Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    14/08/2024, 06:21

General

  • Target

    7e09a6b7a035dda5f58bab45cbd052f0N.exe

  • Size

    1.3MB

  • MD5

    7e09a6b7a035dda5f58bab45cbd052f0

  • SHA1

    f948ea33969d990465a2904699636519c6bf8ac5

  • SHA256

    8265a1fffc96c257311f7c441bdddfb9b7f6f22c99bcac25a040a4c88ec7099a

  • SHA512

    e8d237164d931ac3aa92a0a55abfbab9334a6882de3d40a508ca06926a65d3223ff0c0c9804b57a0db83e5d1593026f450f5c3177a371b38b17239b3baf4475c

  • SSDEEP

    12288:SjHU7UMAdB8qr0zw9iXQ40AOzDr5YJjsF/5v3ZkHRik8j:Sj07atr0zAiX90z/F0jsFB3SQku

Malware Config

Signatures

  • Executes dropped EXE 64 IoCs
  • Loads dropped DLL 62 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in System32 directory 21 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 26 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of SetWindowsHookEx 13 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\7e09a6b7a035dda5f58bab45cbd052f0N.exe
    "C:\Users\Admin\AppData\Local\Temp\7e09a6b7a035dda5f58bab45cbd052f0N.exe"
    1⤵
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:2240
  • C:\Windows\System32\alg.exe
    C:\Windows\System32\alg.exe
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Suspicious use of AdjustPrivilegeToken
    PID:1492
  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe
    C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe
    1⤵
    • Executes dropped EXE
    PID:2992
  • C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe
    C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe
    1⤵
    • Executes dropped EXE
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    PID:3024
  • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe
    C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe
    1⤵
    • Executes dropped EXE
    • Drops file in Windows directory
    PID:2544
  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
    C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
    1⤵
    • Executes dropped EXE
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2488
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1e8 -InterruptEvent 1d4 -NGENProcess 1d8 -Pipe 1e4 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2452
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 258 -InterruptEvent 1d4 -NGENProcess 1d8 -Pipe 1e8 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2804
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1d4 -InterruptEvent 25c -NGENProcess 24c -Pipe 248 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:1452
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1d4 -InterruptEvent 250 -NGENProcess 258 -Pipe 23c -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2060
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 250 -InterruptEvent 244 -NGENProcess 25c -Pipe 1f0 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2732
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1d8 -InterruptEvent 1d4 -NGENProcess 268 -Pipe 250 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2568
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 260 -InterruptEvent 240 -NGENProcess 26c -Pipe 1d8 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2100
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 24c -InterruptEvent 25c -NGENProcess 270 -Pipe 260 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2760
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 258 -InterruptEvent 268 -NGENProcess 274 -Pipe 24c -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2216
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 268 -InterruptEvent 278 -NGENProcess 270 -Pipe 264 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2208
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 268 -InterruptEvent 26c -NGENProcess 258 -Pipe 240 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:3032
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 26c -InterruptEvent 254 -NGENProcess 278 -Pipe 244 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2476
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 274 -InterruptEvent 268 -NGENProcess 284 -Pipe 26c -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1832
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 268 -InterruptEvent 270 -NGENProcess 278 -Pipe 1d4 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1404
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 270 -InterruptEvent 288 -NGENProcess 254 -Pipe 27c -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1384
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 288 -InterruptEvent 28c -NGENProcess 284 -Pipe 280 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:1672
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 268 -InterruptEvent 290 -NGENProcess 270 -Pipe 28c -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:3020
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 290 -InterruptEvent 25c -NGENProcess 284 -Pipe 274 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2208
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 25c -InterruptEvent 298 -NGENProcess 288 -Pipe 258 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:696
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 298 -InterruptEvent 29c -NGENProcess 270 -Pipe 294 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1716
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 29c -InterruptEvent 270 -NGENProcess 290 -Pipe 2a4 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:3036
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 270 -InterruptEvent 290 -NGENProcess 284 -Pipe 2a8 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2124
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 290 -InterruptEvent 268 -NGENProcess 278 -Pipe 254 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2816
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2a4 -InterruptEvent 220 -NGENProcess 294 -Pipe 1ec -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2204
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 220 -InterruptEvent 1d8 -NGENProcess 274 -Pipe 260 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:1888
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1d8 -InterruptEvent 250 -NGENProcess 240 -Pipe 24c -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:1508
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 250 -InterruptEvent 1f0 -NGENProcess 294 -Pipe 244 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2884
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1f0 -InterruptEvent 23c -NGENProcess 274 -Pipe 2a8 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      PID:2988
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 23c -InterruptEvent 294 -NGENProcess 274 -Pipe 1d8 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2428
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 294 -InterruptEvent 224 -NGENProcess 248 -Pipe 1e8 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Windows directory
      PID:2184
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 224 -InterruptEvent 248 -NGENProcess 23c -Pipe 2a4 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2608
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 248 -InterruptEvent 1d0 -NGENProcess 274 -Pipe 240 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Windows directory
      PID:1672
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1d0 -InterruptEvent 274 -NGENProcess 224 -Pipe 1c4 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2692
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 274 -InterruptEvent 2b0 -NGENProcess 23c -Pipe 294 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Windows directory
      PID:2776
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 29c -InterruptEvent 1d0 -NGENProcess 250 -Pipe 274 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:3012
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1d0 -InterruptEvent 290 -NGENProcess 224 -Pipe 248 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Windows directory
      PID:448
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 290 -InterruptEvent 224 -NGENProcess 29c -Pipe 2b0 -Comment "NGen Worker Process"
      2⤵
        PID:2184
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 224 -InterruptEvent 268 -NGENProcess 250 -Pipe 270 -Comment "NGen Worker Process"
        2⤵
        • Loads dropped DLL
        • Drops file in Windows directory
        PID:2568
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 268 -InterruptEvent 250 -NGENProcess 290 -Pipe 2ac -Comment "NGen Worker Process"
        2⤵
          PID:1508
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
          C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 250 -InterruptEvent 298 -NGENProcess 29c -Pipe 1d0 -Comment "NGen Worker Process"
          2⤵
          • Loads dropped DLL
          • Drops file in Windows directory
          PID:2308
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
          C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 298 -InterruptEvent 29c -NGENProcess 268 -Pipe 278 -Comment "NGen Worker Process"
          2⤵
          • System Location Discovery: System Language Discovery
          PID:332
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
          C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 29c -InterruptEvent 2a0 -NGENProcess 290 -Pipe 224 -Comment "NGen Worker Process"
          2⤵
          • Loads dropped DLL
          • Drops file in Windows directory
          PID:840
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
          C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2a0 -InterruptEvent 290 -NGENProcess 298 -Pipe 284 -Comment "NGen Worker Process"
          2⤵
            PID:860
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
            C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 290 -InterruptEvent 2b4 -NGENProcess 268 -Pipe 250 -Comment "NGen Worker Process"
            2⤵
            • Loads dropped DLL
            • Drops file in Windows directory
            • System Location Discovery: System Language Discovery
            PID:864
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
            C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2b4 -InterruptEvent 268 -NGENProcess 2a0 -Pipe 288 -Comment "NGen Worker Process"
            2⤵
              PID:1124
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
              C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 268 -InterruptEvent 2bc -NGENProcess 298 -Pipe 29c -Comment "NGen Worker Process"
              2⤵
              • Loads dropped DLL
              • Drops file in Windows directory
              • System Location Discovery: System Language Discovery
              PID:2948
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
              C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2bc -InterruptEvent 298 -NGENProcess 2b4 -Pipe 2b8 -Comment "NGen Worker Process"
              2⤵
              • System Location Discovery: System Language Discovery
              PID:920
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
              C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 298 -InterruptEvent 2c4 -NGENProcess 2a0 -Pipe 290 -Comment "NGen Worker Process"
              2⤵
              • Loads dropped DLL
              • Drops file in Windows directory
              • System Location Discovery: System Language Discovery
              PID:2676
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
              C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2c4 -InterruptEvent 2a0 -NGENProcess 2bc -Pipe 2c0 -Comment "NGen Worker Process"
              2⤵
                PID:2756
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2a0 -InterruptEvent 2cc -NGENProcess 2b4 -Pipe 268 -Comment "NGen Worker Process"
                2⤵
                • Loads dropped DLL
                • Drops file in Windows directory
                • System Location Discovery: System Language Discovery
                PID:1888
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2cc -InterruptEvent 2b4 -NGENProcess 2c4 -Pipe 2c8 -Comment "NGen Worker Process"
                2⤵
                  PID:1384
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                  C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2b4 -InterruptEvent 2d4 -NGENProcess 2bc -Pipe 298 -Comment "NGen Worker Process"
                  2⤵
                  • Loads dropped DLL
                  • Drops file in Windows directory
                  • System Location Discovery: System Language Discovery
                  PID:932
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                  C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2d4 -InterruptEvent 2bc -NGENProcess 2cc -Pipe 2d0 -Comment "NGen Worker Process"
                  2⤵
                    PID:628
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                    C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2bc -InterruptEvent 2dc -NGENProcess 2c4 -Pipe 2a0 -Comment "NGen Worker Process"
                    2⤵
                    • Loads dropped DLL
                    • Drops file in Windows directory
                    • System Location Discovery: System Language Discovery
                    PID:1464
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                    C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2dc -InterruptEvent 2c4 -NGENProcess 2d4 -Pipe 2d8 -Comment "NGen Worker Process"
                    2⤵
                      PID:2740
                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2c4 -InterruptEvent 2e4 -NGENProcess 2cc -Pipe 2b4 -Comment "NGen Worker Process"
                      2⤵
                      • Loads dropped DLL
                      • Drops file in Windows directory
                      PID:2508
                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2e4 -InterruptEvent 2cc -NGENProcess 2dc -Pipe 2e0 -Comment "NGen Worker Process"
                      2⤵
                        PID:1384
                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2cc -InterruptEvent 2ec -NGENProcess 2d4 -Pipe 2bc -Comment "NGen Worker Process"
                        2⤵
                        • Loads dropped DLL
                        • Drops file in Windows directory
                        • System Location Discovery: System Language Discovery
                        PID:2352
                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2ec -InterruptEvent 2d4 -NGENProcess 2e4 -Pipe 2e8 -Comment "NGen Worker Process"
                        2⤵
                        • Modifies data under HKEY_USERS
                        PID:596
                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2d4 -InterruptEvent 2f4 -NGENProcess 2dc -Pipe 2c4 -Comment "NGen Worker Process"
                        2⤵
                        • System Location Discovery: System Language Discovery
                        PID:1048
                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2f4 -InterruptEvent 2f8 -NGENProcess 2f0 -Pipe 264 -Comment "NGen Worker Process"
                        2⤵
                        • System Location Discovery: System Language Discovery
                        PID:1864
                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2f8 -InterruptEvent 2fc -NGENProcess 2e4 -Pipe 2cc -Comment "NGen Worker Process"
                        2⤵
                        • System Location Discovery: System Language Discovery
                        PID:2464
                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2fc -InterruptEvent 300 -NGENProcess 2dc -Pipe 23c -Comment "NGen Worker Process"
                        2⤵
                        • Loads dropped DLL
                        • Drops file in Windows directory
                        • System Location Discovery: System Language Discovery
                        PID:2852
                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 300 -InterruptEvent 2fc -NGENProcess 2f0 -Pipe 2f4 -Comment "NGen Worker Process"
                        2⤵
                        • Loads dropped DLL
                        • Drops file in Windows directory
                        • System Location Discovery: System Language Discovery
                        PID:2060
                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2fc -InterruptEvent 2f0 -NGENProcess 308 -Pipe 304 -Comment "NGen Worker Process"
                        2⤵
                          PID:2196
                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                          C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2f0 -InterruptEvent 30c -NGENProcess 2dc -Pipe 244 -Comment "NGen Worker Process"
                          2⤵
                            PID:1452
                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                            C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 30c -InterruptEvent 310 -NGENProcess 2ec -Pipe 2f8 -Comment "NGen Worker Process"
                            2⤵
                            • System Location Discovery: System Language Discovery
                            • Modifies data under HKEY_USERS
                            PID:1672
                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                            C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 310 -InterruptEvent 314 -NGENProcess 308 -Pipe 300 -Comment "NGen Worker Process"
                            2⤵
                              PID:1424
                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                              C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 314 -InterruptEvent 318 -NGENProcess 2dc -Pipe 2d4 -Comment "NGen Worker Process"
                              2⤵
                              • System Location Discovery: System Language Discovery
                              PID:1708
                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                              C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 318 -InterruptEvent 31c -NGENProcess 2ec -Pipe 2fc -Comment "NGen Worker Process"
                              2⤵
                              • System Location Discovery: System Language Discovery
                              PID:2464
                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                              C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 31c -InterruptEvent 320 -NGENProcess 308 -Pipe 2f0 -Comment "NGen Worker Process"
                              2⤵
                              • System Location Discovery: System Language Discovery
                              PID:1220
                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                              C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 320 -InterruptEvent 324 -NGENProcess 2dc -Pipe 30c -Comment "NGen Worker Process"
                              2⤵
                                PID:2680
                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 324 -InterruptEvent 328 -NGENProcess 2ec -Pipe 310 -Comment "NGen Worker Process"
                                2⤵
                                • System Location Discovery: System Language Discovery
                                PID:1464
                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 328 -InterruptEvent 32c -NGENProcess 308 -Pipe 314 -Comment "NGen Worker Process"
                                2⤵
                                  PID:1528
                                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                  C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 32c -InterruptEvent 330 -NGENProcess 2dc -Pipe 318 -Comment "NGen Worker Process"
                                  2⤵
                                    PID:2340
                                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                    C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 330 -InterruptEvent 334 -NGENProcess 2ec -Pipe 31c -Comment "NGen Worker Process"
                                    2⤵
                                      PID:2308
                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 334 -InterruptEvent 338 -NGENProcess 308 -Pipe 320 -Comment "NGen Worker Process"
                                      2⤵
                                        PID:1868
                                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 338 -InterruptEvent 33c -NGENProcess 2dc -Pipe 324 -Comment "NGen Worker Process"
                                        2⤵
                                          PID:2204
                                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                          C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 33c -InterruptEvent 340 -NGENProcess 2ec -Pipe 328 -Comment "NGen Worker Process"
                                          2⤵
                                          • System Location Discovery: System Language Discovery
                                          PID:1236
                                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                          C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 340 -InterruptEvent 344 -NGENProcess 308 -Pipe 32c -Comment "NGen Worker Process"
                                          2⤵
                                          • System Location Discovery: System Language Discovery
                                          • Modifies data under HKEY_USERS
                                          PID:296
                                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                          C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 344 -InterruptEvent 348 -NGENProcess 2dc -Pipe 330 -Comment "NGen Worker Process"
                                          2⤵
                                            PID:1908
                                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                            C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 348 -InterruptEvent 34c -NGENProcess 2ec -Pipe 334 -Comment "NGen Worker Process"
                                            2⤵
                                              PID:2124
                                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                              C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 34c -InterruptEvent 350 -NGENProcess 308 -Pipe 338 -Comment "NGen Worker Process"
                                              2⤵
                                              • System Location Discovery: System Language Discovery
                                              PID:1636
                                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                              C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 350 -InterruptEvent 354 -NGENProcess 2dc -Pipe 33c -Comment "NGen Worker Process"
                                              2⤵
                                                PID:2708
                                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 354 -InterruptEvent 358 -NGENProcess 2ec -Pipe 340 -Comment "NGen Worker Process"
                                                2⤵
                                                  PID:1264
                                                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                  C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 358 -InterruptEvent 35c -NGENProcess 308 -Pipe 344 -Comment "NGen Worker Process"
                                                  2⤵
                                                  • System Location Discovery: System Language Discovery
                                                  PID:1284
                                                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                  C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 35c -InterruptEvent 360 -NGENProcess 2dc -Pipe 348 -Comment "NGen Worker Process"
                                                  2⤵
                                                  • System Location Discovery: System Language Discovery
                                                  PID:3060
                                                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                  C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 360 -InterruptEvent 364 -NGENProcess 2ec -Pipe 34c -Comment "NGen Worker Process"
                                                  2⤵
                                                  • System Location Discovery: System Language Discovery
                                                  • Modifies data under HKEY_USERS
                                                  PID:1476
                                                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                  C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 364 -InterruptEvent 368 -NGENProcess 308 -Pipe 350 -Comment "NGen Worker Process"
                                                  2⤵
                                                  • Modifies data under HKEY_USERS
                                                  PID:1452
                                                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                  C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 368 -InterruptEvent 36c -NGENProcess 2dc -Pipe 354 -Comment "NGen Worker Process"
                                                  2⤵
                                                  • System Location Discovery: System Language Discovery
                                                  • Modifies data under HKEY_USERS
                                                  PID:1968
                                                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                  C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 36c -InterruptEvent 370 -NGENProcess 2ec -Pipe 358 -Comment "NGen Worker Process"
                                                  2⤵
                                                  • Modifies data under HKEY_USERS
                                                  PID:2356
                                                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                  C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 36c -InterruptEvent 2ec -NGENProcess 370 -Pipe 374 -Comment "NGen Worker Process"
                                                  2⤵
                                                  • Modifies data under HKEY_USERS
                                                  PID:1868
                                                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                  C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2ec -InterruptEvent 378 -NGENProcess 2dc -Pipe 360 -Comment "NGen Worker Process"
                                                  2⤵
                                                  • Modifies data under HKEY_USERS
                                                  PID:1780
                                                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                  C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 378 -InterruptEvent 37c -NGENProcess 35c -Pipe 364 -Comment "NGen Worker Process"
                                                  2⤵
                                                  • Modifies data under HKEY_USERS
                                                  PID:2484
                                                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                  C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 37c -InterruptEvent 380 -NGENProcess 370 -Pipe 368 -Comment "NGen Worker Process"
                                                  2⤵
                                                  • System Location Discovery: System Language Discovery
                                                  • Modifies data under HKEY_USERS
                                                  PID:2856
                                                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                  C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 380 -InterruptEvent 384 -NGENProcess 2dc -Pipe 308 -Comment "NGen Worker Process"
                                                  2⤵
                                                  • Modifies data under HKEY_USERS
                                                  PID:296
                                                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                  C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 384 -InterruptEvent 388 -NGENProcess 35c -Pipe 36c -Comment "NGen Worker Process"
                                                  2⤵
                                                  • System Location Discovery: System Language Discovery
                                                  • Modifies data under HKEY_USERS
                                                  PID:540
                                                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                  C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 388 -InterruptEvent 38c -NGENProcess 370 -Pipe 2ec -Comment "NGen Worker Process"
                                                  2⤵
                                                  • Modifies data under HKEY_USERS
                                                  PID:1636
                                                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                  C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 38c -InterruptEvent 390 -NGENProcess 2dc -Pipe 378 -Comment "NGen Worker Process"
                                                  2⤵
                                                  • System Location Discovery: System Language Discovery
                                                  • Modifies data under HKEY_USERS
                                                  PID:1028
                                                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                  C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 390 -InterruptEvent 394 -NGENProcess 35c -Pipe 37c -Comment "NGen Worker Process"
                                                  2⤵
                                                  • Loads dropped DLL
                                                  • Drops file in Windows directory
                                                  • Modifies data under HKEY_USERS
                                                  PID:2852
                                                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                  C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 394 -InterruptEvent 35c -NGENProcess 38c -Pipe 370 -Comment "NGen Worker Process"
                                                  2⤵
                                                  • System Location Discovery: System Language Discovery
                                                  • Modifies data under HKEY_USERS
                                                  PID:316
                                                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                  C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 35c -InterruptEvent 39c -NGENProcess 2dc -Pipe 384 -Comment "NGen Worker Process"
                                                  2⤵
                                                  • Loads dropped DLL
                                                  • Drops file in Windows directory
                                                  PID:1992
                                                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                  C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 39c -InterruptEvent 2dc -NGENProcess 394 -Pipe 398 -Comment "NGen Worker Process"
                                                  2⤵
                                                  • System Location Discovery: System Language Discovery
                                                  PID:2324
                                                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                  C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2dc -InterruptEvent 3a4 -NGENProcess 38c -Pipe 390 -Comment "NGen Worker Process"
                                                  2⤵
                                                  • Loads dropped DLL
                                                  • Drops file in Windows directory
                                                  • System Location Discovery: System Language Discovery
                                                  • Modifies data under HKEY_USERS
                                                  PID:2124
                                                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                  C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3a4 -InterruptEvent 38c -NGENProcess 39c -Pipe 3a0 -Comment "NGen Worker Process"
                                                  2⤵
                                                    PID:2944
                                                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                    C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 38c -InterruptEvent 3ac -NGENProcess 394 -Pipe 35c -Comment "NGen Worker Process"
                                                    2⤵
                                                    • Modifies data under HKEY_USERS
                                                    PID:1868
                                                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                    C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3ac -InterruptEvent 3b0 -NGENProcess 3a8 -Pipe 388 -Comment "NGen Worker Process"
                                                    2⤵
                                                    • Loads dropped DLL
                                                    • Drops file in Windows directory
                                                    • System Location Discovery: System Language Discovery
                                                    • Modifies data under HKEY_USERS
                                                    PID:2204
                                                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                    C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3b0 -InterruptEvent 3a8 -NGENProcess 38c -Pipe 39c -Comment "NGen Worker Process"
                                                    2⤵
                                                      PID:2064
                                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3a8 -InterruptEvent 2dc -NGENProcess 3b4 -Pipe 380 -Comment "NGen Worker Process"
                                                      2⤵
                                                        PID:924
                                                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2dc -InterruptEvent 3bc -NGENProcess 3a4 -Pipe 2e4 -Comment "NGen Worker Process"
                                                        2⤵
                                                        • System Location Discovery: System Language Discovery
                                                        PID:1672
                                                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3bc -InterruptEvent 3c0 -NGENProcess 38c -Pipe 3ac -Comment "NGen Worker Process"
                                                        2⤵
                                                        • System Location Discovery: System Language Discovery
                                                        PID:1864
                                                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3c0 -InterruptEvent 3c4 -NGENProcess 3b4 -Pipe 3b8 -Comment "NGen Worker Process"
                                                        2⤵
                                                          PID:2828
                                                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                          C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3c4 -InterruptEvent 3c8 -NGENProcess 3a4 -Pipe 3b0 -Comment "NGen Worker Process"
                                                          2⤵
                                                          • System Location Discovery: System Language Discovery
                                                          PID:2716
                                                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                          C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3c8 -InterruptEvent 3cc -NGENProcess 38c -Pipe 3a8 -Comment "NGen Worker Process"
                                                          2⤵
                                                          • System Location Discovery: System Language Discovery
                                                          PID:2756
                                                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                          C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3cc -InterruptEvent 3d0 -NGENProcess 3b4 -Pipe 2dc -Comment "NGen Worker Process"
                                                          2⤵
                                                          • System Location Discovery: System Language Discovery
                                                          PID:752
                                                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                          C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3d0 -InterruptEvent 3d4 -NGENProcess 3a4 -Pipe 3bc -Comment "NGen Worker Process"
                                                          2⤵
                                                          • System Location Discovery: System Language Discovery
                                                          PID:2204
                                                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                          C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3d4 -InterruptEvent 3d8 -NGENProcess 38c -Pipe 3c0 -Comment "NGen Worker Process"
                                                          2⤵
                                                            PID:2720
                                                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                            C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3d8 -InterruptEvent 3dc -NGENProcess 3b4 -Pipe 3c4 -Comment "NGen Worker Process"
                                                            2⤵
                                                              PID:1476
                                                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                              C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3dc -InterruptEvent 3e0 -NGENProcess 3a4 -Pipe 3c8 -Comment "NGen Worker Process"
                                                              2⤵
                                                              • System Location Discovery: System Language Discovery
                                                              PID:1716
                                                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                              C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3e0 -InterruptEvent 3e4 -NGENProcess 38c -Pipe 3cc -Comment "NGen Worker Process"
                                                              2⤵
                                                              • System Location Discovery: System Language Discovery
                                                              PID:2712
                                                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                              C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3e4 -InterruptEvent 3e8 -NGENProcess 3b4 -Pipe 3d0 -Comment "NGen Worker Process"
                                                              2⤵
                                                              • System Location Discovery: System Language Discovery
                                                              PID:1644
                                                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                              C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3e8 -InterruptEvent 3ec -NGENProcess 3a4 -Pipe 3d4 -Comment "NGen Worker Process"
                                                              2⤵
                                                              • System Location Discovery: System Language Discovery
                                                              PID:1160
                                                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                              C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3ec -InterruptEvent 3f0 -NGENProcess 38c -Pipe 3d8 -Comment "NGen Worker Process"
                                                              2⤵
                                                                PID:596
                                                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3f0 -InterruptEvent 3f4 -NGENProcess 3b4 -Pipe 3dc -Comment "NGen Worker Process"
                                                                2⤵
                                                                • System Location Discovery: System Language Discovery
                                                                PID:752
                                                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3f4 -InterruptEvent 3f8 -NGENProcess 3a4 -Pipe 3e0 -Comment "NGen Worker Process"
                                                                2⤵
                                                                  PID:2604
                                                                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                  C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3f8 -InterruptEvent 3fc -NGENProcess 38c -Pipe 3e4 -Comment "NGen Worker Process"
                                                                  2⤵
                                                                    PID:2720
                                                                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                    C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3fc -InterruptEvent 404 -NGENProcess 3b4 -Pipe 3e8 -Comment "NGen Worker Process"
                                                                    2⤵
                                                                    • Loads dropped DLL
                                                                    • Drops file in Windows directory
                                                                    PID:1636
                                                                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                    C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 404 -InterruptEvent 3b4 -NGENProcess 3f8 -Pipe 3a4 -Comment "NGen Worker Process"
                                                                    2⤵
                                                                    • System Location Discovery: System Language Discovery
                                                                    PID:2688
                                                                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                    C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3b4 -InterruptEvent 40c -NGENProcess 38c -Pipe 3f0 -Comment "NGen Worker Process"
                                                                    2⤵
                                                                    • Loads dropped DLL
                                                                    • Drops file in Windows directory
                                                                    PID:332
                                                                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                    C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 40c -InterruptEvent 38c -NGENProcess 404 -Pipe 408 -Comment "NGen Worker Process"
                                                                    2⤵
                                                                      PID:1464
                                                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 38c -InterruptEvent 414 -NGENProcess 3f8 -Pipe 3fc -Comment "NGen Worker Process"
                                                                      2⤵
                                                                        PID:2352
                                                                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 414 -InterruptEvent 418 -NGENProcess 410 -Pipe 3ec -Comment "NGen Worker Process"
                                                                        2⤵
                                                                          PID:2160
                                                                      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
                                                                        C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
                                                                        1⤵
                                                                        • Executes dropped EXE
                                                                        • Drops file in Windows directory
                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                        PID:1400
                                                                        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
                                                                          C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 1d0 -InterruptEvent 1bc -NGENProcess 1c0 -Pipe 1cc -Comment "NGen Worker Process"
                                                                          2⤵
                                                                          • Executes dropped EXE
                                                                          PID:1204
                                                                        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
                                                                          C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 240 -InterruptEvent 1bc -NGENProcess 1c0 -Pipe 1d0 -Comment "NGen Worker Process"
                                                                          2⤵
                                                                          • Executes dropped EXE
                                                                          PID:2612
                                                                      • C:\Windows\ehome\ehRecvr.exe
                                                                        C:\Windows\ehome\ehRecvr.exe
                                                                        1⤵
                                                                        • Executes dropped EXE
                                                                        PID:1368
                                                                      • C:\Windows\ehome\ehsched.exe
                                                                        C:\Windows\ehome\ehsched.exe
                                                                        1⤵
                                                                        • Executes dropped EXE
                                                                        PID:1888
                                                                      • C:\Windows\eHome\EhTray.exe
                                                                        "C:\Windows\eHome\EhTray.exe" /nav:-2
                                                                        1⤵
                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                        • Suspicious use of FindShellTrayWindow
                                                                        • Suspicious use of SendNotifyMessage
                                                                        PID:2944
                                                                      • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                                                                        "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                                                                        1⤵
                                                                        • Executes dropped EXE
                                                                        PID:2288
                                                                      • C:\Windows\ehome\ehRec.exe
                                                                        C:\Windows\ehome\ehRec.exe -Embedding
                                                                        1⤵
                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                        PID:1628
                                                                      • C:\Windows\system32\IEEtwCollector.exe
                                                                        C:\Windows\system32\IEEtwCollector.exe /V
                                                                        1⤵
                                                                        • Executes dropped EXE
                                                                        PID:1100
                                                                      • C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE
                                                                        "C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE" /auditservice
                                                                        1⤵
                                                                        • Executes dropped EXE
                                                                        • Drops file in System32 directory
                                                                        PID:664
                                                                      • C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe
                                                                        "C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"
                                                                        1⤵
                                                                        • Executes dropped EXE
                                                                        PID:556
                                                                      • C:\Windows\System32\msdtc.exe
                                                                        C:\Windows\System32\msdtc.exe
                                                                        1⤵
                                                                        • Executes dropped EXE
                                                                        • Drops file in System32 directory
                                                                        • Drops file in Windows directory
                                                                        PID:2404
                                                                      • C:\Windows\system32\msiexec.exe
                                                                        C:\Windows\system32\msiexec.exe /V
                                                                        1⤵
                                                                        • Executes dropped EXE
                                                                        • Loads dropped DLL
                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                        PID:1504
                                                                      • C:\Program Files (x86)\Common Files\Microsoft Shared\Source Engine\OSE.EXE
                                                                        "C:\Program Files (x86)\Common Files\Microsoft Shared\Source Engine\OSE.EXE"
                                                                        1⤵
                                                                        • Executes dropped EXE
                                                                        PID:2896
                                                                      • C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE
                                                                        "C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"
                                                                        1⤵
                                                                        • Executes dropped EXE
                                                                        PID:2564
                                                                      • C:\Windows\SysWow64\perfhost.exe
                                                                        C:\Windows\SysWow64\perfhost.exe
                                                                        1⤵
                                                                        • Executes dropped EXE
                                                                        PID:1736
                                                                      • C:\Windows\system32\locator.exe
                                                                        C:\Windows\system32\locator.exe
                                                                        1⤵
                                                                        • Executes dropped EXE
                                                                        PID:1892
                                                                      • C:\Windows\System32\snmptrap.exe
                                                                        C:\Windows\System32\snmptrap.exe
                                                                        1⤵
                                                                        • Executes dropped EXE
                                                                        PID:2972
                                                                      • C:\Windows\System32\vds.exe
                                                                        C:\Windows\System32\vds.exe
                                                                        1⤵
                                                                        • Executes dropped EXE
                                                                        PID:896
                                                                      • C:\Windows\system32\vssvc.exe
                                                                        C:\Windows\system32\vssvc.exe
                                                                        1⤵
                                                                        • Executes dropped EXE
                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                        PID:3040
                                                                      • C:\Windows\system32\wbengine.exe
                                                                        "C:\Windows\system32\wbengine.exe"
                                                                        1⤵
                                                                        • Executes dropped EXE
                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                        PID:1648
                                                                      • C:\Windows\system32\wbem\WmiApSrv.exe
                                                                        C:\Windows\system32\wbem\WmiApSrv.exe
                                                                        1⤵
                                                                        • Executes dropped EXE
                                                                        PID:692
                                                                      • C:\Program Files\Windows Media Player\wmpnetwk.exe
                                                                        "C:\Program Files\Windows Media Player\wmpnetwk.exe"
                                                                        1⤵
                                                                        • Executes dropped EXE
                                                                        • Modifies data under HKEY_USERS
                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                        PID:2492
                                                                      • C:\Windows\system32\SearchIndexer.exe
                                                                        C:\Windows\system32\SearchIndexer.exe /Embedding
                                                                        1⤵
                                                                        • Executes dropped EXE
                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                        • Suspicious use of WriteProcessMemory
                                                                        PID:580
                                                                        • C:\Windows\system32\SearchProtocolHost.exe
                                                                          "C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe1_ Global\UsGthrCtrlFltPipeMssGthrPipe1 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon"
                                                                          2⤵
                                                                          • Drops file in System32 directory
                                                                          • Modifies data under HKEY_USERS
                                                                          • Suspicious use of SetWindowsHookEx
                                                                          PID:1952
                                                                        • C:\Windows\system32\SearchFilterHost.exe
                                                                          "C:\Windows\system32\SearchFilterHost.exe" 0 588 592 600 65536 596
                                                                          2⤵
                                                                            PID:1268

                                                                        Network

                                                                        MITRE ATT&CK Enterprise v15

                                                                        Replay Monitor

                                                                        Loading Replay Monitor...

                                                                        Downloads

                                                                        • C:\Program Files (x86)\Common Files\microsoft shared\Source Engine\OSE.EXE

                                                                          Filesize

                                                                          1.3MB

                                                                          MD5

                                                                          d5873e0ccbcd1e7d8a0f1e1e7372b786

                                                                          SHA1

                                                                          ae702f2ce7c21e429baf5a37164f67b77c1fd595

                                                                          SHA256

                                                                          1278274b1bc2c4da6e3dc91c62311831da8f113168d46eb84aeb6cc261439ab8

                                                                          SHA512

                                                                          50b04fa7f01e0a3c824dcd302a800a58cb69ba1b3b1aee4cbe0118d59aa8f6eac0197340da459c77624c7466c884f58ba75a9c9f13050e147ad5ecc3c2f2a187

                                                                        • C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE

                                                                          Filesize

                                                                          30.1MB

                                                                          MD5

                                                                          12accd449f2173ec70cff216f46fd112

                                                                          SHA1

                                                                          d219abaeabcceb87f110810439ac6aab4ec9e179

                                                                          SHA256

                                                                          40d2423385bbd4ce348e36fc52951ee94b1487772441cd431ede2a653ac52793

                                                                          SHA512

                                                                          051627a59734b96e6f5825914bd64264931c186765cebbbf1f057f861c068afba0021ab34218ad88b7fde513ce1d84e8b9000c6fae60d9f6bfc7a62077db7e07

                                                                        • C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe

                                                                          Filesize

                                                                          1.4MB

                                                                          MD5

                                                                          0ca1581f2c8641be7a794eff15f40065

                                                                          SHA1

                                                                          5f9f9b98b957032a11e69f03a48f9651b7605b0d

                                                                          SHA256

                                                                          9c031cf19fac4892b79e0816454665ea84ee55938d10b554849eadcb8bc1a365

                                                                          SHA512

                                                                          2510e9f799cbe7e52138cdbf0cb5a4a0ad56e88a5951f0d18abdb0c54e9df09cbafde5d6b438665da189b73bb55c284ea5cd790a6f8ee455da49f9d5f7465cd6

                                                                        • C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE

                                                                          Filesize

                                                                          5.2MB

                                                                          MD5

                                                                          0b8f74503518c0e10896f8d2031c3e8c

                                                                          SHA1

                                                                          256c3c6ea6fc328888312ead687cfec1a010a6f1

                                                                          SHA256

                                                                          ab97e9e57db017c04f59517729d1869e5ad301f7129f4f8d181fa40e402de799

                                                                          SHA512

                                                                          b317185b3920c4064836634875e125b75c688ea93029d382f8acb82320b4b29bafb15df52ae7f664dbc5260da2e80a3380e26fc129a2ae705d34ab3e798795a9

                                                                        • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe

                                                                          Filesize

                                                                          2.1MB

                                                                          MD5

                                                                          1d1865eb31a1ba7f15a43f451f76af95

                                                                          SHA1

                                                                          5675827c762a6675b4ba749f6c749d551ea4fbde

                                                                          SHA256

                                                                          0c5c6c9a67e8aa6f9414062f94c7f32ca424d32adfd341dbf17cb5d524ffedc4

                                                                          SHA512

                                                                          3c9dbb116e7b26d9d0368f65cde2a9df7770db4112ba3f9b4b04c8fa026d5cea37e334e99011ec6ba1fffebc6c955f14d4eb2166f0509dca9bdd302a80007f11

                                                                        • C:\ProgramData\Microsoft\Search\Data\Applications\Windows\MSS.log

                                                                          Filesize

                                                                          1024KB

                                                                          MD5

                                                                          84ca72efbf79e289bcc90292b8a5580b

                                                                          SHA1

                                                                          e1246a230739351a44850d75a27bc8052a9462bd

                                                                          SHA256

                                                                          9c7bc0480510edd003dc9ee6c8b9cbd42301900b8dfcafc18698c896db1aea1e

                                                                          SHA512

                                                                          4d037f7fea337a3343456a7c5a7253f38e479faeeb260a189877c752941f81dc6ff55a1087a78f53251428c49979f4f5fd57580cecb4ce146323b4060df0f877

                                                                        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b91050d8b077a4e8.customDestinations-ms

                                                                          Filesize

                                                                          24B

                                                                          MD5

                                                                          b9bd716de6739e51c620f2086f9c31e4

                                                                          SHA1

                                                                          9733d94607a3cba277e567af584510edd9febf62

                                                                          SHA256

                                                                          7116ff028244a01f3d17f1d3bc2e1506bc9999c2e40e388458f0cccc4e117312

                                                                          SHA512

                                                                          cef609e54c7a81a646ad38dba7ac0b82401b220773b9c792cefac80c6564753229f0c011b34ffb56381dd3154a19aee2bf5f602c4d1af01f2cf0fbc1574e4478

                                                                        • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe

                                                                          Filesize

                                                                          1.3MB

                                                                          MD5

                                                                          99726e86d4a0504bcb3a7a312c1dda3b

                                                                          SHA1

                                                                          b8c7c232677a5b7c797c1be15b23410324fccc17

                                                                          SHA256

                                                                          caa1da7f98f46825190180648557b8be43c412f8e1c847ae1a254fe95ab9a5b1

                                                                          SHA512

                                                                          2a84e751b35f724621efb4837a1eaa5f3f1fb81a30461c01e9bddf3fc55ff04a3c0be85b0dd53950968e8890a331db13df401bdbe531f73258940ed84cc41203

                                                                        • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ngen_service.log

                                                                          Filesize

                                                                          872KB

                                                                          MD5

                                                                          6db1a96d16ec6dc14bc9f76848b1c9cc

                                                                          SHA1

                                                                          a294e8272ddcbc47ffa835a569152f41ceb9ddb8

                                                                          SHA256

                                                                          83180710d07b38de721c93017c7f0c32a0519e1aa72963f46fc0074dde60477d

                                                                          SHA512

                                                                          271a328eeac82852c032e7ba82d02422e398376378115cce81ea0fd75195d2eb85aeba5d49eb0de06b0198140f43338ed507250e924399b1d68c01f0dd3e0cf9

                                                                        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe

                                                                          Filesize

                                                                          1.3MB

                                                                          MD5

                                                                          a15dcc808e0d290199d54171fef868e0

                                                                          SHA1

                                                                          7d318d2a3f833fe671fd3039d26cb6eb2f6ecbff

                                                                          SHA256

                                                                          0564104f38366642c8ce7d84296f8e09f53cab092838fb7cd6f3c8715cb8b9b0

                                                                          SHA512

                                                                          e51c8e580a4bd9de1da47bec2bd1904c5c315d95489183d842cf873a4fd674e73de101910b00adab6959f78ff6775294b7143909a6e2d8c266cec13cdfc14266

                                                                        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe

                                                                          Filesize

                                                                          1.2MB

                                                                          MD5

                                                                          12f852695530bc05cd8aff14101a93c7

                                                                          SHA1

                                                                          09dc9a20e0709051c816766314304766166e9132

                                                                          SHA256

                                                                          61b5ed4580c1a1dd69814889312b0f2b5d305980d5f4e12f9fa2516485d168c4

                                                                          SHA512

                                                                          8e262d715861659ff82e4bec6b5313d65face7e6cff188a8e1d6a1fa4693a2d7633ed98e1c561cbc24f9885d7c681cce15b6258d5cb2c3c67ad6f470437b2ee5

                                                                        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\ngen_service.log

                                                                          Filesize

                                                                          1003KB

                                                                          MD5

                                                                          34cb2fd3bd8704bf148a3e82341346d3

                                                                          SHA1

                                                                          86d0142e962c24c86542a5ddad8778531c52e6e6

                                                                          SHA256

                                                                          f19920335ec17bf9860a5c3d6486b61361af8e9614ba797ca0cb3009f5ceb51e

                                                                          SHA512

                                                                          a3630571ae0bc302f6897a0941e713bc007e7dc9ce05a9df95cedc2fb81a3b944df161903b696cb86ddb8ef7531c54fb725bf0156601ca4ae097d794a70f240d

                                                                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe

                                                                          Filesize

                                                                          1.3MB

                                                                          MD5

                                                                          b8746b9575ec04ed04a787787f2117a2

                                                                          SHA1

                                                                          dd3e905725972db99b8df2a64412b40b403a98a2

                                                                          SHA256

                                                                          4bc0f23f2d4187914b5b38a22de0e2f220369816c47c7be295087e5b2b26b65f

                                                                          SHA512

                                                                          93be38a25ef1207db923e6990f4e2ba940daf4e09f77f443627d758a68a1db5fb84d5f036e349ceca7c501a2f46bb1d4de48abe07b79b334cf3e97c0a6f5a86e

                                                                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen_service.log

                                                                          Filesize

                                                                          8KB

                                                                          MD5

                                                                          beebb737e0abaef8b45127d4e0422f86

                                                                          SHA1

                                                                          039fc26363102dfb2ec315836c14635064bf7e3c

                                                                          SHA256

                                                                          3b2b92e4df6231d5b1439782ffefd068070d74cb2962b605288aeeb5e0416e30

                                                                          SHA512

                                                                          a0e65bb360132c3891d4a259fd5e316cf3ee74073e33644218efdbec786bd1e79f806b1549160ef650686ad8c5eab62b1135aaf6221e1e3d912df66fcf52ddce

                                                                        • C:\Windows\SysWOW64\perfhost.exe

                                                                          Filesize

                                                                          1.2MB

                                                                          MD5

                                                                          e60bf467ce1fb7476feabf1ae4707768

                                                                          SHA1

                                                                          b89c224232ef1aa6763a5cb36d5883a2642a8739

                                                                          SHA256

                                                                          9d023f8c4c9d985d03bcd675e4d2b9e6a2d7972db6f167051cd1c77398052110

                                                                          SHA512

                                                                          3e229ca0ab355185d86b0f9bd0a7694c74db490bf0cef792e88f9300a3210003428d93d90dc114b57bbd2872336c8e5ab002b0a85e4db5c93649e582678d7f46

                                                                        • C:\Windows\System32\SearchIndexer.exe

                                                                          Filesize

                                                                          1.1MB

                                                                          MD5

                                                                          075d6e35f5f3068a05266b6f07c61e87

                                                                          SHA1

                                                                          5e1939cf1f5b21f98b4ad733e02196474b8e81ca

                                                                          SHA256

                                                                          62a3f24a7555a3a9def80ac6ec2deb750e902951a78a71f0e276367ac6928420

                                                                          SHA512

                                                                          ed84e09ef0490deb21836147aecd4272ac84cd540fda77c34d6a54ed323f8115f50a34c846762e07d67b548bdbd3fefd53b988b1f9d58100ca8827be9272a271

                                                                        • C:\Windows\System32\VSSVC.exe

                                                                          Filesize

                                                                          2.1MB

                                                                          MD5

                                                                          1a524319db6588ed1fa4d141cb31c933

                                                                          SHA1

                                                                          0ba748a5d35d309483c85d0dfca6dcff95f663b2

                                                                          SHA256

                                                                          4baa14bb891aeb0137092fe8e71befbf2997520ec59ee65b9d08c41467783678

                                                                          SHA512

                                                                          afc952e8d7bab9b32a2f94d7bd499bcccc034de5f9b06852e1c3f8893ac74bfbdb3a668ec88b103eb079ab26e63b775bc1c87f3437966c704f6f269e4d399a28

                                                                        • C:\Windows\System32\ieetwcollector.exe

                                                                          Filesize

                                                                          1.3MB

                                                                          MD5

                                                                          6b67a515669513eb2d46a9ca7d1c747c

                                                                          SHA1

                                                                          08c77568f7924c02dc1f7ba45d668b7526e373e9

                                                                          SHA256

                                                                          14c6a21ebea3003e6888dcb2e47b10c3946b76476d0bf6e99738cae56ba29d97

                                                                          SHA512

                                                                          31adc04a257d4069fc66ae91cbec2167313a1986ed5d7006c2984811cc9adb1dc01e1ca7ed7ea33b541637884d6f724f5f16c343b664c09c73a691b2554ea46a

                                                                        • C:\Windows\System32\vds.exe

                                                                          Filesize

                                                                          1.7MB

                                                                          MD5

                                                                          381a0165541148d3adc39a8591e08e9f

                                                                          SHA1

                                                                          5ad3cf9e5d46f063a99fc463544035fbb95d1a36

                                                                          SHA256

                                                                          dc1801bdd24f7462a75e7eddf40f2ea6f6d761712f73433e8d8fa6826f2e545c

                                                                          SHA512

                                                                          25d3219de07dd49bdfa9cc7bfdbf0f7200bec39f949492f3eb2ae86c7931d46f3c76ac198174b95e6be172116e8ddd29c3e3f18c8e3c13bfa9b55640a09d0cf5

                                                                        • C:\Windows\System32\wbengine.exe

                                                                          Filesize

                                                                          2.0MB

                                                                          MD5

                                                                          8ab8c3415ac5f493696e4436e04623ac

                                                                          SHA1

                                                                          cf7e1d31f553904a221d50d1faae313c082b44ca

                                                                          SHA256

                                                                          56ca4f682c9ddef26e04bb978734ee21f92a89dbbad461ca9a320cb0a0f7d100

                                                                          SHA512

                                                                          9dc0f20386094a058869aa3a2f0688de29fa804c0e34c259efde4f865960584fd96dafc97b7b37084c7729733905bedfee3938af1a36b6fe4cb12e516a4c08c3

                                                                        • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.Office.To#\135228e87b2c27d26b516ac0fc0ce667\Microsoft.Office.Tools.Word.v9.0.ni.dll

                                                                          Filesize

                                                                          834KB

                                                                          MD5

                                                                          c76656b09bb7df6bd2ac1a6177a0027c

                                                                          SHA1

                                                                          0c296994a249e8649b19be84dce27c9ddafef3e0

                                                                          SHA256

                                                                          a0ae0aec5b203865fac761023741a59d274e2c41889aeb69140eb746d38f6ce0

                                                                          SHA512

                                                                          8390879b8812fc98c17702a52259d510a7fe8bc3cf4972e89f705e93bc8fa98300c34d49f3aec869da8d9f786d33004742e4538019c0f852c61db89c302d5fdf

                                                                        • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.Office.To#\5766ec3721d18a48bec1ca1f60331e2d\Microsoft.Office.Tools.Common.v9.0.ni.dll

                                                                          Filesize

                                                                          797KB

                                                                          MD5

                                                                          aeb0b6e6c5d32d1ada231285ff2ae881

                                                                          SHA1

                                                                          1f04a1c059503896336406aed1dc93340e90b742

                                                                          SHA256

                                                                          4c53ca542ac5ef9d822ef8cb3b0ecef3fb8b937d94c0a7b735bedb275c74a263

                                                                          SHA512

                                                                          e55fd4c4d2966b3f0b6e88292fbd6c20ffa34766e076e763442c15212d19b6dea5d9dc9e7c359d999674a5b2c8a3849c2bbaaf83e7aa8c12715028b06b5a48e1

                                                                        • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.Office.To#\60214b09b490be856c4ee2b3398d71bd\Microsoft.Office.Tools.Outlook.v9.0.ni.dll

                                                                          Filesize

                                                                          163KB

                                                                          MD5

                                                                          e88828b5a35063aa16c68ffb8322215d

                                                                          SHA1

                                                                          8225660ba3a9f528cf6ac32038ae3e0ec98d2331

                                                                          SHA256

                                                                          99facae4828c566c310a1ccf4059100067ab8bfb3d6e94e44dd9e189fd491142

                                                                          SHA512

                                                                          e4d2f5a5aeaa29d4d3392588f15db0d514ca4c86c629f0986ee8dba61e34af5ca9e06b94479efd8dd154026ae0da276888a0214e167129db18316a17d9718a57

                                                                        • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.Office.To#\d7be05162f8d0fba8f4447db13f6695b\Microsoft.Office.Tools.Excel.v9.0.ni.dll

                                                                          Filesize

                                                                          1.3MB

                                                                          MD5

                                                                          006498313e139299a5383f0892c954b9

                                                                          SHA1

                                                                          7b3aa10930da9f29272154e2674b86876957ce3a

                                                                          SHA256

                                                                          489fec79addba2de9141daa61062a05a95e96a196049ce414807bada572cc35c

                                                                          SHA512

                                                                          6a15a10ae66ce0e5b18e060bb53c3108d09f6b07ee2c4a834856f0a35bec2453b32f891620e787731985719831302160678eb52acada102fdb0b87a14288d925

                                                                        • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.Office.To#\e1f8e4d08d4b7f811b7dbbacd324027b\Microsoft.Office.Tools.v9.0.ni.dll

                                                                          Filesize

                                                                          148KB

                                                                          MD5

                                                                          ac901cf97363425059a50d1398e3454b

                                                                          SHA1

                                                                          2f8bd4ac2237a7b7606cb77a3d3c58051793c5c7

                                                                          SHA256

                                                                          f6c7aecb211d9aac911bf80c91e84a47a72ac52cbb523e34e9da6482c0b24c58

                                                                          SHA512

                                                                          6a340b6d5fa8e214f2a58d8b691c749336df087fa75bcc8d8c46f708e4b4ff3d68a61a17d13ee62322b75cbc61d39f5a572588772f3c5d6e5ff32036e5bc5a00

                                                                        • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\00cf0faa3d37faa0ea2d240c1ca307ef\Microsoft.VisualStudio.Tools.Office.HostAdapter.v10.0.ni.dll

                                                                          Filesize

                                                                          143KB

                                                                          MD5

                                                                          75c84340d765d73eac1c743a31b6571a

                                                                          SHA1

                                                                          52aeef700a52b8e687316f42816eb9c0599354df

                                                                          SHA256

                                                                          b72a1f7da8b3c3dc95c2252319f6f3e71c81ed8bd59a5b31bd2861e14c364459

                                                                          SHA512

                                                                          9a9cdbc3a103e733150fae265c594dd7378ca402521387e466732f2431472a6a0e6cb4dfe02fe9f5b975a1739c685471ad2a4dddcdf6f12c4b5be469832fd5f1

                                                                        • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\03cad6bd8b37d21b28dcb4f955be2158\Microsoft.VisualStudio.Tools.Applications.Contract.v9.0.ni.dll

                                                                          Filesize

                                                                          34KB

                                                                          MD5

                                                                          c26b034a8d6ab845b41ed6e8a8d6001d

                                                                          SHA1

                                                                          3a55774cf22d3244d30f9eb5e26c0a6792a3e493

                                                                          SHA256

                                                                          620b41f5e02df56c33919218bedc238ca7e76552c43da4f0f39a106835a4edc3

                                                                          SHA512

                                                                          483424665c3bc79aeb1de6dfdd633c8526331c7b271b1ea6fe93ab298089e2aceefe7f9c7d0c6e33e604ca7b2ed62e7bb586147fecdf9a0eea60e8c03816f537

                                                                        • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\0cb958acb9cd4cacb46ebc0396e30aa3\Microsoft.VisualStudio.Tools.Office.Contract.v9.0.ni.dll

                                                                          Filesize

                                                                          109KB

                                                                          MD5

                                                                          0fd0f978e977a4122b64ae8f8541de54

                                                                          SHA1

                                                                          153d3390416fdeba1b150816cbbf968e355dc64f

                                                                          SHA256

                                                                          211d2b83bb82042385757f811d90c5ae0a281f3abb3bf1c7901e8559db479e60

                                                                          SHA512

                                                                          ceddfc031bfe4fcf5093d0bbc5697b5fb0cd69b03bc32612325a82ea273dae5daff7e670b0d45816a33307b8b042d27669f5d5391cb2bdcf3e5a0c847c6dcaa8

                                                                        • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\34b581170d40e8f3eba8dd95ec1ed3a7\Microsoft.VisualStudio.Tools.Office.Excel.HostAdapter.v10.0.ni.dll

                                                                          Filesize

                                                                          180KB

                                                                          MD5

                                                                          32b3bc413ca11c329d509bcbcef1ced1

                                                                          SHA1

                                                                          017df2de10070f74f18ad88e36f3f1407e2cbac1

                                                                          SHA256

                                                                          4e9104ad65aa1d2799f0826a5299d1df39a056150adc3a2a5fb60389fbf1383c

                                                                          SHA512

                                                                          3d5c40785e2807bb2288e1d25b6c4d2ce7bfbf02dc7bcf1edcb82d898b11de3501c8cf71d689fffec2320d3324a9dfda73a48929696de8876d759dc90f6aa0b4

                                                                        • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\367516b7878af19f5c84c67f2cd277ae\Microsoft.VisualStudio.Tools.Office.Word.AddInAdapter.v9.0.ni.dll

                                                                          Filesize

                                                                          41KB

                                                                          MD5

                                                                          3c269caf88ccaf71660d8dc6c56f4873

                                                                          SHA1

                                                                          f9481bf17e10fe1914644e1b590b82a0ecc2c5c4

                                                                          SHA256

                                                                          de21619e70f9ef8ccbb274bcd0d9d2ace1bae0442dfefab45976671587cf0a48

                                                                          SHA512

                                                                          bd5be3721bf5bd4001127e0381a0589033cb17aa35852f8f073ba9684af7d8c5a0f3ee29987b345fc15fdf28c5b56686087001ef41221a2cfb16498cf4c016c6

                                                                        • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\787526c375f27d452cde50fea4f7986b\Microsoft.VisualStudio.Tools.Applications.Adapter.v9.0.ni.dll

                                                                          Filesize

                                                                          1.2MB

                                                                          MD5

                                                                          0637ad2bf6fc5ac1d29e547155bc818c

                                                                          SHA1

                                                                          a502879466b6dd37eae5881bbb18353f97623852

                                                                          SHA256

                                                                          868c297cb00b2d298f594ad7e3fd4e38aeaac78042613626d6f919b2bca25c4f

                                                                          SHA512

                                                                          1d18a16ec3b91c3143c4371de305a7ea464d41661752ece65bf1ce19a8342a265c024a740afa6be8baf4d1edfdac6c6fcdad7395c1294342cd1f4388428e52c1

                                                                        • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\8b0f24c7d2636f438f0f9711570e4148\Microsoft.VisualStudio.Tools.Office.Outlook.HostAdapter.v10.0.ni.dll

                                                                          Filesize

                                                                          83KB

                                                                          MD5

                                                                          a8231cb842faec93051a16db25142d65

                                                                          SHA1

                                                                          de8303002a427f624de492ee0b9b2cce3ae1eba8

                                                                          SHA256

                                                                          752032b14d615a52bd9cda2d7fd06acb1f279756df907b6096f6b29173d9aed5

                                                                          SHA512

                                                                          1117c2b46bc06a17105e5fafe0482e2206cf10dbb51697ae4e0ada4a97f100ffff741f78d5da9b7367aa75d52587d21cb83273f6a1637912d8f937ad28993517

                                                                        • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\8c6bac317f75b51647ea3a8da141b143\Microsoft.VisualStudio.Tools.Office.AddInAdapter.v9.0.ni.dll

                                                                          Filesize

                                                                          210KB

                                                                          MD5

                                                                          4f40997b51420653706cb0958086cd2d

                                                                          SHA1

                                                                          0069b956d17ce7d782a0e054995317f2f621b502

                                                                          SHA256

                                                                          8cd6a0b061b43e0b660b81859c910290a3672b00d7647ba0e86eda6ddcc8c553

                                                                          SHA512

                                                                          e18953d7a348859855e5f6e279bc9924fc3707b57a733ce9b8f7d21bd631d419f1ebfb29202608192eb346569ca9a55264f5b4c2aedd474c22060734a68a4ee6

                                                                        • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\9306fc630870a75ddd23441ad77bdc57\Microsoft.VisualStudio.Tools.Applications.Runtime.v10.0.ni.dll

                                                                          Filesize

                                                                          53KB

                                                                          MD5

                                                                          e3a7a2b65afd8ab8b154fdc7897595c3

                                                                          SHA1

                                                                          b21eefd6e23231470b5cf0bd0d7363879a2ed228

                                                                          SHA256

                                                                          e5faf5e8adf46a8246e6b5038409dadca46985a9951343a1936237d2c8d7a845

                                                                          SHA512

                                                                          6537c7ed398deb23be1256445297cb7c8d7801bf6e163d918d8e258213708b28f7255ecff9fbd3431d8f5e5a746aa95a29d3a777b28fcd688777aed6d8205a33

                                                                        • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\a05ee2388c8a28fb3ac98ec65148e455\Microsoft.VisualStudio.Tools.Applications.AddInAdapter.v10.0.ni.dll

                                                                          Filesize

                                                                          65KB

                                                                          MD5

                                                                          da9f9a01a99bd98104b19a95eeef256c

                                                                          SHA1

                                                                          272071d5bbc0c234bc2f63dfcd5a90f83079bbab

                                                                          SHA256

                                                                          b06632dff444204f6e76b16198c31ab706ea52270d5e3ae81626dc1fc1fb1a4d

                                                                          SHA512

                                                                          dcb3273e33b7df02461e81a4f65ae99c0a9ae98188a612ce6d605a058bd2dcb6ddb5b7c78abe1f0a955b7f0c07c323dbfd77a2b6a629a9c87e4ecc1c57e4d81d

                                                                        • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\ae1c220aeb7d0c8658a2dda139830286\Microsoft.VisualStudio.Tools.Office.Word.HostAdapter.v10.0.ni.dll

                                                                          Filesize

                                                                          187KB

                                                                          MD5

                                                                          762094f193a11a453420743f978fba8f

                                                                          SHA1

                                                                          57df6362777229ed1180e7e6da72b73db2099479

                                                                          SHA256

                                                                          0967407c3ee58b0cb6c347a23d0463c0c92fa0138a433a3bda3e82aa40011c9c

                                                                          SHA512

                                                                          a48b1315b009178d647aa18678cee73b7a601208c7643c6b52f49808d52d58a23f1f93024ac2057f9bc1a34fd9f49939084f5f54604c50d394f9b42d22282022

                                                                        • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\afa5bb1a39443d7dc81dfff54073929b\Microsoft.VisualStudio.Tools.Office.Contract.v10.0.ni.dll

                                                                          Filesize

                                                                          28KB

                                                                          MD5

                                                                          aefc3f3c8e7499bad4d05284e8abd16c

                                                                          SHA1

                                                                          7ab718bde7fdb2d878d8725dc843cfeba44a71f7

                                                                          SHA256

                                                                          4436550409cfb3d06b15dd0c3131e87e7002b0749c7c6e9dc3378c99dbec815d

                                                                          SHA512

                                                                          1d7dbc9764855a9a1f945c1bc8e86406c0625f1381d71b3ea6924322fbe419d1c70c3f3efd57ee2cb2097bb9385e0bf54965ab789328a80eb4946849648fe20b

                                                                        • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\de06a98a598aa0ff716a25b24d56ad7f\Microsoft.VisualStudio.Tools.Applications.Contract.v10.0.ni.dll

                                                                          Filesize

                                                                          27KB

                                                                          MD5

                                                                          9c60454398ce4bce7a52cbda4a45d364

                                                                          SHA1

                                                                          da1e5de264a6f6051b332f8f32fa876d297bf620

                                                                          SHA256

                                                                          edc90887d38c87282f49adbb12a94040f9ac86058bfae15063aaaff2672b54e1

                                                                          SHA512

                                                                          533b7e9c55102b248f4a7560955734b4156eb4c02539c6f978aeacecff1ff182ba0f04a07d32ed90707a62d73191b0e2d2649f38ae1c3e7a5a4c0fbea9a94300

                                                                        • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\e0220058091b941725ef02be0b84abe7\Microsoft.VisualStudio.Tools.Applications.HostAdapter.v10.0.ni.dll

                                                                          Filesize

                                                                          57KB

                                                                          MD5

                                                                          6eaaa1f987d6e1d81badf8665c55a341

                                                                          SHA1

                                                                          e52db4ad92903ca03a5a54fdb66e2e6fad59efd5

                                                                          SHA256

                                                                          4b78ffa5f0b6751aea11917db5961d566e2f59beaa054b41473d331fd392329e

                                                                          SHA512

                                                                          dbedfa6c569670c22d34d923e22b7dae7332b932b809082dad87a1f0bb125c912db37964b5881667867ccf23dc5e5be596aad85485746f8151ce1c51ffd097b2

                                                                        • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\ee73646032cbb022d16771203727e3b2\Microsoft.VisualStudio.Tools.Applications.Runtime.v9.0.ni.dll

                                                                          Filesize

                                                                          130KB

                                                                          MD5

                                                                          2735d2ab103beb0f7c1fbd6971838274

                                                                          SHA1

                                                                          6063646bc072546798bf8bf347425834f2bfad71

                                                                          SHA256

                                                                          f00156860ec7e88f4ccb459ca29b7e0e5c169cdc8a081cb043603187d25d92b3

                                                                          SHA512

                                                                          fe2ce60c7f61760a29344e254771d48995e983e158da0725818f37441f9690bda46545bf10c84b163f6afb163ffb504913d6ffddf84f72b062c7f233aed896de

                                                                        • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\f1a7ac664667f2d6bcd6c388b230c22b\Microsoft.VisualStudio.Tools.Applications.AddInAdapter.v9.0.ni.dll

                                                                          Filesize

                                                                          59KB

                                                                          MD5

                                                                          8c69bbdfbc8cc3fa3fa5edcd79901e94

                                                                          SHA1

                                                                          b8028f0f557692221d5c0160ec6ce414b2bdf19b

                                                                          SHA256

                                                                          a21471690e7c32c80049e17c13624820e77bca6c9c38b83d9ea8a7248086660d

                                                                          SHA512

                                                                          825f5b87b76303b62fc16a96b108fb1774c2aca52ac5e44cd0ac2fe2ee47d5d67947dfe7498e36bc849773f608ec5824711f8c36e375a378582eefb57c9c2557

                                                                        • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\fc36797f7054935a6033077612905a0f\Microsoft.VisualStudio.Tools.Office.Excel.AddInAdapter.v9.0.ni.dll

                                                                          Filesize

                                                                          42KB

                                                                          MD5

                                                                          71d4273e5b77cf01239a5d4f29e064fc

                                                                          SHA1

                                                                          e8876dea4e4c4c099e27234742016be3c80d8b62

                                                                          SHA256

                                                                          f019899f829731f899a99885fd52fde1fe4a4f6fe3ecf7f7a7cfa78517c00575

                                                                          SHA512

                                                                          41fe67cda988c53bd087df6296d1a242cddac688718ea5a5884a72b43e9638538e64d7a59e045c0b4d490496d884cf0ec694ddf7fcb41ae3b8cbc65b7686b180

                                                                        • C:\Windows\assembly\NativeImages_v2.0.50727_32\ehiVidCtl\88e20c69254157d91b96eadc9444815d\ehiVidCtl.ni.dll

                                                                          Filesize

                                                                          855KB

                                                                          MD5

                                                                          7812b0a90d92b4812d4063b89a970c58

                                                                          SHA1

                                                                          3c4a789b8d28a5bfa6a6191624e33b8f40e4c4ea

                                                                          SHA256

                                                                          897626e6af00e85e627eeaa7f9563b245335242bc6196b36d0072e5b6d45e543

                                                                          SHA512

                                                                          634a2395bada9227b1957f2b76ed7e19f12bfc4d71a145d182602a1b6e24d83e220ebfabd602b1995c360e1725a38a89ff58417b0295bb0da9ea35c41c21a6ed

                                                                        • C:\Windows\assembly\NativeImages_v2.0.50727_32\stdole\2c6d60b55bbab22515c512080d4b3bae\stdole.ni.dll

                                                                          Filesize

                                                                          43KB

                                                                          MD5

                                                                          3e72bdd0663c5b2bcd530f74139c83e3

                                                                          SHA1

                                                                          66069bcac0207512b9e07320f4fa5934650677d2

                                                                          SHA256

                                                                          6a6ac3094130d1affd34aae5ba2bd8c889e2071eb4217a75d72b5560f884e357

                                                                          SHA512

                                                                          b0a98db477fccae71b4ebfb8525ed52c10f1e7542f955b307f260e27e0758aa22896683302e34b0237e7e3bba9f5193ddcc7ff255c71fbaa1386988b0ec7d626

                                                                        • \Program Files\Windows Media Player\wmpnetwk.exe

                                                                          Filesize

                                                                          2.0MB

                                                                          MD5

                                                                          6463ee049856fee9013855f9824d01d7

                                                                          SHA1

                                                                          4560b79908d8dd7f793a8b442133bebf0194fecc

                                                                          SHA256

                                                                          1c5874342cadb406f6622810c730903da69c09fa107b802f24a78fd28e7c78b0

                                                                          SHA512

                                                                          80e049603b9144aa075f928ff042cddb55d033bbffb51ead271b103d1f84ade755dfa9fb38834b9335118dcc99b9f6609a58328d7a579fb596c4e5e2bcc4ffa0

                                                                        • \Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe

                                                                          Filesize

                                                                          1.2MB

                                                                          MD5

                                                                          8d2743a5247ce08c654bbe10b1a2b494

                                                                          SHA1

                                                                          dfc0cb444b29e480fdbf59fb8ec872a961149267

                                                                          SHA256

                                                                          0bbb84eed0bcd5bc3bfda53be6afca43ad7f0954e598dee75dc1779dc87cfe34

                                                                          SHA512

                                                                          2416dd68c5a1c80f419db51ae08d81143b8bebb93373374e2d27cacb2c37d58e9b42f3dcd4122ea99e76a5bbacba89843800e00b753e91c69be4703aca64ad2b

                                                                        • \Windows\System32\Locator.exe

                                                                          Filesize

                                                                          1.2MB

                                                                          MD5

                                                                          b04699c86d0124763779c7f35d8665c2

                                                                          SHA1

                                                                          b9850aca37de217e4f4e211689a34507e183dacf

                                                                          SHA256

                                                                          84ae88ef0f91c0114b97b3d9ff2c87a07397600375ea211d1545d2cd964a1cfd

                                                                          SHA512

                                                                          ba496e57ca6f316f4a31593284e6debd4a243363a93e697f1673b6d08a1a5ad853cc635a1ac30407d89eeeac422495c946da00b3a5490b96c39d20bbd67782cc

                                                                        • \Windows\System32\alg.exe

                                                                          Filesize

                                                                          1.3MB

                                                                          MD5

                                                                          4837eb460cd19c6f104904736ab6b87b

                                                                          SHA1

                                                                          aa693b57bc9d6f0bb5d15d65a09f24668aedb470

                                                                          SHA256

                                                                          f962f03302b92a285ab606f5cb92bd7b04ab6ce0daab0324e8e11fb679c0a2b7

                                                                          SHA512

                                                                          b77d83b6c35565f064a82afa352c6acb2bb6597e1730df6bf1a16fbd3b39ef65122b78ddd2bfe1821c8465da3983fae035c06e2e95c2e014b09d9abddd206d1b

                                                                        • \Windows\System32\msdtc.exe

                                                                          Filesize

                                                                          1.3MB

                                                                          MD5

                                                                          a4ac895c24228d5dc1756dc7cb1287e2

                                                                          SHA1

                                                                          2bccc10750a902d10537ba311767e982502fe827

                                                                          SHA256

                                                                          e1770c4a550553f6773320d819f2148d7e8dd08202e20ac214666f5ebd68be3e

                                                                          SHA512

                                                                          ae5e29359d160e03290dcce567d2f5db58d4c7c5c0145e12a4f9948855f68586015274630423d94620b7c2bba94f28a6e4b57e8c79b426c9d70d454b2b79f2a1

                                                                        • \Windows\System32\msiexec.exe

                                                                          Filesize

                                                                          1.3MB

                                                                          MD5

                                                                          182a07fe8ef3de02583bc33d9c8a1a79

                                                                          SHA1

                                                                          83229219f3e8d6916c1ce406eb45f56a23961477

                                                                          SHA256

                                                                          459382e90e2b6eda52b4be89a941d30275236bc6aea3909075a83f6785929f25

                                                                          SHA512

                                                                          9e78c4e6f47a2f6c38c57154d8d54ee76074a8baef1a250b31606ae4a8c2c4a89bc961f5f6835bcd0a42f0208c3141ceeb0f8a24afb069b2cee1214f86057781

                                                                        • \Windows\System32\snmptrap.exe

                                                                          Filesize

                                                                          1.2MB

                                                                          MD5

                                                                          b2ee4382a33203d8f6a5bc7ac09b2899

                                                                          SHA1

                                                                          d983e9ccbda8404215412a0583b58becb02362e2

                                                                          SHA256

                                                                          8765256a3fd056b6087b13a707aa7255ab23541e81997cdda569709c79890775

                                                                          SHA512

                                                                          86a78c10973a97e0ca3bb7840a2cf52ef6e2690a5e74d4d165f414ded6059dda64aacad1c5855d45d161f7085b7baed63abace7fa09d88b1cb40783ef4988e67

                                                                        • \Windows\System32\wbem\WmiApSrv.exe

                                                                          Filesize

                                                                          1.4MB

                                                                          MD5

                                                                          6ff9849f33c2a354c8d75a2e068bd485

                                                                          SHA1

                                                                          cc08238f6de39fcc13157448d8472278a9d50731

                                                                          SHA256

                                                                          b0a8006b849910f69a737da9800c1a3010a6fae5a2eea6a4c96a855cafa561a0

                                                                          SHA512

                                                                          6dd11f85a8349f4b80d872927bb3d633d5d77ee06d6359babb2860f785d4fe66f65947e8c2d0bad05f2d5041d94f3da5011096f9a5a8a29748b3e6fc466464c8

                                                                        • \Windows\ehome\ehrecvr.exe

                                                                          Filesize

                                                                          1.2MB

                                                                          MD5

                                                                          628c38059407f3281a73443f69fa4d1e

                                                                          SHA1

                                                                          472ca27e02495f4abdc7a717a79098407d6dcffa

                                                                          SHA256

                                                                          3ce7d25a87df68f8545ad89078a1ab7e35b6bf45e567baeb142649df0d7909ac

                                                                          SHA512

                                                                          f4853cebf4f30f5cbe70092a08c6f5d985f4879066459e0af402ad884974a1363ea9f65c4f67ac83e0743177d7c23389918d6d07fd745fa2f9a7a04a64d1174c

                                                                        • \Windows\ehome\ehsched.exe

                                                                          Filesize

                                                                          1.3MB

                                                                          MD5

                                                                          b95052784d2681ae1cc2c9939275f84a

                                                                          SHA1

                                                                          e578b8d23fa8e13c8a10ebcecfa683358de32de3

                                                                          SHA256

                                                                          d5003aac53e8ca448df65e91cb0c5137733eba336fd2fb4bf9eadc942637d900

                                                                          SHA512

                                                                          9519a8fbda3cb09d206fd562d899e705307b5a7723b490276ca85d293f4f8f7d17261604982cecdf35c43f183aa351a5a43e97e17b8930b5a3ad76045b6c3a6d

                                                                        • memory/556-181-0x0000000140000000-0x000000014016B000-memory.dmp

                                                                          Filesize

                                                                          1.4MB

                                                                        • memory/556-199-0x0000000140000000-0x000000014016B000-memory.dmp

                                                                          Filesize

                                                                          1.4MB

                                                                        • memory/580-724-0x0000000100000000-0x0000000100123000-memory.dmp

                                                                          Filesize

                                                                          1.1MB

                                                                        • memory/580-428-0x0000000100000000-0x0000000100123000-memory.dmp

                                                                          Filesize

                                                                          1.1MB

                                                                        • memory/664-169-0x000000002E000000-0x000000002FE1E000-memory.dmp

                                                                          Filesize

                                                                          30.1MB

                                                                        • memory/664-268-0x000000002E000000-0x000000002FE1E000-memory.dmp

                                                                          Filesize

                                                                          30.1MB

                                                                        • memory/692-650-0x0000000100000000-0x0000000100165000-memory.dmp

                                                                          Filesize

                                                                          1.4MB

                                                                        • memory/692-395-0x0000000100000000-0x0000000100165000-memory.dmp

                                                                          Filesize

                                                                          1.4MB

                                                                        • memory/696-811-0x0000000000400000-0x0000000000549000-memory.dmp

                                                                          Filesize

                                                                          1.3MB

                                                                        • memory/696-791-0x0000000000400000-0x0000000000549000-memory.dmp

                                                                          Filesize

                                                                          1.3MB

                                                                        • memory/896-520-0x0000000100000000-0x00000001001B5000-memory.dmp

                                                                          Filesize

                                                                          1.7MB

                                                                        • memory/896-334-0x0000000100000000-0x00000001001B5000-memory.dmp

                                                                          Filesize

                                                                          1.7MB

                                                                        • memory/1100-256-0x0000000140000000-0x000000014014F000-memory.dmp

                                                                          Filesize

                                                                          1.3MB

                                                                        • memory/1100-908-0x0000000140000000-0x000000014014F000-memory.dmp

                                                                          Filesize

                                                                          1.3MB

                                                                        • memory/1100-158-0x0000000140000000-0x000000014014F000-memory.dmp

                                                                          Filesize

                                                                          1.3MB

                                                                        • memory/1368-219-0x0000000140000000-0x000000014013C000-memory.dmp

                                                                          Filesize

                                                                          1.2MB

                                                                        • memory/1368-961-0x0000000140000000-0x000000014013C000-memory.dmp

                                                                          Filesize

                                                                          1.2MB

                                                                        • memory/1368-118-0x0000000000280000-0x00000000002E0000-memory.dmp

                                                                          Filesize

                                                                          384KB

                                                                        • memory/1368-112-0x0000000000280000-0x00000000002E0000-memory.dmp

                                                                          Filesize

                                                                          384KB

                                                                        • memory/1368-111-0x0000000140000000-0x000000014013C000-memory.dmp

                                                                          Filesize

                                                                          1.2MB

                                                                        • memory/1384-730-0x0000000000400000-0x0000000000549000-memory.dmp

                                                                          Filesize

                                                                          1.3MB

                                                                        • memory/1384-709-0x0000000001B90000-0x0000000001C4A000-memory.dmp

                                                                          Filesize

                                                                          744KB

                                                                        • memory/1400-96-0x0000000000AD0000-0x0000000000B30000-memory.dmp

                                                                          Filesize

                                                                          384KB

                                                                        • memory/1400-103-0x0000000000AD0000-0x0000000000B30000-memory.dmp

                                                                          Filesize

                                                                          384KB

                                                                        • memory/1400-207-0x0000000140000000-0x000000014014F000-memory.dmp

                                                                          Filesize

                                                                          1.3MB

                                                                        • memory/1400-95-0x0000000140000000-0x000000014014F000-memory.dmp

                                                                          Filesize

                                                                          1.3MB

                                                                        • memory/1404-697-0x0000000000400000-0x0000000000549000-memory.dmp

                                                                          Filesize

                                                                          1.3MB

                                                                        • memory/1452-320-0x0000000000400000-0x0000000000549000-memory.dmp

                                                                          Filesize

                                                                          1.3MB

                                                                        • memory/1452-360-0x0000000000400000-0x0000000000549000-memory.dmp

                                                                          Filesize

                                                                          1.3MB

                                                                        • memory/1492-22-0x00000000008D0000-0x0000000000930000-memory.dmp

                                                                          Filesize

                                                                          384KB

                                                                        • memory/1492-123-0x0000000100000000-0x0000000100145000-memory.dmp

                                                                          Filesize

                                                                          1.3MB

                                                                        • memory/1492-15-0x00000000008D0000-0x0000000000930000-memory.dmp

                                                                          Filesize

                                                                          384KB

                                                                        • memory/1492-14-0x0000000100000000-0x0000000100145000-memory.dmp

                                                                          Filesize

                                                                          1.3MB

                                                                        • memory/1492-21-0x00000000008D0000-0x0000000000930000-memory.dmp

                                                                          Filesize

                                                                          384KB

                                                                        • memory/1504-337-0x0000000000550000-0x00000000006A3000-memory.dmp

                                                                          Filesize

                                                                          1.3MB

                                                                        • memory/1504-325-0x0000000100000000-0x0000000100153000-memory.dmp

                                                                          Filesize

                                                                          1.3MB

                                                                        • memory/1504-208-0x0000000000550000-0x00000000006A3000-memory.dmp

                                                                          Filesize

                                                                          1.3MB

                                                                        • memory/1504-205-0x0000000100000000-0x0000000100153000-memory.dmp

                                                                          Filesize

                                                                          1.3MB

                                                                        • memory/1648-376-0x0000000100000000-0x0000000100202000-memory.dmp

                                                                          Filesize

                                                                          2.0MB

                                                                        • memory/1648-632-0x0000000100000000-0x0000000100202000-memory.dmp

                                                                          Filesize

                                                                          2.0MB

                                                                        • memory/1672-726-0x0000000000400000-0x0000000000549000-memory.dmp

                                                                          Filesize

                                                                          1.3MB

                                                                        • memory/1672-744-0x0000000000400000-0x0000000000549000-memory.dmp

                                                                          Filesize

                                                                          1.3MB

                                                                        • memory/1716-808-0x0000000000400000-0x0000000000549000-memory.dmp

                                                                          Filesize

                                                                          1.3MB

                                                                        • memory/1716-816-0x0000000000400000-0x0000000000549000-memory.dmp

                                                                          Filesize

                                                                          1.3MB

                                                                        • memory/1736-388-0x0000000001000000-0x0000000001137000-memory.dmp

                                                                          Filesize

                                                                          1.2MB

                                                                        • memory/1736-257-0x0000000001000000-0x0000000001137000-memory.dmp

                                                                          Filesize

                                                                          1.2MB

                                                                        • memory/1832-684-0x0000000000400000-0x0000000000549000-memory.dmp

                                                                          Filesize

                                                                          1.3MB

                                                                        • memory/1888-235-0x0000000140000000-0x0000000140153000-memory.dmp

                                                                          Filesize

                                                                          1.3MB

                                                                        • memory/1888-889-0x0000000140000000-0x0000000140153000-memory.dmp

                                                                          Filesize

                                                                          1.3MB

                                                                        • memory/1888-125-0x0000000140000000-0x0000000140153000-memory.dmp

                                                                          Filesize

                                                                          1.3MB

                                                                        • memory/1892-269-0x0000000100000000-0x0000000100136000-memory.dmp

                                                                          Filesize

                                                                          1.2MB

                                                                        • memory/1892-401-0x0000000100000000-0x0000000100136000-memory.dmp

                                                                          Filesize

                                                                          1.2MB

                                                                        • memory/2060-356-0x0000000000400000-0x0000000000549000-memory.dmp

                                                                          Filesize

                                                                          1.3MB

                                                                        • memory/2060-364-0x0000000000400000-0x0000000000549000-memory.dmp

                                                                          Filesize

                                                                          1.3MB

                                                                        • memory/2100-527-0x0000000000400000-0x0000000000549000-memory.dmp

                                                                          Filesize

                                                                          1.3MB

                                                                        • memory/2124-850-0x0000000000400000-0x0000000000549000-memory.dmp

                                                                          Filesize

                                                                          1.3MB

                                                                        • memory/2208-595-0x0000000000400000-0x0000000000549000-memory.dmp

                                                                          Filesize

                                                                          1.3MB

                                                                        • memory/2208-789-0x0000000000400000-0x0000000000549000-memory.dmp

                                                                          Filesize

                                                                          1.3MB

                                                                        • memory/2216-564-0x0000000000400000-0x0000000000549000-memory.dmp

                                                                          Filesize

                                                                          1.3MB

                                                                        • memory/2216-552-0x0000000000400000-0x0000000000549000-memory.dmp

                                                                          Filesize

                                                                          1.3MB

                                                                        • memory/2240-71-0x0000000000400000-0x000000000054A000-memory.dmp

                                                                          Filesize

                                                                          1.3MB

                                                                        • memory/2240-11-0x0000000002820000-0x0000000002821000-memory.dmp

                                                                          Filesize

                                                                          4KB

                                                                        • memory/2240-0-0x0000000000400000-0x000000000054A000-memory.dmp

                                                                          Filesize

                                                                          1.3MB

                                                                        • memory/2240-8-0x0000000000230000-0x0000000000297000-memory.dmp

                                                                          Filesize

                                                                          412KB

                                                                        • memory/2240-2-0x0000000000230000-0x0000000000297000-memory.dmp

                                                                          Filesize

                                                                          412KB

                                                                        • memory/2288-253-0x0000000140000000-0x0000000140237000-memory.dmp

                                                                          Filesize

                                                                          2.2MB

                                                                        • memory/2288-146-0x0000000140000000-0x0000000140237000-memory.dmp

                                                                          Filesize

                                                                          2.2MB

                                                                        • memory/2404-319-0x0000000140000000-0x0000000140157000-memory.dmp

                                                                          Filesize

                                                                          1.3MB

                                                                        • memory/2404-194-0x0000000140000000-0x0000000140157000-memory.dmp

                                                                          Filesize

                                                                          1.3MB

                                                                        • memory/2452-291-0x0000000000400000-0x0000000000549000-memory.dmp

                                                                          Filesize

                                                                          1.3MB

                                                                        • memory/2476-657-0x0000000000400000-0x0000000000549000-memory.dmp

                                                                          Filesize

                                                                          1.3MB

                                                                        • memory/2488-78-0x0000000000550000-0x00000000005B7000-memory.dmp

                                                                          Filesize

                                                                          412KB

                                                                        • memory/2488-80-0x0000000000400000-0x0000000000549000-memory.dmp

                                                                          Filesize

                                                                          1.3MB

                                                                        • memory/2488-973-0x00000000021D0000-0x00000000021EE000-memory.dmp

                                                                          Filesize

                                                                          120KB

                                                                        • memory/2488-73-0x0000000000550000-0x00000000005B7000-memory.dmp

                                                                          Filesize

                                                                          412KB

                                                                        • memory/2488-972-0x00000000021D0000-0x00000000021DA000-memory.dmp

                                                                          Filesize

                                                                          40KB

                                                                        • memory/2488-204-0x0000000000400000-0x0000000000549000-memory.dmp

                                                                          Filesize

                                                                          1.3MB

                                                                        • memory/2492-681-0x0000000100000000-0x000000010020A000-memory.dmp

                                                                          Filesize

                                                                          2.0MB

                                                                        • memory/2492-402-0x0000000100000000-0x000000010020A000-memory.dmp

                                                                          Filesize

                                                                          2.0MB

                                                                        • memory/2544-91-0x0000000010000000-0x0000000010148000-memory.dmp

                                                                          Filesize

                                                                          1.3MB

                                                                        • memory/2544-54-0x0000000010000000-0x0000000010148000-memory.dmp

                                                                          Filesize

                                                                          1.3MB

                                                                        • memory/2544-61-0x0000000000350000-0x00000000003B0000-memory.dmp

                                                                          Filesize

                                                                          384KB

                                                                        • memory/2544-55-0x0000000000350000-0x00000000003B0000-memory.dmp

                                                                          Filesize

                                                                          384KB

                                                                        • memory/2564-365-0x0000000100000000-0x0000000100542000-memory.dmp

                                                                          Filesize

                                                                          5.3MB

                                                                        • memory/2564-244-0x0000000100000000-0x0000000100542000-memory.dmp

                                                                          Filesize

                                                                          5.3MB

                                                                        • memory/2568-423-0x0000000000400000-0x0000000000549000-memory.dmp

                                                                          Filesize

                                                                          1.3MB

                                                                        • memory/2568-496-0x0000000000400000-0x0000000000549000-memory.dmp

                                                                          Filesize

                                                                          1.3MB

                                                                        • memory/2732-366-0x0000000000400000-0x0000000000549000-memory.dmp

                                                                          Filesize

                                                                          1.3MB

                                                                        • memory/2732-424-0x0000000000400000-0x0000000000549000-memory.dmp

                                                                          Filesize

                                                                          1.3MB

                                                                        • memory/2760-521-0x0000000000400000-0x0000000000549000-memory.dmp

                                                                          Filesize

                                                                          1.3MB

                                                                        • memory/2760-540-0x0000000000400000-0x0000000000549000-memory.dmp

                                                                          Filesize

                                                                          1.3MB

                                                                        • memory/2804-288-0x0000000000400000-0x0000000000549000-memory.dmp

                                                                          Filesize

                                                                          1.3MB

                                                                        • memory/2804-323-0x0000000000400000-0x0000000000549000-memory.dmp

                                                                          Filesize

                                                                          1.3MB

                                                                        • memory/2896-355-0x000000002E000000-0x000000002E156000-memory.dmp

                                                                          Filesize

                                                                          1.3MB

                                                                        • memory/2896-225-0x000000002E000000-0x000000002E156000-memory.dmp

                                                                          Filesize

                                                                          1.3MB

                                                                        • memory/2972-427-0x0000000100000000-0x0000000100137000-memory.dmp

                                                                          Filesize

                                                                          1.2MB

                                                                        • memory/2972-301-0x0000000100000000-0x0000000100137000-memory.dmp

                                                                          Filesize

                                                                          1.2MB

                                                                        • memory/2992-28-0x0000000140000000-0x000000014013E000-memory.dmp

                                                                          Filesize

                                                                          1.2MB

                                                                        • memory/2992-35-0x00000000007F0000-0x0000000000850000-memory.dmp

                                                                          Filesize

                                                                          384KB

                                                                        • memory/2992-29-0x00000000007F0000-0x0000000000850000-memory.dmp

                                                                          Filesize

                                                                          384KB

                                                                        • memory/2992-150-0x0000000140000000-0x000000014013E000-memory.dmp

                                                                          Filesize

                                                                          1.2MB

                                                                        • memory/3020-766-0x0000000000400000-0x0000000000549000-memory.dmp

                                                                          Filesize

                                                                          1.3MB

                                                                        • memory/3024-40-0x0000000000270000-0x00000000002D7000-memory.dmp

                                                                          Filesize

                                                                          412KB

                                                                        • memory/3024-39-0x0000000010000000-0x0000000010140000-memory.dmp

                                                                          Filesize

                                                                          1.2MB

                                                                        • memory/3024-47-0x0000000000270000-0x00000000002D7000-memory.dmp

                                                                          Filesize

                                                                          412KB

                                                                        • memory/3024-88-0x0000000010000000-0x0000000010140000-memory.dmp

                                                                          Filesize

                                                                          1.2MB

                                                                        • memory/3032-637-0x0000000000400000-0x0000000000549000-memory.dmp

                                                                          Filesize

                                                                          1.3MB

                                                                        • memory/3036-833-0x0000000000400000-0x0000000000549000-memory.dmp

                                                                          Filesize

                                                                          1.3MB

                                                                        • memory/3040-338-0x0000000100000000-0x0000000100219000-memory.dmp

                                                                          Filesize

                                                                          2.1MB

                                                                        • memory/3040-551-0x0000000100000000-0x0000000100219000-memory.dmp

                                                                          Filesize

                                                                          2.1MB