Analysis

  • max time kernel
    148s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    07-08-2024 01:55

General

  • Target

    a5ade64362442929ca1805bedb8e50530bb2790e46bd0aa4c6e4805728325466.exe

  • Size

    1.8MB

  • MD5

    ed34b680cf2b4103d23428eb4b766855

  • SHA1

    fc86edf6657ac81d58d1612de7088cc0bd60ce87

  • SHA256

    a5ade64362442929ca1805bedb8e50530bb2790e46bd0aa4c6e4805728325466

  • SHA512

    ee70154b74872c3f0c11a59c58def5bd8133e3157ccf39903bb28e35c4c96847678ae489c4e7be174b0ca597ca809b97de6b48eb1189d51b32300b91baeed85c

  • SSDEEP

    24576:jdFIeHFlGYDAnNQu49sfO+sKK/kMyRZybL0oDMXLHFkY07Vr68KZ:jAyXUGu490TR44XrT07Vr0Z

Malware Config

Signatures

  • Executes dropped EXE 51 IoCs
  • Loads dropped DLL 14 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in System32 directory 20 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 31 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 31 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 37 IoCs
  • Suspicious behavior: MapViewOfSection 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 37 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of SetWindowsHookEx 11 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\a5ade64362442929ca1805bedb8e50530bb2790e46bd0aa4c6e4805728325466.exe
    "C:\Users\Admin\AppData\Local\Temp\a5ade64362442929ca1805bedb8e50530bb2790e46bd0aa4c6e4805728325466.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2956
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
      2⤵
      • Drops file in System32 directory
      • Suspicious use of SetThreadContext
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      PID:2768
  • C:\Windows\System32\alg.exe
    C:\Windows\System32\alg.exe
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:2556
  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe
    C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe
    1⤵
    • Executes dropped EXE
    PID:1656
  • C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe
    C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe
    1⤵
    • Executes dropped EXE
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    PID:1692
  • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe
    C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe
    1⤵
    • Executes dropped EXE
    • Drops file in Windows directory
    PID:1244
  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
    C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
    1⤵
    • Executes dropped EXE
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:316
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1e4 -InterruptEvent 1d0 -NGENProcess 1d4 -Pipe 1e0 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2416
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1dc -InterruptEvent 248 -NGENProcess 250 -Pipe 254 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:3024
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 248 -InterruptEvent 244 -NGENProcess 1ec -Pipe 240 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2212
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 258 -InterruptEvent 1dc -NGENProcess 25c -Pipe 248 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2668
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1dc -InterruptEvent 260 -NGENProcess 1ec -Pipe 238 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1480
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1e4 -InterruptEvent 258 -NGENProcess 264 -Pipe 1dc -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2888
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 258 -InterruptEvent 244 -NGENProcess 1ec -Pipe 1d4 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:3008
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 244 -InterruptEvent 1ec -NGENProcess 250 -Pipe 26c -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2552
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1ec -InterruptEvent 25c -NGENProcess 268 -Pipe 23c -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1088
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 25c -InterruptEvent 274 -NGENProcess 258 -Pipe 270 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2636
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 274 -InterruptEvent 27c -NGENProcess 264 -Pipe 278 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2656
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 27c -InterruptEvent 284 -NGENProcess 260 -Pipe 280 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:468
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 28c -InterruptEvent 25c -NGENProcess 1ec -Pipe 274 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1316
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 25c -InterruptEvent 268 -NGENProcess 27c -Pipe 260 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2592
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 268 -InterruptEvent 27c -NGENProcess 244 -Pipe 258 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1548
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 27c -InterruptEvent 288 -NGENProcess 264 -Pipe 1e4 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:3064
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 288 -InterruptEvent 264 -NGENProcess 28c -Pipe 290 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2156
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 264 -InterruptEvent 284 -NGENProcess 24c -Pipe 250 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2604
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 284 -InterruptEvent 294 -NGENProcess 27c -Pipe 1ec -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1632
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 294 -InterruptEvent 27c -NGENProcess 288 -Pipe 29c -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:3028
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 27c -InterruptEvent 25c -NGENProcess 298 -Pipe 268 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1788
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 25c -InterruptEvent 2a0 -NGENProcess 284 -Pipe 244 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2292
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2a0 -InterruptEvent 2a4 -NGENProcess 288 -Pipe 28c -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2024
  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
    C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
    1⤵
    • Executes dropped EXE
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:2868
    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 1cc -InterruptEvent 1b8 -NGENProcess 1bc -Pipe 1c8 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:1928
    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 1c4 -InterruptEvent 230 -NGENProcess 238 -Pipe 23c -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:1536
  • C:\Windows\ehome\ehRecvr.exe
    C:\Windows\ehome\ehRecvr.exe
    1⤵
    • Executes dropped EXE
    PID:2968
  • C:\Windows\ehome\ehsched.exe
    C:\Windows\ehome\ehsched.exe
    1⤵
    • Executes dropped EXE
    PID:1904
  • C:\Windows\eHome\EhTray.exe
    "C:\Windows\eHome\EhTray.exe" /nav:-2
    1⤵
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:304
    • C:\Windows\SysWOW64\dfrgui.exe
      "C:\Windows\SysWOW64\dfrgui.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:1960
  • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
    "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
    1⤵
    • Executes dropped EXE
    PID:1428
  • C:\Windows\ehome\ehRec.exe
    C:\Windows\ehome\ehRec.exe -Embedding
    1⤵
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1616
  • C:\Windows\system32\IEEtwCollector.exe
    C:\Windows\system32\IEEtwCollector.exe /V
    1⤵
    • Executes dropped EXE
    PID:2204
  • C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE" /auditservice
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    PID:2420
  • C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe
    "C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"
    1⤵
    • Executes dropped EXE
    PID:1632
  • C:\Windows\System32\msdtc.exe
    C:\Windows\System32\msdtc.exe
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Drops file in Windows directory
    PID:2052
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Suspicious use of AdjustPrivilegeToken
    PID:1676
  • C:\Program Files (x86)\Common Files\Microsoft Shared\Source Engine\OSE.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\Source Engine\OSE.EXE"
    1⤵
    • Executes dropped EXE
    • System Location Discovery: System Language Discovery
    PID:2116
  • C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE
    "C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"
    1⤵
    • Executes dropped EXE
    PID:2108
  • C:\Windows\SysWow64\perfhost.exe
    C:\Windows\SysWow64\perfhost.exe
    1⤵
    • Executes dropped EXE
    • System Location Discovery: System Language Discovery
    PID:1692
  • C:\Windows\system32\locator.exe
    C:\Windows\system32\locator.exe
    1⤵
    • Executes dropped EXE
    PID:2872
  • C:\Windows\System32\snmptrap.exe
    C:\Windows\System32\snmptrap.exe
    1⤵
    • Executes dropped EXE
    PID:2360
  • C:\Windows\System32\vds.exe
    C:\Windows\System32\vds.exe
    1⤵
    • Executes dropped EXE
    PID:1984
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    PID:2176
  • C:\Windows\system32\wbengine.exe
    "C:\Windows\system32\wbengine.exe"
    1⤵
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    PID:3068
  • C:\Windows\system32\wbem\WmiApSrv.exe
    C:\Windows\system32\wbem\WmiApSrv.exe
    1⤵
    • Executes dropped EXE
    PID:1324
  • C:\Program Files\Windows Media Player\wmpnetwk.exe
    "C:\Program Files\Windows Media Player\wmpnetwk.exe"
    1⤵
    • Executes dropped EXE
    • Modifies data under HKEY_USERS
    • Suspicious use of AdjustPrivilegeToken
    PID:2964
  • C:\Windows\system32\SearchIndexer.exe
    C:\Windows\system32\SearchIndexer.exe /Embedding
    1⤵
    • Executes dropped EXE
    • Modifies data under HKEY_USERS
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2584
    • C:\Windows\system32\SearchProtocolHost.exe
      "C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe1_ Global\UsGthrCtrlFltPipeMssGthrPipe1 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon"
      2⤵
      • Drops file in System32 directory
      • Modifies data under HKEY_USERS
      • Suspicious use of SetWindowsHookEx
      PID:1284
    • C:\Windows\system32\SearchFilterHost.exe
      "C:\Windows\system32\SearchFilterHost.exe" 0 584 588 596 65536 592
      2⤵
      • Modifies data under HKEY_USERS
      PID:1340

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Common Files\microsoft shared\Source Engine\OSE.EXE

    Filesize

    1.2MB

    MD5

    34240f5a53084b7e38ce0650167c2e42

    SHA1

    bbd190753913c028a5b498c495fd4c48e59470c3

    SHA256

    1b90f1c0d1d62f5992fefaa8ec57801149be6eb5a06c9aded45ce1903ac2358a

    SHA512

    62ea1bbb200654b16dea66fdfeb00a9d4501ae2ec4546e704745bbaf148e7bc7aabb8f1c4130322cfe59644e116ce43b8a4082b50a81de552ca393f4e9f42e2f

  • C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE

    Filesize

    30.1MB

    MD5

    922e8e81eeeb47beb42c09fcae658bd6

    SHA1

    787e327bf16b1480b183631b780f9e0efbbb9994

    SHA256

    99901346163be7d7f052ad56d7a50714f852e5c878c53caf85a5d18e22da8ce5

    SHA512

    167baf8954f8398f98357677c9cf47c29e4ff6ed162e3c4afe8065224e774ea41adf95952be48650d3c57ef4a0f62d3160465e1e98db05b7ad5c2e421bb12b16

  • C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe

    Filesize

    1.3MB

    MD5

    69810a1dcb07234be9f72ed0e1b8745b

    SHA1

    5e9de9d96ff770116ccf29164db8b8852a97bad0

    SHA256

    1370c43a44fcba4f11948286d8d865bf4040d8f31ea34f0a2c3ad6e56e23df3c

    SHA512

    561b23ee75f6b6f690780c9b11ec075bd0c8746576299ce19e4dd71fe92dc2f7dfe352a1d18c74ea94772afe5cf150e4b0f69030ec390eb0e8b0375ed631dd99

  • C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE

    Filesize

    5.2MB

    MD5

    65d12184918422f82f9edcafbe0c875c

    SHA1

    9744b1e60b04339e06befdb454eaafac693c64d2

    SHA256

    3d0941f62515443f3b285b3b6fe3782148b61937c9713432c3220b75fd4f8fb9

    SHA512

    a2658827960e6ce9f0b1c732a49a8222c97d3f0e9b7a831d933817c2365e88e47626b08b475896aa4221dd16f87ad13a9b2e9e67e82cc615dc3bdb8f570bed3f

  • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe

    Filesize

    2.1MB

    MD5

    2cc2ce3d0a09897c784ca4afe1e7b208

    SHA1

    baa508743c577c6b85245b0c0956e89abe6dccd8

    SHA256

    4063bcf9b15ddf4fbf41fcfd7d89584ea446c4247d489b26e254ecdadf230525

    SHA512

    e227697040f41ea58379d5bb5f62838e7282d089a49ddaf658a8628182f19e5d0eae202a8885433cb50236a5badd8b8dc3f201aeeafbb232c9ccf333c69d786f

  • C:\Program Files\Windows Media Player\wmpnetwk.exe

    Filesize

    2.0MB

    MD5

    a67b918178592db4cdf944747cd50070

    SHA1

    a1e78225281a6d329b1607a70389ca96053d3089

    SHA256

    90354ac5db94dd9ec6237ce94823263c72cedea82677e7c64fa20b21a8ccd46d

    SHA512

    0f485e947f629dd7bbac6a1152966a75d8ff44a6522c66a36930d28a529eaf74982deae4862c24866828222f6b2e6a9f0a61e9b22a01b1b4d49f93865cabd1c9

  • C:\ProgramData\Microsoft\Search\Data\Applications\Windows\MSS.log

    Filesize

    1024KB

    MD5

    84ca72efbf79e289bcc90292b8a5580b

    SHA1

    e1246a230739351a44850d75a27bc8052a9462bd

    SHA256

    9c7bc0480510edd003dc9ee6c8b9cbd42301900b8dfcafc18698c896db1aea1e

    SHA512

    4d037f7fea337a3343456a7c5a7253f38e479faeeb260a189877c752941f81dc6ff55a1087a78f53251428c49979f4f5fd57580cecb4ce146323b4060df0f877

  • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ngen_service.log

    Filesize

    872KB

    MD5

    b4edbf0b6369d67007be9a1a8346092c

    SHA1

    a27965fbefc348050645c89edbb1ae535fe32dad

    SHA256

    e28baaaa53c582c337dae39c20a9b27bd13a58285c9893b26a5c82bb634c7ede

    SHA512

    1cde7e45eb2614ea9e003136dd980999c1633e06385c39a8ec41db14792dec63b75457aba36db40d178f7cbab56a8d220293955676e4571485490ff62b3a1b35

  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe

    Filesize

    1.2MB

    MD5

    1513220218a664a9f22ab9d0732fb544

    SHA1

    aaf84d16968223231063e06050980a2a806f7358

    SHA256

    185ae1458b0399cf26de0968bbddfe8c7c5ce64f97d5a1ae3c8bdc87cd34e719

    SHA512

    2a8c5d758b14ebca6561549b80f4cdb5a24b959374a097f3300d7b9404cee794eeae082a962fc3a128e639c5f543d2fc4df1eb90ecd9ee95aa9db81b73646fc9

  • C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe

    Filesize

    1.1MB

    MD5

    3608c84be970dda1aff716d31f075945

    SHA1

    7d23bb659383ace51aab271e269b392dc9996626

    SHA256

    a75598fd3aa89aa45f3ee2d827fb923261ae0832c50651ca94c501e30c9404d7

    SHA512

    c5d79603b3873110176a5c88b12f3866624475c3fd578bcee3043f489e02e89fdde9ae6a1642bd7f7d1957bd04c53256834654dcca5b58d9b871e4521c4182a4

  • C:\Windows\Microsoft.NET\Framework\v2.0.50727\ngen_service.log

    Filesize

    1003KB

    MD5

    2f06ead7d467f4504b9413039bc1c010

    SHA1

    7a288b26c4c7215ebaf01e18a2ac7b972b42c04f

    SHA256

    13c464b9c9c7b645ef2cc1a455b7fdea3f05dead598f3724656c1703a05411c0

    SHA512

    116162c817f362cdb5cc8be8adaa7cba5e7d2fb57dee10935e8aa25f7175002b124aadab8108ae360ad353cff8eba76e311fd30944e1d74e7cd269c847a5ec35

  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe

    Filesize

    1.2MB

    MD5

    292ffb5c25850485faae95aefe78ce2f

    SHA1

    09b9d77035604ad4f50ffb781660365f868a2f05

    SHA256

    c77646f5d73d5e1c7d8640159e5cc598c0550ed619421b13139acb3ef7a29b6e

    SHA512

    cab4f870b2265264edb9a7d26863a9ac5e9edf24adf539f259cdc3f7866edadec3be4e807afebfba59ef6958f9ce99723624b093425eb97c8f7c85bd2702a3e7

  • C:\Windows\SysWOW64\perfhost.exe

    Filesize

    1.1MB

    MD5

    06f72048192220ce8ae2a80225fa6e07

    SHA1

    440bf003622634f67ef1f5b8c76a2ddc13ef9a7d

    SHA256

    9e89161978a5c1c509fc50b5f8b60da57d10045f4aeeb927a140c2438447bc7f

    SHA512

    e4f908094d01792286db825a80f0eed56792b6da3540882504ea6892ad61d03e33acb54cf9d9d357a3b526b2520204eb644dbbe974393eb4bcf9adef1030c95c

  • C:\Windows\System32\Locator.exe

    Filesize

    1.1MB

    MD5

    ab759e4a7a78d7f872966a2a3f87df90

    SHA1

    a82b40a832e51b0a36825009bd809963168ca991

    SHA256

    e5554173378360eb817e8c66debb3de03f15451900a248f870bd870e1037a151

    SHA512

    17be5458cfe1b3ee90063bcaa704aa457a2d2329dd8f9f43db7dbf5f96614cafd3b9ae3c3d65315a5dfe34e5f8596040a082f5112fd6bcbd511c97b9c54c5a3d

  • C:\Windows\System32\SearchIndexer.exe

    Filesize

    1.1MB

    MD5

    d782f2e3037c91cb100948f4c2a347e9

    SHA1

    ebc1dac8f616324cc5ef6393c841f429f0e8980f

    SHA256

    0009d3243dde30d70f3b2f0ee8308e1cf11d97a2c9cacc8aa3f75506e0b54e08

    SHA512

    b6eaf4dc4ba8cbf070c995c3fd91926b1d4873c5c5263cd85434a3c112b6f94a3461f11eb222688fa7eda8772a9adc730d8966d3df65db866c010cec8324d520

  • C:\Windows\System32\VSSVC.exe

    Filesize

    2.1MB

    MD5

    0363e05b97d62af3a5251481aea81273

    SHA1

    c48fe170f8941887400ba299c24780e28f468558

    SHA256

    4205ceb178eb6256683c39039a6b83a0986dafdf9cf9b03e4b29add59af4dfb1

    SHA512

    1787e7e3e739781b7cb2a78398d3db061f4938b6eca2650d1e7dcd1d1d871772a23c7f9a292aadfb6033e35eef051b8bab6fd118285b53ae08b7a9679a40e494

  • C:\Windows\System32\snmptrap.exe

    Filesize

    1.1MB

    MD5

    0a293e49a6468810a28a40d303bdfb84

    SHA1

    627258583dfaa36924c28e9e346f1cdb56150b1f

    SHA256

    384b3bc9d7a9ab5fa45b750d8aaad215b1e5d44b3811fffe45aa8274cf2206c2

    SHA512

    6fea8aa68c25c61ee6eba3258f76548eb3829c6675eaa650da74a6c8206d806724ff5002fe9ffd70708edd2d5968e319bb3912652ec55dc547759c0cac6d1703

  • C:\Windows\System32\vds.exe

    Filesize

    1.6MB

    MD5

    d3011de2139eb0aa7bd025709dba29d8

    SHA1

    1ca93177ab9028aebd88cad6e60afe91bb088d04

    SHA256

    3adb6743b8442d078786045bc4bb771d103b59917f3be1f19df1269ec2249c5b

    SHA512

    3c55a9d62e76d9129863764ba3b0106c4fa8d52b82447c96e88319af28fb65aef2d56cc0a79462148a36e3f33addad219fd17235a8ab3242b5c4976c370b6432

  • C:\Windows\System32\wbengine.exe

    Filesize

    2.0MB

    MD5

    31ce2b1d23cbc16e5be748a490a8f490

    SHA1

    636d6527c655b5f8cb550ddd55b31ee6537c561c

    SHA256

    b51172214d8b11f722f3d3b34373923c986f21300d52cea608c7d8f6b4ecce11

    SHA512

    1fb6a8c772bab3ff1b55c41d9cfd662948c141f2b3a7c56a1de0effc6c9d0d9c737606ec921354c179604dfe1ee536c6c87a1277c0dac8c104f119d098abee30

  • \Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe

    Filesize

    1.2MB

    MD5

    a8655b35b665b25818c4df765cabb78f

    SHA1

    508bfecec14fcb6c70bf246ac79df90b5b221f48

    SHA256

    6feeb3ee2b188df5466a25f9a022c1b8a3dd192c12f40a8b916ed53c0a3501a1

    SHA512

    ce6b71c49dce838dd6e66530c9f8add5920d5c5edc54775c89ee2b4fc364af2181b5287c57052304090ad7ba714c05205c24b6a7f3f616c2b3a3d2e83505d6c3

  • \Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe

    Filesize

    1.1MB

    MD5

    b55c6d36f8c90210324dc2f58b4cfd3e

    SHA1

    b57892334349786f88a8f4a5205692cfc5bdee91

    SHA256

    163dafc7385f7e5111e202b551b468bb0cab001b1ad4d17c78ec421ca89758fc

    SHA512

    9e161bd8b1265297a1f31a38fce7ed72bf1df1d14fb5f295f64b65e0a6cb2637b54d549e24293612ae51361c237f3746bc544699ecabb6f8c93727c40f912a39

  • \Windows\System32\alg.exe

    Filesize

    1.2MB

    MD5

    bed287fee96ec3cafaa0b4c4c68a999e

    SHA1

    aee4f96c9724ab1e96d1013f2f306cf390204292

    SHA256

    ef2a4519c07758f4224d045d1c40aab5896490c7bc1378f94c28bc88d9a3f152

    SHA512

    c652cfa9d4d58c8fbaadbdbbbf3af34c334d79c53153e1f7753f5b519e2faada79c50eefe3f3234c1f9c12225a4ad46d5b9aaf193f0dd3fadc629e3d074ceee1

  • \Windows\System32\ieetwcollector.exe

    Filesize

    1.2MB

    MD5

    e5b0f8449f678d608b1d8a2995208a7a

    SHA1

    9333f3178522d7b2a453ef2c683b1e6f430b0a8e

    SHA256

    d1257b5884b7c2a86eee1c39a526ea7cc446ba493e5ad29197248f039befc067

    SHA512

    56244fe2b3075572d6ad324ded8c5af37a977ed00337c08e4a85a23a9d3259195829571e4006c71139f6c907795826ef2d103585a38d6f8462580ce01d83099f

  • \Windows\System32\msdtc.exe

    Filesize

    1.2MB

    MD5

    5fb7201666f8d928b0a4065dc3097f2b

    SHA1

    23e67c61cf160e8b802da699d65da7e5dadc3e6f

    SHA256

    7c76627b4c061dff81717a949a0753ca9c475bf2e9ffcb69a8e45a1841b0ea4d

    SHA512

    e193b008a4870dab67cbe9853b993c0f2b0ed9c1cb6dbb8d49e007cabc1bb5a4111eb507ee2f97fa2b46ba5a82871ea46ed953059192bcdf8eb1bf2526921c94

  • \Windows\System32\msiexec.exe

    Filesize

    1.2MB

    MD5

    cda8c2c60b5b22e7da352656ca459e3a

    SHA1

    6654d27878e7b6457ed8417318306f8ac98b420b

    SHA256

    5f9c98318ef02d7adae6e705d4f424b522437493197730a338629f45522db132

    SHA512

    2efa642fd234dcbb1c9e0c96592963fa30d28733c26d2f255c3fd5bc1ce93beaf223af9a3ff54571dc24c61a2db1330f20dbe2d1b4f32423e45168063522e143

  • \Windows\System32\wbem\WmiApSrv.exe

    Filesize

    1.3MB

    MD5

    a04f17670b24ceafedc41d73f93fbd98

    SHA1

    445c4485424c939379c6c6860713063b5fa3ad87

    SHA256

    cac0b261393e9303c3179959288186beb23e26205559f64af04a2f9723ee0a9a

    SHA512

    33551e63c6940764b2221704eacea587cbd1ce9da13baebc55af021319eac0a8616f8ccb28cf31c0310d61ff1c9210ae02ca43a85a701b9c5d0236fdb800ae03

  • \Windows\ehome\ehrecvr.exe

    Filesize

    1.2MB

    MD5

    900180840d633950ca99b4c8c475387a

    SHA1

    02fa57df26608a569ca61bc550151bac1d24d72a

    SHA256

    cf7b4a269775c456a7ddaa50468a4f36cb9e8652b30a7a2c593164fcefdee7cd

    SHA512

    aa9aa088301ec69b9b6c4e1ac6efc42b17e6dbeed6d22b5ae777753a495d23583964607ce1a07360d2499ecca3352056b8a7703478513b3f3d5791c39c4bef0e

  • \Windows\ehome\ehsched.exe

    Filesize

    1.2MB

    MD5

    5c1345a3df9b1bf50f4959970304bca2

    SHA1

    40b81382f065025101c9370c0231e870a8ec61c9

    SHA256

    7ec33ed5e10988df69a8799c11a5ed9cae4a7175926deaa45bb66481af9071c4

    SHA512

    af780ceaacc6fdc6993a50957849183e3998d9ebccfadb8ebc220fc4e3683b028777eacbae4320efcac5ce4a99425a8b7e81e1845f506703af4c7f8f2d1c72b3

  • memory/316-92-0x0000000000400000-0x000000000052E000-memory.dmp

    Filesize

    1.2MB

  • memory/316-90-0x0000000000280000-0x00000000002E7000-memory.dmp

    Filesize

    412KB

  • memory/316-85-0x0000000000280000-0x00000000002E7000-memory.dmp

    Filesize

    412KB

  • memory/468-750-0x0000000000400000-0x000000000052E000-memory.dmp

    Filesize

    1.2MB

  • memory/468-735-0x0000000000400000-0x000000000052E000-memory.dmp

    Filesize

    1.2MB

  • memory/1088-722-0x0000000000400000-0x000000000052E000-memory.dmp

    Filesize

    1.2MB

  • memory/1244-75-0x0000000010000000-0x000000001012D000-memory.dmp

    Filesize

    1.2MB

  • memory/1244-97-0x0000000010000000-0x000000001012D000-memory.dmp

    Filesize

    1.2MB

  • memory/1316-760-0x0000000000400000-0x000000000052E000-memory.dmp

    Filesize

    1.2MB

  • memory/1316-751-0x0000000000400000-0x000000000052E000-memory.dmp

    Filesize

    1.2MB

  • memory/1324-736-0x0000000100000000-0x000000010014A000-memory.dmp

    Filesize

    1.3MB

  • memory/1324-364-0x0000000100000000-0x000000010014A000-memory.dmp

    Filesize

    1.3MB

  • memory/1428-293-0x0000000140000000-0x0000000140237000-memory.dmp

    Filesize

    2.2MB

  • memory/1428-155-0x0000000140000000-0x0000000140237000-memory.dmp

    Filesize

    2.2MB

  • memory/1480-626-0x0000000000400000-0x000000000052E000-memory.dmp

    Filesize

    1.2MB

  • memory/1480-441-0x0000000000400000-0x000000000052E000-memory.dmp

    Filesize

    1.2MB

  • memory/1548-776-0x0000000003C80000-0x0000000003D3A000-memory.dmp

    Filesize

    744KB

  • memory/1548-780-0x0000000000400000-0x000000000052E000-memory.dmp

    Filesize

    1.2MB

  • memory/1632-207-0x0000000140000000-0x0000000140150000-memory.dmp

    Filesize

    1.3MB

  • memory/1632-190-0x0000000140000000-0x0000000140150000-memory.dmp

    Filesize

    1.3MB

  • memory/1656-189-0x0000000140000000-0x0000000140123000-memory.dmp

    Filesize

    1.1MB

  • memory/1656-56-0x0000000140000000-0x0000000140123000-memory.dmp

    Filesize

    1.1MB

  • memory/1676-235-0x0000000000590000-0x00000000006C8000-memory.dmp

    Filesize

    1.2MB

  • memory/1676-362-0x0000000100000000-0x0000000100138000-memory.dmp

    Filesize

    1.2MB

  • memory/1676-363-0x0000000000590000-0x00000000006C8000-memory.dmp

    Filesize

    1.2MB

  • memory/1676-234-0x0000000100000000-0x0000000100138000-memory.dmp

    Filesize

    1.2MB

  • memory/1692-95-0x0000000010000000-0x0000000010125000-memory.dmp

    Filesize

    1.1MB

  • memory/1692-65-0x0000000000350000-0x00000000003B7000-memory.dmp

    Filesize

    412KB

  • memory/1692-270-0x0000000001000000-0x000000000111C000-memory.dmp

    Filesize

    1.1MB

  • memory/1692-59-0x0000000000350000-0x00000000003B7000-memory.dmp

    Filesize

    412KB

  • memory/1692-418-0x0000000001000000-0x000000000111C000-memory.dmp

    Filesize

    1.1MB

  • memory/1692-64-0x0000000010000000-0x0000000010125000-memory.dmp

    Filesize

    1.1MB

  • memory/1904-280-0x0000000140000000-0x0000000140138000-memory.dmp

    Filesize

    1.2MB

  • memory/1904-660-0x0000000140000000-0x0000000140138000-memory.dmp

    Filesize

    1.2MB

  • memory/1904-141-0x0000000140000000-0x0000000140138000-memory.dmp

    Filesize

    1.2MB

  • memory/1984-667-0x0000000100000000-0x000000010019A000-memory.dmp

    Filesize

    1.6MB

  • memory/1984-321-0x0000000100000000-0x000000010019A000-memory.dmp

    Filesize

    1.6MB

  • memory/2052-348-0x0000000140000000-0x000000014013C000-memory.dmp

    Filesize

    1.2MB

  • memory/2052-204-0x0000000140000000-0x000000014013C000-memory.dmp

    Filesize

    1.2MB

  • memory/2108-382-0x0000000100000000-0x0000000100542000-memory.dmp

    Filesize

    5.3MB

  • memory/2108-246-0x0000000100000000-0x0000000100542000-memory.dmp

    Filesize

    5.3MB

  • memory/2116-349-0x000000002E000000-0x000000002E13B000-memory.dmp

    Filesize

    1.2MB

  • memory/2116-245-0x000000002E000000-0x000000002E13B000-memory.dmp

    Filesize

    1.2MB

  • memory/2176-342-0x0000000100000000-0x0000000100219000-memory.dmp

    Filesize

    2.1MB

  • memory/2176-690-0x0000000100000000-0x0000000100219000-memory.dmp

    Filesize

    2.1MB

  • memory/2204-307-0x0000000140000000-0x0000000140134000-memory.dmp

    Filesize

    1.2MB

  • memory/2204-168-0x0000000140000000-0x0000000140134000-memory.dmp

    Filesize

    1.2MB

  • memory/2212-426-0x0000000000400000-0x000000000052E000-memory.dmp

    Filesize

    1.2MB

  • memory/2212-343-0x0000000000400000-0x000000000052E000-memory.dmp

    Filesize

    1.2MB

  • memory/2360-662-0x0000000100000000-0x000000010011C000-memory.dmp

    Filesize

    1.1MB

  • memory/2360-310-0x0000000100000000-0x000000010011C000-memory.dmp

    Filesize

    1.1MB

  • memory/2416-257-0x0000000000400000-0x000000000052E000-memory.dmp

    Filesize

    1.2MB

  • memory/2416-309-0x0000000000400000-0x000000000052E000-memory.dmp

    Filesize

    1.2MB

  • memory/2420-320-0x000000002E000000-0x000000002FE1E000-memory.dmp

    Filesize

    30.1MB

  • memory/2420-178-0x000000002E000000-0x000000002FE1E000-memory.dmp

    Filesize

    30.1MB

  • memory/2552-703-0x0000000000400000-0x000000000052E000-memory.dmp

    Filesize

    1.2MB

  • memory/2552-691-0x0000000000400000-0x000000000052E000-memory.dmp

    Filesize

    1.2MB

  • memory/2556-50-0x0000000000930000-0x0000000000990000-memory.dmp

    Filesize

    384KB

  • memory/2556-43-0x0000000000930000-0x0000000000990000-memory.dmp

    Filesize

    384KB

  • memory/2556-167-0x0000000100000000-0x000000010012A000-memory.dmp

    Filesize

    1.2MB

  • memory/2556-42-0x0000000100000000-0x000000010012A000-memory.dmp

    Filesize

    1.2MB

  • memory/2556-49-0x0000000000930000-0x0000000000990000-memory.dmp

    Filesize

    384KB

  • memory/2584-761-0x0000000100000000-0x0000000100123000-memory.dmp

    Filesize

    1.1MB

  • memory/2584-389-0x0000000100000000-0x0000000100123000-memory.dmp

    Filesize

    1.1MB

  • memory/2592-762-0x0000000000400000-0x000000000052E000-memory.dmp

    Filesize

    1.2MB

  • memory/2592-775-0x0000000000400000-0x000000000052E000-memory.dmp

    Filesize

    1.2MB

  • memory/2636-737-0x0000000000400000-0x000000000052E000-memory.dmp

    Filesize

    1.2MB

  • memory/2656-738-0x0000000000400000-0x000000000052E000-memory.dmp

    Filesize

    1.2MB

  • memory/2668-451-0x0000000000400000-0x000000000052E000-memory.dmp

    Filesize

    1.2MB

  • memory/2668-419-0x0000000000400000-0x000000000052E000-memory.dmp

    Filesize

    1.2MB

  • memory/2768-37-0x0000000000400000-0x000000000056C000-memory.dmp

    Filesize

    1.4MB

  • memory/2768-15-0x0000000000400000-0x000000000056C000-memory.dmp

    Filesize

    1.4MB

  • memory/2768-24-0x0000000000400000-0x000000000056C000-memory.dmp

    Filesize

    1.4MB

  • memory/2768-11-0x0000000000400000-0x000000000056C000-memory.dmp

    Filesize

    1.4MB

  • memory/2768-9-0x0000000000400000-0x000000000056C000-memory.dmp

    Filesize

    1.4MB

  • memory/2768-17-0x0000000000400000-0x000000000056C000-memory.dmp

    Filesize

    1.4MB

  • memory/2768-26-0x0000000000400000-0x000000000056C000-memory.dmp

    Filesize

    1.4MB

  • memory/2768-35-0x0000000000140000-0x00000000001A7000-memory.dmp

    Filesize

    412KB

  • memory/2768-28-0x0000000000140000-0x00000000001A7000-memory.dmp

    Filesize

    412KB

  • memory/2768-154-0x0000000000400000-0x000000000056C000-memory.dmp

    Filesize

    1.4MB

  • memory/2768-21-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2768-19-0x0000000000400000-0x000000000056C000-memory.dmp

    Filesize

    1.4MB

  • memory/2768-36-0x0000000000400000-0x000000000056C000-memory.dmp

    Filesize

    1.4MB

  • memory/2768-153-0x0000000000400000-0x000000000056C000-memory.dmp

    Filesize

    1.4MB

  • memory/2768-13-0x0000000000400000-0x000000000056C000-memory.dmp

    Filesize

    1.4MB

  • memory/2868-108-0x0000000000200000-0x0000000000260000-memory.dmp

    Filesize

    384KB

  • memory/2868-112-0x0000000140000000-0x0000000140134000-memory.dmp

    Filesize

    1.2MB

  • memory/2868-102-0x0000000000200000-0x0000000000260000-memory.dmp

    Filesize

    384KB

  • memory/2872-283-0x0000000100000000-0x000000010011B000-memory.dmp

    Filesize

    1.1MB

  • memory/2872-440-0x0000000100000000-0x000000010011B000-memory.dmp

    Filesize

    1.1MB

  • memory/2888-678-0x0000000000400000-0x000000000052E000-memory.dmp

    Filesize

    1.2MB

  • memory/2888-609-0x0000000000400000-0x000000000052E000-memory.dmp

    Filesize

    1.2MB

  • memory/2956-27-0x00000000742E0000-0x00000000749CE000-memory.dmp

    Filesize

    6.9MB

  • memory/2956-8-0x00000000742E0000-0x00000000749CE000-memory.dmp

    Filesize

    6.9MB

  • memory/2956-2-0x00000000742E0000-0x00000000749CE000-memory.dmp

    Filesize

    6.9MB

  • memory/2956-0-0x00000000742EE000-0x00000000742EF000-memory.dmp

    Filesize

    4KB

  • memory/2956-3-0x00000000049B0000-0x00000000049F4000-memory.dmp

    Filesize

    272KB

  • memory/2956-23-0x00000000742E0000-0x00000000749CE000-memory.dmp

    Filesize

    6.9MB

  • memory/2956-4-0x00000000742EE000-0x00000000742EF000-memory.dmp

    Filesize

    4KB

  • memory/2956-1-0x00000000002D0000-0x00000000004AA000-memory.dmp

    Filesize

    1.9MB

  • memory/2956-5-0x00000000742E0000-0x00000000749CE000-memory.dmp

    Filesize

    6.9MB

  • memory/2956-6-0x0000000000580000-0x000000000059A000-memory.dmp

    Filesize

    104KB

  • memory/2956-7-0x00000000006D0000-0x00000000006D6000-memory.dmp

    Filesize

    24KB

  • memory/2964-383-0x0000000100000000-0x000000010020A000-memory.dmp

    Filesize

    2.0MB

  • memory/2964-749-0x0000000100000000-0x000000010020A000-memory.dmp

    Filesize

    2.0MB

  • memory/2968-269-0x0000000140000000-0x000000014013C000-memory.dmp

    Filesize

    1.2MB

  • memory/2968-118-0x0000000000AC0000-0x0000000000B20000-memory.dmp

    Filesize

    384KB

  • memory/2968-124-0x0000000000AC0000-0x0000000000B20000-memory.dmp

    Filesize

    384KB

  • memory/2968-126-0x0000000140000000-0x000000014013C000-memory.dmp

    Filesize

    1.2MB

  • memory/3008-682-0x0000000000400000-0x000000000052E000-memory.dmp

    Filesize

    1.2MB

  • memory/3008-668-0x0000000000400000-0x000000000052E000-memory.dmp

    Filesize

    1.2MB

  • memory/3024-294-0x0000000000400000-0x000000000052E000-memory.dmp

    Filesize

    1.2MB

  • memory/3024-345-0x0000000000400000-0x000000000052E000-memory.dmp

    Filesize

    1.2MB

  • memory/3064-788-0x0000000000400000-0x000000000052E000-memory.dmp

    Filesize

    1.2MB

  • memory/3068-702-0x0000000100000000-0x0000000100202000-memory.dmp

    Filesize

    2.0MB

  • memory/3068-350-0x0000000100000000-0x0000000100202000-memory.dmp

    Filesize

    2.0MB