Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    22/02/2024, 19:33

General

  • Target

    3d6e0db55dc49760633d6373c307dc1bc5ecf123d91845635be549ba5b2ab207.exe

  • Size

    1.8MB

  • MD5

    e76fa1b7d9173017cb88049a1ed4de3d

  • SHA1

    c806d85080cdc961dcfa54529d13b9ea40cdd714

  • SHA256

    3d6e0db55dc49760633d6373c307dc1bc5ecf123d91845635be549ba5b2ab207

  • SHA512

    5611abc0e180f901d62778d02ba2ead4775065ca36203b3ad9034546b0303a13484908b2e9fa24cdb624c9082245f7051e1b67d8148871df1d6271b36b22e3be

  • SSDEEP

    49152:/x5SUW/cxUitIGLsF0nb+tJVYleAMz77+WAtKpv5Yu5:/vbjVkjjCAzJKmv5

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 34 IoCs
  • Loads dropped DLL 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in System32 directory 10 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 35 IoCs
  • Modifies data under HKEY_USERS 30 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 16 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\3d6e0db55dc49760633d6373c307dc1bc5ecf123d91845635be549ba5b2ab207.exe
    "C:\Users\Admin\AppData\Local\Temp\3d6e0db55dc49760633d6373c307dc1bc5ecf123d91845635be549ba5b2ab207.exe"
    1⤵
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:460
  • C:\Windows\System32\alg.exe
    C:\Windows\System32\alg.exe
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:2972
  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe
    C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe
    1⤵
    • Executes dropped EXE
    PID:2748
  • C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe
    C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe
    1⤵
    • Executes dropped EXE
    • Drops file in Windows directory
    PID:2808
  • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe
    C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe
    1⤵
    • Executes dropped EXE
    • Drops file in Windows directory
    PID:328
  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
    C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:604
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1e4 -InterruptEvent 1d0 -NGENProcess 1d4 -Pipe 1e0 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2708
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 24c -InterruptEvent 1d0 -NGENProcess 1d4 -Pipe 1e4 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2428
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 23c -InterruptEvent 248 -NGENProcess 250 -Pipe 24c -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2648
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 238 -InterruptEvent 240 -NGENProcess 254 -Pipe 23c -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2236
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 240 -InterruptEvent 258 -NGENProcess 250 -Pipe 234 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2684
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 230 -InterruptEvent 238 -NGENProcess 25c -Pipe 240 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:1428
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 238 -InterruptEvent 260 -NGENProcess 250 -Pipe 248 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:460
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 254 -InterruptEvent 238 -NGENProcess 264 -Pipe 250 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:832
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 238 -InterruptEvent 278 -NGENProcess 258 -Pipe 274 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2052
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 278 -InterruptEvent 280 -NGENProcess 26c -Pipe 27c -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2464
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 280 -InterruptEvent 270 -NGENProcess 1ec -Pipe 264 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2328
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 270 -InterruptEvent 28c -NGENProcess 1a8 -Pipe 288 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2140
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 290 -InterruptEvent 280 -NGENProcess 294 -Pipe 270 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2876
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1a8 -InterruptEvent 284 -NGENProcess 278 -Pipe 290 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:1704
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 284 -InterruptEvent 254 -NGENProcess 180 -Pipe 25c -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2248
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 29c -InterruptEvent 254 -NGENProcess 284 -Pipe 1ec -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:1832
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2f8 -InterruptEvent 2e8 -NGENProcess 2ec -Pipe 2f4 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:1508
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 310 -InterruptEvent 2f0 -NGENProcess 314 -Pipe 2f8 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2276
  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
    C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
    1⤵
    • Executes dropped EXE
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:624
  • C:\Windows\ehome\ehRecvr.exe
    C:\Windows\ehome\ehRecvr.exe
    1⤵
    • Executes dropped EXE
    • Modifies data under HKEY_USERS
    PID:2676
  • C:\Windows\ehome\ehsched.exe
    C:\Windows\ehome\ehsched.exe
    1⤵
    • Executes dropped EXE
    PID:2312
  • C:\Windows\eHome\EhTray.exe
    "C:\Windows\eHome\EhTray.exe" /nav:-2
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:2360
  • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
    "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
    1⤵
    • Executes dropped EXE
    PID:1452
  • C:\Windows\ehome\ehRec.exe
    C:\Windows\ehome\ehRec.exe -Embedding
    1⤵
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1244
  • C:\Windows\system32\IEEtwCollector.exe
    C:\Windows\system32\IEEtwCollector.exe /V
    1⤵
    • Executes dropped EXE
    PID:1940
  • C:\Windows\system32\dllhost.exe
    C:\Windows\system32\dllhost.exe /Processid:{02D4B3F1-FD88-11D1-960D-00805FC79235}
    1⤵
    • Executes dropped EXE
    • Drops file in Windows directory
    PID:1088
  • C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE" /auditservice
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Modifies data under HKEY_USERS
    PID:600
  • C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe
    "C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"
    1⤵
    • Executes dropped EXE
    PID:1988
  • C:\Program Files (x86)\Common Files\Microsoft Shared\Source Engine\OSE.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\Source Engine\OSE.EXE"
    1⤵
    • Executes dropped EXE
    PID:1188
  • C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE
    "C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"
    1⤵
    • Executes dropped EXE
    • Modifies data under HKEY_USERS
    PID:2804

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\ose.exe

    Filesize

    767KB

    MD5

    692d264eee89a4a453ee2fd25a91e85a

    SHA1

    1d66fe253db9b05821f6cd1a4e49738255c7dc41

    SHA256

    4144d209bee9d015d225edf2b538faa11f33d101ed70a6bca8ee34dd21cf803d

    SHA512

    4168c8130673c570a55978a53bebdb1de0de931584700ff2cdfd56f3c61e16be795e9c35352e0f795c880c27e7209850e11b798368640b1e6c273d23b74bd2f8

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\setup.exe

    Filesize

    591KB

    MD5

    c7f9e8b1e1fec78fe49f886777074d6e

    SHA1

    906955221ca1042fa5cb4915bbd21fb0b7ffa85f

    SHA256

    e223613f9216f37a075f4e1393390a31b92dcdab12f149fc0977bb5fe48d3aa2

    SHA512

    712a87b606635fbdc80c2942a5483c204d1f51733571898ca64afc596ee54e6badb4aba38b24ba83ab9c6805a18223e5257d07801163aceda90b951291043917

  • C:\MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\DW20.EXE

    Filesize

    609KB

    MD5

    1bb45f7aae42a6d128265aed54e6aa26

    SHA1

    b942d260cb562058e750fae2b41e93064c0ccffa

    SHA256

    2fc0119e4f8b016b28fb15a854d4d80d751f420b34196caccd492f77a9cee1d3

    SHA512

    9ac14bd89671fdc12a582164cb56996267eb544c7d2a6e8bbc9fb344ca570422cd0edd69fae09024097268f33d7790a76c480a3bd6e56ba75ea99b38260419f9

  • C:\MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\dwtrig20.exe

    Filesize

    738KB

    MD5

    44a67d1cb4877cdaefc6b52ffc8f7c5f

    SHA1

    d9d0f42871126f42ecd10fad2708d5f9a7d2ecc9

    SHA256

    be8b2e5be074f743e4a83923f9cc9f49d5f3932bf296090f51d180a0cdf6d31d

    SHA512

    e5f25c76d8ba9d683a2a98264671a70defcaf26388adcd3533bdc1a3b0de5fda8d528dd1c6ec1d75167f68b056169bb90576e1163a7680156aaac89ae72e2076

  • C:\Program Files (x86)\Common Files\microsoft shared\Source Engine\OSE.EXE

    Filesize

    1.3MB

    MD5

    234956ea4fb4101deb20a9c85f2af753

    SHA1

    8a255ace3354d8c2dbfbc6b860ed2787dd784e59

    SHA256

    428ecb3696ba3c2d28b4c46256b4115936782911b8bbb03ab60287f3123cedc5

    SHA512

    35dc302097007ad1458011a6d43c1c5424a5ff87c92ee76eeed3f9b7ef91c8e7656f2e5b6d778f61eb02492a4f458bc8860969b8d3e2b71dbed35d8a7414e51a

  • C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE

    Filesize

    3.1MB

    MD5

    c3183c765972ba4f839fe13f6d4ba87a

    SHA1

    f02919035afc1fdc0f5601b6860ab4ad19616bb1

    SHA256

    c52d468541cc02740244d42f97df2f37927ed160bcf7938b9ccc0892cc6f5104

    SHA512

    975d78eb276d591c64d218606c057641025a2802e7edd4fd739cc4e769663d1014bd14603c461ba906951ae7ab8724620a67213fdb7c1a9d185eb4549eebeabd

  • C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe

    Filesize

    1.4MB

    MD5

    cc190cac2e45d58f929711c30c87f7ed

    SHA1

    5d1cbb6a776321ac95ddc73d8cb3a37521c94fc2

    SHA256

    0d896a65b1c2f57d4d1aa4e04fe4e9ef262e402ce2843cfef3914a0d7aa3da3b

    SHA512

    0dab2dda5a2be315a429aa334eb044c5ed542b8aff94cba8dd8655d7fcfa3b64fcedcc9b9886eb3b4f628ff9857c1d4d59bb741285dc5ad1c6ab2bacbff5f5d1

  • C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe

    Filesize

    997KB

    MD5

    7751ead8218fd54997aeb2360547f09b

    SHA1

    16c54c693de6e2cee4e80334128cef3b950a8253

    SHA256

    057a546b28badac0335629134e43bfaf95c0d1e8973b451708a6c43ee0c07987

    SHA512

    810f4cc1633ac1a10b520057c9aac7415345ee4a7c3fc3efcd310f77ca76ee2614a0eabfd28cfd0052f982247fc0a73f68b25bfe60e2ccd5c58725281175223c

  • C:\Program Files\7-Zip\7z.exe

    Filesize

    655KB

    MD5

    05cc47ae79e3961e711a46543fd217f9

    SHA1

    a8b66eab83dd2729ed733db56ed657e5d225ccac

    SHA256

    53dc8875dd26783a37bd45b3c9fc5857ae3652de9e40132c3a28aa1d8947d954

    SHA512

    f323bde678c80f8bc02e0ee73641f2ee401b37002cbaa67bfefdc1137ed37db1e3b164b4b21d557cefab813ae6bcfaae27577b4986221d1f3cb285ce6eee5f58

  • C:\Program Files\7-Zip\7zFM.exe

    Filesize

    765KB

    MD5

    7413f85a4e7d604cb5e0d0c05b84cc24

    SHA1

    f691865f2d5a5f2a692b3931eb8921c31318b584

    SHA256

    87d2a81413062026701477c060d759c39dae27199ce50bec20cd63784649b426

    SHA512

    ab5881c20e255441fcb9b314579654eaa2e03f8eeef3de7e0e736eb51be67ad2fb208ff3777b0d702c30ad47211e1deeff655f3146fc264c9b4836917c3fa487

  • C:\Program Files\7-Zip\7zG.exe

    Filesize

    747KB

    MD5

    d656cb7d4dabf2c338d9ffa9893656dd

    SHA1

    4e4eefb282c9d8acdd18e93b14bf79ad0db98309

    SHA256

    40568e29f3e6cafa185a846fae40ca285ebda99e801cd734bcc7c04811510f20

    SHA512

    098468f1315f62764f5cc5adba4cf05763f7d36315553f68bcfe47eeee4ee9750aba22e812ce9f7a53d0dae621c45e1e77c0b711b9939ab2d540272f3a9fa31f

  • C:\Program Files\7-Zip\Uninstall.exe

    Filesize

    557KB

    MD5

    a3fc4d1159059444b6e963ec182137dc

    SHA1

    9b2f447365c002fd93bf91a822724e3d27f673b0

    SHA256

    be1445afbd2f73c05ec6263b4ea5b7e6c995a2d25e6b8ff07dec5d6c4f1d203f

    SHA512

    50e88d1d9adac02c2dd425a3d357e19ce6b3a26b266ea9df97534801b3f4f5b3ea0cbeaf1312e07ff12f0f89347ade66a85260644d3bbe5e4cf62fde10cbeef5

  • C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE

    Filesize

    5.0MB

    MD5

    6ef2ef1b73cb9719f958bf51fb468d5c

    SHA1

    52a8a5e77f8ee47d444b50a05cd0e8894b28e919

    SHA256

    a468592d2c143963b703b25668cc4a0e36ee12c56870039279a81951f05b8173

    SHA512

    885835c00ed9e7d10f60a2d22bbb1c8e317539ca0a4770617476bc798b875e821cc0444aa63075394fcd1d7cbf2dc0c66a385f9ec5b690ec8c11afa7bbf23c7f

  • C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\chrmstp.exe

    Filesize

    313KB

    MD5

    5a2f242d13f7d77d9ef869db0152bc54

    SHA1

    a40aa114e082dd623714fe741cfcdea2fc7ab601

    SHA256

    57fae3956c71c8c1a5b891f2cfc1637939e60c6e1a15ebdfd601ed48b4b3a796

    SHA512

    c32c6358b050b094c6cdc91ae5de92a27715da0d1bae43987abda4a366f3b073e76880a9aeab33e3d1b437b5e93444f5f329aa1e782a717cbc423dfbecd01598

  • C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe

    Filesize

    317KB

    MD5

    ee05de45c90b6e2c87ac79d4054d8818

    SHA1

    47b6348d2ff48b6a5c1764f6d2d621b6aaedf648

    SHA256

    1814e158391d3647043970cda21b133cd8fdc0bb577e83c6e36b0e5e61c5798d

    SHA512

    938da7c650d2c14deb75b36ccee7a4c2fa4b86974324caa270818e17f6404bc8cea50ef41b02e7460b1c0e4aea84d27c3c8cc05bd42e407f9b99045f206ad005

  • C:\Program Files\Google\Chrome\Application\106.0.5249.119\chrome_pwa_launcher.exe

    Filesize

    640KB

    MD5

    d98a5885c256fef53cb9a31cf0193b8b

    SHA1

    5dbc4206acf1d78965252bf98810294c316e7caf

    SHA256

    ef03d67a9f2a8df11d5ed854a346a03029d608470d887b06376f3dd7c4ae8e22

    SHA512

    85c3539b05ec634c682335bbc5ffbc1be6ec1512ffb9443e279d98afc65da63b0e5072484bb7e9a8c9b026c7cd3b0d014a446b2f53eec819a6fde46c27a676ad

  • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe

    Filesize

    1.4MB

    MD5

    2565f96e2b889ba00496e22eaf68321c

    SHA1

    af2c985622de7d8fceb6b360649f90d6cfdef7ea

    SHA256

    965940faaf6a21d3a69118d6c8bd783fffe0305d488e582b66bb5b3f917bc649

    SHA512

    9eecd7e2ec6663fe5e3ed3f1fd778798d62a89e0bd6d854fbe692f7c5c28f697d41604efa535f43d3a0084ad5b4424ff891922f3dff6fa38569317944a3058bc

  • C:\Program Files\Google\Chrome\Application\106.0.5249.119\notification_helper.exe

    Filesize

    93KB

    MD5

    075080fa9d37870d30e587855acaa5d0

    SHA1

    3427cd4be3b3d67eb0b868b1c980ec19a973a322

    SHA256

    be0e38bbf126dbd6a254150df9cccb26f72c8b1cfc27c1aee112d307f422a51b

    SHA512

    fc337b352186e009ac392fb645af3c145bedc0b9de2bae735a2336ec5318fa77a5c4ad0a0d9562b9580450b29d48d8406e167ca4fbd3855368f5921d1f1deba1

  • C:\Program Files\Google\Chrome\Application\chrome_proxy.exe

    Filesize

    191KB

    MD5

    50d67708ac1ef95a5288084aba7a9dd6

    SHA1

    fea489d20a7e8cd873ef72eeacad3853753b5f12

    SHA256

    8b9393d8abc16f553d9dbde98a201258bcba2bf91142e86b54c7d021cf3a2aa0

    SHA512

    806a7c475179991bdaa5da0cfbb3fb8ff42a0ac71d230bedc64f4ff3c5af3afff45222ec3297afbc59df69d8848569469c3620901cb1b3416c98964763e14217

  • C:\Program Files\Java\jdk1.7.0_80\bin\appletviewer.exe

    Filesize

    147KB

    MD5

    0449d0c9399fff2328955c89cf843b2c

    SHA1

    6ed78976030a4da89a21f20b6228f7db66767b33

    SHA256

    0bcebf4ff024b5919bbec8bfd5190c284509933ea20c3ecd72600a7bda2d85ed

    SHA512

    6201a28c1a5131bad2d7650fad2f441149659dbc83d29dbff588be6a9b4e46721f1c8a0acef3c923b08a5f4e35d37ed02074f06f22cf5bfdd36463ed796f2c20

  • C:\Program Files\Java\jdk1.7.0_80\bin\apt.exe

    Filesize

    232KB

    MD5

    68dea2a5b7063cee15f3df55da7f68e9

    SHA1

    534a8b35c7fcaa237c4e5c283416dc2a90d9eb18

    SHA256

    84364c95e299e5e7b5c37bf38832447349f435e8a43e9c0dc0816a41eccd42aa

    SHA512

    3e86cadd2b5928fefa6e51f0d5af7ec79e6406e5b5fc407cb253b7d2f7bf797da7de1c50cbb3674501c49ec3a6e3a1d6af58ba40c5f35231715d0d2960bbe452

  • C:\Program Files\Java\jdk1.7.0_80\bin\extcheck.exe

    Filesize

    187KB

    MD5

    d2e86e22ddd1da53a340f992de563d67

    SHA1

    a5d414c0a0eb75037640371e6a6db25abe0af024

    SHA256

    31edb2767e1a443afda8dad24d589693fe11aa4e89f436070c0005a23493c335

    SHA512

    6d8c205f1bb4ececbd7102affb8354962b8945ee368c26be51e809a55ca1b2e4c4aec4309d2636e5a7e2a3ddbdbb3db82ba8f212489e53e5962d8c11634e1c41

  • C:\Program Files\Java\jdk1.7.0_80\bin\idlj.exe

    Filesize

    178KB

    MD5

    256fe2f3f121ac0d130c1e864572e514

    SHA1

    0d6e4431847a06fa2fe1acf30f2e3bd93cf07757

    SHA256

    dec96eae83303474f8536bea14bf1f0081a0b39423a23f4b146813769bea10d6

    SHA512

    0c99e3b0c2f63768cfd35f0cfc236e83065690f130d691503fcca0088e717dd27425288f4b44d2ddf332015bb4065c40825ffbfda1578e62e070667b50d9bca2

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b91050d8b077a4e8.customDestinations-ms

    Filesize

    24B

    MD5

    b9bd716de6739e51c620f2086f9c31e4

    SHA1

    9733d94607a3cba277e567af584510edd9febf62

    SHA256

    7116ff028244a01f3d17f1d3bc2e1506bc9999c2e40e388458f0cccc4e117312

    SHA512

    cef609e54c7a81a646ad38dba7ac0b82401b220773b9c792cefac80c6564753229f0c011b34ffb56381dd3154a19aee2bf5f602c4d1af01f2cf0fbc1574e4478

  • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe

    Filesize

    1.3MB

    MD5

    0b4490f50cb76f0181a96fbb85d735d7

    SHA1

    2a1706c4e951105d7d26c141e7f2393713037a19

    SHA256

    f76d56d2f941a310ae0b4d2bf61e691b765268a184035a17508e90abb3c2b91d

    SHA512

    3c136eb9e5d2c14193252dd55227c8bf79deb867ed25d242529272613bca120d338a2300daa8a7be79feeb90b21ae1ba3390a8aef1d5c8ae5c105ae5bc770eab

  • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ngen_service.log

    Filesize

    872KB

    MD5

    e37da4f20c229542fd893e293a923009

    SHA1

    cbb1fa0620779569afc32f8e0604bcc92007f581

    SHA256

    908f58642636440d37ff20f266200e48e635914947a2811bd9d1ef7aebea845e

    SHA512

    5be1b3b69f238f3aadddd224f69eaa52fb2f3ec19ffadef50be3938ccfd511829b60ea7ad072395e9e083d190d0bf3b09548f647ac4328db816b864d409ff962

  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe

    Filesize

    1.3MB

    MD5

    c8a1e12710b7f6bbc0803866a661f64e

    SHA1

    38dd26cd20dbe1b2ca4af196d2709b6a478008a8

    SHA256

    38a8b6d20372ec4d872d93e7e5fe4ec4d907d59bf9bbf4a485c98e50a33e2ffa

    SHA512

    312220491aeba59deee3bc80714b6aee2b4dec4f39e460c8a600ec2639a2bc22941d61aac00ff21693583c341ade02353c3bb5ce2415713a3b03faad85ccc90a

  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe

    Filesize

    805KB

    MD5

    0490c0e8faec3c77626775120783a34e

    SHA1

    bc7455fc2cc516705ded9dffc65df7cce3dd2767

    SHA256

    220d9f7b7d956b8be042b3a5b62c08300fa967192d53539396683f8a9ffd489d

    SHA512

    d20149c4eb7d8635c915ea55a75aedd452688420a53fbf76aed2ee51f189617d96e772a3334fe704d807266e6f96d84a6e90a575e8808019e4181f0fb3419f9f

  • C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe

    Filesize

    1.2MB

    MD5

    23604c3ed7087e9ccd8a51bbc9101383

    SHA1

    8049b16180dab7fe762d0a5af4a157392ef117e2

    SHA256

    f85dbcf3f1ef01b284312127518ec607891493618d5775d55f1d2aad7c00fd4b

    SHA512

    d9e6c75c7962968da8803c6de151953189a90b96fdb000d7b58e8a02bc036dcdf0e699e86f0121929e9a743a796ed0f88cced71cde829df899a777415c4aed44

  • C:\Windows\Microsoft.NET\Framework\v2.0.50727\ngen_service.log

    Filesize

    576KB

    MD5

    90aabad2cf1827eed62393a968d3cac4

    SHA1

    52bfc2cdd2bf4a970948ea7dfdd2dd232b729fd0

    SHA256

    16b25eb0594277c422ec37c202e835dce78a8e8e80cbee2c21f3c96a061173e4

    SHA512

    9ec08f322442673ee783e096961691eb35755863c8a243306174175656f6c58762b909bda1823291a951decb8a75fca59b233fcf132cfa5a753f23c953ab9179

  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe

    Filesize

    1.3MB

    MD5

    befc4623a620399ade3dcfd90fc43eac

    SHA1

    da9c6cae4084fe4d628c3cc6e2f3fcd02739864a

    SHA256

    9211f645d6729efb257a28d13b1b6979efe7ccee7096f9c18e6dc88511823a7f

    SHA512

    afea26b5428d8b214dd93a987e0dcaced0d9879aabb44d753f2b79f9b2b1c996d1e1465dc822a89100111aa57d3c63e4a7d31882fb202d87ff5026a8529c1b1d

  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe

    Filesize

    448KB

    MD5

    747c9e9d45ade179f0586d7dcb0731eb

    SHA1

    34ad0d43375fb0b1d28af5167f30e171ce7aa23b

    SHA256

    51f5cc66f6abd8349f7bb5e5996343cef04db33dab17e54014fc0c9fd776a199

    SHA512

    e4914a58ac7a7ace8e116d4206ccf1c0afb381c388df903afa7e703df6704bd96e3acf00717aa2e59b5b55532e3eb65fc3ec370adfdd36df1614d2f187e6b752

  • C:\Windows\System32\alg.exe

    Filesize

    1.3MB

    MD5

    7b8d3b5a25de462c91c81f8145ddd378

    SHA1

    47b5be96e5e85681689e8a0b30eeb00938a31b63

    SHA256

    ad1d749c402cbad972300c665581c251d67dedce3b29ef2fdad672a63da16595

    SHA512

    b715c1d5a857f8dbab4753dcd7721c4327c0fb684786650fba29b14a267f0e3fc440c7e24988b586f48e8caafa70a159a9410869628f49a49a7b281c22f3aa7b

  • C:\Windows\System32\dllhost.exe

    Filesize

    1.2MB

    MD5

    a2bd73b0a1b9a46db9e5d3aa54f4803b

    SHA1

    be069146c68fbdeb7019b0b306d17a2f5e3ae8bc

    SHA256

    a34da64105f3fc93e801c5aceee3d72394f22008ac1792b3a78d5d1ca8bf25c1

    SHA512

    9f80ff3bf1bed22d8fc93b90a1f87e50ae078e087288890f28c3ce9f8402e80d554ac6230bd66fc0fc43e6b248d110c8e4271b1d6dbc8845cddd5fe5cf65dcab

  • C:\Windows\System32\ieetwcollector.exe

    Filesize

    189KB

    MD5

    de0f9a93c97e5f7901cd4a5662e9eb35

    SHA1

    ca7f38f1c09d1b04d0efd02aa9e6b2797b921f61

    SHA256

    928fd9be6bbcd17558b91e0d37c66584c5709b566acd05d892876159b31faef3

    SHA512

    58b7832e65a007130b790841d8f583c0124317ffc3046956f1b8eba86d1dbcdb2002bed8888284548bdca70a795b911171a20b2d7f4bfc1b77d1cdde7933adec

  • C:\Windows\ehome\ehRecvr.exe

    Filesize

    1.2MB

    MD5

    56b5d9df7ccef8deeb76089851b9996b

    SHA1

    b4d2b97098ccfa4691de7485c08884a99f7ec99b

    SHA256

    559feefb6b21f0911abc3478a3716185a0a00588a03c8001a4dd30973b8aae28

    SHA512

    7760a145515820ba1b23a986b82f6dcd8812010ab68cf3e69c486c743bd9e32591d74a358896e88be675b15799a235e55563e325aa09cbde80c663be83b184cd

  • C:\Windows\ehome\ehrecvr.exe

    Filesize

    704KB

    MD5

    350b20c7d51f21a610b2a8ce16a67441

    SHA1

    d6524230a3ff51f0fd9cbbf315e5e7ae45c335a6

    SHA256

    f8981810d24c4370ea1b2c558f53d2f8614c49f6f048c8bc38b0e4b56adb3dc7

    SHA512

    6f06eca2fcb75b2cafcc3bf9f269845739a28d32f6943f806bed04124f14b4c4eaa45590dc0d3fcc7bd77647af15631d2f6707930867a1d52505ae9b14c9233f

  • C:\Windows\system32\IEEtwCollector.exe

    Filesize

    1.0MB

    MD5

    27b20e6c995a29009bcd488664fa0206

    SHA1

    17d8cfbd18c2d9954e1ed52c76befe1bcb016c50

    SHA256

    3855675ed0b9f493e396857e40fe635164b746f49a192ed977a6c703394ec10b

    SHA512

    c96e5b166bf961a2990320b9a6922d72a1492e79690024d59788569e2293e07b7db1707c2b05543b642bd508fbe7ba4cc1a48d6e93ddbc82f575d7e487ff2d3d

  • C:\Windows\system32\fxssvc.exe

    Filesize

    1.2MB

    MD5

    c9c2e2839bb71bebdbe167f84a4a9363

    SHA1

    48db2959635801d7cee545c58baf46657ef8ff50

    SHA256

    1e19673359153b9fd55af3a2f3741630292fa38df5205fa163fe6414dd0556be

    SHA512

    2f59d7705fc9a12db43f007d90800648fd5d8b5cbf070022df9a12570d401b5b113390476c096e2c6128c0f45f18e782845b3bae8137f50cf60d63d0eb9d6227

  • \Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe

    Filesize

    1.2MB

    MD5

    9c20d7cb546208f3662842f6d6123e7b

    SHA1

    3f18e009da806d68efa774453efdb9d34068e339

    SHA256

    001a0172a887143b1dfbbbb14169d0e71c413386d3e24b1cc975896c3d8ddf7c

    SHA512

    8dec05b3c09060e5d69136c566ac0b13f8250ab537566ce136f560b2a9c0166d1949738702e20678d4cbad2685c4179771c5cb9adb6aece0850ece449f074108

  • \Windows\System32\ieetwcollector.exe

    Filesize

    400KB

    MD5

    39f1ce222c81440de4678fed53e534f4

    SHA1

    9a06cca3a4c04a7aa9333c01c5ca3d1069e7a726

    SHA256

    1e1d8f2835312844861853e8db4be315c7ea80407a0a908029941322d67dd996

    SHA512

    c093afd218db2babeccfc0b5927624125b4fc155525bcdccb1f0f57fda1568ee9d070489b3e0e0d9ee8364d8a22544d7ee426c2fb8108afd7e49669544d7b148

  • \Windows\ehome\ehrecvr.exe

    Filesize

    510KB

    MD5

    e5037dae52ee9ff8bbe59a215f7c7dfe

    SHA1

    b0bf3fee9133174d76e6d900e4b892d199fe65dd

    SHA256

    21d88b4a0c075c6f607c26fa617c2a0de55db2a1262eb36a14f384ee683606b6

    SHA512

    4cd4dee0822b83eaf02ab7961a70294e4d13482ac096a3135db11c30a49b58860cfbe56bf6cdb0b6cfe1c583a6c284c0a37790d883aade240b8240ca29cdfb6d

  • \Windows\ehome\ehsched.exe

    Filesize

    1.3MB

    MD5

    f3d393c2fc7fe31a4a804981358469b1

    SHA1

    7a09e221602bf6910ed2da01e107bf368534e36b

    SHA256

    067c716b792b184976409323535e380bc64db6da70b5db56f76166898260af32

    SHA512

    d2b9a275dd9558fdb8a03248ce1bc513d0f9a3dfb0ea1d2d8a9f5f91a960a83dd8c72b9b93859479efc37271a2a0080b9439b4d77ec1e22c42732412b707acf7

  • memory/328-109-0x0000000010000000-0x00000000101E6000-memory.dmp

    Filesize

    1.9MB

  • memory/328-126-0x0000000010000000-0x00000000101E6000-memory.dmp

    Filesize

    1.9MB

  • memory/460-7-0x0000000001DF0000-0x0000000001E57000-memory.dmp

    Filesize

    412KB

  • memory/460-0-0x0000000000400000-0x00000000005D4000-memory.dmp

    Filesize

    1.8MB

  • memory/460-6-0x0000000001DF0000-0x0000000001E57000-memory.dmp

    Filesize

    412KB

  • memory/460-141-0x0000000000400000-0x00000000005D4000-memory.dmp

    Filesize

    1.8MB

  • memory/460-263-0x0000000000400000-0x00000000005D4000-memory.dmp

    Filesize

    1.8MB

  • memory/460-1-0x0000000001DF0000-0x0000000001E57000-memory.dmp

    Filesize

    412KB

  • memory/600-382-0x000000002E000000-0x000000002FE1E000-memory.dmp

    Filesize

    30.1MB

  • memory/600-388-0x00000000004F0000-0x0000000000557000-memory.dmp

    Filesize

    412KB

  • memory/604-115-0x0000000000400000-0x00000000005E7000-memory.dmp

    Filesize

    1.9MB

  • memory/604-185-0x0000000000400000-0x00000000005E7000-memory.dmp

    Filesize

    1.9MB

  • memory/604-116-0x0000000000720000-0x0000000000787000-memory.dmp

    Filesize

    412KB

  • memory/604-121-0x0000000000720000-0x0000000000787000-memory.dmp

    Filesize

    412KB

  • memory/624-267-0x0000000140000000-0x00000001401ED000-memory.dmp

    Filesize

    1.9MB

  • memory/624-132-0x0000000140000000-0x00000001401ED000-memory.dmp

    Filesize

    1.9MB

  • memory/1088-376-0x0000000100000000-0x00000001001D4000-memory.dmp

    Filesize

    1.8MB

  • memory/1244-188-0x000007FEF3CF0000-0x000007FEF468D000-memory.dmp

    Filesize

    9.6MB

  • memory/1244-264-0x000007FEF3CF0000-0x000007FEF468D000-memory.dmp

    Filesize

    9.6MB

  • memory/1244-268-0x0000000000C30000-0x0000000000CB0000-memory.dmp

    Filesize

    512KB

  • memory/1244-354-0x000007FEF3CF0000-0x000007FEF468D000-memory.dmp

    Filesize

    9.6MB

  • memory/1244-285-0x0000000000C30000-0x0000000000CB0000-memory.dmp

    Filesize

    512KB

  • memory/1244-314-0x000007FEF3CF0000-0x000007FEF468D000-memory.dmp

    Filesize

    9.6MB

  • memory/1244-261-0x0000000000C30000-0x0000000000CB0000-memory.dmp

    Filesize

    512KB

  • memory/1244-340-0x0000000000C30000-0x0000000000CB0000-memory.dmp

    Filesize

    512KB

  • memory/1428-373-0x0000000073960000-0x000000007404E000-memory.dmp

    Filesize

    6.9MB

  • memory/1428-363-0x0000000000300000-0x0000000000367000-memory.dmp

    Filesize

    412KB

  • memory/1452-179-0x00000000002C0000-0x0000000000320000-memory.dmp

    Filesize

    384KB

  • memory/1452-304-0x0000000140000000-0x0000000140237000-memory.dmp

    Filesize

    2.2MB

  • memory/1452-174-0x0000000140000000-0x0000000140237000-memory.dmp

    Filesize

    2.2MB

  • memory/1452-172-0x00000000002C0000-0x0000000000320000-memory.dmp

    Filesize

    384KB

  • memory/1940-184-0x0000000000840000-0x00000000008A0000-memory.dmp

    Filesize

    384KB

  • memory/1940-371-0x0000000000840000-0x00000000008A0000-memory.dmp

    Filesize

    384KB

  • memory/1940-265-0x0000000140000000-0x00000001401ED000-memory.dmp

    Filesize

    1.9MB

  • memory/1988-398-0x0000000140000000-0x0000000140209000-memory.dmp

    Filesize

    2.0MB

  • memory/2236-333-0x0000000000390000-0x00000000003F7000-memory.dmp

    Filesize

    412KB

  • memory/2236-339-0x0000000073960000-0x000000007404E000-memory.dmp

    Filesize

    6.9MB

  • memory/2236-352-0x0000000073960000-0x000000007404E000-memory.dmp

    Filesize

    6.9MB

  • memory/2236-353-0x0000000000400000-0x00000000005E7000-memory.dmp

    Filesize

    1.9MB

  • memory/2312-396-0x00000000008A0000-0x0000000000900000-memory.dmp

    Filesize

    384KB

  • memory/2312-161-0x0000000140000000-0x00000001401F1000-memory.dmp

    Filesize

    1.9MB

  • memory/2312-394-0x0000000140000000-0x00000001401F1000-memory.dmp

    Filesize

    1.9MB

  • memory/2312-166-0x00000000008A0000-0x0000000000900000-memory.dmp

    Filesize

    384KB

  • memory/2312-294-0x0000000140000000-0x00000001401F1000-memory.dmp

    Filesize

    1.9MB

  • memory/2428-297-0x00000000005F0000-0x0000000000657000-memory.dmp

    Filesize

    412KB

  • memory/2428-310-0x0000000073960000-0x000000007404E000-memory.dmp

    Filesize

    6.9MB

  • memory/2428-305-0x00000000005F0000-0x0000000000657000-memory.dmp

    Filesize

    412KB

  • memory/2428-323-0x0000000073960000-0x000000007404E000-memory.dmp

    Filesize

    6.9MB

  • memory/2428-324-0x0000000000400000-0x00000000005E7000-memory.dmp

    Filesize

    1.9MB

  • memory/2648-320-0x0000000000390000-0x00000000003F7000-memory.dmp

    Filesize

    412KB

  • memory/2648-338-0x0000000000400000-0x00000000005E7000-memory.dmp

    Filesize

    1.9MB

  • memory/2648-325-0x0000000073960000-0x000000007404E000-memory.dmp

    Filesize

    6.9MB

  • memory/2648-337-0x0000000073960000-0x000000007404E000-memory.dmp

    Filesize

    6.9MB

  • memory/2676-143-0x0000000000820000-0x0000000000880000-memory.dmp

    Filesize

    384KB

  • memory/2676-159-0x0000000001430000-0x0000000001431000-memory.dmp

    Filesize

    4KB

  • memory/2676-142-0x0000000140000000-0x000000014013C000-memory.dmp

    Filesize

    1.2MB

  • memory/2676-150-0x0000000000820000-0x0000000000880000-memory.dmp

    Filesize

    384KB

  • memory/2676-149-0x0000000000820000-0x0000000000880000-memory.dmp

    Filesize

    384KB

  • memory/2676-153-0x0000000001380000-0x0000000001390000-memory.dmp

    Filesize

    64KB

  • memory/2676-154-0x0000000001390000-0x00000000013A0000-memory.dmp

    Filesize

    64KB

  • memory/2676-284-0x0000000001430000-0x0000000001431000-memory.dmp

    Filesize

    4KB

  • memory/2676-275-0x0000000140000000-0x000000014013C000-memory.dmp

    Filesize

    1.2MB

  • memory/2684-403-0x0000000073960000-0x000000007404E000-memory.dmp

    Filesize

    6.9MB

  • memory/2684-355-0x0000000073960000-0x000000007404E000-memory.dmp

    Filesize

    6.9MB

  • memory/2684-387-0x0000000000400000-0x00000000005E7000-memory.dmp

    Filesize

    1.9MB

  • memory/2708-282-0x0000000000310000-0x0000000000377000-memory.dmp

    Filesize

    412KB

  • memory/2708-274-0x0000000000310000-0x0000000000377000-memory.dmp

    Filesize

    412KB

  • memory/2708-309-0x0000000073960000-0x000000007404E000-memory.dmp

    Filesize

    6.9MB

  • memory/2708-295-0x0000000073960000-0x000000007404E000-memory.dmp

    Filesize

    6.9MB

  • memory/2708-308-0x0000000000400000-0x00000000005E7000-memory.dmp

    Filesize

    1.9MB

  • memory/2708-277-0x0000000000400000-0x00000000005E7000-memory.dmp

    Filesize

    1.9MB

  • memory/2748-95-0x0000000140000000-0x00000001401DC000-memory.dmp

    Filesize

    1.9MB

  • memory/2748-167-0x0000000140000000-0x00000001401DC000-memory.dmp

    Filesize

    1.9MB

  • memory/2808-105-0x0000000010000000-0x00000000101DE000-memory.dmp

    Filesize

    1.9MB

  • memory/2808-98-0x0000000010000000-0x00000000101DE000-memory.dmp

    Filesize

    1.9MB

  • memory/2972-157-0x0000000100000000-0x00000001001E3000-memory.dmp

    Filesize

    1.9MB

  • memory/2972-38-0x00000000008A0000-0x0000000000900000-memory.dmp

    Filesize

    384KB

  • memory/2972-39-0x00000000008A0000-0x0000000000900000-memory.dmp

    Filesize

    384KB

  • memory/2972-22-0x0000000100000000-0x00000001001E3000-memory.dmp

    Filesize

    1.9MB

  • memory/2972-13-0x00000000008A0000-0x0000000000900000-memory.dmp

    Filesize

    384KB