Analysis

  • max time kernel
    147s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    14-10-2024 08:44

General

  • Target

    69919b299d23d2ac2f3eebefda974592243ea2aa4e3bab6483b479291b408da1.exe

  • Size

    1.8MB

  • MD5

    08d32de70897f0686481c389dda45774

  • SHA1

    af902f928bd04becf7ea4e60fe7be196e7b8cdf2

  • SHA256

    69919b299d23d2ac2f3eebefda974592243ea2aa4e3bab6483b479291b408da1

  • SHA512

    a35d905af6fb901d39e3fcd141b6fad78806267b4103e1613c0598c81e47a3b1afd2db7a13656720e9c61e57cc0a021c9b05e13e532e232838ade1c9f3d1fcd1

  • SSDEEP

    49152:kx5SUW/cxUitIGLsF0nb+tJVYleAMz77+WAAB+kn3Hnx:kvbjVkjjCAzJR+k

Malware Config

Signatures

  • Executes dropped EXE 64 IoCs
  • Loads dropped DLL 43 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in System32 directory 12 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\69919b299d23d2ac2f3eebefda974592243ea2aa4e3bab6483b479291b408da1.exe
    "C:\Users\Admin\AppData\Local\Temp\69919b299d23d2ac2f3eebefda974592243ea2aa4e3bab6483b479291b408da1.exe"
    1⤵
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    PID:2248
  • C:\Windows\System32\alg.exe
    C:\Windows\System32\alg.exe
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:2560
  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe
    C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe
    1⤵
    • Executes dropped EXE
    PID:1708
  • C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe
    C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe
    1⤵
    • Executes dropped EXE
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    PID:2196
  • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe
    C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe
    1⤵
    • Executes dropped EXE
    PID:2104
  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
    C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2516
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1e8 -InterruptEvent 1d4 -NGENProcess 1d8 -Pipe 1e4 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2368
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 258 -InterruptEvent 1d4 -NGENProcess 1d8 -Pipe 1e8 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1120
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 248 -InterruptEvent 254 -NGENProcess 25c -Pipe 258 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2988
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 244 -InterruptEvent 24c -NGENProcess 260 -Pipe 248 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2848
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 240 -InterruptEvent 250 -NGENProcess 264 -Pipe 244 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2128
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 250 -InterruptEvent 23c -NGENProcess 260 -Pipe 1f0 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1896
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 23c -InterruptEvent 268 -NGENProcess 24c -Pipe 1d4 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2936
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 268 -InterruptEvent 26c -NGENProcess 264 -Pipe 1d8 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:1240
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 26c -InterruptEvent 270 -NGENProcess 260 -Pipe 25c -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2788
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 274 -InterruptEvent 270 -NGENProcess 26c -Pipe 24c -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2712
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 270 -InterruptEvent 240 -NGENProcess 260 -Pipe 250 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2820
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 240 -InterruptEvent 280 -NGENProcess 268 -Pipe 27c -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2876
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 280 -InterruptEvent 254 -NGENProcess 264 -Pipe 26c -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2752
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 254 -InterruptEvent 288 -NGENProcess 274 -Pipe 284 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2564
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 270 -InterruptEvent 278 -NGENProcess 280 -Pipe 288 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2212
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 268 -InterruptEvent 260 -NGENProcess 290 -Pipe 270 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2640
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 260 -InterruptEvent 23c -NGENProcess 280 -Pipe 264 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2908
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 23c -InterruptEvent 280 -NGENProcess 274 -Pipe 298 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2520
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 280 -InterruptEvent 240 -NGENProcess 294 -Pipe 28c -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:1152
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 29c -InterruptEvent 23c -NGENProcess 2a0 -Pipe 280 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1716
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 23c -InterruptEvent 254 -NGENProcess 294 -Pipe 278 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2656
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 254 -InterruptEvent 2a4 -NGENProcess 240 -Pipe 290 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2604
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2a4 -InterruptEvent 2ac -NGENProcess 2a0 -Pipe 2a8 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2616
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2b0 -InterruptEvent 1c4 -NGENProcess 274 -Pipe 21c -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1720
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1c4 -InterruptEvent 2d0 -NGENProcess 268 -Pipe 2cc -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2180
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2d0 -InterruptEvent 2d4 -NGENProcess 2c0 -Pipe 2c8 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2024
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2d4 -InterruptEvent 2d8 -NGENProcess 274 -Pipe 2bc -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2980
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2dc -InterruptEvent 2d0 -NGENProcess 2e0 -Pipe 2d4 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Windows directory
      PID:2780
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2d0 -InterruptEvent 2d8 -NGENProcess 2e0 -Pipe 1c4 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2528
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2d8 -InterruptEvent 2e8 -NGENProcess 254 -Pipe 2e4 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Windows directory
      PID:1536
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2e8 -InterruptEvent 254 -NGENProcess 2d0 -Pipe 2b0 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2408
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 254 -InterruptEvent 2f0 -NGENProcess 2e0 -Pipe 274 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      PID:2640
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2f0 -InterruptEvent 2e0 -NGENProcess 2e8 -Pipe 2ec -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1696
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2e0 -InterruptEvent 2f8 -NGENProcess 2d0 -Pipe 2d8 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      PID:2492
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2f8 -InterruptEvent 2d0 -NGENProcess 2f0 -Pipe 2f4 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1240
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2d0 -InterruptEvent 300 -NGENProcess 2e8 -Pipe 254 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      PID:1716
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 300 -InterruptEvent 2e8 -NGENProcess 2f8 -Pipe 2fc -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2760
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2e8 -InterruptEvent 308 -NGENProcess 2f0 -Pipe 2e0 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      PID:2612
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 308 -InterruptEvent 2f0 -NGENProcess 300 -Pipe 304 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2292
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2f0 -InterruptEvent 300 -NGENProcess 2e8 -Pipe 314 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Windows directory
      PID:1980
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 300 -InterruptEvent 2e8 -NGENProcess 268 -Pipe 310 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:1972
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2e8 -InterruptEvent 318 -NGENProcess 308 -Pipe 2c4 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Windows directory
      PID:3040
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 318 -InterruptEvent 308 -NGENProcess 300 -Pipe 2d0 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2060
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 308 -InterruptEvent 2f8 -NGENProcess 31c -Pipe 2f0 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Windows directory
      PID:2268
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2f8 -InterruptEvent 31c -NGENProcess 318 -Pipe 2c0 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1896
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 31c -InterruptEvent 328 -NGENProcess 300 -Pipe 2e8 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Windows directory
      PID:2892
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 328 -InterruptEvent 300 -NGENProcess 2f8 -Pipe 324 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2716
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 300 -InterruptEvent 330 -NGENProcess 318 -Pipe 308 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      PID:1480
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 330 -InterruptEvent 318 -NGENProcess 328 -Pipe 32c -Comment "NGen Worker Process"
      2⤵
        PID:2976
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 318 -InterruptEvent 338 -NGENProcess 2f8 -Pipe 31c -Comment "NGen Worker Process"
        2⤵
        • Loads dropped DLL
        • Drops file in Windows directory
        PID:1616
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 338 -InterruptEvent 2f8 -NGENProcess 330 -Pipe 334 -Comment "NGen Worker Process"
        2⤵
        • System Location Discovery: System Language Discovery
        PID:2024
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2f8 -InterruptEvent 320 -NGENProcess 33c -Pipe 300 -Comment "NGen Worker Process"
        2⤵
        • Loads dropped DLL
        • Drops file in Windows directory
        PID:2504
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 320 -InterruptEvent 33c -NGENProcess 338 -Pipe 30c -Comment "NGen Worker Process"
        2⤵
        • System Location Discovery: System Language Discovery
        PID:2900
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 33c -InterruptEvent 348 -NGENProcess 330 -Pipe 318 -Comment "NGen Worker Process"
        2⤵
        • Loads dropped DLL
        • Drops file in Windows directory
        PID:236
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 348 -InterruptEvent 330 -NGENProcess 320 -Pipe 344 -Comment "NGen Worker Process"
        2⤵
        • System Location Discovery: System Language Discovery
        PID:2124
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 330 -InterruptEvent 350 -NGENProcess 338 -Pipe 2f8 -Comment "NGen Worker Process"
        2⤵
        • Loads dropped DLL
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        PID:2344
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 350 -InterruptEvent 338 -NGENProcess 348 -Pipe 34c -Comment "NGen Worker Process"
        2⤵
        • System Location Discovery: System Language Discovery
        PID:1696
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 338 -InterruptEvent 358 -NGENProcess 320 -Pipe 33c -Comment "NGen Worker Process"
        2⤵
        • Loads dropped DLL
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        PID:1664
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 358 -InterruptEvent 320 -NGENProcess 350 -Pipe 354 -Comment "NGen Worker Process"
        2⤵
        • Modifies data under HKEY_USERS
        PID:2720
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 320 -InterruptEvent 360 -NGENProcess 348 -Pipe 330 -Comment "NGen Worker Process"
        2⤵
        • System Location Discovery: System Language Discovery
        PID:2712
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 360 -InterruptEvent 364 -NGENProcess 35c -Pipe 268 -Comment "NGen Worker Process"
        2⤵
          PID:1760
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
          C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 364 -InterruptEvent 368 -NGENProcess 320 -Pipe 358 -Comment "NGen Worker Process"
          2⤵
            PID:2260
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
            C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 368 -InterruptEvent 338 -NGENProcess 35c -Pipe 340 -Comment "NGen Worker Process"
            2⤵
            • Loads dropped DLL
            • Drops file in Windows directory
            • System Location Discovery: System Language Discovery
            PID:3016
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
            C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 338 -InterruptEvent 35c -NGENProcess 364 -Pipe 360 -Comment "NGen Worker Process"
            2⤵
            • Loads dropped DLL
            • Drops file in Windows directory
            • System Location Discovery: System Language Discovery
            PID:1612
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
            C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 35c -InterruptEvent 364 -NGENProcess 328 -Pipe 320 -Comment "NGen Worker Process"
            2⤵
              PID:2080
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
              C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 364 -InterruptEvent 378 -NGENProcess 370 -Pipe 350 -Comment "NGen Worker Process"
              2⤵
                PID:2404
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 378 -InterruptEvent 370 -NGENProcess 36c -Pipe 380 -Comment "NGen Worker Process"
                2⤵
                • Modifies data under HKEY_USERS
                PID:2268
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 370 -InterruptEvent 368 -NGENProcess 37c -Pipe 338 -Comment "NGen Worker Process"
                2⤵
                • System Location Discovery: System Language Discovery
                PID:2408
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 370 -InterruptEvent 11c -NGENProcess 378 -Pipe 364 -Comment "NGen Worker Process"
                2⤵
                • System Location Discovery: System Language Discovery
                PID:1216
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 328 -InterruptEvent 384 -NGENProcess 374 -Pipe 370 -Comment "NGen Worker Process"
                2⤵
                • System Location Discovery: System Language Discovery
                PID:1704
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 384 -InterruptEvent 35c -NGENProcess 378 -Pipe 37c -Comment "NGen Worker Process"
                2⤵
                  PID:2832
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                  C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 35c -InterruptEvent 388 -NGENProcess 11c -Pipe 36c -Comment "NGen Worker Process"
                  2⤵
                  • System Location Discovery: System Language Discovery
                  PID:2796
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                  C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 388 -InterruptEvent 11c -NGENProcess 328 -Pipe 390 -Comment "NGen Worker Process"
                  2⤵
                  • System Location Discovery: System Language Discovery
                  PID:892
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                  C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 11c -InterruptEvent 118 -NGENProcess 38c -Pipe 368 -Comment "NGen Worker Process"
                  2⤵
                    PID:1616
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                    C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 118 -InterruptEvent 394 -NGENProcess 35c -Pipe 348 -Comment "NGen Worker Process"
                    2⤵
                    • System Location Discovery: System Language Discovery
                    PID:2760
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                    C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 394 -InterruptEvent 398 -NGENProcess 328 -Pipe 374 -Comment "NGen Worker Process"
                    2⤵
                    • System Location Discovery: System Language Discovery
                    PID:1540
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                    C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 398 -InterruptEvent 39c -NGENProcess 38c -Pipe 384 -Comment "NGen Worker Process"
                    2⤵
                    • System Location Discovery: System Language Discovery
                    PID:2388
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                    C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 39c -InterruptEvent 3a0 -NGENProcess 35c -Pipe 388 -Comment "NGen Worker Process"
                    2⤵
                    • System Location Discovery: System Language Discovery
                    PID:2104
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                    C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3a0 -InterruptEvent 3a4 -NGENProcess 328 -Pipe 11c -Comment "NGen Worker Process"
                    2⤵
                    • System Location Discovery: System Language Discovery
                    PID:3040
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                    C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3a4 -InterruptEvent 3a8 -NGENProcess 38c -Pipe 118 -Comment "NGen Worker Process"
                    2⤵
                    • System Location Discovery: System Language Discovery
                    • Modifies data under HKEY_USERS
                    PID:2004
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                    C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3a8 -InterruptEvent 3ac -NGENProcess 35c -Pipe 394 -Comment "NGen Worker Process"
                    2⤵
                      PID:584
                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3ac -InterruptEvent 3b0 -NGENProcess 328 -Pipe 398 -Comment "NGen Worker Process"
                      2⤵
                        PID:2416
                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3b0 -InterruptEvent 3b4 -NGENProcess 38c -Pipe 39c -Comment "NGen Worker Process"
                        2⤵
                          PID:2676
                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                          C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3b4 -InterruptEvent 3b8 -NGENProcess 35c -Pipe 3a0 -Comment "NGen Worker Process"
                          2⤵
                            PID:2468
                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                            C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3b8 -InterruptEvent 3bc -NGENProcess 328 -Pipe 3a4 -Comment "NGen Worker Process"
                            2⤵
                              PID:2240
                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                              C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3bc -InterruptEvent 3c0 -NGENProcess 38c -Pipe 3a8 -Comment "NGen Worker Process"
                              2⤵
                                PID:664
                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3c0 -InterruptEvent 3c4 -NGENProcess 35c -Pipe 3ac -Comment "NGen Worker Process"
                                2⤵
                                • System Location Discovery: System Language Discovery
                                PID:1672
                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3c8 -InterruptEvent 3bc -NGENProcess 3cc -Pipe 3c0 -Comment "NGen Worker Process"
                                2⤵
                                • Modifies data under HKEY_USERS
                                PID:2756
                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3bc -InterruptEvent 3b0 -NGENProcess 35c -Pipe 3b4 -Comment "NGen Worker Process"
                                2⤵
                                • System Location Discovery: System Language Discovery
                                • Modifies data under HKEY_USERS
                                PID:2576
                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3b0 -InterruptEvent 328 -NGENProcess 3c4 -Pipe 3d4 -Comment "NGen Worker Process"
                                2⤵
                                • System Location Discovery: System Language Discovery
                                • Modifies data under HKEY_USERS
                                PID:2980
                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 328 -InterruptEvent 378 -NGENProcess 3d0 -Pipe 3b8 -Comment "NGen Worker Process"
                                2⤵
                                • System Location Discovery: System Language Discovery
                                • Modifies data under HKEY_USERS
                                PID:1552
                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 328 -InterruptEvent 3d0 -NGENProcess 378 -Pipe 3d8 -Comment "NGen Worker Process"
                                2⤵
                                • System Location Discovery: System Language Discovery
                                • Modifies data under HKEY_USERS
                                PID:2056
                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3d0 -InterruptEvent 3dc -NGENProcess 3c4 -Pipe 3c8 -Comment "NGen Worker Process"
                                2⤵
                                • System Location Discovery: System Language Discovery
                                • Modifies data under HKEY_USERS
                                PID:1020
                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3dc -InterruptEvent 3e0 -NGENProcess 38c -Pipe 3bc -Comment "NGen Worker Process"
                                2⤵
                                • System Location Discovery: System Language Discovery
                                • Modifies data under HKEY_USERS
                                PID:3008
                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3e0 -InterruptEvent 3e4 -NGENProcess 378 -Pipe 3b0 -Comment "NGen Worker Process"
                                2⤵
                                • System Location Discovery: System Language Discovery
                                • Modifies data under HKEY_USERS
                                PID:1944
                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3e4 -InterruptEvent 3d0 -NGENProcess 3c4 -Pipe 3ec -Comment "NGen Worker Process"
                                2⤵
                                • Modifies data under HKEY_USERS
                                PID:1464
                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3d0 -InterruptEvent 35c -NGENProcess 3e8 -Pipe 328 -Comment "NGen Worker Process"
                                2⤵
                                • Modifies data under HKEY_USERS
                                PID:2584
                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 35c -InterruptEvent 3f0 -NGENProcess 378 -Pipe 3cc -Comment "NGen Worker Process"
                                2⤵
                                • Modifies data under HKEY_USERS
                                PID:2916
                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3f0 -InterruptEvent 3f4 -NGENProcess 3c4 -Pipe 3dc -Comment "NGen Worker Process"
                                2⤵
                                • Modifies data under HKEY_USERS
                                PID:1608
                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3f4 -InterruptEvent 3f8 -NGENProcess 3e8 -Pipe 3e0 -Comment "NGen Worker Process"
                                2⤵
                                • Loads dropped DLL
                                • Drops file in Windows directory
                                • System Location Discovery: System Language Discovery
                                • Modifies data under HKEY_USERS
                                PID:2832
                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3f8 -InterruptEvent 3e8 -NGENProcess 3f0 -Pipe 378 -Comment "NGen Worker Process"
                                2⤵
                                • System Location Discovery: System Language Discovery
                                PID:364
                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3e8 -InterruptEvent 404 -NGENProcess 3c4 -Pipe 3d0 -Comment "NGen Worker Process"
                                2⤵
                                  PID:2748
                                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                  C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 404 -InterruptEvent 3c4 -NGENProcess 3f8 -Pipe 3fc -Comment "NGen Worker Process"
                                  2⤵
                                    PID:3024
                                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                    C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3c4 -InterruptEvent 27c -NGENProcess 2a8 -Pipe 1ec -Comment "NGen Worker Process"
                                    2⤵
                                      PID:2504
                                  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
                                    C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
                                    1⤵
                                    • Executes dropped EXE
                                    • Drops file in Windows directory
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:2464
                                    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
                                      C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 1dc -InterruptEvent 1c8 -NGENProcess 1cc -Pipe 1d8 -Comment "NGen Worker Process"
                                      2⤵
                                      • Executes dropped EXE
                                      PID:612
                                    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
                                      C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 244 -InterruptEvent 1c8 -NGENProcess 1cc -Pipe 1dc -Comment "NGen Worker Process"
                                      2⤵
                                      • Executes dropped EXE
                                      PID:2496
                                  • C:\Windows\ehome\ehRecvr.exe
                                    C:\Windows\ehome\ehRecvr.exe
                                    1⤵
                                    • Executes dropped EXE
                                    • Modifies data under HKEY_USERS
                                    PID:2272
                                  • C:\Windows\ehome\ehsched.exe
                                    C:\Windows\ehome\ehsched.exe
                                    1⤵
                                    • Executes dropped EXE
                                    PID:320
                                  • C:\Windows\eHome\EhTray.exe
                                    "C:\Windows\eHome\EhTray.exe" /nav:-2
                                    1⤵
                                    • Suspicious use of AdjustPrivilegeToken
                                    • Suspicious use of FindShellTrayWindow
                                    • Suspicious use of SendNotifyMessage
                                    PID:1748
                                  • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                                    "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                                    1⤵
                                    • Executes dropped EXE
                                    PID:1680
                                  • C:\Windows\system32\IEEtwCollector.exe
                                    C:\Windows\system32\IEEtwCollector.exe /V
                                    1⤵
                                    • Executes dropped EXE
                                    PID:2032
                                  • C:\Windows\ehome\ehRec.exe
                                    C:\Windows\ehome\ehRec.exe -Embedding
                                    1⤵
                                    • Suspicious behavior: EnumeratesProcesses
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:2880
                                  • C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE
                                    "C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE" /auditservice
                                    1⤵
                                    • Executes dropped EXE
                                    • Drops file in System32 directory
                                    PID:2920
                                  • C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe
                                    "C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"
                                    1⤵
                                    • Executes dropped EXE
                                    PID:2780
                                  • C:\Program Files (x86)\Common Files\Microsoft Shared\Source Engine\OSE.EXE
                                    "C:\Program Files (x86)\Common Files\Microsoft Shared\Source Engine\OSE.EXE"
                                    1⤵
                                    • Executes dropped EXE
                                    • System Location Discovery: System Language Discovery
                                    PID:2136

                                  Network

                                  MITRE ATT&CK Enterprise v15

                                  Replay Monitor

                                  Loading Replay Monitor...

                                  Downloads

                                  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\ose.exe

                                    Filesize

                                    1.3MB

                                    MD5

                                    03fe00368b8d71bd57baf49167f77f7a

                                    SHA1

                                    2fa38a622b917ccc8025fb178dea809c491e5823

                                    SHA256

                                    3046978357c4ff914bf2e404eb8c589c36e391e1b70f0f6c01d38c7d880443fb

                                    SHA512

                                    24e46513fe0acfb22eddf8d7cd4ec300c083019c82dad25a9027b71ae8ad6c0accdfb6f708d85a7465b776d35dfe093d9db3b844f75d4348fd1f6d4226013368

                                  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\setup.exe

                                    Filesize

                                    1.6MB

                                    MD5

                                    e9f387b51e66560d528754d7856e496a

                                    SHA1

                                    81f9e6b7ffc61dfbe0f25253736ea29cfab58827

                                    SHA256

                                    60b1a992c87d94d8650fe161c1a4809c49b4eeee6eb5accf2d7603625cc6e3a6

                                    SHA512

                                    45616ca46eeb09876560d105fb5e5cceff2f364b0cca1e7d91fe0416ae02285ddd08a163b2cf1047f407f4906d962b67e734d648bdddfd90feeb150c1d434100

                                  • C:\MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\DW20.EXE

                                    Filesize

                                    1.3MB

                                    MD5

                                    6501eeb1edfe0d719c14a7e72c4546c3

                                    SHA1

                                    9751dbf447986775ffa51a3ec39264b6f01bbed1

                                    SHA256

                                    f6b9671fe6ebb9675d58317e84deda6db1d06d2c2fc8e738ef1547a52fcfa4c1

                                    SHA512

                                    fee9a884a5db31c7f9974a22e8baa04998323a93184c76d60fe771c11b09af42068095dde074f57bc45ce24bc6542ce48997dc498b7eca61b872f9da404f7ae3

                                  • C:\MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\dwtrig20.exe

                                    Filesize

                                    1.7MB

                                    MD5

                                    eec1d847488393aa551d2508745cafa1

                                    SHA1

                                    9814b1a6d0ca451f138fdbd771792104b1b6e041

                                    SHA256

                                    12f44a6b17e8a7ff57de60059feaaa0dfd9c7f1be46beb528f8125236a251f3c

                                    SHA512

                                    9c362c8b12bb6aa1bf4c508c0d972acd1450606e3290b068acf42349c836602e624b1feb6b9248e664478496d0df53a2c8f54cd25f9a3f76ee2081cc60f4a03f

                                  • C:\Program Files (x86)\Common Files\microsoft shared\Source Engine\OSE.EXE

                                    Filesize

                                    1.3MB

                                    MD5

                                    1045b44363f58d6ef05c6b2022814b69

                                    SHA1

                                    904a18140cc1c29ef16de919ffd7a1e77ada14d9

                                    SHA256

                                    3f66b58afff2aed1c67652fc03fddcb8a7f1b4b23968307fa134f5ef7c3f4df8

                                    SHA512

                                    d5be7a8d253137c985216b5702e092e99fbdcb1d32e9201a53914daeee279fbda55b02cc113d0c04f42d46b350a6dd691b4a903325184be8e7f12b883ea2ff2c

                                  • C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE

                                    Filesize

                                    30.1MB

                                    MD5

                                    d62792ad05e4acad329479f565ac61c1

                                    SHA1

                                    974fc0d3367d415fba9268928e65ba5827fdbea8

                                    SHA256

                                    39778a8df0be41531376bfcc065ef36c30820668338c9a9627800fda2739d7c5

                                    SHA512

                                    86362370899f79ba4316a51fe446c4a543a0912df5604b9e4570c1565c892d95ad2ecfa25c25d61a0059201ebe1eee3b731012f75c08041152936013550ee3fc

                                  • C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe

                                    Filesize

                                    1.4MB

                                    MD5

                                    03eaabfa306f81297876faadc700e536

                                    SHA1

                                    f97aa32909fcfaf44f88fe4002d9c352c55c7165

                                    SHA256

                                    023c5d52087f5d7b899b2788c3ea0a662e7c053daeaf604fd3e90235e55949c1

                                    SHA512

                                    9592a4a866a49b706bafd4eb9a83674ec9716ed6005e2c318152d500f07d156feb322ad78211da313d4615d897bccfb79f27bca5b73af7ae41ef01ec3193b57f

                                  • C:\Program Files\7-Zip\7z.exe

                                    Filesize

                                    1.7MB

                                    MD5

                                    2cdd26179b323372e0e001ed8e467173

                                    SHA1

                                    e53c83c22314bacecab5c06cb4ae12cf46442cd7

                                    SHA256

                                    c00503c7054b782ad10c05bf8fff948b76bf5de379e9146d72b15e55026645b0

                                    SHA512

                                    8d628b76cd27e7a9964b43b336be5b0d304b4cc919309e4f49faf81bf8140e7af7dffee96a9c396f70893464c18ab6e900c9271e9bac2e07c00e366d7f3825c7

                                  • C:\Program Files\7-Zip\7zFM.exe

                                    Filesize

                                    1.5MB

                                    MD5

                                    e89018709624a7f2cf464e0e1bf089b1

                                    SHA1

                                    a66bbb1edd76c07c5652949e90d67e085caaa953

                                    SHA256

                                    d80039508877a43cf9cb185789be2013e4534b5f878542e36c6fa7730d6f4d17

                                    SHA512

                                    a4a1722fae5ff10f6e71c3ee85a69f1610702d6e02390cfabdbc790ea57c6b67b36a510a8248f8068d05c896659440c6eddea6a4bb217da59f6c4949e5b3f37a

                                  • C:\Program Files\7-Zip\7zG.exe

                                    Filesize

                                    1.2MB

                                    MD5

                                    186e3c7a0a1de5d48d7e1331f8a28046

                                    SHA1

                                    a4d04baac3c6511c17f5172cb7597bbc56e5bafe

                                    SHA256

                                    b3524ed22b363b05405aa3bf5f13aa6346fcb7f90759955d8adc5c21b55e6d11

                                    SHA512

                                    9ed916fd485b0194ab105e3debcea58e12dec5e2f527c81ebd841a33f5b6710014875d007369fcc8aec154c8655b2e9d76e69fa8c59186159e1397776c799533

                                  • C:\Program Files\7-Zip\Uninstall.exe

                                    Filesize

                                    1.2MB

                                    MD5

                                    f2977fa7266e17a23808ffccf8f3a3b7

                                    SHA1

                                    51c5c2e61842cb1210a14a00a9341a2ba1c0942d

                                    SHA256

                                    16e073da73b293923ca18864ed92f01379e60462231c315e59250fe197aad1ed

                                    SHA512

                                    615aadd13907162d7c1caf54557be56a7f776f12346805063db670eebf5fa35e706b1961afc9888b3a4a7e6136035d554ff08112ad537de84e6076cfd16d971d

                                  • C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\chrmstp.exe

                                    Filesize

                                    4.8MB

                                    MD5

                                    b8b5332b5e33e9db2f8412e7ba5defd0

                                    SHA1

                                    416520955368ee9fc9404ceda5b0a795bb58e2ef

                                    SHA256

                                    8b35b16816ff35777b1d5b3413619d71723d499254d657aec4caddda086e5a5f

                                    SHA512

                                    a70c3b20fc3cdb786720421f3ec10ecefe50b14c35123875a55611744700f9133797eba13514f50af6d8ed8abafbbdfe869596989d9830b25f067e0e71b973f6

                                  • C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe

                                    Filesize

                                    4.8MB

                                    MD5

                                    e6c4d63d2beaccf724dc4c49a6551fd2

                                    SHA1

                                    446ee77dd97c756ab0ec13cb740ffe33f0398723

                                    SHA256

                                    4a54d271c3c7fd1f301c92484ba57cc894492a6ee66c12cc5d36db8f76318f76

                                    SHA512

                                    040b84af9a10b33de4a66979c7b134d8f403ded4a16383c97d5dd4f058104394a56153980b5facb2d5abfb2c20ec60ae8da319a12bfb8ed0f8ff7f2e035252a6

                                  • C:\Program Files\Google\Chrome\Application\106.0.5249.119\chrome_pwa_launcher.exe

                                    Filesize

                                    2.2MB

                                    MD5

                                    a1d20f7460dcd62bab06c11356ee2fc6

                                    SHA1

                                    87f37db6fabd826610849c425a0845e52b43df54

                                    SHA256

                                    2a12e16c094770afc943c3db84ea1003ed019cd57c6d5129583a1ad2fa4d5836

                                    SHA512

                                    17667ceb767ca5e90281d0d1dadb055a7440d4f3af424342dd49574a5a7c5674c429cd8c7f110bb49d9df25ab03ad7929a33e889aa3eea65e1a616a6e603a339

                                  • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe

                                    Filesize

                                    2.1MB

                                    MD5

                                    ad2058960b560ec6a91f569a3c352537

                                    SHA1

                                    78fddb4e5b8861bc7287b9329c7f39d2a378f096

                                    SHA256

                                    603ceb9b6540662eb99ac26510f9074ba36a28d1174de5b4620c0c5a6397cae5

                                    SHA512

                                    080f570b449dece7e49e79a07d66abdfbd2699d826a4e21a7193e1a4d27ac89603cb160763fe5a7576230a4486106e18ecffce96c915c856fb4291c59d694895

                                  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b91050d8b077a4e8.customDestinations-ms

                                    Filesize

                                    24B

                                    MD5

                                    b9bd716de6739e51c620f2086f9c31e4

                                    SHA1

                                    9733d94607a3cba277e567af584510edd9febf62

                                    SHA256

                                    7116ff028244a01f3d17f1d3bc2e1506bc9999c2e40e388458f0cccc4e117312

                                    SHA512

                                    cef609e54c7a81a646ad38dba7ac0b82401b220773b9c792cefac80c6564753229f0c011b34ffb56381dd3154a19aee2bf5f602c4d1af01f2cf0fbc1574e4478

                                  • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ngen_service.log

                                    Filesize

                                    872KB

                                    MD5

                                    42386604e5c4ad8409844c66229abf03

                                    SHA1

                                    fbffceee3a78eccd687f4a5b44080751b56b2653

                                    SHA256

                                    dbd36bbc626687a235a6e0e6a6b07ef607e5d024ecc27f3f2462aef9a36e256a

                                    SHA512

                                    9a26ef714be5fa9f82c63e673507e1610d720ff933d631df971547255c659f25b5c8feb11c0755014b47e7cbcc6cc82619ddfdd3da24739f9b87fa350025ca3c

                                  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe

                                    Filesize

                                    1.3MB

                                    MD5

                                    804016cd542f051b145eba151f277b23

                                    SHA1

                                    c24272a8b0a3fa03848d39a9bced6b67bf534ef9

                                    SHA256

                                    2ec196c2df68f7fe5573cb051d9c3559bc1cf5b6525e6d171dca9169cd8c10a4

                                    SHA512

                                    794fb9ab53f1e2b19c46b8bdca2dc504e3c6736dc07cad564b1d5871b55912695c5d0f0ba4dab8f3a1ab541b1c8235d837001135e77e865b599b4a5de2f17563

                                  • C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe

                                    Filesize

                                    1.2MB

                                    MD5

                                    708a11dfe9e65b4ff79f3e828cf21d58

                                    SHA1

                                    a1c464cadf851cb646eb6b20c56d62eabfae378c

                                    SHA256

                                    9123b22bae2efb554107c64393ad4c6e4ca165e7adeb45daaa12906490353e63

                                    SHA512

                                    8db19025907040e44884a603da31ec105786d05609367066fc8ad20ec9fda95822f069117e913585c5d0bbd9d6d7be88f306ff5e42867aace34089c7d9189989

                                  • C:\Windows\Microsoft.NET\Framework\v2.0.50727\ngen_service.log

                                    Filesize

                                    1003KB

                                    MD5

                                    82f61ffdcfba75e98196291a4116a1ac

                                    SHA1

                                    2ef771923a3d94f0145d26366cc80bbbce961eb4

                                    SHA256

                                    c71ac79c1b4f013c893842e29941fab9714b7c21f28475f49d98117333d8429a

                                    SHA512

                                    8d6efd5f5c5acbf307599f4366a3efe51e79e65e072a3a45ec86375f6df2ef6e009dbacf7cf7402fed7bc082d4fffa2281c92aa66011e5b4a2986dd42e9436ee

                                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe

                                    Filesize

                                    1.3MB

                                    MD5

                                    e9382e46b28ae312be22778b2ee75e4c

                                    SHA1

                                    efa495e701af2636be308bb86bd8fddd4f51e421

                                    SHA256

                                    7316c45cd52e8bed14fda504065493ad6ed8d545996d979375f254b7c688bdd8

                                    SHA512

                                    4f985640223506b3ee3d74de476910c7afed0b20c5481ea2e86d9bb90900e2b537179a0304dde6740cf229e949f47e035429644d1f8140dd790b1b114d50be04

                                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen_service.log

                                    Filesize

                                    8KB

                                    MD5

                                    85f7702c783ad186ea73c8aaa6b1b7d0

                                    SHA1

                                    9c1915242e1136def1e9859a93763060f2eaf96f

                                    SHA256

                                    6290fbd55483f6d12dab9e34ff68b0c0a3be34cdeb64dbefdbf22a97fbb879f1

                                    SHA512

                                    3850f5bc00c49ed4f92ab7db4acdda83431853f3c932d3a0e4abe92a7334e04ecee358c339242c66d368b7572031c2915a80496821f932204c452d58aed8ed6d

                                  • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.Office.To#\5766ec3721d18a48bec1ca1f60331e2d\Microsoft.Office.Tools.Common.v9.0.ni.dll

                                    Filesize

                                    797KB

                                    MD5

                                    aeb0b6e6c5d32d1ada231285ff2ae881

                                    SHA1

                                    1f04a1c059503896336406aed1dc93340e90b742

                                    SHA256

                                    4c53ca542ac5ef9d822ef8cb3b0ecef3fb8b937d94c0a7b735bedb275c74a263

                                    SHA512

                                    e55fd4c4d2966b3f0b6e88292fbd6c20ffa34766e076e763442c15212d19b6dea5d9dc9e7c359d999674a5b2c8a3849c2bbaaf83e7aa8c12715028b06b5a48e1

                                  • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.Office.To#\d7be05162f8d0fba8f4447db13f6695b\Microsoft.Office.Tools.Excel.v9.0.ni.dll

                                    Filesize

                                    1.3MB

                                    MD5

                                    006498313e139299a5383f0892c954b9

                                    SHA1

                                    7b3aa10930da9f29272154e2674b86876957ce3a

                                    SHA256

                                    489fec79addba2de9141daa61062a05a95e96a196049ce414807bada572cc35c

                                    SHA512

                                    6a15a10ae66ce0e5b18e060bb53c3108d09f6b07ee2c4a834856f0a35bec2453b32f891620e787731985719831302160678eb52acada102fdb0b87a14288d925

                                  • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.Office.To#\e1f8e4d08d4b7f811b7dbbacd324027b\Microsoft.Office.Tools.v9.0.ni.dll

                                    Filesize

                                    148KB

                                    MD5

                                    ac901cf97363425059a50d1398e3454b

                                    SHA1

                                    2f8bd4ac2237a7b7606cb77a3d3c58051793c5c7

                                    SHA256

                                    f6c7aecb211d9aac911bf80c91e84a47a72ac52cbb523e34e9da6482c0b24c58

                                    SHA512

                                    6a340b6d5fa8e214f2a58d8b691c749336df087fa75bcc8d8c46f708e4b4ff3d68a61a17d13ee62322b75cbc61d39f5a572588772f3c5d6e5ff32036e5bc5a00

                                  • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\0204c4b34e25f2c9881634e6a8826145\Microsoft.VisualStudio.Tools.Office.Outlook.HostAdapter.v10.0.ni.dll

                                    Filesize

                                    83KB

                                    MD5

                                    7d20892f49d20510b873005778f448ea

                                    SHA1

                                    a1566effd70c74ddb93b60416ed4b23acba5c612

                                    SHA256

                                    d3fc8a60e1839a0d2b498719faf5ca4361adc7a9d39ad93cdeba4a2addaf7ed5

                                    SHA512

                                    719ca76db87150e472ec15089f4f51e936a656bdf808d9a604cb7aad479305dab1d175130698060eb9fd6abbcebabc6849dd6e361195cb6cd27fd45871d5425d

                                  • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\03cad6bd8b37d21b28dcb4f955be2158\Microsoft.VisualStudio.Tools.Applications.Contract.v9.0.ni.dll

                                    Filesize

                                    34KB

                                    MD5

                                    c26b034a8d6ab845b41ed6e8a8d6001d

                                    SHA1

                                    3a55774cf22d3244d30f9eb5e26c0a6792a3e493

                                    SHA256

                                    620b41f5e02df56c33919218bedc238ca7e76552c43da4f0f39a106835a4edc3

                                    SHA512

                                    483424665c3bc79aeb1de6dfdd633c8526331c7b271b1ea6fe93ab298089e2aceefe7f9c7d0c6e33e604ca7b2ed62e7bb586147fecdf9a0eea60e8c03816f537

                                  • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\0cb958acb9cd4cacb46ebc0396e30aa3\Microsoft.VisualStudio.Tools.Office.Contract.v9.0.ni.dll

                                    Filesize

                                    109KB

                                    MD5

                                    0fd0f978e977a4122b64ae8f8541de54

                                    SHA1

                                    153d3390416fdeba1b150816cbbf968e355dc64f

                                    SHA256

                                    211d2b83bb82042385757f811d90c5ae0a281f3abb3bf1c7901e8559db479e60

                                    SHA512

                                    ceddfc031bfe4fcf5093d0bbc5697b5fb0cd69b03bc32612325a82ea273dae5daff7e670b0d45816a33307b8b042d27669f5d5391cb2bdcf3e5a0c847c6dcaa8

                                  • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\367516b7878af19f5c84c67f2cd277ae\Microsoft.VisualStudio.Tools.Office.Word.AddInAdapter.v9.0.ni.dll

                                    Filesize

                                    41KB

                                    MD5

                                    3c269caf88ccaf71660d8dc6c56f4873

                                    SHA1

                                    f9481bf17e10fe1914644e1b590b82a0ecc2c5c4

                                    SHA256

                                    de21619e70f9ef8ccbb274bcd0d9d2ace1bae0442dfefab45976671587cf0a48

                                    SHA512

                                    bd5be3721bf5bd4001127e0381a0589033cb17aa35852f8f073ba9684af7d8c5a0f3ee29987b345fc15fdf28c5b56686087001ef41221a2cfb16498cf4c016c6

                                  • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\3f879096d16bffa16dacb5d38152f8cd\Microsoft.VisualStudio.Tools.Office.Word.HostAdapter.v10.0.ni.dll

                                    Filesize

                                    187KB

                                    MD5

                                    82f63c73c502822adb0099a1560de64b

                                    SHA1

                                    abc4e6a5121c519f89cd3e0ab2befddb32e5f599

                                    SHA256

                                    32282df63f8d87fd9d693987e1baef58c2822bcc25ab47bcae2d8d7a4ba6978d

                                    SHA512

                                    e699084e168af11a20715dcbf076aa7f90ab950df7c5626bf84e95648d6bf646de5c05803e03ab2a9cb1816b3ea6f3272d24245841f2560fa8544f608bb1465a

                                  • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\4cffbd6c354740026d7a3a29dd63e3bc\Microsoft.VisualStudio.Tools.Office.HostAdapter.v10.0.ni.dll

                                    Filesize

                                    143KB

                                    MD5

                                    1fa4c663eb7f4f3f5e7547c8d2849c90

                                    SHA1

                                    7a2e4dc0eacfaab69d5ddfcbf9fcec8ff55b035f

                                    SHA256

                                    3febbc6242bafabbb51659ed696758cc75dadcb7ffc8217b8a032590d97d9166

                                    SHA512

                                    3a40a81785cf707abfb6b5f88b98e6cf413391b4098d1199a1cb7f030fa2e45c3c8502ae6baa7ff56f1476ee700d5f126c14a99433802a1dd328cd66bd9dfdd9

                                  • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\8c6bac317f75b51647ea3a8da141b143\Microsoft.VisualStudio.Tools.Office.AddInAdapter.v9.0.ni.dll

                                    Filesize

                                    210KB

                                    MD5

                                    4f40997b51420653706cb0958086cd2d

                                    SHA1

                                    0069b956d17ce7d782a0e054995317f2f621b502

                                    SHA256

                                    8cd6a0b061b43e0b660b81859c910290a3672b00d7647ba0e86eda6ddcc8c553

                                    SHA512

                                    e18953d7a348859855e5f6e279bc9924fc3707b57a733ce9b8f7d21bd631d419f1ebfb29202608192eb346569ca9a55264f5b4c2aedd474c22060734a68a4ee6

                                  • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\9306fc630870a75ddd23441ad77bdc57\Microsoft.VisualStudio.Tools.Applications.Runtime.v10.0.ni.dll

                                    Filesize

                                    53KB

                                    MD5

                                    e3a7a2b65afd8ab8b154fdc7897595c3

                                    SHA1

                                    b21eefd6e23231470b5cf0bd0d7363879a2ed228

                                    SHA256

                                    e5faf5e8adf46a8246e6b5038409dadca46985a9951343a1936237d2c8d7a845

                                    SHA512

                                    6537c7ed398deb23be1256445297cb7c8d7801bf6e163d918d8e258213708b28f7255ecff9fbd3431d8f5e5a746aa95a29d3a777b28fcd688777aed6d8205a33

                                  • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\afa5bb1a39443d7dc81dfff54073929b\Microsoft.VisualStudio.Tools.Office.Contract.v10.0.ni.dll

                                    Filesize

                                    28KB

                                    MD5

                                    aefc3f3c8e7499bad4d05284e8abd16c

                                    SHA1

                                    7ab718bde7fdb2d878d8725dc843cfeba44a71f7

                                    SHA256

                                    4436550409cfb3d06b15dd0c3131e87e7002b0749c7c6e9dc3378c99dbec815d

                                    SHA512

                                    1d7dbc9764855a9a1f945c1bc8e86406c0625f1381d71b3ea6924322fbe419d1c70c3f3efd57ee2cb2097bb9385e0bf54965ab789328a80eb4946849648fe20b

                                  • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\d65a332484d5e6f9dfc625b3a3a6d668\Microsoft.VisualStudio.Tools.Office.Excel.HostAdapter.v10.0.ni.dll

                                    Filesize

                                    180KB

                                    MD5

                                    cd08f54589a07dd3cd306db76921597e

                                    SHA1

                                    0abf0a8b182df3a54ee9d96fb8d84ee06131b0c2

                                    SHA256

                                    48ff64cc35648593eccc7d220a47102941d2607175bece03f260783a843d0e23

                                    SHA512

                                    11511508441098b5c982f47cec39e06f10c65fb17b606559bd358e6dc4ed401481c07afd09c92b57172a5a6754be60b7298ad79d6dcb44ea6e67bf3564e28398

                                  • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\de06a98a598aa0ff716a25b24d56ad7f\Microsoft.VisualStudio.Tools.Applications.Contract.v10.0.ni.dll

                                    Filesize

                                    27KB

                                    MD5

                                    9c60454398ce4bce7a52cbda4a45d364

                                    SHA1

                                    da1e5de264a6f6051b332f8f32fa876d297bf620

                                    SHA256

                                    edc90887d38c87282f49adbb12a94040f9ac86058bfae15063aaaff2672b54e1

                                    SHA512

                                    533b7e9c55102b248f4a7560955734b4156eb4c02539c6f978aeacecff1ff182ba0f04a07d32ed90707a62d73191b0e2d2649f38ae1c3e7a5a4c0fbea9a94300

                                  • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\e0220058091b941725ef02be0b84abe7\Microsoft.VisualStudio.Tools.Applications.HostAdapter.v10.0.ni.dll

                                    Filesize

                                    57KB

                                    MD5

                                    6eaaa1f987d6e1d81badf8665c55a341

                                    SHA1

                                    e52db4ad92903ca03a5a54fdb66e2e6fad59efd5

                                    SHA256

                                    4b78ffa5f0b6751aea11917db5961d566e2f59beaa054b41473d331fd392329e

                                    SHA512

                                    dbedfa6c569670c22d34d923e22b7dae7332b932b809082dad87a1f0bb125c912db37964b5881667867ccf23dc5e5be596aad85485746f8151ce1c51ffd097b2

                                  • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\ee73646032cbb022d16771203727e3b2\Microsoft.VisualStudio.Tools.Applications.Runtime.v9.0.ni.dll

                                    Filesize

                                    130KB

                                    MD5

                                    2735d2ab103beb0f7c1fbd6971838274

                                    SHA1

                                    6063646bc072546798bf8bf347425834f2bfad71

                                    SHA256

                                    f00156860ec7e88f4ccb459ca29b7e0e5c169cdc8a081cb043603187d25d92b3

                                    SHA512

                                    fe2ce60c7f61760a29344e254771d48995e983e158da0725818f37441f9690bda46545bf10c84b163f6afb163ffb504913d6ffddf84f72b062c7f233aed896de

                                  • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\f1a7ac664667f2d6bcd6c388b230c22b\Microsoft.VisualStudio.Tools.Applications.AddInAdapter.v9.0.ni.dll

                                    Filesize

                                    59KB

                                    MD5

                                    8c69bbdfbc8cc3fa3fa5edcd79901e94

                                    SHA1

                                    b8028f0f557692221d5c0160ec6ce414b2bdf19b

                                    SHA256

                                    a21471690e7c32c80049e17c13624820e77bca6c9c38b83d9ea8a7248086660d

                                    SHA512

                                    825f5b87b76303b62fc16a96b108fb1774c2aca52ac5e44cd0ac2fe2ee47d5d67947dfe7498e36bc849773f608ec5824711f8c36e375a378582eefb57c9c2557

                                  • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\fc36797f7054935a6033077612905a0f\Microsoft.VisualStudio.Tools.Office.Excel.AddInAdapter.v9.0.ni.dll

                                    Filesize

                                    42KB

                                    MD5

                                    71d4273e5b77cf01239a5d4f29e064fc

                                    SHA1

                                    e8876dea4e4c4c099e27234742016be3c80d8b62

                                    SHA256

                                    f019899f829731f899a99885fd52fde1fe4a4f6fe3ecf7f7a7cfa78517c00575

                                    SHA512

                                    41fe67cda988c53bd087df6296d1a242cddac688718ea5a5884a72b43e9638538e64d7a59e045c0b4d490496d884cf0ec694ddf7fcb41ae3b8cbc65b7686b180

                                  • C:\Windows\assembly\NativeImages_v2.0.50727_32\ehiVidCtl\88e20c69254157d91b96eadc9444815d\ehiVidCtl.ni.dll

                                    Filesize

                                    855KB

                                    MD5

                                    7812b0a90d92b4812d4063b89a970c58

                                    SHA1

                                    3c4a789b8d28a5bfa6a6191624e33b8f40e4c4ea

                                    SHA256

                                    897626e6af00e85e627eeaa7f9563b245335242bc6196b36d0072e5b6d45e543

                                    SHA512

                                    634a2395bada9227b1957f2b76ed7e19f12bfc4d71a145d182602a1b6e24d83e220ebfabd602b1995c360e1725a38a89ff58417b0295bb0da9ea35c41c21a6ed

                                  • C:\Windows\assembly\NativeImages_v2.0.50727_32\stdole\2c6d60b55bbab22515c512080d4b3bae\stdole.ni.dll

                                    Filesize

                                    43KB

                                    MD5

                                    3e72bdd0663c5b2bcd530f74139c83e3

                                    SHA1

                                    66069bcac0207512b9e07320f4fa5934650677d2

                                    SHA256

                                    6a6ac3094130d1affd34aae5ba2bd8c889e2071eb4217a75d72b5560f884e357

                                    SHA512

                                    b0a98db477fccae71b4ebfb8525ed52c10f1e7542f955b307f260e27e0758aa22896683302e34b0237e7e3bba9f5193ddcc7ff255c71fbaa1386988b0ec7d626

                                  • C:\Windows\system32\fxssvc.exe

                                    Filesize

                                    1.2MB

                                    MD5

                                    afa82b30742ef6b9325453a4b7f8b042

                                    SHA1

                                    fa0fca87805e043178645a7ec6797e6ae66e868d

                                    SHA256

                                    495ddc5a97af08aff7b615c9d1dd44a194b5f5ee1afb1422f35ca4cfeca295f3

                                    SHA512

                                    01c2fe2b8de5f4326bdf572af3ccf07cbaec7bcb0fe3ff092b9a7aa9b663af432cbf7ca721169166a7b442e729fec0368f36f37ea3df1b65744a5735da799892

                                  • \Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe

                                    Filesize

                                    1.3MB

                                    MD5

                                    73a1828dc7f3bf83f5f9a4bfd8c9e02d

                                    SHA1

                                    0ad2e1fb00163c932ca2d00870290a2c1ba1831d

                                    SHA256

                                    0712d7815f99ce7fdc533fea5c3c94b22a63b914f924abc150804aadc752f12c

                                    SHA512

                                    21b3b7b78c556b19d801518fae5c3582bb1edf8fe61b9c0b4096aca60c47559dc591a150e198e1d8bc7eef1fc3b8cbc3d7be52599df5fd59c5e3e0d78481b031

                                  • \Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe

                                    Filesize

                                    1.2MB

                                    MD5

                                    0bdea9d5e7ac7014fbba39d91586c5b6

                                    SHA1

                                    f11fac9e436119cd8e0e20c43bb81b7ef28106d8

                                    SHA256

                                    53b9882e5f6c064f231cbd1c01f5cea8f6c74b6353085d0bbc9bdda2728ccf60

                                    SHA512

                                    16e6c7d968275d3df1362bcac62e34c778bfbbe6dde0e1b576e950022437643146910a5037ff45133cfb03a67114ce859cf772579ecd4c5ff485b82e6826a14d

                                  • \Windows\System32\alg.exe

                                    Filesize

                                    1.2MB

                                    MD5

                                    3bdc5f1db2025c730814732596c33449

                                    SHA1

                                    f91b927d2c63dbfa995aeb6777e098bdf745c6ff

                                    SHA256

                                    51048e0c9aa62a977aae8aa0add2f59b71d7f698f209e5d9ee00cc5c9e9e8376

                                    SHA512

                                    ef561b62a96538d1cc6c67085517ad6c35e8e109dce9a085d11aabf16dad9f6486f59111488eca2f13f7a56374fe3c9213f6a8e46e04581928035ed719cc1b49

                                  • \Windows\System32\ieetwcollector.exe

                                    Filesize

                                    1.3MB

                                    MD5

                                    1e22b8f415a9650848655ed308969a75

                                    SHA1

                                    93a449b589a19f7cf16c99862a7fc501c33c613c

                                    SHA256

                                    4519d0bccc31d380d9b45c4f07a3aa0c1f6dfad38ae0fc3491ee407808c49f17

                                    SHA512

                                    210d27a8e7093418a6dd734ca92a4c253b5879d04dd4dd905d30746776e1f4aab6d5f90c66afb0b010d1f89af4ba241562b41ff44a0bc3dd4b98aeaa6e3d5d35

                                  • \Windows\ehome\ehrecvr.exe

                                    Filesize

                                    1.2MB

                                    MD5

                                    65726415af2c2b5b14dd46654f9408ba

                                    SHA1

                                    f80a25cb4e6c625a09d94d0b0782638ac00a94a4

                                    SHA256

                                    5c7dfe35f92c608c937b807d044d0a17ee69231747e77920a0fb2849884c8a70

                                    SHA512

                                    0a7f109121a50fe8b33a2986f4334bbe629a3d46a77c66de6be78e734fb1d264600dc181894d2cb4049bbe831fbe33fa05daf037f006e0379e8925fbd3097436

                                  • \Windows\ehome\ehsched.exe

                                    Filesize

                                    1.3MB

                                    MD5

                                    973182c5b3cbeea8cbe4473bed17bf3f

                                    SHA1

                                    753c59b901a361208acca6e362b934907e574c6c

                                    SHA256

                                    a4ec6d17b17cd7be60410eb5bf794a428ddee46e1c38ab5af7b932055e7e8729

                                    SHA512

                                    be3ca077c4860d3d26566b6ac8ccd363265a59a4c50da7681c136e860e29997a14f61849f86df3f8a33be81f81eb03ba1892e70aac3400cfbe49536b3b75dcf1

                                  • memory/320-171-0x0000000000850000-0x00000000008B0000-memory.dmp

                                    Filesize

                                    384KB

                                  • memory/320-181-0x0000000140000000-0x0000000140150000-memory.dmp

                                    Filesize

                                    1.3MB

                                  • memory/320-177-0x0000000000850000-0x00000000008B0000-memory.dmp

                                    Filesize

                                    384KB

                                  • memory/320-742-0x0000000140000000-0x0000000140150000-memory.dmp

                                    Filesize

                                    1.3MB

                                  • memory/320-405-0x0000000140000000-0x0000000140150000-memory.dmp

                                    Filesize

                                    1.3MB

                                  • memory/612-791-0x0000000140000000-0x000000014014C000-memory.dmp

                                    Filesize

                                    1.3MB

                                  • memory/612-770-0x0000000140000000-0x000000014014C000-memory.dmp

                                    Filesize

                                    1.3MB

                                  • memory/1120-460-0x0000000000400000-0x0000000000547000-memory.dmp

                                    Filesize

                                    1.3MB

                                  • memory/1120-486-0x0000000000400000-0x0000000000547000-memory.dmp

                                    Filesize

                                    1.3MB

                                  • memory/1152-726-0x0000000000400000-0x0000000000547000-memory.dmp

                                    Filesize

                                    1.3MB

                                  • memory/1152-712-0x0000000000400000-0x0000000000547000-memory.dmp

                                    Filesize

                                    1.3MB

                                  • memory/1240-596-0x0000000000400000-0x0000000000547000-memory.dmp

                                    Filesize

                                    1.3MB

                                  • memory/1240-580-0x0000000000400000-0x0000000000547000-memory.dmp

                                    Filesize

                                    1.3MB

                                  • memory/1680-193-0x0000000000400000-0x0000000000460000-memory.dmp

                                    Filesize

                                    384KB

                                  • memory/1680-459-0x0000000140000000-0x0000000140237000-memory.dmp

                                    Filesize

                                    2.2MB

                                  • memory/1680-186-0x0000000140000000-0x0000000140237000-memory.dmp

                                    Filesize

                                    2.2MB

                                  • memory/1680-187-0x0000000000400000-0x0000000000460000-memory.dmp

                                    Filesize

                                    384KB

                                  • memory/1708-95-0x0000000140000000-0x000000014013B000-memory.dmp

                                    Filesize

                                    1.2MB

                                  • memory/1708-290-0x0000000140000000-0x000000014013B000-memory.dmp

                                    Filesize

                                    1.2MB

                                  • memory/1716-737-0x0000000000400000-0x0000000000547000-memory.dmp

                                    Filesize

                                    1.3MB

                                  • memory/1720-851-0x0000000000400000-0x0000000000547000-memory.dmp

                                    Filesize

                                    1.3MB

                                  • memory/1896-571-0x0000000000400000-0x0000000000547000-memory.dmp

                                    Filesize

                                    1.3MB

                                  • memory/1896-546-0x0000000000400000-0x0000000000547000-memory.dmp

                                    Filesize

                                    1.3MB

                                  • memory/2024-871-0x0000000000400000-0x0000000000547000-memory.dmp

                                    Filesize

                                    1.3MB

                                  • memory/2032-280-0x0000000140000000-0x000000014014D000-memory.dmp

                                    Filesize

                                    1.3MB

                                  • memory/2032-797-0x0000000140000000-0x000000014014D000-memory.dmp

                                    Filesize

                                    1.3MB

                                  • memory/2032-480-0x0000000140000000-0x000000014014D000-memory.dmp

                                    Filesize

                                    1.3MB

                                  • memory/2104-121-0x0000000010000000-0x0000000010146000-memory.dmp

                                    Filesize

                                    1.3MB

                                  • memory/2104-112-0x0000000010000000-0x0000000010146000-memory.dmp

                                    Filesize

                                    1.3MB

                                  • memory/2128-556-0x0000000000400000-0x0000000000547000-memory.dmp

                                    Filesize

                                    1.3MB

                                  • memory/2136-544-0x000000002E000000-0x000000002E154000-memory.dmp

                                    Filesize

                                    1.3MB

                                  • memory/2136-320-0x000000002E000000-0x000000002E154000-memory.dmp

                                    Filesize

                                    1.3MB

                                  • memory/2180-861-0x0000000000400000-0x0000000000547000-memory.dmp

                                    Filesize

                                    1.3MB

                                  • memory/2196-104-0x00000000002D0000-0x0000000000337000-memory.dmp

                                    Filesize

                                    412KB

                                  • memory/2196-98-0x0000000010000000-0x000000001013E000-memory.dmp

                                    Filesize

                                    1.2MB

                                  • memory/2196-99-0x00000000002D0000-0x0000000000337000-memory.dmp

                                    Filesize

                                    412KB

                                  • memory/2196-139-0x0000000010000000-0x000000001013E000-memory.dmp

                                    Filesize

                                    1.2MB

                                  • memory/2212-669-0x0000000003CB0000-0x0000000003D6A000-memory.dmp

                                    Filesize

                                    744KB

                                  • memory/2212-668-0x0000000000400000-0x0000000000547000-memory.dmp

                                    Filesize

                                    1.3MB

                                  • memory/2212-680-0x0000000000400000-0x0000000000547000-memory.dmp

                                    Filesize

                                    1.3MB

                                  • memory/2248-0-0x0000000000250000-0x00000000002B7000-memory.dmp

                                    Filesize

                                    412KB

                                  • memory/2248-142-0x0000000000400000-0x00000000005D4000-memory.dmp

                                    Filesize

                                    1.8MB

                                  • memory/2248-6-0x0000000000250000-0x00000000002B7000-memory.dmp

                                    Filesize

                                    412KB

                                  • memory/2248-267-0x0000000000400000-0x00000000005D4000-memory.dmp

                                    Filesize

                                    1.8MB

                                  • memory/2248-5-0x0000000000400000-0x00000000005D4000-memory.dmp

                                    Filesize

                                    1.8MB

                                  • memory/2272-161-0x0000000140000000-0x000000014013C000-memory.dmp

                                    Filesize

                                    1.2MB

                                  • memory/2272-802-0x0000000140000000-0x000000014013C000-memory.dmp

                                    Filesize

                                    1.2MB

                                  • memory/2272-159-0x0000000000840000-0x00000000008A0000-memory.dmp

                                    Filesize

                                    384KB

                                  • memory/2272-180-0x0000000001390000-0x00000000013A0000-memory.dmp

                                    Filesize

                                    64KB

                                  • memory/2272-179-0x0000000001380000-0x0000000001390000-memory.dmp

                                    Filesize

                                    64KB

                                  • memory/2272-347-0x0000000140000000-0x000000014013C000-memory.dmp

                                    Filesize

                                    1.2MB

                                  • memory/2272-166-0x0000000000840000-0x00000000008A0000-memory.dmp

                                    Filesize

                                    384KB

                                  • memory/2368-461-0x0000000000400000-0x0000000000547000-memory.dmp

                                    Filesize

                                    1.3MB

                                  • memory/2368-334-0x0000000000400000-0x0000000000547000-memory.dmp

                                    Filesize

                                    1.3MB

                                  • memory/2464-330-0x0000000140000000-0x000000014014C000-memory.dmp

                                    Filesize

                                    1.3MB

                                  • memory/2464-150-0x0000000000690000-0x00000000006F0000-memory.dmp

                                    Filesize

                                    384KB

                                  • memory/2464-143-0x0000000000690000-0x00000000006F0000-memory.dmp

                                    Filesize

                                    384KB

                                  • memory/2464-149-0x0000000140000000-0x000000014014C000-memory.dmp

                                    Filesize

                                    1.3MB

                                  • memory/2496-788-0x0000000140000000-0x000000014014C000-memory.dmp

                                    Filesize

                                    1.3MB

                                  • memory/2496-794-0x0000000140000000-0x000000014014C000-memory.dmp

                                    Filesize

                                    1.3MB

                                  • memory/2516-830-0x0000000001D10000-0x0000000001D98000-memory.dmp

                                    Filesize

                                    544KB

                                  • memory/2516-125-0x0000000000BA0000-0x0000000000C07000-memory.dmp

                                    Filesize

                                    412KB

                                  • memory/2516-832-0x0000000000CF0000-0x0000000000CF8000-memory.dmp

                                    Filesize

                                    32KB

                                  • memory/2516-831-0x0000000000F10000-0x0000000000F34000-memory.dmp

                                    Filesize

                                    144KB

                                  • memory/2516-827-0x0000000001F90000-0x000000000212E000-memory.dmp

                                    Filesize

                                    1.6MB

                                  • memory/2516-829-0x0000000000CF0000-0x0000000000D00000-memory.dmp

                                    Filesize

                                    64KB

                                  • memory/2516-828-0x0000000001D10000-0x0000000001DFC000-memory.dmp

                                    Filesize

                                    944KB

                                  • memory/2516-124-0x0000000000400000-0x0000000000547000-memory.dmp

                                    Filesize

                                    1.3MB

                                  • memory/2516-834-0x0000000001D10000-0x0000000001D76000-memory.dmp

                                    Filesize

                                    408KB

                                  • memory/2516-833-0x0000000000F10000-0x0000000000F3A000-memory.dmp

                                    Filesize

                                    168KB

                                  • memory/2516-319-0x0000000000400000-0x0000000000547000-memory.dmp

                                    Filesize

                                    1.3MB

                                  • memory/2516-130-0x0000000000BA0000-0x0000000000C07000-memory.dmp

                                    Filesize

                                    412KB

                                  • memory/2516-822-0x0000000000CF0000-0x0000000000CFA000-memory.dmp

                                    Filesize

                                    40KB

                                  • memory/2516-823-0x0000000000CF0000-0x0000000000D0E000-memory.dmp

                                    Filesize

                                    120KB

                                  • memory/2516-824-0x0000000000CF0000-0x0000000000D0A000-memory.dmp

                                    Filesize

                                    104KB

                                  • memory/2516-825-0x0000000001D10000-0x0000000001D9C000-memory.dmp

                                    Filesize

                                    560KB

                                  • memory/2516-826-0x0000000001D10000-0x0000000001DB4000-memory.dmp

                                    Filesize

                                    656KB

                                  • memory/2520-715-0x0000000000400000-0x0000000000547000-memory.dmp

                                    Filesize

                                    1.3MB

                                  • memory/2528-899-0x0000000000400000-0x0000000000547000-memory.dmp

                                    Filesize

                                    1.3MB

                                  • memory/2560-81-0x0000000100000000-0x0000000100142000-memory.dmp

                                    Filesize

                                    1.3MB

                                  • memory/2560-185-0x0000000100000000-0x0000000100142000-memory.dmp

                                    Filesize

                                    1.3MB

                                  • memory/2560-82-0x0000000000890000-0x00000000008F0000-memory.dmp

                                    Filesize

                                    384KB

                                  • memory/2560-90-0x0000000000890000-0x00000000008F0000-memory.dmp

                                    Filesize

                                    384KB

                                  • memory/2564-667-0x0000000000400000-0x0000000000547000-memory.dmp

                                    Filesize

                                    1.3MB

                                  • memory/2564-655-0x0000000000400000-0x0000000000547000-memory.dmp

                                    Filesize

                                    1.3MB

                                  • memory/2604-763-0x0000000000400000-0x0000000000547000-memory.dmp

                                    Filesize

                                    1.3MB

                                  • memory/2616-766-0x0000000000400000-0x0000000000547000-memory.dmp

                                    Filesize

                                    1.3MB

                                  • memory/2640-692-0x0000000000400000-0x0000000000547000-memory.dmp

                                    Filesize

                                    1.3MB

                                  • memory/2656-738-0x0000000000400000-0x0000000000547000-memory.dmp

                                    Filesize

                                    1.3MB

                                  • memory/2656-752-0x0000000000400000-0x0000000000547000-memory.dmp

                                    Filesize

                                    1.3MB

                                  • memory/2712-622-0x0000000000400000-0x0000000000547000-memory.dmp

                                    Filesize

                                    1.3MB

                                  • memory/2752-656-0x0000000000400000-0x0000000000547000-memory.dmp

                                    Filesize

                                    1.3MB

                                  • memory/2752-640-0x0000000000400000-0x0000000000547000-memory.dmp

                                    Filesize

                                    1.3MB

                                  • memory/2780-310-0x0000000140000000-0x0000000140169000-memory.dmp

                                    Filesize

                                    1.4MB

                                  • memory/2780-881-0x0000000000400000-0x0000000000547000-memory.dmp

                                    Filesize

                                    1.3MB

                                  • memory/2780-304-0x0000000140000000-0x0000000140169000-memory.dmp

                                    Filesize

                                    1.4MB

                                  • memory/2788-593-0x0000000000400000-0x0000000000547000-memory.dmp

                                    Filesize

                                    1.3MB

                                  • memory/2788-607-0x0000000000400000-0x0000000000547000-memory.dmp

                                    Filesize

                                    1.3MB

                                  • memory/2820-632-0x0000000000400000-0x0000000000547000-memory.dmp

                                    Filesize

                                    1.3MB

                                  • memory/2820-618-0x0000000000400000-0x0000000000547000-memory.dmp

                                    Filesize

                                    1.3MB

                                  • memory/2848-525-0x0000000000400000-0x0000000000547000-memory.dmp

                                    Filesize

                                    1.3MB

                                  • memory/2848-541-0x0000000000400000-0x0000000000547000-memory.dmp

                                    Filesize

                                    1.3MB

                                  • memory/2876-644-0x0000000000400000-0x0000000000547000-memory.dmp

                                    Filesize

                                    1.3MB

                                  • memory/2908-689-0x0000000000400000-0x0000000000547000-memory.dmp

                                    Filesize

                                    1.3MB

                                  • memory/2908-703-0x0000000000400000-0x0000000000547000-memory.dmp

                                    Filesize

                                    1.3MB

                                  • memory/2920-291-0x000000002E000000-0x000000002FE1E000-memory.dmp

                                    Filesize

                                    30.1MB

                                  • memory/2920-518-0x000000002E000000-0x000000002FE1E000-memory.dmp

                                    Filesize

                                    30.1MB

                                  • memory/2936-584-0x0000000000400000-0x0000000000547000-memory.dmp

                                    Filesize

                                    1.3MB

                                  • memory/2936-572-0x0000000000400000-0x0000000000547000-memory.dmp

                                    Filesize

                                    1.3MB

                                  • memory/2980-882-0x0000000000400000-0x0000000000547000-memory.dmp

                                    Filesize

                                    1.3MB

                                  • memory/2988-482-0x0000000000400000-0x0000000000547000-memory.dmp

                                    Filesize

                                    1.3MB

                                  • memory/2988-530-0x0000000000400000-0x0000000000547000-memory.dmp

                                    Filesize

                                    1.3MB