006

        • \Windows\assembly\NativeImages_v4.0.30319_64\KeePass\95e22e4424c9cc1a4abbf6570b8212ba\KeePass.ni.exe

          Filesize

          11.0MB

          MD5

          ade41e937107e1ca1efe5b4afe21d937

          SHA1

          1d9f6761a9b7086b771b7f02d255e458eb9d9296

          SHA256

          4130e7de4d10ef28c60bf5357d255f25927db32dbac4c5111727bb13c963b4a9

          SHA512

          48ca1fa621b261f76421a9c243ae64b994b2e0684a3b9ad3868e4acb9077d2053d7d06b7f5de0f45f723e41c0f2210a097040e05210c2bec03a47ff867fdb24e

        • \Windows\assembly\NativeImages_v4.0.30319_64\KeePass\95e22e4424c9cc1a4abbf6570b8212ba\KeePass.ni.exe

          Filesize

          11.0MB

          MD5

          ade41e937107e1ca1efe5b4afe21d937

          SHA1

          1d9f6761a9b7086b771b7f02d255e458eb9d9296

          SHA256

          4130e7de4d10ef28c60bf5357d255f25927db32dbac4c5111727bb13c963b4a9

          SHA512

          48ca1fa621b261f76421a9c243ae64b994b2e0684a3b9ad3868e4acb9077d2053d7d06b7f5de0f45f723e41c0f2210a097040e05210c2bec03a47ff867fdb24e

        • \Windows\assembly\NativeImages_v4.0.30319_64\System.Data.SqlXml\cd03f7a1d6c4031c515fb3f50c42e268\System.Data.SqlXml.ni.dll

          Filesize

          3.0MB

          MD5

          0bdbc8f0fb2097d58e463ab73f8c44d8

          SHA1

          c159252064305d27d4b6dfbfdbdc233ac331a453

          SHA256

          6cf016fbbee0fd57d6c44b81d913d8206fb7262413d9d15f7c62e7dfe5d5147a

          SHA512

          91afc6b85cbff3fbf4688c117effb8faa1268a2c16e29176a51807204529b40607cda3d6b5a83583a908c791c96073610fe7640f6a934578cc126b560f5d4803

        • \Windows\assembly\NativeImages_v4.0.30319_64\System.Data.SqlXml\cd03f7a1d6c4031c515fb3f50c42e268\System.Data.SqlXml.ni.dll

          Filesize

          3.0MB

          MD5

          0bdbc8f0fb2097d58e463ab73f8c44d8

          SHA1

          c159252064305d27d4b6dfbfdbdc233ac331a453

          SHA256

          6cf016fbbee0fd57d6c44b81d913d8206fb7262413d9d15f7c62e7dfe5d5147a

          SHA512

          91afc6b85cbff3fbf4688c117effb8faa1268a2c16e29176a51807204529b40607cda3d6b5a83583a908c791c96073610fe7640f6a934578cc126b560f5d4803

        • \Windows\assembly\NativeImages_v4.0.30319_64\System.Deployment\52c68307282a248618376df5db7f9cce\System.Deployment.ni.dll

          Filesize

          2.2MB

          MD5

          ccdd9605e7bb07b8b0b3b19d8e938615

          SHA1

          49c99a4dba7ea3b3fcd49afc124cb81b14f4cd84

          SHA256

          6a90f268b1848ab002406a929e0c8868838370ccfb4fd747c0b213d62da93572

          SHA512

          dfed841d9b210e9d8eed60c79f1f9ea513b0fe5b00c10002baf3f81ee686c52ea3bf39c612ba69fc1b747c37bba3de25b645f702cc4329f149a28ac036d8bc8b

        • \Windows\assembly\NativeImages_v4.0.30319_64\System.Numerics\9744e094346545d417a938174608d0ad\System.Numerics.ni.dll

          Filesize

          307KB

          MD5

          fd0f9bc0584653e7f39b55dd6e743a32

          SHA1

          ada958995ab3b74bcdf05ac0e6270024857fdee0

          SHA256

          aa8f2ae1967de8b8f1989c7e6f92d0f8828b47d80b1ba69cb7a6c6b6fc1cff9b

          SHA512

          38c76c107b0931b1d3cdf60207f5647cc2029dd69b6a28845bba2a792472325d3c074bb98954a60a95ed9971e179a4c2f44af95245a7b153f386d28c5b835e1f

        • \Windows\assembly\NativeImages_v4.0.30319_64\System.Runt9064068c#\88bbec18c44a06edb18eb16d6775008f\System.Runtime.Serialization.Formatters.Soap.ni.dll

          Filesize

          337KB

          MD5

          6a74608b40a2787d6fc3ba420f22e73e

          SHA1

          a91e0bce5d4e7b55b308ca1d01bc050a6075747d

          SHA256

          75a50aa3dc7b54b2ca87630807f20d7a79cca0562b6392a65fce14fd0fe8d253

          SHA512

          19c616bc99168cf0dcf38d6e0ea498956561d877658be992df9a5e9a996e39cc3bf60b6c3d766e940549d7c39fda1d1e3438f8812143574108dc830c52c5183c

        • \Windows\assembly\NativeImages_v4.0.30319_64\System.Security\cccf0195b8a7b2804875769b64f41f8a\System.Security.ni.dll

          Filesize

          960KB

          MD5

          13bd4f0a19d3ea71a5b1c1b6d5330635

          SHA1

          12909fc81a2cb66a1435803b2c0bbc613a18b243

          SHA256

          3fc2a7a509f23269002e9a5ce3aca634fceb4e4ab70da6cbf56ae1e500fd6052

          SHA512

          400a09b0e29f170c1da464cd4e31f42b1e97de9fb24c29ed531d27014bf1513e6cc943435102e21735973e509c58ed7a099843a35cc2aa115868426047387c96

        • \Windows\assembly\NativeImages_v4.0.30319_64\System.Security\cccf0195b8a7b2804875769b64f41f8a\System.Security.ni.dll

          Filesize

          960KB

          MD5

          13bd4f0a19d3ea71a5b1c1b6d5330635

          SHA1

          12909fc81a2cb66a1435803b2c0bbc613a18b243

          SHA256

          3fc2a7a509f23269002e9a5ce3aca634fceb4e4ab70da6cbf56ae1e500fd6052

          SHA512

          400a09b0e29f170c1da464cd4e31f42b1e97de9fb24c29ed531d27014bf1513e6cc943435102e21735973e509c58ed7a099843a35cc2aa115868426047387c96

        • memory/888-287-0x0000064443EC0000-0x0000064443F0F000-memory.dmp

          Filesize

          316KB

        • memory/1768-329-0x00000644A0000000-0x00000644A023E000-memory.dmp

          Filesize

          2.2MB

        • memory/3536-247-0x0000064449A20000-0x0000064449B13000-memory.dmp

          Filesize

          972KB

        • memory/3624-360-0x0000064449980000-0x00000644499D6000-memory.dmp

          Filesize

          344KB

        • memory/3748-120-0x0000000000400000-0x00000000004CC000-memory.dmp

          Filesize

          816KB

        • memory/3748-127-0x0000000000400000-0x00000000004CC000-memory.dmp

          Filesize

          816KB

        • memory/3908-181-0x0000023F6C4A0000-0x0000023F6C4F0000-memory.dmp

          Filesize

          320KB

        • memory/3908-183-0x0000023F6C820000-0x0000023F6C8F6000-memory.dmp

          Filesize

          856KB

        • memory/3908-186-0x0000023F6C740000-0x0000023F6C762000-memory.dmp

          Filesize

          136KB

        • memory/3908-184-0x0000023F6C4F0000-0x0000023F6C512000-memory.dmp

          Filesize

          136KB

        • memory/3908-185-0x0000023F6CC80000-0x0000023F6CD32000-memory.dmp

          Filesize

          712KB

        • memory/3908-179-0x0000023F6C960000-0x0000023F6CC80000-memory.dmp

          Filesize

          3.1MB

        • memory/4104-423-0x000000001B2C0000-0x000000001B2D0000-memory.dmp

          Filesize

          64KB

        • memory/4104-418-0x000000001B2C0000-0x000000001B2D0000-memory.dmp

          Filesize

          64KB

        • memory/4104-406-0x0000000000280000-0x00000000005A0000-memory.dmp

          Filesize

          3.1MB

        • memory/4104-422-0x000000001B2C0000-0x000000001B2D0000-memory.dmp

          Filesize

          64KB

        • memory/4104-421-0x000000001B2C0000-0x000000001B2D0000-memory.dmp

          Filesize

          64KB

        • memory/4104-420-0x000000001FB90000-0x000000001FBFC000-memory.dmp

          Filesize

          432KB

        • memory/4104-414-0x000000001B2C0000-0x000000001B2D0000-memory.dmp

          Filesize

          64KB

        • memory/4104-415-0x000000001B2C0000-0x000000001B2D0000-memory.dmp

          Filesize

          64KB

        • memory/4104-416-0x000000001B2C0000-0x000000001B2D0000-memory.dmp

          Filesize

          64KB

        • memory/4156-212-0x00000644451A0000-0x0000064445496000-memory.dmp

          Filesize

          3.0MB

        • memory/4176-357-0x0000064488000000-0x0000064488AFD000-memory.dmp

          Filesize

          11.0MB

        • memory/4596-402-0x0000000000400000-0x0000000000708000-memory.dmp

          Filesize

          3.0MB

        • memory/4596-125-0x0000000000870000-0x0000000000871000-memory.dmp

          Filesize

          4KB

        • memory/4596-128-0x0000000000400000-0x0000000000708000-memory.dmp

          Filesize

          3.0MB

        • memory/4596-129-0x0000000000870000-0x0000000000871000-memory.dmp

          Filesize

          4KB

        • memory/4596-131-0x0000000000400000-0x0000000000708000-memory.dmp

          Filesize

          3.0MB

        • memory/4596-204-0x0000000000400000-0x0000000000708000-memory.dmp

          Filesize

          3.0MB