Analysis

  • max time kernel
    144s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    26-10-2024 04:14

General

  • Target

    aa59f7fdf533a2fb91f6309de697b684c1b899f8ec1d457cbcac443178b6b3eb.exe

  • Size

    1.3MB

  • MD5

    62aaf42d30b40a1595f24fb417e7a2d0

  • SHA1

    b9e4ca8f3270f5bd2f10ca3800a03eab22466e04

  • SHA256

    aa59f7fdf533a2fb91f6309de697b684c1b899f8ec1d457cbcac443178b6b3eb

  • SHA512

    a09f3dfd8f85e77eee7e46870ac726596def80b3d89f50c363b6ebf22975edaa40646394c1c7458e529bce7601b65325d79ca87fc605e64dc75a83ac89074029

  • SSDEEP

    24576:EIXgCWSpRy4dSJVDsVu5unzqWvX1nt/sBlDqgZQd6XKtiMJYiPU:HWSjLSJlsQuzqW/1t/snji6attJM

Malware Config

Signatures

  • Executes dropped EXE 64 IoCs
  • Loads dropped DLL 40 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in System32 directory 9 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\aa59f7fdf533a2fb91f6309de697b684c1b899f8ec1d457cbcac443178b6b3eb.exe
    "C:\Users\Admin\AppData\Local\Temp\aa59f7fdf533a2fb91f6309de697b684c1b899f8ec1d457cbcac443178b6b3eb.exe"
    1⤵
    • Drops file in System32 directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    PID:2820
  • C:\Windows\System32\alg.exe
    C:\Windows\System32\alg.exe
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:2956
  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe
    C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe
    1⤵
    • Executes dropped EXE
    PID:1468
  • C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe
    C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe
    1⤵
    • Executes dropped EXE
    • Drops file in Windows directory
    PID:2788
  • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe
    C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe
    1⤵
    • Executes dropped EXE
    • Drops file in Windows directory
    PID:2504
  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
    C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2256
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1e8 -InterruptEvent 1d4 -NGENProcess 1d8 -Pipe 1e4 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:1748
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 258 -InterruptEvent 1d4 -NGENProcess 1d8 -Pipe 1e8 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:1872
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1d4 -InterruptEvent 25c -NGENProcess 24c -Pipe 248 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2528
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 23c -InterruptEvent 260 -NGENProcess 250 -Pipe 1d4 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:800
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 260 -InterruptEvent 244 -NGENProcess 258 -Pipe 1f0 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1724
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 244 -InterruptEvent 1d8 -NGENProcess 240 -Pipe 264 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2960
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 268 -InterruptEvent 260 -NGENProcess 26c -Pipe 244 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1784
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 260 -InterruptEvent 26c -NGENProcess 23c -Pipe 270 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1888
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 25c -InterruptEvent 254 -NGENProcess 274 -Pipe 260 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1208
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 254 -InterruptEvent 250 -NGENProcess 23c -Pipe 258 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2768
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 250 -InterruptEvent 278 -NGENProcess 26c -Pipe 1d8 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1496
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 278 -InterruptEvent 280 -NGENProcess 274 -Pipe 25c -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:1824
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 280 -InterruptEvent 240 -NGENProcess 27c -Pipe 24c -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:932
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 240 -InterruptEvent 284 -NGENProcess 26c -Pipe 268 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2208
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 284 -InterruptEvent 28c -NGENProcess 278 -Pipe 288 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2480
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 28c -InterruptEvent 254 -NGENProcess 26c -Pipe 250 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2944
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 254 -InterruptEvent 26c -NGENProcess 274 -Pipe 294 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2556
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 26c -InterruptEvent 23c -NGENProcess 290 -Pipe 280 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2648
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 298 -InterruptEvent 254 -NGENProcess 29c -Pipe 26c -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:3060
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 254 -InterruptEvent 27c -NGENProcess 290 -Pipe 240 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1332
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2a0 -InterruptEvent 298 -NGENProcess 2a4 -Pipe 254 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:1560
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 298 -InterruptEvent 278 -NGENProcess 290 -Pipe 284 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2364
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 278 -InterruptEvent 2ac -NGENProcess 27c -Pipe 2a8 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1520
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 29c -InterruptEvent 2b4 -NGENProcess 1c4 -Pipe 278 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1828
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2b4 -InterruptEvent 2d0 -NGENProcess 2ac -Pipe 2cc -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:788
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2d0 -InterruptEvent 2d4 -NGENProcess 2c0 -Pipe 2c8 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2432
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2d4 -InterruptEvent 2d8 -NGENProcess 1c4 -Pipe 2bc -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:1064
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2d8 -InterruptEvent 2dc -NGENProcess 2ac -Pipe 224 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      PID:392
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2dc -InterruptEvent 1c4 -NGENProcess 2ac -Pipe 2d0 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2392
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1c4 -InterruptEvent 2e8 -NGENProcess 2e0 -Pipe 2e4 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      PID:932
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2e8 -InterruptEvent 2e0 -NGENProcess 2dc -Pipe 29c -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2108
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2e0 -InterruptEvent 2f0 -NGENProcess 2ac -Pipe 2c0 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Windows directory
      PID:1588
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2f4 -InterruptEvent 2e8 -NGENProcess 2f8 -Pipe 2e0 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1656
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2f8 -InterruptEvent 2c4 -NGENProcess 2ac -Pipe 2e8 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Windows directory
      PID:2872
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2c4 -InterruptEvent 2ac -NGENProcess 2f4 -Pipe 1c4 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1744
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2ac -InterruptEvent 300 -NGENProcess 2f0 -Pipe 2d4 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      PID:1312
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 300 -InterruptEvent 2f0 -NGENProcess 2c4 -Pipe 2fc -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:332
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2f0 -InterruptEvent 308 -NGENProcess 2f4 -Pipe 2f8 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Windows directory
      PID:2472
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 308 -InterruptEvent 2f4 -NGENProcess 300 -Pipe 304 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2204
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2f4 -InterruptEvent 310 -NGENProcess 2c4 -Pipe 2ac -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      PID:2004
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 310 -InterruptEvent 2c4 -NGENProcess 308 -Pipe 30c -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2212
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2c4 -InterruptEvent 318 -NGENProcess 300 -Pipe 2f0 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Windows directory
      PID:1084
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 318 -InterruptEvent 300 -NGENProcess 310 -Pipe 314 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2752
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 300 -InterruptEvent 320 -NGENProcess 308 -Pipe 2f4 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      PID:1096
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 320 -InterruptEvent 308 -NGENProcess 318 -Pipe 31c -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2876
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 308 -InterruptEvent 2ec -NGENProcess 324 -Pipe 2c4 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      PID:776
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 288 -InterruptEvent 308 -NGENProcess 268 -Pipe 22c -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2180
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 308 -InterruptEvent 320 -NGENProcess 2b4 -Pipe 32c -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      PID:3036
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 320 -InterruptEvent 2b4 -NGENProcess 288 -Pipe 24c -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2504
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2b4 -InterruptEvent 318 -NGENProcess 268 -Pipe 1b4 -Comment "NGen Worker Process"
      2⤵
      • Loads dropped DLL
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      PID:3000
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 318 -InterruptEvent 268 -NGENProcess 320 -Pipe 324 -Comment "NGen Worker Process"
      2⤵
      • System Location Discovery: System Language Discovery
      PID:1952
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 268 -InterruptEvent 230 -NGENProcess 328 -Pipe 308 -Comment "NGen Worker Process"
      2⤵
      • Loads dropped DLL
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      PID:936
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 230 -InterruptEvent 328 -NGENProcess 318 -Pipe 2dc -Comment "NGen Worker Process"
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2540
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 328 -InterruptEvent 330 -NGENProcess 320 -Pipe 2b4 -Comment "NGen Worker Process"
      2⤵
      • Loads dropped DLL
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      PID:2260
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 330 -InterruptEvent 320 -NGENProcess 230 -Pipe 300 -Comment "NGen Worker Process"
      2⤵
        PID:2084
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 320 -InterruptEvent 338 -NGENProcess 318 -Pipe 268 -Comment "NGen Worker Process"
        2⤵
        • Loads dropped DLL
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        PID:2348
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 338 -InterruptEvent 318 -NGENProcess 330 -Pipe 334 -Comment "NGen Worker Process"
        2⤵
        • System Location Discovery: System Language Discovery
        PID:1736
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 318 -InterruptEvent 340 -NGENProcess 230 -Pipe 328 -Comment "NGen Worker Process"
        2⤵
        • Loads dropped DLL
        • Drops file in Windows directory
        PID:3052
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 340 -InterruptEvent 230 -NGENProcess 338 -Pipe 33c -Comment "NGen Worker Process"
        2⤵
        • System Location Discovery: System Language Discovery
        • Modifies data under HKEY_USERS
        PID:2252
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 230 -InterruptEvent 348 -NGENProcess 330 -Pipe 320 -Comment "NGen Worker Process"
        2⤵
        • System Location Discovery: System Language Discovery
        PID:832
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 348 -InterruptEvent 330 -NGENProcess 310 -Pipe 350 -Comment "NGen Worker Process"
        2⤵
        • System Location Discovery: System Language Discovery
        PID:1180
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 330 -InterruptEvent 2ec -NGENProcess 34c -Pipe 318 -Comment "NGen Worker Process"
        2⤵
          PID:2660
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
          C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2ec -InterruptEvent 354 -NGENProcess 230 -Pipe 288 -Comment "NGen Worker Process"
          2⤵
          • Loads dropped DLL
          • Drops file in Windows directory
          PID:2204
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
          C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 310 -InterruptEvent 358 -NGENProcess 354 -Pipe 11c -Comment "NGen Worker Process"
          2⤵
          • Loads dropped DLL
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          PID:2208
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
          C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 358 -InterruptEvent 354 -NGENProcess 2ec -Pipe 330 -Comment "NGen Worker Process"
          2⤵
          • System Location Discovery: System Language Discovery
          PID:2528
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
          C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 354 -InterruptEvent 340 -NGENProcess 344 -Pipe 230 -Comment "NGen Worker Process"
          2⤵
            PID:588
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
            C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 340 -InterruptEvent 35c -NGENProcess 338 -Pipe 118 -Comment "NGen Worker Process"
            2⤵
            • Modifies data under HKEY_USERS
            PID:2084
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
            C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 35c -InterruptEvent 360 -NGENProcess 2ec -Pipe 310 -Comment "NGen Worker Process"
            2⤵
            • System Location Discovery: System Language Discovery
            PID:1484
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
            C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 360 -InterruptEvent 364 -NGENProcess 344 -Pipe 348 -Comment "NGen Worker Process"
            2⤵
              PID:2772
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
              C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 364 -InterruptEvent 368 -NGENProcess 338 -Pipe 358 -Comment "NGen Worker Process"
              2⤵
                PID:2232
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 36c -InterruptEvent 360 -NGENProcess 370 -Pipe 364 -Comment "NGen Worker Process"
                2⤵
                  PID:1972
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                  C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 360 -InterruptEvent 370 -NGENProcess 35c -Pipe 374 -Comment "NGen Worker Process"
                  2⤵
                    PID:2200
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                    C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 340 -InterruptEvent 2ec -NGENProcess 378 -Pipe 360 -Comment "NGen Worker Process"
                    2⤵
                    • System Location Discovery: System Language Discovery
                    PID:1816
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                    C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2ec -InterruptEvent 34c -NGENProcess 35c -Pipe 344 -Comment "NGen Worker Process"
                    2⤵
                    • System Location Discovery: System Language Discovery
                    PID:612
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                    C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 34c -InterruptEvent 37c -NGENProcess 370 -Pipe 368 -Comment "NGen Worker Process"
                    2⤵
                      PID:1824
                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 37c -InterruptEvent 380 -NGENProcess 378 -Pipe 338 -Comment "NGen Worker Process"
                      2⤵
                      • System Location Discovery: System Language Discovery
                      PID:1872
                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 384 -InterruptEvent 34c -NGENProcess 388 -Pipe 37c -Comment "NGen Worker Process"
                      2⤵
                      • System Location Discovery: System Language Discovery
                      PID:2672
                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 34c -InterruptEvent 354 -NGENProcess 378 -Pipe 340 -Comment "NGen Worker Process"
                      2⤵
                        PID:2488
                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 354 -InterruptEvent 38c -NGENProcess 380 -Pipe 36c -Comment "NGen Worker Process"
                        2⤵
                        • System Location Discovery: System Language Discovery
                        PID:2204
                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 38c -InterruptEvent 390 -NGENProcess 388 -Pipe 2ec -Comment "NGen Worker Process"
                        2⤵
                        • System Location Discovery: System Language Discovery
                        • Modifies data under HKEY_USERS
                        PID:2932
                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 390 -InterruptEvent 394 -NGENProcess 378 -Pipe 35c -Comment "NGen Worker Process"
                        2⤵
                        • System Location Discovery: System Language Discovery
                        PID:2092
                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 394 -InterruptEvent 378 -NGENProcess 354 -Pipe 39c -Comment "NGen Worker Process"
                        2⤵
                        • System Location Discovery: System Language Discovery
                        PID:2692
                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 384 -InterruptEvent 38c -NGENProcess 3a0 -Pipe 394 -Comment "NGen Worker Process"
                        2⤵
                        • System Location Discovery: System Language Discovery
                        PID:2220
                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 38c -InterruptEvent 34c -NGENProcess 354 -Pipe 370 -Comment "NGen Worker Process"
                        2⤵
                        • System Location Discovery: System Language Discovery
                        PID:2996
                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 34c -InterruptEvent 3a4 -NGENProcess 378 -Pipe 388 -Comment "NGen Worker Process"
                        2⤵
                          PID:2264
                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                          C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3a4 -InterruptEvent 3a8 -NGENProcess 3a0 -Pipe 380 -Comment "NGen Worker Process"
                          2⤵
                          • System Location Discovery: System Language Discovery
                          PID:2840
                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                          C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3a8 -InterruptEvent 3ac -NGENProcess 354 -Pipe 398 -Comment "NGen Worker Process"
                          2⤵
                          • System Location Discovery: System Language Discovery
                          PID:1312
                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                          C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3ac -InterruptEvent 3b0 -NGENProcess 378 -Pipe 384 -Comment "NGen Worker Process"
                          2⤵
                          • System Location Discovery: System Language Discovery
                          • Modifies data under HKEY_USERS
                          PID:2200
                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                          C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3b0 -InterruptEvent 3b4 -NGENProcess 3a0 -Pipe 38c -Comment "NGen Worker Process"
                          2⤵
                          • Modifies data under HKEY_USERS
                          PID:2308
                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                          C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3b4 -InterruptEvent 3b8 -NGENProcess 354 -Pipe 34c -Comment "NGen Worker Process"
                          2⤵
                          • System Location Discovery: System Language Discovery
                          • Modifies data under HKEY_USERS
                          PID:2268
                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                          C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3b8 -InterruptEvent 3bc -NGENProcess 378 -Pipe 3a4 -Comment "NGen Worker Process"
                          2⤵
                          • System Location Discovery: System Language Discovery
                          • Modifies data under HKEY_USERS
                          PID:2244
                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                          C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3b8 -InterruptEvent 378 -NGENProcess 3bc -Pipe 3c0 -Comment "NGen Worker Process"
                          2⤵
                          • System Location Discovery: System Language Discovery
                          • Modifies data under HKEY_USERS
                          PID:1584
                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                          C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 378 -InterruptEvent 3c4 -NGENProcess 354 -Pipe 3ac -Comment "NGen Worker Process"
                          2⤵
                          • System Location Discovery: System Language Discovery
                          • Modifies data under HKEY_USERS
                          PID:1616
                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                          C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3c4 -InterruptEvent 3c8 -NGENProcess 3a8 -Pipe 3b0 -Comment "NGen Worker Process"
                          2⤵
                          • System Location Discovery: System Language Discovery
                          • Modifies data under HKEY_USERS
                          PID:3028
                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                          C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3c8 -InterruptEvent 3cc -NGENProcess 3bc -Pipe 3b4 -Comment "NGen Worker Process"
                          2⤵
                          • System Location Discovery: System Language Discovery
                          PID:2704
                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                          C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3cc -InterruptEvent 3d0 -NGENProcess 354 -Pipe 3a0 -Comment "NGen Worker Process"
                          2⤵
                            PID:2680
                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                            C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3d4 -InterruptEvent 3d0 -NGENProcess 3cc -Pipe 3a8 -Comment "NGen Worker Process"
                            2⤵
                              PID:2852
                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                              C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3d0 -InterruptEvent 3b8 -NGENProcess 354 -Pipe 378 -Comment "NGen Worker Process"
                              2⤵
                                PID:2924
                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3b8 -InterruptEvent 3dc -NGENProcess 3c8 -Pipe 390 -Comment "NGen Worker Process"
                                2⤵
                                  PID:2396
                                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                  C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3dc -InterruptEvent 3e0 -NGENProcess 3cc -Pipe 3d8 -Comment "NGen Worker Process"
                                  2⤵
                                    PID:2232
                                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                    C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3e0 -InterruptEvent 3cc -NGENProcess 3b8 -Pipe 354 -Comment "NGen Worker Process"
                                    2⤵
                                      PID:1312
                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3cc -InterruptEvent 3e8 -NGENProcess 3c8 -Pipe 3d4 -Comment "NGen Worker Process"
                                      2⤵
                                        PID:788
                                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3e8 -InterruptEvent 3c8 -NGENProcess 3e0 -Pipe 3e4 -Comment "NGen Worker Process"
                                        2⤵
                                          PID:304
                                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                          C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3c8 -InterruptEvent 3f0 -NGENProcess 3b8 -Pipe 3dc -Comment "NGen Worker Process"
                                          2⤵
                                            PID:1620
                                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                            C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3f0 -InterruptEvent 3b8 -NGENProcess 3e8 -Pipe 3ec -Comment "NGen Worker Process"
                                            2⤵
                                              PID:2064
                                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                              C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3b8 -InterruptEvent 3f8 -NGENProcess 3e0 -Pipe 3cc -Comment "NGen Worker Process"
                                              2⤵
                                                PID:2624
                                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3f8 -InterruptEvent 3fc -NGENProcess 3f4 -Pipe 3d0 -Comment "NGen Worker Process"
                                                2⤵
                                                  PID:2480
                                                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                  C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3fc -InterruptEvent 3f4 -NGENProcess 3b8 -Pipe 3e8 -Comment "NGen Worker Process"
                                                  2⤵
                                                    PID:288
                                                • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
                                                  C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
                                                  1⤵
                                                  • Executes dropped EXE
                                                  • Drops file in Windows directory
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:1868
                                                  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
                                                    C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 1d8 -InterruptEvent 1c4 -NGENProcess 1c8 -Pipe 1d4 -Comment "NGen Worker Process"
                                                    2⤵
                                                    • Executes dropped EXE
                                                    PID:952
                                                  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
                                                    C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 1e0 -InterruptEvent 23c -NGENProcess 244 -Pipe 1d8 -Comment "NGen Worker Process"
                                                    2⤵
                                                    • Executes dropped EXE
                                                    PID:892
                                                • C:\Windows\ehome\ehRecvr.exe
                                                  C:\Windows\ehome\ehRecvr.exe
                                                  1⤵
                                                  • Executes dropped EXE
                                                  • Modifies data under HKEY_USERS
                                                  PID:1704
                                                • C:\Windows\ehome\ehsched.exe
                                                  C:\Windows\ehome\ehsched.exe
                                                  1⤵
                                                  • Executes dropped EXE
                                                  PID:2432
                                                • C:\Windows\eHome\EhTray.exe
                                                  "C:\Windows\eHome\EhTray.exe" /nav:-2
                                                  1⤵
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  • Suspicious use of FindShellTrayWindow
                                                  • Suspicious use of SendNotifyMessage
                                                  PID:2072
                                                • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                                                  "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                                                  1⤵
                                                  • Executes dropped EXE
                                                  PID:2436
                                                • C:\Windows\ehome\ehRec.exe
                                                  C:\Windows\ehome\ehRec.exe -Embedding
                                                  1⤵
                                                  • Modifies data under HKEY_USERS
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:2320
                                                • C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE
                                                  "C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE" /auditservice
                                                  1⤵
                                                  • Executes dropped EXE
                                                  • Drops file in System32 directory
                                                  • Modifies data under HKEY_USERS
                                                  PID:2640
                                                • C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe
                                                  "C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"
                                                  1⤵
                                                  • Executes dropped EXE
                                                  PID:2104
                                                • C:\Program Files (x86)\Common Files\Microsoft Shared\Source Engine\OSE.EXE
                                                  "C:\Program Files (x86)\Common Files\Microsoft Shared\Source Engine\OSE.EXE"
                                                  1⤵
                                                  • Executes dropped EXE
                                                  • System Location Discovery: System Language Discovery
                                                  PID:1680

                                                Network

                                                MITRE ATT&CK Enterprise v15

                                                Replay Monitor

                                                Loading Replay Monitor...

                                                Downloads

                                                • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\ose.exe

                                                  Filesize

                                                  1.6MB

                                                  MD5

                                                  f3f2e23230bd6ad7c7b3e0b009392193

                                                  SHA1

                                                  6457b73ba2fa2d283f76afe31d9b5a88cb651dc0

                                                  SHA256

                                                  4b21b5c604614bc1292d399a302fc4884af29971f9024e45d40aa2b67ff31d3d

                                                  SHA512

                                                  50d3d84c426f3820bc0fc2298efaaaa09bcf886d6c7dd91bb81272b1b25e01e285a63419e92f090227a16ba5e3b3456365fd719bc66b684a9d5ef487530f2d64

                                                • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\setup.exe

                                                  Filesize

                                                  1.6MB

                                                  MD5

                                                  eb374a2cf23de3b52cb6605349b09daf

                                                  SHA1

                                                  8c436a3c6cdf7e3fae2cdf1a8e50e8c7728bdbea

                                                  SHA256

                                                  fda7643a1491e5b1455b87c03c335185c743f5e07611adf1ab4b0574f0dafc0f

                                                  SHA512

                                                  671c64fe4d508f8e9e93826b7ae53a3b88c76b7c09989598c634394ee40dc92657d254a828d051aaafe3f21890e26c9b60f591613afa91f622babceedd7f7f4f

                                                • C:\MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\DW20.EXE

                                                  Filesize

                                                  1.3MB

                                                  MD5

                                                  fe6c6dfa7f9388af877792ed3a202ec3

                                                  SHA1

                                                  e5d4e59850a65a1c0955fde26a8fad4d296d4ec4

                                                  SHA256

                                                  2386951c981429d020dc7b7206db395580cd517c84eef625cf662c5055e65717

                                                  SHA512

                                                  a9caa673f8ea07c1ef89b41555cdf82d00bb76dbc937d761d6502e03f3978131847cf4370da252d44260be57d170bcccee4c567d9dd8580f3111ad28021c9c32

                                                • C:\MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\dwtrig20.exe

                                                  Filesize

                                                  1.9MB

                                                  MD5

                                                  bda6576b30428e6057b0bafe362aee7a

                                                  SHA1

                                                  de2b560bdb3e160355208c2819d87e61c4f55414

                                                  SHA256

                                                  84f2b7ad96280ebcf3376a7947a0bc2ee41dec5d6a78ed02ba0187e281375aed

                                                  SHA512

                                                  5cf373814e7f884d6d0a607a09dca744a8e963f595c2518e06f5a0e5eb02272707b8f9538c5037843cb1008d4b13db7744986255f551f19cafff17ffff742ee2

                                                • C:\Program Files (x86)\Common Files\microsoft shared\Source Engine\OSE.EXE

                                                  Filesize

                                                  1.6MB

                                                  MD5

                                                  dc80f9cabf9680ff92822670ae3b1195

                                                  SHA1

                                                  0543d1b37b52758f0e92d440f2a596d74e9a7922

                                                  SHA256

                                                  a5810a9af2ebffd84ac43d6ccf9c1903ccbcddb8b5107f14ebc87a3c12de6c61

                                                  SHA512

                                                  29e93fe5c1c7b0e792b231ff83f799775e3dc7a8022b3a7fdde5189794da37ea31ddb63376d5dde6b6d60169e943bf66fee67c820909d06789d61854f9b1a748

                                                • C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE

                                                  Filesize

                                                  30.1MB

                                                  MD5

                                                  150a0212a8b07d63c05c029680b603fd

                                                  SHA1

                                                  94e76845289a03841933fa889770157fa5d54489

                                                  SHA256

                                                  f96fc98192fa55789705a9ab2647c64c5ee4d4e3febbdb8d9905fdc663fd3c24

                                                  SHA512

                                                  9c5b8fb460ca2e75907adff576e50ff104d0d6eba4e6def5d8ed8553e8b7eead09c809c692427d48f777e7a59877c5618309a1606eb607d4f817b51b8a1d671e

                                                • C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe

                                                  Filesize

                                                  1.6MB

                                                  MD5

                                                  ff283b9808ad0b287e20c7f2fb1ec92e

                                                  SHA1

                                                  c7cc82d6d677cb7c84adf846a10848add38a7ded

                                                  SHA256

                                                  5d021337d604e4854d70ec3919cc30b5e97f2abe514759fca966434cbd6e3661

                                                  SHA512

                                                  d357818458a3a99395687cca221a5c1699951ba0f656415f712e8355fff37c52986cd38b0c11427826501b0807809b9f1fcfb780091efb16d0bc7e0b7140bf56

                                                • C:\Program Files\7-Zip\7z.exe

                                                  Filesize

                                                  2.0MB

                                                  MD5

                                                  188b59190840993d0c437c9a9ea2f850

                                                  SHA1

                                                  6834328f178dd14ea512badef9ac487c64a1fa3a

                                                  SHA256

                                                  f6c177df995e706e7c371310129fab22ca5c1058c1e80489e18066c603b6d008

                                                  SHA512

                                                  c52d29cf04503307ce308497cf48c6d3f41f73f71cbc13336262ecddbf58a4cb1e9ad45d81b78cb17762383f235ba0644432a26f711e8ff2d935b7f35b8e8085

                                                • C:\Program Files\7-Zip\7zFM.exe

                                                  Filesize

                                                  1.5MB

                                                  MD5

                                                  0856cc6593b11f9cfa2d7416b41ac4ba

                                                  SHA1

                                                  112a97b61ff6166f92a5a84489136521c8db925b

                                                  SHA256

                                                  416cd01b1712836ae8e2c723875fafca697a7ed1560d01f4b6d011e882696407

                                                  SHA512

                                                  96c600db2de9066f0180c2ad17ff7325f6656f39e1f5416cb05cc1e07b0e172b8155d33502c25480641dc48b82df7fe79f5ed2d8dbba590793e0ae802c0f55d0

                                                • C:\Program Files\7-Zip\7zG.exe

                                                  Filesize

                                                  1.2MB

                                                  MD5

                                                  c8ac5e268d58a0e90050576a9497d5bc

                                                  SHA1

                                                  260b22402194332cc6e5660578961da2e1ed411b

                                                  SHA256

                                                  fab5d7c17829a27896895a444dd85065e59de7a55f8ba7dd3875b003c87f8e47

                                                  SHA512

                                                  1a71c6f161850f7bad752aacbf4a0377439eb47c934628a6e6a863e2e52976bc740f26b85f3c9095d449a17d95efb070b9cc429f68128facb53029b2f5a1f695

                                                • C:\Program Files\7-Zip\Uninstall.exe

                                                  Filesize

                                                  1.4MB

                                                  MD5

                                                  29169d1237f0abe3defcf165d9c53276

                                                  SHA1

                                                  517f85a3d6f92a79713119779036c0454fbbe16a

                                                  SHA256

                                                  2c5ea85ebd130538b456bcaff931d9abcd761cd39583d3f3ba53eaf508bf43c0

                                                  SHA512

                                                  cdce48c584dff3010ae4b8acfc634062eb1f083161fb3d8af3bd60b7c1a85c6b36f91629a87951602c9a6be9f91d443f15832a14cf374ce8c2381207a8e23c8a

                                                • C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\chrmstp.exe

                                                  Filesize

                                                  4.8MB

                                                  MD5

                                                  2aae29f2e2bec0201c836237bb86e42a

                                                  SHA1

                                                  a3ac3339ae0f3d60c44c864424e389d385b71046

                                                  SHA256

                                                  b0bc772e2f1064ac9e5e76bcc022498f1632fd924105f9a812503876941508aa

                                                  SHA512

                                                  da3eedb0a2fc647daeb71fbcb6abc345632468f16245eb2bf2661cf1da9edf91cc41611a37d663fb60c38023e0f412ffa442876034de01c67b716b5267de6b78

                                                • C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe

                                                  Filesize

                                                  4.8MB

                                                  MD5

                                                  febd9fb96136c319905e07dad41115d4

                                                  SHA1

                                                  c6682b770bac52bacba3736870d668f8946ffcd3

                                                  SHA256

                                                  368e23ab3f4502701b1eba7e4fbfe0ca6936ef214a9d56b395e9590d90c3daa0

                                                  SHA512

                                                  2de93eb13c948ceaffb3e7e39aaa35b2b1aed40f4e9c6664380b3df6f4b83ab9e3456f86b623c6e11c46f02523cd50f499d7c440badbc7005676e95b4ebd2043

                                                • C:\Program Files\Google\Chrome\Application\106.0.5249.119\chrome_pwa_launcher.exe

                                                  Filesize

                                                  2.2MB

                                                  MD5

                                                  7525c38206c2ef1a5a4c12a73f574fbe

                                                  SHA1

                                                  485b5a61b36000ea6606d0971e01d17f7dedbc93

                                                  SHA256

                                                  5537f106b91adcc6dc434230539a16b0c5f611c1375ebb394fd3aac2eecd2368

                                                  SHA512

                                                  4f09cc52272a41a5febf6251673ca0d8867ec15c9914299a8ee33812002e298c483e9d4c227ef875c461bf3fbb24c8bf4407fa15f36a606239a047c8269adfa9

                                                • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe

                                                  Filesize

                                                  2.1MB

                                                  MD5

                                                  df90d984d32887c250f27722f87eb1ba

                                                  SHA1

                                                  feeb88dc697a8b2e1c7d9fb344989d4676bc5213

                                                  SHA256

                                                  715a53bc6aedbfa26b6e6f7909729f96608af8f0be7a00c2f80644891bca4f31

                                                  SHA512

                                                  432c80785208f9011f5ff178e93d4f9aabb965845a5928443fd73e8cf78cbf1db17d90ac30ea75e2fac2558fb0290beb93c176441009e9474489118e817e5097

                                                • C:\Program Files\Google\Chrome\Application\106.0.5249.119\notification_helper.exe

                                                  Filesize

                                                  1.8MB

                                                  MD5

                                                  8d2420136cc5e60656b8804c6e573179

                                                  SHA1

                                                  3a13aaaa780ec37322923b9ad6c9c3633f098b49

                                                  SHA256

                                                  36c1812bd7fe45f16ecbbefe243388e7b24d1bf986d5cf93ade086b0e88f9f61

                                                  SHA512

                                                  f964c64ef1728ca16e32989fc708284b8e6ef4bc2fbed2d395118d8def1891512e41405bc95a44a7f5d9250f714d5459731d2eda6b5b145c6f01dd37fa1c2e0a

                                                • C:\Program Files\Google\Chrome\Application\chrome_proxy.exe

                                                  Filesize

                                                  1.5MB

                                                  MD5

                                                  8b20c618451c5f1f0824d873085387c4

                                                  SHA1

                                                  dce1a56d238645700eb7470208c861df1ba0bd53

                                                  SHA256

                                                  a90a62d41f41bad994a8905b1f893fcad3979cdff15bcd627188215a5cdbf93a

                                                  SHA512

                                                  a3d17c3b4332149bf0fe5da03f668d712f72d33f29f60e728c326afc622369273844cc4388849fa65a40bc668d23c6dbadbe9d92a453a506f7c1d1cc971b76f8

                                                • C:\Program Files\Java\jdk1.7.0_80\bin\appletviewer.exe

                                                  Filesize

                                                  1.4MB

                                                  MD5

                                                  1342e8142227a6c7b970907a3320a5fd

                                                  SHA1

                                                  d312e7c98291d9ad37212f68aed42de3a2488bc8

                                                  SHA256

                                                  7d8d385437e0c9a93694598728d2f0f7996399f9a04bba6a55aa77044a3287e9

                                                  SHA512

                                                  3c908f0fbaf2136505ea986886ba67ccee1a41ae1a3e3ce1b06373c55ffe4dae89a7df2030ec2d0e1ac7b58cd76a53fd26a8b0b6f6e514e4d333ced9c5d2f7cf

                                                • C:\Users\Admin\AppData\Local\Temp\jusched.log

                                                  Filesize

                                                  1KB

                                                  MD5

                                                  9a00563195854195e784da278934e182

                                                  SHA1

                                                  745182f00b969c498176cf00b6477945340319c6

                                                  SHA256

                                                  f0a3328202e44fc160c24515bed4c125dd32bd64a62176885454d5f008532866

                                                  SHA512

                                                  ddcd85b362485c57ec1fd1a1f56f7dbcd29ff90f7f3d0ddaf2a7fa6c701b0f65ce47dad61930e9b89ee0f1d5ad7df7100c4657565aefe6cb76df4c975e41a72c

                                                • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b91050d8b077a4e8.customDestinations-ms

                                                  Filesize

                                                  24B

                                                  MD5

                                                  b9bd716de6739e51c620f2086f9c31e4

                                                  SHA1

                                                  9733d94607a3cba277e567af584510edd9febf62

                                                  SHA256

                                                  7116ff028244a01f3d17f1d3bc2e1506bc9999c2e40e388458f0cccc4e117312

                                                  SHA512

                                                  cef609e54c7a81a646ad38dba7ac0b82401b220773b9c792cefac80c6564753229f0c011b34ffb56381dd3154a19aee2bf5f602c4d1af01f2cf0fbc1574e4478

                                                • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ngen_service.log

                                                  Filesize

                                                  872KB

                                                  MD5

                                                  bd47644ff15e0a91fa16e055b1993426

                                                  SHA1

                                                  7a8c0dc78c6c57fe9e25ccf192fbd303f6f28bf8

                                                  SHA256

                                                  62adee32040770b71162751949218278dbbdb5159bda906e3dbb6f900bf4ee0f

                                                  SHA512

                                                  c6a69c20d02a0f9ba5d635a3a5f8ee14ce23b636ff4076ef8ca57ea62cfb3d8b8b6cdeb4d33505bd707278e10be9f32cd75e69d381ad1f7771bde15454c5e702

                                                • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe

                                                  Filesize

                                                  1.5MB

                                                  MD5

                                                  7d915707f8063366e448379d4f62bff7

                                                  SHA1

                                                  c5af22eed21de9392b56817360d80500644dbfdf

                                                  SHA256

                                                  30667786a3cc8ad55a072a1d3f3d0b8954ba7b9dc5f065fa85f4413b97d91ddd

                                                  SHA512

                                                  f17a6ee09d93ea8811eaa10f39a2b73d40d96577968d400a901d47b23513358729c24ff8f88e01e8674ade0e058f89f700199a68662137f1b675be136f1d764c

                                                • C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe

                                                  Filesize

                                                  1.5MB

                                                  MD5

                                                  b362d993894e062fe7e5c1a267e8fd92

                                                  SHA1

                                                  d4f40511cfb4170da5592ec7be2242cf08bda2ed

                                                  SHA256

                                                  83d3846c2578a3fb9a46526a2c49f20cd9c4f27c4e051c64e43e8ea354890860

                                                  SHA512

                                                  bec575433a7410bc1691e4d316339956ffa9fc0527824ad9f84a905eb489de423552d754375e416905737cd1d1eb389288c519c92c988f5577c5936366e49111

                                                • C:\Windows\Microsoft.NET\Framework\v2.0.50727\ngen_service.log

                                                  Filesize

                                                  1003KB

                                                  MD5

                                                  f46ee4629cb951c8a09ce39132fad6f9

                                                  SHA1

                                                  8e812032d9e7693cd9051bc1ea8dd8eaaa70b6c1

                                                  SHA256

                                                  266271a7470a92b0158e8f3563c00926da5ad4fed030b2abce2b7bcd5833057d

                                                  SHA512

                                                  57fa066af8a27350075d37041a391b0c0eb15e1ba1f2edc3d01e9cabe462663104397b6360ca78388b20d035a548d1afde2294da89598838cd9992f664df02a9

                                                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe

                                                  Filesize

                                                  1.5MB

                                                  MD5

                                                  9bc844821b6666314c421c29b3972896

                                                  SHA1

                                                  71df9d663c5ed99db0fb8d8bcd3a050700f21fba

                                                  SHA256

                                                  cf769379fdb05c41f8ee9afb79626e14d2e123dc37030267d445538dcf8a19dc

                                                  SHA512

                                                  856fb2926adf55e2523d59d2701b472ecf74159d939974a18a2089ce1573ae59ab301e59b59f5d4d73b109314b6db8b1e4b833eaa492fa6e75a2abaa718742d9

                                                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen_service.log

                                                  Filesize

                                                  8KB

                                                  MD5

                                                  eb23b33e2b66f947a4a13b7e027aa29f

                                                  SHA1

                                                  27287c221092bab5f73181c7f276899517bf437d

                                                  SHA256

                                                  aa04cbf039c6989deb8224bd39cf1c06206b5dfa34a22d4b7a27283e3b5b63cb

                                                  SHA512

                                                  faf468609daf33b1cc79a2292028f5659296d0f54f0d2400bfa47fd469242e04e6c83b701d91c75238b93d919eead1be275d30cf25076d836aef98574423143e

                                                • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.Office.To#\135228e87b2c27d26b516ac0fc0ce667\Microsoft.Office.Tools.Word.v9.0.ni.dll

                                                  Filesize

                                                  345KB

                                                  MD5

                                                  16e821c80b591f5978b7c573394a96f5

                                                  SHA1

                                                  83d8db80f72d5634cafe67e86905b2dff1af26fd

                                                  SHA256

                                                  e85d2cd13283abc0254259e3af793305add1e193a828ef3f44839b48487c4884

                                                  SHA512

                                                  b4d1197db1f10237814423650214b5ddeef3455987838b0ca580cdfdcd55fd929a0f1070284a3ab29c5a1482f5fc0518dc3c7f680589900d2dd12bfcb89b6c07

                                                • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.Office.To#\5766ec3721d18a48bec1ca1f60331e2d\Microsoft.Office.Tools.Common.v9.0.ni.dll

                                                  Filesize

                                                  797KB

                                                  MD5

                                                  aeb0b6e6c5d32d1ada231285ff2ae881

                                                  SHA1

                                                  1f04a1c059503896336406aed1dc93340e90b742

                                                  SHA256

                                                  4c53ca542ac5ef9d822ef8cb3b0ecef3fb8b937d94c0a7b735bedb275c74a263

                                                  SHA512

                                                  e55fd4c4d2966b3f0b6e88292fbd6c20ffa34766e076e763442c15212d19b6dea5d9dc9e7c359d999674a5b2c8a3849c2bbaaf83e7aa8c12715028b06b5a48e1

                                                • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.Office.To#\60214b09b490be856c4ee2b3398d71bd\Microsoft.Office.Tools.Outlook.v9.0.ni.dll

                                                  Filesize

                                                  163KB

                                                  MD5

                                                  e88828b5a35063aa16c68ffb8322215d

                                                  SHA1

                                                  8225660ba3a9f528cf6ac32038ae3e0ec98d2331

                                                  SHA256

                                                  99facae4828c566c310a1ccf4059100067ab8bfb3d6e94e44dd9e189fd491142

                                                  SHA512

                                                  e4d2f5a5aeaa29d4d3392588f15db0d514ca4c86c629f0986ee8dba61e34af5ca9e06b94479efd8dd154026ae0da276888a0214e167129db18316a17d9718a57

                                                • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.Office.To#\d7be05162f8d0fba8f4447db13f6695b\Microsoft.Office.Tools.Excel.v9.0.ni.dll

                                                  Filesize

                                                  1.3MB

                                                  MD5

                                                  006498313e139299a5383f0892c954b9

                                                  SHA1

                                                  7b3aa10930da9f29272154e2674b86876957ce3a

                                                  SHA256

                                                  489fec79addba2de9141daa61062a05a95e96a196049ce414807bada572cc35c

                                                  SHA512

                                                  6a15a10ae66ce0e5b18e060bb53c3108d09f6b07ee2c4a834856f0a35bec2453b32f891620e787731985719831302160678eb52acada102fdb0b87a14288d925

                                                • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.Office.To#\e1f8e4d08d4b7f811b7dbbacd324027b\Microsoft.Office.Tools.v9.0.ni.dll

                                                  Filesize

                                                  148KB

                                                  MD5

                                                  ac901cf97363425059a50d1398e3454b

                                                  SHA1

                                                  2f8bd4ac2237a7b7606cb77a3d3c58051793c5c7

                                                  SHA256

                                                  f6c7aecb211d9aac911bf80c91e84a47a72ac52cbb523e34e9da6482c0b24c58

                                                  SHA512

                                                  6a340b6d5fa8e214f2a58d8b691c749336df087fa75bcc8d8c46f708e4b4ff3d68a61a17d13ee62322b75cbc61d39f5a572588772f3c5d6e5ff32036e5bc5a00

                                                • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\03cad6bd8b37d21b28dcb4f955be2158\Microsoft.VisualStudio.Tools.Applications.Contract.v9.0.ni.dll

                                                  Filesize

                                                  34KB

                                                  MD5

                                                  c26b034a8d6ab845b41ed6e8a8d6001d

                                                  SHA1

                                                  3a55774cf22d3244d30f9eb5e26c0a6792a3e493

                                                  SHA256

                                                  620b41f5e02df56c33919218bedc238ca7e76552c43da4f0f39a106835a4edc3

                                                  SHA512

                                                  483424665c3bc79aeb1de6dfdd633c8526331c7b271b1ea6fe93ab298089e2aceefe7f9c7d0c6e33e604ca7b2ed62e7bb586147fecdf9a0eea60e8c03816f537

                                                • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\0cb958acb9cd4cacb46ebc0396e30aa3\Microsoft.VisualStudio.Tools.Office.Contract.v9.0.ni.dll

                                                  Filesize

                                                  109KB

                                                  MD5

                                                  0fd0f978e977a4122b64ae8f8541de54

                                                  SHA1

                                                  153d3390416fdeba1b150816cbbf968e355dc64f

                                                  SHA256

                                                  211d2b83bb82042385757f811d90c5ae0a281f3abb3bf1c7901e8559db479e60

                                                  SHA512

                                                  ceddfc031bfe4fcf5093d0bbc5697b5fb0cd69b03bc32612325a82ea273dae5daff7e670b0d45816a33307b8b042d27669f5d5391cb2bdcf3e5a0c847c6dcaa8

                                                • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\367516b7878af19f5c84c67f2cd277ae\Microsoft.VisualStudio.Tools.Office.Word.AddInAdapter.v9.0.ni.dll

                                                  Filesize

                                                  41KB

                                                  MD5

                                                  3c269caf88ccaf71660d8dc6c56f4873

                                                  SHA1

                                                  f9481bf17e10fe1914644e1b590b82a0ecc2c5c4

                                                  SHA256

                                                  de21619e70f9ef8ccbb274bcd0d9d2ace1bae0442dfefab45976671587cf0a48

                                                  SHA512

                                                  bd5be3721bf5bd4001127e0381a0589033cb17aa35852f8f073ba9684af7d8c5a0f3ee29987b345fc15fdf28c5b56686087001ef41221a2cfb16498cf4c016c6

                                                • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\4cffbd6c354740026d7a3a29dd63e3bc\Microsoft.VisualStudio.Tools.Office.HostAdapter.v10.0.ni.dll

                                                  Filesize

                                                  143KB

                                                  MD5

                                                  1fa4c663eb7f4f3f5e7547c8d2849c90

                                                  SHA1

                                                  7a2e4dc0eacfaab69d5ddfcbf9fcec8ff55b035f

                                                  SHA256

                                                  3febbc6242bafabbb51659ed696758cc75dadcb7ffc8217b8a032590d97d9166

                                                  SHA512

                                                  3a40a81785cf707abfb6b5f88b98e6cf413391b4098d1199a1cb7f030fa2e45c3c8502ae6baa7ff56f1476ee700d5f126c14a99433802a1dd328cd66bd9dfdd9

                                                • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\8c6bac317f75b51647ea3a8da141b143\Microsoft.VisualStudio.Tools.Office.AddInAdapter.v9.0.ni.dll

                                                  Filesize

                                                  210KB

                                                  MD5

                                                  4f40997b51420653706cb0958086cd2d

                                                  SHA1

                                                  0069b956d17ce7d782a0e054995317f2f621b502

                                                  SHA256

                                                  8cd6a0b061b43e0b660b81859c910290a3672b00d7647ba0e86eda6ddcc8c553

                                                  SHA512

                                                  e18953d7a348859855e5f6e279bc9924fc3707b57a733ce9b8f7d21bd631d419f1ebfb29202608192eb346569ca9a55264f5b4c2aedd474c22060734a68a4ee6

                                                • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\9306fc630870a75ddd23441ad77bdc57\Microsoft.VisualStudio.Tools.Applications.Runtime.v10.0.ni.dll

                                                  Filesize

                                                  53KB

                                                  MD5

                                                  e3a7a2b65afd8ab8b154fdc7897595c3

                                                  SHA1

                                                  b21eefd6e23231470b5cf0bd0d7363879a2ed228

                                                  SHA256

                                                  e5faf5e8adf46a8246e6b5038409dadca46985a9951343a1936237d2c8d7a845

                                                  SHA512

                                                  6537c7ed398deb23be1256445297cb7c8d7801bf6e163d918d8e258213708b28f7255ecff9fbd3431d8f5e5a746aa95a29d3a777b28fcd688777aed6d8205a33

                                                • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\a50df70c0a8cc482e0d4448e3faec820\Microsoft.VisualStudio.Tools.Office.Word.HostAdapter.v10.0.ni.dll

                                                  Filesize

                                                  187KB

                                                  MD5

                                                  29711c721a63c57e938c3e6cea059c90

                                                  SHA1

                                                  388fb9ab3e585c0731e9a7a8f1f7c1c4974af991

                                                  SHA256

                                                  c282478f2b1d9d6a9dd83f0e5a4562a315b6a9f513c8a0f78fc0456421675497

                                                  SHA512

                                                  8c227f073f9b309c7e24edb5b45795d394ab5fdfd8d0ecde1bb3e0950fb9d8b00d15b95d3f530a8e760087aaf015434b0b223d20afa7fc4b0117c2f41ebed04a

                                                • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\a61f34a30f368175960ba2c8244af8d1\Microsoft.VisualStudio.Tools.Office.Outlook.HostAdapter.v10.0.ni.dll

                                                  Filesize

                                                  83KB

                                                  MD5

                                                  0850eda6487c5eb1ec15152450696a33

                                                  SHA1

                                                  5d672d40760a90833bafde77de72fddeb75730fa

                                                  SHA256

                                                  7b9a9fc8c8b64f215d1866f58112d2805b72988237bc3e1baaafd3d06f85fdee

                                                  SHA512

                                                  a178371555ce64b99b5c5764808244cd2dd327a1a5f31cd16f9abad63824a23cf48f6e7865eb0a7fa27ac3301c25f6017257d633c737653212f66fa363280024

                                                • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\afa5bb1a39443d7dc81dfff54073929b\Microsoft.VisualStudio.Tools.Office.Contract.v10.0.ni.dll

                                                  Filesize

                                                  28KB

                                                  MD5

                                                  aefc3f3c8e7499bad4d05284e8abd16c

                                                  SHA1

                                                  7ab718bde7fdb2d878d8725dc843cfeba44a71f7

                                                  SHA256

                                                  4436550409cfb3d06b15dd0c3131e87e7002b0749c7c6e9dc3378c99dbec815d

                                                  SHA512

                                                  1d7dbc9764855a9a1f945c1bc8e86406c0625f1381d71b3ea6924322fbe419d1c70c3f3efd57ee2cb2097bb9385e0bf54965ab789328a80eb4946849648fe20b

                                                • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\bc8f64129da99671eea32ef066aff14a\Microsoft.VisualStudio.Tools.Office.Excel.HostAdapter.v10.0.ni.dll

                                                  Filesize

                                                  180KB

                                                  MD5

                                                  9d33260f221f70bc76bd535adec1669a

                                                  SHA1

                                                  a801d6599c572be2d7d2a4de109849eead6c13c1

                                                  SHA256

                                                  d4aed8789815237e479fa910523e1f3f3871ebc6f77a644899ad6077d13aeef1

                                                  SHA512

                                                  d708ebec81dc1aa084b4d0f8ad869ad856fe93c9949c4a7468de38f041b56b640f2f9557d74e0d5c5ef1267f850e9d0848f00d43613d0f2dd61c835a80f9e077

                                                • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\de06a98a598aa0ff716a25b24d56ad7f\Microsoft.VisualStudio.Tools.Applications.Contract.v10.0.ni.dll

                                                  Filesize

                                                  27KB

                                                  MD5

                                                  9c60454398ce4bce7a52cbda4a45d364

                                                  SHA1

                                                  da1e5de264a6f6051b332f8f32fa876d297bf620

                                                  SHA256

                                                  edc90887d38c87282f49adbb12a94040f9ac86058bfae15063aaaff2672b54e1

                                                  SHA512

                                                  533b7e9c55102b248f4a7560955734b4156eb4c02539c6f978aeacecff1ff182ba0f04a07d32ed90707a62d73191b0e2d2649f38ae1c3e7a5a4c0fbea9a94300

                                                • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\e0220058091b941725ef02be0b84abe7\Microsoft.VisualStudio.Tools.Applications.HostAdapter.v10.0.ni.dll

                                                  Filesize

                                                  57KB

                                                  MD5

                                                  6eaaa1f987d6e1d81badf8665c55a341

                                                  SHA1

                                                  e52db4ad92903ca03a5a54fdb66e2e6fad59efd5

                                                  SHA256

                                                  4b78ffa5f0b6751aea11917db5961d566e2f59beaa054b41473d331fd392329e

                                                  SHA512

                                                  dbedfa6c569670c22d34d923e22b7dae7332b932b809082dad87a1f0bb125c912db37964b5881667867ccf23dc5e5be596aad85485746f8151ce1c51ffd097b2

                                                • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\ee73646032cbb022d16771203727e3b2\Microsoft.VisualStudio.Tools.Applications.Runtime.v9.0.ni.dll

                                                  Filesize

                                                  130KB

                                                  MD5

                                                  2735d2ab103beb0f7c1fbd6971838274

                                                  SHA1

                                                  6063646bc072546798bf8bf347425834f2bfad71

                                                  SHA256

                                                  f00156860ec7e88f4ccb459ca29b7e0e5c169cdc8a081cb043603187d25d92b3

                                                  SHA512

                                                  fe2ce60c7f61760a29344e254771d48995e983e158da0725818f37441f9690bda46545bf10c84b163f6afb163ffb504913d6ffddf84f72b062c7f233aed896de

                                                • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\f1a7ac664667f2d6bcd6c388b230c22b\Microsoft.VisualStudio.Tools.Applications.AddInAdapter.v9.0.ni.dll

                                                  Filesize

                                                  59KB

                                                  MD5

                                                  8c69bbdfbc8cc3fa3fa5edcd79901e94

                                                  SHA1

                                                  b8028f0f557692221d5c0160ec6ce414b2bdf19b

                                                  SHA256

                                                  a21471690e7c32c80049e17c13624820e77bca6c9c38b83d9ea8a7248086660d

                                                  SHA512

                                                  825f5b87b76303b62fc16a96b108fb1774c2aca52ac5e44cd0ac2fe2ee47d5d67947dfe7498e36bc849773f608ec5824711f8c36e375a378582eefb57c9c2557

                                                • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\fc36797f7054935a6033077612905a0f\Microsoft.VisualStudio.Tools.Office.Excel.AddInAdapter.v9.0.ni.dll

                                                  Filesize

                                                  42KB

                                                  MD5

                                                  71d4273e5b77cf01239a5d4f29e064fc

                                                  SHA1

                                                  e8876dea4e4c4c099e27234742016be3c80d8b62

                                                  SHA256

                                                  f019899f829731f899a99885fd52fde1fe4a4f6fe3ecf7f7a7cfa78517c00575

                                                  SHA512

                                                  41fe67cda988c53bd087df6296d1a242cddac688718ea5a5884a72b43e9638538e64d7a59e045c0b4d490496d884cf0ec694ddf7fcb41ae3b8cbc65b7686b180

                                                • C:\Windows\assembly\NativeImages_v2.0.50727_32\ehiVidCtl\88e20c69254157d91b96eadc9444815d\ehiVidCtl.ni.dll

                                                  Filesize

                                                  855KB

                                                  MD5

                                                  7812b0a90d92b4812d4063b89a970c58

                                                  SHA1

                                                  3c4a789b8d28a5bfa6a6191624e33b8f40e4c4ea

                                                  SHA256

                                                  897626e6af00e85e627eeaa7f9563b245335242bc6196b36d0072e5b6d45e543

                                                  SHA512

                                                  634a2395bada9227b1957f2b76ed7e19f12bfc4d71a145d182602a1b6e24d83e220ebfabd602b1995c360e1725a38a89ff58417b0295bb0da9ea35c41c21a6ed

                                                • C:\Windows\assembly\NativeImages_v2.0.50727_32\stdole\2c6d60b55bbab22515c512080d4b3bae\stdole.ni.dll

                                                  Filesize

                                                  43KB

                                                  MD5

                                                  3e72bdd0663c5b2bcd530f74139c83e3

                                                  SHA1

                                                  66069bcac0207512b9e07320f4fa5934650677d2

                                                  SHA256

                                                  6a6ac3094130d1affd34aae5ba2bd8c889e2071eb4217a75d72b5560f884e357

                                                  SHA512

                                                  b0a98db477fccae71b4ebfb8525ed52c10f1e7542f955b307f260e27e0758aa22896683302e34b0237e7e3bba9f5193ddcc7ff255c71fbaa1386988b0ec7d626

                                                • C:\Windows\ehome\ehsched.exe

                                                  Filesize

                                                  1.6MB

                                                  MD5

                                                  8023bd191ce49d0513af9e6a1de6e77e

                                                  SHA1

                                                  11cc349e972af6a211013f5bc4e1827706e334b6

                                                  SHA256

                                                  f0242abb7f677207ad9ae20e909e822ab66a788af6513b7ae544d60eea4178e8

                                                  SHA512

                                                  5645d9d18493c576a00c4e1915b11eb1925c1a9122f6512e72410baa2fadfc376c4887877f899dd0189c5b7eeea97e4e3de551923e024c1fb147c0d157310db4

                                                • C:\Windows\system32\fxssvc.exe

                                                  Filesize

                                                  1.2MB

                                                  MD5

                                                  d304be63904418d81658fe0619b5dae9

                                                  SHA1

                                                  c2cbadab8497e06243e6615907850da73c66ff53

                                                  SHA256

                                                  15845db2bd82fc52294961890891b169548b27f4450532085648bb9b1cb4db68

                                                  SHA512

                                                  0aea8e72dfc790f298d2af945f5ee6b5ef3305fd952187880ebbad74fafc5137d635e435f562e4c91f1c681ad7ccbc7c8ffbaf1b54977e1be3ffaf3cff22e475

                                                • \Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe

                                                  Filesize

                                                  1.5MB

                                                  MD5

                                                  9756788e90f5db30a5f6d6566bada68c

                                                  SHA1

                                                  461195d9464f015e63986eb5de8c7d466302416e

                                                  SHA256

                                                  a6d9379439ff8c4248453b6c8d2506310aa5a7a5d190b7e26d13ab1f2ad3bbab

                                                  SHA512

                                                  b04a4463bb8b6959d307bac82f4c57f774bda35554463c71e81cc4bc3c2747d4994d00711de816502745bb8352ce8162a310debb756d4046a8d5e55af7637eb6

                                                • \Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe

                                                  Filesize

                                                  1.5MB

                                                  MD5

                                                  6a63a70d3ac6cf63ba5b9abb40d6a09e

                                                  SHA1

                                                  f823408e86b7b8fb6b904736041820917f9105f3

                                                  SHA256

                                                  89ff08cf61d1050cf97f952f9786838bbc7baa9cba230f5f68c1e87adea48ad4

                                                  SHA512

                                                  732a1db9f3cc466752e6665837a60efaa098a07ad51c4e86265b3b9dea65ad3e3aac101d270f0608279f1ad3e88105959dcdcd7a24ab1d3d4f60a77ec25bc800

                                                • \Windows\System32\alg.exe

                                                  Filesize

                                                  1.5MB

                                                  MD5

                                                  97fa8b831d69f824f1796e93201a9ef3

                                                  SHA1

                                                  7a0691b7bd20ab854959a779401f6c7cb99b809d

                                                  SHA256

                                                  c75269482c8743ecaaa423c92699fed13fbcede48b7893d07602c59a42f512ee

                                                  SHA512

                                                  46e8a92108a157891c0dea9eaedb669dc18eb61671b526588bd2496762bb631afcbe54f11dd1fb218dd0ba7cccf3b812498c48e4ce1bd39e3f8d3a3b21ee8860

                                                • \Windows\ehome\ehrecvr.exe

                                                  Filesize

                                                  1.2MB

                                                  MD5

                                                  54ed8dee3330d819e08d36114fd5bc07

                                                  SHA1

                                                  3f0613defbeed52155164e2c7d589e24eeb8914b

                                                  SHA256

                                                  2c55f3fd51b8caad75ea1e247422d09d097016f117998e28142d64367782ffe4

                                                  SHA512

                                                  2f329b83b969732d856f47b73d6fdd41c5c948ae9ed6ec23d8daf41d3eb4e06a7f3a457cc8fad29b6203296bc9d5d9b4ee4f1ec7a11addf90388dd996b19b440

                                                • memory/392-754-0x0000000000400000-0x0000000000589000-memory.dmp

                                                  Filesize

                                                  1.5MB

                                                • memory/392-734-0x0000000000400000-0x0000000000589000-memory.dmp

                                                  Filesize

                                                  1.5MB

                                                • memory/788-714-0x0000000000400000-0x0000000000589000-memory.dmp

                                                  Filesize

                                                  1.5MB

                                                • memory/800-368-0x0000000000400000-0x0000000000589000-memory.dmp

                                                  Filesize

                                                  1.5MB

                                                • memory/800-389-0x0000000000400000-0x0000000000589000-memory.dmp

                                                  Filesize

                                                  1.5MB

                                                • memory/892-647-0x0000000140000000-0x000000014018E000-memory.dmp

                                                  Filesize

                                                  1.6MB

                                                • memory/892-641-0x0000000140000000-0x000000014018E000-memory.dmp

                                                  Filesize

                                                  1.6MB

                                                • memory/932-510-0x0000000000400000-0x0000000000589000-memory.dmp

                                                  Filesize

                                                  1.5MB

                                                • memory/932-756-0x0000000000400000-0x0000000000589000-memory.dmp

                                                  Filesize

                                                  1.5MB

                                                • memory/952-644-0x0000000140000000-0x000000014018E000-memory.dmp

                                                  Filesize

                                                  1.6MB

                                                • memory/952-631-0x0000000140000000-0x000000014018E000-memory.dmp

                                                  Filesize

                                                  1.6MB

                                                • memory/1064-727-0x0000000000400000-0x0000000000589000-memory.dmp

                                                  Filesize

                                                  1.5MB

                                                • memory/1208-461-0x0000000000400000-0x0000000000589000-memory.dmp

                                                  Filesize

                                                  1.5MB

                                                • memory/1332-582-0x0000000000400000-0x0000000000589000-memory.dmp

                                                  Filesize

                                                  1.5MB

                                                • memory/1468-128-0x0000000140000000-0x000000014017D000-memory.dmp

                                                  Filesize

                                                  1.5MB

                                                • memory/1468-32-0x0000000140000000-0x000000014017D000-memory.dmp

                                                  Filesize

                                                  1.5MB

                                                • memory/1496-485-0x0000000000400000-0x0000000000589000-memory.dmp

                                                  Filesize

                                                  1.5MB

                                                • memory/1520-621-0x0000000000400000-0x0000000000589000-memory.dmp

                                                  Filesize

                                                  1.5MB

                                                • memory/1520-611-0x0000000000400000-0x0000000000589000-memory.dmp

                                                  Filesize

                                                  1.5MB

                                                • memory/1560-604-0x0000000000400000-0x0000000000589000-memory.dmp

                                                  Filesize

                                                  1.5MB

                                                • memory/1680-351-0x000000002E000000-0x000000002E196000-memory.dmp

                                                  Filesize

                                                  1.6MB

                                                • memory/1680-173-0x000000002E000000-0x000000002E196000-memory.dmp

                                                  Filesize

                                                  1.6MB

                                                • memory/1704-652-0x0000000140000000-0x000000014013C000-memory.dmp

                                                  Filesize

                                                  1.2MB

                                                • memory/1704-97-0x0000000140000000-0x000000014013C000-memory.dmp

                                                  Filesize

                                                  1.2MB

                                                • memory/1704-98-0x0000000000850000-0x00000000008B0000-memory.dmp

                                                  Filesize

                                                  384KB

                                                • memory/1704-104-0x0000000000850000-0x00000000008B0000-memory.dmp

                                                  Filesize

                                                  384KB

                                                • memory/1704-110-0x0000000001390000-0x00000000013A0000-memory.dmp

                                                  Filesize

                                                  64KB

                                                • memory/1704-109-0x0000000001380000-0x0000000001390000-memory.dmp

                                                  Filesize

                                                  64KB

                                                • memory/1704-202-0x0000000140000000-0x000000014013C000-memory.dmp

                                                  Filesize

                                                  1.2MB

                                                • memory/1724-412-0x0000000000400000-0x0000000000589000-memory.dmp

                                                  Filesize

                                                  1.5MB

                                                • memory/1724-390-0x0000000000400000-0x0000000000589000-memory.dmp

                                                  Filesize

                                                  1.5MB

                                                • memory/1748-194-0x0000000000400000-0x0000000000589000-memory.dmp

                                                  Filesize

                                                  1.5MB

                                                • memory/1748-309-0x0000000000400000-0x0000000000589000-memory.dmp

                                                  Filesize

                                                  1.5MB

                                                • memory/1784-439-0x0000000000400000-0x0000000000589000-memory.dmp

                                                  Filesize

                                                  1.5MB

                                                • memory/1784-423-0x0000000000400000-0x0000000000589000-memory.dmp

                                                  Filesize

                                                  1.5MB

                                                • memory/1824-495-0x0000000000400000-0x0000000000589000-memory.dmp

                                                  Filesize

                                                  1.5MB

                                                • memory/1824-484-0x0000000000400000-0x0000000000589000-memory.dmp

                                                  Filesize

                                                  1.5MB

                                                • memory/1828-703-0x0000000000400000-0x0000000000589000-memory.dmp

                                                  Filesize

                                                  1.5MB

                                                • memory/1868-81-0x0000000000520000-0x0000000000580000-memory.dmp

                                                  Filesize

                                                  384KB

                                                • memory/1868-193-0x0000000140000000-0x000000014018E000-memory.dmp

                                                  Filesize

                                                  1.6MB

                                                • memory/1868-88-0x0000000000520000-0x0000000000580000-memory.dmp

                                                  Filesize

                                                  384KB

                                                • memory/1868-87-0x0000000140000000-0x000000014018E000-memory.dmp

                                                  Filesize

                                                  1.6MB

                                                • memory/1872-306-0x0000000000400000-0x0000000000589000-memory.dmp

                                                  Filesize

                                                  1.5MB

                                                • memory/1872-322-0x0000000000400000-0x0000000000589000-memory.dmp

                                                  Filesize

                                                  1.5MB

                                                • memory/1888-450-0x0000000000400000-0x0000000000589000-memory.dmp

                                                  Filesize

                                                  1.5MB

                                                • memory/2104-156-0x0000000140000000-0x00000001401AB000-memory.dmp

                                                  Filesize

                                                  1.7MB

                                                • memory/2104-163-0x0000000140000000-0x00000001401AB000-memory.dmp

                                                  Filesize

                                                  1.7MB

                                                • memory/2208-521-0x0000000000400000-0x0000000000589000-memory.dmp

                                                  Filesize

                                                  1.5MB

                                                • memory/2208-507-0x0000000000400000-0x0000000000589000-memory.dmp

                                                  Filesize

                                                  1.5MB

                                                • memory/2256-684-0x0000000001030000-0x0000000001038000-memory.dmp

                                                  Filesize

                                                  32KB

                                                • memory/2256-682-0x0000000001D10000-0x0000000001D98000-memory.dmp

                                                  Filesize

                                                  544KB

                                                • memory/2256-679-0x0000000001F90000-0x000000000212E000-memory.dmp

                                                  Filesize

                                                  1.6MB

                                                • memory/2256-680-0x0000000001D10000-0x0000000001DFC000-memory.dmp

                                                  Filesize

                                                  944KB

                                                • memory/2256-68-0x0000000000360000-0x00000000003C7000-memory.dmp

                                                  Filesize

                                                  412KB

                                                • memory/2256-686-0x0000000001D10000-0x0000000001D76000-memory.dmp

                                                  Filesize

                                                  408KB

                                                • memory/2256-685-0x0000000001D10000-0x0000000001D3A000-memory.dmp

                                                  Filesize

                                                  168KB

                                                • memory/2256-678-0x0000000001D10000-0x0000000001DB4000-memory.dmp

                                                  Filesize

                                                  656KB

                                                • memory/2256-677-0x0000000001D10000-0x0000000001D9C000-memory.dmp

                                                  Filesize

                                                  560KB

                                                • memory/2256-62-0x0000000000360000-0x00000000003C7000-memory.dmp

                                                  Filesize

                                                  412KB

                                                • memory/2256-683-0x0000000001D10000-0x0000000001D34000-memory.dmp

                                                  Filesize

                                                  144KB

                                                • memory/2256-676-0x0000000001D10000-0x0000000001D2A000-memory.dmp

                                                  Filesize

                                                  104KB

                                                • memory/2256-681-0x0000000001030000-0x0000000001040000-memory.dmp

                                                  Filesize

                                                  64KB

                                                • memory/2256-61-0x0000000000400000-0x0000000000589000-memory.dmp

                                                  Filesize

                                                  1.5MB

                                                • memory/2256-165-0x0000000000400000-0x0000000000589000-memory.dmp

                                                  Filesize

                                                  1.5MB

                                                • memory/2256-674-0x0000000001030000-0x000000000103A000-memory.dmp

                                                  Filesize

                                                  40KB

                                                • memory/2256-675-0x0000000001D10000-0x0000000001D2E000-memory.dmp

                                                  Filesize

                                                  120KB

                                                • memory/2364-616-0x0000000000400000-0x0000000000589000-memory.dmp

                                                  Filesize

                                                  1.5MB

                                                • memory/2364-594-0x0000000000400000-0x0000000000589000-memory.dmp

                                                  Filesize

                                                  1.5MB

                                                • memory/2392-766-0x0000000000400000-0x0000000000589000-memory.dmp

                                                  Filesize

                                                  1.5MB

                                                • memory/2392-755-0x0000000000400000-0x0000000000589000-memory.dmp

                                                  Filesize

                                                  1.5MB

                                                • memory/2432-118-0x0000000000840000-0x00000000008A0000-memory.dmp

                                                  Filesize

                                                  384KB

                                                • memory/2432-593-0x0000000140000000-0x0000000140192000-memory.dmp

                                                  Filesize

                                                  1.6MB

                                                • memory/2432-236-0x0000000140000000-0x0000000140192000-memory.dmp

                                                  Filesize

                                                  1.6MB

                                                • memory/2432-120-0x0000000140000000-0x0000000140192000-memory.dmp

                                                  Filesize

                                                  1.6MB

                                                • memory/2432-111-0x0000000000840000-0x00000000008A0000-memory.dmp

                                                  Filesize

                                                  384KB

                                                • memory/2432-724-0x0000000000400000-0x0000000000589000-memory.dmp

                                                  Filesize

                                                  1.5MB

                                                • memory/2432-711-0x0000000000400000-0x0000000000589000-memory.dmp

                                                  Filesize

                                                  1.5MB

                                                • memory/2436-129-0x00000000002C0000-0x0000000000320000-memory.dmp

                                                  Filesize

                                                  384KB

                                                • memory/2436-284-0x0000000140000000-0x0000000140237000-memory.dmp

                                                  Filesize

                                                  2.2MB

                                                • memory/2436-136-0x0000000140000000-0x0000000140237000-memory.dmp

                                                  Filesize

                                                  2.2MB

                                                • memory/2480-534-0x0000000000400000-0x0000000000589000-memory.dmp

                                                  Filesize

                                                  1.5MB

                                                • memory/2480-523-0x0000000003D30000-0x0000000003DEA000-memory.dmp

                                                  Filesize

                                                  744KB

                                                • memory/2480-522-0x0000000000400000-0x0000000000589000-memory.dmp

                                                  Filesize

                                                  1.5MB

                                                • memory/2504-50-0x0000000010000000-0x0000000010188000-memory.dmp

                                                  Filesize

                                                  1.5MB

                                                • memory/2504-73-0x0000000010000000-0x0000000010188000-memory.dmp

                                                  Filesize

                                                  1.5MB

                                                • memory/2528-311-0x0000000000400000-0x0000000000589000-memory.dmp

                                                  Filesize

                                                  1.5MB

                                                • memory/2528-378-0x0000000000400000-0x0000000000589000-memory.dmp

                                                  Filesize

                                                  1.5MB

                                                • memory/2556-556-0x0000000000400000-0x0000000000589000-memory.dmp

                                                  Filesize

                                                  1.5MB

                                                • memory/2640-297-0x000000002E000000-0x000000002FE1E000-memory.dmp

                                                  Filesize

                                                  30.1MB

                                                • memory/2640-148-0x000000002E000000-0x000000002FE1E000-memory.dmp

                                                  Filesize

                                                  30.1MB

                                                • memory/2648-560-0x0000000000400000-0x0000000000589000-memory.dmp

                                                  Filesize

                                                  1.5MB

                                                • memory/2768-471-0x0000000000400000-0x0000000000589000-memory.dmp

                                                  Filesize

                                                  1.5MB

                                                • memory/2768-462-0x0000000000400000-0x0000000000589000-memory.dmp

                                                  Filesize

                                                  1.5MB

                                                • memory/2788-77-0x0000000010000000-0x0000000010180000-memory.dmp

                                                  Filesize

                                                  1.5MB

                                                • memory/2788-35-0x0000000010000000-0x0000000010180000-memory.dmp

                                                  Filesize

                                                  1.5MB

                                                • memory/2788-36-0x0000000000380000-0x00000000003E7000-memory.dmp

                                                  Filesize

                                                  412KB

                                                • memory/2788-43-0x0000000000380000-0x00000000003E7000-memory.dmp

                                                  Filesize

                                                  412KB

                                                • memory/2820-0-0x0000000000400000-0x0000000000546000-memory.dmp

                                                  Filesize

                                                  1.3MB

                                                • memory/2820-124-0x0000000000400000-0x0000000000546000-memory.dmp

                                                  Filesize

                                                  1.3MB

                                                • memory/2820-80-0x0000000000400000-0x0000000000546000-memory.dmp

                                                  Filesize

                                                  1.3MB

                                                • memory/2820-8-0x0000000001DF0000-0x0000000001E57000-memory.dmp

                                                  Filesize

                                                  412KB

                                                • memory/2820-1-0x0000000001DF0000-0x0000000001E57000-memory.dmp

                                                  Filesize

                                                  412KB

                                                • memory/2944-543-0x0000000000400000-0x0000000000589000-memory.dmp

                                                  Filesize

                                                  1.5MB

                                                • memory/2956-116-0x0000000100000000-0x0000000100184000-memory.dmp

                                                  Filesize

                                                  1.5MB

                                                • memory/2956-27-0x0000000000900000-0x0000000000960000-memory.dmp

                                                  Filesize

                                                  384KB

                                                • memory/2956-19-0x0000000000900000-0x0000000000960000-memory.dmp

                                                  Filesize

                                                  384KB

                                                • memory/2956-18-0x0000000100000000-0x0000000100184000-memory.dmp

                                                  Filesize

                                                  1.5MB

                                                • memory/2960-402-0x0000000000400000-0x0000000000589000-memory.dmp

                                                  Filesize

                                                  1.5MB

                                                • memory/2960-426-0x0000000000400000-0x0000000000589000-memory.dmp

                                                  Filesize

                                                  1.5MB

                                                • memory/3060-578-0x0000000000400000-0x0000000000589000-memory.dmp

                                                  Filesize

                                                  1.5MB