Analysis

  • max time kernel
    136s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    23-12-2024 20:55

General

  • Target

    2b802f4d27860689db050439e05e067bc7e87dca596fa28765f4e3aceea2b4ab.exe

  • Size

    1.3MB

  • MD5

    8cc353c3520837897bd84e5b12172cb9

  • SHA1

    41424ee8bcdb2cafe9914cd2a6df29a9a7fa8feb

  • SHA256

    2b802f4d27860689db050439e05e067bc7e87dca596fa28765f4e3aceea2b4ab

  • SHA512

    9288c0c8a8924bac30748c6c3e436b46b93d42292745ed5ce667aeab7bc49c156706421b51823d50e48b9e84aa712fa46edb940ca5e8d27a36c34c30f0683106

  • SSDEEP

    12288:CFeiJw/9Rrw0R1u4V/0YG3wx6EcJHUEhPUotFZr+1izHGNe8jKk34z:C6/TwSfVcYG3K/cJHlnFR+IGNe8j3Iz

Malware Config

Signatures

  • Executes dropped EXE 64 IoCs
  • Loads dropped DLL 58 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in System32 directory 21 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: EnumeratesProcesses 31 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of SetWindowsHookEx 20 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2b802f4d27860689db050439e05e067bc7e87dca596fa28765f4e3aceea2b4ab.exe
    "C:\Users\Admin\AppData\Local\Temp\2b802f4d27860689db050439e05e067bc7e87dca596fa28765f4e3aceea2b4ab.exe"
    1⤵
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:2936
  • C:\Windows\System32\alg.exe
    C:\Windows\System32\alg.exe
    1⤵
    • Executes dropped EXE
    PID:2980
  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe
    C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:3016
  • C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe
    C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe
    1⤵
    • Executes dropped EXE
    • Drops file in Windows directory
    PID:2860
  • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe
    C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe
    1⤵
    • Executes dropped EXE
    • Drops file in Windows directory
    PID:2608
  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
    C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
    1⤵
    • Executes dropped EXE
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1708
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1f0 -InterruptEvent 1dc -NGENProcess 1e0 -Pipe 1ec -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2228
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 258 -InterruptEvent 1dc -NGENProcess 1e0 -Pipe 1f0 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2504
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1dc -InterruptEvent 25c -NGENProcess 24c -Pipe 248 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2432
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 25c -InterruptEvent 244 -NGENProcess 23c -Pipe 1f8 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2476
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 260 -InterruptEvent 1dc -NGENProcess 264 -Pipe 25c -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:1572
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 240 -InterruptEvent 254 -NGENProcess 268 -Pipe 260 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2260
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 250 -InterruptEvent 23c -NGENProcess 26c -Pipe 240 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2132
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 23c -InterruptEvent 1e0 -NGENProcess 268 -Pipe 24c -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2700
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1e0 -InterruptEvent 264 -NGENProcess 254 -Pipe 274 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1572
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 264 -InterruptEvent 278 -NGENProcess 270 -Pipe 244 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:3112
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 264 -InterruptEvent 23c -NGENProcess 1e0 -Pipe 26c -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:3248
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 23c -InterruptEvent 1e0 -NGENProcess 250 -Pipe 258 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:3364
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1e0 -InterruptEvent 254 -NGENProcess 268 -Pipe 270 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:3484
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 254 -InterruptEvent 280 -NGENProcess 264 -Pipe 288 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:3612
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1dc -InterruptEvent 280 -NGENProcess 254 -Pipe 284 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:3704
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 278 -InterruptEvent 23c -NGENProcess 290 -Pipe 1dc -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:3804
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 23c -InterruptEvent 27c -NGENProcess 254 -Pipe 250 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:3932
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 27c -InterruptEvent 294 -NGENProcess 280 -Pipe 268 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:4016
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 298 -InterruptEvent 23c -NGENProcess 29c -Pipe 27c -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2320
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 28c -InterruptEvent 23c -NGENProcess 298 -Pipe 280 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:3184
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 23c -InterruptEvent 264 -NGENProcess 29c -Pipe 1e0 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:3208
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2a4 -InterruptEvent 264 -NGENProcess 23c -Pipe 290 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:3316
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 254 -InterruptEvent 264 -NGENProcess 2a4 -Pipe 29c -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1840
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 27c -InterruptEvent 290 -NGENProcess 268 -Pipe 280 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:3452
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 290 -InterruptEvent 25c -NGENProcess 1dc -Pipe 260 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:3628
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 25c -InterruptEvent 1f8 -NGENProcess 274 -Pipe 240 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:1540
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1f8 -InterruptEvent 248 -NGENProcess 200 -Pipe 244 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:3776
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 248 -InterruptEvent 1f0 -NGENProcess 1dc -Pipe 268 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Windows directory
      PID:3824
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 274 -InterruptEvent 1f8 -NGENProcess 224 -Pipe 1dc -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:3924
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1f8 -InterruptEvent 290 -NGENProcess 27c -Pipe 24c -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Windows directory
      PID:1848
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 290 -InterruptEvent 27c -NGENProcess 274 -Pipe 128 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:3996
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 27c -InterruptEvent 1d8 -NGENProcess 224 -Pipe 124 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Windows directory
      PID:3148
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1d8 -InterruptEvent 224 -NGENProcess 290 -Pipe 1cc -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:1624
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 224 -InterruptEvent 23c -NGENProcess 274 -Pipe 1f8 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      PID:1164
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 23c -InterruptEvent 274 -NGENProcess 1d8 -Pipe 2b0 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:3324
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 274 -InterruptEvent 2a0 -NGENProcess 290 -Pipe 27c -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      PID:2160
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2a0 -InterruptEvent 290 -NGENProcess 23c -Pipe 254 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1184
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 290 -InterruptEvent 2a4 -NGENProcess 1d8 -Pipe 224 -Comment "NGen Worker Process"
      2⤵
      • Loads dropped DLL
      • Drops file in Windows directory
      PID:2376
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2a4 -InterruptEvent 1d8 -NGENProcess 2a0 -Pipe 264 -Comment "NGen Worker Process"
      2⤵
      • System Location Discovery: System Language Discovery
      PID:3512
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1d8 -InterruptEvent 278 -NGENProcess 23c -Pipe 274 -Comment "NGen Worker Process"
      2⤵
      • Loads dropped DLL
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      PID:3668
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 278 -InterruptEvent 23c -NGENProcess 2a4 -Pipe 28c -Comment "NGen Worker Process"
      2⤵
        PID:3364
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1d8 -InterruptEvent 294 -NGENProcess 200 -Pipe 23c -Comment "NGen Worker Process"
        2⤵
        • Loads dropped DLL
        • Drops file in Windows directory
        PID:3696
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 294 -InterruptEvent 200 -NGENProcess 2a0 -Pipe 2a4 -Comment "NGen Worker Process"
        2⤵
        • System Location Discovery: System Language Discovery
        PID:3496
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 200 -InterruptEvent 2b8 -NGENProcess 278 -Pipe 25c -Comment "NGen Worker Process"
        2⤵
        • Loads dropped DLL
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        PID:3776
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2b8 -InterruptEvent 278 -NGENProcess 294 -Pipe 290 -Comment "NGen Worker Process"
        2⤵
        • System Location Discovery: System Language Discovery
        PID:3896
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 278 -InterruptEvent 2c0 -NGENProcess 2a0 -Pipe 1d8 -Comment "NGen Worker Process"
        2⤵
        • Loads dropped DLL
        • Drops file in Windows directory
        PID:1556
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2c0 -InterruptEvent 2a0 -NGENProcess 2b8 -Pipe 2bc -Comment "NGen Worker Process"
        2⤵
          PID:4056
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
          C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2a0 -InterruptEvent 2c8 -NGENProcess 294 -Pipe 200 -Comment "NGen Worker Process"
          2⤵
          • Loads dropped DLL
          • Drops file in Windows directory
          PID:3120
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
          C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2c8 -InterruptEvent 294 -NGENProcess 2c0 -Pipe 2c4 -Comment "NGen Worker Process"
          2⤵
          • System Location Discovery: System Language Discovery
          PID:3148
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
          C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 294 -InterruptEvent 2d0 -NGENProcess 2b8 -Pipe 278 -Comment "NGen Worker Process"
          2⤵
          • Loads dropped DLL
          • Drops file in Windows directory
          PID:2432
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
          C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2d0 -InterruptEvent 2b8 -NGENProcess 2c8 -Pipe 2cc -Comment "NGen Worker Process"
          2⤵
          • System Location Discovery: System Language Discovery
          PID:3240
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
          C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2b8 -InterruptEvent 2d8 -NGENProcess 2c0 -Pipe 2a0 -Comment "NGen Worker Process"
          2⤵
          • Loads dropped DLL
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          PID:3356
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
          C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2d8 -InterruptEvent 2c0 -NGENProcess 2d0 -Pipe 2d4 -Comment "NGen Worker Process"
          2⤵
          • System Location Discovery: System Language Discovery
          PID:3404
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
          C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2c0 -InterruptEvent 2e0 -NGENProcess 2c8 -Pipe 294 -Comment "NGen Worker Process"
          2⤵
          • Loads dropped DLL
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          PID:3500
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
          C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2e0 -InterruptEvent 2c8 -NGENProcess 2d8 -Pipe 2dc -Comment "NGen Worker Process"
          2⤵
            PID:3512
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
            C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2c8 -InterruptEvent 2e8 -NGENProcess 2d0 -Pipe 2b8 -Comment "NGen Worker Process"
            2⤵
            • Loads dropped DLL
            • Drops file in Windows directory
            PID:944
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
            C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2e8 -InterruptEvent 2d0 -NGENProcess 2e0 -Pipe 2e4 -Comment "NGen Worker Process"
            2⤵
              PID:3364
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
              C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2d0 -InterruptEvent 2f0 -NGENProcess 2d8 -Pipe 2c0 -Comment "NGen Worker Process"
              2⤵
              • Loads dropped DLL
              • Drops file in Windows directory
              • System Location Discovery: System Language Discovery
              PID:3700
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
              C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2f0 -InterruptEvent 2d8 -NGENProcess 2e8 -Pipe 2ec -Comment "NGen Worker Process"
              2⤵
              • System Location Discovery: System Language Discovery
              • Modifies data under HKEY_USERS
              PID:2208
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
              C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2d8 -InterruptEvent 2f8 -NGENProcess 2e0 -Pipe 2c8 -Comment "NGen Worker Process"
              2⤵
                PID:4024
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2f8 -InterruptEvent 2fc -NGENProcess 2f4 -Pipe 2b4 -Comment "NGen Worker Process"
                2⤵
                • System Location Discovery: System Language Discovery
                PID:2972
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 300 -InterruptEvent 2d8 -NGENProcess 304 -Pipe 2f8 -Comment "NGen Worker Process"
                2⤵
                  PID:908
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                  C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2d8 -InterruptEvent 2d0 -NGENProcess 2f4 -Pipe 1f0 -Comment "NGen Worker Process"
                  2⤵
                  • Loads dropped DLL
                  • Drops file in Windows directory
                  • System Location Discovery: System Language Discovery
                  PID:860
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                  C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2d0 -InterruptEvent 2f4 -NGENProcess 300 -Pipe 2fc -Comment "NGen Worker Process"
                  2⤵
                  • Loads dropped DLL
                  • Drops file in Windows directory
                  PID:3372
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                  C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2f4 -InterruptEvent 300 -NGENProcess 298 -Pipe 304 -Comment "NGen Worker Process"
                  2⤵
                    PID:856
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                    C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 300 -InterruptEvent 2d0 -NGENProcess 308 -Pipe 314 -Comment "NGen Worker Process"
                    2⤵
                      PID:2716
                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2d0 -InterruptEvent 2e8 -NGENProcess 310 -Pipe 2d8 -Comment "NGen Worker Process"
                      2⤵
                      • System Location Discovery: System Language Discovery
                      • Modifies data under HKEY_USERS
                      PID:3392
                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 318 -InterruptEvent 2e8 -NGENProcess 2d0 -Pipe 298 -Comment "NGen Worker Process"
                      2⤵
                        PID:972
                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2e8 -InterruptEvent 2e0 -NGENProcess 310 -Pipe 2f0 -Comment "NGen Worker Process"
                        2⤵
                          PID:3532
                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                          C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2e0 -InterruptEvent 320 -NGENProcess 300 -Pipe 30c -Comment "NGen Worker Process"
                          2⤵
                          • System Location Discovery: System Language Discovery
                          PID:2900
                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                          C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 320 -InterruptEvent 324 -NGENProcess 2d0 -Pipe 31c -Comment "NGen Worker Process"
                          2⤵
                          • System Location Discovery: System Language Discovery
                          PID:3512
                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                          C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 324 -InterruptEvent 328 -NGENProcess 310 -Pipe 2f4 -Comment "NGen Worker Process"
                          2⤵
                            PID:2216
                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                            C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 328 -InterruptEvent 32c -NGENProcess 300 -Pipe 318 -Comment "NGen Worker Process"
                            2⤵
                              PID:3728
                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                              C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 32c -InterruptEvent 330 -NGENProcess 2d0 -Pipe 2e8 -Comment "NGen Worker Process"
                              2⤵
                                PID:3620
                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 330 -InterruptEvent 334 -NGENProcess 310 -Pipe 2e0 -Comment "NGen Worker Process"
                                2⤵
                                • System Location Discovery: System Language Discovery
                                PID:3892
                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 338 -InterruptEvent 334 -NGENProcess 330 -Pipe 300 -Comment "NGen Worker Process"
                                2⤵
                                • System Location Discovery: System Language Discovery
                                PID:3976
                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 334 -InterruptEvent 320 -NGENProcess 310 -Pipe 324 -Comment "NGen Worker Process"
                                2⤵
                                • System Location Discovery: System Language Discovery
                                PID:3900
                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 320 -InterruptEvent 328 -NGENProcess 32c -Pipe 344 -Comment "NGen Worker Process"
                                2⤵
                                  PID:4008
                                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                  C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 328 -InterruptEvent 308 -NGENProcess 340 -Pipe 33c -Comment "NGen Worker Process"
                                  2⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:4060
                                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                  C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 308 -InterruptEvent 348 -NGENProcess 310 -Pipe 2d0 -Comment "NGen Worker Process"
                                  2⤵
                                  • Modifies data under HKEY_USERS
                                  PID:3688
                                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                  C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 348 -InterruptEvent 34c -NGENProcess 32c -Pipe 338 -Comment "NGen Worker Process"
                                  2⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:3120
                                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                  C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 34c -InterruptEvent 350 -NGENProcess 340 -Pipe 334 -Comment "NGen Worker Process"
                                  2⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:3300
                                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                  C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 350 -InterruptEvent 354 -NGENProcess 310 -Pipe 320 -Comment "NGen Worker Process"
                                  2⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:1572
                                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                  C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 354 -InterruptEvent 358 -NGENProcess 32c -Pipe 328 -Comment "NGen Worker Process"
                                  2⤵
                                    PID:2284
                                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                    C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 358 -InterruptEvent 35c -NGENProcess 340 -Pipe 308 -Comment "NGen Worker Process"
                                    2⤵
                                      PID:3460
                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 360 -InterruptEvent 354 -NGENProcess 364 -Pipe 358 -Comment "NGen Worker Process"
                                      2⤵
                                      • System Location Discovery: System Language Discovery
                                      PID:3356
                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 354 -InterruptEvent 348 -NGENProcess 340 -Pipe 34c -Comment "NGen Worker Process"
                                      2⤵
                                      • System Location Discovery: System Language Discovery
                                      PID:704
                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 364 -InterruptEvent 354 -NGENProcess 330 -Pipe 340 -Comment "NGen Worker Process"
                                      2⤵
                                      • System Location Discovery: System Language Discovery
                                      • Modifies data under HKEY_USERS
                                      PID:3648
                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 354 -InterruptEvent 374 -NGENProcess 32c -Pipe 370 -Comment "NGen Worker Process"
                                      2⤵
                                      • System Location Discovery: System Language Discovery
                                      • Modifies data under HKEY_USERS
                                      PID:112
                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 378 -InterruptEvent 364 -NGENProcess 37c -Pipe 354 -Comment "NGen Worker Process"
                                      2⤵
                                      • Modifies data under HKEY_USERS
                                      PID:3480
                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 364 -InterruptEvent 350 -NGENProcess 32c -Pipe 360 -Comment "NGen Worker Process"
                                      2⤵
                                      • Modifies data under HKEY_USERS
                                      PID:2288
                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 374 -InterruptEvent 350 -NGENProcess 380 -Pipe 378 -Comment "NGen Worker Process"
                                      2⤵
                                      • System Location Discovery: System Language Discovery
                                      • Modifies data under HKEY_USERS
                                      PID:3144
                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 350 -InterruptEvent 36c -NGENProcess 32c -Pipe 348 -Comment "NGen Worker Process"
                                      2⤵
                                      • System Location Discovery: System Language Discovery
                                      • Modifies data under HKEY_USERS
                                      PID:3728
                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 36c -InterruptEvent 32c -NGENProcess 384 -Pipe 38c -Comment "NGen Worker Process"
                                      2⤵
                                      • System Location Discovery: System Language Discovery
                                      • Modifies data under HKEY_USERS
                                      PID:3868
                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 32c -InterruptEvent 330 -NGENProcess 388 -Pipe 310 -Comment "NGen Worker Process"
                                      2⤵
                                      • Modifies data under HKEY_USERS
                                      PID:2764
                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 330 -InterruptEvent 390 -NGENProcess 350 -Pipe 37c -Comment "NGen Worker Process"
                                      2⤵
                                      • System Location Discovery: System Language Discovery
                                      • Modifies data under HKEY_USERS
                                      PID:2136
                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 390 -InterruptEvent 394 -NGENProcess 384 -Pipe 364 -Comment "NGen Worker Process"
                                      2⤵
                                      • Modifies data under HKEY_USERS
                                      PID:2208
                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 394 -InterruptEvent 398 -NGENProcess 388 -Pipe 374 -Comment "NGen Worker Process"
                                      2⤵
                                      • System Location Discovery: System Language Discovery
                                      • Modifies data under HKEY_USERS
                                      PID:3164
                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 398 -InterruptEvent 39c -NGENProcess 350 -Pipe 36c -Comment "NGen Worker Process"
                                      2⤵
                                      • Modifies data under HKEY_USERS
                                      PID:3688
                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 390 -InterruptEvent 3a0 -NGENProcess 394 -Pipe 39c -Comment "NGen Worker Process"
                                      2⤵
                                      • Loads dropped DLL
                                      • Drops file in Windows directory
                                      • Modifies data under HKEY_USERS
                                      PID:3156
                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3a0 -InterruptEvent 394 -NGENProcess 384 -Pipe 350 -Comment "NGen Worker Process"
                                      2⤵
                                      • System Location Discovery: System Language Discovery
                                      PID:396
                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 394 -InterruptEvent 3a8 -NGENProcess 398 -Pipe 380 -Comment "NGen Worker Process"
                                      2⤵
                                      • Loads dropped DLL
                                      • Drops file in Windows directory
                                      • System Location Discovery: System Language Discovery
                                      • Modifies data under HKEY_USERS
                                      PID:2812
                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3a8 -InterruptEvent 398 -NGENProcess 3a0 -Pipe 32c -Comment "NGen Worker Process"
                                      2⤵
                                      • Modifies data under HKEY_USERS
                                      PID:3316
                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 398 -InterruptEvent 3b0 -NGENProcess 384 -Pipe 390 -Comment "NGen Worker Process"
                                      2⤵
                                      • Loads dropped DLL
                                      • Drops file in Windows directory
                                      • System Location Discovery: System Language Discovery
                                      • Modifies data under HKEY_USERS
                                      PID:2204
                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3b0 -InterruptEvent 384 -NGENProcess 3a8 -Pipe 3ac -Comment "NGen Worker Process"
                                      2⤵
                                      • System Location Discovery: System Language Discovery
                                      PID:3556
                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 384 -InterruptEvent 3b8 -NGENProcess 3a0 -Pipe 394 -Comment "NGen Worker Process"
                                      2⤵
                                      • System Location Discovery: System Language Discovery
                                      • Modifies data under HKEY_USERS
                                      PID:1580
                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3b8 -InterruptEvent 3bc -NGENProcess 3b4 -Pipe 3a4 -Comment "NGen Worker Process"
                                      2⤵
                                      • Loads dropped DLL
                                      • Drops file in Windows directory
                                      • System Location Discovery: System Language Discovery
                                      • Modifies data under HKEY_USERS
                                      PID:2004
                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3bc -InterruptEvent 3b4 -NGENProcess 384 -Pipe 3a8 -Comment "NGen Worker Process"
                                      2⤵
                                      • System Location Discovery: System Language Discovery
                                      PID:3536
                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3b4 -InterruptEvent 3c4 -NGENProcess 3a0 -Pipe 330 -Comment "NGen Worker Process"
                                      2⤵
                                        PID:3920
                                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3c4 -InterruptEvent 3c8 -NGENProcess 3c0 -Pipe 3b0 -Comment "NGen Worker Process"
                                        2⤵
                                          PID:3904
                                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                          C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3c8 -InterruptEvent 3cc -NGENProcess 384 -Pipe 3b8 -Comment "NGen Worker Process"
                                          2⤵
                                            PID:3928
                                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                            C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3cc -InterruptEvent 3d0 -NGENProcess 3a0 -Pipe 398 -Comment "NGen Worker Process"
                                            2⤵
                                              PID:4076
                                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                              C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3d0 -InterruptEvent 3d4 -NGENProcess 3c0 -Pipe 3bc -Comment "NGen Worker Process"
                                              2⤵
                                                PID:1848
                                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3d4 -InterruptEvent 3d8 -NGENProcess 384 -Pipe 3b4 -Comment "NGen Worker Process"
                                                2⤵
                                                  PID:3996
                                                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                  C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3d8 -InterruptEvent 3dc -NGENProcess 3a0 -Pipe 3c4 -Comment "NGen Worker Process"
                                                  2⤵
                                                    PID:2252
                                                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                    C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3e0 -InterruptEvent 3dc -NGENProcess 3d8 -Pipe 3c0 -Comment "NGen Worker Process"
                                                    2⤵
                                                      PID:1612
                                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3dc -InterruptEvent 3c8 -NGENProcess 3a0 -Pipe 3cc -Comment "NGen Worker Process"
                                                      2⤵
                                                        PID:3124
                                                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3c8 -InterruptEvent 3e8 -NGENProcess 3d4 -Pipe 388 -Comment "NGen Worker Process"
                                                        2⤵
                                                          PID:2680
                                                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                          C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3e8 -InterruptEvent 3ec -NGENProcess 3d8 -Pipe 3e4 -Comment "NGen Worker Process"
                                                          2⤵
                                                            PID:2228
                                                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                            C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3ec -InterruptEvent 3d0 -NGENProcess 3a0 -Pipe 3f0 -Comment "NGen Worker Process"
                                                            2⤵
                                                              PID:836
                                                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                              C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3d0 -InterruptEvent 3f4 -NGENProcess 384 -Pipe 3e0 -Comment "NGen Worker Process"
                                                              2⤵
                                                                PID:1120
                                                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3f4 -InterruptEvent 3f8 -NGENProcess 3d8 -Pipe 3d4 -Comment "NGen Worker Process"
                                                                2⤵
                                                                  PID:3356
                                                                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                  C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3c8 -InterruptEvent 3f8 -NGENProcess 3f4 -Pipe 3a0 -Comment "NGen Worker Process"
                                                                  2⤵
                                                                    PID:3744
                                                                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                    C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3e8 -InterruptEvent 3f8 -NGENProcess 3c8 -Pipe 3d8 -Comment "NGen Worker Process"
                                                                    2⤵
                                                                      PID:3516
                                                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3f8 -InterruptEvent 3dc -NGENProcess 3f4 -Pipe 384 -Comment "NGen Worker Process"
                                                                      2⤵
                                                                        PID:2428
                                                                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3dc -InterruptEvent 408 -NGENProcess 1d0 -Pipe 3ec -Comment "NGen Worker Process"
                                                                        2⤵
                                                                          PID:3672
                                                                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                          C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 408 -InterruptEvent 40c -NGENProcess 3c8 -Pipe 404 -Comment "NGen Worker Process"
                                                                          2⤵
                                                                            PID:3956
                                                                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                            C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 40c -InterruptEvent 3c8 -NGENProcess 3dc -Pipe 3f4 -Comment "NGen Worker Process"
                                                                            2⤵
                                                                              PID:3280
                                                                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                              C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 3c8 -InterruptEvent 414 -NGENProcess 1d0 -Pipe 3e8 -Comment "NGen Worker Process"
                                                                              2⤵
                                                                                PID:3856
                                                                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                                C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 414 -InterruptEvent 1d0 -NGENProcess 40c -Pipe 410 -Comment "NGen Worker Process"
                                                                                2⤵
                                                                                  PID:3992
                                                                                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                                  C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1d0 -InterruptEvent 41c -NGENProcess 3dc -Pipe 408 -Comment "NGen Worker Process"
                                                                                  2⤵
                                                                                    PID:1088
                                                                                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                                    C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 41c -InterruptEvent 420 -NGENProcess 418 -Pipe 3fc -Comment "NGen Worker Process"
                                                                                    2⤵
                                                                                      PID:1632
                                                                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                                      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 420 -InterruptEvent 424 -NGENProcess 40c -Pipe 3c8 -Comment "NGen Worker Process"
                                                                                      2⤵
                                                                                        PID:3936
                                                                                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                                        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 424 -InterruptEvent 428 -NGENProcess 3dc -Pipe 3f8 -Comment "NGen Worker Process"
                                                                                        2⤵
                                                                                          PID:2136
                                                                                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                                          C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 428 -InterruptEvent 42c -NGENProcess 418 -Pipe 414 -Comment "NGen Worker Process"
                                                                                          2⤵
                                                                                            PID:3092
                                                                                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                                            C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 42c -InterruptEvent 418 -NGENProcess 424 -Pipe 40c -Comment "NGen Worker Process"
                                                                                            2⤵
                                                                                              PID:3224
                                                                                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                                              C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 418 -InterruptEvent 434 -NGENProcess 3dc -Pipe 41c -Comment "NGen Worker Process"
                                                                                              2⤵
                                                                                                PID:2256
                                                                                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                                                C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 434 -InterruptEvent 3dc -NGENProcess 42c -Pipe 430 -Comment "NGen Worker Process"
                                                                                                2⤵
                                                                                                  PID:2680
                                                                                                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                                                  C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 43c -InterruptEvent 424 -NGENProcess 44c -Pipe 3d0 -Comment "NGen Worker Process"
                                                                                                  2⤵
                                                                                                    PID:3408
                                                                                                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                                                    C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 464 -InterruptEvent 420 -NGENProcess 45c -Pipe 444 -Comment "NGen Worker Process"
                                                                                                    2⤵
                                                                                                      PID:3472
                                                                                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                                                      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 4a4 -InterruptEvent 428 -NGENProcess 4a8 -Pipe 464 -Comment "NGen Worker Process"
                                                                                                      2⤵
                                                                                                        PID:1184
                                                                                                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                                                        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 4a0 -InterruptEvent 43c -NGENProcess 4ac -Pipe 4a4 -Comment "NGen Worker Process"
                                                                                                        2⤵
                                                                                                          PID:1240
                                                                                                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                                                          C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 43c -InterruptEvent 49c -NGENProcess 4a8 -Pipe 498 -Comment "NGen Worker Process"
                                                                                                          2⤵
                                                                                                            PID:2024
                                                                                                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                                                            C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 49c -InterruptEvent 4a8 -NGENProcess 4a0 -Pipe 428 -Comment "NGen Worker Process"
                                                                                                            2⤵
                                                                                                              PID:944
                                                                                                          • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
                                                                                                            C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
                                                                                                            1⤵
                                                                                                            • Executes dropped EXE
                                                                                                            • Drops file in Windows directory
                                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                                            PID:2340
                                                                                                            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
                                                                                                              C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 1d4 -InterruptEvent 1c0 -NGENProcess 1c4 -Pipe 1d0 -Comment "NGen Worker Process"
                                                                                                              2⤵
                                                                                                              • Executes dropped EXE
                                                                                                              PID:3480
                                                                                                            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
                                                                                                              C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 1cc -InterruptEvent 238 -NGENProcess 240 -Pipe 244 -Comment "NGen Worker Process"
                                                                                                              2⤵
                                                                                                              • Executes dropped EXE
                                                                                                              PID:3412
                                                                                                          • C:\Windows\ehome\ehRecvr.exe
                                                                                                            C:\Windows\ehome\ehRecvr.exe
                                                                                                            1⤵
                                                                                                            • Executes dropped EXE
                                                                                                            PID:2408
                                                                                                          • C:\Windows\ehome\ehsched.exe
                                                                                                            C:\Windows\ehome\ehsched.exe
                                                                                                            1⤵
                                                                                                            • Executes dropped EXE
                                                                                                            PID:612
                                                                                                          • C:\Windows\eHome\EhTray.exe
                                                                                                            "C:\Windows\eHome\EhTray.exe" /nav:-2
                                                                                                            1⤵
                                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                                            • Suspicious use of FindShellTrayWindow
                                                                                                            • Suspicious use of SendNotifyMessage
                                                                                                            PID:2232
                                                                                                          • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                                                                                                            "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                                                                                                            1⤵
                                                                                                            • Executes dropped EXE
                                                                                                            PID:2060
                                                                                                          • C:\Windows\system32\IEEtwCollector.exe
                                                                                                            C:\Windows\system32\IEEtwCollector.exe /V
                                                                                                            1⤵
                                                                                                            • Executes dropped EXE
                                                                                                            PID:2640
                                                                                                          • C:\Windows\ehome\ehRec.exe
                                                                                                            C:\Windows\ehome\ehRec.exe -Embedding
                                                                                                            1⤵
                                                                                                            • Modifies data under HKEY_USERS
                                                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                                            PID:1052
                                                                                                          • C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE
                                                                                                            "C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE" /auditservice
                                                                                                            1⤵
                                                                                                            • Executes dropped EXE
                                                                                                            • Drops file in System32 directory
                                                                                                            PID:1752
                                                                                                          • C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe
                                                                                                            "C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"
                                                                                                            1⤵
                                                                                                            • Executes dropped EXE
                                                                                                            PID:1768
                                                                                                          • C:\Windows\System32\msdtc.exe
                                                                                                            C:\Windows\System32\msdtc.exe
                                                                                                            1⤵
                                                                                                            • Executes dropped EXE
                                                                                                            • Drops file in System32 directory
                                                                                                            PID:1928
                                                                                                          • C:\Windows\system32\msiexec.exe
                                                                                                            C:\Windows\system32\msiexec.exe /V
                                                                                                            1⤵
                                                                                                            • Executes dropped EXE
                                                                                                            • Loads dropped DLL
                                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                                            PID:1772
                                                                                                          • C:\Program Files (x86)\Common Files\Microsoft Shared\Source Engine\OSE.EXE
                                                                                                            "C:\Program Files (x86)\Common Files\Microsoft Shared\Source Engine\OSE.EXE"
                                                                                                            1⤵
                                                                                                            • Executes dropped EXE
                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                            PID:2412
                                                                                                          • C:\Windows\SysWow64\perfhost.exe
                                                                                                            C:\Windows\SysWow64\perfhost.exe
                                                                                                            1⤵
                                                                                                            • Executes dropped EXE
                                                                                                            PID:2856
                                                                                                          • C:\Windows\system32\locator.exe
                                                                                                            C:\Windows\system32\locator.exe
                                                                                                            1⤵
                                                                                                            • Executes dropped EXE
                                                                                                            PID:3020
                                                                                                          • C:\Windows\System32\snmptrap.exe
                                                                                                            C:\Windows\System32\snmptrap.exe
                                                                                                            1⤵
                                                                                                            • Executes dropped EXE
                                                                                                            PID:592
                                                                                                          • C:\Windows\System32\vds.exe
                                                                                                            C:\Windows\System32\vds.exe
                                                                                                            1⤵
                                                                                                            • Executes dropped EXE
                                                                                                            PID:2780
                                                                                                          • C:\Windows\system32\vssvc.exe
                                                                                                            C:\Windows\system32\vssvc.exe
                                                                                                            1⤵
                                                                                                            • Executes dropped EXE
                                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                                            PID:1744
                                                                                                          • C:\Windows\system32\wbengine.exe
                                                                                                            "C:\Windows\system32\wbengine.exe"
                                                                                                            1⤵
                                                                                                            • Executes dropped EXE
                                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                                            PID:2496
                                                                                                          • C:\Windows\system32\wbem\WmiApSrv.exe
                                                                                                            C:\Windows\system32\wbem\WmiApSrv.exe
                                                                                                            1⤵
                                                                                                            • Executes dropped EXE
                                                                                                            PID:1640
                                                                                                          • C:\Program Files\Windows Media Player\wmpnetwk.exe
                                                                                                            "C:\Program Files\Windows Media Player\wmpnetwk.exe"
                                                                                                            1⤵
                                                                                                            • Executes dropped EXE
                                                                                                            • Modifies data under HKEY_USERS
                                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                                            PID:2388
                                                                                                          • C:\Windows\system32\SearchIndexer.exe
                                                                                                            C:\Windows\system32\SearchIndexer.exe /Embedding
                                                                                                            1⤵
                                                                                                            • Executes dropped EXE
                                                                                                            • Modifies data under HKEY_USERS
                                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                                            • Suspicious use of WriteProcessMemory
                                                                                                            PID:2660
                                                                                                            • C:\Windows\system32\SearchProtocolHost.exe
                                                                                                              "C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe_S-1-5-21-3692679935-4019334568-335155002-10001_ Global\UsGthrCtrlFltPipeMssGthrPipe_S-1-5-21-3692679935-4019334568-335155002-10001 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon" "1"
                                                                                                              2⤵
                                                                                                              • Suspicious use of SetWindowsHookEx
                                                                                                              PID:2704
                                                                                                            • C:\Windows\system32\SearchFilterHost.exe
                                                                                                              "C:\Windows\system32\SearchFilterHost.exe" 0 600 604 612 65536 608
                                                                                                              2⤵
                                                                                                                PID:936
                                                                                                              • C:\Windows\system32\SearchProtocolHost.exe
                                                                                                                "C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe2_ Global\UsGthrCtrlFltPipeMssGthrPipe2 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon"
                                                                                                                2⤵
                                                                                                                • Drops file in System32 directory
                                                                                                                • Modifies data under HKEY_USERS
                                                                                                                • Suspicious use of SetWindowsHookEx
                                                                                                                PID:3560

                                                                                                            Network

                                                                                                            MITRE ATT&CK Enterprise v15

                                                                                                            Replay Monitor

                                                                                                            Loading Replay Monitor...

                                                                                                            Downloads

                                                                                                            • C:\Program Files (x86)\Common Files\microsoft shared\Source Engine\OSE.EXE

                                                                                                              Filesize

                                                                                                              1.4MB

                                                                                                              MD5

                                                                                                              f31ffdcca2a2a30cee7662d3631f9156

                                                                                                              SHA1

                                                                                                              8ecd1dcf1f3701e198dda6f2bd983a6817fb1e95

                                                                                                              SHA256

                                                                                                              7fb0acdeff2520364c12106e03776a59054467fd93c732bede40e004259ccf58

                                                                                                              SHA512

                                                                                                              81de9927811ca52a1e437b6cd198f2333e99f011a651c4e6ef0a08c9d742f23620439f2838d869330de48afcfb39e2569b0c9d4f6466e578941676401121278d

                                                                                                            • C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE

                                                                                                              Filesize

                                                                                                              30.1MB

                                                                                                              MD5

                                                                                                              f5fcc0030f22867a2bd3949cef16343a

                                                                                                              SHA1

                                                                                                              7547862690ba7ead3e889c07882acf0eacc435b6

                                                                                                              SHA256

                                                                                                              02b0cb3e8314965a3dbb70449806cfed205c5691323b24dee319fef0d56b4eea

                                                                                                              SHA512

                                                                                                              6220b6610b2943fb6fbca28263d41c290e6fb4e8780f82224fe293a26d5082a79e1b5f076b2558e4ff0c20408f68019572eb12ee3f9c8b60c091c980cb09e4b1

                                                                                                            • C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe

                                                                                                              Filesize

                                                                                                              1.4MB

                                                                                                              MD5

                                                                                                              ee4fab4b3d0ff844ec98bafcb88ca74e

                                                                                                              SHA1

                                                                                                              de15b665c29de0115efe0e1eace400c3a723c734

                                                                                                              SHA256

                                                                                                              6e51326dc0af67819f9209308c3a5c27d1005fbbbb375cf523b1290776e2e3ab

                                                                                                              SHA512

                                                                                                              81c36c9be5c8eb60e68caca4d17c6900f99897d644dcc0636a27574ee8cabbb3fa4121884ce045196baba47462ccdec361463984e6ff75236e10ee7e3907ff46

                                                                                                            • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe

                                                                                                              Filesize

                                                                                                              2.1MB

                                                                                                              MD5

                                                                                                              41b2ce09f14fadcccfa449146b6f27d0

                                                                                                              SHA1

                                                                                                              9e44e6f814b6ab5c06291d71c7eede4a981a3505

                                                                                                              SHA256

                                                                                                              94951b8ecc9e7f1649e808b0ad35cfe1335c149f0a049039bfe1d81871bb08db

                                                                                                              SHA512

                                                                                                              3067387d255c3c7ee08e3f24efec8d3d9fa12880bf9f60d34dbdbf8c203f3c1d357be480c0420c0ce9e5701136afe1c6db5b58f8db2057d4b219a51bdb47ef37

                                                                                                            • C:\ProgramData\Microsoft\Search\Data\Applications\Windows\MSS.log

                                                                                                              Filesize

                                                                                                              1024KB

                                                                                                              MD5

                                                                                                              b6e359c7e8c6f580c47b39bf83a2e940

                                                                                                              SHA1

                                                                                                              b302164bff9c64b4ba66a35dd8913eb62427959f

                                                                                                              SHA256

                                                                                                              56dfbeee5e2d9a47a422191d645e2985baa0af1cb68360f5f5ae1b998ca7145a

                                                                                                              SHA512

                                                                                                              a8c1051cb15c9d26e11a0ff8cfb40210712b25c96bae10c8aef37940c7b78b7202a740172d3e8fb2033a4bb7a6d5157218e466e2f92aea4b8b091cc3650e910b

                                                                                                            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b91050d8b077a4e8.customDestinations-ms

                                                                                                              Filesize

                                                                                                              24B

                                                                                                              MD5

                                                                                                              b9bd716de6739e51c620f2086f9c31e4

                                                                                                              SHA1

                                                                                                              9733d94607a3cba277e567af584510edd9febf62

                                                                                                              SHA256

                                                                                                              7116ff028244a01f3d17f1d3bc2e1506bc9999c2e40e388458f0cccc4e117312

                                                                                                              SHA512

                                                                                                              cef609e54c7a81a646ad38dba7ac0b82401b220773b9c792cefac80c6564753229f0c011b34ffb56381dd3154a19aee2bf5f602c4d1af01f2cf0fbc1574e4478

                                                                                                            • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe

                                                                                                              Filesize

                                                                                                              1.3MB

                                                                                                              MD5

                                                                                                              eac247df7feaa2ea4527fd50f0e3702a

                                                                                                              SHA1

                                                                                                              42a9cb24401da8ec4ade395fac9f6abbcbe4265e

                                                                                                              SHA256

                                                                                                              e0b17ee3489164612b377f2320fb85caacd7e278f382c9ec1af193993c65324d

                                                                                                              SHA512

                                                                                                              a19c86c9c8a720c5ee82b6932efdd279d225ca82d34acb55a413ace5623522a9513e36411a2e6b9be148a8aca98c158103331e420eecf22e844b5fb9ba03bf13

                                                                                                            • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ngen_service.log

                                                                                                              Filesize

                                                                                                              872KB

                                                                                                              MD5

                                                                                                              d7032965ca053ce6121270addc5d631f

                                                                                                              SHA1

                                                                                                              c7da37015a80b2cc6c2f3bc3afd19839627f5201

                                                                                                              SHA256

                                                                                                              c293bdd649c3d3028f3ae94d15540e6771e6d599951a7f4f5076110bc88066b2

                                                                                                              SHA512

                                                                                                              0b21b5d70266d277a17517f69dae7313fb3a491ed31cb97a1cfea6fd2e6c013b8cc817fd78c1761db8c6bb34be7186e495b9f25770f2841e5830bc0a48187617

                                                                                                            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe

                                                                                                              Filesize

                                                                                                              1.3MB

                                                                                                              MD5

                                                                                                              c04e6433fa7cbee0e8e96acf8c7e6993

                                                                                                              SHA1

                                                                                                              bda48f3e383d616015b15b917d384c9ea2de7341

                                                                                                              SHA256

                                                                                                              c1915d3d236c277ce836efe5f3d9cb02a28137b4772ba414c9e5923f370a87dc

                                                                                                              SHA512

                                                                                                              6dc4cca5408bc5e1e7f3943c1c88b249693b01fc85dd77a4f2e16e72273991b430b89ffddfffc832b8b8c6832380d086f275ad796d873fd23e9e6cb45cca6205

                                                                                                            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe

                                                                                                              Filesize

                                                                                                              1.3MB

                                                                                                              MD5

                                                                                                              d10de51d2f18871906e389094f9ae64b

                                                                                                              SHA1

                                                                                                              382e7d234443eab37d52e14a49460c1cc4203657

                                                                                                              SHA256

                                                                                                              d7ab85bf1ca947665d46ffd12a1b7430dcbe9413610e0fa31ff21c47de23b02f

                                                                                                              SHA512

                                                                                                              0f4ea27ff6f0e4e1b58bf05544d284d520cd645f27376258a7b3f2a61a2ebee7988c7e54634dc89d42d335f82d9b4c456d315c4f41b7fb45dc0c4f75d4f88f0c

                                                                                                            • C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe

                                                                                                              Filesize

                                                                                                              1.3MB

                                                                                                              MD5

                                                                                                              89d0a7d989ce343eaa92f72fb463e2e4

                                                                                                              SHA1

                                                                                                              24960289dfa9449670e7fb4221ca74745fc49f55

                                                                                                              SHA256

                                                                                                              04b98073c12b9b0244bb06f3eab54c8cabb241fd5f6a8bf9cb664e21be2a12dd

                                                                                                              SHA512

                                                                                                              04e222ba86a6ec50e4ec3ba900f1045c5ff768750f9c5277dbb63cd7ca49259b46304ee67bd551d54e67629ff1793411977f4c3f46020b470405c18a78703687

                                                                                                            • C:\Windows\Microsoft.NET\Framework\v2.0.50727\ngen_service.log

                                                                                                              Filesize

                                                                                                              1003KB

                                                                                                              MD5

                                                                                                              38b323f3ab034fcc7be2b01aeaf75db8

                                                                                                              SHA1

                                                                                                              11f9d54dcc4041b7bab1489202f1399cb3801358

                                                                                                              SHA256

                                                                                                              43b880cb08f0af04915b7fae8ee318fc7276df5c419b6c0556c6b15108bb4ba1

                                                                                                              SHA512

                                                                                                              90918c7e46aae30f8ce51a5374bed4044594d87d7cc512c3f6abd99e930cc90cfe514d8dff87600a5ab5930b6add25bede3746db0043eea77faa4ad1fb0fcf67

                                                                                                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe

                                                                                                              Filesize

                                                                                                              1.3MB

                                                                                                              MD5

                                                                                                              7466a133ddd3cf31db2bbe735c43a8ec

                                                                                                              SHA1

                                                                                                              f287a742fe152e891def0bbf0904b8a89219d7d5

                                                                                                              SHA256

                                                                                                              46e38ad498c1dc83aec7dd8a2d1a65e3a043eef9819d96352add6ffa23a090b1

                                                                                                              SHA512

                                                                                                              c86a4b60f9bd33d189f92411176d0dbb3842c937d44991abc68ee553a9d3f427d8fbf385a7f7a1cb716c4bfe49ded370ce156f5e65eb9f8cc6b3167630203faf

                                                                                                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen_service.log

                                                                                                              Filesize

                                                                                                              8KB

                                                                                                              MD5

                                                                                                              7013dcc5f42a8439fe5da4bf217438bf

                                                                                                              SHA1

                                                                                                              cdc8cef7d8a8750399ecf2ea9a3c2a6eaa7902ce

                                                                                                              SHA256

                                                                                                              e5e6bc6ef31e0f15d8a1723c2826c80058cc0767b5a68b1786dbc55311748a70

                                                                                                              SHA512

                                                                                                              7cbbdbb17c8fe4fffd09080c4723541781d161e149d97f915a386569dd546333d1c7ab78a0879f30edd6a4e1a1abf2033cea1ba7c2b1e4ed42ea9cc7f4f1b908

                                                                                                            • C:\Windows\SysWOW64\perfhost.exe

                                                                                                              Filesize

                                                                                                              1.2MB

                                                                                                              MD5

                                                                                                              9403c0ab6355e4c0cf777de8bcc56730

                                                                                                              SHA1

                                                                                                              db023f9d51dba919335e22c53c08da4b3896d2f5

                                                                                                              SHA256

                                                                                                              7c6431b82d2cbf0d9c3be475e2dad7f84b5fb5ec51267b2b3a9b33da6ca8e24c

                                                                                                              SHA512

                                                                                                              c6ce1af30132de5c800d72dfe05498cb4aab1d4b17d8b404accc56cb333f6d0047577b140695a0004b9519b1443e5cd07e75b047b087c25997ee70668e76d473

                                                                                                            • C:\Windows\System32\SearchIndexer.exe

                                                                                                              Filesize

                                                                                                              1.1MB

                                                                                                              MD5

                                                                                                              a937e6dfc185e5079c2100269978732e

                                                                                                              SHA1

                                                                                                              8633a4992e9773283a977eb65002d43ac0075a16

                                                                                                              SHA256

                                                                                                              b7f6d797968fcaf485b4595c6b52a5f63a498e24ba02a182a583df9a221d4ac6

                                                                                                              SHA512

                                                                                                              3abf319ee96af281ad94996eb603d419f33c4815283d1b1e4c6842ee5f8c84c02f51d199307c2f4259ae47c3d9bac2eb94259383e855bbc29064d4f4efbd4eab

                                                                                                            • C:\Windows\System32\VSSVC.exe

                                                                                                              Filesize

                                                                                                              2.1MB

                                                                                                              MD5

                                                                                                              f4e95f2da17fe29699aa4cbdbe4199eb

                                                                                                              SHA1

                                                                                                              c4baf58387d14f263284d0822bfe04a675bd742a

                                                                                                              SHA256

                                                                                                              4eba279671bbba4a39709d42ac1c55fa3303a5be2dbf0b2860773b8271e0e440

                                                                                                              SHA512

                                                                                                              ae7ed5f6c9beb30b34c38391b2a287eaeeb1e544a9ad67a12f213b1d83c0df9c85dc2ad0ead2ef130486ab5a296f28a55ebe27de88f9f684d768f7b2a9523a0a

                                                                                                            • C:\Windows\System32\alg.exe

                                                                                                              Filesize

                                                                                                              1.3MB

                                                                                                              MD5

                                                                                                              f33727f7cd49f7e29d116d6ba8ea13aa

                                                                                                              SHA1

                                                                                                              2c2b10419c4d5b45b565309f28469395902dac84

                                                                                                              SHA256

                                                                                                              c1c122b5cf69faacf434494adf90b8862a751a99c20900e7e2e971fb71a2dfde

                                                                                                              SHA512

                                                                                                              cfe5e9bf15e9af5808176a69252d07cc41d1be60e8b0968112caf540e67c96162ed136a297d42ef7942ac3e122fb7d18320423349dd689599b8c1cd967ab5047

                                                                                                            • C:\Windows\System32\ieetwcollector.exe

                                                                                                              Filesize

                                                                                                              1.3MB

                                                                                                              MD5

                                                                                                              27bffa4411aed8220551d0655a72523d

                                                                                                              SHA1

                                                                                                              af0110d29c1e9902bfdeb5ae5aa071c32fe7631e

                                                                                                              SHA256

                                                                                                              3a7d49f73b0b8e9eff45cf943c4bad062f978cb8f5315490d211174c0205d94c

                                                                                                              SHA512

                                                                                                              71433381e6a20b436c572a79e6d95914763cb81eb2493813d71c036ed026174cc346bd29fd4f4f1d1f273c217de7179163d28ecefbf837b646d12e6fddd6f6e8

                                                                                                            • C:\Windows\System32\snmptrap.exe

                                                                                                              Filesize

                                                                                                              1.2MB

                                                                                                              MD5

                                                                                                              7b6f08b458792d0f3020811fc33760e6

                                                                                                              SHA1

                                                                                                              e342a3dcb65e15d158d9fbd2dfc89ad59fb80f16

                                                                                                              SHA256

                                                                                                              8f5e618d73125498e445e318578baf03cbd2e1a706464b4ae5f0fbdc946a1017

                                                                                                              SHA512

                                                                                                              e129e9df1d0f642a5969b0ff4187d05d872289665a5c1baf55a17b44ed424804e334d4d875675f8c551a71989baa452729ab13c7421aab37526576da78f7994e

                                                                                                            • C:\Windows\System32\vds.exe

                                                                                                              Filesize

                                                                                                              1.7MB

                                                                                                              MD5

                                                                                                              b271bebc887ebfe98bef8ec180a249af

                                                                                                              SHA1

                                                                                                              63652c1c2de590f776ced7f0bd021c7b543813a3

                                                                                                              SHA256

                                                                                                              990050a3e7bad946973ea35392215cb7eaddab013a234807b465e1fad08f61f0

                                                                                                              SHA512

                                                                                                              2c82f1c614188f7fcff8a85d6db31fb62faf2f1f3940cdb5384105dce91519beb2f5d29872bf74c2656c61fea5f333a8f078ff221c6740bc32f41debea171188

                                                                                                            • C:\Windows\System32\wbem\WmiApSrv.exe

                                                                                                              Filesize

                                                                                                              1.4MB

                                                                                                              MD5

                                                                                                              2267f4d011101faf834cb43ea1faf8af

                                                                                                              SHA1

                                                                                                              1900dfd325adefc0888f210c1955bafd69655c13

                                                                                                              SHA256

                                                                                                              bbcbc6cda53d9610ae8631241860b47871476e1f3d502e02632e44f228f03438

                                                                                                              SHA512

                                                                                                              8d391ed63e3dd35d78875b7abe3d636d3f9045575a8b12ea68bb6abb053e2066bd98709b33775a4c08996a45393264a9a5a3b3d13a03ccc9ebaff6a5b50af1dc

                                                                                                            • C:\Windows\System32\wbengine.exe

                                                                                                              Filesize

                                                                                                              2.0MB

                                                                                                              MD5

                                                                                                              61f4b69fc838cfe673eb55650ca9a3aa

                                                                                                              SHA1

                                                                                                              e61fecb0f318533daa9fe520147b74a7c0b13ebe

                                                                                                              SHA256

                                                                                                              adda7910543df4ad5db881c588917a6786028def924cfdad55fe67a1bbc5df6d

                                                                                                              SHA512

                                                                                                              77a2fd2059e4fa3bd5ce34ae3965e9567fd97fc398bd1294c476da973eee823ed4fc9c1bd3af069c5658f69ee438a52f439c9e1e777926091e66245b1426e903

                                                                                                            • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.Office.To#\135228e87b2c27d26b516ac0fc0ce667\Microsoft.Office.Tools.Word.v9.0.ni.dll

                                                                                                              Filesize

                                                                                                              834KB

                                                                                                              MD5

                                                                                                              c76656b09bb7df6bd2ac1a6177a0027c

                                                                                                              SHA1

                                                                                                              0c296994a249e8649b19be84dce27c9ddafef3e0

                                                                                                              SHA256

                                                                                                              a0ae0aec5b203865fac761023741a59d274e2c41889aeb69140eb746d38f6ce0

                                                                                                              SHA512

                                                                                                              8390879b8812fc98c17702a52259d510a7fe8bc3cf4972e89f705e93bc8fa98300c34d49f3aec869da8d9f786d33004742e4538019c0f852c61db89c302d5fdf

                                                                                                            • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.Office.To#\5766ec3721d18a48bec1ca1f60331e2d\Microsoft.Office.Tools.Common.v9.0.ni.dll

                                                                                                              Filesize

                                                                                                              797KB

                                                                                                              MD5

                                                                                                              aeb0b6e6c5d32d1ada231285ff2ae881

                                                                                                              SHA1

                                                                                                              1f04a1c059503896336406aed1dc93340e90b742

                                                                                                              SHA256

                                                                                                              4c53ca542ac5ef9d822ef8cb3b0ecef3fb8b937d94c0a7b735bedb275c74a263

                                                                                                              SHA512

                                                                                                              e55fd4c4d2966b3f0b6e88292fbd6c20ffa34766e076e763442c15212d19b6dea5d9dc9e7c359d999674a5b2c8a3849c2bbaaf83e7aa8c12715028b06b5a48e1

                                                                                                            • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.Office.To#\60214b09b490be856c4ee2b3398d71bd\Microsoft.Office.Tools.Outlook.v9.0.ni.dll

                                                                                                              Filesize

                                                                                                              163KB

                                                                                                              MD5

                                                                                                              e88828b5a35063aa16c68ffb8322215d

                                                                                                              SHA1

                                                                                                              8225660ba3a9f528cf6ac32038ae3e0ec98d2331

                                                                                                              SHA256

                                                                                                              99facae4828c566c310a1ccf4059100067ab8bfb3d6e94e44dd9e189fd491142

                                                                                                              SHA512

                                                                                                              e4d2f5a5aeaa29d4d3392588f15db0d514ca4c86c629f0986ee8dba61e34af5ca9e06b94479efd8dd154026ae0da276888a0214e167129db18316a17d9718a57

                                                                                                            • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.Office.To#\d7be05162f8d0fba8f4447db13f6695b\Microsoft.Office.Tools.Excel.v9.0.ni.dll

                                                                                                              Filesize

                                                                                                              1.3MB

                                                                                                              MD5

                                                                                                              006498313e139299a5383f0892c954b9

                                                                                                              SHA1

                                                                                                              7b3aa10930da9f29272154e2674b86876957ce3a

                                                                                                              SHA256

                                                                                                              489fec79addba2de9141daa61062a05a95e96a196049ce414807bada572cc35c

                                                                                                              SHA512

                                                                                                              6a15a10ae66ce0e5b18e060bb53c3108d09f6b07ee2c4a834856f0a35bec2453b32f891620e787731985719831302160678eb52acada102fdb0b87a14288d925

                                                                                                            • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.Office.To#\e1f8e4d08d4b7f811b7dbbacd324027b\Microsoft.Office.Tools.v9.0.ni.dll

                                                                                                              Filesize

                                                                                                              148KB

                                                                                                              MD5

                                                                                                              ac901cf97363425059a50d1398e3454b

                                                                                                              SHA1

                                                                                                              2f8bd4ac2237a7b7606cb77a3d3c58051793c5c7

                                                                                                              SHA256

                                                                                                              f6c7aecb211d9aac911bf80c91e84a47a72ac52cbb523e34e9da6482c0b24c58

                                                                                                              SHA512

                                                                                                              6a340b6d5fa8e214f2a58d8b691c749336df087fa75bcc8d8c46f708e4b4ff3d68a61a17d13ee62322b75cbc61d39f5a572588772f3c5d6e5ff32036e5bc5a00

                                                                                                            • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\03cad6bd8b37d21b28dcb4f955be2158\Microsoft.VisualStudio.Tools.Applications.Contract.v9.0.ni.dll

                                                                                                              Filesize

                                                                                                              34KB

                                                                                                              MD5

                                                                                                              c26b034a8d6ab845b41ed6e8a8d6001d

                                                                                                              SHA1

                                                                                                              3a55774cf22d3244d30f9eb5e26c0a6792a3e493

                                                                                                              SHA256

                                                                                                              620b41f5e02df56c33919218bedc238ca7e76552c43da4f0f39a106835a4edc3

                                                                                                              SHA512

                                                                                                              483424665c3bc79aeb1de6dfdd633c8526331c7b271b1ea6fe93ab298089e2aceefe7f9c7d0c6e33e604ca7b2ed62e7bb586147fecdf9a0eea60e8c03816f537

                                                                                                            • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\0cb958acb9cd4cacb46ebc0396e30aa3\Microsoft.VisualStudio.Tools.Office.Contract.v9.0.ni.dll

                                                                                                              Filesize

                                                                                                              109KB

                                                                                                              MD5

                                                                                                              0fd0f978e977a4122b64ae8f8541de54

                                                                                                              SHA1

                                                                                                              153d3390416fdeba1b150816cbbf968e355dc64f

                                                                                                              SHA256

                                                                                                              211d2b83bb82042385757f811d90c5ae0a281f3abb3bf1c7901e8559db479e60

                                                                                                              SHA512

                                                                                                              ceddfc031bfe4fcf5093d0bbc5697b5fb0cd69b03bc32612325a82ea273dae5daff7e670b0d45816a33307b8b042d27669f5d5391cb2bdcf3e5a0c847c6dcaa8

                                                                                                            • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\367516b7878af19f5c84c67f2cd277ae\Microsoft.VisualStudio.Tools.Office.Word.AddInAdapter.v9.0.ni.dll

                                                                                                              Filesize

                                                                                                              41KB

                                                                                                              MD5

                                                                                                              3c269caf88ccaf71660d8dc6c56f4873

                                                                                                              SHA1

                                                                                                              f9481bf17e10fe1914644e1b590b82a0ecc2c5c4

                                                                                                              SHA256

                                                                                                              de21619e70f9ef8ccbb274bcd0d9d2ace1bae0442dfefab45976671587cf0a48

                                                                                                              SHA512

                                                                                                              bd5be3721bf5bd4001127e0381a0589033cb17aa35852f8f073ba9684af7d8c5a0f3ee29987b345fc15fdf28c5b56686087001ef41221a2cfb16498cf4c016c6

                                                                                                            • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\409ff3f6fa075383e541eac5f1e32dbb\Microsoft.VisualStudio.Tools.Office.Excel.HostAdapter.v10.0.ni.dll

                                                                                                              Filesize

                                                                                                              180KB

                                                                                                              MD5

                                                                                                              5f7f48932024c45605de481b0d420c40

                                                                                                              SHA1

                                                                                                              5d8b3f35a1a905200010077de139df667a6c5485

                                                                                                              SHA256

                                                                                                              d959f5138bde2c5ac8335817dc333c96bb245baaccedabf958cb30ab8b0f3aa1

                                                                                                              SHA512

                                                                                                              97638a692e952575fc0c2aae38ac800e231bd3eafe6783453b2306b06722d80d382cdabc05b34c67361c6a89d871fa19563204253f9a2e2ff4dcec473a585733

                                                                                                            • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\48a294a6ff9cea6b26c38fc8b4f5e3e8\Microsoft.VisualStudio.Tools.Applications.Hosting.v10.0.ni.dll

                                                                                                              Filesize

                                                                                                              356KB

                                                                                                              MD5

                                                                                                              87111e9d98dc79165dfc98a1fb93100b

                                                                                                              SHA1

                                                                                                              4f5182e5ce810f6ba3bdb3418ad33c916b6013c8

                                                                                                              SHA256

                                                                                                              971188681028501d5ac8143b9127feb95d6982417590af42cf1a43483e38bd42

                                                                                                              SHA512

                                                                                                              abbb246d620e8a2ab1973dde19ff56ea1c02afa39e889925fe2a1ba43af1ad4ff6eb017e68578ae520109b3e290b3d9054d7537eb2df0ede6e0fbca8519cc104

                                                                                                            • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\5f2320d38621eb541713e6cd421c2b8a\Microsoft.VisualStudio.Tools.Applications.ServerDocument.v10.0.ni.dll

                                                                                                              Filesize

                                                                                                              648KB

                                                                                                              MD5

                                                                                                              7ebbba07bc6d54efd912bcd78b560b7b

                                                                                                              SHA1

                                                                                                              a6aee1a80ddcdf201301ac29293c62d58bcc941d

                                                                                                              SHA256

                                                                                                              637dc357ff9011902186f2fd128ca74ac84fdb6d984f15036803b6a8fe28868a

                                                                                                              SHA512

                                                                                                              2139a0d520ed70b72dc76fdd0555185386c9c22de1e1fb7eaac0607b313500c44f856c76ac6e2cd72148ea0b86b10bdd2b0ab7daacfc945cb66a637b8d99cfe8

                                                                                                            • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\787526c375f27d452cde50fea4f7986b\Microsoft.VisualStudio.Tools.Applications.Adapter.v9.0.ni.dll

                                                                                                              Filesize

                                                                                                              1.2MB

                                                                                                              MD5

                                                                                                              0637ad2bf6fc5ac1d29e547155bc818c

                                                                                                              SHA1

                                                                                                              a502879466b6dd37eae5881bbb18353f97623852

                                                                                                              SHA256

                                                                                                              868c297cb00b2d298f594ad7e3fd4e38aeaac78042613626d6f919b2bca25c4f

                                                                                                              SHA512

                                                                                                              1d18a16ec3b91c3143c4371de305a7ea464d41661752ece65bf1ce19a8342a265c024a740afa6be8baf4d1edfdac6c6fcdad7395c1294342cd1f4388428e52c1

                                                                                                            • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\9306fc630870a75ddd23441ad77bdc57\Microsoft.VisualStudio.Tools.Applications.Runtime.v10.0.ni.dll

                                                                                                              Filesize

                                                                                                              53KB

                                                                                                              MD5

                                                                                                              e3a7a2b65afd8ab8b154fdc7897595c3

                                                                                                              SHA1

                                                                                                              b21eefd6e23231470b5cf0bd0d7363879a2ed228

                                                                                                              SHA256

                                                                                                              e5faf5e8adf46a8246e6b5038409dadca46985a9951343a1936237d2c8d7a845

                                                                                                              SHA512

                                                                                                              6537c7ed398deb23be1256445297cb7c8d7801bf6e163d918d8e258213708b28f7255ecff9fbd3431d8f5e5a746aa95a29d3a777b28fcd688777aed6d8205a33

                                                                                                            • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\a05ee2388c8a28fb3ac98ec65148e455\Microsoft.VisualStudio.Tools.Applications.AddInAdapter.v10.0.ni.dll

                                                                                                              Filesize

                                                                                                              65KB

                                                                                                              MD5

                                                                                                              da9f9a01a99bd98104b19a95eeef256c

                                                                                                              SHA1

                                                                                                              272071d5bbc0c234bc2f63dfcd5a90f83079bbab

                                                                                                              SHA256

                                                                                                              b06632dff444204f6e76b16198c31ab706ea52270d5e3ae81626dc1fc1fb1a4d

                                                                                                              SHA512

                                                                                                              dcb3273e33b7df02461e81a4f65ae99c0a9ae98188a612ce6d605a058bd2dcb6ddb5b7c78abe1f0a955b7f0c07c323dbfd77a2b6a629a9c87e4ecc1c57e4d81d

                                                                                                            • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\a08bb972a93eb47c24f8c8ef6a14e81a\Microsoft.VisualStudio.Tools.Office.Word.HostAdapter.v10.0.ni.dll

                                                                                                              Filesize

                                                                                                              187KB

                                                                                                              MD5

                                                                                                              df0d92254d3e968fe2a906c1bd3307ee

                                                                                                              SHA1

                                                                                                              6da524c03ca9945e763d812326317c0fbdc3cdfa

                                                                                                              SHA256

                                                                                                              d0eb8b35575a8ef464031bb91e2317e6d5be8c6d060a9c2bc736f6bd6a1d12f0

                                                                                                              SHA512

                                                                                                              03bdb67be4c313497a36a76900d3d7ffd0d62725744b6df9ac1dcb42899f97e3b48cb58e668e974212058450bf9cab046df3e0a7a751464606bf18f307647f03

                                                                                                            • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\afa5bb1a39443d7dc81dfff54073929b\Microsoft.VisualStudio.Tools.Office.Contract.v10.0.ni.dll

                                                                                                              Filesize

                                                                                                              28KB

                                                                                                              MD5

                                                                                                              aefc3f3c8e7499bad4d05284e8abd16c

                                                                                                              SHA1

                                                                                                              7ab718bde7fdb2d878d8725dc843cfeba44a71f7

                                                                                                              SHA256

                                                                                                              4436550409cfb3d06b15dd0c3131e87e7002b0749c7c6e9dc3378c99dbec815d

                                                                                                              SHA512

                                                                                                              1d7dbc9764855a9a1f945c1bc8e86406c0625f1381d71b3ea6924322fbe419d1c70c3f3efd57ee2cb2097bb9385e0bf54965ab789328a80eb4946849648fe20b

                                                                                                            • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\b8e029b1434d965380b363483e376df0\Microsoft.VisualStudio.Tools.Applications.ServerDocument.v9.0.ni.dll

                                                                                                              Filesize

                                                                                                              329KB

                                                                                                              MD5

                                                                                                              eb09a7062a66a50fe2cb16c4a80561a7

                                                                                                              SHA1

                                                                                                              33b4c71ced7644be9802374a4f04c866394daaca

                                                                                                              SHA256

                                                                                                              e94a4ad1ef9de2886a231e857c8691328c2e6e344cc9e82440e5c45b8a788256

                                                                                                              SHA512

                                                                                                              c57a4c626c87032ca422df04ce7c3322662a9b0c6c06a46e93f08ca8f431295c9ae802cd79f53cae5de2b39a30bbeb756c966880e874ed44115cf511cc1ff920

                                                                                                            • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\bf3e8ba642eaf9a5371982f211550c52\Microsoft.VisualStudio.Tools.Applications.Hosting.v9.0.ni.dll

                                                                                                              Filesize

                                                                                                              278KB

                                                                                                              MD5

                                                                                                              d74d434aa70ce827715b5e0ac7eda5be

                                                                                                              SHA1

                                                                                                              b53f3374be4c96af51c78fd873de1360f17c200f

                                                                                                              SHA256

                                                                                                              54701cbe719b08b2393b9f4a604c372f9a280b5d3dd520b563d2aea7d69a1496

                                                                                                              SHA512

                                                                                                              631d09a0ff39ece829f5c23278c2c030e5ff758b285128edb7805682de75b5be1aedd914d2325f79ec98d0103660a39ae1f1a5782f5dad038b143f3774c098df

                                                                                                            • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\de06a98a598aa0ff716a25b24d56ad7f\Microsoft.VisualStudio.Tools.Applications.Contract.v10.0.ni.dll

                                                                                                              Filesize

                                                                                                              27KB

                                                                                                              MD5

                                                                                                              9c60454398ce4bce7a52cbda4a45d364

                                                                                                              SHA1

                                                                                                              da1e5de264a6f6051b332f8f32fa876d297bf620

                                                                                                              SHA256

                                                                                                              edc90887d38c87282f49adbb12a94040f9ac86058bfae15063aaaff2672b54e1

                                                                                                              SHA512

                                                                                                              533b7e9c55102b248f4a7560955734b4156eb4c02539c6f978aeacecff1ff182ba0f04a07d32ed90707a62d73191b0e2d2649f38ae1c3e7a5a4c0fbea9a94300

                                                                                                            • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\e0220058091b941725ef02be0b84abe7\Microsoft.VisualStudio.Tools.Applications.HostAdapter.v10.0.ni.dll

                                                                                                              Filesize

                                                                                                              57KB

                                                                                                              MD5

                                                                                                              6eaaa1f987d6e1d81badf8665c55a341

                                                                                                              SHA1

                                                                                                              e52db4ad92903ca03a5a54fdb66e2e6fad59efd5

                                                                                                              SHA256

                                                                                                              4b78ffa5f0b6751aea11917db5961d566e2f59beaa054b41473d331fd392329e

                                                                                                              SHA512

                                                                                                              dbedfa6c569670c22d34d923e22b7dae7332b932b809082dad87a1f0bb125c912db37964b5881667867ccf23dc5e5be596aad85485746f8151ce1c51ffd097b2

                                                                                                            • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\ee73646032cbb022d16771203727e3b2\Microsoft.VisualStudio.Tools.Applications.Runtime.v9.0.ni.dll

                                                                                                              Filesize

                                                                                                              130KB

                                                                                                              MD5

                                                                                                              2735d2ab103beb0f7c1fbd6971838274

                                                                                                              SHA1

                                                                                                              6063646bc072546798bf8bf347425834f2bfad71

                                                                                                              SHA256

                                                                                                              f00156860ec7e88f4ccb459ca29b7e0e5c169cdc8a081cb043603187d25d92b3

                                                                                                              SHA512

                                                                                                              fe2ce60c7f61760a29344e254771d48995e983e158da0725818f37441f9690bda46545bf10c84b163f6afb163ffb504913d6ffddf84f72b062c7f233aed896de

                                                                                                            • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\f030ae7a0ac8395493f8afcd319ee692\Microsoft.VisualStudio.Tools.Office.HostAdapter.v10.0.ni.dll

                                                                                                              Filesize

                                                                                                              143KB

                                                                                                              MD5

                                                                                                              f786ebe6116b55d4dc62a63dfede2ca6

                                                                                                              SHA1

                                                                                                              ab82f3b24229cf9ad31484b3811cdb84d5e916e9

                                                                                                              SHA256

                                                                                                              9805ae745d078fc9d64e256d4472c0edd369958a6872d71bd28d245a0239fe12

                                                                                                              SHA512

                                                                                                              80832872329611c5c68784196f890859f6f7c5795f6a62542ad20be813e587341b36ade410363646c43f9ced48d2cf89a4537fe60d90e868324270f7040c2738

                                                                                                            • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\f1a7ac664667f2d6bcd6c388b230c22b\Microsoft.VisualStudio.Tools.Applications.AddInAdapter.v9.0.ni.dll

                                                                                                              Filesize

                                                                                                              59KB

                                                                                                              MD5

                                                                                                              8c69bbdfbc8cc3fa3fa5edcd79901e94

                                                                                                              SHA1

                                                                                                              b8028f0f557692221d5c0160ec6ce414b2bdf19b

                                                                                                              SHA256

                                                                                                              a21471690e7c32c80049e17c13624820e77bca6c9c38b83d9ea8a7248086660d

                                                                                                              SHA512

                                                                                                              825f5b87b76303b62fc16a96b108fb1774c2aca52ac5e44cd0ac2fe2ee47d5d67947dfe7498e36bc849773f608ec5824711f8c36e375a378582eefb57c9c2557

                                                                                                            • C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualStu#\fc36797f7054935a6033077612905a0f\Microsoft.VisualStudio.Tools.Office.Excel.AddInAdapter.v9.0.ni.dll

                                                                                                              Filesize

                                                                                                              42KB

                                                                                                              MD5

                                                                                                              71d4273e5b77cf01239a5d4f29e064fc

                                                                                                              SHA1

                                                                                                              e8876dea4e4c4c099e27234742016be3c80d8b62

                                                                                                              SHA256

                                                                                                              f019899f829731f899a99885fd52fde1fe4a4f6fe3ecf7f7a7cfa78517c00575

                                                                                                              SHA512

                                                                                                              41fe67cda988c53bd087df6296d1a242cddac688718ea5a5884a72b43e9638538e64d7a59e045c0b4d490496d884cf0ec694ddf7fcb41ae3b8cbc65b7686b180

                                                                                                            • C:\Windows\assembly\NativeImages_v2.0.50727_32\Temp\ZAP8508.tmp\Microsoft.VisualStudio.Tools.Office.AddInAdapter.v9.0.dll

                                                                                                              Filesize

                                                                                                              210KB

                                                                                                              MD5

                                                                                                              4f40997b51420653706cb0958086cd2d

                                                                                                              SHA1

                                                                                                              0069b956d17ce7d782a0e054995317f2f621b502

                                                                                                              SHA256

                                                                                                              8cd6a0b061b43e0b660b81859c910290a3672b00d7647ba0e86eda6ddcc8c553

                                                                                                              SHA512

                                                                                                              e18953d7a348859855e5f6e279bc9924fc3707b57a733ce9b8f7d21bd631d419f1ebfb29202608192eb346569ca9a55264f5b4c2aedd474c22060734a68a4ee6

                                                                                                            • C:\Windows\assembly\NativeImages_v2.0.50727_32\Temp\ZAPA43B.tmp\Microsoft.VisualStudio.Tools.Office.Outlook.HostAdapter.v10.0.dll

                                                                                                              Filesize

                                                                                                              83KB

                                                                                                              MD5

                                                                                                              0bd8b381e3c7b2d2c59bb4b8c32c84bb

                                                                                                              SHA1

                                                                                                              41ca567461728944ec6daa398760c0e3c66c70b9

                                                                                                              SHA256

                                                                                                              e39480cb30256bfd8c050eda7039050822d3afc432cb1725179c6e44f04e28c5

                                                                                                              SHA512

                                                                                                              b76665facc90801058aa8088328a401ee098bacdf4b96743b54503cd5da6d162c7a0c4ec56275c87220aa99606f767f5c0a5a63389ce8f6682cd778bade63d70

                                                                                                            • C:\Windows\assembly\NativeImages_v2.0.50727_32\ehiVidCtl\88e20c69254157d91b96eadc9444815d\ehiVidCtl.ni.dll

                                                                                                              Filesize

                                                                                                              855KB

                                                                                                              MD5

                                                                                                              7812b0a90d92b4812d4063b89a970c58

                                                                                                              SHA1

                                                                                                              3c4a789b8d28a5bfa6a6191624e33b8f40e4c4ea

                                                                                                              SHA256

                                                                                                              897626e6af00e85e627eeaa7f9563b245335242bc6196b36d0072e5b6d45e543

                                                                                                              SHA512

                                                                                                              634a2395bada9227b1957f2b76ed7e19f12bfc4d71a145d182602a1b6e24d83e220ebfabd602b1995c360e1725a38a89ff58417b0295bb0da9ea35c41c21a6ed

                                                                                                            • C:\Windows\assembly\NativeImages_v2.0.50727_32\stdole\2c6d60b55bbab22515c512080d4b3bae\stdole.ni.dll

                                                                                                              Filesize

                                                                                                              43KB

                                                                                                              MD5

                                                                                                              3e72bdd0663c5b2bcd530f74139c83e3

                                                                                                              SHA1

                                                                                                              66069bcac0207512b9e07320f4fa5934650677d2

                                                                                                              SHA256

                                                                                                              6a6ac3094130d1affd34aae5ba2bd8c889e2071eb4217a75d72b5560f884e357

                                                                                                              SHA512

                                                                                                              b0a98db477fccae71b4ebfb8525ed52c10f1e7542f955b307f260e27e0758aa22896683302e34b0237e7e3bba9f5193ddcc7ff255c71fbaa1386988b0ec7d626

                                                                                                            • C:\Windows\ehome\ehrecvr.exe

                                                                                                              Filesize

                                                                                                              1.2MB

                                                                                                              MD5

                                                                                                              e0c6ef1c1c7c72ec2a8a39b555ac652b

                                                                                                              SHA1

                                                                                                              df4503d7404311a18ac3a38e35ba556c6d49daa8

                                                                                                              SHA256

                                                                                                              fc13a6b3af190ad4d42b668c3b8c87398769cf4833a1eded9d996b13dedc0f4d

                                                                                                              SHA512

                                                                                                              bb873892546ad8e391d81c1784caf4e3dde9ff6ade7ecaf732a14fef35702e712418f8ec6a95433e3f52d8dcf9ffba901bd537b025fb3eb05bca44f0027d0bd0

                                                                                                            • C:\Windows\ehome\ehsched.exe

                                                                                                              Filesize

                                                                                                              1.3MB

                                                                                                              MD5

                                                                                                              d0785240780af338e7e7566fe11018dc

                                                                                                              SHA1

                                                                                                              01b21b2cb7f665c77584dc49e791b4a7232c8cb1

                                                                                                              SHA256

                                                                                                              b1af30ea8211acc93d3c08dae2a9748b349d4affda9229c33f535b1f13a95649

                                                                                                              SHA512

                                                                                                              b22d49d7ec796c1b10b0a83f0f73f34f31794f349f08ce5b6bceda58b6155faba547c80997003c88515751bd4a109ee24871002f283dd36071d5ee0de7fa8ddd

                                                                                                            • C:\Windows\system32\msiexec.exe

                                                                                                              Filesize

                                                                                                              1.3MB

                                                                                                              MD5

                                                                                                              e6c7134c4fe27e841a756a7f9deb4ea1

                                                                                                              SHA1

                                                                                                              5656f381cac0267684019c9248ecfeac189d6cd7

                                                                                                              SHA256

                                                                                                              a9a7ee4ab1be705a276c32c1ac22a9cf0648ee31689c9bfab03e7c4a59f9ae83

                                                                                                              SHA512

                                                                                                              ef443badf9b1e45feb1f302f30c1630b681f8be1b77e115a663d63d9d06aa5611239a9f8cf16d62aca77e006ea57371727c486877e401403288bea214ffc776f

                                                                                                            • \Program Files\Windows Media Player\wmpnetwk.exe

                                                                                                              Filesize

                                                                                                              2.0MB

                                                                                                              MD5

                                                                                                              78185823145105c32820728f5e512ad7

                                                                                                              SHA1

                                                                                                              aff3e881007d05dd89fbfc776ffd404ffe67efa9

                                                                                                              SHA256

                                                                                                              d7c74d88ceb32acd53ab3e01e39a58d3abb1087175ddfc1cec75321e49b2aefa

                                                                                                              SHA512

                                                                                                              0eccd7843c6a2fd2d64ce0ddf6ed80e786f525d362b88ad159e77eb1cbf65e43f0e8335c35c76cf00d1f49c782ca12c08132860713562f05b70011c87deb25de

                                                                                                            • \Windows\System32\Locator.exe

                                                                                                              Filesize

                                                                                                              1.2MB

                                                                                                              MD5

                                                                                                              391d42c109b3eebb9ed4701ee8391cd4

                                                                                                              SHA1

                                                                                                              b6da78dd5df481a81c3da7ac508e90872af2f4da

                                                                                                              SHA256

                                                                                                              d25783fe639a1210085b2dc9e3524847b52f7ddf1db81ae637ae6f605109f4b8

                                                                                                              SHA512

                                                                                                              765ffd8907cda954b16cf71e2f521bde53e5d7f98be8969aa43c3eec5a0a3119b7c21dd1851c48a1d72d7498c138eca23e15e4a1800be794f76d4e18a3197d75

                                                                                                            • \Windows\System32\msdtc.exe

                                                                                                              Filesize

                                                                                                              1.4MB

                                                                                                              MD5

                                                                                                              f3ce136101b6cccc43706820b0adcf31

                                                                                                              SHA1

                                                                                                              0243ddef67d527c491bc42fbf8406afaff53fe6b

                                                                                                              SHA256

                                                                                                              327bb3c553718eb94d17de7753bde98d3ae8527e929efb3774647b2f90d3061a

                                                                                                              SHA512

                                                                                                              9692435c12f2392766bce91cf5b6bb83ab0a5aada8dfded3231d0725b104ab685b007d2a0bd6ccc69cfc0dd941281d9439bfe1d001cfaff0915b9f8e1981b7c1

                                                                                                            • memory/592-362-0x0000000100000000-0x00000001001ED000-memory.dmp

                                                                                                              Filesize

                                                                                                              1.9MB

                                                                                                            • memory/592-190-0x0000000100000000-0x00000001001ED000-memory.dmp

                                                                                                              Filesize

                                                                                                              1.9MB

                                                                                                            • memory/612-99-0x0000000000170000-0x00000000001D0000-memory.dmp

                                                                                                              Filesize

                                                                                                              384KB

                                                                                                            • memory/612-93-0x0000000000170000-0x00000000001D0000-memory.dmp

                                                                                                              Filesize

                                                                                                              384KB

                                                                                                            • memory/612-103-0x0000000140000000-0x0000000140209000-memory.dmp

                                                                                                              Filesize

                                                                                                              2.0MB

                                                                                                            • memory/612-181-0x0000000140000000-0x0000000140209000-memory.dmp

                                                                                                              Filesize

                                                                                                              2.0MB

                                                                                                            • memory/612-757-0x0000000140000000-0x0000000140209000-memory.dmp

                                                                                                              Filesize

                                                                                                              2.0MB

                                                                                                            • memory/1572-445-0x0000000000400000-0x00000000005FF000-memory.dmp

                                                                                                              Filesize

                                                                                                              2.0MB

                                                                                                            • memory/1572-470-0x0000000000400000-0x00000000005FF000-memory.dmp

                                                                                                              Filesize

                                                                                                              2.0MB

                                                                                                            • memory/1572-515-0x0000000000400000-0x00000000005FF000-memory.dmp

                                                                                                              Filesize

                                                                                                              2.0MB

                                                                                                            • memory/1572-524-0x0000000000400000-0x00000000005FF000-memory.dmp

                                                                                                              Filesize

                                                                                                              2.0MB

                                                                                                            • memory/1640-216-0x0000000100000000-0x000000010021B000-memory.dmp

                                                                                                              Filesize

                                                                                                              2.1MB

                                                                                                            • memory/1640-446-0x0000000100000000-0x000000010021B000-memory.dmp

                                                                                                              Filesize

                                                                                                              2.1MB

                                                                                                            • memory/1708-847-0x0000000001FE0000-0x000000000217E000-memory.dmp

                                                                                                              Filesize

                                                                                                              1.6MB

                                                                                                            • memory/1708-46-0x0000000000400000-0x00000000005FF000-memory.dmp

                                                                                                              Filesize

                                                                                                              2.0MB

                                                                                                            • memory/1708-846-0x0000000001FE0000-0x0000000002084000-memory.dmp

                                                                                                              Filesize

                                                                                                              656KB

                                                                                                            • memory/1708-156-0x0000000000400000-0x00000000005FF000-memory.dmp

                                                                                                              Filesize

                                                                                                              2.0MB

                                                                                                            • memory/1708-844-0x0000000001FE0000-0x0000000001FFA000-memory.dmp

                                                                                                              Filesize

                                                                                                              104KB

                                                                                                            • memory/1708-854-0x0000000001FE0000-0x0000000002046000-memory.dmp

                                                                                                              Filesize

                                                                                                              408KB

                                                                                                            • memory/1708-845-0x0000000001FE0000-0x000000000206C000-memory.dmp

                                                                                                              Filesize

                                                                                                              560KB

                                                                                                            • memory/1708-52-0x0000000000730000-0x0000000000796000-memory.dmp

                                                                                                              Filesize

                                                                                                              408KB

                                                                                                            • memory/1708-843-0x0000000001FE0000-0x0000000001FFE000-memory.dmp

                                                                                                              Filesize

                                                                                                              120KB

                                                                                                            • memory/1708-853-0x0000000001FE0000-0x000000000200A000-memory.dmp

                                                                                                              Filesize

                                                                                                              168KB

                                                                                                            • memory/1708-848-0x0000000001FE0000-0x00000000020CC000-memory.dmp

                                                                                                              Filesize

                                                                                                              944KB

                                                                                                            • memory/1708-47-0x0000000000730000-0x0000000000796000-memory.dmp

                                                                                                              Filesize

                                                                                                              408KB

                                                                                                            • memory/1708-849-0x0000000001FE0000-0x0000000001FF0000-memory.dmp

                                                                                                              Filesize

                                                                                                              64KB

                                                                                                            • memory/1708-842-0x0000000001FE0000-0x0000000001FEA000-memory.dmp

                                                                                                              Filesize

                                                                                                              40KB

                                                                                                            • memory/1708-850-0x0000000001FE0000-0x0000000002068000-memory.dmp

                                                                                                              Filesize

                                                                                                              544KB

                                                                                                            • memory/1708-851-0x0000000001FE0000-0x0000000002004000-memory.dmp

                                                                                                              Filesize

                                                                                                              144KB

                                                                                                            • memory/1708-852-0x0000000001FE0000-0x0000000001FE8000-memory.dmp

                                                                                                              Filesize

                                                                                                              32KB

                                                                                                            • memory/1744-421-0x0000000100000000-0x0000000100219000-memory.dmp

                                                                                                              Filesize

                                                                                                              2.1MB

                                                                                                            • memory/1744-202-0x0000000100000000-0x0000000100219000-memory.dmp

                                                                                                              Filesize

                                                                                                              2.1MB

                                                                                                            • memory/1752-132-0x000000002E000000-0x000000002FE1E000-memory.dmp

                                                                                                              Filesize

                                                                                                              30.1MB

                                                                                                            • memory/1752-129-0x0000000000230000-0x0000000000296000-memory.dmp

                                                                                                              Filesize

                                                                                                              408KB

                                                                                                            • memory/1752-200-0x000000002E000000-0x000000002FE1E000-memory.dmp

                                                                                                              Filesize

                                                                                                              30.1MB

                                                                                                            • memory/1752-123-0x0000000000230000-0x0000000000296000-memory.dmp

                                                                                                              Filesize

                                                                                                              408KB

                                                                                                            • memory/1768-151-0x0000000140000000-0x0000000140221000-memory.dmp

                                                                                                              Filesize

                                                                                                              2.1MB

                                                                                                            • memory/1768-144-0x0000000140000000-0x0000000140221000-memory.dmp

                                                                                                              Filesize

                                                                                                              2.1MB

                                                                                                            • memory/1772-229-0x00000000006A0000-0x00000000008A9000-memory.dmp

                                                                                                              Filesize

                                                                                                              2.0MB

                                                                                                            • memory/1772-217-0x0000000100000000-0x0000000100209000-memory.dmp

                                                                                                              Filesize

                                                                                                              2.0MB

                                                                                                            • memory/1772-160-0x00000000006A0000-0x00000000008A9000-memory.dmp

                                                                                                              Filesize

                                                                                                              2.0MB

                                                                                                            • memory/1772-157-0x0000000100000000-0x0000000100209000-memory.dmp

                                                                                                              Filesize

                                                                                                              2.0MB

                                                                                                            • memory/1928-148-0x0000000140000000-0x000000014020D000-memory.dmp

                                                                                                              Filesize

                                                                                                              2.1MB

                                                                                                            • memory/1928-206-0x0000000140000000-0x000000014020D000-memory.dmp

                                                                                                              Filesize

                                                                                                              2.1MB

                                                                                                            • memory/2060-113-0x00000000002E0000-0x0000000000340000-memory.dmp

                                                                                                              Filesize

                                                                                                              384KB

                                                                                                            • memory/2060-115-0x0000000140000000-0x0000000140237000-memory.dmp

                                                                                                              Filesize

                                                                                                              2.2MB

                                                                                                            • memory/2060-107-0x00000000002E0000-0x0000000000340000-memory.dmp

                                                                                                              Filesize

                                                                                                              384KB

                                                                                                            • memory/2060-188-0x0000000140000000-0x0000000140237000-memory.dmp

                                                                                                              Filesize

                                                                                                              2.2MB

                                                                                                            • memory/2132-489-0x0000000000400000-0x00000000005FF000-memory.dmp

                                                                                                              Filesize

                                                                                                              2.0MB

                                                                                                            • memory/2132-477-0x0000000000400000-0x00000000005FF000-memory.dmp

                                                                                                              Filesize

                                                                                                              2.0MB

                                                                                                            • memory/2228-347-0x0000000000400000-0x00000000005FF000-memory.dmp

                                                                                                              Filesize

                                                                                                              2.0MB

                                                                                                            • memory/2228-218-0x0000000000400000-0x00000000005FF000-memory.dmp

                                                                                                              Filesize

                                                                                                              2.0MB

                                                                                                            • memory/2260-476-0x0000000000400000-0x00000000005FF000-memory.dmp

                                                                                                              Filesize

                                                                                                              2.0MB

                                                                                                            • memory/2260-467-0x0000000000400000-0x00000000005FF000-memory.dmp

                                                                                                              Filesize

                                                                                                              2.0MB

                                                                                                            • memory/2340-72-0x0000000140000000-0x0000000140205000-memory.dmp

                                                                                                              Filesize

                                                                                                              2.0MB

                                                                                                            • memory/2340-64-0x00000000001E0000-0x0000000000240000-memory.dmp

                                                                                                              Filesize

                                                                                                              384KB

                                                                                                            • memory/2340-70-0x00000000001E0000-0x0000000000240000-memory.dmp

                                                                                                              Filesize

                                                                                                              384KB

                                                                                                            • memory/2340-171-0x0000000140000000-0x0000000140205000-memory.dmp

                                                                                                              Filesize

                                                                                                              2.0MB

                                                                                                            • memory/2388-231-0x0000000100000000-0x000000010020A000-memory.dmp

                                                                                                              Filesize

                                                                                                              2.0MB

                                                                                                            • memory/2388-499-0x0000000100000000-0x000000010020A000-memory.dmp

                                                                                                              Filesize

                                                                                                              2.0MB

                                                                                                            • memory/2408-821-0x0000000140000000-0x000000014013C000-memory.dmp

                                                                                                              Filesize

                                                                                                              1.2MB

                                                                                                            • memory/2408-87-0x0000000000880000-0x00000000008E0000-memory.dmp

                                                                                                              Filesize

                                                                                                              384KB

                                                                                                            • memory/2408-86-0x0000000140000000-0x000000014013C000-memory.dmp

                                                                                                              Filesize

                                                                                                              1.2MB

                                                                                                            • memory/2408-80-0x0000000000880000-0x00000000008E0000-memory.dmp

                                                                                                              Filesize

                                                                                                              384KB

                                                                                                            • memory/2408-102-0x0000000001390000-0x00000000013A0000-memory.dmp

                                                                                                              Filesize

                                                                                                              64KB

                                                                                                            • memory/2408-101-0x0000000001380000-0x0000000001390000-memory.dmp

                                                                                                              Filesize

                                                                                                              64KB

                                                                                                            • memory/2408-176-0x0000000140000000-0x000000014013C000-memory.dmp

                                                                                                              Filesize

                                                                                                              1.2MB

                                                                                                            • memory/2412-234-0x000000002E000000-0x000000002E20C000-memory.dmp

                                                                                                              Filesize

                                                                                                              2.0MB

                                                                                                            • memory/2412-173-0x000000002E000000-0x000000002E20C000-memory.dmp

                                                                                                              Filesize

                                                                                                              2.0MB

                                                                                                            • memory/2432-428-0x0000000000400000-0x00000000005FF000-memory.dmp

                                                                                                              Filesize

                                                                                                              2.0MB

                                                                                                            • memory/2432-364-0x0000000000400000-0x00000000005FF000-memory.dmp

                                                                                                              Filesize

                                                                                                              2.0MB

                                                                                                            • memory/2476-441-0x0000000000400000-0x00000000005FF000-memory.dmp

                                                                                                              Filesize

                                                                                                              2.0MB

                                                                                                            • memory/2476-424-0x0000000000400000-0x00000000005FF000-memory.dmp

                                                                                                              Filesize

                                                                                                              2.0MB

                                                                                                            • memory/2496-443-0x0000000100000000-0x0000000100202000-memory.dmp

                                                                                                              Filesize

                                                                                                              2.0MB

                                                                                                            • memory/2496-203-0x0000000100000000-0x0000000100202000-memory.dmp

                                                                                                              Filesize

                                                                                                              2.0MB

                                                                                                            • memory/2504-343-0x0000000000400000-0x00000000005FF000-memory.dmp

                                                                                                              Filesize

                                                                                                              2.0MB

                                                                                                            • memory/2504-353-0x0000000000400000-0x00000000005FF000-memory.dmp

                                                                                                              Filesize

                                                                                                              2.0MB

                                                                                                            • memory/2608-35-0x0000000010000000-0x00000000101FE000-memory.dmp

                                                                                                              Filesize

                                                                                                              2.0MB

                                                                                                            • memory/2608-61-0x0000000010000000-0x00000000101FE000-memory.dmp

                                                                                                              Filesize

                                                                                                              2.0MB

                                                                                                            • memory/2640-120-0x0000000140000000-0x0000000140205000-memory.dmp

                                                                                                              Filesize

                                                                                                              2.0MB

                                                                                                            • memory/2640-763-0x0000000140000000-0x0000000140205000-memory.dmp

                                                                                                              Filesize

                                                                                                              2.0MB

                                                                                                            • memory/2660-235-0x0000000100000000-0x0000000100123000-memory.dmp

                                                                                                              Filesize

                                                                                                              1.1MB

                                                                                                            • memory/2660-513-0x0000000100000000-0x0000000100123000-memory.dmp

                                                                                                              Filesize

                                                                                                              1.1MB

                                                                                                            • memory/2700-517-0x0000000000400000-0x00000000005FF000-memory.dmp

                                                                                                              Filesize

                                                                                                              2.0MB

                                                                                                            • memory/2700-498-0x0000000000400000-0x00000000005FF000-memory.dmp

                                                                                                              Filesize

                                                                                                              2.0MB

                                                                                                            • memory/2780-193-0x0000000100000000-0x000000010026B000-memory.dmp

                                                                                                              Filesize

                                                                                                              2.4MB

                                                                                                            • memory/2780-396-0x0000000100000000-0x000000010026B000-memory.dmp

                                                                                                              Filesize

                                                                                                              2.4MB

                                                                                                            • memory/2856-178-0x0000000001000000-0x00000000011ED000-memory.dmp

                                                                                                              Filesize

                                                                                                              1.9MB

                                                                                                            • memory/2860-62-0x0000000010000000-0x00000000101F6000-memory.dmp

                                                                                                              Filesize

                                                                                                              2.0MB

                                                                                                            • memory/2860-28-0x0000000010000000-0x00000000101F6000-memory.dmp

                                                                                                              Filesize

                                                                                                              2.0MB

                                                                                                            • memory/2936-36-0x0000000004BA0000-0x0000000004BA2000-memory.dmp

                                                                                                              Filesize

                                                                                                              8KB

                                                                                                            • memory/2936-92-0x0000000000400000-0x00000000005FD000-memory.dmp

                                                                                                              Filesize

                                                                                                              2.0MB

                                                                                                            • memory/2936-0-0x0000000000400000-0x00000000005FD000-memory.dmp

                                                                                                              Filesize

                                                                                                              2.0MB

                                                                                                            • memory/2936-1-0x0000000000340000-0x00000000003A6000-memory.dmp

                                                                                                              Filesize

                                                                                                              408KB

                                                                                                            • memory/2936-6-0x0000000000340000-0x00000000003A6000-memory.dmp

                                                                                                              Filesize

                                                                                                              408KB

                                                                                                            • memory/2980-12-0x0000000100000000-0x00000001001FB000-memory.dmp

                                                                                                              Filesize

                                                                                                              2.0MB

                                                                                                            • memory/2980-119-0x0000000100000000-0x00000001001FB000-memory.dmp

                                                                                                              Filesize

                                                                                                              2.0MB

                                                                                                            • memory/3016-17-0x00000000008F0000-0x0000000000950000-memory.dmp

                                                                                                              Filesize

                                                                                                              384KB

                                                                                                            • memory/3016-23-0x00000000008F0000-0x0000000000950000-memory.dmp

                                                                                                              Filesize

                                                                                                              384KB

                                                                                                            • memory/3016-16-0x0000000140000000-0x00000001401F4000-memory.dmp

                                                                                                              Filesize

                                                                                                              2.0MB

                                                                                                            • memory/3016-128-0x0000000140000000-0x00000001401F4000-memory.dmp

                                                                                                              Filesize

                                                                                                              2.0MB

                                                                                                            • memory/3020-335-0x0000000100000000-0x00000001001EC000-memory.dmp

                                                                                                              Filesize

                                                                                                              1.9MB

                                                                                                            • memory/3020-185-0x0000000100000000-0x00000001001EC000-memory.dmp

                                                                                                              Filesize

                                                                                                              1.9MB

                                                                                                            • memory/3112-535-0x0000000000400000-0x00000000005FF000-memory.dmp

                                                                                                              Filesize

                                                                                                              2.0MB

                                                                                                            • memory/3112-545-0x0000000000400000-0x00000000005FF000-memory.dmp

                                                                                                              Filesize

                                                                                                              2.0MB

                                                                                                            • memory/3704-608-0x0000000003D50000-0x0000000003E0A000-memory.dmp

                                                                                                              Filesize

                                                                                                              744KB