Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    151s
  • max time network
    156s
  • platform
    windows7_x64
  • resource
    win7-20231023-en
  • resource tags

    arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system
  • submitted
    29/10/2023, 02:07

General

  • Target

    c3c3a0b9e2637af4d73654ec1e8937d0.exe

  • Size

    1.2MB

  • MD5

    c3c3a0b9e2637af4d73654ec1e8937d0

  • SHA1

    4c99b6e1fc940304e444637335868db8d51a47cb

  • SHA256

    d9b20209d1732768457a9e7a42a30e4c8732ab0fd1f75c12e7bd5b8e4ba96f11

  • SHA512

    7d28914f25d08a8b1571457a44390550439afca887c7cd562d36aec6965f4e9ea3db0e5d40afebdbd37622b11aa47cc33631a51ad72fcb5d0f13d61502a17526

  • SSDEEP

    12288:QutlnybqL5tml0aTcMjN12xdUb6pSsFQHNP51lK9+Prapve43kT:Qutl11tmlNQ2OnBdFQtP51llPup33kT

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 59 IoCs
  • Loads dropped DLL 17 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in System32 directory 20 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 42 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 31 IoCs
  • Suspicious use of AdjustPrivilegeToken 46 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of SetWindowsHookEx 20 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\c3c3a0b9e2637af4d73654ec1e8937d0.exe
    "C:\Users\Admin\AppData\Local\Temp\c3c3a0b9e2637af4d73654ec1e8937d0.exe"
    1⤵
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2460
  • C:\Windows\System32\alg.exe
    C:\Windows\System32\alg.exe
    1⤵
    • Executes dropped EXE
    PID:2756
  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe
    C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2736
  • C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe
    C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe
    1⤵
    • Executes dropped EXE
    • Drops file in Windows directory
    PID:2592
  • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe
    C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe
    1⤵
    • Executes dropped EXE
    • Drops file in Windows directory
    PID:2196
  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
    C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
    1⤵
    • Executes dropped EXE
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2796
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1e8 -InterruptEvent 1d4 -NGENProcess 1d8 -Pipe 1e4 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:1664
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 258 -InterruptEvent 1d4 -NGENProcess 1d8 -Pipe 1e8 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2008
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1d4 -InterruptEvent 25c -NGENProcess 24c -Pipe 248 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:3036
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 25c -InterruptEvent 260 -NGENProcess 23c -Pipe 244 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2648
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 260 -InterruptEvent 264 -NGENProcess 1d8 -Pipe 1f0 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2976
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 250 -InterruptEvent 25c -NGENProcess 268 -Pipe 260 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:1052
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 254 -InterruptEvent 24c -NGENProcess 26c -Pipe 250 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2620
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1d4 -InterruptEvent 240 -NGENProcess 1d8 -Pipe 24c -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:1368
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 25c -InterruptEvent 1d4 -NGENProcess 23c -Pipe 1d8 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:1196
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 280 -InterruptEvent 240 -NGENProcess 284 -Pipe 25c -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2976
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 27c -InterruptEvent 264 -NGENProcess 288 -Pipe 280 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2372
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 264 -InterruptEvent 28c -NGENProcess 284 -Pipe 258 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2212
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1d4 -InterruptEvent 294 -NGENProcess 28c -Pipe 26c -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2272
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 240 -InterruptEvent 264 -NGENProcess 278 -Pipe 1d4 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:1508
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 264 -InterruptEvent 288 -NGENProcess 28c -Pipe 284 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2456
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 298 -InterruptEvent 240 -NGENProcess 29c -Pipe 264 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:1916
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 254 -InterruptEvent 240 -NGENProcess 298 -Pipe 28c -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2568
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1d4 -InterruptEvent 27c -NGENProcess 2a4 -Pipe 254 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2136
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 290 -InterruptEvent 29c -NGENProcess 2a8 -Pipe 1d4 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:896
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 29c -InterruptEvent 288 -NGENProcess 2a4 -Pipe 294 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:1840
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 278 -InterruptEvent 288 -NGENProcess 29c -Pipe 1ac -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:1088
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2a4 -InterruptEvent 240 -NGENProcess 2ac -Pipe 278 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2408
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 27c -InterruptEvent 2a0 -NGENProcess 180 -Pipe 2a4 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2272
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1f8 -InterruptEvent 22c -NGENProcess 278 -Pipe 1b4 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:1712
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 22c -InterruptEvent 260 -NGENProcess 21c -Pipe 250 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2864
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1f0 -InterruptEvent 260 -NGENProcess 22c -Pipe 25c -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2296
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 24c -InterruptEvent 218 -NGENProcess 248 -Pipe 1f0 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2052
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 280 -InterruptEvent 21c -NGENProcess 1c4 -Pipe 24c -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Windows directory
      PID:1672
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 218 -InterruptEvent 244 -NGENProcess 260 -Pipe 1f8 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2884
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 298 -InterruptEvent 244 -NGENProcess 218 -Pipe 1d8 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:1956
  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
    C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
    1⤵
    • Executes dropped EXE
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:1800
    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 1dc -InterruptEvent 1c4 -NGENProcess 1cc -Pipe 1d8 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:1776
    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 248 -InterruptEvent 1c4 -NGENProcess 1cc -Pipe 1dc -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:1192
  • C:\Windows\system32\dllhost.exe
    C:\Windows\system32\dllhost.exe /Processid:{02D4B3F1-FD88-11D1-960D-00805FC79235}
    1⤵
    • Executes dropped EXE
    • Drops file in Windows directory
    PID:2488
  • C:\Windows\ehome\ehRecvr.exe
    C:\Windows\ehome\ehRecvr.exe
    1⤵
    • Executes dropped EXE
    • Modifies data under HKEY_USERS
    PID:1600
  • C:\Windows\ehome\ehsched.exe
    C:\Windows\ehome\ehsched.exe
    1⤵
    • Executes dropped EXE
    PID:828
  • C:\Windows\eHome\EhTray.exe
    "C:\Windows\eHome\EhTray.exe" /nav:-2
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:2172
  • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
    "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
    1⤵
    • Executes dropped EXE
    PID:3048
  • C:\Windows\ehome\ehRec.exe
    C:\Windows\ehome\ehRec.exe -Embedding
    1⤵
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2792
  • C:\Windows\system32\IEEtwCollector.exe
    C:\Windows\system32\IEEtwCollector.exe /V
    1⤵
    • Executes dropped EXE
    PID:2408
  • C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE" /auditservice
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    PID:344
  • C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe
    "C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"
    1⤵
    • Executes dropped EXE
    PID:1568
  • C:\Windows\System32\msdtc.exe
    C:\Windows\System32\msdtc.exe
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Drops file in Windows directory
    PID:2544
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Suspicious use of AdjustPrivilegeToken
    PID:1572
  • C:\Program Files (x86)\Common Files\Microsoft Shared\Source Engine\OSE.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\Source Engine\OSE.EXE"
    1⤵
    • Executes dropped EXE
    PID:2684
  • C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE
    "C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"
    1⤵
    • Executes dropped EXE
    PID:2816
  • C:\Windows\SysWow64\perfhost.exe
    C:\Windows\SysWow64\perfhost.exe
    1⤵
    • Executes dropped EXE
    PID:2012
  • C:\Windows\system32\locator.exe
    C:\Windows\system32\locator.exe
    1⤵
    • Executes dropped EXE
    PID:2900
  • C:\Windows\System32\snmptrap.exe
    C:\Windows\System32\snmptrap.exe
    1⤵
    • Executes dropped EXE
    PID:1484
  • C:\Windows\System32\vds.exe
    C:\Windows\System32\vds.exe
    1⤵
    • Executes dropped EXE
    PID:940
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    PID:2916
  • C:\Windows\system32\wbengine.exe
    "C:\Windows\system32\wbengine.exe"
    1⤵
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    PID:1996
  • C:\Windows\system32\wbem\WmiApSrv.exe
    C:\Windows\system32\wbem\WmiApSrv.exe
    1⤵
    • Executes dropped EXE
    PID:2260
  • C:\Program Files\Windows Media Player\wmpnetwk.exe
    "C:\Program Files\Windows Media Player\wmpnetwk.exe"
    1⤵
    • Executes dropped EXE
    • Modifies data under HKEY_USERS
    • Suspicious use of AdjustPrivilegeToken
    PID:2436
  • C:\Windows\system32\SearchIndexer.exe
    C:\Windows\system32\SearchIndexer.exe /Embedding
    1⤵
    • Executes dropped EXE
    • Modifies data under HKEY_USERS
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2536
    • C:\Windows\system32\SearchProtocolHost.exe
      "C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe_S-1-5-21-3425689832-2386927309-2650718742-10001_ Global\UsGthrCtrlFltPipeMssGthrPipe_S-1-5-21-3425689832-2386927309-2650718742-10001 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon" "1"
      2⤵
      • Suspicious use of SetWindowsHookEx
      PID:2244
    • C:\Windows\system32\SearchFilterHost.exe
      "C:\Windows\system32\SearchFilterHost.exe" 0 588 592 600 65536 596
      2⤵
      • Modifies data under HKEY_USERS
      PID:1364
    • C:\Windows\system32\SearchProtocolHost.exe
      "C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe2_ Global\UsGthrCtrlFltPipeMssGthrPipe2 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon"
      2⤵
      • Drops file in System32 directory
      • Modifies data under HKEY_USERS
      • Suspicious use of SetWindowsHookEx
      PID:1692

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Common Files\microsoft shared\Source Engine\OSE.EXE

    Filesize

    1.3MB

    MD5

    de857e655feab5e0d527d6657ba369fa

    SHA1

    a5fee029f1b49d7570c7fc57ab4fbba921ab0b50

    SHA256

    713eb24ebf07dd0cc8622ba8b3822725037e71aa3deecdc4b7b6023a4158d159

    SHA512

    df6b17459e0044026dde33dcedc3980da3b889be75d604b7aed166d67abd663c6127eb46f1ee7be871fe700b031ea8512e4cd1c5d71a556d216199477bb4188a

  • C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE

    Filesize

    30.1MB

    MD5

    44550513ae19f701f10d578361dd38c7

    SHA1

    4b7037c846475d64af427891dd49c24ee43fb26e

    SHA256

    eb676670fbe8a277b7870f760130468d77f826c80d38e46be7c8db54723c01fb

    SHA512

    9104b0d8a07f0c4e9b577a2e8d47ead48da16f6253e5fbc0c3e13c35eee2d912a0b3cb82f59c7f72e718dddde4e5eb341b88b06f11c0969d3c05cae7e79790d2

  • C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe

    Filesize

    1.4MB

    MD5

    1e4d7f034be2ed88226f26d50cb6e5da

    SHA1

    4bdcd0906d93f35d5938d24934291115a5053a59

    SHA256

    88d577ddf6fe38519cb43f4827648cf3374da2b88cf49e97a058403ad6e22836

    SHA512

    60084364f125a29bdf75db60eae0a57aa25e56f7ec29ad39dea09ac7002672ef53198496224eddb55916828009f2478fdebd042cc87f698979aec15ea00004ce

  • C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE

    Filesize

    5.2MB

    MD5

    3872acfa5d2a6457269fc7237f911648

    SHA1

    7726da841a2a736f4584ea64a0cd2df76d07b286

    SHA256

    4be83714133b46bd9c81087a15966eb8ac677e51832ec3f40c3672bc68586804

    SHA512

    474699049d39a0c6b32d75212e690f1773f03eb8e472f5e61acd9fbee287985ada344ee8d131729eb5695abdbdbb02bd07a6b4dc1b7a7e02722c16c12308d618

  • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe

    Filesize

    2.1MB

    MD5

    fbd2045a7ad3c936138f41904f5f792c

    SHA1

    7ac77d7ed9e99d603468d13f294d2065e5e78f97

    SHA256

    9829d3249804b4987b9704502b25753e8ce4206db0b39820cba67d96c9faa49f

    SHA512

    44e4022621723fd5eba0d9d9c7efd81cf08568d6825b505900e3e383379d6f9213be3d49d83503c09c793879e09eb851e6c1284fccf1eb305d98aba54fb7c830

  • C:\Program Files\Windows Media Player\wmpnetwk.exe

    Filesize

    2.0MB

    MD5

    b889a257eeebef754cb42e1c18e02610

    SHA1

    2e9b45a88a5488a15cef5be366479a105ffb3b52

    SHA256

    fd3f8ac03a3d33ab612d55ccf4953000c7b6292d7f8af19db46219f44525a228

    SHA512

    128ac7413a46ae06de46c9a8d9e0c30bd44a6059c85f7a48ec5ab0dc1e89cdf86d4f6147d75c1a6b3ccb9d016f5572a33c2fa241dfd83389d5c66559e02fd11d

  • C:\ProgramData\Microsoft\Search\Data\Applications\Windows\MSS.log

    Filesize

    1024KB

    MD5

    e287c6a78097236228e7c7bf1c126917

    SHA1

    4646ea95b4383c61e4f53833976f30be8502dbfa

    SHA256

    12b50e27230031e40ba27cb602d67f1e8b5023a2679654b5937a1d95e5416973

    SHA512

    f5de435bcb5f814ed0f9a994d49a10a3028da147b654e307bad81aeaba7efadb1518015bfe18a5985427847bc2fc1e384264e97b221655d012e1d2448133adb4

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b91050d8b077a4e8.customDestinations-ms

    Filesize

    24B

    MD5

    b9bd716de6739e51c620f2086f9c31e4

    SHA1

    9733d94607a3cba277e567af584510edd9febf62

    SHA256

    7116ff028244a01f3d17f1d3bc2e1506bc9999c2e40e388458f0cccc4e117312

    SHA512

    cef609e54c7a81a646ad38dba7ac0b82401b220773b9c792cefac80c6564753229f0c011b34ffb56381dd3154a19aee2bf5f602c4d1af01f2cf0fbc1574e4478

  • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe

    Filesize

    1.3MB

    MD5

    e0e4856e5be5112d41079bc2ea6ac9b2

    SHA1

    ad978fe603c15efd1f221477dd335e6d86a5c347

    SHA256

    a73883175f0f34a50a3e94315e15f6400fbe436d1aea5ee8e27418178fe80fc3

    SHA512

    2b6bfd9ee231fccad918b2dddbb06a9ea2492e87c61c47fa4d3bdb3f088e65c56bdfdb618b1c3c1c74b489258b9797d3eb476e0f28b00f2cee4577bf6c50ad16

  • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe

    Filesize

    1.3MB

    MD5

    e0e4856e5be5112d41079bc2ea6ac9b2

    SHA1

    ad978fe603c15efd1f221477dd335e6d86a5c347

    SHA256

    a73883175f0f34a50a3e94315e15f6400fbe436d1aea5ee8e27418178fe80fc3

    SHA512

    2b6bfd9ee231fccad918b2dddbb06a9ea2492e87c61c47fa4d3bdb3f088e65c56bdfdb618b1c3c1c74b489258b9797d3eb476e0f28b00f2cee4577bf6c50ad16

  • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ngen_service.log

    Filesize

    872KB

    MD5

    87334dc6809a79ada232d682e147b417

    SHA1

    de8d366294bd24d38e6408c3a994617ccbb2b521

    SHA256

    b444e6a4f66c8dd5a595f4ffcaed3563795d68446ff80020949ee4139bc7b74c

    SHA512

    84a8dd973459778e694e93c821cc383bf54ed329a045f7fa68c1381b93fb5fcd43045c93d909e8508c74553b326dd89e9bc9177585fa5c3fe9cf152b34e260da

  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe

    Filesize

    1.2MB

    MD5

    377cf47e1b89b59deedf2f0ea375344f

    SHA1

    bd6ffa32874941938b0de7982ca5d38f59352e75

    SHA256

    cf18510f279a7cdd90d5acb383777143aae147984263c3deb1fb095f0791146a

    SHA512

    1c6551136cafd4a4ec941f2afb90571ffd2742ca9732a4c8b85a7d038fa688f526def109bcbdf4ab1922f1f6daf552a9b2723db6a29be3f899fcc915fbb24842

  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe

    Filesize

    1.3MB

    MD5

    6a0780c82d3f8dc2198583ba02b6217d

    SHA1

    fa60a44ee84627ecaa3f23fe345c817ead94dddd

    SHA256

    07e5b2c18061b58ad3ee8d7c3c5fc74e3336e027cc966759cef9c7d04f2b26ed

    SHA512

    9b6dbb8713e3bc84952a4c69366b86dfad2f7cd849bd1248b9a018bb292458f9f496fbd7bd25a5a93a2736072cc2d6a7e030c76784686e64b7212b2e7c2e43f6

  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe

    Filesize

    1.3MB

    MD5

    6a0780c82d3f8dc2198583ba02b6217d

    SHA1

    fa60a44ee84627ecaa3f23fe345c817ead94dddd

    SHA256

    07e5b2c18061b58ad3ee8d7c3c5fc74e3336e027cc966759cef9c7d04f2b26ed

    SHA512

    9b6dbb8713e3bc84952a4c69366b86dfad2f7cd849bd1248b9a018bb292458f9f496fbd7bd25a5a93a2736072cc2d6a7e030c76784686e64b7212b2e7c2e43f6

  • C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe

    Filesize

    1.2MB

    MD5

    8e7c80544420af39e99d929f55c6d64c

    SHA1

    7909998026a336b4fdf3fc9d2fcdf767e00264ab

    SHA256

    e054bddb992d0ea8f511c70b2ab4ad67bbcef987e4b6cea09232c470762dea09

    SHA512

    c44bd44c2d1d40146a80821cf788a62ac24f2dc36fd9f070d2d793cef01be47497d595d46aa9e63835f53200f05d807ece78d684d1a70332b155141883f0e1e6

  • C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe

    Filesize

    1.2MB

    MD5

    8e7c80544420af39e99d929f55c6d64c

    SHA1

    7909998026a336b4fdf3fc9d2fcdf767e00264ab

    SHA256

    e054bddb992d0ea8f511c70b2ab4ad67bbcef987e4b6cea09232c470762dea09

    SHA512

    c44bd44c2d1d40146a80821cf788a62ac24f2dc36fd9f070d2d793cef01be47497d595d46aa9e63835f53200f05d807ece78d684d1a70332b155141883f0e1e6

  • C:\Windows\Microsoft.NET\Framework\v2.0.50727\ngen_service.log

    Filesize

    1003KB

    MD5

    91b9548f779a3e8512b96a89635b9cfd

    SHA1

    2021ec86dd6b0836473696103e689336472dd154

    SHA256

    e587b64ba4b672454c88e05428bff7463c85a68dee1a4330e0045f60815610e6

    SHA512

    1feb9b02a9fb4c233e780c1c75cd3cd33b96251bd538008c438bbd54039b806c9b24639640ce85a0bb927e1b00c28ebbe4a89d992eff51f5401a312ee2bde11a

  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe

    Filesize

    1.3MB

    MD5

    04e53ae51944fe6883e73bc2fb5ca336

    SHA1

    47d7a49c3e85b4b67ce1d97ab30e96db713d15f1

    SHA256

    069b7a524e7b195c97dd1788ba107396e588019ce43a7ccb7104a9307914b0a0

    SHA512

    5e38d671d8f8fa3d95e34c33adfbdd5366b2a2a8874acef456c37ec0a791fce58c9045e859b789583177283f824efc1b3825cee09ff052d26c436d80404a80a6

  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe

    Filesize

    1.3MB

    MD5

    04e53ae51944fe6883e73bc2fb5ca336

    SHA1

    47d7a49c3e85b4b67ce1d97ab30e96db713d15f1

    SHA256

    069b7a524e7b195c97dd1788ba107396e588019ce43a7ccb7104a9307914b0a0

    SHA512

    5e38d671d8f8fa3d95e34c33adfbdd5366b2a2a8874acef456c37ec0a791fce58c9045e859b789583177283f824efc1b3825cee09ff052d26c436d80404a80a6

  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe

    Filesize

    1.3MB

    MD5

    04e53ae51944fe6883e73bc2fb5ca336

    SHA1

    47d7a49c3e85b4b67ce1d97ab30e96db713d15f1

    SHA256

    069b7a524e7b195c97dd1788ba107396e588019ce43a7ccb7104a9307914b0a0

    SHA512

    5e38d671d8f8fa3d95e34c33adfbdd5366b2a2a8874acef456c37ec0a791fce58c9045e859b789583177283f824efc1b3825cee09ff052d26c436d80404a80a6

  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe

    Filesize

    1.3MB

    MD5

    04e53ae51944fe6883e73bc2fb5ca336

    SHA1

    47d7a49c3e85b4b67ce1d97ab30e96db713d15f1

    SHA256

    069b7a524e7b195c97dd1788ba107396e588019ce43a7ccb7104a9307914b0a0

    SHA512

    5e38d671d8f8fa3d95e34c33adfbdd5366b2a2a8874acef456c37ec0a791fce58c9045e859b789583177283f824efc1b3825cee09ff052d26c436d80404a80a6

  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe

    Filesize

    1.3MB

    MD5

    04e53ae51944fe6883e73bc2fb5ca336

    SHA1

    47d7a49c3e85b4b67ce1d97ab30e96db713d15f1

    SHA256

    069b7a524e7b195c97dd1788ba107396e588019ce43a7ccb7104a9307914b0a0

    SHA512

    5e38d671d8f8fa3d95e34c33adfbdd5366b2a2a8874acef456c37ec0a791fce58c9045e859b789583177283f824efc1b3825cee09ff052d26c436d80404a80a6

  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe

    Filesize

    1.3MB

    MD5

    04e53ae51944fe6883e73bc2fb5ca336

    SHA1

    47d7a49c3e85b4b67ce1d97ab30e96db713d15f1

    SHA256

    069b7a524e7b195c97dd1788ba107396e588019ce43a7ccb7104a9307914b0a0

    SHA512

    5e38d671d8f8fa3d95e34c33adfbdd5366b2a2a8874acef456c37ec0a791fce58c9045e859b789583177283f824efc1b3825cee09ff052d26c436d80404a80a6

  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe

    Filesize

    1.3MB

    MD5

    04e53ae51944fe6883e73bc2fb5ca336

    SHA1

    47d7a49c3e85b4b67ce1d97ab30e96db713d15f1

    SHA256

    069b7a524e7b195c97dd1788ba107396e588019ce43a7ccb7104a9307914b0a0

    SHA512

    5e38d671d8f8fa3d95e34c33adfbdd5366b2a2a8874acef456c37ec0a791fce58c9045e859b789583177283f824efc1b3825cee09ff052d26c436d80404a80a6

  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe

    Filesize

    1.3MB

    MD5

    04e53ae51944fe6883e73bc2fb5ca336

    SHA1

    47d7a49c3e85b4b67ce1d97ab30e96db713d15f1

    SHA256

    069b7a524e7b195c97dd1788ba107396e588019ce43a7ccb7104a9307914b0a0

    SHA512

    5e38d671d8f8fa3d95e34c33adfbdd5366b2a2a8874acef456c37ec0a791fce58c9045e859b789583177283f824efc1b3825cee09ff052d26c436d80404a80a6

  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe

    Filesize

    1.3MB

    MD5

    04e53ae51944fe6883e73bc2fb5ca336

    SHA1

    47d7a49c3e85b4b67ce1d97ab30e96db713d15f1

    SHA256

    069b7a524e7b195c97dd1788ba107396e588019ce43a7ccb7104a9307914b0a0

    SHA512

    5e38d671d8f8fa3d95e34c33adfbdd5366b2a2a8874acef456c37ec0a791fce58c9045e859b789583177283f824efc1b3825cee09ff052d26c436d80404a80a6

  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe

    Filesize

    1.3MB

    MD5

    04e53ae51944fe6883e73bc2fb5ca336

    SHA1

    47d7a49c3e85b4b67ce1d97ab30e96db713d15f1

    SHA256

    069b7a524e7b195c97dd1788ba107396e588019ce43a7ccb7104a9307914b0a0

    SHA512

    5e38d671d8f8fa3d95e34c33adfbdd5366b2a2a8874acef456c37ec0a791fce58c9045e859b789583177283f824efc1b3825cee09ff052d26c436d80404a80a6

  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe

    Filesize

    1.3MB

    MD5

    04e53ae51944fe6883e73bc2fb5ca336

    SHA1

    47d7a49c3e85b4b67ce1d97ab30e96db713d15f1

    SHA256

    069b7a524e7b195c97dd1788ba107396e588019ce43a7ccb7104a9307914b0a0

    SHA512

    5e38d671d8f8fa3d95e34c33adfbdd5366b2a2a8874acef456c37ec0a791fce58c9045e859b789583177283f824efc1b3825cee09ff052d26c436d80404a80a6

  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe

    Filesize

    1.3MB

    MD5

    04e53ae51944fe6883e73bc2fb5ca336

    SHA1

    47d7a49c3e85b4b67ce1d97ab30e96db713d15f1

    SHA256

    069b7a524e7b195c97dd1788ba107396e588019ce43a7ccb7104a9307914b0a0

    SHA512

    5e38d671d8f8fa3d95e34c33adfbdd5366b2a2a8874acef456c37ec0a791fce58c9045e859b789583177283f824efc1b3825cee09ff052d26c436d80404a80a6

  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe

    Filesize

    1.3MB

    MD5

    04e53ae51944fe6883e73bc2fb5ca336

    SHA1

    47d7a49c3e85b4b67ce1d97ab30e96db713d15f1

    SHA256

    069b7a524e7b195c97dd1788ba107396e588019ce43a7ccb7104a9307914b0a0

    SHA512

    5e38d671d8f8fa3d95e34c33adfbdd5366b2a2a8874acef456c37ec0a791fce58c9045e859b789583177283f824efc1b3825cee09ff052d26c436d80404a80a6

  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe

    Filesize

    1.3MB

    MD5

    04e53ae51944fe6883e73bc2fb5ca336

    SHA1

    47d7a49c3e85b4b67ce1d97ab30e96db713d15f1

    SHA256

    069b7a524e7b195c97dd1788ba107396e588019ce43a7ccb7104a9307914b0a0

    SHA512

    5e38d671d8f8fa3d95e34c33adfbdd5366b2a2a8874acef456c37ec0a791fce58c9045e859b789583177283f824efc1b3825cee09ff052d26c436d80404a80a6

  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe

    Filesize

    1.3MB

    MD5

    04e53ae51944fe6883e73bc2fb5ca336

    SHA1

    47d7a49c3e85b4b67ce1d97ab30e96db713d15f1

    SHA256

    069b7a524e7b195c97dd1788ba107396e588019ce43a7ccb7104a9307914b0a0

    SHA512

    5e38d671d8f8fa3d95e34c33adfbdd5366b2a2a8874acef456c37ec0a791fce58c9045e859b789583177283f824efc1b3825cee09ff052d26c436d80404a80a6

  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe

    Filesize

    1.3MB

    MD5

    04e53ae51944fe6883e73bc2fb5ca336

    SHA1

    47d7a49c3e85b4b67ce1d97ab30e96db713d15f1

    SHA256

    069b7a524e7b195c97dd1788ba107396e588019ce43a7ccb7104a9307914b0a0

    SHA512

    5e38d671d8f8fa3d95e34c33adfbdd5366b2a2a8874acef456c37ec0a791fce58c9045e859b789583177283f824efc1b3825cee09ff052d26c436d80404a80a6

  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe

    Filesize

    1.3MB

    MD5

    04e53ae51944fe6883e73bc2fb5ca336

    SHA1

    47d7a49c3e85b4b67ce1d97ab30e96db713d15f1

    SHA256

    069b7a524e7b195c97dd1788ba107396e588019ce43a7ccb7104a9307914b0a0

    SHA512

    5e38d671d8f8fa3d95e34c33adfbdd5366b2a2a8874acef456c37ec0a791fce58c9045e859b789583177283f824efc1b3825cee09ff052d26c436d80404a80a6

  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe

    Filesize

    1.3MB

    MD5

    04e53ae51944fe6883e73bc2fb5ca336

    SHA1

    47d7a49c3e85b4b67ce1d97ab30e96db713d15f1

    SHA256

    069b7a524e7b195c97dd1788ba107396e588019ce43a7ccb7104a9307914b0a0

    SHA512

    5e38d671d8f8fa3d95e34c33adfbdd5366b2a2a8874acef456c37ec0a791fce58c9045e859b789583177283f824efc1b3825cee09ff052d26c436d80404a80a6

  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe

    Filesize

    1.3MB

    MD5

    04e53ae51944fe6883e73bc2fb5ca336

    SHA1

    47d7a49c3e85b4b67ce1d97ab30e96db713d15f1

    SHA256

    069b7a524e7b195c97dd1788ba107396e588019ce43a7ccb7104a9307914b0a0

    SHA512

    5e38d671d8f8fa3d95e34c33adfbdd5366b2a2a8874acef456c37ec0a791fce58c9045e859b789583177283f824efc1b3825cee09ff052d26c436d80404a80a6

  • C:\Windows\SysWOW64\perfhost.exe

    Filesize

    1.2MB

    MD5

    0b3d696f5e36ed075c1ab0664b8e9bf1

    SHA1

    79bd9d9309871dffed05eb8da5ff935e647267ce

    SHA256

    13c084fc8b67d512805d7ebe85e022910c524a65065bf14f996552381e321c1b

    SHA512

    cbf9c3bdfa113126c486b8e87035fea962bfb9bd3bc03cfab4fd3ebc683a995865f98347af8d0bc70fcd9327701ed9adc0d16b6a313c903d895af457a538d129

  • C:\Windows\System32\Locator.exe

    Filesize

    1.2MB

    MD5

    5d5ea4c64d29c35f081a64946bfbdc34

    SHA1

    0dd7e99f011a2305943918150781831313f5f363

    SHA256

    b6e9ca4701596f1f9c95ab7243afaabb56d729a21dcf327f4af851e5ab590c66

    SHA512

    42031bfa85e417384f0b9940e2ac83c3a8c099595cf0ea79d289f7dff8ac9e4127a3f6d8edab54bf4171ca64ef8b75e4eb7029a1ca77a0002a21fa8a68f1bbb5

  • C:\Windows\System32\SearchIndexer.exe

    Filesize

    1.1MB

    MD5

    55988951a374cb13f3eb750738b9496e

    SHA1

    0f483cd000e9439eed221102ca405d19ab0ef1e3

    SHA256

    2ccf6057cfedd520509a4f4a4ab09b7c4629a90aa72de371e844e2b2085db893

    SHA512

    48afc9fe5bcf915e0fbb136baa630c282163408f0a0526ff0f631df656424402ae0e45de8930564a4dc99d957b5859c0522aa9119e89bea959141390679cd444

  • C:\Windows\System32\VSSVC.exe

    Filesize

    2.1MB

    MD5

    02222101965afa7603513f0e333ca532

    SHA1

    75dba90078afdad02aded4ae3fff358f29e37c8f

    SHA256

    db089b85dbccd8e49ec9b4411e98c07032ca62551059e51f579d317c31ec1d16

    SHA512

    7a3fd337559bbac7eaac73eab0035cea8e15a2153120d853d85ca83f11492fff7e32f80b5a9194cadffcdacfceba0ece6e5db8699dcff8abc73860619bfbe5d1

  • C:\Windows\System32\alg.exe

    Filesize

    1.3MB

    MD5

    9ee53c2390bf425fc320778e714d8a85

    SHA1

    2d41951ece81cc4960dcff31d46e0e89c91558e8

    SHA256

    0765bce1618b2084fba1ce02a5bb3708d5613913c74e71fd6f96105f65d16e81

    SHA512

    121330b13e2278f2011cf605a030714cb7a0ab4cdfc2937dfa198081aa26d1ff7ec0f950e9b7e6a9e8f9d643de06cb3d601625011a4070573579c154508e3771

  • C:\Windows\System32\dllhost.exe

    Filesize

    1.2MB

    MD5

    2f9fb54cfa8871461a286ebfd1f63dcb

    SHA1

    9c40f03aebcde57c531b112504ae642d4649a595

    SHA256

    a5039c1cebf6f2a6b9e62120ff80b8f7c669c5e1eb656795618cea678cf7ba83

    SHA512

    7350505906be563db69f4d8cbbfee1d932287c3271d73a46197cd0f2b2c166951d3d5ecb613e45f809aaa55dbd27266f396dfe2f54b798ce0963bb56b4af7370

  • C:\Windows\System32\ieetwcollector.exe

    Filesize

    1.3MB

    MD5

    9d711357bed8220769f30337272ef915

    SHA1

    93529f8168cce8b4db4bfb9d989a83bf285287e5

    SHA256

    c6a385a160cdb06ea28e559afd69b2d3116135110c53b7c854855a65a380caeb

    SHA512

    6af50180c278c02eeb3e8988ddf737e8ffb46a81d3ff792ff726979b47e0ba3fe201bef607bf6809b9900a3e12b5b38d57944e6a8c69515bd2433a92c5996375

  • C:\Windows\System32\msdtc.exe

    Filesize

    1.3MB

    MD5

    9780cb98c03df65e998ba20a5cfb4ecf

    SHA1

    f2bc9ad89e5370850c7af9f70e2d7fdc11590dd1

    SHA256

    9dc655ffe584c38ff6682c0dc9dc0cb3a32a38981bb20a355d492d916245b6f2

    SHA512

    18cb6e6c849cd25f5e290ce0e84c6f8c8d02e2a3434a94c06ec097ff7f5e9831b9307214a96b41252c23e1628de6b7dc442829a054833249332656b733cfbbda

  • C:\Windows\System32\msiexec.exe

    Filesize

    1.3MB

    MD5

    6f502f3107fbec76e792c9b1cfc3f23b

    SHA1

    8d4ce5cfe59d5b55d09372206eb109d7328808ca

    SHA256

    74c004e3fbb05e3d999580ab6bbfcccdfca4d56b3acf0cdfc80c40a4f11984b4

    SHA512

    6f884a5ad93037b9d7b4e4aae74f28b1949ae3345318e304f1e258a75e671d991b652901ccd39dee51c3dd7e36afc348240ea5c96c85cf5a521af733865d0793

  • C:\Windows\System32\snmptrap.exe

    Filesize

    1.2MB

    MD5

    e55a1cb2a289ac181be52c62d5ebdc4a

    SHA1

    fa258074e8a67c55dbc4e8a7bb41feb9c996215a

    SHA256

    ba54b0fb57ab6c34c52ca027dd75e1a5d9f1e1391ec35cdbc37c0d94a72e975a

    SHA512

    57715db1061655418cd558676be87632b494779e7dae11ccd7d24b5653b11b81fb7c847ef87d66e6159dcbfa342c738d9ff085b3a85cb52750fe64fd2d68fee2

  • C:\Windows\System32\vds.exe

    Filesize

    1.7MB

    MD5

    3cb5de8db32f1c1627da600342fa85e7

    SHA1

    2fb67b8bc519e19ea060cebc17591dc288933fc0

    SHA256

    d601a938a3df16c705a1b674ec10c24847d66f824542c52528f5da2dc8f23a03

    SHA512

    34a9f13dcf65330e8132d603704d37fa0389e66785da2ffdbd4267ac77829497ca9e72c4fce8a80422f4159c2f201a32aa0ff53cffaa14a4942af1a49badb825

  • C:\Windows\System32\wbem\WmiApSrv.exe

    Filesize

    1.4MB

    MD5

    ff4dd07a4bcbbbdf83b341668034b421

    SHA1

    980b36a9be9a94680f984f0a46fece6d17ce856e

    SHA256

    8a74dccee3dffcee71ffc6f51981b6b29dc3047d69a0b41a32bf6cea7b2393da

    SHA512

    45218c0ef46b062ac3cb5188d9b45a84012020530b195aea44d62b0f77116a3d66786c32265c7e7e30733fba26d2c8dd1818bf0b0ab1103efe2bf226f4f14ece

  • C:\Windows\System32\wbengine.exe

    Filesize

    2.0MB

    MD5

    7b3f4c6efa79c633271313450e857f46

    SHA1

    5fb703f5f65a2b0a5b12fcccb915e223baa14d81

    SHA256

    ef5ae753564201ccc4a69577894fbef24049509bb37b35ec5a7f5c132e063f9d

    SHA512

    d7bfcbbd98211e6737e96a0a71ba4b74c6df8a4f529b99e855223ad167ed6765915332a64749c7e37878c2347673b124787f223c50ebf28a6d7d796319e73511

  • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\f1a7ac664667f2d6bcd6c388b230c22b\Microsoft.VisualStudio.Tools.Applications.AddInAdapter.v9.0.ni.dll

    Filesize

    59KB

    MD5

    8c69bbdfbc8cc3fa3fa5edcd79901e94

    SHA1

    b8028f0f557692221d5c0160ec6ce414b2bdf19b

    SHA256

    a21471690e7c32c80049e17c13624820e77bca6c9c38b83d9ea8a7248086660d

    SHA512

    825f5b87b76303b62fc16a96b108fb1774c2aca52ac5e44cd0ac2fe2ee47d5d67947dfe7498e36bc849773f608ec5824711f8c36e375a378582eefb57c9c2557

  • C:\Windows\ehome\ehrecvr.exe

    Filesize

    1.2MB

    MD5

    d7c41f2efc794c62d95dd1b7d3d7f235

    SHA1

    cd7a623597bd252980008e40d0ade80376a333f5

    SHA256

    0bbdc49e05ab1702392ce704bda9a62fbe5e182a1736c847993036d28aff07e7

    SHA512

    fb0345a1bcfe61d500d935a569ef10a8881c012178dcdfdee567e2c5e66b4df2628aae7ef8c104fd23fa0ad0bdbd466c684fe9785b77902a56e0e9f8de480898

  • C:\Windows\ehome\ehsched.exe

    Filesize

    1.3MB

    MD5

    58f8d06e39d7563025eb4209cbc19a66

    SHA1

    2f7e70ce6bb4454aa0e9063e7427f55f767a8072

    SHA256

    e6e146df095b46258e44bd851e88863237cc4c4d1f13e8f7cf9c7283e60f8cc5

    SHA512

    929c5de89f44597453468514e3428f89ed2143b659a023ee1013faeb1a716d95894a8812ffc52f2c4f8fad8c2faeb3b24f59e92a00e747d57add2129e945c99a

  • C:\Windows\system32\msiexec.exe

    Filesize

    1.3MB

    MD5

    6f502f3107fbec76e792c9b1cfc3f23b

    SHA1

    8d4ce5cfe59d5b55d09372206eb109d7328808ca

    SHA256

    74c004e3fbb05e3d999580ab6bbfcccdfca4d56b3acf0cdfc80c40a4f11984b4

    SHA512

    6f884a5ad93037b9d7b4e4aae74f28b1949ae3345318e304f1e258a75e671d991b652901ccd39dee51c3dd7e36afc348240ea5c96c85cf5a521af733865d0793

  • \Program Files\Windows Media Player\wmpnetwk.exe

    Filesize

    2.0MB

    MD5

    b889a257eeebef754cb42e1c18e02610

    SHA1

    2e9b45a88a5488a15cef5be366479a105ffb3b52

    SHA256

    fd3f8ac03a3d33ab612d55ccf4953000c7b6292d7f8af19db46219f44525a228

    SHA512

    128ac7413a46ae06de46c9a8d9e0c30bd44a6059c85f7a48ec5ab0dc1e89cdf86d4f6147d75c1a6b3ccb9d016f5572a33c2fa241dfd83389d5c66559e02fd11d

  • \Program Files\Windows Media Player\wmpnetwk.exe

    Filesize

    2.0MB

    MD5

    b889a257eeebef754cb42e1c18e02610

    SHA1

    2e9b45a88a5488a15cef5be366479a105ffb3b52

    SHA256

    fd3f8ac03a3d33ab612d55ccf4953000c7b6292d7f8af19db46219f44525a228

    SHA512

    128ac7413a46ae06de46c9a8d9e0c30bd44a6059c85f7a48ec5ab0dc1e89cdf86d4f6147d75c1a6b3ccb9d016f5572a33c2fa241dfd83389d5c66559e02fd11d

  • \Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe

    Filesize

    1.3MB

    MD5

    e0e4856e5be5112d41079bc2ea6ac9b2

    SHA1

    ad978fe603c15efd1f221477dd335e6d86a5c347

    SHA256

    a73883175f0f34a50a3e94315e15f6400fbe436d1aea5ee8e27418178fe80fc3

    SHA512

    2b6bfd9ee231fccad918b2dddbb06a9ea2492e87c61c47fa4d3bdb3f088e65c56bdfdb618b1c3c1c74b489258b9797d3eb476e0f28b00f2cee4577bf6c50ad16

  • \Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe

    Filesize

    1.2MB

    MD5

    377cf47e1b89b59deedf2f0ea375344f

    SHA1

    bd6ffa32874941938b0de7982ca5d38f59352e75

    SHA256

    cf18510f279a7cdd90d5acb383777143aae147984263c3deb1fb095f0791146a

    SHA512

    1c6551136cafd4a4ec941f2afb90571ffd2742ca9732a4c8b85a7d038fa688f526def109bcbdf4ab1922f1f6daf552a9b2723db6a29be3f899fcc915fbb24842

  • \Windows\System32\Locator.exe

    Filesize

    1.2MB

    MD5

    5d5ea4c64d29c35f081a64946bfbdc34

    SHA1

    0dd7e99f011a2305943918150781831313f5f363

    SHA256

    b6e9ca4701596f1f9c95ab7243afaabb56d729a21dcf327f4af851e5ab590c66

    SHA512

    42031bfa85e417384f0b9940e2ac83c3a8c099595cf0ea79d289f7dff8ac9e4127a3f6d8edab54bf4171ca64ef8b75e4eb7029a1ca77a0002a21fa8a68f1bbb5

  • \Windows\System32\alg.exe

    Filesize

    1.3MB

    MD5

    9ee53c2390bf425fc320778e714d8a85

    SHA1

    2d41951ece81cc4960dcff31d46e0e89c91558e8

    SHA256

    0765bce1618b2084fba1ce02a5bb3708d5613913c74e71fd6f96105f65d16e81

    SHA512

    121330b13e2278f2011cf605a030714cb7a0ab4cdfc2937dfa198081aa26d1ff7ec0f950e9b7e6a9e8f9d643de06cb3d601625011a4070573579c154508e3771

  • \Windows\System32\dllhost.exe

    Filesize

    1.2MB

    MD5

    2f9fb54cfa8871461a286ebfd1f63dcb

    SHA1

    9c40f03aebcde57c531b112504ae642d4649a595

    SHA256

    a5039c1cebf6f2a6b9e62120ff80b8f7c669c5e1eb656795618cea678cf7ba83

    SHA512

    7350505906be563db69f4d8cbbfee1d932287c3271d73a46197cd0f2b2c166951d3d5ecb613e45f809aaa55dbd27266f396dfe2f54b798ce0963bb56b4af7370

  • \Windows\System32\ieetwcollector.exe

    Filesize

    1.3MB

    MD5

    9d711357bed8220769f30337272ef915

    SHA1

    93529f8168cce8b4db4bfb9d989a83bf285287e5

    SHA256

    c6a385a160cdb06ea28e559afd69b2d3116135110c53b7c854855a65a380caeb

    SHA512

    6af50180c278c02eeb3e8988ddf737e8ffb46a81d3ff792ff726979b47e0ba3fe201bef607bf6809b9900a3e12b5b38d57944e6a8c69515bd2433a92c5996375

  • \Windows\System32\msdtc.exe

    Filesize

    1.3MB

    MD5

    9780cb98c03df65e998ba20a5cfb4ecf

    SHA1

    f2bc9ad89e5370850c7af9f70e2d7fdc11590dd1

    SHA256

    9dc655ffe584c38ff6682c0dc9dc0cb3a32a38981bb20a355d492d916245b6f2

    SHA512

    18cb6e6c849cd25f5e290ce0e84c6f8c8d02e2a3434a94c06ec097ff7f5e9831b9307214a96b41252c23e1628de6b7dc442829a054833249332656b733cfbbda

  • \Windows\System32\msiexec.exe

    Filesize

    1.3MB

    MD5

    6f502f3107fbec76e792c9b1cfc3f23b

    SHA1

    8d4ce5cfe59d5b55d09372206eb109d7328808ca

    SHA256

    74c004e3fbb05e3d999580ab6bbfcccdfca4d56b3acf0cdfc80c40a4f11984b4

    SHA512

    6f884a5ad93037b9d7b4e4aae74f28b1949ae3345318e304f1e258a75e671d991b652901ccd39dee51c3dd7e36afc348240ea5c96c85cf5a521af733865d0793

  • \Windows\System32\msiexec.exe

    Filesize

    1.3MB

    MD5

    6f502f3107fbec76e792c9b1cfc3f23b

    SHA1

    8d4ce5cfe59d5b55d09372206eb109d7328808ca

    SHA256

    74c004e3fbb05e3d999580ab6bbfcccdfca4d56b3acf0cdfc80c40a4f11984b4

    SHA512

    6f884a5ad93037b9d7b4e4aae74f28b1949ae3345318e304f1e258a75e671d991b652901ccd39dee51c3dd7e36afc348240ea5c96c85cf5a521af733865d0793

  • \Windows\System32\snmptrap.exe

    Filesize

    1.2MB

    MD5

    e55a1cb2a289ac181be52c62d5ebdc4a

    SHA1

    fa258074e8a67c55dbc4e8a7bb41feb9c996215a

    SHA256

    ba54b0fb57ab6c34c52ca027dd75e1a5d9f1e1391ec35cdbc37c0d94a72e975a

    SHA512

    57715db1061655418cd558676be87632b494779e7dae11ccd7d24b5653b11b81fb7c847ef87d66e6159dcbfa342c738d9ff085b3a85cb52750fe64fd2d68fee2

  • \Windows\System32\wbem\WmiApSrv.exe

    Filesize

    1.4MB

    MD5

    ff4dd07a4bcbbbdf83b341668034b421

    SHA1

    980b36a9be9a94680f984f0a46fece6d17ce856e

    SHA256

    8a74dccee3dffcee71ffc6f51981b6b29dc3047d69a0b41a32bf6cea7b2393da

    SHA512

    45218c0ef46b062ac3cb5188d9b45a84012020530b195aea44d62b0f77116a3d66786c32265c7e7e30733fba26d2c8dd1818bf0b0ab1103efe2bf226f4f14ece

  • \Windows\System32\wbengine.exe

    Filesize

    2.0MB

    MD5

    7b3f4c6efa79c633271313450e857f46

    SHA1

    5fb703f5f65a2b0a5b12fcccb915e223baa14d81

    SHA256

    ef5ae753564201ccc4a69577894fbef24049509bb37b35ec5a7f5c132e063f9d

    SHA512

    d7bfcbbd98211e6737e96a0a71ba4b74c6df8a4f529b99e855223ad167ed6765915332a64749c7e37878c2347673b124787f223c50ebf28a6d7d796319e73511

  • \Windows\ehome\ehrecvr.exe

    Filesize

    1.2MB

    MD5

    d7c41f2efc794c62d95dd1b7d3d7f235

    SHA1

    cd7a623597bd252980008e40d0ade80376a333f5

    SHA256

    0bbdc49e05ab1702392ce704bda9a62fbe5e182a1736c847993036d28aff07e7

    SHA512

    fb0345a1bcfe61d500d935a569ef10a8881c012178dcdfdee567e2c5e66b4df2628aae7ef8c104fd23fa0ad0bdbd466c684fe9785b77902a56e0e9f8de480898

  • \Windows\ehome\ehsched.exe

    Filesize

    1.3MB

    MD5

    58f8d06e39d7563025eb4209cbc19a66

    SHA1

    2f7e70ce6bb4454aa0e9063e7427f55f767a8072

    SHA256

    e6e146df095b46258e44bd851e88863237cc4c4d1f13e8f7cf9c7283e60f8cc5

    SHA512

    929c5de89f44597453468514e3428f89ed2143b659a023ee1013faeb1a716d95894a8812ffc52f2c4f8fad8c2faeb3b24f59e92a00e747d57add2129e945c99a

  • memory/828-132-0x0000000140000000-0x00000001401F1000-memory.dmp

    Filesize

    1.9MB

  • memory/828-174-0x0000000140000000-0x00000001401F1000-memory.dmp

    Filesize

    1.9MB

  • memory/828-143-0x0000000000830000-0x0000000000890000-memory.dmp

    Filesize

    384KB

  • memory/1600-144-0x0000000001430000-0x0000000001431000-memory.dmp

    Filesize

    4KB

  • memory/1600-180-0x0000000001430000-0x0000000001431000-memory.dmp

    Filesize

    4KB

  • memory/1600-166-0x0000000140000000-0x000000014013C000-memory.dmp

    Filesize

    1.2MB

  • memory/1600-126-0x0000000000860000-0x00000000008C0000-memory.dmp

    Filesize

    384KB

  • memory/1600-125-0x0000000000860000-0x00000000008C0000-memory.dmp

    Filesize

    384KB

  • memory/1600-118-0x0000000140000000-0x000000014013C000-memory.dmp

    Filesize

    1.2MB

  • memory/1600-119-0x0000000000860000-0x00000000008C0000-memory.dmp

    Filesize

    384KB

  • memory/1664-169-0x0000000000400000-0x00000000005E7000-memory.dmp

    Filesize

    1.9MB

  • memory/1664-178-0x0000000074690000-0x0000000074D7E000-memory.dmp

    Filesize

    6.9MB

  • memory/1664-176-0x00000000006D0000-0x0000000000737000-memory.dmp

    Filesize

    412KB

  • memory/1664-196-0x0000000000400000-0x00000000005E7000-memory.dmp

    Filesize

    1.9MB

  • memory/1664-200-0x0000000000400000-0x00000000005E7000-memory.dmp

    Filesize

    1.9MB

  • memory/1664-201-0x0000000074690000-0x0000000074D7E000-memory.dmp

    Filesize

    6.9MB

  • memory/1800-94-0x00000000001E0000-0x0000000000240000-memory.dmp

    Filesize

    384KB

  • memory/1800-148-0x0000000140000000-0x00000001401ED000-memory.dmp

    Filesize

    1.9MB

  • memory/1800-87-0x00000000001E0000-0x0000000000240000-memory.dmp

    Filesize

    384KB

  • memory/1800-88-0x0000000140000000-0x00000001401ED000-memory.dmp

    Filesize

    1.9MB

  • memory/2008-198-0x0000000000230000-0x0000000000297000-memory.dmp

    Filesize

    412KB

  • memory/2008-218-0x0000000000400000-0x00000000005E7000-memory.dmp

    Filesize

    1.9MB

  • memory/2008-197-0x0000000000400000-0x00000000005E7000-memory.dmp

    Filesize

    1.9MB

  • memory/2008-216-0x0000000074690000-0x0000000074D7E000-memory.dmp

    Filesize

    6.9MB

  • memory/2008-202-0x0000000074690000-0x0000000074D7E000-memory.dmp

    Filesize

    6.9MB

  • memory/2196-85-0x0000000010000000-0x00000000101E6000-memory.dmp

    Filesize

    1.9MB

  • memory/2196-54-0x0000000000300000-0x0000000000360000-memory.dmp

    Filesize

    384KB

  • memory/2196-48-0x0000000010000000-0x00000000101E6000-memory.dmp

    Filesize

    1.9MB

  • memory/2196-47-0x0000000000300000-0x0000000000360000-memory.dmp

    Filesize

    384KB

  • memory/2460-6-0x0000000000950000-0x00000000009B7000-memory.dmp

    Filesize

    412KB

  • memory/2460-73-0x0000000000400000-0x00000000005DD000-memory.dmp

    Filesize

    1.9MB

  • memory/2460-7-0x0000000000950000-0x00000000009B7000-memory.dmp

    Filesize

    412KB

  • memory/2460-1-0x0000000000950000-0x00000000009B7000-memory.dmp

    Filesize

    412KB

  • memory/2460-0-0x0000000000400000-0x00000000005DD000-memory.dmp

    Filesize

    1.9MB

  • memory/2488-105-0x00000000008F0000-0x0000000000950000-memory.dmp

    Filesize

    384KB

  • memory/2488-159-0x0000000100000000-0x00000001001D4000-memory.dmp

    Filesize

    1.8MB

  • memory/2488-113-0x00000000008F0000-0x0000000000950000-memory.dmp

    Filesize

    384KB

  • memory/2488-107-0x0000000100000000-0x00000001001D4000-memory.dmp

    Filesize

    1.8MB

  • memory/2592-37-0x0000000000270000-0x00000000002D7000-memory.dmp

    Filesize

    412KB

  • memory/2592-30-0x0000000010000000-0x00000000101DE000-memory.dmp

    Filesize

    1.9MB

  • memory/2592-63-0x0000000010000000-0x00000000101DE000-memory.dmp

    Filesize

    1.9MB

  • memory/2592-31-0x0000000000270000-0x00000000002D7000-memory.dmp

    Filesize

    412KB

  • memory/2648-236-0x0000000000270000-0x00000000002D7000-memory.dmp

    Filesize

    412KB

  • memory/2648-255-0x0000000000400000-0x00000000005E7000-memory.dmp

    Filesize

    1.9MB

  • memory/2648-254-0x0000000074690000-0x0000000074D7E000-memory.dmp

    Filesize

    6.9MB

  • memory/2648-241-0x0000000074690000-0x0000000074D7E000-memory.dmp

    Filesize

    6.9MB

  • memory/2648-229-0x0000000000400000-0x00000000005E7000-memory.dmp

    Filesize

    1.9MB

  • memory/2736-25-0x00000000008D0000-0x0000000000930000-memory.dmp

    Filesize

    384KB

  • memory/2736-18-0x0000000140000000-0x00000001401DC000-memory.dmp

    Filesize

    1.9MB

  • memory/2736-17-0x00000000008D0000-0x0000000000930000-memory.dmp

    Filesize

    384KB

  • memory/2736-104-0x0000000140000000-0x00000001401DC000-memory.dmp

    Filesize

    1.9MB

  • memory/2756-96-0x0000000100000000-0x00000001001E3000-memory.dmp

    Filesize

    1.9MB

  • memory/2756-13-0x0000000100000000-0x00000001001E3000-memory.dmp

    Filesize

    1.9MB

  • memory/2792-184-0x000007FEF4B90000-0x000007FEF552D000-memory.dmp

    Filesize

    9.6MB

  • memory/2792-162-0x000007FEF4B90000-0x000007FEF552D000-memory.dmp

    Filesize

    9.6MB

  • memory/2792-163-0x0000000000D00000-0x0000000000D80000-memory.dmp

    Filesize

    512KB

  • memory/2792-164-0x000007FEF4B90000-0x000007FEF552D000-memory.dmp

    Filesize

    9.6MB

  • memory/2792-179-0x0000000000D00000-0x0000000000D80000-memory.dmp

    Filesize

    512KB

  • memory/2792-182-0x000007FEF4B90000-0x000007FEF552D000-memory.dmp

    Filesize

    9.6MB

  • memory/2792-211-0x0000000000D00000-0x0000000000D80000-memory.dmp

    Filesize

    512KB

  • memory/2792-183-0x0000000000D00000-0x0000000000D80000-memory.dmp

    Filesize

    512KB

  • memory/2796-75-0x0000000000290000-0x00000000002F7000-memory.dmp

    Filesize

    412KB

  • memory/2796-68-0x0000000000290000-0x00000000002F7000-memory.dmp

    Filesize

    412KB

  • memory/2796-67-0x0000000000400000-0x00000000005E7000-memory.dmp

    Filesize

    1.9MB

  • memory/2796-141-0x0000000000400000-0x00000000005E7000-memory.dmp

    Filesize

    1.9MB

  • memory/2976-244-0x0000000000400000-0x00000000005E7000-memory.dmp

    Filesize

    1.9MB

  • memory/2976-256-0x0000000074690000-0x0000000074D7E000-memory.dmp

    Filesize

    6.9MB

  • memory/2976-250-0x00000000007C0000-0x0000000000827000-memory.dmp

    Filesize

    412KB

  • memory/3036-213-0x00000000002E0000-0x0000000000347000-memory.dmp

    Filesize

    412KB

  • memory/3036-240-0x0000000000400000-0x00000000005E7000-memory.dmp

    Filesize

    1.9MB

  • memory/3036-239-0x0000000074690000-0x0000000074D7E000-memory.dmp

    Filesize

    6.9MB

  • memory/3036-226-0x0000000074690000-0x0000000074D7E000-memory.dmp

    Filesize

    6.9MB

  • memory/3036-205-0x0000000000400000-0x00000000005E7000-memory.dmp

    Filesize

    1.9MB

  • memory/3048-151-0x0000000140000000-0x0000000140237000-memory.dmp

    Filesize

    2.2MB

  • memory/3048-157-0x00000000008D0000-0x0000000000930000-memory.dmp

    Filesize

    384KB

  • memory/3048-181-0x0000000140000000-0x0000000140237000-memory.dmp

    Filesize

    2.2MB