Resubmissions

25-06-2024 14:19

240625-rm6bxsvdkb 6

21-06-2024 15:11

240621-sknjrsygjm 6

17-06-2024 17:09

240617-vn6wmawhlb 10

14-06-2024 13:23

240614-qmxjcawdmm 10

Analysis

  • max time kernel
    497s
  • max time network
    492s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    25-06-2024 14:19

General

  • Target

    FileCenterSetup12.0.16.0.exe

  • Size

    300.4MB

  • MD5

    123556b83a3dad2f59e76602768e9536

  • SHA1

    b402ded286fff73aaf9b32f075bc32029da6d461

  • SHA256

    df2b7f274c484ae5baecb3365b1d9fcc4821facf327ce87724b1be597d0c70a9

  • SHA512

    bc8dc366b404756a55ab40b66bbcccc8d8b366b0f34938c14324d994118602f0be876eaa61234c18eef7ae4e797789da8dd996f023f0f67c0e053e8022dd3506

  • SSDEEP

    6291456:f7u0oceu41pUlsFqvFyeGCIOo7qgB5Fapf5NN9nAug:T9r4vXi5IOyJmfAx

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 3 IoCs
  • Drops desktop.ini file(s) 1 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 11 IoCs
  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 26 IoCs
  • Executes dropped EXE 32 IoCs
  • Loads dropped DLL 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Office loads VBA resources, possible macro or embedded object present
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Kills process with taskkill 35 IoCs
  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Modifies data under HKEY_USERS 46 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 42 IoCs
  • Suspicious behavior: SetClipboardViewer 13 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 46 IoCs
  • Suspicious use of SendNotifyMessage 38 IoCs
  • Suspicious use of SetWindowsHookEx 33 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\FileCenterSetup12.0.16.0.exe
    "C:\Users\Admin\AppData\Local\Temp\FileCenterSetup12.0.16.0.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2244
    • C:\Users\Admin\AppData\Local\Temp\is-18HER.tmp\FileCenterSetup12.0.16.0.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-18HER.tmp\FileCenterSetup12.0.16.0.tmp" /SL5="$400B2,314098152,831488,C:\Users\Admin\AppData\Local\Temp\FileCenterSetup12.0.16.0.exe"
      2⤵
      • Adds Run key to start application
      • Drops file in Program Files directory
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:2948
      • C:\Users\Admin\AppData\Local\Temp\is-10KR3.tmp\FileCenterUtils.exe
        "C:\Users\Admin\AppData\Local\Temp\is-10KR3.tmp\FileCenterUtils.exe" -S -INFO "-1" "3" "11" "C:\Users\Admin\AppData\Local\Temp\is-10KR3.tmp\FileCenterUtilsInfo.ini"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        PID:2944
      • C:\Users\Admin\AppData\Local\Temp\is-10KR3.tmp\FileCenterUtils.exe
        "C:\Users\Admin\AppData\Local\Temp\is-10KR3.tmp\FileCenterUtils.exe" -S -INFO "-1" "3" "11" "C:\Users\Admin\AppData\Local\Temp\is-10KR3.tmp\FileCenterUtilsInfo.ini"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        PID:2160
      • C:\Users\Admin\AppData\Local\Temp\is-10KR3.tmp\FileCenterUtils.exe
        "C:\Users\Admin\AppData\Local\Temp\is-10KR3.tmp\FileCenterUtils.exe" -CLOSEALL
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1944
        • C:\Windows\SysWOW64\TASKKILL.exe
          TASKKILL /F /T /IM FileCenterScanner.exe
          4⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:620
        • C:\Windows\SysWOW64\TASKKILL.exe
          TASKKILL /F /T /IM FileCenterPortal.exe
          4⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:1616
        • C:\Windows\SysWOW64\TASKKILL.exe
          TASKKILL /F /T /IM FileCenterThumbs.exe
          4⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:3040
        • C:\Windows\SysWOW64\TASKKILL.exe
          TASKKILL /F /T /IM FileCenterReceipts.exe
          4⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:1552
        • C:\Windows\SysWOW64\TASKKILL.exe
          TASKKILL /F /T /IM FileCenterReports.exe
          4⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:1672
        • C:\Windows\SysWOW64\TASKKILL.exe
          TASKKILL /F /T /IM FileAgent.exe
          4⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:2896
        • C:\Windows\SysWOW64\TASKKILL.exe
          TASKKILL /F /T /IM FileCenterAgent.exe
          4⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:1948
      • C:\Users\Admin\AppData\Local\Temp\is-10KR3.tmp\FileCenterUtils.exe
        "C:\Users\Admin\AppData\Local\Temp\is-10KR3.tmp\FileCenterUtils.exe" -INSTBEG
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:676
        • C:\Windows\SysWOW64\TASKKILL.exe
          TASKKILL /F /T /IM FileCenterScanner.exe
          4⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:292
        • C:\Windows\SysWOW64\TASKKILL.exe
          TASKKILL /F /T /IM FileCenterPortal.exe
          4⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:2976
        • C:\Windows\SysWOW64\TASKKILL.exe
          TASKKILL /F /T /IM FileCenterThumbs.exe
          4⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:2492
        • C:\Windows\SysWOW64\TASKKILL.exe
          TASKKILL /F /T /IM FileCenterReceipts.exe
          4⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:2912
        • C:\Windows\SysWOW64\TASKKILL.exe
          TASKKILL /F /T /IM FileCenterReports.exe
          4⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:1448
        • C:\Windows\SysWOW64\TASKKILL.exe
          TASKKILL /F /T /IM FileAgent.exe
          4⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:2020
        • C:\Windows\SysWOW64\TASKKILL.exe
          TASKKILL /F /T /IM FileCenterAgent.exe
          4⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:2220
      • C:\Program Files (x86)\FileCenter\Main\FileCenterUtils.exe
        "C:\Program Files (x86)\FileCenter\Main\FileCenterUtils.exe" -INSTEND
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        PID:1528
        • C:\Windows\SysWOW64\regsvr32.exe
          "C:\Windows\SysWOW64\regsvr32.exe" /s "C:\Program Files (x86)\FileCenter\Main\PDFXEditCore.x86.dll"
          4⤵
          • Loads dropped DLL
          • Modifies registry class
          PID:1852
        • C:\Program Files (x86)\FileCenter\Main\GdPictureComReg.exe
          "C:\Program Files (x86)\FileCenter\Main\GdPictureComReg.exe" /silent
          4⤵
          • Executes dropped EXE
          PID:2908
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe" /s "C:\Program Files (x86)\FileCenter\Main\GdPicture.NET.14.dll" /codebase /tlb
            5⤵
            • Loads dropped DLL
            • Modifies registry class
            PID:2612
          • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\regasm.exe
            "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\regasm.exe" /s "C:\Program Files (x86)\FileCenter\Main\GdPicture.NET.14.dll" /codebase /tlb:GdPicture.NET.14.64.tlb
            5⤵
            • Modifies registry class
            PID:2196
        • C:\Windows\SysWOW64\regsvr32.exe
          "C:\Windows\SysWOW64\regsvr32.exe" /s "C:\Program Files (x86)\FileCenter\Main\dten600.dll"
          4⤵
          • Loads dropped DLL
          • Modifies registry class
          PID:2572
        • C:\Windows\SysWOW64\regsvr32.exe
          "C:\Windows\SysWOW64\regsvr32.exe" /s "C:\Program Files (x86)\FileCenter\Main\lbvProt.dll"
          4⤵
          • Loads dropped DLL
          PID:1484
        • C:\Windows\SysWOW64\regsvr32.exe
          "C:\Windows\SysWOW64\regsvr32.exe" /s "C:\Program Files (x86)\FileCenter\Main\VSTwain.dll"
          4⤵
          • Loads dropped DLL
          • Modifies registry class
          PID:2368
        • C:\Windows\SysWOW64\regsvr32.exe
          "C:\Windows\SysWOW64\regsvr32.exe" /s "C:\Program Files (x86)\FileCenter\Main\secman.dll"
          4⤵
          • Loads dropped DLL
          • Modifies registry class
          PID:1076
        • C:\Windows\SysWOW64\regsvr32.exe
          "C:\Windows\SysWOW64\regsvr32.exe" /s "C:\Program Files (x86)\FileCenter\Main\FileCenterAddin.dll"
          4⤵
          • Loads dropped DLL
          • Suspicious behavior: EnumeratesProcesses
          PID:2580
        • C:\Program Files (x86)\FileCenter\Main\vc_redist.x86.exe
          "C:\Program Files (x86)\FileCenter\Main\vc_redist.x86.exe" /install /quiet /norestart
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:1172
          • C:\Windows\Temp\{6DA8EC1C-F029-4684-8D80-A1D70816A7DE}\.cr\vc_redist.x86.exe
            "C:\Windows\Temp\{6DA8EC1C-F029-4684-8D80-A1D70816A7DE}\.cr\vc_redist.x86.exe" -burn.clean.room="C:\Program Files (x86)\FileCenter\Main\vc_redist.x86.exe" -burn.filehandle.attached=180 -burn.filehandle.self=188 /install /quiet /norestart
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            PID:568
        • C:\Program Files (x86)\FileCenter\Main\FileCenterAutomateService.exe
          "C:\Program Files (x86)\FileCenter\Main\FileCenterAutomateService.exe" /install /silent
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          PID:1676
      • C:\Program Files (x86)\FileCenter\Main\FileCenterUtils.exe
        "C:\Program Files (x86)\FileCenter\Main\FileCenterUtils.exe" -PRINTER
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        PID:1684
        • C:\Program Files (x86)\FileCenter\Drivers\PDFXLite10.exe
          "C:\Program Files (x86)\FileCenter\Drivers\PDFXLite10.exe" /quiet /norestart /log "C:\ProgramData\FileCenter\PDFPrinterLog.txt" PNAME="FileCenter PDF Printer" ORGANIZATION="FileCenter"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:556
          • C:\Windows\Temp\{7AB6B2FC-A6AB-42BF-B726-C4A314B38F2B}\.cr\PDFXLite10.exe
            "C:\Windows\Temp\{7AB6B2FC-A6AB-42BF-B726-C4A314B38F2B}\.cr\PDFXLite10.exe" -burn.clean.room="C:\Program Files (x86)\FileCenter\Drivers\PDFXLite10.exe" -burn.filehandle.attached=180 -burn.filehandle.self=188 /quiet /norestart /log "C:\ProgramData\FileCenter\PDFPrinterLog.txt" PNAME="FileCenter PDF Printer" ORGANIZATION="FileCenter"
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            PID:1596
            • C:\Windows\Temp\{B8785585-5D21-4503-9B56-0D5CE82754F9}\.be\PDFXLite10.exe
              "C:\Windows\Temp\{B8785585-5D21-4503-9B56-0D5CE82754F9}\.be\PDFXLite10.exe" -q -burn.elevated BurnPipe.{59900D54-F2AA-469A-B4D7-1C29122D04B4} {991BC7ED-CBA4-449D-8DA1-0FDF4ED443A6} 1596
              6⤵
              • Adds Run key to start application
              • Drops file in Windows directory
              • Executes dropped EXE
              • Suspicious use of AdjustPrivilegeToken
              PID:2972
      • C:\Program Files (x86)\FileCenter\Main\FileCenterUtils.exe
        "C:\Program Files (x86)\FileCenter\Main\FileCenterUtils.exe" -DRIVER
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        PID:968
        • C:\Program Files (x86)\FileCenter\Drivers\PDFX5SA_sm.exe
          "C:\Program Files (x86)\FileCenter\Drivers\PDFX5SA_sm.exe" /VERYSILENT /NORESTART /NOICONS /COMPONENTS="pdfSaver,PDFXChangedriver" /DIR="C:\Program Files (x86)\FileCenter\Drivers\" /PName="XChange Internal Driver" "/Organization:FileCenter" /LOG="C:\ProgramData\FileCenter\PDFDriverLog.txt"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:1028
          • C:\Users\Admin\AppData\Local\Temp\is-L9SMV.tmp\PDFX5SA_sm.tmp
            "C:\Users\Admin\AppData\Local\Temp\is-L9SMV.tmp\PDFX5SA_sm.tmp" /SL5="$6020C,5384545,119296,C:\Program Files (x86)\FileCenter\Drivers\PDFX5SA_sm.exe" /VERYSILENT /NORESTART /NOICONS /COMPONENTS="pdfSaver,PDFXChangedriver" /DIR="C:\Program Files (x86)\FileCenter\Drivers\" /PName="XChange Internal Driver" "/Organization:FileCenter" /LOG="C:\ProgramData\FileCenter\PDFDriverLog.txt"
            5⤵
            • Drops file in Program Files directory
            • Executes dropped EXE
            • Loads dropped DLL
            • Modifies Internet Explorer settings
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of FindShellTrayWindow
            PID:2068
            • C:\Program Files (x86)\FileCenter\Drivers\PDF-XChange 5\prninstaller.exe
              "C:\Program Files (x86)\FileCenter\Drivers\PDF-XChange 5\prninstaller.exe" /W0 /I /N:"XChange Internal Driver" /Base:"PDF-XChange "
              6⤵
              • Drops file in System32 directory
              • Executes dropped EXE
              PID:2144
            • C:\Program Files (x86)\FileCenter\Drivers\PDF-XChange 5\pdfSaver5.exe
              "C:\Program Files (x86)\FileCenter\Drivers\PDF-XChange 5\pdfSaver5.exe" /RegServer
              6⤵
              • Executes dropped EXE
              PID:2388
            • C:\Program Files (x86)\FileCenter\Drivers\Vault\XCVault.exe
              "C:\Program Files (x86)\FileCenter\Drivers\Vault\XCVault.exe" /install
              6⤵
              • Executes dropped EXE
              PID:788
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2632
  • C:\Windows\system32\DrvInst.exe
    DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "00000000000005BC" "0000000000000574"
    1⤵
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Suspicious use of AdjustPrivilegeToken
    PID:824
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Loads dropped DLL
    • Modifies Internet Explorer settings
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1656
    • C:\Windows\system32\MsiExec.exe
      C:\Windows\system32\MsiExec.exe -Embedding 1C1205C4768EDBB732F84686817D71C2
      2⤵
      • Drops desktop.ini file(s)
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      PID:2196
    • C:\Windows\system32\MsiExec.exe
      C:\Windows\system32\MsiExec.exe -Embedding 91B2E989F4FCDFDCD0A12253DF994FA5 M Global\MSI0000
      2⤵
      • Loads dropped DLL
      PID:872
    • C:\Program Files\Tracker Software\PDF-XChange Lite\Drivers\PrnInstaller.exe
      "C:\Program Files\Tracker Software\PDF-XChange Lite\Drivers\\PrnInstaller.exe" /L /I_D_R_M_P /F /N "FileCenter PDF Printer"
      2⤵
      • Drops file in System32 directory
      • Executes dropped EXE
      PID:1684
  • C:\Program Files (x86)\FileCenter\Main\FileCenter.exe
    "C:\Program Files (x86)\FileCenter\Main\FileCenter.exe"
    1⤵
    • Drops file in Windows directory
    • Executes dropped EXE
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: SetClipboardViewer
    • Suspicious use of SetWindowsHookEx
    PID:2024
    • C:\Program Files\Tracker Software\PDF-XChange Lite\pdfSaverL.exe
      "C:\Program Files\Tracker Software\PDF-XChange Lite\pdfSaverL.exe" /SetOptions "Save.RunApp=false" /Printer "FileCenter PDF Printer"
      2⤵
      • Executes dropped EXE
      PID:2540
    • C:\Program Files\Tracker Software\PDF-XChange Lite\pdfSaverL.exe
      "C:\Program Files\Tracker Software\PDF-XChange Lite\pdfSaverL.exe" /SetOptions "Save.RunApp=false" /Printer "PDF-XChange Lite"
      2⤵
      • Executes dropped EXE
      PID:1820
    • C:\Windows\SysWOW64\TASKKILL.exe
      TASKKILL /F /T /IM FileCenterThumbs.exe
      2⤵
      • Kills process with taskkill
      PID:1444
    • C:\Windows\SysWOW64\TASKKILL.exe
      TASKKILL /F /T /IM FileCenterThumbs.exe
      2⤵
      • Kills process with taskkill
      PID:1172
    • C:\Windows\SysWOW64\TASKKILL.exe
      TASKKILL /F /T /IM FileCenterThumbs.exe
      2⤵
      • Kills process with taskkill
      PID:620
    • C:\Windows\SysWOW64\TASKKILL.exe
      TASKKILL /F /T /IM FileCenterThumbs.exe
      2⤵
      • Kills process with taskkill
      PID:1684
    • C:\Program Files (x86)\FileCenter\Main\FileCenterUtils.exe
      "C:\Program Files (x86)\FileCenter\Main\FileCenterUtils.exe" -OLOFF
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:316
    • C:\Windows\SysWOW64\TASKKILL.exe
      TASKKILL /F /T /IM FileCenterScanner.exe
      2⤵
      • Kills process with taskkill
      PID:2568
    • C:\Windows\SysWOW64\TASKKILL.exe
      TASKKILL /F /T /IM FileCenterAgent.exe
      2⤵
      • Kills process with taskkill
      PID:1752
    • C:\Program Files (x86)\FileCenter\Main\FileCenterAgent.exe
      "C:\Program Files (x86)\FileCenter\Main\FileCenterAgent.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: SetClipboardViewer
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      PID:2896
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://www.filecenter.com/action.php?Action=Welcome&Refresh=1&ProductKey=&KeyID=-1&PTID=1&SourceID=-1&CustomID=-1&VerID=-1&PartnerID=0&WelcomeID=0&Version=12.0.16.0&CN=PUMARTNR&UN=Admin&Trial=0&DaysLeft=0&s=&cnt1=&cnt2=&cnt3=&cnt4=&cnt5=&cnt6=&cnt7=&cnt8=&cnt9=&x=1235
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      PID:2440
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2440 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1280
    • C:\Windows\SysWOW64\TASKKILL.exe
      TASKKILL /F /T /IM FileCenterThumbs.exe
      2⤵
      • Kills process with taskkill
      PID:1692
    • C:\Windows\SysWOW64\TASKKILL.exe
      TASKKILL /F /T /IM FileCenterThumbs.exe
      2⤵
      • Kills process with taskkill
      PID:1800
    • C:\Windows\SysWOW64\TASKKILL.exe
      TASKKILL /F /T /IM FileCenterThumbs.exe
      2⤵
      • Kills process with taskkill
      PID:1852
    • C:\Windows\SysWOW64\TASKKILL.exe
      TASKKILL /F /T /IM FileCenterThumbs.exe
      2⤵
      • Kills process with taskkill
      PID:1972
    • C:\Windows\SysWOW64\TASKKILL.exe
      TASKKILL /F /T /IM FileCenterThumbs.exe
      2⤵
      • Kills process with taskkill
      PID:2328
    • C:\Program Files (x86)\FileCenter\Main\FileCenterAgent.exe
      "C:\Program Files (x86)\FileCenter\Main\FileCenterAgent.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: SetClipboardViewer
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      PID:2700
    • C:\Windows\SysWOW64\TASKKILL.exe
      TASKKILL /F /T /IM FileCenterThumbs.exe
      2⤵
      • Kills process with taskkill
      PID:2580
    • C:\Windows\SysWOW64\TASKKILL.exe
      TASKKILL /F /T /IM FileCenterScanner.exe
      2⤵
      • Kills process with taskkill
      PID:2844
  • C:\Program Files (x86)\FileCenter\Main\FileCenter.exe
    "C:\Program Files (x86)\FileCenter\Main\FileCenter.exe"
    1⤵
    • Executes dropped EXE
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:1436
  • C:\Program Files (x86)\FileCenter\Main\FileCenter.exe
    "C:\Program Files (x86)\FileCenter\Main\FileCenter.exe"
    1⤵
    • Drops file in Windows directory
    • Executes dropped EXE
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: SetClipboardViewer
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    PID:3388
    • C:\Windows\SysWOW64\TASKKILL.exe
      TASKKILL /F /T /IM FileCenterThumbs.exe
      2⤵
      • Kills process with taskkill
      PID:3480
    • C:\Windows\SysWOW64\TASKKILL.exe
      TASKKILL /F /T /IM FileCenterThumbs.exe
      2⤵
      • Kills process with taskkill
      PID:3544
    • C:\Windows\SysWOW64\TASKKILL.exe
      TASKKILL /F /T /IM FileCenterThumbs.exe
      2⤵
      • Kills process with taskkill
      PID:3588
    • C:\Windows\SysWOW64\TASKKILL.exe
      TASKKILL /F /T /IM FileCenterThumbs.exe
      2⤵
      • Kills process with taskkill
      PID:3636
    • C:\Windows\SysWOW64\TASKKILL.exe
      TASKKILL /F /T /IM FileCenterScanner.exe
      2⤵
      • Kills process with taskkill
      PID:3684
    • C:\Windows\SysWOW64\TASKKILL.exe
      TASKKILL /F /T /IM FileCenterThumbs.exe
      2⤵
      • Kills process with taskkill
      PID:3732
    • C:\Windows\SysWOW64\TASKKILL.exe
      TASKKILL /F /T /IM FileCenterThumbs.exe
      2⤵
      • Kills process with taskkill
      PID:3764
    • C:\Program Files (x86)\FileCenter\Main\FileCenterAgent.exe
      "C:\Program Files (x86)\FileCenter\Main\FileCenterAgent.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:3800
    • C:\Windows\SysWOW64\TASKKILL.exe
      TASKKILL /F /T /IM FileCenterThumbs.exe
      2⤵
      • Kills process with taskkill
      PID:3936
  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe"
    1⤵
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:4008
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef67b9758,0x7fef67b9768,0x7fef67b9778
      2⤵
        PID:4020
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1172 --field-trial-handle=1196,i,3647607381627150116,6781156639131274547,131072 /prefetch:2
        2⤵
          PID:2316
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1544 --field-trial-handle=1196,i,3647607381627150116,6781156639131274547,131072 /prefetch:8
          2⤵
            PID:1132
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1588 --field-trial-handle=1196,i,3647607381627150116,6781156639131274547,131072 /prefetch:8
            2⤵
              PID:932
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2240 --field-trial-handle=1196,i,3647607381627150116,6781156639131274547,131072 /prefetch:1
              2⤵
                PID:1280
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2356 --field-trial-handle=1196,i,3647607381627150116,6781156639131274547,131072 /prefetch:1
                2⤵
                  PID:1996
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1480 --field-trial-handle=1196,i,3647607381627150116,6781156639131274547,131072 /prefetch:2
                  2⤵
                    PID:1604
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1460 --field-trial-handle=1196,i,3647607381627150116,6781156639131274547,131072 /prefetch:1
                    2⤵
                      PID:2648
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3224 --field-trial-handle=1196,i,3647607381627150116,6781156639131274547,131072 /prefetch:8
                      2⤵
                        PID:2632
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3476 --field-trial-handle=1196,i,3647607381627150116,6781156639131274547,131072 /prefetch:1
                        2⤵
                          PID:864
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=3248 --field-trial-handle=1196,i,3647607381627150116,6781156639131274547,131072 /prefetch:1
                          2⤵
                            PID:3108
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=2980 --field-trial-handle=1196,i,3647607381627150116,6781156639131274547,131072 /prefetch:1
                            2⤵
                              PID:3296
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=3548 --field-trial-handle=1196,i,3647607381627150116,6781156639131274547,131072 /prefetch:1
                              2⤵
                                PID:2988
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=2948 --field-trial-handle=1196,i,3647607381627150116,6781156639131274547,131072 /prefetch:1
                                2⤵
                                  PID:1932
                              • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                                "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                                1⤵
                                  PID:2596
                                • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
                                  "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\Desktop\EnterWrite.doc"
                                  1⤵
                                  • Drops file in Windows directory
                                  • Modifies Internet Explorer settings
                                  • Suspicious behavior: AddClipboardFormatListener
                                  • Suspicious use of SetWindowsHookEx
                                  PID:1564
                                  • C:\Windows\splwow64.exe
                                    C:\Windows\splwow64.exe 12288
                                    2⤵
                                    • Drops file in System32 directory
                                    PID:2712
                                    • C:\Program Files\Tracker Software\PDF-XChange Lite\pdfSaverL.exe
                                      "C:\Program Files\Tracker Software\PDF-XChange Lite\pdfSaverL.exe"
                                      3⤵
                                      • Executes dropped EXE
                                      • Suspicious use of FindShellTrayWindow
                                      • Suspicious use of SendNotifyMessage
                                      • Suspicious use of SetWindowsHookEx
                                      PID:3104
                                • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
                                  "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\Desktop\New Microsoft Word Document.docx"
                                  1⤵
                                  • Suspicious behavior: AddClipboardFormatListener
                                  • Suspicious use of SetWindowsHookEx
                                  PID:3040

                                Network

                                MITRE ATT&CK Matrix ATT&CK v13

                                Persistence

                                Boot or Logon Autostart Execution

                                1
                                T1547

                                Registry Run Keys / Startup Folder

                                1
                                T1547.001

                                Event Triggered Execution

                                1
                                T1546

                                Component Object Model Hijacking

                                1
                                T1546.015

                                Privilege Escalation

                                Boot or Logon Autostart Execution

                                1
                                T1547

                                Registry Run Keys / Startup Folder

                                1
                                T1547.001

                                Event Triggered Execution

                                1
                                T1546

                                Component Object Model Hijacking

                                1
                                T1546.015

                                Defense Evasion

                                Modify Registry

                                2
                                T1112

                                Discovery

                                Query Registry

                                4
                                T1012

                                Peripheral Device Discovery

                                1
                                T1120

                                System Information Discovery

                                3
                                T1082

                                Replay Monitor

                                Loading Replay Monitor...

                                Downloads

                                • C:\Config.Msi\f77c40e.rbs
                                  Filesize

                                  35KB

                                  MD5

                                  978a1601fa71cf53e02a5574dd88bc60

                                  SHA1

                                  fd49dd8d11ccf4e78bd64d39431b0b433be8784c

                                  SHA256

                                  13bdce262c947e27d65fe3727ffd8817f163f6edb521b99c546c378dcff474d2

                                  SHA512

                                  9aceb22d4ffa5fd9863cd7a042e2ba95ee53a57bbdc932b358ef00a98da3843c832a7f2421fd0924d77c9a62e082ec0546fb18757be9aa9b7f90199363fa1dbd

                                • C:\Program Files (x86)\FileCenter\Drivers\InnoCA.dll
                                  Filesize

                                  593KB

                                  MD5

                                  2fbf69d014ae135d473ec8243d44be9e

                                  SHA1

                                  2c28d3b23d8ff061ae554ccd92aec93900e3cb2b

                                  SHA256

                                  6f0d663f59487a01eebb128a9c4984789b91eaa764194ed9f0ed63583577d2d3

                                  SHA512

                                  530ab82b0ba1e148889bf41d6b00c67aee8ea4ff014b7e9d76bef682f8ce34a6908213b4d6f979ba02c6abe907cd1ac28bd323b4b766ede52b49ddd054d8b654

                                • C:\Program Files (x86)\FileCenter\Drivers\PDF-XChange 5\unins000.exe
                                  Filesize

                                  1.1MB

                                  MD5

                                  fa3f6d3bed7348ac3f45fde9e4ded1e4

                                  SHA1

                                  fdbf41b865e6a697142e8a2beb975ee728c41585

                                  SHA256

                                  3dbf88889ad9e347ac3fe93ec6f5d3771eff1fc2de39f8d7b3df9263a76b651e

                                  SHA512

                                  ed3d9fde7060b138b838ecc47969e601872b6a9541a39e24fbe7b56e1a68e414a93d9de187331d4dbf02430d4165c36ae2b167457e8ee90c59796ba7da972524

                                • C:\Program Files (x86)\FileCenter\Main\FileCenterAddin.ini
                                  Filesize

                                  27B

                                  MD5

                                  70da425f8aac14b1484047edb83e60e8

                                  SHA1

                                  69d09199af5a5ba4ed4e1d59432fec784d5271e4

                                  SHA256

                                  258d4ad31457b1c117b248b6ba0dd1c44ba6ad0a0839623ced45ce15ebbd0a7f

                                  SHA512

                                  a9cf352b79a8f38f03a781bf55a94e2c1344e1de55e9ea21e736ad436d7452f8349a64fec3b46e7ddc1d11f5fa3ecc80329b5b4e1da702680e9c2223e57943d2

                                • C:\Program Files (x86)\FileCenter\Main\GdPicture.NET.14.dll
                                  Filesize

                                  36.9MB

                                  MD5

                                  d9806fd0eeafd9f89e0473ad52889283

                                  SHA1

                                  d6fca558897aaa6703129557e2d02b1a84765dcb

                                  SHA256

                                  aa2aafe588aecd1a10bf05dcd675143061a55bcd5bc83bd749bde7b85d21dbc6

                                  SHA512

                                  796c609dc6fa4c6fe1e6909ae3a4a22cc06c900f34b999d77a9805767f69f1b1d96a99e9ee03ad6ab68e7f6bb5fa3269c1d73db4af68a2834bfd5cbf2fe91422

                                • C:\Program Files (x86)\FileCenter\Main\vc_redist.x86.exe
                                  Filesize

                                  13.6MB

                                  MD5

                                  35b40b21383ac38487ceec8ab6e53565

                                  SHA1

                                  59894bd9c96361b475c3b4b7ca9719c72e813d04

                                  SHA256

                                  caa38fd474164a38ab47ac1755c8ccca5ccfacfa9a874f62609e6439924e87ec

                                  SHA512

                                  3a00b40ba8cd1cf8a523efab656f5b8910a3b07f9d8fba4ffc07745165b6375affd77b00fd3064fa72fb984c1773438a39e67a55363be23dd8fe1727c1016b8e

                                • C:\ProgramData\FileCenter\ColumnStatesCab.ini
                                  Filesize

                                  5KB

                                  MD5

                                  3c78191be09b4a0cbad92cfeb1218759

                                  SHA1

                                  26ac00f02d2e39cba573e908adab29332fdf2d74

                                  SHA256

                                  e089ca10bb421f8d22fcd5a547fa2f491235c009ee27e0b4542d692a16d2c232

                                  SHA512

                                  ee6f21932a0d63854d6cd1bc2c8abb60463060ceb62aecf1133f51a3b1198ae520d64363f819402060c768611b62b48f9eb9e1baeeefc4e653b257b086316443

                                • C:\ProgramData\FileCenter\Config.ini
                                  Filesize

                                  42B

                                  MD5

                                  4a2b0b2d8d08db9fcc6eae2e25c9b4d1

                                  SHA1

                                  bcbd9242fe7ad0afabb143453d732657cfc79ede

                                  SHA256

                                  70bc9116d9db8cee6aaf87d19d323fc4961f90116b9a61281a981a461505974e

                                  SHA512

                                  5dc550410f15e4f64e637f61d8b6b09024b7502202ddd346463ac05b962d9bd6c3aecce6b85e089ca53184e99753cb2b137fae9ea26334d8044a0266742f6826

                                • C:\ProgramData\FileCenter\Config.ini
                                  Filesize

                                  23B

                                  MD5

                                  b2ad8f8dcc45644ea167317d050faac4

                                  SHA1

                                  215091d6ad9d4f210b85e675b17c60a7300ca9b1

                                  SHA256

                                  9aaebe4ab06e9de08e28b9b4da9248442c502ef5411d7d734c13af1afa2c2dd0

                                  SHA512

                                  528737e85d799e0312c335bbbb856f12ee885465e9b999d6cfb1b64d8c003744a5a6d6cd7ae2b6e41b9cbe23115990acd65debfcdd15e1677c955944403da6f4

                                • C:\ProgramData\FileCenter\Intercepts.ini
                                  Filesize

                                  6KB

                                  MD5

                                  293bfe23c32bd1332e4caf09e9bb347d

                                  SHA1

                                  1777f80e58dcc9b37cf87d73a4680723c7b87461

                                  SHA256

                                  3f6dd37419d2c2075812e0a104d0603d78a5cf1b378154e8d71c30c37de84264

                                  SHA512

                                  0ec00fc8b45d2fa205be404a37546772919f891d439e336dd601c0961355dd9afdbae983c254a9760207ea15b7b446b7b9d90ad93f7b938aeb74e838204be194

                                • C:\ProgramData\FileCenter\MRUPDFEditor.ini
                                  Filesize

                                  2B

                                  MD5

                                  f3b25701fe362ec84616a93a45ce9998

                                  SHA1

                                  d62636d8caec13f04e28442a0a6fa1afeb024bbb

                                  SHA256

                                  b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

                                  SHA512

                                  98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

                                • C:\ProgramData\FileCenter\MyPortal.ini
                                  Filesize

                                  26B

                                  MD5

                                  8af40c2a9db1af603163ed8b0e25a3d0

                                  SHA1

                                  36db1a9baec9e7d6d17073529afff9df063e68d9

                                  SHA256

                                  64b92b073e9519d07676100c694c63207f45b561ce66594b8728eae023ba0705

                                  SHA512

                                  2662a09e1cd148cbb4ee1124e4fdac6561699f447c986992651ff8fb8e7d005803b74ce5c1bb65c6f916ab1407894fabd453735c10378a94d5c918b1fe66688d

                                • C:\ProgramData\FileCenter\Packages.ini
                                  Filesize

                                  194B

                                  MD5

                                  cc64ef17e686ca21c5c9b1faabf2cf86

                                  SHA1

                                  8b61a362fa60ca12b1b902c337b37ac3ce52ed8f

                                  SHA256

                                  cacee38c680edc0b5ea6f66cd19e36cd462a32a81599ce5cfee2ac7e9a602f57

                                  SHA512

                                  3b4705e104a15bc08e1f9d70a19d18e91b3a1ac7b5541880ab38da1a4052e24bf687e2eed27e85cdc0dd98f9229a208c2eaa3a1fa14e750dad4036251d94f9da

                                • C:\ProgramData\FileCenter\Settings\HUBData_Lock.tmp
                                  Filesize

                                  14B

                                  MD5

                                  724deba0ee02aa7ad576295d784b1230

                                  SHA1

                                  f4f36556c9babc24a278f5f2ddcce4bff6a64bc7

                                  SHA256

                                  a98ebebe7123b54822d1250f6264dd8d971e47d5cc718fac967d2dd2374365ac

                                  SHA512

                                  3855cea9f71c3905baa510a42cf397da2b9f4f27cd071246e72911e646d6f5ba93fb120cb1a2f4d3e6a73d3d5ec40afc6dfbfb9e495e9bb9a2296930b1702239

                                • C:\ProgramData\FileCenter\Settings\User-Cabinets.txt
                                  Filesize

                                  246B

                                  MD5

                                  e75e989f725e7e48cc820f5c7af486c8

                                  SHA1

                                  f5c40c243e210f729f2c32ffe93726e2f5c5a013

                                  SHA256

                                  67bfb8f9801b296d6fcb68cc41080dc07317817e7085c3ad2c7534770e5dadb9

                                  SHA512

                                  08846020c4176b0db7b72abcaa1ff16af5c33ee8a00dc4577abfe99546a509696e56dfa79da372fd5a80689486ecafbb074f12bed9f77fae548111cfe17f53f2

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\DawnCache\data_1
                                  Filesize

                                  264KB

                                  MD5

                                  f50f89a0a91564d0b8a211f8921aa7de

                                  SHA1

                                  112403a17dd69d5b9018b8cede023cb3b54eab7d

                                  SHA256

                                  b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                                  SHA512

                                  bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
                                  Filesize

                                  5KB

                                  MD5

                                  a935830c46c99084b539ebb72879424d

                                  SHA1

                                  e3817fef3261a00f9cab542fc387812e3a47f728

                                  SHA256

                                  51ff5acda27a73dd1ed1d33c52ed56a3c38de926907ab1a5fc585bca81cdaf88

                                  SHA512

                                  b3f258251548e1503ba9b25c21749fe575adc979d08f0fa4cae19a99961ef24a511a971aba4feaf158a05e599b82d57a330aec8ce8067e923667c93c19659736

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\000007.dbtmp
                                  Filesize

                                  16B

                                  MD5

                                  18e723571b00fb1694a3bad6c78e4054

                                  SHA1

                                  afcc0ef32d46fe59e0483f9a3c891d3034d12f32

                                  SHA256

                                  8af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa

                                  SHA512

                                  43bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State
                                  Filesize

                                  140KB

                                  MD5

                                  d97aa7b23f1ed15894a2853ffdad84d5

                                  SHA1

                                  b2e8e52dde0ac90a9da84920474c8c69fca09fab

                                  SHA256

                                  d5bb523cad7cbfad6ea9af1ea95954cc4c37ee25eeb3ddc8327607de125c78f5

                                  SHA512

                                  2c4426c26b6aa28d45182d651804ccd7e3843aa777fe18f383d88ffdb84a9eca375fc45b19decba728c35177463f0aa4d602b7fb20f4854f3bc7ea733bdb5527

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\c3288cdb-b6e1-4a93-a1ab-b61b2d179ad2.tmp
                                  Filesize

                                  140KB

                                  MD5

                                  39216221f8ca7753341308ce4ec4e43d

                                  SHA1

                                  99a0d394874ccef85dd5b67bd60edcdc8f449fe0

                                  SHA256

                                  1b063d0d3f02bdd70d00152fe1cbf065d6e4fbd3bc94ec68bf638ec207226a04

                                  SHA512

                                  f7180c12825618384e679a4b1ef28683d97e90a9b11865b1de79341b16c9b6bad01e0ce4054f731817d8dca31c915cf4e005638552671add5c8ecf24d190d6b8

                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRD0002.doc
                                  Filesize

                                  1024KB

                                  MD5

                                  8dd498cd953de154a813a1fd0ede54b7

                                  SHA1

                                  9c9917190877ec574427a71f0ff3b71b11e1642e

                                  SHA256

                                  603f181dbb3affdb7ecb331b9dcece5759b49848cab524cce678d1ed53dc6c28

                                  SHA512

                                  825a5b2f0754be0e094e64c6e1bfae653dc67733e31b93409e70f4d3f1675931dbe78b118b7cd9ac87f1daefbd3227e99221607a6d86bb530fd4ad4e390637ea

                                • C:\Users\Admin\AppData\Local\Temp\CabC46A.tmp
                                  Filesize

                                  68KB

                                  MD5

                                  29f65ba8e88c063813cc50a4ea544e93

                                  SHA1

                                  05a7040d5c127e68c25d81cc51271ffb8bef3568

                                  SHA256

                                  1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

                                  SHA512

                                  e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

                                • C:\Users\Admin\AppData\Local\Temp\TarF3B7.tmp
                                  Filesize

                                  177KB

                                  MD5

                                  435a9ac180383f9fa094131b173a2f7b

                                  SHA1

                                  76944ea657a9db94f9a4bef38f88c46ed4166983

                                  SHA256

                                  67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

                                  SHA512

                                  1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

                                • C:\Users\Admin\AppData\Local\Temp\prnInstaller.log
                                  Filesize

                                  692B

                                  MD5

                                  39d1099c5c508cd9047324dd828ae547

                                  SHA1

                                  22139d9ee692f5ecaf95de8aafe8573712d7c426

                                  SHA256

                                  66f04dcba4dbe547acc24d03d0efa1505009597cd1d9a6a8f9439ff384ccc81b

                                  SHA512

                                  6df4e672bf357d1bc85654e1e35e7cf656e8361baec175de33e813aa7c21b2073b65e257f435e1fc51c516a6a6bf8e2676729f9853e603a3ae647118d8fd4a11

                                • C:\Users\Admin\AppData\Local\Temp\prnInstaller.log
                                  Filesize

                                  1KB

                                  MD5

                                  632a697f9db2e5f4236200d7a74ff402

                                  SHA1

                                  25ab97646150d322e309e593aa13fb62973f4afa

                                  SHA256

                                  d16af805ecb046ebc007eb7206e9eb57b6b454f3c55620338457390a6224f2ef

                                  SHA512

                                  475c0f43aa1eb50cfe4cdede0887e34ad6198832c54dc6c5f60c47d2d7d17f5d6cc4e34d276a7e32b0f58837f5e0f32dd9ec3c9399ec0fb0038a63578b816b84

                                • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat
                                  Filesize

                                  62B

                                  MD5

                                  3423fc30fa76b1d5a232b1094b06c1bb

                                  SHA1

                                  630acd3395c3eede942be87868a9fd3932346aa9

                                  SHA256

                                  b8fbc606b16cdfb92bafe0d3adbb5a2990caddca46be07d9c306ba16776df060

                                  SHA512

                                  420785c763b24406528a71cf99bb1aed7faaf876695dec297960d773606db036dc988d07ab7c191940162efd6e3cb604ffb1cbea811da3c33d3c8a5ca8eb7efa

                                • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat
                                  Filesize

                                  167B

                                  MD5

                                  8dfdee6ce769435ae6d91b21bea7c104

                                  SHA1

                                  222033ed7f32cce2d7743b4a955f49c9c52890db

                                  SHA256

                                  8608526e9683329208d46c632f064edf86b78e0ce503359edaa3f7f5cf6586a1

                                  SHA512

                                  f821c2aa4c33d8d7e043c5ec9da6b046ca4e47c054650df130e6d3b55ce4ca21bbfea654f265a6502e3ff4b0b0c4ae83257401d84614ba5fc9ef294c0b14fb55

                                • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm
                                  Filesize

                                  20KB

                                  MD5

                                  fd1748f1490ea1a080cbf12d0d07302d

                                  SHA1

                                  97d43a526f9a909b4b396e9fa449f90a870d878b

                                  SHA256

                                  c664e87c76476df687eed74780e856a7c4800994eaef28bacf98380867f7fe94

                                  SHA512

                                  e3a73ae3b7424df40ce994299069e9d3e33bb4151613ab758b7f03ed795624b5f8051fd75f5910e3685ffcb05a41b28489ff1f7b07d65f900b3700df2a61ac1f

                                • C:\Windows\Installer\MSI2426.tmp
                                  Filesize

                                  1.3MB

                                  MD5

                                  5a36339a5bae618a2ef09d0adab0b602

                                  SHA1

                                  437d251abdcfe4f9379c44336ff5b920df7a0fbf

                                  SHA256

                                  2e1d52eec9169247f75b584f874617ea4702cf2fdf92a4306d84c354a0151674

                                  SHA512

                                  cff119e5b719c8578d199b946fc213074d89195d63bf6cf00dc2c255cc66695d0062da2e916a22d4df4c1bb1e195f69df21c463d144ad9442defe7b3033ead2a

                                • C:\Windows\Installer\f77c40a.msi
                                  Filesize

                                  2.6MB

                                  MD5

                                  e91e50fc80f7d84561db5823595e5b63

                                  SHA1

                                  b3e40b17a668586e86f346e9a7e3b8ef4838d437

                                  SHA256

                                  3203656dcafaf1ae128dae78bab26829bf0c2c9e1c255a8ca15ed176651d8948

                                  SHA512

                                  c9bb45c0882af7a2f5b6294fa2c29202ac529a6f1584e763a00c4812782f8274498a9c008ef0901dd67d895fd448e0eeb19a75cfe98bcd4c050c8856f97e5034

                                • C:\Windows\Temp\{7AB6B2FC-A6AB-42BF-B726-C4A314B38F2B}\.cr\PDFXLite10.exe
                                  Filesize

                                  1.4MB

                                  MD5

                                  63ed90cdd501829a2319f8cf86c52bd2

                                  SHA1

                                  da198bec49015e98baa5b2cb91903f659e31dd37

                                  SHA256

                                  529bcd90e571d51a19396cb457bf7eebecf494613030389fa7c5b25b8e42757f

                                  SHA512

                                  d8cc05a5d481e17432125d21d58c2b32696c8b3e6632f911184292a0f0b24910e9dc5cc3ae2bdc6d87e478aef81504aa34520d3bd6813517e4b9347eee0eaa19

                                • C:\Windows\Temp\{AA693759-8FAD-44CF-BBC2-A4CDD9917794}\.ba\logo.png
                                  Filesize

                                  1KB

                                  MD5

                                  d6bd210f227442b3362493d046cea233

                                  SHA1

                                  ff286ac8370fc655aea0ef35e9cf0bfcb6d698de

                                  SHA256

                                  335a256d4779ec5dcf283d007fb56fd8211bbcaf47dcd70fe60ded6a112744ef

                                  SHA512

                                  464aaab9e08de610ad34b97d4076e92dc04c2cdc6669f60bfc50f0f9ce5d71c31b8943bd84cee1a04fb9ab5bbed3442bd41d9cb21a0dd170ea97c463e1ce2b5b

                                • C:\Windows\Temp\{B8785585-5D21-4503-9B56-0D5CE82754F9}\.ba\logo.png
                                  Filesize

                                  5KB

                                  MD5

                                  04967ef5107480ea36b3e2e97af7eb7a

                                  SHA1

                                  6efdd4484dcfcfd45b3c887c852f0abb1a02a645

                                  SHA256

                                  63f2616963b68ac13dab898c1b5938ab1b353a9ba0f73c6a2f2c3c5c9eac0b21

                                  SHA512

                                  00ae4cff10b1a6e504d590d49bc4af707ad33c1739ed46f648dc348645bd5d4b61bf0c84448c78d7542fb6d7294f3aa753b4106579f15b1d726bf1118594c581

                                • \??\PIPE\srvsvc
                                  MD5

                                  d41d8cd98f00b204e9800998ecf8427e

                                  SHA1

                                  da39a3ee5e6b4b0d3255bfef95601890afd80709

                                  SHA256

                                  e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                                  SHA512

                                  cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                                • \Program Files (x86)\FileCenter\Drivers\PDFXLite10.exe
                                  Filesize

                                  40.5MB

                                  MD5

                                  4c61ee01d5b84db67c38c10d3f210f39

                                  SHA1

                                  844eab66505dc4eb88dec70c3f20307365c350ac

                                  SHA256

                                  a7e10bda5cb2e1c347b2ee682385fd56ff5da05c659c665abc0b526f639a5583

                                  SHA512

                                  a44a2bd871c9f0f654b0e627accc9d4388390e5e5b7326a3372a103886d74b89ab78e235e1b986da9acf0f08fdf45b642ec26000bbe32de92a44b1978f4c2f80

                                • \Program Files (x86)\FileCenter\Main\FileCenter.exe
                                  Filesize

                                  20.1MB

                                  MD5

                                  879d5b401a73cc57a3166ba01ce70c60

                                  SHA1

                                  ee8b47af48514a3b65f4ee838c95e7a3a64d3434

                                  SHA256

                                  82da544c9d730c17c34a253c29fd7d621e8cdc064e0220c27e43bb0dd60c4ebe

                                  SHA512

                                  6e49343acca8ab878b4cf9e12ce4d796decd7f44c7068f8d90f5ad2eebbab31c15c82bbf66bcb571120a9bf8e375055558308d00b66053591c6ec94fb514b3b6

                                • \Program Files (x86)\FileCenter\Main\FileCenterAddin.dll
                                  Filesize

                                  13.0MB

                                  MD5

                                  2b9bbd88d6b6a3b7c417cbb0eae69bf4

                                  SHA1

                                  c43ab9fa5c1085ba21280d143f8b8322d6a93883

                                  SHA256

                                  1e5f8dbd4c08faf3a0a84b6af17454d9d21459618b411696b9604af80ee9fc0f

                                  SHA512

                                  f07ae3e76066960a3b657146b83da724ca13873edd82d7314d048593c3e6021ced3297459d46a30daf95189631bfd4c941e44d91433549dcc70efb5407543a30

                                • \Program Files (x86)\FileCenter\Main\FileCenterAdmin.exe
                                  Filesize

                                  15.2MB

                                  MD5

                                  30a169811bbb56f80ad2ef63bafd48bf

                                  SHA1

                                  61006f10a4ec28c8dcc2f19485306a349e65d82c

                                  SHA256

                                  5e6a19aa1448fdf5861b3a663d81e149582c65022d31020cad58e71943d850b9

                                  SHA512

                                  149df30e330b61345562bf5f6cdd313b73df3386cccfe0d56c178daa5172c10b120bb3bc9a6ce9de935772466c76af03cba9c399f1b60bec0470ec2ba9ffc9e5

                                • \Program Files (x86)\FileCenter\Main\FileCenterAutomate.exe
                                  Filesize

                                  15.1MB

                                  MD5

                                  b54c915c76810bd4ae1cacf3f60d3fcf

                                  SHA1

                                  348c04cd0057b2e12c64ae8911533ef9046a786b

                                  SHA256

                                  1d98350a7cd23ca173b6405ce46fe002f8ca340cd7362a1dd90927508ae37459

                                  SHA512

                                  dd8199c6edfe413d332c5925d75aea74ae96d8ff1efa323e57ca69c23065904b2db715b6af413bcca9f99b33280dacee24c695bf9cf61bb9dfae38112e9534ee

                                • \Program Files (x86)\FileCenter\Main\FileCenterAutomateService.exe
                                  Filesize

                                  7.7MB

                                  MD5

                                  42d9ffbb0b7ef3cbdeb0c005619b12fb

                                  SHA1

                                  fbaed95c25aa26c43121e8421b5154e9e5dcdca0

                                  SHA256

                                  59e5b75c18c82acf2d94a1fd9b0a67af6795d594e1f837df1a80eec66671d307

                                  SHA512

                                  c77b91ca41b13bb471ced5346f998805430a33e210c09c0d7e0b0a7573d9e95da1bc5e351df08c871e1c3e962b3ec4b9fdb5ef5cc806fd87ef42f50ddd99d7cb

                                • \Program Files (x86)\FileCenter\Main\FileCenterPortal.exe
                                  Filesize

                                  19.4MB

                                  MD5

                                  b117c8ab833f3fd2e645588b76e0350d

                                  SHA1

                                  542f9f159f61c53b6bddf3c12ee599f841894032

                                  SHA256

                                  fc84fcca5174673afc19102cc1ece6927f340a5b787602ae7c8487dd48af0183

                                  SHA512

                                  d662b913d390ff27cbecde257f6a3b873d8727df9d83fef57cce51be744e9748b18471b24af23adee36772ac5df7605a411b158c5e0aae276a55a4cff3117ef1

                                • \Program Files (x86)\FileCenter\Main\FileCenterScan.exe
                                  Filesize

                                  18.4MB

                                  MD5

                                  48c0dc674559c958633f98b057ebcf26

                                  SHA1

                                  07af2ae436c357cf1ba508f0825654100cb56c07

                                  SHA256

                                  7dcbb120bff0e4eb3e1964c56de1d528810a64b28e224fe9f3bc1d65e15cb896

                                  SHA512

                                  7ecadbfa6ac7fdcdd274cee98329c614f3c387aaff658b163349ec4a42f782a8dcf7c1528ba0cfea362bf9b43c80f3e6aaf34f414767da51d3b2c3b425aafa00

                                • \Program Files (x86)\FileCenter\Main\GdPictureComReg.exe
                                  Filesize

                                  21KB

                                  MD5

                                  b9718823c993fccb6352cc0210993569

                                  SHA1

                                  4d551f7cafd0040ff9657ca644c1365f3e7847ae

                                  SHA256

                                  a173ba320929c93b9bf41186a0692d753da812b8691dcc416c16abdf004dbf89

                                  SHA512

                                  6e513ef7535539cff90e88b95c5f57bb9e262cebbf1e51bc8268595347fbf06f628cf16eaa974d7eccd2a285ff2f8f56867c4292c1fe4fb7b0ee90f5acee9747

                                • \Program Files (x86)\FileCenter\Main\VSTwain.dll
                                  Filesize

                                  573KB

                                  MD5

                                  13f5f7e228ce2b8a3a41dbad4e451279

                                  SHA1

                                  1b3837572602b2620b75bf2ad2aeab89a64f5287

                                  SHA256

                                  11b50ff0bc4e72cd2dd47fb8070a86781682b92a9fb1010a5fae97276afb2292

                                  SHA512

                                  24ea8072abb5c0d4083989539f399ad076cc92260aaf0317320dddb4196e752e1c082d386c75049a343b1c62765d587f2b66374b53e7b24326ee6129a7aa856d

                                • \Program Files (x86)\FileCenter\Main\dten600.dll
                                  Filesize

                                  7.7MB

                                  MD5

                                  22cf875a0cf0ad89f5f7d7ac6628a598

                                  SHA1

                                  c2a9620579a08d6a91557e6cb8f1d2585392d30d

                                  SHA256

                                  11ef1b8791cfd8fee0923ec685ae1d29485349ce7d2d37a15ae1615e8d646baf

                                  SHA512

                                  3b59898730a9eb4a8f4347b8c854983636b28f6641b072fdd0d7f9190b905fc9b03dcf204154072048dc1a6a24785d2aead865b5bf160c9af9df87cf4175c608

                                • \Program Files (x86)\FileCenter\Main\lbvProt.dll
                                  Filesize

                                  532KB

                                  MD5

                                  120387e48d0556538ef3ee68de18a707

                                  SHA1

                                  0633de57f7ef851115be39d407db8e08986b3d93

                                  SHA256

                                  e202172ad8799ee0feee2559ac06f2cf75530f702f7e11d0cb4c1b3ec57eae4e

                                  SHA512

                                  a7509c2822bd7f08b5e67dfbd3d9ac701639599b5681966f5276f51e60608dcd7dafaa953f7589d99de7ba7b68eaa56be0ecb2c074f5c4ba6ba114880507b1da

                                • \Program Files (x86)\FileCenter\Main\secman.dll
                                  Filesize

                                  146KB

                                  MD5

                                  085d87f49daf13496e0e018c4008fae6

                                  SHA1

                                  4b0c3058b8ace7e8242c941b449daa968f5b45c7

                                  SHA256

                                  d1f1e3717a68166942d1f7a71b78e35e3381edbb07d7d37ae8b603dcc3ffad15

                                  SHA512

                                  52886de13e538e0eef364a16da1ccd24a571450d417ead4ddb689efe8e8099f9964c5f6076a239e833bd41c88f2f95f30c20d722f880837aa541be366407145b

                                • \Users\Admin\AppData\Local\Temp\is-10KR3.tmp\FileCenterUtils.exe
                                  Filesize

                                  8.7MB

                                  MD5

                                  e9638374a27160513f1a62827b6cf102

                                  SHA1

                                  b9da58896020d46c4ef16f8f1b332d5f6c1e6f0f

                                  SHA256

                                  c064ba394872e6a8277a5c71b50da34b800d682e403c6b80ec3ba37badf38942

                                  SHA512

                                  9632c8416f542dc96f22a0ddcd109e85c29368b1263d86f74bab39aae8e9271a7b3e2eea18932cf4e3fb5e269d3892016b878d29fb6dad002db11367849f293c

                                • \Users\Admin\AppData\Local\Temp\is-18HER.tmp\FileCenterSetup12.0.16.0.tmp
                                  Filesize

                                  3.0MB

                                  MD5

                                  0acf3c16e6faca9c0aec525f53d03866

                                  SHA1

                                  5c3960b48d2b72ad02e59470d8a7b690ee826f9e

                                  SHA256

                                  2c470730bf3efa3f4a9dc184548abefbab8c4aecc43e14834c5810159019c151

                                  SHA512

                                  17d98a3b52eb89e02a371f1d6effa59f624696cd14b0589fe436640ddbe04fc6c5d82834f73699dbaa32a7a69343f82863820e72e225e17d710c4de5102b46c2

                                • \Windows\Temp\{6DA8EC1C-F029-4684-8D80-A1D70816A7DE}\.cr\vc_redist.x86.exe
                                  Filesize

                                  632KB

                                  MD5

                                  86123c033231dd7e427d619ddeefd26a

                                  SHA1

                                  608c085348fd9c4e124e6f28f0388ccdac6ab2b5

                                  SHA256

                                  d863fb2f65bb6eea492e79ab9d09a53cc226e85f57d6545cb82f60b122a4b737

                                  SHA512

                                  ffb574123b350d3c9434abc88baa050ae6e54b5b9ebf3f1dcf4bf079284135696004508653e74a3a3c2fa8e4c1b681c3f31d5fe69e0f0c5f45ed37f9ddc61e78

                                • \Windows\Temp\{AA693759-8FAD-44CF-BBC2-A4CDD9917794}\.ba\wixstdba.dll
                                  Filesize

                                  191KB

                                  MD5

                                  eab9caf4277829abdf6223ec1efa0edd

                                  SHA1

                                  74862ecf349a9bedd32699f2a7a4e00b4727543d

                                  SHA256

                                  a4efbdb2ce55788ffe92a244cb775efd475526ef5b61ad78de2bcdfaddac7041

                                  SHA512

                                  45b15ade68e0a90ea7300aeb6dca9bc9e347a63dba5ce72a635957564d1bdf0b1584a5e34191916498850fc7b3b7ecfbcbfcb246b39dbf59d47f66bc825c6fd2

                                • memory/316-1192-0x0000000000FA0000-0x0000000001A36000-memory.dmp
                                  Filesize

                                  10.6MB

                                • memory/676-36-0x0000000000840000-0x00000000012D6000-memory.dmp
                                  Filesize

                                  10.6MB

                                • memory/968-783-0x0000000000930000-0x00000000013C6000-memory.dmp
                                  Filesize

                                  10.6MB

                                • memory/1028-781-0x0000000000400000-0x0000000000428000-memory.dmp
                                  Filesize

                                  160KB

                                • memory/1028-845-0x0000000000400000-0x0000000000428000-memory.dmp
                                  Filesize

                                  160KB

                                • memory/1528-689-0x0000000001370000-0x0000000001E06000-memory.dmp
                                  Filesize

                                  10.6MB

                                • memory/1676-688-0x00000000012B0000-0x0000000001A6B000-memory.dmp
                                  Filesize

                                  7.7MB

                                • memory/1684-732-0x0000000000240000-0x0000000000CD6000-memory.dmp
                                  Filesize

                                  10.6MB

                                • memory/1684-778-0x0000000000240000-0x0000000000CD6000-memory.dmp
                                  Filesize

                                  10.6MB

                                • memory/1684-780-0x0000000000240000-0x0000000000CD6000-memory.dmp
                                  Filesize

                                  10.6MB

                                • memory/1944-32-0x0000000000210000-0x0000000000CA6000-memory.dmp
                                  Filesize

                                  10.6MB

                                • memory/2024-1279-0x0000000000F80000-0x0000000002598000-memory.dmp
                                  Filesize

                                  22.1MB

                                • memory/2024-1243-0x0000000000F80000-0x0000000002598000-memory.dmp
                                  Filesize

                                  22.1MB

                                • memory/2024-1221-0x0000000000F80000-0x0000000002598000-memory.dmp
                                  Filesize

                                  22.1MB

                                • memory/2024-1222-0x00000000025A0000-0x0000000002FD9000-memory.dmp
                                  Filesize

                                  10.2MB

                                • memory/2024-1089-0x00000000025A0000-0x0000000002FD9000-memory.dmp
                                  Filesize

                                  10.2MB

                                • memory/2068-844-0x0000000000400000-0x000000000052C000-memory.dmp
                                  Filesize

                                  1.2MB

                                • memory/2160-27-0x00000000013A0000-0x0000000001E36000-memory.dmp
                                  Filesize

                                  10.6MB

                                • memory/2196-728-0x00000000008E0000-0x00000000008E8000-memory.dmp
                                  Filesize

                                  32KB

                                • memory/2196-727-0x000000001C1B0000-0x000000001E69A000-memory.dmp
                                  Filesize

                                  36.9MB

                                • memory/2196-726-0x000000001C1B0000-0x000000001E69A000-memory.dmp
                                  Filesize

                                  36.9MB

                                • memory/2196-725-0x000000013FC10000-0x000000013FC20000-memory.dmp
                                  Filesize

                                  64KB

                                • memory/2244-2-0x0000000000401000-0x00000000004B7000-memory.dmp
                                  Filesize

                                  728KB

                                • memory/2244-17-0x0000000000400000-0x00000000004D8000-memory.dmp
                                  Filesize

                                  864KB

                                • memory/2244-1088-0x0000000000400000-0x00000000004D8000-memory.dmp
                                  Filesize

                                  864KB

                                • memory/2244-0-0x0000000000400000-0x00000000004D8000-memory.dmp
                                  Filesize

                                  864KB

                                • memory/2368-576-0x0000000010000000-0x00000000101C8000-memory.dmp
                                  Filesize

                                  1.8MB

                                • memory/2612-690-0x0000000005140000-0x000000000762A000-memory.dmp
                                  Filesize

                                  36.9MB

                                • memory/2612-647-0x0000000001240000-0x0000000001252000-memory.dmp
                                  Filesize

                                  72KB

                                • memory/2612-722-0x0000000007850000-0x0000000007858000-memory.dmp
                                  Filesize

                                  32KB

                                • memory/2612-694-0x0000000005140000-0x000000000762A000-memory.dmp
                                  Filesize

                                  36.9MB

                                • memory/2700-1255-0x0000000002040000-0x0000000002A79000-memory.dmp
                                  Filesize

                                  10.2MB

                                • memory/2700-1282-0x0000000002040000-0x0000000002A79000-memory.dmp
                                  Filesize

                                  10.2MB

                                • memory/2896-1219-0x0000000000860000-0x0000000001CA6000-memory.dmp
                                  Filesize

                                  20.3MB

                                • memory/2896-1220-0x0000000001CB0000-0x00000000026E9000-memory.dmp
                                  Filesize

                                  10.2MB

                                • memory/2896-1193-0x0000000001CB0000-0x00000000026E9000-memory.dmp
                                  Filesize

                                  10.2MB

                                • memory/2908-587-0x00000000013C0000-0x00000000013C8000-memory.dmp
                                  Filesize

                                  32KB

                                • memory/2944-16-0x00000000001B0000-0x0000000000C46000-memory.dmp
                                  Filesize

                                  10.6MB

                                • memory/2948-91-0x0000000000400000-0x000000000071A000-memory.dmp
                                  Filesize

                                  3.1MB

                                • memory/2948-847-0x0000000000400000-0x000000000071A000-memory.dmp
                                  Filesize

                                  3.1MB

                                • memory/2948-24-0x0000000000400000-0x000000000071A000-memory.dmp
                                  Filesize

                                  3.1MB

                                • memory/2948-18-0x0000000000400000-0x000000000071A000-memory.dmp
                                  Filesize

                                  3.1MB

                                • memory/2948-29-0x0000000000400000-0x000000000071A000-memory.dmp
                                  Filesize

                                  3.1MB

                                • memory/2948-683-0x0000000000400000-0x000000000071A000-memory.dmp
                                  Filesize

                                  3.1MB

                                • memory/2948-1083-0x0000000000400000-0x000000000071A000-memory.dmp
                                  Filesize

                                  3.1MB

                                • memory/2948-9-0x0000000000400000-0x000000000071A000-memory.dmp
                                  Filesize

                                  3.1MB

                                • memory/2948-359-0x0000000000400000-0x000000000071A000-memory.dmp
                                  Filesize

                                  3.1MB

                                • memory/2948-1087-0x0000000000400000-0x000000000071A000-memory.dmp
                                  Filesize

                                  3.1MB