Analysis

  • max time kernel
    140s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    15-09-2024 08:28

General

  • Target

    89fbbddeb556eb351ad4e3829ad07d36ab35480b41f52d160962b89687423693.exe

  • Size

    1.3MB

  • MD5

    a95fc298d137fc2755a091bba2b50748

  • SHA1

    ae96c925485e7d9949646935dfb2d791fb3daba0

  • SHA256

    89fbbddeb556eb351ad4e3829ad07d36ab35480b41f52d160962b89687423693

  • SHA512

    0d049dd38e6c2e206fb6b6b11eb0d1e077aaa86cbea16add96ec0c274342d2804fa252a72573c35ed4519c2b99dc1a3f2fed5057f951eb5ede150f1557de328c

  • SSDEEP

    24576:tIXgCWSpRyndSJVDsVu5unzqWvX17Cks7WE9F5pwg8zmdqQjC60jiHkU:8WSjaSJlsQuzqW/17Cks7R9L58UqFJjI

Malware Config

Signatures

  • Executes dropped EXE 64 IoCs
  • Loads dropped DLL 50 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in System32 directory 22 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of SetWindowsHookEx 20 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\89fbbddeb556eb351ad4e3829ad07d36ab35480b41f52d160962b89687423693.exe
    "C:\Users\Admin\AppData\Local\Temp\89fbbddeb556eb351ad4e3829ad07d36ab35480b41f52d160962b89687423693.exe"
    1⤵
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:3028
  • C:\Windows\System32\alg.exe
    C:\Windows\System32\alg.exe
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Suspicious use of AdjustPrivilegeToken
    PID:2116
  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe
    C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2676
  • C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe
    C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe
    1⤵
    • Executes dropped EXE
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    PID:2344
  • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe
    C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe
    1⤵
    • Executes dropped EXE
    • Drops file in Windows directory
    PID:2160
  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
    C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
    1⤵
    • Executes dropped EXE
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1272
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1e8 -InterruptEvent 1d4 -NGENProcess 1d8 -Pipe 1e4 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2916
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 258 -InterruptEvent 1d4 -NGENProcess 1d8 -Pipe 1e8 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2124
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1d4 -InterruptEvent 25c -NGENProcess 24c -Pipe 248 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2312
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1d4 -InterruptEvent 250 -NGENProcess 258 -Pipe 23c -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1444
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 250 -InterruptEvent 254 -NGENProcess 25c -Pipe 244 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1568
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1d8 -InterruptEvent 1d4 -NGENProcess 268 -Pipe 250 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2748
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1d4 -InterruptEvent 24c -NGENProcess 25c -Pipe 240 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1128
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 26c -InterruptEvent 1d8 -NGENProcess 270 -Pipe 1d4 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:560
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1d8 -InterruptEvent 260 -NGENProcess 25c -Pipe 264 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1548
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 274 -InterruptEvent 260 -NGENProcess 254 -Pipe 24c -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2744
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 260 -InterruptEvent 258 -NGENProcess 25c -Pipe 1f0 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2204
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 258 -InterruptEvent 27c -NGENProcess 26c -Pipe 268 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1788
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 27c -InterruptEvent 280 -NGENProcess 260 -Pipe 274 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2516
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 278 -InterruptEvent 254 -NGENProcess 288 -Pipe 27c -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:1956
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 254 -InterruptEvent 1d8 -NGENProcess 260 -Pipe 270 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1568
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1d8 -InterruptEvent 28c -NGENProcess 280 -Pipe 25c -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:3000
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 28c -InterruptEvent 290 -NGENProcess 288 -Pipe 284 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2012
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 290 -InterruptEvent 294 -NGENProcess 260 -Pipe 26c -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:1200
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 294 -InterruptEvent 298 -NGENProcess 280 -Pipe 278 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:596
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 298 -InterruptEvent 29c -NGENProcess 288 -Pipe 254 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1832
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 29c -InterruptEvent 2a0 -NGENProcess 260 -Pipe 1d8 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2452
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2a4 -InterruptEvent 2a0 -NGENProcess 29c -Pipe 280 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2260
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2a0 -InterruptEvent 28c -NGENProcess 260 -Pipe 290 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2892
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 280 -InterruptEvent 11c -NGENProcess 224 -Pipe 1d8 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2792
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 11c -InterruptEvent 250 -NGENProcess 254 -Pipe 240 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2084
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 250 -InterruptEvent 244 -NGENProcess 24c -Pipe 1d4 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1156
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 244 -InterruptEvent 23c -NGENProcess 224 -Pipe 1f0 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:776
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 23c -InterruptEvent 248 -NGENProcess 254 -Pipe 220 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      PID:376
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 248 -InterruptEvent 224 -NGENProcess 254 -Pipe 250 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2544
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 224 -InterruptEvent 1c4 -NGENProcess 1e8 -Pipe 21c -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      PID:2520
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1c4 -InterruptEvent 1e8 -NGENProcess 224 -Pipe 280 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2404
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1e8 -InterruptEvent 298 -NGENProcess 24c -Pipe 244 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      PID:2932
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 298 -InterruptEvent 24c -NGENProcess 1c4 -Pipe 2ac -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2020
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 24c -InterruptEvent 258 -NGENProcess 224 -Pipe 248 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Windows directory
      PID:2740
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 258 -InterruptEvent 224 -NGENProcess 298 -Pipe 2a0 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2044
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 224 -InterruptEvent 260 -NGENProcess 1c4 -Pipe 1e8 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      PID:2952
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 260 -InterruptEvent 1c4 -NGENProcess 258 -Pipe 28c -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:328
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1c4 -InterruptEvent 294 -NGENProcess 298 -Pipe 24c -Comment "NGen Worker Process"
      2⤵
      • Loads dropped DLL
      • Drops file in Windows directory
      PID:2204
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 294 -InterruptEvent 260 -NGENProcess 298 -Pipe 29c -Comment "NGen Worker Process"
      2⤵
      • System Location Discovery: System Language Discovery
      PID:3064
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 260 -InterruptEvent 2a8 -NGENProcess 258 -Pipe 224 -Comment "NGen Worker Process"
      2⤵
      • Loads dropped DLL
      • Drops file in Windows directory
      PID:2164
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2a8 -InterruptEvent 258 -NGENProcess 294 -Pipe 288 -Comment "NGen Worker Process"
      2⤵
        PID:1424
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 258 -InterruptEvent 2b4 -NGENProcess 298 -Pipe 1c4 -Comment "NGen Worker Process"
        2⤵
        • Loads dropped DLL
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        PID:2012
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2b4 -InterruptEvent 298 -NGENProcess 2a8 -Pipe 2b0 -Comment "NGen Worker Process"
        2⤵
        • System Location Discovery: System Language Discovery
        PID:2304
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 298 -InterruptEvent 2bc -NGENProcess 294 -Pipe 260 -Comment "NGen Worker Process"
        2⤵
        • Loads dropped DLL
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        PID:1720
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2bc -InterruptEvent 294 -NGENProcess 2b4 -Pipe 2b8 -Comment "NGen Worker Process"
        2⤵
        • System Location Discovery: System Language Discovery
        PID:1996
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 294 -InterruptEvent 2c4 -NGENProcess 2a8 -Pipe 258 -Comment "NGen Worker Process"
        2⤵
        • Loads dropped DLL
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        PID:2140
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2c4 -InterruptEvent 2a8 -NGENProcess 2bc -Pipe 2c0 -Comment "NGen Worker Process"
        2⤵
        • System Location Discovery: System Language Discovery
        PID:1356
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2a8 -InterruptEvent 2cc -NGENProcess 2b4 -Pipe 298 -Comment "NGen Worker Process"
        2⤵
        • Loads dropped DLL
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        PID:2932
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2cc -InterruptEvent 2b4 -NGENProcess 2c4 -Pipe 2c8 -Comment "NGen Worker Process"
        2⤵
        • System Location Discovery: System Language Discovery
        PID:2648
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2b4 -InterruptEvent 2d4 -NGENProcess 2bc -Pipe 294 -Comment "NGen Worker Process"
        2⤵
        • Loads dropped DLL
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        PID:2704
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2d4 -InterruptEvent 2bc -NGENProcess 2cc -Pipe 2d0 -Comment "NGen Worker Process"
        2⤵
        • System Location Discovery: System Language Discovery
        PID:2860
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2bc -InterruptEvent 2dc -NGENProcess 2c4 -Pipe 2a8 -Comment "NGen Worker Process"
        2⤵
        • Loads dropped DLL
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        PID:2164
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2dc -InterruptEvent 2c4 -NGENProcess 2d4 -Pipe 2d8 -Comment "NGen Worker Process"
        2⤵
        • System Location Discovery: System Language Discovery
        PID:1156
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2c4 -InterruptEvent 2e4 -NGENProcess 2cc -Pipe 2b4 -Comment "NGen Worker Process"
        2⤵
        • Loads dropped DLL
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        PID:2104
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2e4 -InterruptEvent 2cc -NGENProcess 2dc -Pipe 2e0 -Comment "NGen Worker Process"
        2⤵
        • System Location Discovery: System Language Discovery
        PID:1548
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2cc -InterruptEvent 2ec -NGENProcess 2d4 -Pipe 2bc -Comment "NGen Worker Process"
        2⤵
        • Loads dropped DLL
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        PID:1940
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2ec -InterruptEvent 2d4 -NGENProcess 2e4 -Pipe 2e8 -Comment "NGen Worker Process"
        2⤵
        • System Location Discovery: System Language Discovery
        PID:2396
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2d4 -InterruptEvent 2f4 -NGENProcess 2dc -Pipe 2c4 -Comment "NGen Worker Process"
        2⤵
        • Loads dropped DLL
        • Drops file in Windows directory
        PID:2744
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2f4 -InterruptEvent 2dc -NGENProcess 2ec -Pipe 2f0 -Comment "NGen Worker Process"
        2⤵
        • System Location Discovery: System Language Discovery
        • Modifies data under HKEY_USERS
        PID:2712
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2dc -InterruptEvent 2fc -NGENProcess 2e4 -Pipe 2cc -Comment "NGen Worker Process"
        2⤵
        • System Location Discovery: System Language Discovery
        PID:2460
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2fc -InterruptEvent 300 -NGENProcess 2f8 -Pipe 254 -Comment "NGen Worker Process"
        2⤵
          PID:2736
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
          C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 304 -InterruptEvent 300 -NGENProcess 2ec -Pipe 2d4 -Comment "NGen Worker Process"
          2⤵
          • System Location Discovery: System Language Discovery
          PID:1228
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
          C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 300 -InterruptEvent 308 -NGENProcess 2e4 -Pipe 1d0 -Comment "NGen Worker Process"
          2⤵
          • Loads dropped DLL
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          PID:2420
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
          C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 308 -InterruptEvent 2e4 -NGENProcess 304 -Pipe 2f8 -Comment "NGen Worker Process"
          2⤵
          • Loads dropped DLL
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          PID:2000
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
          C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2e4 -InterruptEvent 304 -NGENProcess 2f4 -Pipe 2ec -Comment "NGen Worker Process"
          2⤵
            PID:1752
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
            C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 304 -InterruptEvent 314 -NGENProcess 30c -Pipe 2fc -Comment "NGen Worker Process"
            2⤵
              PID:2712
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
              C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 314 -InterruptEvent 318 -NGENProcess 310 -Pipe 300 -Comment "NGen Worker Process"
              2⤵
              • System Location Discovery: System Language Discovery
              • Modifies data under HKEY_USERS
              PID:2460
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
              C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 318 -InterruptEvent 31c -NGENProcess 2f4 -Pipe 308 -Comment "NGen Worker Process"
              2⤵
                PID:2328
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 31c -InterruptEvent 320 -NGENProcess 30c -Pipe 2dc -Comment "NGen Worker Process"
                2⤵
                • System Location Discovery: System Language Discovery
                PID:2520
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 320 -InterruptEvent 32c -NGENProcess 310 -Pipe 328 -Comment "NGen Worker Process"
                2⤵
                • System Location Discovery: System Language Discovery
                PID:920
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 32c -InterruptEvent 330 -NGENProcess 304 -Pipe 324 -Comment "NGen Worker Process"
                2⤵
                • System Location Discovery: System Language Discovery
                PID:2860
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 330 -InterruptEvent 334 -NGENProcess 30c -Pipe 314 -Comment "NGen Worker Process"
                2⤵
                • System Location Discovery: System Language Discovery
                PID:1336
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 334 -InterruptEvent 338 -NGENProcess 310 -Pipe 318 -Comment "NGen Worker Process"
                2⤵
                  PID:1356
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                  C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 338 -InterruptEvent 31c -NGENProcess 304 -Pipe 30c -Comment "NGen Worker Process"
                  2⤵
                    PID:2080
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                    C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 31c -InterruptEvent 340 -NGENProcess 310 -Pipe 320 -Comment "NGen Worker Process"
                    2⤵
                      PID:2304
                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 340 -InterruptEvent 344 -NGENProcess 33c -Pipe 32c -Comment "NGen Worker Process"
                      2⤵
                      • System Location Discovery: System Language Discovery
                      PID:1088
                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 344 -InterruptEvent 348 -NGENProcess 304 -Pipe 330 -Comment "NGen Worker Process"
                      2⤵
                        PID:912
                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 348 -InterruptEvent 34c -NGENProcess 310 -Pipe 334 -Comment "NGen Worker Process"
                        2⤵
                          PID:844
                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                          C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 34c -InterruptEvent 350 -NGENProcess 33c -Pipe 338 -Comment "NGen Worker Process"
                          2⤵
                            PID:2200
                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                            C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 350 -InterruptEvent 354 -NGENProcess 304 -Pipe 31c -Comment "NGen Worker Process"
                            2⤵
                            • System Location Discovery: System Language Discovery
                            • Modifies data under HKEY_USERS
                            PID:1544
                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                            C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 354 -InterruptEvent 358 -NGENProcess 310 -Pipe 340 -Comment "NGen Worker Process"
                            2⤵
                            • System Location Discovery: System Language Discovery
                            PID:2068
                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                            C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 358 -InterruptEvent 35c -NGENProcess 33c -Pipe 344 -Comment "NGen Worker Process"
                            2⤵
                            • System Location Discovery: System Language Discovery
                            PID:2704
                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                            C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 35c -InterruptEvent 360 -NGENProcess 304 -Pipe 348 -Comment "NGen Worker Process"
                            2⤵
                              PID:1120
                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                              C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 360 -InterruptEvent 364 -NGENProcess 310 -Pipe 34c -Comment "NGen Worker Process"
                              2⤵
                              • System Location Discovery: System Language Discovery
                              PID:2924
                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                              C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 364 -InterruptEvent 368 -NGENProcess 33c -Pipe 350 -Comment "NGen Worker Process"
                              2⤵
                                PID:2340
                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 368 -InterruptEvent 36c -NGENProcess 304 -Pipe 354 -Comment "NGen Worker Process"
                                2⤵
                                • System Location Discovery: System Language Discovery
                                PID:1052
                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 36c -InterruptEvent 370 -NGENProcess 310 -Pipe 358 -Comment "NGen Worker Process"
                                2⤵
                                  PID:1648
                                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                  C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 370 -InterruptEvent 374 -NGENProcess 33c -Pipe 35c -Comment "NGen Worker Process"
                                  2⤵
                                    PID:1688
                                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                    C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 374 -InterruptEvent 378 -NGENProcess 304 -Pipe 360 -Comment "NGen Worker Process"
                                    2⤵
                                      PID:1576
                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 378 -InterruptEvent 37c -NGENProcess 310 -Pipe 364 -Comment "NGen Worker Process"
                                      2⤵
                                        PID:1628
                                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 37c -InterruptEvent 380 -NGENProcess 33c -Pipe 368 -Comment "NGen Worker Process"
                                        2⤵
                                          PID:2612
                                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                          C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 37c -InterruptEvent 33c -NGENProcess 380 -Pipe 384 -Comment "NGen Worker Process"
                                          2⤵
                                            PID:2164
                                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                            C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 33c -InterruptEvent 388 -NGENProcess 310 -Pipe 370 -Comment "NGen Worker Process"
                                            2⤵
                                              PID:524
                                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                              C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 388 -InterruptEvent 38c -NGENProcess 36c -Pipe 374 -Comment "NGen Worker Process"
                                              2⤵
                                                PID:3040
                                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 38c -InterruptEvent 390 -NGENProcess 380 -Pipe 388 -Comment "NGen Worker Process"
                                                2⤵
                                                  PID:2204
                                                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                  C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 390 -InterruptEvent 394 -NGENProcess 310 -Pipe 304 -Comment "NGen Worker Process"
                                                  2⤵
                                                    PID:1736
                                                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                    C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 394 -InterruptEvent 398 -NGENProcess 36c -Pipe 37c -Comment "NGen Worker Process"
                                                    2⤵
                                                      PID:2036
                                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 398 -InterruptEvent 39c -NGENProcess 380 -Pipe 33c -Comment "NGen Worker Process"
                                                      2⤵
                                                        PID:2016
                                                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 39c -InterruptEvent 378 -NGENProcess 310 -Pipe 38c -Comment "NGen Worker Process"
                                                        2⤵
                                                          PID:2164
                                                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                          C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 378 -InterruptEvent 3a0 -NGENProcess 390 -Pipe 2e4 -Comment "NGen Worker Process"
                                                          2⤵
                                                            PID:2088
                                                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                            C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3a0 -InterruptEvent 390 -NGENProcess 39c -Pipe 380 -Comment "NGen Worker Process"
                                                            2⤵
                                                              PID:1524
                                                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                              C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 390 -InterruptEvent 3a8 -NGENProcess 310 -Pipe 394 -Comment "NGen Worker Process"
                                                              2⤵
                                                                PID:2204
                                                            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
                                                              C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
                                                              1⤵
                                                              • Executes dropped EXE
                                                              • Drops file in Windows directory
                                                              • Suspicious use of AdjustPrivilegeToken
                                                              PID:1448
                                                              • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
                                                                C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 1d4 -InterruptEvent 1c0 -NGENProcess 1c4 -Pipe 1d0 -Comment "NGen Worker Process"
                                                                2⤵
                                                                • Executes dropped EXE
                                                                PID:2964
                                                              • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
                                                                C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 1cc -InterruptEvent 238 -NGENProcess 240 -Pipe 244 -Comment "NGen Worker Process"
                                                                2⤵
                                                                • Executes dropped EXE
                                                                PID:1708
                                                            • C:\Windows\ehome\ehRecvr.exe
                                                              C:\Windows\ehome\ehRecvr.exe
                                                              1⤵
                                                              • Executes dropped EXE
                                                              • Modifies data under HKEY_USERS
                                                              PID:1052
                                                            • C:\Windows\ehome\ehsched.exe
                                                              C:\Windows\ehome\ehsched.exe
                                                              1⤵
                                                              • Executes dropped EXE
                                                              PID:1228
                                                            • C:\Windows\eHome\EhTray.exe
                                                              "C:\Windows\eHome\EhTray.exe" /nav:-2
                                                              1⤵
                                                              • Suspicious use of AdjustPrivilegeToken
                                                              • Suspicious use of FindShellTrayWindow
                                                              • Suspicious use of SendNotifyMessage
                                                              PID:2016
                                                            • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                                                              "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                                                              1⤵
                                                              • Executes dropped EXE
                                                              PID:708
                                                            • C:\Windows\ehome\ehRec.exe
                                                              C:\Windows\ehome\ehRec.exe -Embedding
                                                              1⤵
                                                              • Modifies data under HKEY_USERS
                                                              • Suspicious behavior: EnumeratesProcesses
                                                              • Suspicious use of AdjustPrivilegeToken
                                                              PID:2956
                                                            • C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE
                                                              "C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE" /auditservice
                                                              1⤵
                                                              • Executes dropped EXE
                                                              • Drops file in System32 directory
                                                              • System Location Discovery: System Language Discovery
                                                              • Modifies data under HKEY_USERS
                                                              PID:1536
                                                            • C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe
                                                              "C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"
                                                              1⤵
                                                              • Executes dropped EXE
                                                              PID:2452
                                                            • C:\Program Files (x86)\Common Files\Microsoft Shared\Source Engine\OSE.EXE
                                                              "C:\Program Files (x86)\Common Files\Microsoft Shared\Source Engine\OSE.EXE"
                                                              1⤵
                                                              • Executes dropped EXE
                                                              • System Location Discovery: System Language Discovery
                                                              PID:2884
                                                            • C:\Windows\system32\IEEtwCollector.exe
                                                              C:\Windows\system32\IEEtwCollector.exe /V
                                                              1⤵
                                                              • Executes dropped EXE
                                                              PID:636
                                                            • C:\Windows\System32\msdtc.exe
                                                              C:\Windows\System32\msdtc.exe
                                                              1⤵
                                                              • Executes dropped EXE
                                                              • Drops file in System32 directory
                                                              • Drops file in Windows directory
                                                              PID:2508
                                                            • C:\Windows\system32\msiexec.exe
                                                              C:\Windows\system32\msiexec.exe /V
                                                              1⤵
                                                              • Executes dropped EXE
                                                              • Loads dropped DLL
                                                              • Suspicious use of AdjustPrivilegeToken
                                                              PID:2780
                                                            • C:\Windows\SysWow64\perfhost.exe
                                                              C:\Windows\SysWow64\perfhost.exe
                                                              1⤵
                                                              • Executes dropped EXE
                                                              PID:2944
                                                            • C:\Windows\system32\locator.exe
                                                              C:\Windows\system32\locator.exe
                                                              1⤵
                                                              • Executes dropped EXE
                                                              PID:2292
                                                            • C:\Windows\System32\snmptrap.exe
                                                              C:\Windows\System32\snmptrap.exe
                                                              1⤵
                                                              • Executes dropped EXE
                                                              PID:436
                                                            • C:\Windows\System32\vds.exe
                                                              C:\Windows\System32\vds.exe
                                                              1⤵
                                                              • Executes dropped EXE
                                                              PID:3056
                                                            • C:\Windows\system32\vssvc.exe
                                                              C:\Windows\system32\vssvc.exe
                                                              1⤵
                                                              • Executes dropped EXE
                                                              • Suspicious use of AdjustPrivilegeToken
                                                              PID:1796
                                                            • C:\Windows\system32\wbengine.exe
                                                              "C:\Windows\system32\wbengine.exe"
                                                              1⤵
                                                              • Executes dropped EXE
                                                              • Suspicious use of AdjustPrivilegeToken
                                                              PID:1328
                                                            • C:\Windows\system32\wbem\WmiApSrv.exe
                                                              C:\Windows\system32\wbem\WmiApSrv.exe
                                                              1⤵
                                                              • Executes dropped EXE
                                                              PID:1564
                                                            • C:\Program Files\Windows Media Player\wmpnetwk.exe
                                                              "C:\Program Files\Windows Media Player\wmpnetwk.exe"
                                                              1⤵
                                                              • Executes dropped EXE
                                                              • Modifies data under HKEY_USERS
                                                              • Suspicious use of AdjustPrivilegeToken
                                                              PID:2004
                                                            • C:\Windows\system32\SearchIndexer.exe
                                                              C:\Windows\system32\SearchIndexer.exe /Embedding
                                                              1⤵
                                                              • Executes dropped EXE
                                                              • Modifies data under HKEY_USERS
                                                              • Suspicious use of AdjustPrivilegeToken
                                                              PID:368
                                                              • C:\Windows\system32\SearchProtocolHost.exe
                                                                "C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe_S-1-5-21-457978338-2990298471-2379561640-10001_ Global\UsGthrCtrlFltPipeMssGthrPipe_S-1-5-21-457978338-2990298471-2379561640-10001 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon" "1"
                                                                2⤵
                                                                • Suspicious use of SetWindowsHookEx
                                                                PID:592
                                                              • C:\Windows\system32\SearchFilterHost.exe
                                                                "C:\Windows\system32\SearchFilterHost.exe" 0 600 604 612 65536 608
                                                                2⤵
                                                                • Modifies data under HKEY_USERS
                                                                PID:1048
                                                              • C:\Windows\system32\SearchProtocolHost.exe
                                                                "C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe2_ Global\UsGthrCtrlFltPipeMssGthrPipe2 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon"
                                                                2⤵
                                                                • Drops file in System32 directory
                                                                • Modifies data under HKEY_USERS
                                                                • Suspicious use of SetWindowsHookEx
                                                                PID:1608

                                                            Network

                                                            MITRE ATT&CK Enterprise v15

                                                            Replay Monitor

                                                            Loading Replay Monitor...

                                                            Downloads

                                                            • C:\Program Files (x86)\Common Files\microsoft shared\Source Engine\OSE.EXE

                                                              Filesize

                                                              1.6MB

                                                              MD5

                                                              58bfb9ccd929b2e20828f2f8f6215848

                                                              SHA1

                                                              7341c2d87c265860725168a140d727a344d4aaaa

                                                              SHA256

                                                              d80ea543b6a575918a118ec18e38d701320c796468fe8d81090969df83fa5eaf

                                                              SHA512

                                                              d33f10dfa54143d88c5a1cbfea516ce6f16efe060e2ef27ef203a01f5331e51b26f79d16f7e55dfe86f6a838131dd11f0bf7a6c0c7cf12430cae970b5f52cf67

                                                            • C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE

                                                              Filesize

                                                              30.1MB

                                                              MD5

                                                              c8ff9bc58fff5cd42d8a2b6053c74cd7

                                                              SHA1

                                                              d6a5dec76376681f4f709b255f4a81a4bec886d5

                                                              SHA256

                                                              f0f9ce8d70b08c5eb19ff59905e6924d913d7995cf3876ff995c3b210eb4a31f

                                                              SHA512

                                                              390e13375a4f31c68bc08f67830bda9f0a2f3bf24b5d0b7467d24cd4595495e07a5414dfe921fca4d75f06e25b7f94eeaa57a8eb351ab9423ae6b65d83c19a1c

                                                            • C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe

                                                              Filesize

                                                              1.7MB

                                                              MD5

                                                              859e628179560a0283f069b29c121772

                                                              SHA1

                                                              44c39d3fc762e900b0199ae933d56baa68dcd9cb

                                                              SHA256

                                                              3cfd308840909430b1885f87205330a6009b83ab05444057d2f78934a4b0e4a2

                                                              SHA512

                                                              1487247bc9fbce826dbdf2ccc05febf70cae633009e0a63f5a95fbe09e5d327734fd1e66b00a6f9c9e67b039c405a87ec12337c9b6571593b1c2a0c4dccd506c

                                                            • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe

                                                              Filesize

                                                              2.1MB

                                                              MD5

                                                              f7d29d62124d4f7db68eb767122c79ae

                                                              SHA1

                                                              ae4f2681ab27021d7ad34c6d1cfe9664596bab35

                                                              SHA256

                                                              76534edef12180805241dac194190ba33ab579b11d1779f012300058aa11a7b2

                                                              SHA512

                                                              2635768c1ab2a5ca13384cc8030b570f2af77c8099b982249864bdab57349fb31bba93a609ce0132ad19a7deb94aa029ae0b62c692556ff28e3ed53655d4bd00

                                                            • C:\ProgramData\Microsoft\Search\Data\Applications\Windows\MSS.log

                                                              Filesize

                                                              1024KB

                                                              MD5

                                                              1b2f65afbda6cbfebea33fef7eb74abb

                                                              SHA1

                                                              ca561f4001ce8b1835eadc70df9a45a5395fa341

                                                              SHA256

                                                              609818d66d5b0fa4eaae604d6a0821db0b1bc7736e8428bf175bdf3dec91dbc2

                                                              SHA512

                                                              e56299ef6da60466c54b5a4a85b5d46997b321de2d222f0ec24393f6fac20c0c900d1d68e644401e293180f38f3e88ac1169e218fcee92493849f23405dd85aa

                                                            • C:\Users\Admin\AppData\Local\Temp\jusched.log

                                                              Filesize

                                                              1KB

                                                              MD5

                                                              23b0bd6c9616d5d8f72a28f45276bc28

                                                              SHA1

                                                              33b803bab03be4620a488a9f85cbaaa1882539c0

                                                              SHA256

                                                              b861449dacffa076a59323ea8b95b6f9e68ea4cadaab427727cd62b7b815fe9e

                                                              SHA512

                                                              46a9236eca9c89aa3bbf84de7df22a1290708906fa4f4bdee8a4e312ee36182e7eb5e6b892edee28ca56d5172640cd742e3d450c3027998da923d59e72145452

                                                            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b91050d8b077a4e8.customDestinations-ms

                                                              Filesize

                                                              24B

                                                              MD5

                                                              b9bd716de6739e51c620f2086f9c31e4

                                                              SHA1

                                                              9733d94607a3cba277e567af584510edd9febf62

                                                              SHA256

                                                              7116ff028244a01f3d17f1d3bc2e1506bc9999c2e40e388458f0cccc4e117312

                                                              SHA512

                                                              cef609e54c7a81a646ad38dba7ac0b82401b220773b9c792cefac80c6564753229f0c011b34ffb56381dd3154a19aee2bf5f602c4d1af01f2cf0fbc1574e4478

                                                            • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe

                                                              Filesize

                                                              1.5MB

                                                              MD5

                                                              e0a96451a36e92bd46cdf1dba7f390f2

                                                              SHA1

                                                              b75418f43ec387c5e2f681b654ac4e6f5007ad13

                                                              SHA256

                                                              d012d9941e9e628fbe85bfee64c97ee0bd759352fa7b16700dc1e05023b67200

                                                              SHA512

                                                              94d74d7d73688684c06833bfd6f16bb44df28f3691f24dce1b0eccad178b544fa4e167f6a5a0a5ea27f9649e6a2cec75754bfc16a3d09c1e837c8a8da67d9639

                                                            • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ngen_service.log

                                                              Filesize

                                                              872KB

                                                              MD5

                                                              81487d55d055938d761384e6891271fb

                                                              SHA1

                                                              c1feda94a01a39104cfd4df3659ed6d3647f89d8

                                                              SHA256

                                                              52690507ddb088d73503fd058957b167afebe9e670c39a8e7d73874b6564f14d

                                                              SHA512

                                                              c886ebbb6af80a6a6b25a90222cb2faaf8ac40e8c58c7cf796174302e5c0559b9ba5a625ac8cf7ea7a9e6d7ae9a088775074be3fbe114fa78114aa5f8de55a53

                                                            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe

                                                              Filesize

                                                              1.6MB

                                                              MD5

                                                              e88eef213b8b3af1cbbeeec11b0c6111

                                                              SHA1

                                                              28455d809d8e5d8c0f795bcc26016edb04581ac2

                                                              SHA256

                                                              eebd3180f1d6f4d23430de8afaaaf5715949d284999f9f13cd852cda839e20b9

                                                              SHA512

                                                              dc98b24714566c15848f822ea5f862e373ffa297ef6477243ee207ad244099ecc523ce2bf69b18e21cd88f66b84b90cf5ee67d0f0efea3432cfcdd5ca0b09196

                                                            • C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe

                                                              Filesize

                                                              1.5MB

                                                              MD5

                                                              a1d0400ee59af05baaba4223ae96fad2

                                                              SHA1

                                                              fe49e37a5fdbde1b4b7bfe1e463b93770a4718ec

                                                              SHA256

                                                              24fa945eceef7641e56b05ab38b1878f490e9b53c75f728d270aa8985a7771f6

                                                              SHA512

                                                              722f1b3bec6b129333e9123e94b5e1fe3d391ae8adc7f4aee35d2ec7b134441033fd64b280758fa39c5a6ba90d9130d200d8f63027c291bd5861fa2938d03be7

                                                            • C:\Windows\Microsoft.NET\Framework\v2.0.50727\ngen_service.log

                                                              Filesize

                                                              1003KB

                                                              MD5

                                                              c56bddb3738bd2c4eee673b188d8fbad

                                                              SHA1

                                                              123de6ab4a1889f4b1f38139859590883cdde794

                                                              SHA256

                                                              c286a57978935e4211d348a9c2addbe95bb0a92a2668ae3a0d08e164b75f1592

                                                              SHA512

                                                              de8bf18c5dacffea9a23c9f9b65024f4c8135a04e85b7771ce362f72a1f7cae67cf0e0e271c1f53449609c5c195a1cfb3d96c6e4990244b825deb186a65cb5c5

                                                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe

                                                              Filesize

                                                              1.5MB

                                                              MD5

                                                              a067ea4f0b5e398582c6bd52793fbee2

                                                              SHA1

                                                              a6478ad58a0d1553d5d12f7ed5278b3560cb4b0b

                                                              SHA256

                                                              abd51644ac55751a55d3cce8ed3ac8b38464751ff547e86b6a249d096be33dbb

                                                              SHA512

                                                              d3a1307605ac35888ce08e5ad07eea0604ab21298133b201c25766917d5827d8ac826da650b7267eebf502847b3bd524ad3cbd5fefda61c87e6883af009b294c

                                                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen_service.log

                                                              Filesize

                                                              8KB

                                                              MD5

                                                              3828972485ab1acc2a0bfe9ea126118f

                                                              SHA1

                                                              5e0d471133a184f8b60985d53c3fe583e68fd2e0

                                                              SHA256

                                                              4da002080852e94ca94a8ee4bc449edafc5fc79ef33f1ea11b05dda9544f265c

                                                              SHA512

                                                              658d4d3704cf012fe7fb8be441bc88d2140c74385966ad67155a623b504fcc53448350dde975c4140389324205b4d6f68875fab39ee2794b800640d7ab0848da

                                                            • C:\Windows\SysWOW64\perfhost.exe

                                                              Filesize

                                                              1.5MB

                                                              MD5

                                                              c14493b183102eefb44dcbf7fcee36b3

                                                              SHA1

                                                              916c5deee5a6ed06b67902025687fb8b6358d72e

                                                              SHA256

                                                              1cae05a3edba796096310a90ae90a8b52b420d5cad6f1b1e16dc560e7b465abd

                                                              SHA512

                                                              c0634f4aa38354380093c2af845bf417505b8adc479fdc3e3ce791a699718004b201aa5045341887e21a4b999677d5b0c88be86741c4e9c76f2781aa90df6b9f

                                                            • C:\Windows\System32\alg.exe

                                                              Filesize

                                                              1.5MB

                                                              MD5

                                                              32b41ab850b588a0d63824fed6ae1c38

                                                              SHA1

                                                              8e47f60cf45d9aeac00794da2daf0227183e217c

                                                              SHA256

                                                              c270a3336181a171760cda1c3a0b43b1afe784c5a0be475dbb37bbb97219ae30

                                                              SHA512

                                                              3a3cd831e0fa3836b7401d3fec6636410c1ee79ea6f53c3b9fa57774812579dd70452282d6e1266a3b69a054a79aad82732c8218e260ebf0e99de7aa7bd62478

                                                            • C:\Windows\System32\snmptrap.exe

                                                              Filesize

                                                              1.5MB

                                                              MD5

                                                              f781b650280fa6a1186cefb47cde9714

                                                              SHA1

                                                              b0bb114c20ba25e2a82eccc45673e90c73ff9537

                                                              SHA256

                                                              7250b699b01a5253c9de7d86533ad5a88ea589ea62bd15163787c316ff652518

                                                              SHA512

                                                              d86232445f8848b12bfab74fb89c7d91961d4947f72bd3f3671420fabd150a93553d1f728484692f7cb2fd9301ca3b3b1072074b0fc7e38878b3f5e706940ee3

                                                            • C:\Windows\System32\vds.exe

                                                              Filesize

                                                              2.0MB

                                                              MD5

                                                              2f09a6b6746b94a7a18965a195a5a58a

                                                              SHA1

                                                              78757b390722470e772035d0674b42938240d868

                                                              SHA256

                                                              9989904526832ed3d60381fbf83c44c39f5cf6007b9b1decf6f48273f8a8120e

                                                              SHA512

                                                              7e7a96dda4b55b1e90c1f38b16b138faf9ddbb41e869ff086d4e01353efa704556d75da48ead14b7fad2aecf333d2e3e562ee0628cf492ec101de777f5570c65

                                                            • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.Office.To#\5766ec3721d18a48bec1ca1f60331e2d\Microsoft.Office.Tools.Common.v9.0.ni.dll

                                                              Filesize

                                                              797KB

                                                              MD5

                                                              aeb0b6e6c5d32d1ada231285ff2ae881

                                                              SHA1

                                                              1f04a1c059503896336406aed1dc93340e90b742

                                                              SHA256

                                                              4c53ca542ac5ef9d822ef8cb3b0ecef3fb8b937d94c0a7b735bedb275c74a263

                                                              SHA512

                                                              e55fd4c4d2966b3f0b6e88292fbd6c20ffa34766e076e763442c15212d19b6dea5d9dc9e7c359d999674a5b2c8a3849c2bbaaf83e7aa8c12715028b06b5a48e1

                                                            • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.Office.To#\e1f8e4d08d4b7f811b7dbbacd324027b\Microsoft.Office.Tools.v9.0.ni.dll

                                                              Filesize

                                                              148KB

                                                              MD5

                                                              ac901cf97363425059a50d1398e3454b

                                                              SHA1

                                                              2f8bd4ac2237a7b7606cb77a3d3c58051793c5c7

                                                              SHA256

                                                              f6c7aecb211d9aac911bf80c91e84a47a72ac52cbb523e34e9da6482c0b24c58

                                                              SHA512

                                                              6a340b6d5fa8e214f2a58d8b691c749336df087fa75bcc8d8c46f708e4b4ff3d68a61a17d13ee62322b75cbc61d39f5a572588772f3c5d6e5ff32036e5bc5a00

                                                            • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\03cad6bd8b37d21b28dcb4f955be2158\Microsoft.VisualStudio.Tools.Applications.Contract.v9.0.ni.dll

                                                              Filesize

                                                              34KB

                                                              MD5

                                                              c26b034a8d6ab845b41ed6e8a8d6001d

                                                              SHA1

                                                              3a55774cf22d3244d30f9eb5e26c0a6792a3e493

                                                              SHA256

                                                              620b41f5e02df56c33919218bedc238ca7e76552c43da4f0f39a106835a4edc3

                                                              SHA512

                                                              483424665c3bc79aeb1de6dfdd633c8526331c7b271b1ea6fe93ab298089e2aceefe7f9c7d0c6e33e604ca7b2ed62e7bb586147fecdf9a0eea60e8c03816f537

                                                            • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\0cb958acb9cd4cacb46ebc0396e30aa3\Microsoft.VisualStudio.Tools.Office.Contract.v9.0.ni.dll

                                                              Filesize

                                                              109KB

                                                              MD5

                                                              0fd0f978e977a4122b64ae8f8541de54

                                                              SHA1

                                                              153d3390416fdeba1b150816cbbf968e355dc64f

                                                              SHA256

                                                              211d2b83bb82042385757f811d90c5ae0a281f3abb3bf1c7901e8559db479e60

                                                              SHA512

                                                              ceddfc031bfe4fcf5093d0bbc5697b5fb0cd69b03bc32612325a82ea273dae5daff7e670b0d45816a33307b8b042d27669f5d5391cb2bdcf3e5a0c847c6dcaa8

                                                            • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\367516b7878af19f5c84c67f2cd277ae\Microsoft.VisualStudio.Tools.Office.Word.AddInAdapter.v9.0.ni.dll

                                                              Filesize

                                                              41KB

                                                              MD5

                                                              3c269caf88ccaf71660d8dc6c56f4873

                                                              SHA1

                                                              f9481bf17e10fe1914644e1b590b82a0ecc2c5c4

                                                              SHA256

                                                              de21619e70f9ef8ccbb274bcd0d9d2ace1bae0442dfefab45976671587cf0a48

                                                              SHA512

                                                              bd5be3721bf5bd4001127e0381a0589033cb17aa35852f8f073ba9684af7d8c5a0f3ee29987b345fc15fdf28c5b56686087001ef41221a2cfb16498cf4c016c6

                                                            • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\718d54fcca18684c8f24916585f9d2f4\Microsoft.VisualStudio.Tools.Office.Outlook.HostAdapter.v10.0.ni.dll

                                                              Filesize

                                                              83KB

                                                              MD5

                                                              761db2b32b491135c0db086752d810ac

                                                              SHA1

                                                              4dd0e01211a6a697a6e94560c551c626b27e36eb

                                                              SHA256

                                                              2d5fef9dc652b0588260e968d8a3c384b64313b3162d5b36cffc1ab0107e49d2

                                                              SHA512

                                                              e2232e0b49b279514a64c34b0f1283e13b8fc078658146b7c6da5378eebcd59c748d450207280edca0bc9b189168adde1c9b2fa51d3eec7fbbb2701105ef46c0

                                                            • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\8c6bac317f75b51647ea3a8da141b143\Microsoft.VisualStudio.Tools.Office.AddInAdapter.v9.0.ni.dll

                                                              Filesize

                                                              210KB

                                                              MD5

                                                              4f40997b51420653706cb0958086cd2d

                                                              SHA1

                                                              0069b956d17ce7d782a0e054995317f2f621b502

                                                              SHA256

                                                              8cd6a0b061b43e0b660b81859c910290a3672b00d7647ba0e86eda6ddcc8c553

                                                              SHA512

                                                              e18953d7a348859855e5f6e279bc9924fc3707b57a733ce9b8f7d21bd631d419f1ebfb29202608192eb346569ca9a55264f5b4c2aedd474c22060734a68a4ee6

                                                            • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\9306fc630870a75ddd23441ad77bdc57\Microsoft.VisualStudio.Tools.Applications.Runtime.v10.0.ni.dll

                                                              Filesize

                                                              53KB

                                                              MD5

                                                              e3a7a2b65afd8ab8b154fdc7897595c3

                                                              SHA1

                                                              b21eefd6e23231470b5cf0bd0d7363879a2ed228

                                                              SHA256

                                                              e5faf5e8adf46a8246e6b5038409dadca46985a9951343a1936237d2c8d7a845

                                                              SHA512

                                                              6537c7ed398deb23be1256445297cb7c8d7801bf6e163d918d8e258213708b28f7255ecff9fbd3431d8f5e5a746aa95a29d3a777b28fcd688777aed6d8205a33

                                                            • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\9419a3640bc85a8d57ac5ecd0caf2feb\Microsoft.VisualStudio.Tools.Office.Excel.HostAdapter.v10.0.ni.dll

                                                              Filesize

                                                              180KB

                                                              MD5

                                                              3bb918532b17f209b7143b833b8fc127

                                                              SHA1

                                                              01edb0209c2d517bcc84052c1f0a03440a7feb49

                                                              SHA256

                                                              9874f27354d5e43f7ccedf5eb33d5792e98c4f7856ef38a8faad1baec0165cd3

                                                              SHA512

                                                              2302aa19957ae2ce2d40a9cf720b90295a84bc66deae938da03442d3807f4aa40cf9c019bfb52a48ef5d0ee7dda2d95dcd36b2a68284b324f2fa162e701fec18

                                                            • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\ac2e1ab5cae0ba75d0a7173ad624c222\Microsoft.VisualStudio.Tools.Office.HostAdapter.v10.0.ni.dll

                                                              Filesize

                                                              143KB

                                                              MD5

                                                              1eff63517430e183b5389ba579ed93e2

                                                              SHA1

                                                              5891927b05adc6db5464fb02469c113a975ebbf0

                                                              SHA256

                                                              b56eb87a81a8777ae81fe8099d7f18dd11757dff104a9609a0568ca0b4ce0856

                                                              SHA512

                                                              2861ba07bfea6dbe1e349df886a401df47e9ca2a3846d1f8a269c6a558bdc5f5e4bf30cbaa8c115af801f2e5bf722084b88290e1dd10c4cedbc49a26e8eda844

                                                            • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\afa5bb1a39443d7dc81dfff54073929b\Microsoft.VisualStudio.Tools.Office.Contract.v10.0.ni.dll

                                                              Filesize

                                                              28KB

                                                              MD5

                                                              aefc3f3c8e7499bad4d05284e8abd16c

                                                              SHA1

                                                              7ab718bde7fdb2d878d8725dc843cfeba44a71f7

                                                              SHA256

                                                              4436550409cfb3d06b15dd0c3131e87e7002b0749c7c6e9dc3378c99dbec815d

                                                              SHA512

                                                              1d7dbc9764855a9a1f945c1bc8e86406c0625f1381d71b3ea6924322fbe419d1c70c3f3efd57ee2cb2097bb9385e0bf54965ab789328a80eb4946849648fe20b

                                                            • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\cc071a7fc0f6c43a0e3190c494fde946\Microsoft.VisualStudio.Tools.Office.Word.HostAdapter.v10.0.ni.dll

                                                              Filesize

                                                              187KB

                                                              MD5

                                                              bea973938c56d66c6babef55d55921c1

                                                              SHA1

                                                              3c46ff7c9abe138bbff83a2ab2b5a6dbaeac0a02

                                                              SHA256

                                                              da969a8c1b095cd119d18e927df40c5b059252e8b72b1ec4d4648ea583040eee

                                                              SHA512

                                                              73c6db0813454989cb8c3c9ff88dcd0f4db6eadca717d68caf74feca2055dfdee4d7176926af047e73ecf633b743abfbc74e8a6e9ab23337f9e1342fec86a556

                                                            • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\de06a98a598aa0ff716a25b24d56ad7f\Microsoft.VisualStudio.Tools.Applications.Contract.v10.0.ni.dll

                                                              Filesize

                                                              27KB

                                                              MD5

                                                              9c60454398ce4bce7a52cbda4a45d364

                                                              SHA1

                                                              da1e5de264a6f6051b332f8f32fa876d297bf620

                                                              SHA256

                                                              edc90887d38c87282f49adbb12a94040f9ac86058bfae15063aaaff2672b54e1

                                                              SHA512

                                                              533b7e9c55102b248f4a7560955734b4156eb4c02539c6f978aeacecff1ff182ba0f04a07d32ed90707a62d73191b0e2d2649f38ae1c3e7a5a4c0fbea9a94300

                                                            • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\e0220058091b941725ef02be0b84abe7\Microsoft.VisualStudio.Tools.Applications.HostAdapter.v10.0.ni.dll

                                                              Filesize

                                                              57KB

                                                              MD5

                                                              6eaaa1f987d6e1d81badf8665c55a341

                                                              SHA1

                                                              e52db4ad92903ca03a5a54fdb66e2e6fad59efd5

                                                              SHA256

                                                              4b78ffa5f0b6751aea11917db5961d566e2f59beaa054b41473d331fd392329e

                                                              SHA512

                                                              dbedfa6c569670c22d34d923e22b7dae7332b932b809082dad87a1f0bb125c912db37964b5881667867ccf23dc5e5be596aad85485746f8151ce1c51ffd097b2

                                                            • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\ee73646032cbb022d16771203727e3b2\Microsoft.VisualStudio.Tools.Applications.Runtime.v9.0.ni.dll

                                                              Filesize

                                                              130KB

                                                              MD5

                                                              2735d2ab103beb0f7c1fbd6971838274

                                                              SHA1

                                                              6063646bc072546798bf8bf347425834f2bfad71

                                                              SHA256

                                                              f00156860ec7e88f4ccb459ca29b7e0e5c169cdc8a081cb043603187d25d92b3

                                                              SHA512

                                                              fe2ce60c7f61760a29344e254771d48995e983e158da0725818f37441f9690bda46545bf10c84b163f6afb163ffb504913d6ffddf84f72b062c7f233aed896de

                                                            • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\f1a7ac664667f2d6bcd6c388b230c22b\Microsoft.VisualStudio.Tools.Applications.AddInAdapter.v9.0.ni.dll

                                                              Filesize

                                                              59KB

                                                              MD5

                                                              8c69bbdfbc8cc3fa3fa5edcd79901e94

                                                              SHA1

                                                              b8028f0f557692221d5c0160ec6ce414b2bdf19b

                                                              SHA256

                                                              a21471690e7c32c80049e17c13624820e77bca6c9c38b83d9ea8a7248086660d

                                                              SHA512

                                                              825f5b87b76303b62fc16a96b108fb1774c2aca52ac5e44cd0ac2fe2ee47d5d67947dfe7498e36bc849773f608ec5824711f8c36e375a378582eefb57c9c2557

                                                            • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\fc36797f7054935a6033077612905a0f\Microsoft.VisualStudio.Tools.Office.Excel.AddInAdapter.v9.0.ni.dll

                                                              Filesize

                                                              42KB

                                                              MD5

                                                              71d4273e5b77cf01239a5d4f29e064fc

                                                              SHA1

                                                              e8876dea4e4c4c099e27234742016be3c80d8b62

                                                              SHA256

                                                              f019899f829731f899a99885fd52fde1fe4a4f6fe3ecf7f7a7cfa78517c00575

                                                              SHA512

                                                              41fe67cda988c53bd087df6296d1a242cddac688718ea5a5884a72b43e9638538e64d7a59e045c0b4d490496d884cf0ec694ddf7fcb41ae3b8cbc65b7686b180

                                                            • C:\Windows\assembly\NativeImages_v2.0.50727_32\ehiVidCtl\88e20c69254157d91b96eadc9444815d\ehiVidCtl.ni.dll

                                                              Filesize

                                                              855KB

                                                              MD5

                                                              7812b0a90d92b4812d4063b89a970c58

                                                              SHA1

                                                              3c4a789b8d28a5bfa6a6191624e33b8f40e4c4ea

                                                              SHA256

                                                              897626e6af00e85e627eeaa7f9563b245335242bc6196b36d0072e5b6d45e543

                                                              SHA512

                                                              634a2395bada9227b1957f2b76ed7e19f12bfc4d71a145d182602a1b6e24d83e220ebfabd602b1995c360e1725a38a89ff58417b0295bb0da9ea35c41c21a6ed

                                                            • C:\Windows\assembly\NativeImages_v2.0.50727_32\stdole\2c6d60b55bbab22515c512080d4b3bae\stdole.ni.dll

                                                              Filesize

                                                              43KB

                                                              MD5

                                                              3e72bdd0663c5b2bcd530f74139c83e3

                                                              SHA1

                                                              66069bcac0207512b9e07320f4fa5934650677d2

                                                              SHA256

                                                              6a6ac3094130d1affd34aae5ba2bd8c889e2071eb4217a75d72b5560f884e357

                                                              SHA512

                                                              b0a98db477fccae71b4ebfb8525ed52c10f1e7542f955b307f260e27e0758aa22896683302e34b0237e7e3bba9f5193ddcc7ff255c71fbaa1386988b0ec7d626

                                                            • C:\Windows\system32\fxssvc.exe

                                                              Filesize

                                                              1.2MB

                                                              MD5

                                                              f3bd7b2c7f6cadce9e0263046b1dc350

                                                              SHA1

                                                              5be6079cebe917fff17d73ecc19a3c32b821b5f8

                                                              SHA256

                                                              5e36f1a71c9287718b2a8f657236e886e90016062bf94ae1448b3803adb2a21c

                                                              SHA512

                                                              d74434a619539a7d807100cbbcc3e9e05f490197e81aa6b462a2e6dd57c9de891518a91b6a87f2cdab4cb02e5f198a8126fa20de0cdd5ec03dfcd47b435e54f6

                                                            • \Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe

                                                              Filesize

                                                              1.5MB

                                                              MD5

                                                              543da6cb195ef2aed008da738656b0bb

                                                              SHA1

                                                              5c85ed351fb29629463590b57e61a17119b07ea6

                                                              SHA256

                                                              1e12b70d2c8a92c02d669a6cbc4842d9341d6385b5215123fa78155f481d48c2

                                                              SHA512

                                                              93976c2213b78342ced2c135857f419515dcb31a37c9512d27f73b6fc6abda3510ef3ce6e7eb9b2a82a0e169eaa8eff783bd169e6472c4bb3afea454cc083ebd

                                                            • \Windows\System32\Locator.exe

                                                              Filesize

                                                              1.5MB

                                                              MD5

                                                              6af50be5a7baae201dfffab5eca2ee0c

                                                              SHA1

                                                              954977591ccd6f92d4101536160ab8eecf2ba063

                                                              SHA256

                                                              d32f6450f37a4656d92cccecb9e115fbe143893f118b036c876e540092dd11af

                                                              SHA512

                                                              e3981a50aaa0d0a4a1de993d694a576b0a92c18eb280d6682d10d55bdddc43b247298fa0a1bb43282c642de3b6c7f91a6cda2a91aebc893d93ca9fddaa2a2375

                                                            • \Windows\System32\ieetwcollector.exe

                                                              Filesize

                                                              1.6MB

                                                              MD5

                                                              4aabe05e6dd44dd5d1660117f84e2b24

                                                              SHA1

                                                              81f35e603c8652658c26520bd98c1bccc1af23af

                                                              SHA256

                                                              1fea63dd6a676ed3e8dec4162fe327c278880541c5f36f0dc9137f5c065876e6

                                                              SHA512

                                                              ac325503f8b1f5956e3db157a2778da67ea0dafe3c023854bf235d8304b8a3b49eec3d6b378b75dfff28c8d2bec58340fde3a6ebfb9500d8ccdf9a8c63c591cf

                                                            • \Windows\System32\msdtc.exe

                                                              Filesize

                                                              1.6MB

                                                              MD5

                                                              cd99634dcccb5de3fe2c2042395e5111

                                                              SHA1

                                                              0c48f63cd993712575557c97742a1233f8afae12

                                                              SHA256

                                                              a2da3295739ddfd119fd4a8dda750a57ac29eb827a2e0e2ebed417b082e33209

                                                              SHA512

                                                              3e98f441fd9a705782208c0cb3d2d524ede26aa26ee64668e92f35164a31e1f16676009b324df40b3f7c2916eea71c3d3b19a09035d9ad366ab4bdce71c889a4

                                                            • \Windows\System32\msiexec.exe

                                                              Filesize

                                                              1.6MB

                                                              MD5

                                                              18bc5bf5adf1051f0e533f9a87232660

                                                              SHA1

                                                              0c3145262beb8f6a7ba5ecc2977e73877d086edb

                                                              SHA256

                                                              f5fdaf57c12d6ebec950a78958c04889ba82f7df672adebaa78b65403a18237f

                                                              SHA512

                                                              3962bf840209fd7c3eb1181fbed7657f91f8b2f932bda3bea59206d1496a30ec818e7a426c204b697a176379ac18338c0536dc9d048c9dc5ca5a7b8f66370921

                                                            • \Windows\ehome\ehrecvr.exe

                                                              Filesize

                                                              1.2MB

                                                              MD5

                                                              d27a566ba96d58ac613cb5a8b39ad835

                                                              SHA1

                                                              96221df9b69e06955f0d17ca1820ee76135ab894

                                                              SHA256

                                                              4ac996a6e3d8c59d078b54c46ac24702ee627797c469fa2a92ae347854000f84

                                                              SHA512

                                                              786a823204c95323a9ac6f516871e8223345c4880f8dc55d9863ec23024f0ba649b7ebf3e45e94ae81a9e431599fed865a8a4698d7df0e001b528e68312f4205

                                                            • \Windows\ehome\ehsched.exe

                                                              Filesize

                                                              1.6MB

                                                              MD5

                                                              ce412894bf486188b767a620f5aa3196

                                                              SHA1

                                                              239ef004bc5f7b08d27bf75061e3b58987214e21

                                                              SHA256

                                                              cd728af810130f26039288e1605b34c54ba367b2d2e905f6e43c12231e7d0243

                                                              SHA512

                                                              230ce2087d73200351cc4436a2e78a51c93e3b0e848b6b64fb68e4ee02c7aded869a20d53b711db8d835ab7bd3477fd3d1656d65030826b5737eeef4570f1ea7

                                                            • memory/436-750-0x0000000100000000-0x000000010017D000-memory.dmp

                                                              Filesize

                                                              1.5MB

                                                            • memory/560-443-0x0000000000400000-0x000000000058F000-memory.dmp

                                                              Filesize

                                                              1.6MB

                                                            • memory/560-464-0x0000000000400000-0x000000000058F000-memory.dmp

                                                              Filesize

                                                              1.6MB

                                                            • memory/596-581-0x0000000000400000-0x000000000058F000-memory.dmp

                                                              Filesize

                                                              1.6MB

                                                            • memory/596-593-0x0000000000400000-0x000000000058F000-memory.dmp

                                                              Filesize

                                                              1.6MB

                                                            • memory/636-888-0x0000000140000000-0x0000000140195000-memory.dmp

                                                              Filesize

                                                              1.6MB

                                                            • memory/636-683-0x0000000140000000-0x0000000140195000-memory.dmp

                                                              Filesize

                                                              1.6MB

                                                            • memory/708-354-0x0000000140000000-0x0000000140237000-memory.dmp

                                                              Filesize

                                                              2.2MB

                                                            • memory/708-155-0x0000000140000000-0x0000000140237000-memory.dmp

                                                              Filesize

                                                              2.2MB

                                                            • memory/1052-115-0x0000000000370000-0x00000000003D0000-memory.dmp

                                                              Filesize

                                                              384KB

                                                            • memory/1052-123-0x0000000140000000-0x000000014013C000-memory.dmp

                                                              Filesize

                                                              1.2MB

                                                            • memory/1052-313-0x0000000140000000-0x000000014013C000-memory.dmp

                                                              Filesize

                                                              1.2MB

                                                            • memory/1052-121-0x0000000000370000-0x00000000003D0000-memory.dmp

                                                              Filesize

                                                              384KB

                                                            • memory/1052-669-0x0000000140000000-0x000000014013C000-memory.dmp

                                                              Filesize

                                                              1.2MB

                                                            • memory/1128-449-0x0000000000400000-0x000000000058F000-memory.dmp

                                                              Filesize

                                                              1.6MB

                                                            • memory/1128-431-0x0000000000400000-0x000000000058F000-memory.dmp

                                                              Filesize

                                                              1.6MB

                                                            • memory/1200-583-0x0000000000400000-0x000000000058F000-memory.dmp

                                                              Filesize

                                                              1.6MB

                                                            • memory/1228-327-0x0000000140000000-0x0000000140199000-memory.dmp

                                                              Filesize

                                                              1.6MB

                                                            • memory/1228-664-0x0000000140000000-0x0000000140199000-memory.dmp

                                                              Filesize

                                                              1.6MB

                                                            • memory/1228-137-0x0000000140000000-0x0000000140199000-memory.dmp

                                                              Filesize

                                                              1.6MB

                                                            • memory/1272-902-0x00000000011F0000-0x0000000001294000-memory.dmp

                                                              Filesize

                                                              656KB

                                                            • memory/1272-82-0x0000000000400000-0x000000000058F000-memory.dmp

                                                              Filesize

                                                              1.6MB

                                                            • memory/1272-901-0x00000000011F0000-0x000000000127C000-memory.dmp

                                                              Filesize

                                                              560KB

                                                            • memory/1272-907-0x00000000011F0000-0x0000000001214000-memory.dmp

                                                              Filesize

                                                              144KB

                                                            • memory/1272-83-0x0000000000360000-0x00000000003C7000-memory.dmp

                                                              Filesize

                                                              412KB

                                                            • memory/1272-88-0x0000000000360000-0x00000000003C7000-memory.dmp

                                                              Filesize

                                                              412KB

                                                            • memory/1272-899-0x00000000011F0000-0x000000000120E000-memory.dmp

                                                              Filesize

                                                              120KB

                                                            • memory/1272-900-0x00000000011F0000-0x000000000120A000-memory.dmp

                                                              Filesize

                                                              104KB

                                                            • memory/1272-903-0x0000000001F70000-0x000000000210E000-memory.dmp

                                                              Filesize

                                                              1.6MB

                                                            • memory/1272-906-0x00000000011F0000-0x0000000001278000-memory.dmp

                                                              Filesize

                                                              544KB

                                                            • memory/1272-905-0x00000000011F0000-0x0000000001200000-memory.dmp

                                                              Filesize

                                                              64KB

                                                            • memory/1272-898-0x0000000001CF0000-0x0000000001CFA000-memory.dmp

                                                              Filesize

                                                              40KB

                                                            • memory/1272-904-0x00000000011F0000-0x00000000012DC000-memory.dmp

                                                              Filesize

                                                              944KB

                                                            • memory/1272-281-0x0000000000400000-0x000000000058F000-memory.dmp

                                                              Filesize

                                                              1.6MB

                                                            • memory/1444-370-0x0000000000400000-0x000000000058F000-memory.dmp

                                                              Filesize

                                                              1.6MB

                                                            • memory/1444-391-0x0000000000400000-0x000000000058F000-memory.dmp

                                                              Filesize

                                                              1.6MB

                                                            • memory/1448-104-0x0000000140000000-0x0000000140195000-memory.dmp

                                                              Filesize

                                                              1.6MB

                                                            • memory/1448-304-0x0000000140000000-0x0000000140195000-memory.dmp

                                                              Filesize

                                                              1.6MB

                                                            • memory/1448-97-0x00000000002F0000-0x0000000000350000-memory.dmp

                                                              Filesize

                                                              384KB

                                                            • memory/1448-102-0x00000000002F0000-0x0000000000350000-memory.dmp

                                                              Filesize

                                                              384KB

                                                            • memory/1536-357-0x000000002E000000-0x000000002FE1E000-memory.dmp

                                                              Filesize

                                                              30.1MB

                                                            • memory/1536-166-0x000000002E000000-0x000000002FE1E000-memory.dmp

                                                              Filesize

                                                              30.1MB

                                                            • memory/1548-467-0x0000000000400000-0x000000000058F000-memory.dmp

                                                              Filesize

                                                              1.6MB

                                                            • memory/1568-387-0x0000000000400000-0x000000000058F000-memory.dmp

                                                              Filesize

                                                              1.6MB

                                                            • memory/1568-412-0x0000000000400000-0x000000000058F000-memory.dmp

                                                              Filesize

                                                              1.6MB

                                                            • memory/1568-527-0x0000000000400000-0x000000000058F000-memory.dmp

                                                              Filesize

                                                              1.6MB

                                                            • memory/1568-546-0x0000000000400000-0x000000000058F000-memory.dmp

                                                              Filesize

                                                              1.6MB

                                                            • memory/1568-535-0x0000000003D30000-0x0000000003DEA000-memory.dmp

                                                              Filesize

                                                              744KB

                                                            • memory/1708-647-0x0000000140000000-0x0000000140195000-memory.dmp

                                                              Filesize

                                                              1.6MB

                                                            • memory/1708-661-0x0000000140000000-0x0000000140195000-memory.dmp

                                                              Filesize

                                                              1.6MB

                                                            • memory/1788-511-0x0000000000400000-0x000000000058F000-memory.dmp

                                                              Filesize

                                                              1.6MB

                                                            • memory/1832-606-0x0000000000400000-0x000000000058F000-memory.dmp

                                                              Filesize

                                                              1.6MB

                                                            • memory/1956-526-0x0000000000400000-0x000000000058F000-memory.dmp

                                                              Filesize

                                                              1.6MB

                                                            • memory/2012-560-0x0000000000400000-0x000000000058F000-memory.dmp

                                                              Filesize

                                                              1.6MB

                                                            • memory/2012-571-0x0000000000400000-0x000000000058F000-memory.dmp

                                                              Filesize

                                                              1.6MB

                                                            • memory/2116-20-0x0000000000170000-0x00000000001D0000-memory.dmp

                                                              Filesize

                                                              384KB

                                                            • memory/2116-27-0x0000000000170000-0x00000000001D0000-memory.dmp

                                                              Filesize

                                                              384KB

                                                            • memory/2116-128-0x0000000100000000-0x000000010018B000-memory.dmp

                                                              Filesize

                                                              1.5MB

                                                            • memory/2116-18-0x0000000100000000-0x000000010018B000-memory.dmp

                                                              Filesize

                                                              1.5MB

                                                            • memory/2124-321-0x0000000000400000-0x000000000058F000-memory.dmp

                                                              Filesize

                                                              1.6MB

                                                            • memory/2124-338-0x0000000000400000-0x000000000058F000-memory.dmp

                                                              Filesize

                                                              1.6MB

                                                            • memory/2160-112-0x0000000010000000-0x000000001018E000-memory.dmp

                                                              Filesize

                                                              1.6MB

                                                            • memory/2160-62-0x0000000010000000-0x000000001018E000-memory.dmp

                                                              Filesize

                                                              1.6MB

                                                            • memory/2160-69-0x0000000000BB0000-0x0000000000C10000-memory.dmp

                                                              Filesize

                                                              384KB

                                                            • memory/2160-63-0x0000000000BB0000-0x0000000000C10000-memory.dmp

                                                              Filesize

                                                              384KB

                                                            • memory/2204-498-0x0000000000400000-0x000000000058F000-memory.dmp

                                                              Filesize

                                                              1.6MB

                                                            • memory/2260-621-0x0000000000400000-0x000000000058F000-memory.dmp

                                                              Filesize

                                                              1.6MB

                                                            • memory/2292-738-0x0000000100000000-0x000000010017C000-memory.dmp

                                                              Filesize

                                                              1.5MB

                                                            • memory/2312-374-0x0000000000400000-0x000000000058F000-memory.dmp

                                                              Filesize

                                                              1.6MB

                                                            • memory/2312-335-0x0000000000400000-0x000000000058F000-memory.dmp

                                                              Filesize

                                                              1.6MB

                                                            • memory/2344-73-0x0000000010000000-0x0000000010186000-memory.dmp

                                                              Filesize

                                                              1.5MB

                                                            • memory/2344-55-0x0000000000230000-0x0000000000297000-memory.dmp

                                                              Filesize

                                                              412KB

                                                            • memory/2344-45-0x0000000000230000-0x0000000000297000-memory.dmp

                                                              Filesize

                                                              412KB

                                                            • memory/2344-44-0x0000000010000000-0x0000000010186000-memory.dmp

                                                              Filesize

                                                              1.5MB

                                                            • memory/2452-618-0x0000000000400000-0x000000000058F000-memory.dmp

                                                              Filesize

                                                              1.6MB

                                                            • memory/2452-607-0x0000000000400000-0x000000000058F000-memory.dmp

                                                              Filesize

                                                              1.6MB

                                                            • memory/2452-177-0x0000000140000000-0x00000001401B1000-memory.dmp

                                                              Filesize

                                                              1.7MB

                                                            • memory/2452-182-0x0000000140000000-0x00000001401B1000-memory.dmp

                                                              Filesize

                                                              1.7MB

                                                            • memory/2508-889-0x0000000140000000-0x000000014019D000-memory.dmp

                                                              Filesize

                                                              1.6MB

                                                            • memory/2508-690-0x0000000140000000-0x000000014019D000-memory.dmp

                                                              Filesize

                                                              1.6MB

                                                            • memory/2516-522-0x0000000000400000-0x000000000058F000-memory.dmp

                                                              Filesize

                                                              1.6MB

                                                            • memory/2516-508-0x0000000000400000-0x000000000058F000-memory.dmp

                                                              Filesize

                                                              1.6MB

                                                            • memory/2676-158-0x0000000140000000-0x0000000140184000-memory.dmp

                                                              Filesize

                                                              1.5MB

                                                            • memory/2676-32-0x0000000140000000-0x0000000140184000-memory.dmp

                                                              Filesize

                                                              1.5MB

                                                            • memory/2676-41-0x0000000000A20000-0x0000000000A80000-memory.dmp

                                                              Filesize

                                                              384KB

                                                            • memory/2676-33-0x0000000000A20000-0x0000000000A80000-memory.dmp

                                                              Filesize

                                                              384KB

                                                            • memory/2744-479-0x0000000000400000-0x000000000058F000-memory.dmp

                                                              Filesize

                                                              1.6MB

                                                            • memory/2744-476-0x0000000000400000-0x000000000058F000-memory.dmp

                                                              Filesize

                                                              1.6MB

                                                            • memory/2748-404-0x0000000000400000-0x000000000058F000-memory.dmp

                                                              Filesize

                                                              1.6MB

                                                            • memory/2748-435-0x0000000000400000-0x000000000058F000-memory.dmp

                                                              Filesize

                                                              1.6MB

                                                            • memory/2780-710-0x0000000100000000-0x0000000100199000-memory.dmp

                                                              Filesize

                                                              1.6MB

                                                            • memory/2780-716-0x00000000004C0000-0x0000000000659000-memory.dmp

                                                              Filesize

                                                              1.6MB

                                                            • memory/2780-890-0x0000000100000000-0x0000000100199000-memory.dmp

                                                              Filesize

                                                              1.6MB

                                                            • memory/2884-386-0x000000002E000000-0x000000002E19C000-memory.dmp

                                                              Filesize

                                                              1.6MB

                                                            • memory/2884-184-0x000000002E000000-0x000000002E19C000-memory.dmp

                                                              Filesize

                                                              1.6MB

                                                            • memory/2892-625-0x0000000000400000-0x000000000058F000-memory.dmp

                                                              Filesize

                                                              1.6MB

                                                            • memory/2892-632-0x0000000000400000-0x000000000058F000-memory.dmp

                                                              Filesize

                                                              1.6MB

                                                            • memory/2916-289-0x0000000000400000-0x000000000058F000-memory.dmp

                                                              Filesize

                                                              1.6MB

                                                            • memory/2916-325-0x0000000000400000-0x000000000058F000-memory.dmp

                                                              Filesize

                                                              1.6MB

                                                            • memory/2944-726-0x0000000001000000-0x000000000117D000-memory.dmp

                                                              Filesize

                                                              1.5MB

                                                            • memory/2964-636-0x0000000140000000-0x0000000140195000-memory.dmp

                                                              Filesize

                                                              1.6MB

                                                            • memory/2964-658-0x0000000140000000-0x0000000140195000-memory.dmp

                                                              Filesize

                                                              1.6MB

                                                            • memory/3000-552-0x0000000000400000-0x000000000058F000-memory.dmp

                                                              Filesize

                                                              1.6MB

                                                            • memory/3028-0-0x0000000000400000-0x0000000000546000-memory.dmp

                                                              Filesize

                                                              1.3MB

                                                            • memory/3028-141-0x0000000000400000-0x0000000000546000-memory.dmp

                                                              Filesize

                                                              1.3MB

                                                            • memory/3028-81-0x0000000000400000-0x0000000000546000-memory.dmp

                                                              Filesize

                                                              1.3MB

                                                            • memory/3028-1-0x0000000001D80000-0x0000000001DE7000-memory.dmp

                                                              Filesize

                                                              412KB

                                                            • memory/3028-8-0x0000000001D80000-0x0000000001DE7000-memory.dmp

                                                              Filesize

                                                              412KB