Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    06/11/2023, 20:37

General

  • Target

    NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe

  • Size

    1.5MB

  • MD5

    c756d2db2d9644bb7199eff3df3e6254

  • SHA1

    3eaf410412e26e30381b435d0a765c668e9eab8a

  • SHA256

    7f96f91bb08b71cfc13d95db38f3035a4efa1a0e835683e2b165488ee4d929fe

  • SHA512

    04079c2dae1fee2c85f33b915669e7ff754e3811dced4e8b3fd36bc7d1dcc70db124f18242e896f860788f905e4235e863569253e28c070dde6e0d9c681c4bc6

  • SSDEEP

    24576:T2/r48zC6/TwSfVcYG3K/cJHlnFR+IGNe8j3Iz:a/08m6LNiXicJFFRGNzj3

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 30 IoCs
  • Loads dropped DLL 15 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in System32 directory 17 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 28 IoCs
  • Modifies data under HKEY_USERS 37 IoCs
  • Suspicious behavior: EnumeratesProcesses 26 IoCs
  • Suspicious use of AdjustPrivilegeToken 30 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe"
    1⤵
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1688
  • C:\Windows\System32\alg.exe
    C:\Windows\System32\alg.exe
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    PID:2704
  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe
    C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe
    1⤵
    • Executes dropped EXE
    PID:2244
  • C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe
    C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe
    1⤵
    • Executes dropped EXE
    • Drops file in Windows directory
    PID:2740
  • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe
    C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe
    1⤵
    • Executes dropped EXE
    • Drops file in Windows directory
    PID:2640
  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
    C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
    1⤵
    • Executes dropped EXE
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:548
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1ec -InterruptEvent 1d8 -NGENProcess 1dc -Pipe 1e8 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:980
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1e4 -InterruptEvent 254 -NGENProcess 25c -Pipe 260 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2652
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 254 -InterruptEvent 250 -NGENProcess 1f4 -Pipe 24c -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2772
  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
    C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
    1⤵
    • Executes dropped EXE
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:2908
  • C:\Windows\system32\dllhost.exe
    C:\Windows\system32\dllhost.exe /Processid:{02D4B3F1-FD88-11D1-960D-00805FC79235}
    1⤵
    • Executes dropped EXE
    • Drops file in Windows directory
    PID:1752
  • C:\Windows\ehome\ehRecvr.exe
    C:\Windows\ehome\ehRecvr.exe
    1⤵
    • Executes dropped EXE
    • Modifies data under HKEY_USERS
    PID:1644
  • C:\Windows\ehome\ehsched.exe
    C:\Windows\ehome\ehsched.exe
    1⤵
    • Executes dropped EXE
    PID:620
  • C:\Windows\eHome\EhTray.exe
    "C:\Windows\eHome\EhTray.exe" /nav:-2
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:2420
  • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
    "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
    1⤵
    • Executes dropped EXE
    PID:2296
  • C:\Windows\system32\IEEtwCollector.exe
    C:\Windows\system32\IEEtwCollector.exe /V
    1⤵
    • Executes dropped EXE
    PID:1704
  • C:\Windows\ehome\ehRec.exe
    C:\Windows\ehome\ehRec.exe -Embedding
    1⤵
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1336
  • C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE" /auditservice
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Modifies data under HKEY_USERS
    PID:1052
  • C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe
    "C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"
    1⤵
    • Executes dropped EXE
    • Drops file in Program Files directory
    PID:2292
  • C:\Windows\System32\msdtc.exe
    C:\Windows\System32\msdtc.exe
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Drops file in Windows directory
    PID:344
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Suspicious use of AdjustPrivilegeToken
    PID:2848
  • C:\Program Files (x86)\Common Files\Microsoft Shared\Source Engine\OSE.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\Source Engine\OSE.EXE"
    1⤵
    • Executes dropped EXE
    PID:2592
  • C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE
    "C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"
    1⤵
    • Executes dropped EXE
    • Modifies data under HKEY_USERS
    PID:2248
  • C:\Windows\SysWow64\perfhost.exe
    C:\Windows\SysWow64\perfhost.exe
    1⤵
    • Executes dropped EXE
    PID:1192
  • C:\Windows\system32\locator.exe
    C:\Windows\system32\locator.exe
    1⤵
    • Executes dropped EXE
    PID:1960
  • C:\Windows\System32\snmptrap.exe
    C:\Windows\System32\snmptrap.exe
    1⤵
    • Executes dropped EXE
    PID:1404
  • C:\Windows\System32\vds.exe
    C:\Windows\System32\vds.exe
    1⤵
    • Executes dropped EXE
    PID:1972
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    PID:2200
  • C:\Windows\system32\wbengine.exe
    "C:\Windows\system32\wbengine.exe"
    1⤵
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    PID:860
  • C:\Windows\system32\wbem\WmiApSrv.exe
    C:\Windows\system32\wbem\WmiApSrv.exe
    1⤵
    • Executes dropped EXE
    PID:2696
  • C:\Program Files\Windows Media Player\wmpnetwk.exe
    "C:\Program Files\Windows Media Player\wmpnetwk.exe"
    1⤵
    • Executes dropped EXE
    • Modifies data under HKEY_USERS
    • Suspicious use of AdjustPrivilegeToken
    PID:2004
  • C:\Windows\system32\SearchIndexer.exe
    C:\Windows\system32\SearchIndexer.exe /Embedding
    1⤵
    • Executes dropped EXE
    PID:2972

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Common Files\microsoft shared\Source Engine\OSE.EXE

    Filesize

    1.4MB

    MD5

    0058a7d069b4b2e521f96fec2c8da5e0

    SHA1

    afe825bb5a2feb7a9d5c4c9b90bc0f70759d292d

    SHA256

    b74d08a8c30888a359557e9dd0e3ae50738e3255ff8fac1fe4efa0d7e1265e31

    SHA512

    48d97ad0454d42f0920aa5f8e7f7064f65e0ccee3be828780518c5489dfd1247fd7673e9eaf47622b27e6bcc70606856f90c254b98c62d5b3e7f898cd6809fc0

  • C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE

    Filesize

    30.1MB

    MD5

    35c42030f4450a76f1dacff3716be223

    SHA1

    a2707954a0723aee2a8cde112a4db09052b748a3

    SHA256

    81b0b239db1973d0d567d5cc96966f7a3521e20b3072a0002c2872ac8dcc2ef4

    SHA512

    16573d3e2376f8d5f78f8b5151713f70a7e976a5496239ee7078da9f4bbfad0cd4a77ce925e400a1d0589580ac0bbbd1bd11906ae452160357154882def9f222

  • C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe

    Filesize

    1.4MB

    MD5

    7d371b947cab435aedd373080f5c85fa

    SHA1

    0563b80c8353516be2a9b319cbae200a632e6857

    SHA256

    8ab0f78edf428050f500e8f161cfb40ad3ca7500ab39273613d7a386688754ea

    SHA512

    b3e409c07a69794bc9b0e4211a3221928cf4291b394aec1587198df65c283ce2f6e932d4f0aef86b1718fe0bfa13188b2a9710d9cdb41f9163eb106253583eee

  • C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE

    Filesize

    5.2MB

    MD5

    35e192df18f33e45c00bf54df8ea9526

    SHA1

    5e868f36198bdf765a32ad80a8b80204964522d2

    SHA256

    f319bbeca4ba89b9a85f230875bcfdd0225231b07f32c57a3e2aff3395f9dde8

    SHA512

    4f0ea7275417fb9a8da82814f900352ba84808d9e2f9c6e5a82cd085cca8164a69075ed85ef49544b79c94cf556f6e6712990cfead4e103de9517d50545197a1

  • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe

    Filesize

    2.1MB

    MD5

    b3bc40feb588743c83fd747a223471ac

    SHA1

    09969e95b68f0044890c6fd314166daf12413814

    SHA256

    4ae873ea07fabfb336d597e924e7218c3dfe85a6b1fb6ac23706666cfe7b7508

    SHA512

    8abef5777993e27e074b5182b5b9c14853488a25710150407b599671cba604631ae38b45dfcbc4c7e3805d1c8add9521a3f9142c0901e0a7efe888bb5774e517

  • C:\Program Files\Windows Media Player\wmpnetwk.exe

    Filesize

    2.0MB

    MD5

    d293e4679508669ee07d359b9bdd6ee7

    SHA1

    50aa87cc37de8c5ddb7f98b9599790e7e2741ed7

    SHA256

    4423577ef03e15343c5398acf1972cd869249673b30fc8b9c34cdc75ee683af3

    SHA512

    f3c14ae4ea06affa95e1cd26da5ee877fa23e4a3deb5630aac409dc57b487bb91f0227ed2ac9c480d9bfe17778f25cee0888515da83fcd4a8566de3ef790246b

  • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe

    Filesize

    1.3MB

    MD5

    353c60a32bc555fcf8ac10c1c12f6d72

    SHA1

    5c83e7652abdc50b5801f7acfb0c28f6138284a7

    SHA256

    c119382e915b43ca3e3067d5ad3bd7aaac35f8b116cae59cdd6a504bad917138

    SHA512

    153f59228a3d141707a01deb2b1fd42271e2cd4339bc72642088167ac3c755dd25214794c2464642e85bac08237ab857e4865075418ea597fd9609722a2dd075

  • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe

    Filesize

    1.3MB

    MD5

    353c60a32bc555fcf8ac10c1c12f6d72

    SHA1

    5c83e7652abdc50b5801f7acfb0c28f6138284a7

    SHA256

    c119382e915b43ca3e3067d5ad3bd7aaac35f8b116cae59cdd6a504bad917138

    SHA512

    153f59228a3d141707a01deb2b1fd42271e2cd4339bc72642088167ac3c755dd25214794c2464642e85bac08237ab857e4865075418ea597fd9609722a2dd075

  • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ngen_service.log

    Filesize

    872KB

    MD5

    095e1499e59161f14c3aa97ce37e6808

    SHA1

    b57266a6e72155835acfafee7c6b95cb43864783

    SHA256

    f63f014fd54325ba01aa00f6b1b7c08d58a8230cb8a45dbdbd81f12aed348b5d

    SHA512

    2cbba7c6826ffe808ee74e644b29cf39309fab85b0bec7834dfcaa163ba9a52e27d587009fd9af8e5168a783186b9bd498dc0b54827f66df88e7d28cd8d5c845

  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe

    Filesize

    1.3MB

    MD5

    664868dc1b5fd6c79052e8e7aac7aa1f

    SHA1

    9dc48a49e7c236ac9c8fb194509d2ee904650f23

    SHA256

    fd6065246b076dcdbccebef4943395cf3f15cb258f1626602e96fef01e8c282f

    SHA512

    1d54cce362b9e074b68f11f0ce97ce5ee8efb75b2320e8bffd87f42522cae1cf19a2f589fc07e3c1b365bd39ab4a6a55eb15c20aa4868b6e8dac32e5cab75395

  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe

    Filesize

    1.3MB

    MD5

    21ec8add15c4d6dbf2f9572e92ad9a2f

    SHA1

    413599b69b9357699f96a798f3c20d372bf2ac5a

    SHA256

    5513f77039c29f083aff30f5c7d81999ace345407ad65fa0967cd765a67a65b6

    SHA512

    13fc46bc145da036b3f8200424a8a31ececbc3527927aa9b719e772f93569ed93b1d92305f52989de497e08e811114f0ec807d89bedfdf716d84085fd4e84cc8

  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe

    Filesize

    1.3MB

    MD5

    21ec8add15c4d6dbf2f9572e92ad9a2f

    SHA1

    413599b69b9357699f96a798f3c20d372bf2ac5a

    SHA256

    5513f77039c29f083aff30f5c7d81999ace345407ad65fa0967cd765a67a65b6

    SHA512

    13fc46bc145da036b3f8200424a8a31ececbc3527927aa9b719e772f93569ed93b1d92305f52989de497e08e811114f0ec807d89bedfdf716d84085fd4e84cc8

  • C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe

    Filesize

    1.3MB

    MD5

    3b33840fbdd9b4d05588cfb0ca986b67

    SHA1

    dbff8b11e264845fe5bf021642bb80b0ff29e6af

    SHA256

    e32f3d3632ce85daefecac08cd580397d2c64020d1b20b79828b57928a8ef7bd

    SHA512

    716081536612abf666e80c45b12dc8e04dc1fb2b1cea15ec7bae6f735212640ead83fa51b39cfd829540abc08ebc6fec31da818f2ae6a18c78395826489a15c8

  • C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe

    Filesize

    1.3MB

    MD5

    3b33840fbdd9b4d05588cfb0ca986b67

    SHA1

    dbff8b11e264845fe5bf021642bb80b0ff29e6af

    SHA256

    e32f3d3632ce85daefecac08cd580397d2c64020d1b20b79828b57928a8ef7bd

    SHA512

    716081536612abf666e80c45b12dc8e04dc1fb2b1cea15ec7bae6f735212640ead83fa51b39cfd829540abc08ebc6fec31da818f2ae6a18c78395826489a15c8

  • C:\Windows\Microsoft.NET\Framework\v2.0.50727\ngen_service.log

    Filesize

    1003KB

    MD5

    00c0611a168ad6ce273d92d6c2775680

    SHA1

    ecffb1f36574a13edca3a23833a8679b951ce76b

    SHA256

    d05bd94e0e1731e23618512a567d3fd25436f2c2d67918818c4ca46b7b974084

    SHA512

    73cd882ad0d46db72249a53f8c8a8522b6e2b1d85a6dc8a2ead759161ff6d05df1d862edfbd416c240fa1339901d0284e219c8b6345e407029f2724b873b85e7

  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe

    Filesize

    1.3MB

    MD5

    3674c98c7ef8a5fda91efddc8c1f80c7

    SHA1

    c6ef1ffc7d13205bb7b26594168e1417c981bb8b

    SHA256

    8936ca9534a612da4f84ef40ba9e2ea7d3ad840da38ff4f9e2560878f9c156b8

    SHA512

    eadf3ab370c334f174fd1b16209f54d60dc6910e1b11810e85662f7a89fda2117a7285ea115c75e88bbec514cd37adb397963d59af66ba3e4c20a125e2833c2f

  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe

    Filesize

    1.3MB

    MD5

    3674c98c7ef8a5fda91efddc8c1f80c7

    SHA1

    c6ef1ffc7d13205bb7b26594168e1417c981bb8b

    SHA256

    8936ca9534a612da4f84ef40ba9e2ea7d3ad840da38ff4f9e2560878f9c156b8

    SHA512

    eadf3ab370c334f174fd1b16209f54d60dc6910e1b11810e85662f7a89fda2117a7285ea115c75e88bbec514cd37adb397963d59af66ba3e4c20a125e2833c2f

  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe

    Filesize

    1.3MB

    MD5

    3674c98c7ef8a5fda91efddc8c1f80c7

    SHA1

    c6ef1ffc7d13205bb7b26594168e1417c981bb8b

    SHA256

    8936ca9534a612da4f84ef40ba9e2ea7d3ad840da38ff4f9e2560878f9c156b8

    SHA512

    eadf3ab370c334f174fd1b16209f54d60dc6910e1b11810e85662f7a89fda2117a7285ea115c75e88bbec514cd37adb397963d59af66ba3e4c20a125e2833c2f

  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe

    Filesize

    1.3MB

    MD5

    3674c98c7ef8a5fda91efddc8c1f80c7

    SHA1

    c6ef1ffc7d13205bb7b26594168e1417c981bb8b

    SHA256

    8936ca9534a612da4f84ef40ba9e2ea7d3ad840da38ff4f9e2560878f9c156b8

    SHA512

    eadf3ab370c334f174fd1b16209f54d60dc6910e1b11810e85662f7a89fda2117a7285ea115c75e88bbec514cd37adb397963d59af66ba3e4c20a125e2833c2f

  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe

    Filesize

    1.3MB

    MD5

    3674c98c7ef8a5fda91efddc8c1f80c7

    SHA1

    c6ef1ffc7d13205bb7b26594168e1417c981bb8b

    SHA256

    8936ca9534a612da4f84ef40ba9e2ea7d3ad840da38ff4f9e2560878f9c156b8

    SHA512

    eadf3ab370c334f174fd1b16209f54d60dc6910e1b11810e85662f7a89fda2117a7285ea115c75e88bbec514cd37adb397963d59af66ba3e4c20a125e2833c2f

  • C:\Windows\SysWOW64\perfhost.exe

    Filesize

    1.2MB

    MD5

    c9e6b05f77a085014b47ef87aa4d45d1

    SHA1

    de2768d2c176104d5ad6e95a68a6336e3d332722

    SHA256

    b8d6b352988d4afab5e760cf5838f0479e68cd59be2f9b9d6d9520041af5936e

    SHA512

    38c813617d5b40a0e6f358c1dfb121d3fbb4165615bb8a31df45e53cf5ed9b81909ae77454487251011e2b477021914a09ff4b9a129988d61548e597d25704ad

  • C:\Windows\System32\Locator.exe

    Filesize

    1.2MB

    MD5

    881b66d3a6e0fd2400dc5d46fa010af7

    SHA1

    95f6977d2189ae4cd345370071a27b94752d7534

    SHA256

    8db2317e6de578be0d937d8b5c23fccc6198de9396b6a28d64a71b7bcf78f695

    SHA512

    13ef577324bbfc6b7380ca797fe59ce22acf24c1d1019f692ab009c50cae6e6e028f5893232f1075ee4995a68aebdb914f7b72f70f939b7b30eebaccb0d4366a

  • C:\Windows\System32\SearchIndexer.exe

    Filesize

    1.1MB

    MD5

    941023ea4c2b7b6d11f147f1ecd40d44

    SHA1

    918a3d88a345c7f16603d075b910735d53af2835

    SHA256

    04bad48d7e81c237ef798bd7fcb860b4d45aa070fdbea2a812f368bf6534ebcc

    SHA512

    523e2bec271e4f8e7917f80294133fb80eecb9094cbbbba83245fd6f46f03786f2514daae7e504cc7c4dcb6a9fc953bdc8cf9257aeac0c72578f4ac211b735d5

  • C:\Windows\System32\VSSVC.exe

    Filesize

    2.1MB

    MD5

    d51c24f259f3bbc33af809da0c9ab8a7

    SHA1

    e30f406f4227752b0798299ec0c37043e463f693

    SHA256

    1669e45222a4c5a672e415e753aeb8573ac36a645a5aa0bfa1815fb6de4428bf

    SHA512

    e7eaebbe2db3724581c2e994c2e4d0c9cc24f05b7f543052dd75d38a978d3ad410468282e7260f3aafff86f3bfd094689ebfd6a84f0df42bca7fab0c0fca16e4

  • C:\Windows\System32\alg.exe

    Filesize

    1.3MB

    MD5

    a8442c3330c2982a97fb9fb509245639

    SHA1

    2dfc57bc5a1287f1ffb7a9e668a55302d183aa4d

    SHA256

    53a5cd2e2d1d22024ed6a6d1c3e0a2bd0cce0c20fad2509f9ccfa9ac096fdf1c

    SHA512

    0b4fa7f8526ee16f73ba2f30a8c2d65ac2ea56abd537e3542809660a70f5c35543f8c045895933490133c6c40e33462ffd2a00df7cd5b0c3c1b2f8f78641d334

  • C:\Windows\System32\dllhost.exe

    Filesize

    1.2MB

    MD5

    ef968d15946b59fbcb4d4150e53ecbe9

    SHA1

    c55a334c1b12e6426f3c61067def969d0d20a915

    SHA256

    0d0b8cc9664f1554a0f940e0fad43054bcd028390a100d80f38bab7f0763e453

    SHA512

    6c2cb4d5ef6785f6bfa0997060001729e77328a740c97655016730c31f11281531ed4c79e5af1685120a910d14b9d4e55c42b64d95c738f65ed9d6e86a913655

  • C:\Windows\System32\ieetwcollector.exe

    Filesize

    1.3MB

    MD5

    45f376fdf7af18a80786e4aa0a7c44b7

    SHA1

    ac6da0b2b8f43edf9b5926436fd6f4c685dcb114

    SHA256

    12e93228a7bfd9453cf56eaeaef9d7491125867cffa445a9dd194b3d8b9e804c

    SHA512

    6be49b6b2aa23531a8ce358c5c08c30cc60d64aed482ab2ef956a257bdcdccf037824e4f9576342149933d3bc924effd1804d830f06b745d03e9c0efe1177af4

  • C:\Windows\System32\msdtc.exe

    Filesize

    1.4MB

    MD5

    8e249ea2d13a17092fb35febdb1e21e5

    SHA1

    48571118ca6c4b037d7ff1e93b139c871ad51eaa

    SHA256

    404c99b9d7f7a8ba9b0a3b5066e0fa1406ea62c3023488ab373496c5941f88b9

    SHA512

    d7e54ea1a705bb75a4894b650214f7fe9a7f6d416dd881c713692ddab044ec53dceeb111a55eea8f007d911f598e20fe4a7f46e5e16cef7c26997fc8cd67345c

  • C:\Windows\System32\msiexec.exe

    Filesize

    1.3MB

    MD5

    7c5394962bb12ee64c1a2d1d2df6e69c

    SHA1

    138bf2adbaaab39810bc67e82a70115044c69a80

    SHA256

    abbc5386fc8ce0fb2e5367352b7aabe884484eeb2aabfea6be149b3dbb92e4cf

    SHA512

    962a06c2d1f90d4ab57ba8d236c5e972afc57df60d6b17cc352f3cd9bad054930686a10ee7bd4e77b9df6f7fe85aa14589619d4ccef65c7126a9a76bec091d09

  • C:\Windows\System32\snmptrap.exe

    Filesize

    1.2MB

    MD5

    c05de3c0dc5debb410e1942dbd4a2f16

    SHA1

    7bd6cd39cd54a6c0e43cff491292199cd7380131

    SHA256

    452274fe65f6ed0e008b5c505fd582c1fcb867ce39c98c9fa6d69839b9832b99

    SHA512

    3621ffb665b418b778c16191e4e7300a6073d08ae5a6b07c37fac475ad2fa117401bf2ac32fa2c6e34328e984173eb125e13f1e830afa3aa14fa00eef9074f41

  • C:\Windows\System32\vds.exe

    Filesize

    1.7MB

    MD5

    207e106078b9d1f88ccfd6ebac743e48

    SHA1

    fb6e11e19a2ac7c8ef4eb8e2615bd6ed9bc0159f

    SHA256

    b7ff00bc9a1d9d6d6552d78b7f368b5dcdf08e49d8e4af05c27bfe605362f829

    SHA512

    d3d4a6ea55edc9aa76af92326c2186f20f2ea1d60f402a565825dd865fba44fc362af6b44b82009573ccd985b2343294e33ad6a682f3d131fa8f63ead91241e7

  • C:\Windows\System32\wbem\WmiApSrv.exe

    Filesize

    1.4MB

    MD5

    e6fd48d5dbb1b554c22c9fab655f41d7

    SHA1

    165eb732542c3f9131d9a7c8f1c52e725abfdf29

    SHA256

    3045568ca148b55c7cdeb2e71f31875429da52485aa7032e614cf863bd88f2e9

    SHA512

    7bdef7137b15fa745574daaf6e9067e50b20270ea1bd582c3752a69d446924d150f9c9deea8ad96df6a815452f3e7f8d8449afddc483d9afe023c717a3a38d13

  • C:\Windows\System32\wbengine.exe

    Filesize

    2.0MB

    MD5

    a4ebd497fba7cc721b39cf1aba6cfd2f

    SHA1

    ceddf2d12627a670d91e75776b261de821517e6a

    SHA256

    a028388d8be9ba1022616864843180c7f2e8040a763a77ac1e8b8d8a1167e381

    SHA512

    1a208bea798942fcd7973da29704099c2a6a9566455d9b1b50162a1ab12523fdce20a752fac5a953dd159002ed28b61b1e6dc06e2d650dd16acb9e530353b04e

  • C:\Windows\ehome\ehrecvr.exe

    Filesize

    1.2MB

    MD5

    740c2ce08ee5ae02bbd451a27dc1c037

    SHA1

    8b2c2ea9551c362a3cdcb74564ea7c9bd7e4d5d0

    SHA256

    e935e7cdbf84ae32ad873aec53001737d914f96c126b22e739ac3061b7bbc55c

    SHA512

    4eeab215581931fe47211eebce52f38e2cb0be997fbe37badfe0645299137a07c63a33e563c6346a13f0bedab10fe30c5976187b4ea803effc72db4970e6e1aa

  • C:\Windows\ehome\ehsched.exe

    Filesize

    1.3MB

    MD5

    c73a2ab87b48cae64b4afd0f14576895

    SHA1

    ec83ed03527bce78aeba30f1bea0edcefe4981b8

    SHA256

    c1b47ceca3a49168695bd1f0b9dc6d1c355e1fa3370a60e99483730141d539ae

    SHA512

    36244670488510405c24832e3d2f219e913d5fb789d6bf541883be700f856b01155c9b4791d6b4e95a9457c3adcba4ac01468ad7935080e798e31597106cba20

  • C:\Windows\system32\msiexec.exe

    Filesize

    1.3MB

    MD5

    7c5394962bb12ee64c1a2d1d2df6e69c

    SHA1

    138bf2adbaaab39810bc67e82a70115044c69a80

    SHA256

    abbc5386fc8ce0fb2e5367352b7aabe884484eeb2aabfea6be149b3dbb92e4cf

    SHA512

    962a06c2d1f90d4ab57ba8d236c5e972afc57df60d6b17cc352f3cd9bad054930686a10ee7bd4e77b9df6f7fe85aa14589619d4ccef65c7126a9a76bec091d09

  • \Program Files\Windows Media Player\wmpnetwk.exe

    Filesize

    2.0MB

    MD5

    d293e4679508669ee07d359b9bdd6ee7

    SHA1

    50aa87cc37de8c5ddb7f98b9599790e7e2741ed7

    SHA256

    4423577ef03e15343c5398acf1972cd869249673b30fc8b9c34cdc75ee683af3

    SHA512

    f3c14ae4ea06affa95e1cd26da5ee877fa23e4a3deb5630aac409dc57b487bb91f0227ed2ac9c480d9bfe17778f25cee0888515da83fcd4a8566de3ef790246b

  • \Program Files\Windows Media Player\wmpnetwk.exe

    Filesize

    2.0MB

    MD5

    d293e4679508669ee07d359b9bdd6ee7

    SHA1

    50aa87cc37de8c5ddb7f98b9599790e7e2741ed7

    SHA256

    4423577ef03e15343c5398acf1972cd869249673b30fc8b9c34cdc75ee683af3

    SHA512

    f3c14ae4ea06affa95e1cd26da5ee877fa23e4a3deb5630aac409dc57b487bb91f0227ed2ac9c480d9bfe17778f25cee0888515da83fcd4a8566de3ef790246b

  • \Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe

    Filesize

    1.3MB

    MD5

    353c60a32bc555fcf8ac10c1c12f6d72

    SHA1

    5c83e7652abdc50b5801f7acfb0c28f6138284a7

    SHA256

    c119382e915b43ca3e3067d5ad3bd7aaac35f8b116cae59cdd6a504bad917138

    SHA512

    153f59228a3d141707a01deb2b1fd42271e2cd4339bc72642088167ac3c755dd25214794c2464642e85bac08237ab857e4865075418ea597fd9609722a2dd075

  • \Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe

    Filesize

    1.3MB

    MD5

    664868dc1b5fd6c79052e8e7aac7aa1f

    SHA1

    9dc48a49e7c236ac9c8fb194509d2ee904650f23

    SHA256

    fd6065246b076dcdbccebef4943395cf3f15cb258f1626602e96fef01e8c282f

    SHA512

    1d54cce362b9e074b68f11f0ce97ce5ee8efb75b2320e8bffd87f42522cae1cf19a2f589fc07e3c1b365bd39ab4a6a55eb15c20aa4868b6e8dac32e5cab75395

  • \Windows\System32\Locator.exe

    Filesize

    1.2MB

    MD5

    881b66d3a6e0fd2400dc5d46fa010af7

    SHA1

    95f6977d2189ae4cd345370071a27b94752d7534

    SHA256

    8db2317e6de578be0d937d8b5c23fccc6198de9396b6a28d64a71b7bcf78f695

    SHA512

    13ef577324bbfc6b7380ca797fe59ce22acf24c1d1019f692ab009c50cae6e6e028f5893232f1075ee4995a68aebdb914f7b72f70f939b7b30eebaccb0d4366a

  • \Windows\System32\alg.exe

    Filesize

    1.3MB

    MD5

    a8442c3330c2982a97fb9fb509245639

    SHA1

    2dfc57bc5a1287f1ffb7a9e668a55302d183aa4d

    SHA256

    53a5cd2e2d1d22024ed6a6d1c3e0a2bd0cce0c20fad2509f9ccfa9ac096fdf1c

    SHA512

    0b4fa7f8526ee16f73ba2f30a8c2d65ac2ea56abd537e3542809660a70f5c35543f8c045895933490133c6c40e33462ffd2a00df7cd5b0c3c1b2f8f78641d334

  • \Windows\System32\dllhost.exe

    Filesize

    1.2MB

    MD5

    ef968d15946b59fbcb4d4150e53ecbe9

    SHA1

    c55a334c1b12e6426f3c61067def969d0d20a915

    SHA256

    0d0b8cc9664f1554a0f940e0fad43054bcd028390a100d80f38bab7f0763e453

    SHA512

    6c2cb4d5ef6785f6bfa0997060001729e77328a740c97655016730c31f11281531ed4c79e5af1685120a910d14b9d4e55c42b64d95c738f65ed9d6e86a913655

  • \Windows\System32\ieetwcollector.exe

    Filesize

    1.3MB

    MD5

    45f376fdf7af18a80786e4aa0a7c44b7

    SHA1

    ac6da0b2b8f43edf9b5926436fd6f4c685dcb114

    SHA256

    12e93228a7bfd9453cf56eaeaef9d7491125867cffa445a9dd194b3d8b9e804c

    SHA512

    6be49b6b2aa23531a8ce358c5c08c30cc60d64aed482ab2ef956a257bdcdccf037824e4f9576342149933d3bc924effd1804d830f06b745d03e9c0efe1177af4

  • \Windows\System32\msdtc.exe

    Filesize

    1.4MB

    MD5

    8e249ea2d13a17092fb35febdb1e21e5

    SHA1

    48571118ca6c4b037d7ff1e93b139c871ad51eaa

    SHA256

    404c99b9d7f7a8ba9b0a3b5066e0fa1406ea62c3023488ab373496c5941f88b9

    SHA512

    d7e54ea1a705bb75a4894b650214f7fe9a7f6d416dd881c713692ddab044ec53dceeb111a55eea8f007d911f598e20fe4a7f46e5e16cef7c26997fc8cd67345c

  • \Windows\System32\msiexec.exe

    Filesize

    1.3MB

    MD5

    7c5394962bb12ee64c1a2d1d2df6e69c

    SHA1

    138bf2adbaaab39810bc67e82a70115044c69a80

    SHA256

    abbc5386fc8ce0fb2e5367352b7aabe884484eeb2aabfea6be149b3dbb92e4cf

    SHA512

    962a06c2d1f90d4ab57ba8d236c5e972afc57df60d6b17cc352f3cd9bad054930686a10ee7bd4e77b9df6f7fe85aa14589619d4ccef65c7126a9a76bec091d09

  • \Windows\System32\msiexec.exe

    Filesize

    1.3MB

    MD5

    7c5394962bb12ee64c1a2d1d2df6e69c

    SHA1

    138bf2adbaaab39810bc67e82a70115044c69a80

    SHA256

    abbc5386fc8ce0fb2e5367352b7aabe884484eeb2aabfea6be149b3dbb92e4cf

    SHA512

    962a06c2d1f90d4ab57ba8d236c5e972afc57df60d6b17cc352f3cd9bad054930686a10ee7bd4e77b9df6f7fe85aa14589619d4ccef65c7126a9a76bec091d09

  • \Windows\System32\snmptrap.exe

    Filesize

    1.2MB

    MD5

    c05de3c0dc5debb410e1942dbd4a2f16

    SHA1

    7bd6cd39cd54a6c0e43cff491292199cd7380131

    SHA256

    452274fe65f6ed0e008b5c505fd582c1fcb867ce39c98c9fa6d69839b9832b99

    SHA512

    3621ffb665b418b778c16191e4e7300a6073d08ae5a6b07c37fac475ad2fa117401bf2ac32fa2c6e34328e984173eb125e13f1e830afa3aa14fa00eef9074f41

  • \Windows\System32\wbem\WmiApSrv.exe

    Filesize

    1.4MB

    MD5

    e6fd48d5dbb1b554c22c9fab655f41d7

    SHA1

    165eb732542c3f9131d9a7c8f1c52e725abfdf29

    SHA256

    3045568ca148b55c7cdeb2e71f31875429da52485aa7032e614cf863bd88f2e9

    SHA512

    7bdef7137b15fa745574daaf6e9067e50b20270ea1bd582c3752a69d446924d150f9c9deea8ad96df6a815452f3e7f8d8449afddc483d9afe023c717a3a38d13

  • \Windows\System32\wbengine.exe

    Filesize

    2.0MB

    MD5

    a4ebd497fba7cc721b39cf1aba6cfd2f

    SHA1

    ceddf2d12627a670d91e75776b261de821517e6a

    SHA256

    a028388d8be9ba1022616864843180c7f2e8040a763a77ac1e8b8d8a1167e381

    SHA512

    1a208bea798942fcd7973da29704099c2a6a9566455d9b1b50162a1ab12523fdce20a752fac5a953dd159002ed28b61b1e6dc06e2d650dd16acb9e530353b04e

  • \Windows\ehome\ehrecvr.exe

    Filesize

    1.2MB

    MD5

    740c2ce08ee5ae02bbd451a27dc1c037

    SHA1

    8b2c2ea9551c362a3cdcb74564ea7c9bd7e4d5d0

    SHA256

    e935e7cdbf84ae32ad873aec53001737d914f96c126b22e739ac3061b7bbc55c

    SHA512

    4eeab215581931fe47211eebce52f38e2cb0be997fbe37badfe0645299137a07c63a33e563c6346a13f0bedab10fe30c5976187b4ea803effc72db4970e6e1aa

  • \Windows\ehome\ehsched.exe

    Filesize

    1.3MB

    MD5

    c73a2ab87b48cae64b4afd0f14576895

    SHA1

    ec83ed03527bce78aeba30f1bea0edcefe4981b8

    SHA256

    c1b47ceca3a49168695bd1f0b9dc6d1c355e1fa3370a60e99483730141d539ae

    SHA512

    36244670488510405c24832e3d2f219e913d5fb789d6bf541883be700f856b01155c9b4791d6b4e95a9457c3adcba4ac01468ad7935080e798e31597106cba20

  • memory/344-218-0x0000000140000000-0x000000014020D000-memory.dmp

    Filesize

    2.1MB

  • memory/344-222-0x00000000007F0000-0x0000000000850000-memory.dmp

    Filesize

    384KB

  • memory/548-127-0x0000000000400000-0x00000000005FF000-memory.dmp

    Filesize

    2.0MB

  • memory/548-57-0x0000000000400000-0x00000000005FF000-memory.dmp

    Filesize

    2.0MB

  • memory/548-56-0x0000000000600000-0x0000000000666000-memory.dmp

    Filesize

    408KB

  • memory/548-63-0x0000000000600000-0x0000000000666000-memory.dmp

    Filesize

    408KB

  • memory/620-123-0x0000000140000000-0x0000000140209000-memory.dmp

    Filesize

    2.0MB

  • memory/620-132-0x0000000000170000-0x00000000001D0000-memory.dmp

    Filesize

    384KB

  • memory/620-237-0x0000000140000000-0x0000000140209000-memory.dmp

    Filesize

    2.0MB

  • memory/980-294-0x0000000000400000-0x00000000005FF000-memory.dmp

    Filesize

    2.0MB

  • memory/980-262-0x0000000074780000-0x0000000074E6E000-memory.dmp

    Filesize

    6.9MB

  • memory/980-214-0x0000000000230000-0x0000000000296000-memory.dmp

    Filesize

    408KB

  • memory/980-213-0x0000000000400000-0x00000000005FF000-memory.dmp

    Filesize

    2.0MB

  • memory/1052-230-0x000000002E000000-0x000000002FE1E000-memory.dmp

    Filesize

    30.1MB

  • memory/1052-212-0x0000000000510000-0x0000000000576000-memory.dmp

    Filesize

    408KB

  • memory/1192-273-0x0000000001000000-0x00000000011ED000-memory.dmp

    Filesize

    1.9MB

  • memory/1192-278-0x00000000002E0000-0x0000000000346000-memory.dmp

    Filesize

    408KB

  • memory/1336-205-0x000007FEF4880000-0x000007FEF521D000-memory.dmp

    Filesize

    9.6MB

  • memory/1336-208-0x0000000000B30000-0x0000000000BB0000-memory.dmp

    Filesize

    512KB

  • memory/1336-293-0x000007FEF4880000-0x000007FEF521D000-memory.dmp

    Filesize

    9.6MB

  • memory/1336-211-0x000007FEF4880000-0x000007FEF521D000-memory.dmp

    Filesize

    9.6MB

  • memory/1336-279-0x000007FEF4880000-0x000007FEF521D000-memory.dmp

    Filesize

    9.6MB

  • memory/1336-291-0x0000000000B30000-0x0000000000BB0000-memory.dmp

    Filesize

    512KB

  • memory/1644-120-0x0000000001390000-0x00000000013A0000-memory.dmp

    Filesize

    64KB

  • memory/1644-249-0x0000000001430000-0x0000000001431000-memory.dmp

    Filesize

    4KB

  • memory/1644-164-0x0000000140000000-0x000000014013C000-memory.dmp

    Filesize

    1.2MB

  • memory/1644-108-0x0000000140000000-0x000000014013C000-memory.dmp

    Filesize

    1.2MB

  • memory/1644-129-0x0000000001430000-0x0000000001431000-memory.dmp

    Filesize

    4KB

  • memory/1644-115-0x0000000000170000-0x00000000001D0000-memory.dmp

    Filesize

    384KB

  • memory/1644-118-0x0000000001380000-0x0000000001390000-memory.dmp

    Filesize

    64KB

  • memory/1688-1-0x0000000000230000-0x0000000000296000-memory.dmp

    Filesize

    408KB

  • memory/1688-0-0x0000000000400000-0x000000000062C000-memory.dmp

    Filesize

    2.2MB

  • memory/1688-6-0x0000000000230000-0x0000000000296000-memory.dmp

    Filesize

    408KB

  • memory/1688-7-0x0000000000230000-0x0000000000296000-memory.dmp

    Filesize

    408KB

  • memory/1688-74-0x0000000000400000-0x000000000062C000-memory.dmp

    Filesize

    2.2MB

  • memory/1704-156-0x0000000140000000-0x0000000140205000-memory.dmp

    Filesize

    2.0MB

  • memory/1704-275-0x0000000140000000-0x0000000140205000-memory.dmp

    Filesize

    2.0MB

  • memory/1704-163-0x0000000000830000-0x0000000000890000-memory.dmp

    Filesize

    384KB

  • memory/1752-100-0x00000000008E0000-0x0000000000940000-memory.dmp

    Filesize

    384KB

  • memory/1752-154-0x0000000100000000-0x00000001001EC000-memory.dmp

    Filesize

    1.9MB

  • memory/1752-95-0x0000000100000000-0x00000001001EC000-memory.dmp

    Filesize

    1.9MB

  • memory/1752-91-0x00000000008E0000-0x0000000000940000-memory.dmp

    Filesize

    384KB

  • memory/1960-285-0x0000000100000000-0x00000001001EC000-memory.dmp

    Filesize

    1.9MB

  • memory/2244-106-0x0000000140000000-0x00000001401F4000-memory.dmp

    Filesize

    2.0MB

  • memory/2244-26-0x0000000140000000-0x00000001401F4000-memory.dmp

    Filesize

    2.0MB

  • memory/2248-254-0x0000000100000000-0x0000000100542000-memory.dmp

    Filesize

    5.3MB

  • memory/2248-265-0x0000000100000000-0x0000000100542000-memory.dmp

    Filesize

    5.3MB

  • memory/2248-260-0x0000000000260000-0x00000000002C0000-memory.dmp

    Filesize

    384KB

  • memory/2248-267-0x00000000728A8000-0x00000000728BD000-memory.dmp

    Filesize

    84KB

  • memory/2292-210-0x00000000009F0000-0x0000000000A50000-memory.dmp

    Filesize

    384KB

  • memory/2292-209-0x0000000140000000-0x0000000140221000-memory.dmp

    Filesize

    2.1MB

  • memory/2296-263-0x0000000140000000-0x0000000140237000-memory.dmp

    Filesize

    2.2MB

  • memory/2296-140-0x0000000140000000-0x0000000140237000-memory.dmp

    Filesize

    2.2MB

  • memory/2296-146-0x00000000001E0000-0x0000000000240000-memory.dmp

    Filesize

    384KB

  • memory/2592-244-0x00000000003F0000-0x0000000000456000-memory.dmp

    Filesize

    408KB

  • memory/2592-242-0x000000002E000000-0x000000002E20C000-memory.dmp

    Filesize

    2.0MB

  • memory/2640-44-0x0000000010000000-0x00000000101FE000-memory.dmp

    Filesize

    2.0MB

  • memory/2704-14-0x0000000100000000-0x00000001001FB000-memory.dmp

    Filesize

    2.0MB

  • memory/2704-12-0x0000000000170000-0x00000000001D0000-memory.dmp

    Filesize

    384KB

  • memory/2704-20-0x0000000000170000-0x00000000001D0000-memory.dmp

    Filesize

    384KB

  • memory/2704-92-0x0000000100000000-0x00000001001FB000-memory.dmp

    Filesize

    2.0MB

  • memory/2740-68-0x0000000010000000-0x00000000101F6000-memory.dmp

    Filesize

    2.0MB

  • memory/2740-30-0x0000000010000000-0x00000000101F6000-memory.dmp

    Filesize

    2.0MB

  • memory/2740-36-0x0000000000230000-0x0000000000296000-memory.dmp

    Filesize

    408KB

  • memory/2848-239-0x0000000000AC0000-0x0000000000B20000-memory.dmp

    Filesize

    384KB

  • memory/2848-299-0x0000000100000000-0x0000000100209000-memory.dmp

    Filesize

    2.0MB

  • memory/2848-233-0x0000000100000000-0x0000000100209000-memory.dmp

    Filesize

    2.0MB

  • memory/2848-235-0x00000000005C0000-0x00000000007C9000-memory.dmp

    Filesize

    2.0MB

  • memory/2908-73-0x00000000006F0000-0x0000000000750000-memory.dmp

    Filesize

    384KB

  • memory/2908-78-0x0000000140000000-0x0000000140205000-memory.dmp

    Filesize

    2.0MB

  • memory/2908-82-0x00000000006F0000-0x0000000000750000-memory.dmp

    Filesize

    384KB

  • memory/2908-138-0x0000000140000000-0x0000000140205000-memory.dmp

    Filesize

    2.0MB