Analysis

  • max time kernel
    114s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    17/08/2024, 13:51

General

  • Target

    83d71bb2969e713ce6c7f87b23dd97a0N.exe

  • Size

    648KB

  • MD5

    83d71bb2969e713ce6c7f87b23dd97a0

  • SHA1

    4959c38b39853f496efdc5fdf3a83077cc37d349

  • SHA256

    a31625b633c6bf80b6f9040a6278bd237706968e3f977907ef77f3d168e9b2f9

  • SHA512

    8ee2947093522e05b5cb67e77127c7b18e58f3142d1a1da9979537490a04e44c2c57644ba74b3f4fd6f03147b9b291e9c8ce23241c4a91222c5b58cb1097fee8

  • SSDEEP

    12288:8qz2DWUdCFCrNDFKYmKIiirRGW2phzrvXuayM1J3AAlrAf0d83QC0OXxcpGHMki:lz2DWn8NDFKYmKOF0zr31JwAlcR3QC0q

Malware Config

Signatures

  • Executes dropped EXE 64 IoCs
  • Loads dropped DLL 46 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in System32 directory 23 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of SetWindowsHookEx 21 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\83d71bb2969e713ce6c7f87b23dd97a0N.exe
    "C:\Users\Admin\AppData\Local\Temp\83d71bb2969e713ce6c7f87b23dd97a0N.exe"
    1⤵
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:2432
  • C:\Windows\System32\alg.exe
    C:\Windows\System32\alg.exe
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:2852
  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe
    C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2420
  • C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe
    C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe
    1⤵
    • Executes dropped EXE
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    PID:2656
  • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe
    C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe
    1⤵
    • Executes dropped EXE
    • Drops file in Windows directory
    PID:976
  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
    C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
    1⤵
    • Executes dropped EXE
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1636
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1ec -InterruptEvent 1d8 -NGENProcess 1dc -Pipe 1e8 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1528
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1e4 -InterruptEvent 250 -NGENProcess 258 -Pipe 25c -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:836
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 250 -InterruptEvent 24c -NGENProcess 1f4 -Pipe 248 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2320
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 260 -InterruptEvent 24c -NGENProcess 250 -Pipe 244 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2408
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 24c -InterruptEvent 240 -NGENProcess 1f4 -Pipe 1ec -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2976
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 240 -InterruptEvent 268 -NGENProcess 1e4 -Pipe 1dc -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2696
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 26c -InterruptEvent 268 -NGENProcess 240 -Pipe 250 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:560
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 268 -InterruptEvent 264 -NGENProcess 1e4 -Pipe 1d8 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1692
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 264 -InterruptEvent 274 -NGENProcess 24c -Pipe 258 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2296
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 274 -InterruptEvent 278 -NGENProcess 268 -Pipe 26c -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:836
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 278 -InterruptEvent 270 -NGENProcess 24c -Pipe 260 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1768
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 280 -InterruptEvent 270 -NGENProcess 278 -Pipe 264 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2732
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 270 -InterruptEvent 1f4 -NGENProcess 24c -Pipe 27c -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2116
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 288 -InterruptEvent 1f4 -NGENProcess 270 -Pipe 274 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1500
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1e4 -InterruptEvent 1f4 -NGENProcess 288 -Pipe 24c -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2976
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1f4 -InterruptEvent 284 -NGENProcess 270 -Pipe 268 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:472
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 294 -InterruptEvent 284 -NGENProcess 1f4 -Pipe 240 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:524
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 284 -InterruptEvent 278 -NGENProcess 270 -Pipe 290 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2108
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 278 -InterruptEvent 28c -NGENProcess 1e4 -Pipe 2a0 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1628
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 28c -InterruptEvent 280 -NGENProcess 29c -Pipe 298 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2860
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 280 -InterruptEvent 2a4 -NGENProcess 270 -Pipe 288 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2196
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2a4 -InterruptEvent 2a8 -NGENProcess 1e4 -Pipe 294 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2820
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2a8 -InterruptEvent 2ac -NGENProcess 29c -Pipe 284 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2264
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 288 -InterruptEvent 21c -NGENProcess 298 -Pipe 1f0 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2192
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 21c -InterruptEvent 250 -NGENProcess 290 -Pipe 1d8 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1524
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 250 -InterruptEvent 290 -NGENProcess 294 -Pipe 1ec -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1476
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 290 -InterruptEvent 258 -NGENProcess 1dc -Pipe 264 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1076
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 258 -InterruptEvent 244 -NGENProcess 21c -Pipe 26c -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      PID:1072
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 244 -InterruptEvent 1dc -NGENProcess 21c -Pipe 250 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1800
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1dc -InterruptEvent 220 -NGENProcess 248 -Pipe 25c -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      PID:2964
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 220 -InterruptEvent 248 -NGENProcess 244 -Pipe 260 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2236
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 248 -InterruptEvent 1d4 -NGENProcess 21c -Pipe 294 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      PID:1444
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1d4 -InterruptEvent 21c -NGENProcess 220 -Pipe 1c8 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2872
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 21c -InterruptEvent 270 -NGENProcess 244 -Pipe 1dc -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      PID:1076
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 270 -InterruptEvent 244 -NGENProcess 1d4 -Pipe 2b0 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2904
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 244 -InterruptEvent 278 -NGENProcess 220 -Pipe 248 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      PID:1652
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 278 -InterruptEvent 220 -NGENProcess 270 -Pipe 2a8 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1248
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 220 -InterruptEvent 29c -NGENProcess 1d4 -Pipe 21c -Comment "NGen Worker Process"
      2⤵
      • Loads dropped DLL
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      PID:2296
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 29c -InterruptEvent 1d4 -NGENProcess 278 -Pipe 2ac -Comment "NGen Worker Process"
      2⤵
      • System Location Discovery: System Language Discovery
      PID:1832
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1d4 -InterruptEvent 280 -NGENProcess 270 -Pipe 244 -Comment "NGen Worker Process"
      2⤵
      • Loads dropped DLL
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      PID:2304
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 280 -InterruptEvent 270 -NGENProcess 29c -Pipe 1e4 -Comment "NGen Worker Process"
      2⤵
      • System Location Discovery: System Language Discovery
      PID:776
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 270 -InterruptEvent 28c -NGENProcess 278 -Pipe 220 -Comment "NGen Worker Process"
      2⤵
      • Loads dropped DLL
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      PID:2460
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 28c -InterruptEvent 278 -NGENProcess 280 -Pipe 1f4 -Comment "NGen Worker Process"
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2524
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 278 -InterruptEvent 2b8 -NGENProcess 29c -Pipe 1d4 -Comment "NGen Worker Process"
      2⤵
      • Loads dropped DLL
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      PID:1616
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2b8 -InterruptEvent 29c -NGENProcess 28c -Pipe 2b4 -Comment "NGen Worker Process"
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2620
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 29c -InterruptEvent 2c0 -NGENProcess 280 -Pipe 270 -Comment "NGen Worker Process"
      2⤵
      • Loads dropped DLL
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      PID:2320
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2c0 -InterruptEvent 280 -NGENProcess 2b8 -Pipe 2bc -Comment "NGen Worker Process"
      2⤵
      • System Location Discovery: System Language Discovery
      PID:1632
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 280 -InterruptEvent 2c8 -NGENProcess 28c -Pipe 278 -Comment "NGen Worker Process"
      2⤵
      • Loads dropped DLL
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      PID:2432
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2c8 -InterruptEvent 28c -NGENProcess 2c0 -Pipe 2c4 -Comment "NGen Worker Process"
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2184
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 28c -InterruptEvent 2d0 -NGENProcess 2b8 -Pipe 29c -Comment "NGen Worker Process"
      2⤵
      • Loads dropped DLL
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      PID:868
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2d0 -InterruptEvent 2b8 -NGENProcess 2c8 -Pipe 2cc -Comment "NGen Worker Process"
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2036
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2b8 -InterruptEvent 2d8 -NGENProcess 2c0 -Pipe 280 -Comment "NGen Worker Process"
      2⤵
      • Loads dropped DLL
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      PID:2544
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2d8 -InterruptEvent 2c0 -NGENProcess 2d0 -Pipe 2d4 -Comment "NGen Worker Process"
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2392
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2c0 -InterruptEvent 2e0 -NGENProcess 2c8 -Pipe 28c -Comment "NGen Worker Process"
      2⤵
      • Loads dropped DLL
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      PID:2148
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2e0 -InterruptEvent 2c8 -NGENProcess 2d8 -Pipe 2dc -Comment "NGen Worker Process"
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2444
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2c8 -InterruptEvent 2e8 -NGENProcess 2d0 -Pipe 2b8 -Comment "NGen Worker Process"
      2⤵
      • Loads dropped DLL
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      PID:2632
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2e8 -InterruptEvent 2d0 -NGENProcess 2e0 -Pipe 2e4 -Comment "NGen Worker Process"
      2⤵
      • System Location Discovery: System Language Discovery
      PID:1344
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2d0 -InterruptEvent 2f0 -NGENProcess 2d8 -Pipe 2c0 -Comment "NGen Worker Process"
      2⤵
      • Loads dropped DLL
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      PID:3048
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2f0 -InterruptEvent 2d8 -NGENProcess 2e8 -Pipe 2ec -Comment "NGen Worker Process"
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2444
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2d8 -InterruptEvent 2f8 -NGENProcess 2e0 -Pipe 2c8 -Comment "NGen Worker Process"
      2⤵
        PID:2672
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2f8 -InterruptEvent 2fc -NGENProcess 2f4 -Pipe 298 -Comment "NGen Worker Process"
        2⤵
          PID:2676
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
          C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2fc -InterruptEvent 300 -NGENProcess 288 -Pipe 2d0 -Comment "NGen Worker Process"
          2⤵
            PID:2460
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
            C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 300 -InterruptEvent 304 -NGENProcess 2e0 -Pipe 2e8 -Comment "NGen Worker Process"
            2⤵
              PID:1832
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
              C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 304 -InterruptEvent 2e0 -NGENProcess 2fc -Pipe 2f4 -Comment "NGen Worker Process"
              2⤵
                PID:1620
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2e0 -InterruptEvent 2fc -NGENProcess 2f0 -Pipe 288 -Comment "NGen Worker Process"
                2⤵
                  PID:2444
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                  C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2fc -InterruptEvent 310 -NGENProcess 308 -Pipe 2f8 -Comment "NGen Worker Process"
                  2⤵
                    PID:2080
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                    C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 310 -InterruptEvent 314 -NGENProcess 30c -Pipe 300 -Comment "NGen Worker Process"
                    2⤵
                      PID:772
                  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
                    C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
                    1⤵
                    • Executes dropped EXE
                    • Drops file in Windows directory
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2876
                    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
                      C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 1dc -InterruptEvent 1c8 -NGENProcess 1cc -Pipe 1d8 -Comment "NGen Worker Process"
                      2⤵
                      • Executes dropped EXE
                      PID:640
                    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
                      C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 1d4 -InterruptEvent 240 -NGENProcess 248 -Pipe 24c -Comment "NGen Worker Process"
                      2⤵
                      • Executes dropped EXE
                      PID:700
                  • C:\Windows\ehome\ehRecvr.exe
                    C:\Windows\ehome\ehRecvr.exe
                    1⤵
                    • Executes dropped EXE
                    • Modifies data under HKEY_USERS
                    PID:2592
                  • C:\Windows\ehome\ehsched.exe
                    C:\Windows\ehome\ehsched.exe
                    1⤵
                    • Executes dropped EXE
                    PID:2148
                  • C:\Windows\eHome\EhTray.exe
                    "C:\Windows\eHome\EhTray.exe" /nav:-2
                    1⤵
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of FindShellTrayWindow
                    • Suspicious use of SendNotifyMessage
                    PID:1828
                  • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                    "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                    1⤵
                    • Executes dropped EXE
                    PID:316
                  • C:\Windows\system32\IEEtwCollector.exe
                    C:\Windows\system32\IEEtwCollector.exe /V
                    1⤵
                    • Executes dropped EXE
                    PID:2524
                  • C:\Windows\ehome\ehRec.exe
                    C:\Windows\ehome\ehRec.exe -Embedding
                    1⤵
                    • Modifies data under HKEY_USERS
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2164
                  • C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE
                    "C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE" /auditservice
                    1⤵
                    • Executes dropped EXE
                    • Drops file in System32 directory
                    • System Location Discovery: System Language Discovery
                    • Modifies data under HKEY_USERS
                    PID:1716
                  • C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe
                    "C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"
                    1⤵
                    • Executes dropped EXE
                    PID:2532
                  • C:\Windows\System32\msdtc.exe
                    C:\Windows\System32\msdtc.exe
                    1⤵
                    • Executes dropped EXE
                    • Drops file in System32 directory
                    • Drops file in Windows directory
                    PID:1868
                  • C:\Windows\system32\msiexec.exe
                    C:\Windows\system32\msiexec.exe /V
                    1⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2356
                  • C:\Program Files (x86)\Common Files\Microsoft Shared\Source Engine\OSE.EXE
                    "C:\Program Files (x86)\Common Files\Microsoft Shared\Source Engine\OSE.EXE"
                    1⤵
                    • Executes dropped EXE
                    • System Location Discovery: System Language Discovery
                    PID:2888
                  • C:\Windows\SysWow64\perfhost.exe
                    C:\Windows\SysWow64\perfhost.exe
                    1⤵
                    • Executes dropped EXE
                    • System Location Discovery: System Language Discovery
                    PID:2908
                  • C:\Windows\system32\locator.exe
                    C:\Windows\system32\locator.exe
                    1⤵
                    • Executes dropped EXE
                    PID:2992
                  • C:\Windows\System32\snmptrap.exe
                    C:\Windows\System32\snmptrap.exe
                    1⤵
                    • Executes dropped EXE
                    PID:2664
                  • C:\Windows\System32\vds.exe
                    C:\Windows\System32\vds.exe
                    1⤵
                    • Executes dropped EXE
                    PID:2008
                  • C:\Windows\system32\vssvc.exe
                    C:\Windows\system32\vssvc.exe
                    1⤵
                    • Executes dropped EXE
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1592
                  • C:\Windows\system32\wbengine.exe
                    "C:\Windows\system32\wbengine.exe"
                    1⤵
                    • Executes dropped EXE
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2248
                  • C:\Windows\system32\wbem\WmiApSrv.exe
                    C:\Windows\system32\wbem\WmiApSrv.exe
                    1⤵
                    • Executes dropped EXE
                    PID:560
                  • C:\Program Files\Windows Media Player\wmpnetwk.exe
                    "C:\Program Files\Windows Media Player\wmpnetwk.exe"
                    1⤵
                    • Executes dropped EXE
                    • Modifies data under HKEY_USERS
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1496
                  • C:\Windows\system32\SearchIndexer.exe
                    C:\Windows\system32\SearchIndexer.exe /Embedding
                    1⤵
                    • Executes dropped EXE
                    • Modifies data under HKEY_USERS
                    • Suspicious use of AdjustPrivilegeToken
                    PID:524
                    • C:\Windows\system32\SearchProtocolHost.exe
                      "C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe_S-1-5-21-2212144002-1172735686-1556890956-10001_ Global\UsGthrCtrlFltPipeMssGthrPipe_S-1-5-21-2212144002-1172735686-1556890956-10001 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon" "1"
                      2⤵
                      • Suspicious use of SetWindowsHookEx
                      PID:2032
                    • C:\Windows\system32\SearchFilterHost.exe
                      "C:\Windows\system32\SearchFilterHost.exe" 0 592 596 604 65536 600
                      2⤵
                      • Modifies data under HKEY_USERS
                      PID:2300
                    • C:\Windows\system32\SearchProtocolHost.exe
                      "C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe2_ Global\UsGthrCtrlFltPipeMssGthrPipe2 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon"
                      2⤵
                      • Drops file in System32 directory
                      • Modifies data under HKEY_USERS
                      • Suspicious use of SetWindowsHookEx
                      PID:2012

                  Network

                  MITRE ATT&CK Enterprise v15

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Program Files (x86)\Common Files\microsoft shared\Source Engine\OSE.EXE

                    Filesize

                    706KB

                    MD5

                    5d19315fac2a45d03262f07f1ec6dd0b

                    SHA1

                    6029634937067949f72af9c5d8435f4185c936fd

                    SHA256

                    eafc01033f33ab2067e7817c50c183ce61df5184484752d4142dada1872972c2

                    SHA512

                    8be70f1c693abfd8f9df712a10af8b850e269f45e549dc62d060fedf6ca81c761ab73e6abb15c96d895ae274e8c257525716aa62dd86bf0fa0376361ec6c8640

                  • C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE

                    Filesize

                    30.1MB

                    MD5

                    dc8b4ddd37720f0d11672835b1d34862

                    SHA1

                    3928742c41f7604d22f6cd20c6679b2f52c2402d

                    SHA256

                    552759a84e5c6acbd18a8f6c7f986414267fce74a3c2fff4e6905a98eef65a92

                    SHA512

                    f9afa88a0872425c6dca3fb47778537ca80defd31ea3a39a458c9571f7d28d1006cd8af0cb6c7faee8efe9a3730ded5df81c13ae3b23f5c2ebabd161541d6587

                  • C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe

                    Filesize

                    781KB

                    MD5

                    5365321c82a25db82e387e38d31bd98c

                    SHA1

                    4f09957ba73e582db2ae2d54dc4624a178b14441

                    SHA256

                    5019d4a989cf8eb02538e4391e9a80c69499de02d2d91da701d9767f06264a39

                    SHA512

                    48d11dcc6e9ab16b2a20f019ff576a61c000ea12fc40f1a47fbb4825709dc2a7c1f3bc11082458582e2697337cc94c333bec677a402b5d7f4eb4e473525456f2

                  • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe

                    Filesize

                    2.1MB

                    MD5

                    4782a466a5536f99b46ed0b81ca7655e

                    SHA1

                    4a3bd4c02700a2bedd057fddef5f0fcbb18a825f

                    SHA256

                    b462d1cae8c3bb23094a233f4d025825b721beba17d8212397562e87ffc73d92

                    SHA512

                    7d386c4d4695fe7da6748a76c65600a218f92decc0761bc80e6801c872b005c758dd5c27f7d73c7e7d76f0c0353869e50dcc77a9ea5e4d2d614ed85ae84481f4

                  • C:\ProgramData\Microsoft\Search\Data\Applications\Windows\MSS.log

                    Filesize

                    1024KB

                    MD5

                    d10c27f59dfdc972c4de635687df4614

                    SHA1

                    3ebd0ac94d845bca26c36a05e3a70f75561fe3e4

                    SHA256

                    71636872ba48e12fbf90eec49168337910ef98ad0ee00cda106f2904c83f8f65

                    SHA512

                    4c649ed28619302cbad9f1a2455bd4f2970b05f59740d642c4691f073df9e195bd6fcbcda107ffe7ad7b095bcff68c1882744e86fb374c4224f804850010bf4c

                  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b91050d8b077a4e8.customDestinations-ms

                    Filesize

                    24B

                    MD5

                    b9bd716de6739e51c620f2086f9c31e4

                    SHA1

                    9733d94607a3cba277e567af584510edd9febf62

                    SHA256

                    7116ff028244a01f3d17f1d3bc2e1506bc9999c2e40e388458f0cccc4e117312

                    SHA512

                    cef609e54c7a81a646ad38dba7ac0b82401b220773b9c792cefac80c6564753229f0c011b34ffb56381dd3154a19aee2bf5f602c4d1af01f2cf0fbc1574e4478

                  • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ngen_service.log

                    Filesize

                    872KB

                    MD5

                    0ab2f1a5b3a62f128570b15ec515b9b4

                    SHA1

                    8cdb94387106a35f4b25f41293a0e64903841cd5

                    SHA256

                    b05a34e446e61728019942c9a93d24118efbe62aad3b193a6529494eb732e216

                    SHA512

                    0eabc31d3871531b48fa4b685f2d0694ae2d314a58b9eb1a3dfb6edb01326afcf766d0875cf1b804184f41f102309fb4dc0e03c1e7c7aa5876d19eb906f97ec9

                  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe

                    Filesize

                    603KB

                    MD5

                    19f0c4967fdd4c8f965789ce937706ff

                    SHA1

                    b21eceef826b5b51c61e8581e35c842ed339034b

                    SHA256

                    c94ff4e232f7c0abc5705feb04c7fb6622e9787aaa487288a4a652d6b9f11209

                    SHA512

                    5946351bd5ca04160595055cb0d7639e9f34aec39f000c3a2993ca44d14fdc361e945c17737dbe3ceffaaaa856b0bf9d8af04e27fa46d171ab16eb77821823f6

                  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe

                    Filesize

                    678KB

                    MD5

                    6729c0703d957e104403c44673e39648

                    SHA1

                    3a9227d6482c9aec515bcf2a9b16a0e431d3954a

                    SHA256

                    5b0424b95dd11bfbd9e540e7016183ebb536c903580035c8354121ed2a9e7f9f

                    SHA512

                    d4fee13153720334d8d6f179a90b9792b274b0944361b55f72a11706c51699fab0efd4559548f06491ecc0e1ec977de196e3045e996f9859ed70ffde83266932

                  • C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe

                    Filesize

                    625KB

                    MD5

                    39edd9c4ea03c722ef57ae8bd23ea30d

                    SHA1

                    109bff5acadabf46cd39cdbd8e024f1d0d4a4860

                    SHA256

                    dc4400f162ebac1b1f2a2aebae01310a08060d277811b9b7870244c635f861d5

                    SHA512

                    5ba6366dd04c9e41db272200b0fe5872da1df6acb10e8bd24a87b0aa263698e1974939a405d4af0a88ddf18d20082adc2ff74f185c227d23b2b53acbcc0be484

                  • C:\Windows\Microsoft.NET\Framework\v2.0.50727\ngen_service.log

                    Filesize

                    1003KB

                    MD5

                    5ed37aa8f6838010d423c63c23e16f84

                    SHA1

                    6eafcb9de1380da2d38dd216eee14ecfba877cf6

                    SHA256

                    d76fedb825bb661c2a4ad6a45fea802e3827d964a345bc5ee0455c1aae5117bc

                    SHA512

                    9d085e585aca52b100b64034ca94dd9c37ef00dd76701cc1c0b04f8188d9f50323db6dca0f8827ce071fcaec87220f557992f7269a2bbeab1c65f13905909660

                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe

                    Filesize

                    656KB

                    MD5

                    e449b28213435a970b886215136fc7b4

                    SHA1

                    54dca8753aad159ef99e64995c8373772bac9996

                    SHA256

                    726399e71f1799ecf05329a19b2e2dc48f5aabe55155aa4a486c74dcda1e457c

                    SHA512

                    058e9e0fc4e1a0fd33be9ab400c2e9fbdea3bb252ce50083dec678a96ba3cf0f81ddea564968be3f9069271c8cbbc9fde69eabd9648418c90eedf8904bfd1dbe

                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen_service.log

                    Filesize

                    8KB

                    MD5

                    75b5c66294bb914c666e401acae97cfe

                    SHA1

                    b5054d6537ee29340842e3242f7d9121bad2c12e

                    SHA256

                    99786e00ad18857491bbc266b76f3e1dac4c4483ca7cb70028c67373cf8466fe

                    SHA512

                    b184037f0f80566846d25e24389939c6d203e3dc58b207deac8b8b1b710375bf83b66b7aaf7b319f71efc000bb72d3cb25b4043277ccd9e3b1d1e84b5a662316

                  • C:\Windows\SysWOW64\perfhost.exe

                    Filesize

                    587KB

                    MD5

                    0b1b88de101e1ba68ce912573b25bdad

                    SHA1

                    ed1ff61e3602d64858b64ee84b17db796bad953a

                    SHA256

                    4c79bc7bb9ae8b7e468615e5f81755e1736ae91ce9a9941d272d1f97409927b9

                    SHA512

                    40f57b02905f4a1f101921eb9024035a40e1e511ce74f1c6e897d7ab817178f84b3043cc63d695d31f05f79af18212195e0cebe3b1f73083f3967f574ebd5a96

                  • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.Office.To#\e1f8e4d08d4b7f811b7dbbacd324027b\Microsoft.Office.Tools.v9.0.ni.dll

                    Filesize

                    148KB

                    MD5

                    ac901cf97363425059a50d1398e3454b

                    SHA1

                    2f8bd4ac2237a7b7606cb77a3d3c58051793c5c7

                    SHA256

                    f6c7aecb211d9aac911bf80c91e84a47a72ac52cbb523e34e9da6482c0b24c58

                    SHA512

                    6a340b6d5fa8e214f2a58d8b691c749336df087fa75bcc8d8c46f708e4b4ff3d68a61a17d13ee62322b75cbc61d39f5a572588772f3c5d6e5ff32036e5bc5a00

                  • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\03cad6bd8b37d21b28dcb4f955be2158\Microsoft.VisualStudio.Tools.Applications.Contract.v9.0.ni.dll

                    Filesize

                    34KB

                    MD5

                    c26b034a8d6ab845b41ed6e8a8d6001d

                    SHA1

                    3a55774cf22d3244d30f9eb5e26c0a6792a3e493

                    SHA256

                    620b41f5e02df56c33919218bedc238ca7e76552c43da4f0f39a106835a4edc3

                    SHA512

                    483424665c3bc79aeb1de6dfdd633c8526331c7b271b1ea6fe93ab298089e2aceefe7f9c7d0c6e33e604ca7b2ed62e7bb586147fecdf9a0eea60e8c03816f537

                  • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\0bcf1b3e3a562fb0f829229904d2b018\Microsoft.VisualStudio.Tools.Office.HostAdapter.v10.0.ni.dll

                    Filesize

                    143KB

                    MD5

                    9a30b1f409046ffee34a7f31a84395ae

                    SHA1

                    75ec7a753d6859af1fb2a1a154c073d0a9e2d2a1

                    SHA256

                    d55aa6f2117c39fffd641172a82db8add379ec581f3cd106b7f12c2969fda328

                    SHA512

                    a82c30867eb74ea6c9bcfa5b6b6bd7dfc829f0b48328eb7c4593d483f69e2991b0e63decc32c963c04c759ecfffad9a69449a80b7155f64780e5b15775ea8c74

                  • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\0cb958acb9cd4cacb46ebc0396e30aa3\Microsoft.VisualStudio.Tools.Office.Contract.v9.0.ni.dll

                    Filesize

                    109KB

                    MD5

                    0fd0f978e977a4122b64ae8f8541de54

                    SHA1

                    153d3390416fdeba1b150816cbbf968e355dc64f

                    SHA256

                    211d2b83bb82042385757f811d90c5ae0a281f3abb3bf1c7901e8559db479e60

                    SHA512

                    ceddfc031bfe4fcf5093d0bbc5697b5fb0cd69b03bc32612325a82ea273dae5daff7e670b0d45816a33307b8b042d27669f5d5391cb2bdcf3e5a0c847c6dcaa8

                  • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\0cfb0cb42111c77e1f3c8a10fbaa37fe\Microsoft.VisualStudio.Tools.Office.Word.HostAdapter.v10.0.ni.dll

                    Filesize

                    187KB

                    MD5

                    d18d69a7b6b8d9b21101c9b649d61dd8

                    SHA1

                    1e96d6c07fa40a8dbb15e075722d58855343566d

                    SHA256

                    4b2b0b35306e0ba3b3db0eb5872f7150403c9ab74fa50dfe476aeb2e8a642b1f

                    SHA512

                    ba8c0eadab940ad0a27368c2a0f8d1f6652e40fc666b131699d05b0812fe3c7c74c9ad46845e5ae79139196c9516f91e60581c25c4bc70f5da360af0dbb233ff

                  • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\367516b7878af19f5c84c67f2cd277ae\Microsoft.VisualStudio.Tools.Office.Word.AddInAdapter.v9.0.ni.dll

                    Filesize

                    41KB

                    MD5

                    3c269caf88ccaf71660d8dc6c56f4873

                    SHA1

                    f9481bf17e10fe1914644e1b590b82a0ecc2c5c4

                    SHA256

                    de21619e70f9ef8ccbb274bcd0d9d2ace1bae0442dfefab45976671587cf0a48

                    SHA512

                    bd5be3721bf5bd4001127e0381a0589033cb17aa35852f8f073ba9684af7d8c5a0f3ee29987b345fc15fdf28c5b56686087001ef41221a2cfb16498cf4c016c6

                  • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\8c6bac317f75b51647ea3a8da141b143\Microsoft.VisualStudio.Tools.Office.AddInAdapter.v9.0.ni.dll

                    Filesize

                    210KB

                    MD5

                    4f40997b51420653706cb0958086cd2d

                    SHA1

                    0069b956d17ce7d782a0e054995317f2f621b502

                    SHA256

                    8cd6a0b061b43e0b660b81859c910290a3672b00d7647ba0e86eda6ddcc8c553

                    SHA512

                    e18953d7a348859855e5f6e279bc9924fc3707b57a733ce9b8f7d21bd631d419f1ebfb29202608192eb346569ca9a55264f5b4c2aedd474c22060734a68a4ee6

                  • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\9306fc630870a75ddd23441ad77bdc57\Microsoft.VisualStudio.Tools.Applications.Runtime.v10.0.ni.dll

                    Filesize

                    53KB

                    MD5

                    e3a7a2b65afd8ab8b154fdc7897595c3

                    SHA1

                    b21eefd6e23231470b5cf0bd0d7363879a2ed228

                    SHA256

                    e5faf5e8adf46a8246e6b5038409dadca46985a9951343a1936237d2c8d7a845

                    SHA512

                    6537c7ed398deb23be1256445297cb7c8d7801bf6e163d918d8e258213708b28f7255ecff9fbd3431d8f5e5a746aa95a29d3a777b28fcd688777aed6d8205a33

                  • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\a1505f5eec2c41756ae686aa440d2a93\Microsoft.VisualStudio.Tools.Office.Outlook.HostAdapter.v10.0.ni.dll

                    Filesize

                    83KB

                    MD5

                    aa90d593d09f851b20b25e20f4d940d4

                    SHA1

                    5d8532ee25c2cf07b552fe96cc6bcdf1a93b3dba

                    SHA256

                    fe317b1ee64e1036e14a4ca205cc106a0a3f49c6d2d4e28d9f4ddc6210a79740

                    SHA512

                    f8c1d25bfd73f7b4b167b2847e0bc64d6fa4c777b9795db7e81019ad01a8b72e12f434eb8c34b009185265cfb274ac9fc53050134daa21715122012cf4bd91f5

                  • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\afa5bb1a39443d7dc81dfff54073929b\Microsoft.VisualStudio.Tools.Office.Contract.v10.0.ni.dll

                    Filesize

                    28KB

                    MD5

                    aefc3f3c8e7499bad4d05284e8abd16c

                    SHA1

                    7ab718bde7fdb2d878d8725dc843cfeba44a71f7

                    SHA256

                    4436550409cfb3d06b15dd0c3131e87e7002b0749c7c6e9dc3378c99dbec815d

                    SHA512

                    1d7dbc9764855a9a1f945c1bc8e86406c0625f1381d71b3ea6924322fbe419d1c70c3f3efd57ee2cb2097bb9385e0bf54965ab789328a80eb4946849648fe20b

                  • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\e0220058091b941725ef02be0b84abe7\Microsoft.VisualStudio.Tools.Applications.HostAdapter.v10.0.ni.dll

                    Filesize

                    57KB

                    MD5

                    6eaaa1f987d6e1d81badf8665c55a341

                    SHA1

                    e52db4ad92903ca03a5a54fdb66e2e6fad59efd5

                    SHA256

                    4b78ffa5f0b6751aea11917db5961d566e2f59beaa054b41473d331fd392329e

                    SHA512

                    dbedfa6c569670c22d34d923e22b7dae7332b932b809082dad87a1f0bb125c912db37964b5881667867ccf23dc5e5be596aad85485746f8151ce1c51ffd097b2

                  • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\ee73646032cbb022d16771203727e3b2\Microsoft.VisualStudio.Tools.Applications.Runtime.v9.0.ni.dll

                    Filesize

                    130KB

                    MD5

                    2735d2ab103beb0f7c1fbd6971838274

                    SHA1

                    6063646bc072546798bf8bf347425834f2bfad71

                    SHA256

                    f00156860ec7e88f4ccb459ca29b7e0e5c169cdc8a081cb043603187d25d92b3

                    SHA512

                    fe2ce60c7f61760a29344e254771d48995e983e158da0725818f37441f9690bda46545bf10c84b163f6afb163ffb504913d6ffddf84f72b062c7f233aed896de

                  • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\f1a7ac664667f2d6bcd6c388b230c22b\Microsoft.VisualStudio.Tools.Applications.AddInAdapter.v9.0.ni.dll

                    Filesize

                    59KB

                    MD5

                    8c69bbdfbc8cc3fa3fa5edcd79901e94

                    SHA1

                    b8028f0f557692221d5c0160ec6ce414b2bdf19b

                    SHA256

                    a21471690e7c32c80049e17c13624820e77bca6c9c38b83d9ea8a7248086660d

                    SHA512

                    825f5b87b76303b62fc16a96b108fb1774c2aca52ac5e44cd0ac2fe2ee47d5d67947dfe7498e36bc849773f608ec5824711f8c36e375a378582eefb57c9c2557

                  • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\fc36797f7054935a6033077612905a0f\Microsoft.VisualStudio.Tools.Office.Excel.AddInAdapter.v9.0.ni.dll

                    Filesize

                    42KB

                    MD5

                    71d4273e5b77cf01239a5d4f29e064fc

                    SHA1

                    e8876dea4e4c4c099e27234742016be3c80d8b62

                    SHA256

                    f019899f829731f899a99885fd52fde1fe4a4f6fe3ecf7f7a7cfa78517c00575

                    SHA512

                    41fe67cda988c53bd087df6296d1a242cddac688718ea5a5884a72b43e9638538e64d7a59e045c0b4d490496d884cf0ec694ddf7fcb41ae3b8cbc65b7686b180

                  • C:\Windows\assembly\NativeImages_v2.0.50727_32\Temp\ZAP8EB8.tmp\Microsoft.VisualStudio.Tools.Applications.Contract.v10.0.dll

                    Filesize

                    27KB

                    MD5

                    9c60454398ce4bce7a52cbda4a45d364

                    SHA1

                    da1e5de264a6f6051b332f8f32fa876d297bf620

                    SHA256

                    edc90887d38c87282f49adbb12a94040f9ac86058bfae15063aaaff2672b54e1

                    SHA512

                    533b7e9c55102b248f4a7560955734b4156eb4c02539c6f978aeacecff1ff182ba0f04a07d32ed90707a62d73191b0e2d2649f38ae1c3e7a5a4c0fbea9a94300

                  • C:\Windows\assembly\NativeImages_v2.0.50727_32\Temp\ZAP9A7B.tmp\Microsoft.VisualStudio.Tools.Office.Excel.HostAdapter.v10.0.dll

                    Filesize

                    180KB

                    MD5

                    f7ee7ccfb5bfd3a7b94162a8c784b888

                    SHA1

                    c5aa9ee6f5974a75085fa8b2f8a9b727523c1481

                    SHA256

                    c358e7834edbbb5138d90a7cddab089d95bc97063145a16a11cdf8e624ff44a2

                    SHA512

                    ec97aa95ccfe9ef60cd4ff6eb35e78290d857f802daffbf73abafb4e8362d912e5762c4a262712ab05b43ee7e03b6bad85accb3ad591f60c2713618a5e981894

                  • C:\Windows\assembly\NativeImages_v2.0.50727_32\ehiVidCtl\88e20c69254157d91b96eadc9444815d\ehiVidCtl.ni.dll

                    Filesize

                    855KB

                    MD5

                    7812b0a90d92b4812d4063b89a970c58

                    SHA1

                    3c4a789b8d28a5bfa6a6191624e33b8f40e4c4ea

                    SHA256

                    897626e6af00e85e627eeaa7f9563b245335242bc6196b36d0072e5b6d45e543

                    SHA512

                    634a2395bada9227b1957f2b76ed7e19f12bfc4d71a145d182602a1b6e24d83e220ebfabd602b1995c360e1725a38a89ff58417b0295bb0da9ea35c41c21a6ed

                  • C:\Windows\assembly\NativeImages_v2.0.50727_32\stdole\2c6d60b55bbab22515c512080d4b3bae\stdole.ni.dll

                    Filesize

                    43KB

                    MD5

                    3e72bdd0663c5b2bcd530f74139c83e3

                    SHA1

                    66069bcac0207512b9e07320f4fa5934650677d2

                    SHA256

                    6a6ac3094130d1affd34aae5ba2bd8c889e2071eb4217a75d72b5560f884e357

                    SHA512

                    b0a98db477fccae71b4ebfb8525ed52c10f1e7542f955b307f260e27e0758aa22896683302e34b0237e7e3bba9f5193ddcc7ff255c71fbaa1386988b0ec7d626

                  • C:\Windows\system32\fxssvc.exe

                    Filesize

                    1.2MB

                    MD5

                    35e70c66dd150d39b946cd6d844d33ed

                    SHA1

                    3dacdfce2f7fcf0ad72c49fffdda3a5d160cc71c

                    SHA256

                    85ff0ce47d4a0646df0a0a0b28a6bea90bb0870ba846418b0b6fdeb7ccd75d40

                    SHA512

                    5ef181c9f9aefea3445aba56f34358bd4464fcfe2a3d4df90469fb0e79303d234ae13fcb18f7088b4a9e9c0b1d69c49aab966419db729d36ffd82f7f10eec3dc

                  • \Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe

                    Filesize

                    648KB

                    MD5

                    ff38f3e9900fddaef58dfcca400af695

                    SHA1

                    e92554af2d68b8064b62123e3cd2d94c31e89a56

                    SHA256

                    ae41d9a81c739f8c6c5e1a2aea2cf617c178a8719a589fd65da560ad639c2556

                    SHA512

                    09b9140261584be3b403734d9218b4b044843a3a49bec325c71f3160205790d101f2f60b85334441e7bed50af63ba4cd04a08819ed9719e8aae08f89344f4411

                  • \Windows\System32\Locator.exe

                    Filesize

                    577KB

                    MD5

                    3e3fa01491ce378fc471174763ef0833

                    SHA1

                    aac3808ed81c9a4f50e368510b9756ba8712539c

                    SHA256

                    2ee0dc64b53eb1d2e4d3faf88c7aca50cccb8d553bfe36270e06ae7dc46e1ef8

                    SHA512

                    af98b143472d3579cd0be5761e5671e9a160283dc8d0f05c6d0d752946bdceb3f626d6f2cde6931d0d06d92d55db69a0f954f5105b3298f9e86293a062d30ba1

                  • \Windows\System32\alg.exe

                    Filesize

                    644KB

                    MD5

                    9a71dbf0ea9aba82af33b11b022b83af

                    SHA1

                    a31e7794e1de512ba837db34067c8d641f1abd59

                    SHA256

                    1a954e6c9170c5790ed115cf3b18b6e32a5d509fb21efdb19c22505f97843f17

                    SHA512

                    aac515f1cabb0fd3967cfc9dc5fa417a02019956238e26b12408364e2e6c69c8c8d3aaa825f885fc04fb3d9e10d2c48d459c75213efb2abbea98258a082ab24d

                  • \Windows\System32\ieetwcollector.exe

                    Filesize

                    674KB

                    MD5

                    1e520dda312995a0c78c4234fb8300d1

                    SHA1

                    14cd61145b2e8cb31573cbeb6a6829a51faf3087

                    SHA256

                    98538ba377d1d0172012c607b96b5c44c289fc73742fbfb2b9ec8cb1e3de241a

                    SHA512

                    b65391d9d88bc70dfff558ecd49cc94752d175d52bacb6c0e0b3710c4648b121f5b8f667edc81a6fc2b4edfd3cd41744b187257f51839318c723473b78ca764f

                  • \Windows\System32\msdtc.exe

                    Filesize

                    705KB

                    MD5

                    df410e1255a2973c51fb221e352d6fb4

                    SHA1

                    8caa8f0623b12eef53b40f31ef7e7b5e97804dcd

                    SHA256

                    3b1e256eae7867e984f34520bd34ef0bc26829bf1df6ac3a658115df2b26b583

                    SHA512

                    8abce6d6cd395b1824be97d7b3bf7a02594826aa87d5db6a178e44746fa40fef22c75b0b896f0da99b54580c1a64c8e6495c20fd948d33d197103925ef2b0ace

                  • \Windows\System32\msiexec.exe

                    Filesize

                    691KB

                    MD5

                    ee56ea8dd2f86c2e36ac3b445ce417b2

                    SHA1

                    2b4020ce312a1ea7f17884e0b95d834aac4ef103

                    SHA256

                    628e72f70e0b91f335fad9a4108568251b1e9b72bc7cae1c9d5865eccf76e565

                    SHA512

                    8b06775f07decf521167c20aee96db6b3b983fd60b0658138187b2a66890a1352f5e168f8fe4fe1b19ab7503f6fb607787d3db71570c37628f1a31985375bd52

                  • \Windows\System32\snmptrap.exe

                    Filesize

                    581KB

                    MD5

                    e84e7feab766cbc70c894851d44946b4

                    SHA1

                    d5b962fa6995cfa76287d952b24b42b38f6b0ba6

                    SHA256

                    e79472da7bc2f55d4a174ff82ad266c0a0b1d6dd5a7dcf694381847fb7ead0ef

                    SHA512

                    8b2b85d07c8dda58092aea9b79bbe9b2c5385cdc54799f189fc301eedf84e7b5070d85a6e0edca97867a2d62b815552b6845aa036162d4590ab5c8fb66990568

                  • \Windows\ehome\ehrecvr.exe

                    Filesize

                    1.2MB

                    MD5

                    b9929f3f1331218e59d6f1f37c91291a

                    SHA1

                    fedc98cc870170959280dc39dd0e0d687f6183be

                    SHA256

                    fe9a983c00a4d3605c72c5ab80877dc125f050568fb2ab5d7e057a6bb12fd75f

                    SHA512

                    b431346c26bb92813dac40b6fe0579253be62f9d80b88658b5b2069f31b6463872806f00512ab235aabc670578f3565e4c0f858de9689518b9250850056a04b4

                  • \Windows\ehome\ehsched.exe

                    Filesize

                    691KB

                    MD5

                    f4eb1bfd9f1b432dbe7d01b4d2374a00

                    SHA1

                    13fecf8eda18e31aa8d2f22d8c81b42ba1c3c9f8

                    SHA256

                    1c3b5c3a2e1f96ff8b1afb7d38640ea46e1f102727e855f6cfe4abb56d1594f2

                    SHA512

                    b06f6e7736809ac6040143f815dfbe130c0106a074001243700ebf559b1fa17ea3ce243c9449ce981164cf8271219dd8e0c28843a79bc9141ca8be8c2c83a41d

                  • memory/316-147-0x0000000140000000-0x0000000140237000-memory.dmp

                    Filesize

                    2.2MB

                  • memory/316-348-0x0000000140000000-0x0000000140237000-memory.dmp

                    Filesize

                    2.2MB

                  • memory/472-591-0x0000000000400000-0x00000000004A8000-memory.dmp

                    Filesize

                    672KB

                  • memory/472-584-0x0000000000400000-0x00000000004A8000-memory.dmp

                    Filesize

                    672KB

                  • memory/524-610-0x0000000000400000-0x00000000004A8000-memory.dmp

                    Filesize

                    672KB

                  • memory/524-802-0x0000000100000000-0x0000000100123000-memory.dmp

                    Filesize

                    1.1MB

                  • memory/560-476-0x0000000000400000-0x00000000004A8000-memory.dmp

                    Filesize

                    672KB

                  • memory/560-899-0x0000000100000000-0x00000001000C4000-memory.dmp

                    Filesize

                    784KB

                  • memory/560-484-0x0000000000400000-0x00000000004A8000-memory.dmp

                    Filesize

                    672KB

                  • memory/560-784-0x0000000100000000-0x00000001000C4000-memory.dmp

                    Filesize

                    784KB

                  • memory/640-695-0x0000000140000000-0x00000001400AE000-memory.dmp

                    Filesize

                    696KB

                  • memory/640-684-0x0000000140000000-0x00000001400AE000-memory.dmp

                    Filesize

                    696KB

                  • memory/700-700-0x0000000140000000-0x00000001400AE000-memory.dmp

                    Filesize

                    696KB

                  • memory/700-686-0x0000000140000000-0x00000001400AE000-memory.dmp

                    Filesize

                    696KB

                  • memory/836-385-0x0000000000400000-0x00000000004A8000-memory.dmp

                    Filesize

                    672KB

                  • memory/836-529-0x0000000000400000-0x00000000004A8000-memory.dmp

                    Filesize

                    672KB

                  • memory/976-57-0x0000000000410000-0x0000000000470000-memory.dmp

                    Filesize

                    384KB

                  • memory/976-55-0x0000000010000000-0x00000000100A7000-memory.dmp

                    Filesize

                    668KB

                  • memory/976-123-0x0000000010000000-0x00000000100A7000-memory.dmp

                    Filesize

                    668KB

                  • memory/976-65-0x0000000000410000-0x0000000000470000-memory.dmp

                    Filesize

                    384KB

                  • memory/1496-800-0x0000000100000000-0x000000010020A000-memory.dmp

                    Filesize

                    2.0MB

                  • memory/1500-562-0x0000000000400000-0x00000000004A8000-memory.dmp

                    Filesize

                    672KB

                  • memory/1500-565-0x0000000000400000-0x00000000004A8000-memory.dmp

                    Filesize

                    672KB

                  • memory/1528-375-0x0000000000400000-0x00000000004A8000-memory.dmp

                    Filesize

                    672KB

                  • memory/1528-356-0x0000000000400000-0x00000000004A8000-memory.dmp

                    Filesize

                    672KB

                  • memory/1592-897-0x0000000100000000-0x0000000100219000-memory.dmp

                    Filesize

                    2.1MB

                  • memory/1592-762-0x0000000100000000-0x0000000100219000-memory.dmp

                    Filesize

                    2.1MB

                  • memory/1628-627-0x0000000000400000-0x00000000004A8000-memory.dmp

                    Filesize

                    672KB

                  • memory/1636-73-0x0000000000400000-0x00000000004A8000-memory.dmp

                    Filesize

                    672KB

                  • memory/1636-211-0x0000000000400000-0x00000000004A8000-memory.dmp

                    Filesize

                    672KB

                  • memory/1636-74-0x0000000000A50000-0x0000000000AB7000-memory.dmp

                    Filesize

                    412KB

                  • memory/1636-79-0x0000000000A50000-0x0000000000AB7000-memory.dmp

                    Filesize

                    412KB

                  • memory/1692-494-0x0000000000400000-0x00000000004A8000-memory.dmp

                    Filesize

                    672KB

                  • memory/1692-505-0x0000000000400000-0x00000000004A8000-memory.dmp

                    Filesize

                    672KB

                  • memory/1716-384-0x000000002E000000-0x000000002FE1E000-memory.dmp

                    Filesize

                    30.1MB

                  • memory/1716-172-0x000000002E000000-0x000000002FE1E000-memory.dmp

                    Filesize

                    30.1MB

                  • memory/1768-638-0x0000000000400000-0x00000000004A8000-memory.dmp

                    Filesize

                    672KB

                  • memory/1868-432-0x0000000140000000-0x00000001400B6000-memory.dmp

                    Filesize

                    728KB

                  • memory/1868-186-0x0000000140000000-0x00000001400B6000-memory.dmp

                    Filesize

                    728KB

                  • memory/2008-896-0x0000000100000000-0x0000000100114000-memory.dmp

                    Filesize

                    1.1MB

                  • memory/2008-752-0x0000000100000000-0x0000000100114000-memory.dmp

                    Filesize

                    1.1MB

                  • memory/2108-613-0x0000000000400000-0x00000000004A8000-memory.dmp

                    Filesize

                    672KB

                  • memory/2108-607-0x0000000000400000-0x00000000004A8000-memory.dmp

                    Filesize

                    672KB

                  • memory/2116-561-0x0000000000400000-0x00000000004A8000-memory.dmp

                    Filesize

                    672KB

                  • memory/2148-125-0x0000000140000000-0x00000001400B2000-memory.dmp

                    Filesize

                    712KB

                  • memory/2148-329-0x0000000140000000-0x00000001400B2000-memory.dmp

                    Filesize

                    712KB

                  • memory/2148-705-0x0000000140000000-0x00000001400B2000-memory.dmp

                    Filesize

                    712KB

                  • memory/2196-658-0x0000000000400000-0x00000000004A8000-memory.dmp

                    Filesize

                    672KB

                  • memory/2248-779-0x0000000100000000-0x0000000100202000-memory.dmp

                    Filesize

                    2.0MB

                  • memory/2248-898-0x0000000100000000-0x0000000100202000-memory.dmp

                    Filesize

                    2.0MB

                  • memory/2264-672-0x0000000000400000-0x00000000004A8000-memory.dmp

                    Filesize

                    672KB

                  • memory/2296-517-0x0000000000400000-0x00000000004A8000-memory.dmp

                    Filesize

                    672KB

                  • memory/2320-387-0x0000000000400000-0x00000000004A8000-memory.dmp

                    Filesize

                    672KB

                  • memory/2320-419-0x0000000000400000-0x00000000004A8000-memory.dmp

                    Filesize

                    672KB

                  • memory/2356-202-0x0000000100000000-0x00000001000B2000-memory.dmp

                    Filesize

                    712KB

                  • memory/2356-475-0x0000000000580000-0x0000000000632000-memory.dmp

                    Filesize

                    712KB

                  • memory/2356-462-0x0000000100000000-0x00000001000B2000-memory.dmp

                    Filesize

                    712KB

                  • memory/2408-434-0x0000000000400000-0x00000000004A8000-memory.dmp

                    Filesize

                    672KB

                  • memory/2408-416-0x0000000000400000-0x00000000004A8000-memory.dmp

                    Filesize

                    672KB

                  • memory/2420-139-0x0000000140000000-0x000000014009D000-memory.dmp

                    Filesize

                    628KB

                  • memory/2420-28-0x0000000140000000-0x000000014009D000-memory.dmp

                    Filesize

                    628KB

                  • memory/2420-29-0x0000000000830000-0x0000000000890000-memory.dmp

                    Filesize

                    384KB

                  • memory/2420-36-0x0000000000830000-0x0000000000890000-memory.dmp

                    Filesize

                    384KB

                  • memory/2432-0-0x0000000010000000-0x00000000100A7000-memory.dmp

                    Filesize

                    668KB

                  • memory/2432-8-0x00000000001E0000-0x0000000000240000-memory.dmp

                    Filesize

                    384KB

                  • memory/2432-7-0x00000000001E0000-0x0000000000240000-memory.dmp

                    Filesize

                    384KB

                  • memory/2432-72-0x0000000010000000-0x00000000100A7000-memory.dmp

                    Filesize

                    668KB

                  • memory/2432-205-0x0000000010000000-0x00000000100A7000-memory.dmp

                    Filesize

                    668KB

                  • memory/2432-206-0x00000000001E0000-0x0000000000240000-memory.dmp

                    Filesize

                    384KB

                  • memory/2432-1-0x00000000001E0000-0x0000000000240000-memory.dmp

                    Filesize

                    384KB

                  • memory/2524-708-0x0000000140000000-0x00000001400AE000-memory.dmp

                    Filesize

                    696KB

                  • memory/2524-160-0x0000000140000000-0x00000001400AE000-memory.dmp

                    Filesize

                    696KB

                  • memory/2524-372-0x0000000140000000-0x00000001400AE000-memory.dmp

                    Filesize

                    696KB

                  • memory/2532-198-0x0000000140000000-0x00000001400CA000-memory.dmp

                    Filesize

                    808KB

                  • memory/2532-181-0x0000000140000000-0x00000001400CA000-memory.dmp

                    Filesize

                    808KB

                  • memory/2592-713-0x0000000140000000-0x000000014013C000-memory.dmp

                    Filesize

                    1.2MB

                  • memory/2592-109-0x0000000000850000-0x00000000008B0000-memory.dmp

                    Filesize

                    384KB

                  • memory/2592-115-0x0000000000850000-0x00000000008B0000-memory.dmp

                    Filesize

                    384KB

                  • memory/2592-117-0x0000000140000000-0x000000014013C000-memory.dmp

                    Filesize

                    1.2MB

                  • memory/2592-272-0x0000000140000000-0x000000014013C000-memory.dmp

                    Filesize

                    1.2MB

                  • memory/2656-40-0x0000000010000000-0x000000001009F000-memory.dmp

                    Filesize

                    636KB

                  • memory/2656-89-0x0000000010000000-0x000000001009F000-memory.dmp

                    Filesize

                    636KB

                  • memory/2656-46-0x0000000000260000-0x00000000002C7000-memory.dmp

                    Filesize

                    412KB

                  • memory/2656-41-0x0000000000260000-0x00000000002C7000-memory.dmp

                    Filesize

                    412KB

                  • memory/2664-742-0x0000000100000000-0x0000000100096000-memory.dmp

                    Filesize

                    600KB

                  • memory/2664-895-0x0000000100000000-0x0000000100096000-memory.dmp

                    Filesize

                    600KB

                  • memory/2696-463-0x0000000000400000-0x00000000004A8000-memory.dmp

                    Filesize

                    672KB

                  • memory/2696-481-0x0000000000400000-0x00000000004A8000-memory.dmp

                    Filesize

                    672KB

                  • memory/2732-549-0x0000000000400000-0x00000000004A8000-memory.dmp

                    Filesize

                    672KB

                  • memory/2820-667-0x0000000000400000-0x00000000004A8000-memory.dmp

                    Filesize

                    672KB

                  • memory/2820-657-0x0000000000400000-0x00000000004A8000-memory.dmp

                    Filesize

                    672KB

                  • memory/2852-23-0x00000000008F0000-0x0000000000950000-memory.dmp

                    Filesize

                    384KB

                  • memory/2852-108-0x0000000100000000-0x00000001000A4000-memory.dmp

                    Filesize

                    656KB

                  • memory/2852-15-0x00000000008F0000-0x0000000000950000-memory.dmp

                    Filesize

                    384KB

                  • memory/2852-14-0x0000000100000000-0x00000001000A4000-memory.dmp

                    Filesize

                    656KB

                  • memory/2860-646-0x0000000000400000-0x00000000004A8000-memory.dmp

                    Filesize

                    672KB

                  • memory/2876-91-0x0000000140000000-0x00000001400AE000-memory.dmp

                    Filesize

                    696KB

                  • memory/2876-98-0x0000000000420000-0x0000000000480000-memory.dmp

                    Filesize

                    384KB

                  • memory/2876-92-0x0000000000420000-0x0000000000480000-memory.dmp

                    Filesize

                    384KB

                  • memory/2876-221-0x0000000140000000-0x00000001400AE000-memory.dmp

                    Filesize

                    696KB

                  • memory/2888-493-0x000000002E000000-0x000000002E0B5000-memory.dmp

                    Filesize

                    724KB

                  • memory/2888-229-0x000000002E000000-0x000000002E0B5000-memory.dmp

                    Filesize

                    724KB

                  • memory/2908-893-0x0000000001000000-0x0000000001096000-memory.dmp

                    Filesize

                    600KB

                  • memory/2908-726-0x0000000001000000-0x0000000001096000-memory.dmp

                    Filesize

                    600KB

                  • memory/2976-452-0x0000000000400000-0x00000000004A8000-memory.dmp

                    Filesize

                    672KB

                  • memory/2976-575-0x0000000003BE0000-0x0000000003C9A000-memory.dmp

                    Filesize

                    744KB

                  • memory/2976-587-0x0000000000400000-0x00000000004A8000-memory.dmp

                    Filesize

                    672KB

                  • memory/2992-894-0x0000000100000000-0x0000000100095000-memory.dmp

                    Filesize

                    596KB

                  • memory/2992-730-0x0000000100000000-0x0000000100095000-memory.dmp

                    Filesize

                    596KB